Reference Hub1
Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility

Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility

Dirk Westhoff (University of Applied Sciences Offenburg, Offenburg, Germany) and Maximilian Zeiser (University of Applied Sciences Offenburg, Offenburg, Germany)
Copyright: © 2018 |Volume: 8 |Issue: 2 |Article: 1 |Pages: 16
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781522545378|DOI: 10.4018/IJCWT.2018040101
Cite Article Cite Article

MLA

Westhoff, Dirk and Maximilian Zeiser. "Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility." IJCWT vol.8, no.2 2018: pp.1-16. http://doi.org/10.4018/IJCWT.2018040101

APA

Westhoff, D., & Zeiser, M. (2018). Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility. International Journal of Cyber Warfare and Terrorism (IJCWT), 8(2), 1-16. http://doi.org/10.4018/IJCWT.2018040101

Chicago

Westhoff, Dirk, and Maximilian Zeiser. "Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility," International Journal of Cyber Warfare and Terrorism (IJCWT) 8, no.2: 1-16. http://doi.org/10.4018/IJCWT.2018040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The authors claim that location information of stationary ICT components can never be unclassified. They describe how swarm-mapping (crowd sourcing) is used by Apple and Google to worldwide harvest geo-location information on wireless access points and mobile telecommunication systems' base stations to build up gigantic databases with very exclusive access rights. After having highlighted the known technical facts, in the speculative part of this article, the authors argue how this may impact cyber deterrence strategies of states and alliances understanding the cyberspace as another domain of geostrategic relevance. The states and alliances spectrum of activities due to the potential existence of such databases may range from geopolitical negotiations by institutions understanding international affairs as their core business, mitigation approaches at a technical level, over means of cyber deterrence-by-retaliation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.