Abstract
The IT technician Edward Snowden denounced the United States for formulating and executing governmental policies which damage the safety of cyberspace or cybersafety, with the leading support of universities and jointly with transnational corporations from the IT and telecommunications sectors and other disciplines of the applied sciences. Such a denunciation caused great confusion in the majority of the citizens across the world, who think that such conduct constitutes a flagrant violation of the human rights of privacy and freedom of thought.
Luis Holder, Professor-researcher at the Bolviarian Military University of Venezuela (Universidad Militar Bolivariana de Venezuela) and the Institute of High Studies of the National Defense (Instituto de Altos Estudios de la Defensa Nacional). Scientific adviser of the National Experimental Politechnical University of the National Boliviarian Armed Forces (Universidad Nacional Experimental Politécnica de la Fuerza Armada Nacional Bolivariana). Email: doctorholder@gmail.com.
Julio Cárdenas, General of División of the Boliviarian Military Aviation in Venezuela (Aviación Militar Bolivariana de Venezuela), Vice-Rector of Research, Development and Innovation of the National Experimental Politechnical University of the National Boliviarian Armed Forces (Universidad Nacional Experimental Politécnica de la Fuerza Armada Nacional Bolivariana). Email: jcardenaschapellin@gmail.com.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Angiolillo Fernández, Pascualino (2012). La Unión de Naciones Suramericanas (UNASUR). Alianzas Militares, Caracas, Editorial El Perro y la Rana y Colección Alfredo Maneiro.
Arroyo Belmonte, Rocío (2016). “Estrategias de soft power en el escenario de un mundo multipolar”, 5° Congreso Nacional del Consejo Mexicano de Ciencias Sociales; at: http://www.comecso.com.
Barnes, Harry (1953). Perpetual War for Perpetual Peace: A critical examination of the foreign policy of Franklin Delano Roosevelt and its aftermath; at: http://vho.org.
Constitución de la República Bolivariana de Venezuela (1999); at: http://www.minci.gob.ve/wp-content/uploads/2011/04/CONSTITUCION.pdf
Decreto Ley N° 825 (2000); at: http://www.softwarelibre.gob.ve/images/stories/leyes/decreto825.pdf.
Elizalde, Rosa (2011). “De la Ciberguerra a la CiberDefensa active”; at: http://www.cubadebate.cu/opinion/2011/11/30/de-la-ciberguerra-a-la-ciberDefensa-activa/#.WFmJ69QeDA0.
Fernández Pereira, Menry (2013). Pensamiento Estratégico del Comandante Supremo Hugo Chávez: Bases de la Estrategia Nacional Bolivariana, Caracas, Ediciones del Centro de Estudios para la Seguridad, Desarrollo y Defensa Integral.
Finland’s Ministry of Defence (2008). Comprehensive Approach Trends, Challenges and Possibilities for Cooperation in Crisis Prevention and Management. Helsinky, Edited by Crisis Management Initiative (Building bridges for sustainable security).
Fitts, Richard E. (Ed.) (1980). The Strategy of Electromagnetic Conflict, Los Altos, Peninsula Publ.
Fojón Chamorro, Enrique (2013). “La NSA: en el nombre de Carter Clarke”; at: http://www.blog.rielcano.org/la-nsa-en-el-nombre-de-carter-clarke/.
Gershenfeld, Neil (2012). “How to Make Almost Anything: The Digital Fabrication Revolution”, Foreign Affairs, Vol. 91, No. 6, November–December, Washington, Council on Foreign Relations, pp. 43–57.
Herz, John (1950). “Idealist Internationalism and the Security Dilemma”, World Politics, Vol. 2, No. 2, January, pp. 157–180.
Holder, Luis (2014). La ideología en la conceptualización de la Seguridad de la Nación, Columnata de la Universidad Militar Bolivariana de Venezuela, No. 06, June, pp. 165–180.
Holder, Hemily; Jade-Jasmin Inkinen (2016). “Fab Lab and Open Source Design: How Fab Labs could contribute to change the education system paradigm in Flanders?”, Research project course at Howest University of Applied Sciences, Brugee, Belgium.
Joint Terminology for Cyberspace Operations (2016); at: http://www.nsci-va.org.
Kuhn, Thomas (1995). Estructura de las Revoluciones Científicas, Mexico, D.F., Fondo de Cultura Económica.
Lewis, James et al. (2008). Securing Cyberspace for the 44th Presidency: A Report of the CSIS Commission on Cybersecurity for the 44th Presidency; at: https://www.nitrd.gov/cybersecurity/documents/081208_securingcyberspace_44.pdf.
Ley Orgánica de Seguridad de la Nación (2002); at: http://www.menpet.gob.ve.
Maldonado Michelena, Víctor (1962). Las Naciones y su Defensa Integral, Caracas, Editorial Drusa.
Morgenthau, Hans (1963). La Lucha por el Poder y por la Paz, Buenos Aires, Editorial Sudamericana.
Observatorio de la Ciberseguridad en América Latina y el Caribe (2016). Informe Ciberseguridad 2016, Washington, D.C., Banco Interamericano de Desarrollo; at: https://publications.iadb.org/handle/11319/7449?locale-attribute=es&
Petras, James (2016). “La élite promueve la guerra mientras la opinión pública estadounidense se opone al militarismo”; at: http://www.portalalba.org/index.php/articulos/internacional-geopolitica/el-mundo-hoy/10971-la-elite-promueve-la-guerra-mientras-la-opinion-publica-estadounidense-se-opone-al-militarismo
Pignatari Silva, Leandro (2010). A Vitória do Realismo Defensivo na Nova Doutrina de Política Externa Russa; at: https://periodicos.ufsm.br/interacao/article/download/12702/8057.
Pividal, Francisco (2006). Bolívar: Pensamiento precursor del antiimperialismo, Caracas, Ediciones de la Presidencia de la República.
Raskin, Marcus (1976). “Democracy versus the National Security State”; at: https://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=3491&context=lcp
Strategic Plan for the National Initiative for Cybersecurity Education (2016); at: http://csrc.nist.gov.
The Comprehensive National Cybersecurity Initiative (2016); at: https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-034.pdf
Thiber (2016). “La Agencia de Seguridad Nacional (NSA), el espionaje y colaboración público-privada en EEUU”; at: http://www.realinstitutoelcano.org.
Ugarte, José Manuel (2008). “Los conceptos de defensa y seguridad en América Latina: sus peculiaridades respecto de los vigentes en otras regiones y las consecuencias políticas de tales peculiaridades”; at: http://lasa.international.pitt.edu.
VenCERT, Sistema Nacional de Gestión de Incidentes Telemáticos (2008); at: http://vencert.gob.ve/.
Waltz, Kenneth (1979). Theory of International Politics, Menlo Park, Addison-Wesley Publishing.
Zavarce, Carlos; Julio Cárdenas (2009). Tecnologías de Información, Caracas, Ediciones del Centro de Investigación y Desarrollo Aeroespacial.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Holder, L., Cárdenas, J. (2018). Strategic Concepts for Training in Integrated Defence of Peace and Security in Cyberspace. In: Oswald Spring, Ú., Serrano Oswald, S. (eds) Risks, Violence, Security and Peace in Latin America. The Anthropocene: Politik—Economics—Society—Science, vol 24. Springer, Cham. https://doi.org/10.1007/978-3-319-73808-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-73808-6_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73807-9
Online ISBN: 978-3-319-73808-6
eBook Packages: Earth and Environmental ScienceEarth and Environmental Science (R0)