Magazin Archive | INSS
go to header go to content go to footer go to search
INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
INSS
Tel Aviv University logo - beyond an external website, opens on a new page
  • Contact
  • עברית
  • Support Us
  • Research
    • Topics
      • Israel and the Global Powers
        • Israel-United States Relations
        • Glazer Israel-China Policy Center
        • Russia
        • Europe
      • Iran and the Shi'ite Axis
        • Iran
        • Lebanon and Hezbollah
        • Syria
        • Yemen and the Houthi Movement
        • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
        • Israeli-Palestinian Relations
        • Hamas and the Gaza Strip
        • Peace Agreements and Normalization in the Middle East
        • Saudi Arabia and the Gulf States
        • Turkey
        • Egypt
        • Jordan
      • Israel’s National Security Policy
        • Military and Strategic Affairs
        • Societal Resilience and the Israeli Society
        • Jewish-Arab Relations in Israel
        • Climate, Infrastructure and Energy
        • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
        • Data Analytics Center
        • Law and National Security
        • Advanced Technologies and National Security
        • Cognitive Warfare
        • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
      • Contemporary Antisemitism in the United States
      • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications
    • -
      • All Publications
      • INSS Insight
      • Policy Papers
      • Special Publication
      • Strategic Assessment
      • Technology Platform
      • Memoranda
      • Posts
      • Books
      • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Real-Time Tracker
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Newsletter
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
New
Search in site
  • Research
    • Topics
    • Israel and the Global Powers
    • Israel-United States Relations
    • Glazer Israel-China Policy Center
    • Russia
    • Europe
    • Iran and the Shi'ite Axis
    • Iran
    • Lebanon and Hezbollah
    • Syria
    • Yemen and the Houthi Movement
    • Iraq and the Iraqi Shiite Militias
    • Conflict to Agreements
    • Israeli-Palestinian Relations
    • Hamas and the Gaza Strip
    • Peace Agreements and Normalization in the Middle East
    • Saudi Arabia and the Gulf States
    • Turkey
    • Egypt
    • Jordan
    • Israel’s National Security Policy
    • Military and Strategic Affairs
    • Societal Resilience and the Israeli Society
    • Jewish-Arab Relations in Israel
    • Climate, Infrastructure and Energy
    • Terrorism and Low Intensity Conflict
    • Cross-Arena Research
    • Data Analytics Center
    • Law and National Security
    • Advanced Technologies and National Security
    • Cognitive Warfare
    • Economics and National Security
    • Projects
    • Preventing the Slide into a One-State Reality
    • Contemporary Antisemitism in the United States
    • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications
    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Posts
    • Books
    • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Real-Time Tracker
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Contact
  • עברית
  • Support Us
bool(false)

Home Magazin

Cyber, Intelligence, and Security

Volume 4

No. 1 | March 2020

The Secret War of Cyber Influence Operations and How to Identify Them

David Tayouri

Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020

Social media is an effective way of influencing human society and behavior and shaping public opinion. Cyber influence operation means using cyber tools and methods in order to manipulate public opinion. Today, many countries use cyberspace, and specifically social media, to manage cyber influence operations as part of holistic information warfare. Most of these operations are done covertly and, therefore, identifying them is challenging; moreover, it is not an easy task to differentiate between legitimate or malicious influence...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Iran’s Activity in Cyberspace: Identifying Patterns and Understanding the Strategy

Gabi Siboni, Léa Abramski, Gal Sapir

Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020

This essay presents the evolving Iranian cyber activities with the purpose of identifying patterns that presumably form the cyber strategy applied by the regime to external and internal threats. The paper initially describes Iranian cyber operations, based on information released by the Islamic Republic and reports published by cyber security firms. The work then follows with an analysis of Iranian cyber activities. The article draws the characteristics and dynamics of Iran’s cyber activities, both externally and internally,...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Iran
Read more

Ambiguous Approach— All Shades of Gray

Raša Lazovic

Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020

This essay aims to examine conflicts in the “gray zone.” The paper is divided into three sections. The first section describes the gray zone and defines the ambiguous approach that corresponds to it. It argues that measures short of war, coercive gradualism, and deliberate obscurity are the crucial ingredients of the ambiguous approach. The second part discusses the ambiguous approach as a dependent variable, identifying the lack of power and lack of legitimacy to use force as the key drivers for adopting the ambiguous approach....
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Cybersecurity and Information Security: Force Structure Modernizations in the Chinese People’s Liberation Army

Miranda Bass

Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020

Since 2012, the Chinese government under Chairman Xi Jinping has taken steps to assume the role of a global power, including a sweeping modernizing of its military, the People’s Liberation Army (PLA), in order to transform it into a force capable of projecting power. Notably, in 2015, the PLA formed the Strategic Support Force as a separate service, concentrating all of its satellite and network operations forces, including cyber operations forces, into a single, high-profile organization. This policy choice to reorganize the PLA...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Chinese investments in Sri Lanka: Implications for Israel

Shlomi Yass

Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020

This article addresses Chinese projects in Sri Lanka, some of which are within the Belt and Road Initiative, in order to draw insights to be applied to the Israeli sphere. Moreover, the article will try to answer whether, and to what extent, the Chinese Belt and Road Initiative “belongs to the world,” as is written on its official website,or whether this is an expression of the Chinese drive for influence that may lead to a new Chinese world order.1 The article presents the Belt and Road Initiative alongside arguments against it. It...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Criminal Law as a Tool for Dealing with Online Violence among Youth

Limor Ezioni

Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020

This article seeks to examine whether criminal law is equipped to deal with the phenomenon of online violence among youth. In many cases, criminal law is not the optimal way to deal with online violence; therefore, it should only be used as a last resort, while being particularly cautious, especially when violence is not the result of a “criminal” nature but rather is the nature of the internet, which leads normative minors to carry out prohibited acts. The preferred means is to deal a-priori with the phenomenon, namely, to focus on...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

National Cybersecurity Strategies in the Healthcare Industry of Israel and the Netherlands: A Comparative Overview

Stefan Weenk

Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020

The rapid pace of society’s technological innovations has created a set of transformative opportunities in the healthcare industry, notably elevating the quality of life while subsequently serving as a permeable arena for cybercriminals. The core function of healthcare is maintaining people’s well-being and, in some cases, it constitutes a meaningful portion of national economic output. Growing cybersecurity risks to the critical infrastructure sector pose a threat to national security, prompting government response. This study...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Cyber and Artificial Intelligence— Technological Trends and National Challenges

Liran Antebi, Gil Baram

Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020

Autonomous systems based on artificial intelligence are playing an increasingly meaningful role in everyday life in a variety of fields, including industry, medicine, the economy, and security. Because they are computerized, these systems are exposed to coding errors, which may lead to incorrect decision making and the execution of unwanted actions. In addition, they are vulnerable to cyber attacks that may harm or completely suspend their activity. This article examines the risks posed to autonomous systems as a component of the...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Cyber Colonization: The Dangerous Fusion of Artificial Intelligence and Authoritarian Regimes

Matthew Crosston

Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020

While generally the advancement and development of artificial intelligence (AI) infrastructures is lauded as having the potential to open up a brave new world of positive cyber capacity, there is a decidedly darker underbelly to this potential currently underway. States like China aggressively market the transfer of advanced AI technology around the globe, particularly to allies across the Middle East and North Africa, Sub-Saharan Africa, and Latin America. Far from just being about participating in the global economy or developing...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Volume 3

No. 1 | May 2019

European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research

David Siman-Tov, Mor Buskila

Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019

Attempts by countries to influence other countries constitute a security challenge and a threat to democracy. European countries have identified this challenge as a threat to national security and are dealing with it through government actions, civilian activity, and cooperation between countries, reflecting different approaches and proposed solutions to the problem. This article seeks to examine the various methods that the major European countries are using to cope with this challenge and to assess the differences between them by...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Europe, Russia
Read more

The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it

Pnina Shuker, Gabi Siboni

Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019

In recent years, foreign countries has increased their attempts to influence democratic processes in rival countries. The aim is to damage the electoral process via cyberattacks on computerized systems or to try and affect the outcomes. Examining the electoral process in Israel makes it possible to identify such attempts and propose ways of dealing with them. This article suggests the need to distinguish between foreign attempts to influence the elections and domestic ones, which are part of the democratic process, and outlines...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Cognitive Warfare
Read more

The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber

Stephen J. Cimbala

Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019

The fate of the Intermediate Nuclear Forces (INF) Treaty originally signed in 1987 between the United States and the Soviet Union now appears uncertain, since the United States has announced its intentions to withdraw from the agreement and Russia has stated it is prepared to respond accordingly. The significance of the withdrawal from the INF Treaty affects not only the immediate force sizes and structures but also the dynamics of nuclear deterrence in Europe and more broadly. Nowadays and in the future, the assessment of nuclear...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests

Sam Cohen

Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019

The Iranian government continues to develop and field an increasingly sophisticated range of cyber capabilities to support their strategic interests and to enable a variety of computer-based financial crime. These capabilities have directly and adversely impacted Israel, which has been the target of major cyberattacks either affiliated or directly orchestrated by the political leadership in Tehran. To assess this strategic threat, this article outlines the evolving objectives and characteristics of Iran’s cyber activity targeting...
Media type: Cyber, Intelligence, and Security | Topics: Iran
Read more

Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons?

Omree Wechsler

Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019

The many cases of the leakage of classified materials belonging to intelligence and defense agencies have led to claims that contract workers are the reason for these incidents, due to either their lack of loyalty or negligence. In addition, these leaks of classified information, including hacking programs and components, have raised the question of whether this internal threat is also the cause of the increased proliferation of sophisticated cyber weapons among players who do not have the ability to develop them. A prominent case...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Cognitive Warfare
Read more

The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West

Kobi Michael, Aaron Kornbluth

Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019

“Academization of intelligence” is defined as the academic research, conceptualization, and teaching about the world of intelligence. Its goal is to study the field of intelligence’s essence, activities, and influence on the national security of the state and its decision-making processes. Policymakers and political leaders have recognized the increasingly significant role of intelligence in shaping policy and decision-making processes. These developments and concerns accelerated the academization of intelligence and gave the field...
Media type: Cyber, Intelligence, and Security | Topics: Cognitive Warfare
Read more

Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War

Shmuel Even

Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019

This article examines the conduct of Israel’s military leadership prior to the outbreak of the Yom Kippur War from the perspective of risk management and by looking at recently disclosed documents. From an analysis of the events, it appears that the chief of staff, David Elazar, had a clear risk management approach. On October 5, 1973, a day before the war, he put the regular army on high alert and reinforced the front lines. He did this despite the assessment of the head of Military Intelligence that the likelihood of war was...
Media type: Cyber, Intelligence, and Security | Topics: Cognitive Warfare
Read more

National Cyber Security in Israel

Yigal Unna

Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019

Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more
No. 2 | October 2019

The Space Arms Race: Global Trends and State Interests

Zeev Shapira , Gil Baram

Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019

Today space is an arena with a significant impact on the security, military, economy, and daily routines of many countries around the world and has attracted many stakeholders. As a result, global interest in the development of weapons for use in space—a process known as the “space arms race”—has increased. The purpose of this article is to present the current approaches to the weaponization of space and the activities of the primary and secondary states in this arena, and to propose a new categorization based on their technological...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Sectoral Ability to Manage Cyber Risks in the Supply Chain

Gabi Siboni, Hadas Klein, Ziv Solomon

Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019

This article presents the cyber risks that originate in the supply chain and the challenges that they pose. It examines a number of global methodologies and standards for managing cyber risks in the supply chain and proposes a model for concentrated sectoral management of the challenge so that the process of checking and authorizing suppliers will be streamlined. The proposed model has been found to be feasible in terms of the investment and pooling of resources as well as in increasing the general security level of the various...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Technology and Intelligence: Changing Trends in the IDF’s Intelligence Process in the Post-Information Revolution Period

Jasmin Podmazo

Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019

This article addresses the changes that have occurred in the intelligence work of the Israel Defense Forces (IDF) in the period following the information revolution of the 1990s, and examines how technological developments during this period have improved the intelligence process and how they have affected intelligence surprises. The article describes the effect of technological developments on each stage of the classic “intelligence cycle”—collection, processing, analysis, and dissemination. It also provides a comparative analysis...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Cyber Influence Campaigns in the Dark Web

Lev Topor , Pnina Shuker

Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019

In recent years there has been a significant rise in the scope and intensity of information wars between the great powers and other forces in the international arena, and influence campaigns have become a legitimate tool in the hands of politicians, propagandists, and global powers. In this context, the professional literature has focused most on campaigns on social networks while it has almost ignored similar campaigns in the Dark Web where the current research tends to focus on criminal activity. The Dark Web was developed by the...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Social Change Through Computerized Accessibility of Legal Rules

Adv. Michal Tadjer, Michael Bar-Sinai, Mor Vilozni

Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019

This article presents a self-help software system that makes rights accessible through an on-line interview. The interview is based on a formal model of the relevant jurisprudence and does not require the involvement of a service representative, only a user who wants to understand his or her rights. In addition, the article provides a methodology for building models and interviews for similar social contexts and describes building a model for workers’ rights according to Israeli law, upon completing their employment. In addition to...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

The Use of Biometric Technologies—Normative and Legal Aspects

Limor Ezioni

Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019

The development of technology that can identify a variety of physical and emotional characteristics and specifically biometric technologies have reached a level of maturity and prevalence that they require an explicit legal and normative examination of all aspects of their use. The unbridled rush to develop these technologies in Israel and abroad has neglected to address the legal and ethical aspects. This article examines the development of biometric technologies and the ethical and legal aspects of their use. Israel has great...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Volume 2

No. 1 | May 2018

When Less is More: Cognition and the Outcome of Cyber Coercion

Miguel Alberto Gomez

Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018

The rise of offensive interstate cyber interactions continues to fan interest in the coercive potential of cyber operations. Advocates of this revolutionary view insist that it signifies a shift in the balance of interstate relations; yet empirical evidence from past cases challenges these beliefs as actions often result in continued resistance rather than compliance. Regardless of its performance, the coercive potential of cyber operations cannot be readily dismissed. Consequently, the paper advances that the outcome of coercive...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Developing Organizational Capabilities to Manage Cyber Crises

Gabi Siboni, Hadas Klein

Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018

The increasing number and complexity of cybersecurity incidents have led many organizations to develop procedures and capabilities to manage them. These include real-time response capabilities, technological capabilities, and the formation of teams charged with maintaining organizational information systems. These efforts are liable to be insufficient, however, because they sometimes fail to consider managerial aspects and the skills and tools required of the technological teams to manage crises while trying to confront a cyber...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Turkey—Challenges to the Struggle against Cyber Threats

Ofir Eitan

Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018

Turkey is one of the most technologically, economically, and institutionally developed countries in the Middle East. At the same time, it is one of the countries most exposed to cyber threats. The Turkish government has taken steps in recent years to narrow the existing gaps in defense against cyber threats, but its efforts in this area have not yet produced the desired results. This article analyzes Turkey’s national cyber defense deployment and cites a number of structural challenges resulting from long-standing Turkish policy. The...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Economics and National Security, Turkey
Read more

Germany’s Cyber Strategy—Government and Military Preparations for Facing Cyber Threats

Omree Wechsler

Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018

Germany is a leading member of the European Union and one of the world’s strongest economies. Consequently, it is a central target for cyberattacks from states, terror organizations, and criminal groups. Dealing with the threat to German democracy posed by campaigns to disseminate false information—plus the cyber threat posed by Russia—has led to changes in the German security concept, causing the German government to seek to increase its cyber independence and to establish offensive capabilities in this space. Understanding how...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Europe
Read more

The Cybersphere Obligates and Facilitates a Revolution in Intelligence Affairs

David Siman-Tov, Noam Alon

Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018

History is replete with examples of world powers, countries, and militaries that failed to identify the revolutionary potential of a new technology and, as a result, lost their advantage and relevance. This article addresses the gap between the essential technological changes that the cybersphere has created and facilitates and the outmoded functioning of intelligence organizations, which have remained rooted in the approaches, architecture, and tenets of the intelligence cycle paradigm that emerged between the two world wars. This...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Developing a Doctrine for Cyberwarfare in the Conventional Campaign

Ron Tira

Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018

The cyber realm is in the midst of evolving into another branch of state warfare, similar to ground, naval, air, and space warfare. As such, it is bound to give rise to a concise and mature operational doctrine that will adopt general military patterns and rationales and will be synergistically integrated with other lines of operation in the conventional campaign. Although several cyber superpowers have already developed suitable doctrines and capabilities, most of the world’s states are still focused on cybersecurity rather than on...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Israel-United States Relations
Read more

Cyber Intelligence: In Pursuit of a Better Understanding for an Emerging Practice

Matteo E. Bonfanti

Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018

Similar to other cyber-related notions, there is not any crystallized definition of “cyber intelligence,” nor are there enough studies focusing on how it is crafted. In light of the above, the present paper draws a clearer picture of this emerging practice by taking stock of the existing analytical work on the topic. The paper reviews the available scientific literature addressing cyber intelligence, discusses the notion of cyber INT, and examines how this intelligence is crafted through the lens of the (cyber) “intelligence cycle.”...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more
No. 2 | September 2018

The Cognitive Campaign: The Second Lebanon War as a Case Study

Pnina Shuker

Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018

The aim of this article is to examine the way that leaders try to shape their society’s cognitive perceptions during war, with the assumption that society will not agree to unconditionally support a protracted war involving high casualties. Recognizing the necessity of large-scale public support of war, decision makers manipulate local public opinion so that it will justify the war and recognize the importance of the war’s objectives and the ostensible achievements that war could provide. This article demonstrates how this was...
Media type: Cyber, Intelligence, and Security | Topics: Cognitive Warfare, Data Analytics Center, Military and Strategic Affairs, Societal Resilience and the Israeli Society
Read more

Guidelines for the Management of Cyber Risks

Gabi Siboni, Hadas Klein

Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018

Cyber risk management is crucial to improving the level of organizational defense and preparedness for cyber events. This process is an important component in an organization’s operational risk management and in its overall risk management. Organizations in several sectors within Israeli society are obligated to a process of managing cyber risks in accordance with the instructions of the regulator. The aim of this article is to examine the method of risk management, to propose guidelines for the management of cyber risks, and...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Securing Critical Supply Chains: Strategic Opportunities for the Cyber Product International Certification (CPICTm) Initiative

Paul Stockton

Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018

China, Russia, and other potential adversaries are increasing their efforts to corrupt the supply chains upon which the electric grid and other infrastructure sectors depend. Valuable initiatives are underway to strengthen supply chain risk management (SCRM). Yet, despite these measures, the US intelligence community warns that the growing scale and sophistication of attacks on the supply chain “are placing entire segments of our government and economy at risk.” Similar challenges confront Israel, the United Kingdom, and other US...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Climate, Infrastructure and Energy
Read more

Nuclear Crisis Management and Deterrence: Stalked by Cyberwar?

Stephen J. Cimbala

Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018

Cyberwar, preceding or during nuclear crises, can marginally or even fatally Strain the requirements of nuclear deterrence stability and is capable of disrupting the communications between governments in times of crisis or confusing their assessments of ongoing events. This discussion considers the requirements for successful nuclear crisis management, the possible vulnerabilities induced by cyberwar, and the scenarios in which opportunistic failure is possible.
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Broad Economic Warfare in the Cyber Era

Shmuel Even

Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018

Broad economic warfare encompasses a host of actions aimed at damaging or threatening to damage the economy of an enemy or rival, with the aim of pressuring or weakening it in order to achieve strategic aims. Broad economic warfare encompasses standard economic warfare (such as sanctions), kinetic warfare, and cyber warfare against an enemy’s economy. The cyber era has changed the realm of broad economic warfare. From an offensive perspective, cyber capabilities make it possible to damage the enemy economy both during wartime and...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Economics and National Security, Iran
Read more

How a Comparative View and Mutual Study of National Strategic Intelligence and Competitive Intelligence Can Benefit Each Other

Avner Barnea

Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018

National strategic intelligence and competitive intelligence seem to be two different disciplines. Research has focused on the two fields—national strategic intelligence and competitive intelligence—separately, without any attempt to apply lessons and relevant explanations from one field to the other. Looking deeply into these two fields reveals, however, that they have a lot in common. As the methodology of intelligence in both governments and in business has hit a glass ceiling, based on the gaps between expectation to execution in...
Media type: Cyber, Intelligence, and Security
Read more
No. 3 | December 2018

Identity Theft and Exposure to Harmful Content- Internet Risks for Teenagers

Limor Ezioni

Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018

Children and teenagers are part of a weak and vulnerable population group. Their internet activity exposes them to two substantial risks: exposure to harmful content and identity theft and its use for slander and bullying. This article examines the characteristics and scope of the problem. It proposes ways of minimizing the damage that these risks pose to children and teenagers, while dealing with the existing privacy restrictions.
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Ubiquitous Presence: Protecting Privacy and Forbidding Intrusion into a Person’s Records in Jewish Law

Aviad Hacohen, Gabi Siboni

Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018

The development of internet use raises serious questions about a person’s right to privacy and the duty of companies to safeguard the confidentiality of information they possess. In practice, too many events have occurred in which confidential information leaks out of the companies responsible for safeguarding it; such information is sometimes even sold to criminals. In the face of these abuses, the western legal system and regulatory agencies have been forced to deal extensively with this seemingly new issue in recent years. Yet, we...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Law and National Security, Military and Strategic Affairs
Read more

Cyberspace: The Next Arena for the Saudi-Iranian Conflict?

Ron Deutch, Yoel Guzansky

Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018

The combination of structural vagueness embodied in large cyber operations and their potential to cause real damage makes cyberspace the ideal field of action for Saudi Arabia and Iran and matches their strategic outlook and their concept of the use of force. The risk and the opportunity that cyberspace offers to each of these countries make it tempting, particularly when it concerns the long-term investment of resources. Cyberspace can therefore be expected to become another central arena of conflict between Saudi Arabia and Iran,...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Saudi Arabia and the Gulf States, Iran, Syria
Read more

Jihadi Johns: Virtual Democracy and Countering Violent Extremism Propaganda

Matthew Crosston

Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018

A growing body of literature documents how Islamic extremist groups utilize technology to recruit potential new extremists. This back-end analysis is not matched, however, by the equally important frontend part of the process: How and why do these virtual propaganda/recruiting tools work on populations living in Western societies? Why are people susceptible to extremism while living in stable, free democracies? This paper fuses elements of cognitive psychology) specifically Siboni’s concept of the “first cognitive war”) and virtual...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Islamic State, Terrorism and Low Intensity Conflict
Read more

The European Union’s Foreign Policy Toolbox in International Cyber Diplomacy

Annegret Bendiek

Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018

In September 2017, the European Union (EU) updated its 2013 Cyber Security Strategy. The new version is intended to improve the protection of Europe’s critical infrastructure and boost the EU’s digital self-assertiveness toward other regions of the world. To prevent conflicts from spiraling out of control in cyberspace, the EU agreed on a so-called Cyber Diplomacy Toolbox in October 2017, which sets out possible countermeasures in case of an external cyberattack and raises the costs for perpetrators. The framework encompasses the...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Europe
Read more

Global Changes in the Proliferation of Armed UAVs: Risks, Challenges, and Opportunities Facing Israel

Liran Antebi

Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018

For a number of decades, Israel has been among the leaders in the manufacture, export, and operation of unmanned aerial vehicles (UAVs). This position has given Israel a security advantage and has affected its relations with various countries. In recent years, significant changes have occurred in this sphere, as new manufacturers and exporters, such as China, Iran, and Russia, have appeared, while the United States has changed its export policy. Growing use is being made of civilian technologies and tools, such as drones converted to...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Operations in Cyberspace from the Perspective of International Law

Yael Ronen

Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018

International law is applicable to cyberspace. There is international consensus that the UN Charter, which prohibits the use of force, applies to cyberspace. There is, nonetheless, some disagreement on what would constitute an armed attack in cyberspace, and consequently, what response would be permitted. Actions that do not amount to attack may still be prohibited by international law, for example if they constitute interference in the domestic affairs of states.
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Law and National Security
Read more

Cyberspace and the Israel Defense Forces

Gadi Eisenkot

Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018

Over the past decade, the Israel Defense Forces (IDF) has made the greatest strides in the field of cyberspace. During this period, cyberspace became a pertinent issue and in the IDF it became an extensive field of activity of developing and applying knowledge. The IDF perceives cyberspace and cyber regulation as significant for several reasons: First, they relate to the public discourse on knowledge development and the regulation of relations between the state and the economic system on the issue of national cyberspace and its...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Military and Strategic Affairs
Read more

Volume 1

No. 1 | January 2017

Jointness in Intelligence Organizations: Theory Put into Practice

Kobi Michael, David Siman-Tov, Oren Yoeli

Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017

This essay focuses on jointness in intelligence. New ways of thinking over the past years have led to the breakdown of the compartmentalizing of intelligence organizations and have given rise to models of jointness within intelligence organizations, military forces, and civilian entities so that they can carry out complex missions. This essay surveys the theoretical and practical development of the concept of jointness and presents four archetypes of jointness, based on several Israeli and American case histories.
Media type: Cyber, Intelligence, and Security | Topics: Israel-United States Relations
Read more

The United States’ Cyber Warfare History: Implications on Modern Cyber Operational Structures and Policymaking

Omry Haizler

Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017

This article will touch upon two main components of the United States’ cybersphere and cyber warfare. First, it will review three cyber incidents during different time periods, as the US infrastructure, mechanisms, and policies were gradually evolving. It will analyze the conceptual, operational, and legislative evolution that led to the current decision-making paradigm and institutional structure of the US cybersphere. Secondly, the paper will examine the procedures and policies of the Intelligence Community (IC), and the US cyber...
Media type: Cyber, Intelligence, and Security | Topics: Israel-United States Relations
Read more

Lessons Learned from the “Viral Caliphate”: Viral Effect as a New PSYOPS Tool?

Miron Lakomy

Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017

This paper aims to analyze still unnoticed aspects of the so-called Islamic State’s cyber jihadist campaign in order to indicate its potential utility for state-sponsored information warfare. To begin with, it tends to present the most important features of the “Islamic Caliphate’s” online campaign, which aims to generate the “viral effect”. Moreover, the paper attempts to provide an overview of earlier military conflicts, in which the viral effect could be noticed. And finally, based on these considerations, it answers the question...
Media type: Cyber, Intelligence, and Security | Topics: Islamic State
Read more

An Intelligence Civil War: “HUMINT’” vs. “TECHINT”

Matthew Crosston, Frank Valli

Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017

Since 9/11, intelligence has evolved within a changing atmosphere of modern tactics and techniques for information collection. This atmosphere, coupled with massive leaps in technological advancement such as social media, mobile communications, processing analytics, large-form solid-state data storage, novel computational hardware, and software equipment, has thrust intelligence communities around the world into a strange new world of multi-dimensional intelligence. While science and technology and human capability both remain...
Media type: Cyber, Intelligence, and Security
Read more

Israeli Cyberspace Regulation: A Conceptual Framework, Inherent Challenges, and Normative Recommendations

Gabi Siboni, Ido Sivan Sevilla

Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017

The cybersecurity challenge cuts across fields, sectors, and approaches. This essay presents the fundamentals of the problem, embraces a risk-based approach that perceives the state as society’s risk manager, and overviews the development of regulatory processes in modern societies. The essay then compares how the United States, European Union, and Israel have chosen to confront the cybersecurity challenge and stresses the importance and difficulties of imposing cybersecurity regulation on the civil sector. Finally, the essay...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Artificial Intelligence in Cybersecurity

Nadine Wirkuttis, Hadas Klein

Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017

Cybersecurity arguably is the discipline that could benefit most from the introduction of artificial intelligence (AI). Where conventional security systems might be slow and insufficient, artificial intelligence techniques can improve their overall security performance and provide better protection from an increasing number of sophisticated cyber threats. Beside the great opportunities attributed to AI within cybersecurity, its use has justified risks and concerns. To further increase the maturity of cybersecurity, a holistic view of...
Media type: Cyber, Intelligence, and Security
Read more

Pedal to the Metal? The Race to Develop Secure Autonomous Cars

Andrew Tabas

Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017

The advent of Autonomous Vehicles (AVs) will have profound effects on car owner- ship, transportation, and security. It is already possible to hack into individual cars through their entertainment and navigation systems. The connecting of AVs to networks will make it possible to hack them on a large scale. Policymakers should act now to implement both technical and legal security mechanisms. Potential solu- tions include the establishment of a system of certificates, an effort to establish an air gap between different computer...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Climate, Infrastructure and Energy
Read more
No. 2 | June 2017

Imposing and Evading Cyber Borders: The Sovereignty Dilemma

Alessandro Guarino, Emilio Iasiello

Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017

The world’s perception of cyberspace has evolved from the libertarian promises of the 1990s to the current situation, where nation-states seek to reestablish their sovereignty. This paper explores the history of our conceptions of cyberspace, from the enthusiastic utopias culminating in the so-called “declaration of independence of cyberspace” to the technological underpinnings and the legislative steps being taken by today’s governments to assert more control. It will address efforts in the West and East to resolve diverse,...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Israel-China Policy Center - The Diane and Guilford Glazer Foundation
Read more

Four Big “Ds” and a Little “r”: A New Model for Cyber Defense

Matthew Cohen, Chuck Freilich, Gabi Siboni

Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017

As with all emerging threats, the cyber realm represents new dangers, which will be difficult to address. This article argues that cyberthreats are not fundamentally different from other asymmetric threats, and it provides a conceptual model for developing a response by drawing on classic principles of military strategy, the “four Ds”— Detection, Deterrence, Defense, and Defeat—as well as resilience (the little “r”). We offer a model for how countries can create policies addressing each of these principles that will enhance the...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Proportional Response to Cyberattacks

Jarno Limnéll

Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017

Analysis in recent years demonstrates that government responses to cyberattacks vary widely. Although there has been significant political pressure to “do something,” past experiences illustrate that most policy responses are ad hoc. This indicates that 1) response to cyberattacks is still an exceedingly untested phenomenon; 2) cyber domain is a relatively new arena of conflict—especially for the policymakers—and, therefore, special attention should be directed towards it; and 3) more research is needed to understand how...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Human Terrain and Cultural Intelligence in the Test of American and Israeli Theaters of Confrontation

Kobi Michael, Omer Dostri

Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017

This article describes and defines the concept of “human terrain” that developed in the American military following its experiences in Afghanistan and Iraq and elaborates on the reasons that led to its development. It focuses on the theoretical foundations and on the correlations between human terrain, cultural intelligence, and intercultural competence, all against the backdrop of the American and Israeli experiences in different theaters of confrontation. Acquiring an in-depth understanding of the local culture is an essential...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Military and Strategic Affairs
Read more

A Cooperative Approach between Intelligence and Policymakers at the National Level: Does it Have a Chance?

David Siman-Tov, Shay Hershkovitz

Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017

The proximity of relations between intelligence officers and policymakers and the balance between the aspirations of the intelligence officers to influence the decision-making process and their primary professional duty to ather accurate intelligence is an ongoing argument within the intelligence discourse. Other discussions focus on whether the primary professional duty of the intelligence officer is merely to create intelligence or also to actively shape policy, and whether strategic intelligence is a product of research groups in...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Comparative Assessment of Indian and Israeli Military Strategy in Countering Terrorism

Vinay Kaura

Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017

Prime Minister Narendra Modi of India recently compared his country’s cross-border response against terrorists in Pakistan— following the attack in Uri in Indian-administered Kashmir—to Israel’s pre-emptive and retaliatory raids across its borders. This has given rise to serious debate about whether it is desirable for India to adopt Israeli military strategy. A country’s history, political culture, and dominant discourse of national security greatly influence policymakers and their communities. With that in mind, in this article, it...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Israeli-Palestinian Relations, Military and Strategic Affairs
Read more

Framing the Cyberthreat through the Terror-Ballistics Analogy

David Sternberg

Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017

Cyberthreats are a new and developing, complex phenomenon. A central way for decision makers to cope with this difficulty is through analogies as simplifying psychological constructs. One analogy that could be used is terrorism and specifically the terrorballistics experience in Israel. Building on this analogy, three main takeaways are suggested. The first takeaway is that key assumptions on the cybersecurity future should be revisited. The second one is the possibility of adapting the “six Ds” counterterror framework— Defense,...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Terrorism and Low Intensity Conflict
Read more
No.3 | December 2017

Cybersecurity and Economic Espionage: The Case of Chinese Investments in the Middle East

Sharon Magen

Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017

The utilization of emerging technologies for purposes of cyber espionage is the cornerstone of this paper. Although many have referred to cyber security risks that are directly connected to the security sphere, national security threats due to economic cyber espionage have not been dealt with to the same extent, and this oversight is rather puzzling. As cyberspace becomes increasingly utilized for espionage purposes, it is imperative to further examine the possibility of exploiting cyberspace for the purpose of espionage specifically...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Economics and National Security
Read more

The British Response to Threats in Cyberspace

Daniel Cohen

Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017

The cyber threat ranks high among the risks to a country’s interests and national security. In recent years, this threat has already materialized in cyberattacks on political institutions, political parties, organizations, financial institutions, and critical national infrastructure around the world. In the future, additional risks are expected, particularly to the civilian sector, originating in the Internet of Things. These risks are the result of the growing number of connected devices, most of which are neither secured by the...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Economics and National Security, Europe
Read more

Campaign in Cyber or Cyber in the Campaign

Avner Simchoni

Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017

The field of cyber has acquired increasing legitimacy as an arena of action, as the international system becomes accustomed to its various uses for a range of needs. Israel sees cyber as a vital component of its national security, requiring investment and nurturing. From a historical point of view, the success of security and intelligence campaigns derives from smartly integrating new fields into the existing fabric—means, methods, and concepts— while implementing the necessary changes and adjustments. With the rapid introduction of...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Military and Strategic Affairs
Read more

Cyber Threats to Democratic Processes

David Siman-Tov, Gabi Siboni, Gabrielle Arelle

Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017

The Russian interference in the presidential elections in the United States and in France raises questions about the need and ability of democratic countries to protect their election processes. This article indicates the importance of relating to elections in a democratic country as both critical infrastructure and as a critical process, and it presents the threats to elections posed by both cyber and cultural developments. This article addresses the reality in which the extensive use of social networks and direct communications...
Media type: Cyber, Intelligence, and Security | Topics: Cognitive Warfare, Data Analytics Center, Military and Strategic Affairs, Societal Resilience and the Israeli Society
Read more

“The Missing Effort:” Integrating the “Non-lethal” Dimension in the Israeli Military Lines of Operation

David Siman-Tov, David Sternberg

Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017

This essay examines the idea of “Non-lethal warfare” and how it can and should be integrated in the framework of the IDF’s military campaigns. It addresses the organizational, conceptual, and cultural barriers obstructing such a policy, and the changes required in the IDF’s operating principles: establishing the guidelines; changing the concept of time in a military operational design; shifting from a structure of covert to overt campaigns that are connected to the civilian environment; and devising a supportive intelligence and...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security, Cognitive Warfare, Law and National Security
Read more

Not Merely a Technological Advantage: The United States’ Organizational Change in Cyber Warfare

Amit Sheniak

Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017

The cyber arms race is part of the state security reality in our times, resulting in a sharp increase in the allocation of resources for the technological development of new defensive and offensive cyber capabilities. This article stresses that a different policy should be taken, arguing that due to the unique characteristics of the cyber dimension and the declining level of technological sophistication needed for offensive and defensive cyber capabilities, a security advantage in this field will results from a creative advancement...
Media type: Cyber, Intelligence, and Security
Read more

The Vulnerable Architecture of Unmanned Aerial Systems: Mapping and Mitigating Cyberattack Threats

Gabriel Boulianne Gobeil, Liran Antebi

Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017

Unmanned aerial vehicles (UAVs), frequently referred to as drones, have become an essential and dominant tool of advanced military forces, especially those engaged in counterinsurgency, where they are used mostly for intelligence, surveillance, and reconnaissance (ISR) missions as well as for different kinds of operations involving targeted strikes. As the usage of unmanned systems for military purposes increases, so does their vulnerability to cyberattacks, the result of their growing dependence on computer-based systems. The...
Media type: Cyber, Intelligence, and Security | Topics: Advanced Technologies and National Security
Read more

Sorry, no posts match your search,
You can search for others ....

Events

All events
The 18th Annual International Conference
25 February, 2025
08:15 - 16:00

Stay up to date

Registration was successful! Thanks.
  • Research

    • Topics
      • Israel and the Global Powers
      • Israel-United States Relations
      • Glazer Israel-China Policy Center
      • Russia
      • Europe
      • Iran and the Shi'ite Axis
      • Iran
      • Lebanon and Hezbollah
      • Syria
      • Yemen and the Houthi Movement
      • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
      • Israeli-Palestinian Relations
      • Hamas and the Gaza Strip
      • Peace Agreements and Normalization in the Middle East
      • Saudi Arabia and the Gulf States
      • Turkey
      • Egypt
      • Jordan
      • Israel’s National Security Policy
      • Military and Strategic Affairs
      • Societal Resilience and the Israeli Society
      • Jewish-Arab Relations in Israel
      • Climate, Infrastructure and Energy
      • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
      • Data Analytics Center
      • Law and National Security
      • Advanced Technologies and National Security
      • Cognitive Warfare
      • Economics and National Secutiry
    • Projects
      • Preventing the Slide into a One-State Reality
      • Contemporary Antisemitism in the United States
      • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications

    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Database
    • Posts
    • Books
    • Archive
  • About

    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Support
  • Media

    • Communications
    • Video Gallery
    • Press Release
    • Podcast
  • Home

  • Events

  • Database

  • Team

  • Contact

  • Newsletter

  • עברית

INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
40 Haim Levanon St. Tel Aviv, 6997556 Israel | Tel: 03-640-0400 | Fax: 03-744-7590 | Email: info@inss.org.il
Developed by Daat A Realcommerce company.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.