Cyberspace and National Security

Total Page:16

File Type:pdf, Size:1020Kb

Cyberspace and National Security Cyberspace and National Security Selected Articles III Edited by Gabi Siboni המכון למחקרי ביטחון לאומי THE INSTITUTE FOR NATIONAL SECURITYc STUDIES INCORPORATING THE JAFFEE b d CENTER FOR STRATEGIC STUDIES Cyberspace and National Security Selected Articles III Edited by Gabi Siboni THE INSTITUTE FOR NATIONAL SECURcITY STUDIES INCORPORATING THE JAFFEE b d CENTER FOR STRATEGIC STUDIES Institute for National Security Studies THE INSTITUTE FOR NATIONAL SECURcITY STUDIES INCORPORATING THE JAFFEE b d CENTER FOR STRATEGIC STUDIES Graphic design: Michal Semo-Kovetz The Institute for National Security Studies (INSS), incorporating Printing: Elinir the Jaffee Center for Strategic Studies, was founded in 2006. The purpose of the Institute for National Security Studies Institute for National Security Studies is first, to conduct basic research that meets the highest (a public benefit company) academic standards on matters related to Israel’s national 40 Haim Levanon Street security as well as Middle East regional and international POB 39950 security affairs. Second, the Institute aims to contribute to Ramat Aviv the public debate and governmental deliberation of issues Tel Aviv 6997556 that are – or should be – at the top of Israel’s national security agenda. Tel. +972-3-640-0400 INSS seeks to address Israeli decision makers and Fax. +972-3-744-7590 policymakers, the defense establishment, public opinion makers, the academic community in Israel and abroad, and E-mail: [email protected] the general public. http://www.inss.org.il INSS publishes research that it deems worthy of public attention, while it maintains a strict policy of non-partisanship. © All rights reserved. The opinions expressed in this publication are the authors’ April 2015 alone, and do not necessarily reflect the views of the Institute, its trustees, boards, research staff, or the organization and ISBN: 978-965-7425-76-3 individuals that support its research. Contents Foreword | 5 The Islamic State’s Strategy in Cyberspace | 7 Gabi Siboni, Daniel Cohen, Tal Koren Commercial and Industrial Cyber Espionage in Israel | 25 Shahar Argaman and Gabi Siboni A Multidisciplinary Analysis of Cyber Information Sharing | 41 Aviram Zrahia Developments in Iranian Cyber Warfare 2013-2014 | 61 Gabi Siboni and Sami Kronenfeld Are Cyber Weapons Effective Military Tools? |83 Emilio Iasiello The Effect of Cyberwar Technologies on Force Buildup: The Israeli Case | 101 Gil Baram Cyber Weapons and International Stability: New Destabilization Threats Require New Security Doctrines | 123 Guy-Philippe Goldstein Cyber Defense from “Reduction in Asymmetrical Information” Strategies | 143 Guy-Philippe Goldstein Foreword Israel’s rapid development as a leader in cyberspace places it in a unique position to advance cyberspace research in Israel in general and at the Institute for National Security Studies in particular. In order to expand research and the scope of cyberspace activity, and given the fact that cyberspace does not recognize national or institutional boundaries and borders, we at the INSS have decided to extend the program and hold the annual cyberspace security conference in the United States. The Defensive Cyberspace Operations & Intelligence (DCOI) conference highlights core issues of security and defense in cyberspace and its related intelligence aspects. The conference, held this year in Washington D.C., is the product of collaboration between several institutions in Israel, the United States, and other countries. The conference’s focus on defensive operations and intelligence allows the INSS to showcase its own activity in this field and complement the range of operations carried out in Israel and around the world. The objectives of this year’s conference are manifold: developing the discourse of defense in cyberspace, the corporate and financial fields as well as in the field of critical infrastructures; enhancing cooperation among government bodies and institutions working in the field of cyberspace in Israel and the United States; exposing the Israeli cyberspace and technology market to foreign technological companies seeking to develop business with Israel and/or seeking to expose Israeli capabilities and technologies abroad; enhancing international cyberspace cooperation with friendly nations, etc. As is our custom every year, we offer those interested in cyberspace this unique publication, which brings together some of the products of cyberspace research and essays published by the INSS Cyber Security Program. The essays in this journal have been published in Military and Strategic Affairs and represent the efforts of INSS researchers and outside researchers working in tandem with its cyberspace program. Gabi Siboni Editor 5 The Islamic State’s Strategy in Cyberspace Gabi Siboni, Daniel Cohen, Tal Koren The success of the Islamic State (henceforth: ISIS) includes the integration of interrelated elements in a way that helps the organization consolidate its control of extensive regions, serve as the current spearhead in the global Jihad effort, and threaten the world with terrorist attacks carried out by its agents holding citizenship in a Western country. These agents are liable to return to their homeland and along with “lone wolves” they are liable to carry out terrorist attacks against targets in the West. The aim of this article is to examine ISIS’s model, as it is an organization that has successfully conquered many geographic areas while attracting public attention on an unprecedented global scale. The article will attempt to assess the organization’s unique strategy, which combines two key interrelated elements: extensive use of the social media on the one hand and extreme and savage cruelty on the other. Keywords: Islamic state, ISIS, social media, Iraq, Syria, terrorism Introduction In May 2004, an Islamic website published a video clip showing the execution of Nick Berg, a U.S. citizen, in Baghdad. The clip showed Berg in an orange prisoner’s uniform (the same worn by prisoners at Guantanamo Prison), beheaded by Abu Musab al-Zarqawi, the leader of al-Qaeda in Iraq. Ten years later, this video assumed horrifying historical significance with the publication of a video clip showing the beheading of American James Foley by agents of ISIS, carrying on the actions of Abu Musab al-Zarqawi. Dr. Gabi Siboni is a senior research fellow and the head of the INSS Cyber Security Program. Dr. Tal Korn is a research fellow in the Cyber Security Program. Daniel Cohen is a Research Fellow and coordinator of the Cyber Security Program. This article was first published in Military and Strategic Affairs 7, no. 1 (2015). 7 GABI SIBONI, DANIEL COHEN, TAL KOREN | THE ISLAMIC State’S STRategY IN CYBERspace The main difference between the two video clips is that the man who beheaded Foley spoke fluent English, and the professionally edited clip was spread virally throughout the entire world. Viewers in Western countries experienced a feeling of horror at the sight of a prisoner being led to the slaughter, not only because the victim seemed like their next-door neighbor, but because the slaughterer also represented the image of a neighbor. ISIS uses the global village of the information era, in which the boundaries between reality and imagination have been blurred using technological means available to everyone, in its call to its supporters in the West to make the hegira (immigration to the Islamic state) or join the jihad - “pack your suitcases or prepare explosive devices.” Psychological warfare in the service of terrorist organizations is not a new phenomenon. Carlos Marighella, one of the fathers of modern revolutionary terrorism, published The Mini-Manual of the Urban Guerilla in the 1960s, in which he referred to a war of “nerves” and psychological warfare. He asserted that governments will always be in a position of inferiority in combating psychological warfare used by a terrorist organization, as a result of the many resources used in counter efforts and censorship. According to Marighella, this investment is doomed to fail. In the digital and new media era, the challenges and threats have changed as a result of the new spheres in which a terrorist organization can operate to promote its political objectives. ISIS operates on a large scale in virtual space by using new media platforms that make censorship difficult. The position of inferiority in defending against this phenomenon is therefore significant, and requires observation and a solution to this threat that makes use of up-to-date tools. The wave of spontaneous terrorist attacks (“lone wolves”) in the U.S., Canada, Australia, Europe, and Israel highlights the emerging symbiotic connection between ISIS’s recruitment calls, propaganda, and terrorism against Western civilians and the various communications platforms made possible by virtual space. It incorporates terrorism executed by veterans who fought within ISIS ranks in Syria and Iraq and returned to the west, such as the murder of Israeli couple Mira and Emanuel Riva at the Jewish Museum in Brussels in May 2014 by Mehdi Nemmouche, a French citizen of Algerian origin who returned to Europe after fighting with jihad forces in Syria. These local unorganized terrorist actions, carried out “under the influence of ISIS” and inspired by it, include attacks by shooting 8 GABI SIBONI, DANIEL COHEN, TAL KOREN | THE ISLAMIC State’S STRategY IN CYBERspace and running over pedestrians in Canada, and attempted beheadings in Australia and the U.S. ISIS employs public relations, recruitment,
Recommended publications
  • Al Jazeera As Covered in the U.S. Embassy Cables Published by Wikileaks
    Al Jazeera As Covered in the U.S. Embassy Cables Published by Wikileaks Compiled by Maximilian C. Forte To accompany the article titled, “Al Jazeera and U.S. Foreign Policy: What WikiLeaks’ U.S. Embassy Cables Reveal about U.S. Pressure and Propaganda” 2011-09-21 ZERO ANTHROPOLOGY http://openanthropology.org Cable Viewer Viewing cable 04MANAMA1387, MINISTER OF INFORMATION DISCUSSES AL JAZEERA AND If you are new to these pages, please read an introduction on the structure of a cable as well as how to discuss them with others. See also the FAQs Reference ID Created Released Classification Origin 04MANAMA1387 2004-09-08 14:27 2011-08-30 01:44 CONFIDENTIAL Embassy Manama This record is a partial extract of the original cable. The full text of the original cable is not available. C O N F I D E N T I A L MANAMA 001387 SIPDIS STATE FOR NEA/ARP, NEA/PPD E.O. 12958: DECL: 09/07/2014 TAGS: PREL KPAO OIIP KMPI BA SUBJECT: MINISTER OF INFORMATION DISCUSSES AL JAZEERA AND IRAQ Classified By: Ambassador William T. Monroe for Reasons 1.4 (b) and (d) ¶1. (C) Al Jazeera Satellite Channel and Iraq dominated the conversation during the Ambassador's Sept. 6 introductory call on Minister of Information Nabeel bin Yaqoob Al Hamer. Currently released so far... The Minister said that he had directed Bahrain Satellite 251287 / 251,287 Television to stop airing the videotapes on abductions and kidnappings in Iraq during news broadcasts because airing Articles them serves no good purpose. He mentioned that the GOB had also spoken to Al Jazeera Satellite Channel and Al Arabiyya Brazil about not airing the hostage videotapes.
    [Show full text]
  • Re Joinder Submitted by the Republic of Uganda
    INTERNATIONAL COURT OF JUSTICE CASE CONCERNING ARMED ACTIVITIES ON THE TERRITORY OF THE CONGO DEMOCRATIC REPUBLIC OF THE CONGO v. UGANDA REJOINDER SUBMITTED BY THE REPUBLIC OF UGANDA VOLUME 1 6 DECEMBER 2002 TABLE OF CONTENTS Page INTRODUCTION .................................................................... 1 CHAPTER 1 : THE PERSISTENT ANOMALIES IN THE REPLY CONCERNING MATTERS OF PROCEDURE AND EVIDENCE ............................................... 10 A. The Continuing Confusion Relating To Liability (Merits) And Quantum (Compensation) ...................... 10 B. Uganda Reaffirms Her Position That The Court Lacks Coinpetence To Deal With The Events In Kisangani In June 2000 ................................................ 1 1 C. The Courl:'~Finding On The Third Counter-Claim ..... 13 D. The Alleged Admissions By Uganda ........................... 15 E. The Appropriate Standard Of Proof ............................. 15 CHAPTER II: REAFFIRMATION OF UGANDA'S NECESSITY TO ACT IN SELF- DEFENCE ................................................. 2 1 A. The DRC's Admissions Regarding The Threat To Uganda's Security Posed By The ADF ........................ 27 B. The DRC's Admissions Regarding The Threat To Uganda's Security Posed By Sudan ............................. 35 C. The DRC's Admissions Regarding Her Consent To The Presetnce Of Ugandan Troops In Congolese Territory To Address The Threats To Uganda's Security.. ......................................................................4 1 D. The DRC's Failure To Establish That Uganda Intervened
    [Show full text]
  • Trend Analysis the Israeli Unit 8200 an OSINT-Based Study CSS
    CSS CYBER DEFENSE PROJECT Trend Analysis The Israeli Unit 8200 An OSINT-based study Zürich, December 2019 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Trend analysis: The Israeli Unit 8200 – An OSINT-based study Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. Center for Security Studies (CSS), ETH Zürich. 1 Trend analysis: The Israeli Unit 8200 – An OSINT-based study . Table of Contents 1 Introduction 4 2 Historical Background 5 2.1 Pre-independence intelligence units 5 2.2 Post-independence unit: former capabilities, missions, mandate and techniques 5 2.3 The Yom Kippur War and its consequences 6 3 Operational Background 8 3.1 Unit mandate, activities and capabilities 8 3.2 Attributed and alleged operations 8 3.3 International efforts and cooperation 9 4 Organizational and Cultural Background 10 4.1 Organizational structure 10 Structure and sub-units 10 Infrastructure 11 4.2 Selection and training process 12 Attractiveness and motivation 12 Screening process 12 Selection process 13 Training process 13 Service, reserve and alumni 14 4.3 Internal culture 14 5 Discussion and Analysis 16 5.1 Strengths 16 5.2 Weaknesses 17 6 Conclusion and Recommendations 18 7 Glossary 20 8 Abbreviations 20 9 Bibliography 21 2 Trend analysis: The Israeli Unit 8200 – An OSINT-based study selection tests comprise a psychometric test, rigorous Executive Summary interviews, and an education/skills test.
    [Show full text]
  • Philanthropy Law Report
    QATAR Philanthropy Law Report International Center for Not-for-Profit Law 1126 16th Street, NW, Suite 400 Washington, DC 20036 (202) 452-8600 www.icnl.org Contents Introduction .................................................................................................................................... 1 Recent Developments ..................................................................................................................... 3 Relevant Laws ................................................................................................................................. 5 Constitutional Framework .............................................................................................................. 5 National Laws and Regulations Affecting Philanthropic Giving ...................................................... 5 Analysis ......................................................................................................................................... 10 Organizational Forms for Nonprofit Organizations ...................................................................... 10 Registration of Domestic Nonprofit Organizations ...................................................................... 11 Registration of Foreign Nonprofit Organizations ......................................................................... 16 Nonprofit Organization Activities ................................................................................................. 16 Termination, Dissolution, and Sanctions .....................................................................................
    [Show full text]
  • Improving Counterterrorism and Law Enforcement Cooperation Between the United States and the Arab Gulf States
    Improving Counterterrorism and Law Enforcement Cooperation between the United States and the Arab Gulf States Thomas Warrick and Joze Pelayo Scowcroft Middle East Security Initiative The Atlantic Council’s Scowcroft Middle East Security Initiative honors the legacy of Brent Scowcroft and his tireless efforts to build a new security architecture for the region. Our work in this area addresses the full range of security threats and challenges including the danger of interstate warfare, the role of terrorist groups and other nonstate actors, and the underlying security threats facing countries in the region. Through all of the Council’s Middle East programming, we work with allies and partners in Europe and the wider Middle East to protect US interests, build peace and security, and unlock the human potential of the region. You can read more about our programs at www.atlanticcouncil.org/ programs/middle-east-programs/. Task Force on Mideast Counterterrorism – Law Enforcement Cooperation ■ Javed Ali, Towsley Policymaker in Residence, Gerald R. Ford School of Public Policy, University of Michigan ■ Kirsten Fontenrose, Director, Scowcroft Middle East Security Initiative, Atlantic Council ■ Daniel L. Glaser, Principal, Financial Integrity Network ■ Bernard Hudson, Nonresident Fellow, Belfer Center for Science and International Affairs ■ Michael McGarrity, Vice President Global Risk Services, Global Guardian ■ Pamela G. Quanrud, Former Director, C-ISIL Coalition, US Department of State ■ Todd Rosenblum, Nonresident Senior Fellow, Scowcroft Center
    [Show full text]
  • Secrecy and Human Capital Management in US NSA and Israel Unit 8200
    LOOSE LIPS BUILD SHIPS? Secrecy and Human Capital Management in US NSA and Israel Unit 8200 A THESIS SUBMITTED TO THE INTERSCHOOL HONORS PROGRAM IN INTERNATIONAL SECURITY STUDIES CENTER FOR INTERNATIONAL SECURITY AND COOPERATION FREEMAN SPOGLI INSTITUTE FOR INTERNATIONAL STUDIES STANFORD UNIVERSITY By: Lisa Catherine Wallace June 2014 Advisors: Mariano-Florentino Cuéllar Colonel Joseph Felter Abstract ! How do intelligence organizations attract and make use of top talent? This paper approaches this question through a comparative case study of the labor ecosystems surrounding both the US’ National Security Agency and IDF’s signals intelligence branch, Unit 8200. As the cyber realm continues to assume a growing role in modern national security threat environments, intelligence organizations must grow and adapt to accommodate these new objectives. This inevitably involves the question of how to attract and make use of top talent in order to solve difficult and highly technical national security problems. Israel and the United States share similar national security interests, and both possess burgeoning and impressive high-technology clusters. This paper claims that a growing, public network of Unit 8200 and other Intelligence Corps alumni is extant in Israel’s high-technology sector. Furthermore, affiliation with Unit 8200 has a positive signaling and social capital value. By contrast, this paper argues that alumni from the NSA do not possess as strong of a signaling or social capital value in the US. This paper argues that the NSA is hindered by the ontology, secrecy, and culture of the organization itself, as well as US public understanding of national security organizations and cyber threats.
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • Location, Event&Q
    # from what/ where which how why who for MOBILE versi on click here when who who where when index source "location, event" "phys, pol, med, doc" detail physical detail political name "9/11 Truth Interactive Spreadsheet Click on dow n arrow to sort / filter, click again to undo." Top 100 / compilations entity entity detail country / state date Item .. right-click on li nk to open in new tab 1 "Francis, Stephen NFU" WTC physical Controlled demolition Explosive experts "Overwhelming evidence indicates that a combination of n uclear, thermitic and conventional explosives were used in a controlled demoliti on of the WTC on 9/11. Nanothermite contributed but does not have sufficient det onation velocity to pulverize the WTC into dust. Architects & Engineers for 9/11 Truth is leading gatekeeper trying to deflect Israel's role. See Cozen O'Connor 9/11 lawsuit." pic "9/11 Truth, anti-Zionists" Engineers / Scie ntists "U.S., Israel, SA, Britain" 2 "Francis, Stephen NFU" "WTC, Pentagon, PA" political False flag Cabal "The cabal: U.S., Britain, Saudi Arabia and Israel execu ted the 9/11 false flag attack in order to usher in a new 'war on terror' along with the Iraq and Afghanistan wars and fullfil the PNAC's 'Full Spectrum Dominan ce' of the Middle East and its resources ... all have roots that go back to Zion ist / Nazi Germany, the Cold War ... 9/11 was a planned step." lnk Intel ag encies "Cabal: US, UK, Israel & SA" Mossad / Sayeret Matkal "U.S., Israel, S A, Britain" 3 "Fox, Donald" WTC 1-2 physical "Mini Neutron, Fissionless Fusio n" Controlled demolition "VeteransToday: Fox, Kuehn, Prager, Vike n,Ward, Cimono & Fetzer on mini neutron bombs discuss all major WTC theories micr o nuke (neutron) most promising comparatively low blast effects, a quick blast o f radiation that doesn't linger, a series of shape charged mini-neutron bombs we re detonated from top to bottom to simulate a free fall collapse.
    [Show full text]
  • National Security Agency
    Coordinates: 39°6′32″N 76°46′17″W National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United National Security Agency States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its Seal of the National Security Agency mission, the majority of which are clandestine.[10] Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become the largest of the U.S. intelligence organizations in terms of Flag of the National Security Agency personnel and budget.[6][11] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[12] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[13][14] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a NSA Headquarters, Fort Meade, Maryland highly classified intelligence team) inserts eavesdropping devices in high value targets (such Agency overview as presidential palaces or embassies).
    [Show full text]
  • UK Eyes Alpha by the Same Author UK Eyes Alpha Big Boys' Rules: the SAS and the Secret Struggle Against the IRA Lnside British Lntelligence
    UK Eyes Alpha By the same author UK Eyes Alpha Big Boys' Rules: The SAS and the secret struggle against the IRA lnside British lntelligence Mark Urban tr firhrr anr/ fulrr' ft For Ruth and Edwin Contents lntroduction Part One The First published in I996 1 Coming Earthquake 3 and Faber Limited by Faber 2 A Dark and Curious Shadow 13 3 Queen Square London vcrN JAU 3 The Charm Offensive 26 Typeset by Faber and Faber Ltd Printed in England by Clays Ltd, St Ives plc 4 Most Ridiculed Service 42 All rights reserved 5 ZIRCON 56 O Mark Urban, 1996 6 Springtime for Sceptics 70 Mark Urbar-r is hereby identified as author of 7 A Brilliant Intelligence Operation 84 this work in accordance with Section 77 of the Copyright, Designs and Patents Act 1988 8 The \7all Comes Tumbling Down 101 A CIP rccord for this book is available from the Part Two British Library 9 Supergun LL7 tsnN o-57r-r7689-5 10 Black Death on the Nevsky Prospekt L29 ll Assault on Kuwait L43 12 Desert Shield 153 13 Desert Storm 165 14 Moscow Endgame LA2 Part Three l5 An Accidcnt of History L97 l(r Irrlo thc ll:rllirrn 2LO tt),)B / (,1,1 l, I Qulgrnirc 17 Time for Revenge 22L lntroduction 18 Intelligence, Power and Economic Hegemony 232 19 Very Huge Bills 245 How good is British intelligence? What kind of a return do ministers and officials get 20 The Axe Falls 2il for the hundreds of millions of pounds spent on espionage each year? How does this secret establishment find direction and purpose 2l Irish Intrigues 269 in an age when old certainties have evaporated? Very few people, even in Conclusion 286 Whitehall, would feel confident enough to answer these questions.
    [Show full text]
  • S Black Agents Bang-And-Burner 14 “Bang and Burn” Jobs Involve Sabotage, Usually Through Demolitions Or Arson
    night’'s black agents Bang-and-Burner 14 “Bang and burn” jobs involve sabotage, usually through demolitions or arson. This skill set translates with unnerving ease to EOD (explosive ordnance disposal) and arson investigation. Bang- and-burners set and disarm everything from booby traps to car bombs to ship- scuttling charges. Specific Examples: IRA or ETA bomb- builder, Albanian mafia arsonist, Polish Army combat engineer, Special Branch bomb disposal expert. INVESTIGATIVE ABILITIES: Architecture 2, Chemistry 2, Criminology 1, Intimidation 1 GENERAL ABILITIES: Conceal 4, Explosive Devices 8, Infiltration 2, Mechanics 4 Black Bagger A “black bag job” is FBI slang for a breaking-and-entry intrusion, usually intended to copy (or steal) documents or plant bugs or wiretaps. British spies often call break-in artists “box men,” a term originating in Victorian criminal slang. By any name, it’s burglary. Specific Examples: Cat burglar in Naples, Bulgarian NIS officer INVESTIGATIVE ABILITIES: on the Riviera, Bundespolizei handling “renditions” for the CIA. Bureaucracy 1, Forgery 4, museum security specialist, INVESTIGATIVE ABILITIES: Bureaucracy Photography 1 DGSE or Mossad covert entry 2, Cop Talk 1, Criminology Alternates: Cryptography specialist, NSA contractor. 2, Urban Survival 1 GENERAL ABILITIES: Cover 6, INVESTIGATIVE ABILITIES: Data Alternates: Chemistry, Data Digital Intrusion 4, Disguise 2, Recovery 1, Electronic Surveillance 2, Recovery, Electronic Surveillance, Infiltration 4, Mechanics 2 Photography 2, Streetwise 1 Notice, Streetwise Alternates: Architecture, Notice GENERAL ABILITIES: Conceal 6, Cuckoo GENERAL ABILITIES: Conceal 2, Digital Disguise 2, Driving 4, Explosive The cuckoo lays its eggs in another bird’s Intrusion 2, Filch 6, Infiltration 8 Devices 2, Infiltration 2, Stability 2 nest, convincing the stranger to raise its Alternates: Preparedness Alternates: Digital Intrusion chicks.
    [Show full text]
  • Cyberspace and National Security
    Cyberspace and National Security Selected Articles III Edited by Gabi Siboni המכון למחקרי ביטחון לאומי THE INSTITUTE FOR NATIONAL SECURITYc STUDIES INCORPORATING THE JAFFEE b d CENTER FOR STRATEGIC STUDIES Cyberspace and National Security Selected Articles III Edited by Gabi Siboni THE INSTITUTE FOR NATIONAL SECURcITY STUDIES INCORPORATING THE JAFFEE b d CENTER FOR STRATEGIC STUDIES Institute for National Security Studies THE INSTITUTE FOR NATIONAL SECURcITY STUDIES INCORPORATING THE JAFFEE b d CENTER FOR STRATEGIC STUDIES Graphic design: Michal Semo-Kovetz The Institute for National Security Studies (INSS), incorporating Printing: Elinir the Jaffee Center for Strategic Studies, was founded in 2006. The purpose of the Institute for National Security Studies Institute for National Security Studies is first, to conduct basic research that meets the highest (a public benefit company) academic standards on matters related to Israel’s national 40 Haim Levanon Street security as well as Middle East regional and international POB 39950 security affairs. Second, the Institute aims to contribute to Ramat Aviv the public debate and governmental deliberation of issues Tel Aviv 6997556 that are – or should be – at the top of Israel’s national security agenda. Tel. +972-3-640-0400 INSS seeks to address Israeli decision makers and Fax. +972-3-744-7590 policymakers, the defense establishment, public opinion makers, the academic community in Israel and abroad, and E-mail: [email protected] the general public. http://www.inss.org.il INSS publishes research that it deems worthy of public attention, while it maintains a strict policy of non-partisanship. © All rights reserved. The opinions expressed in this publication are the authors’ April 2015 alone, and do not necessarily reflect the views of the Institute, its trustees, boards, research staff, or the organization and ISBN: 978-965-7425-76-3 individuals that support its research.
    [Show full text]