Cyber, Intelligence, and Security

Total Page:16

File Type:pdf, Size:1020Kb

Cyber, Intelligence, and Security Cyber, Intelligence, and Security Volume 3 | No. 1 | May 2019 European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research David Siman-Tov and Mor Buskila The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it Pnina Shuker and Gabi Siboni The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber Stephen J. Cimbala Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests Sam Cohen Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons? Omree Wechsler The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West Kobi Michael and Aaron Kornbluth Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War Shmuel Even National Cyber Security in Israel Yigal Unna Cyber, Intelligence, and Security Volume 3 | No. 1 | May 2019 Contents European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research | 3 David Siman-Tov and Mor Buskila The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it | 27 Pnina Shuker and Gabi Siboni The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber | 41 Stephen J. Cimbala Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests | 71 Sam Cohen Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons? | 95 Omree Wechsler The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West | 117 Kobi Michael and Aaron Kornbluth Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War | 141 Shmuel Even National Cyber Security in Israel | 167 Yigal Unna The purpose of Cyber, Intelligence, and Security is to stimulate Cyber, and enrich the public debate on related issues. Intelligence, Cyber, Intelligence, and Security is a refereed journal published three times a year within the framework of the and Security Cyber Security Program at the Institute for National Security Studies. Articles are written by INSS researchers and guest contributors. The views presented here are those of the authors alone. The Institute for National Security Studies is a public benefit company. Editor in Chief: Amos Yadlin Editor: Gabi Siboni Journal Coordinators: Hadas Klein and Gal Perl Finkel Editorial Advisory Board • Myriam Dunn Cavelty, Swiss Federal International Corporation, US Institute of Technology Zurich, Switzerland • James Lewis, Center for Strategic and • Frank J. Cilluffo, George Washington International Studies, US University, US • Kobi Michael, The Institute for National • Stephen J. Cimbala, Penn State Security Studies, Israel University, US • Theo Neethling, University of the Free • Rut Diamint, Universidad Torcuato Di State, South Africa Tella, Argentina • John Nomikos, Research Institute for • Maria Raquel Freire, University of European and American Studies, Greece Coimbra, Portugal • T.V. Paul, McGill University, Canada • Peter Viggo Jakobson, Royal Danish • Glen Segell, Securitatem Vigilate, Ireland Defence College, Denmark • Bruno Tertrais, Fondation pour la • Sunjoy Joshi, Observer Research Recherché Strategique, France Foundation, India • James J. Wirtz, Naval Postgraduate • Efraim Karsh, King’s College London, School, US United Kingdom • Ricardo Israel Zipper, Universidad • Kai Michael Kenkel, Pontifical Catholic Autónoma de Chile, Chile University of Rio de Janeiro, Brazil • Daniel Zirker, University of Waikato, • Jeffrey A. Larsen, Science Applications New Zealand Graphic Design: Michal Semo-Kovetz, Yael Bieber, Tel Aviv University Graphic Design Studio Printing: Elinir The Institute for National Security Studies (INSS) 40 Haim Levanon • POB 39950 • Tel Aviv 6997556 • Israel Tel: +972-3-640-0400 • Fax: +972-3-744-7590 • E-mail: [email protected] Cyber, Intelligence, and Security is published in English and Hebrew. The full text is available on the Institute’s website: www.inss.org.il © 2019. All rights reserved. ISSN 2519-6677 (print) • E-ISSN 2519-6685 (online) European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research David Siman-Tov and Mor Buskila Attempts by countries to influence other countries constitute a security challenge and a threat to democracy. European countries have identified this challenge as a threat to national security and are dealing with it through government actions, civilian activity, and cooperation between countries, reflecting different approaches and proposed solutions to the problem. This article seeks to examine the various methods that the major European countries are using to cope with this challenge and to assess the differences between them by means of their political culture. In addition, this article shows the differences resulting from the strength and type of threat. Thus, it will be possible to speculate about the possibilities and the limits of implementing different coping approaches according to their political-cultural character and whether these approaches can be applied in other countries, including Israel. Keywords: Europe, Russia, influence, coping strategy, political culture, the battle for minds, democracy Dudi Siman-Tov researches the field of cognition at INSS. Mor Buskila is a research assistant in the Lipkin-Shahak Program “National Security and Democracy in an Era of Post-Truth and Fake News” at INSS. Cyber, Intelligence, and Security | Volume 3 | No. 1 | May 2019 3 DAVID SIMAN-TOV AND MOR BUSKILA | European COUNTRIES Facing THE CHALLENGE 4 Introduction The international community increasingly has begun to address efforts to exert influence in the digital and network age, particularly following the exposure of Russian attempts to sway the US elections in 2016 as well as their efforts to have influence in many European countries. Attempts to influence are defined as activating the dialogue on values, cultures, and ideas using various tools—including social media and traditional media—in order | Volume 3 | No. 1 | May 2019 3 | No. 1 May | Volume to change public opinion, disrupt, interfere with processes, and undermine stability.1 Campaigns of disinformation and manipulation of political and public debate are intended to deepen social rifts, intensify internal and external tensions, undermine public trust in government institutions, and affect strategic decisions or election results in favor of the interests of those behind the campaigns.2 This research focuses on different European states in order to understand Cyber, Intelligence, and Security Intelligence, Cyber, how they address at the national level efforts to exert influence, which has developed with technological advancements, the rise of social media, and the undermining of the notion of truth. This article does not deal with attempts to influence by individual agents, formal foreign policy, the use of economic tools or demonstrations of military power. Rather, it focuses on efforts to affect cognition by the streaming of information that is false, designed to influence, while using social media as an arena in which new conflicts are conducted. It should be noted that the European states all face different types of threats and challenges. Countries that are geographically closer to Russia have experienced a more significant strategic threat, while Russian-speaking communities have been more exposed to direct influence, and others have experienced a combination of internal and external threats. Specifically, this research focuses on those countries that are fertile ground for Russian influence, the threats that they face, how they cope with them, and how to explain the differences in methods of coping between the countries. We considered a wide range of objectives and parameters, such as the country’s geopolitical conditions, its geopolitical proximity to Russia and 1 Naja Bentzen, “Foreign Influence Operations in the EU,” EPRS – European Parliamentary Research Service, July 2018, p. 1, https://bit.ly/2ORBBuI. 2 Andrew Weisburd, Clint Watts, and J.M. Berger, “Trolling for Trump: How Russia is Trying to Destroy our Democracy,” War on the Rocks, November 6, 2016, https:// bit.ly/2iyw0fU. DAVID SIMAN-TOV AND MOR BUSKILA | European COUNTRIES Facing THE CHALLENGE 5 to its strategic routes, the existence of a Russian minority within the country and its connection to Russia, ideological competition, economic interests, and the unique political culture of each. The countries can be divided into three groups: the Baltic states of Estonia, and Latvia; the Nordic states of Sweden and Denmark; and the Western European states of Germany, France, and Britain. This regional division also facilitates the political-cultural research, which indicates shared values of the countries within each group. | Volume 3 | No. 1 | May 2019 3 | No. 1 May | Volume Methodological Background In order to answer the research questions, we have relied on concepts that serve the course of the debate as well as on several research approaches, since the ways in which the threats are perceived in Europe differ from that of the United States or Israel. An important concept used in this research is that of “political culture.” Political culture refers to the collection of values, emotions, and perceptions that reflect the nature of a country’s political
Recommended publications
  • Rethinking Documentary Photography
    RETHINKING DOCUMENTARY PHOTOGRAPHY: DOCUMENTARY AND POLITICS IN TIMES OF RIOTS AND UPRISINGS —————————————————— A Thesis Presented to The Honors Tutorial College Ohio University —————————————————— In Partial Fulfillment of the Requirements for Graduation from the Honors Tutorial College with the degree of Bachelor of Arts in Art History —————————————————— by Jack Opal May 2013 Introduction I would like to think about documentary photography. In particular, I would like to rethink the limits of documentary photography for the contemporary. Documentary, traditionally, concerns itself with the (re)presentation of factual information, constitutes a record.1 For decades, documentary – and especially social documentary – has been under siege; its ability to capture and convey and adequately represent “truth” thrown into question, victim to the aestheticization of the objects, fading trust in their authors, and technological development. So much so that the past three decades have prompted photographer, documentarian, and art historian Martha Rosler to question first its utility, then its role, and finally its future in society. All of this has opened up the possibility and perhaps the need to reconsider the conditions and purpose of documentary practice, and to consider the ways in which it has been impacted by recent technological and historical developments. The invention of the internet and the refinement of the (video) camera into ever more portable devices and finally into the smartphone, and the rise to ubiquity within society of these inventions, signifies a major shift in documentary. So, too, have certain events of the past two decades – namely, the beating of Rodney King (and the circulation of the video of that event) and the development and adoption of the occupation as a major tactic within the political left.
    [Show full text]
  • DIRECTING the Disorder the CFR Is the Deep State Powerhouse Undoing and Remaking Our World
    DEEP STATE DIRECTING THE Disorder The CFR is the Deep State powerhouse undoing and remaking our world. 2 by William F. Jasper The nationalist vs. globalist conflict is not merely an he whole world has gone insane ideological struggle between shadowy, unidentifiable and the lunatics are in charge of T the asylum. At least it looks that forces; it is a struggle with organized globalists who have way to any rational person surveying the very real, identifiable, powerful organizations and networks escalating revolutions that have engulfed the planet in the year 2020. The revolu- operating incessantly to undermine and subvert our tions to which we refer are the COVID- constitutional Republic and our Christian-style civilization. 19 revolution and the Black Lives Matter revolution, which, combined, are wreak- ing unprecedented havoc and destruction — political, social, economic, moral, and spiritual — worldwide. As we will show, these two seemingly unrelated upheavals are very closely tied together, and are but the latest and most profound manifesta- tions of a global revolutionary transfor- mation that has been under way for many years. Both of these revolutions are being stoked and orchestrated by elitist forces that intend to unmake the United States of America and extinguish liberty as we know it everywhere. In his famous “Lectures on the French Revolution,” delivered at Cambridge University between 1895 and 1899, the distinguished British historian and states- man John Emerich Dalberg, more com- monly known as Lord Acton, noted: “The appalling thing in the French Revolution is not the tumult, but the design. Through all the fire and smoke we perceive the evidence of calculating organization.
    [Show full text]
  • Paradigms Sometimes Fit: the Haredi Response to the Yom Kippur War
    Paradigms Sometimes Fit: The Haredi Response to the Yom Kippur War CHARLES s. LIEBMAN This essay is an effort to understand Jewish ultra-orthodox Haredi reaction to the 1973 Yom Kippur War. Attention is confined to the large central segment of Haredi society represented in the political arena by Agudat Israel - the only Haredi political party which existed in the period covered here. The hypothesis which guided my research was that between 1973 and the elections of 1977, changes took place in Haredi conceptions of the state of Israel and the wider society which led Agudat Israel to join the government coalition. I have sought to explore this hypothe­ sis by comparing Haredi responses to the Yom Kippur War with their reactions to the Six Day War of June 1967. I assumed that the striking victory of the Israel Defence Forces (IDF) in the Six Day War would pose serious problems for Haredim. The Six Day War superficially, at least, seemed to be a vindication of Zionism, of secular Israel and the capacity of human design. The Yom Kippur War, on the other hand, seemed to reflect the tentative and insecure status of Israel, its isolation from the world and the folly of Israel's leaders. It, more than any of Israel's wars, might help narrow the sense of alienation that Haredim heretofore have felt. The tragedy and trauma of the war and the deep scars it left in Israeli society would serve, so I anticipated, to evoke in Haredi eyes the age-old experience of the Jewish people since the destruction of the Temple.
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • HOUSE of REPRESENTATIVES-Thursday, December 17, 1998
    27770 CONGRESSIONAL RECORD-HOUSE December 17, 1998 HOUSE OF REPRESENTATIVES-Thursday, December 17, 1998 Pursuant to section 3 of House Con­ Pursuant to clause 1, rule I, the Jour­ Mr. Thomas J. Murrin, Pennsylvania; current Resolution 353, One Hundred nal stands approved. Mr. Kenneth Saxe, Pennsylvania; Fifth Congress, the House met at 10 Mr. Frank Riggs, California; and a.m. and was called to order by the Mr. Frank Roberts, California. Speaker, Hon. NEWT GINGRICH. PLEDGE OF ALLEGIANCE The SPEAKER. Will the gentleman from South Carolina (Mr. SPENCE) COMMUNICATION FROM THE NOTIFICATION OF REASSEMBLING come forward and lead the House in the CHAIRMAN OF THE COMMITTEE OF CONGRESS Pledge of Allegiance. ON TRANSPORTATION AND IN­ The SPEAKER. The Chair lays before Mr. SPENCE led the Pledge of Alle­ FRASTRUCTURE the House the text of the formal notifi­ giance as follows: The Speaker laid before the House cation sent to Members on Monday, I pledge allegiance to the Flag of the the following communication from the December 14, 1998, of the reassembling United States of America, and to the Repub­ chairman of the Committee on Trans­ of the House, which the Clerk will read. lic for which it stands, one nation under God, portation and Infrastructure; which The Clerk read as follows: indivisible, with liberty and justice for all. was read and referred to the Com­ OFFICE OF THE SPEAKER, mittee on Appropriations. Washington, DC, December 14, 1998. APPOINTMENT AS MEMBERS OF WASHINGTON, DC, Pursuant to section 3 of House Concurrent THE ADVISORY COMMISSION ON October 13, 1998. Resolution 353 and after consultation with ELECTRONIC COMMERCE Hon.
    [Show full text]
  • The Pulitzer Prizes 2020 Winne
    WINNERS AND FINALISTS 1917 TO PRESENT TABLE OF CONTENTS Excerpts from the Plan of Award ..............................................................2 PULITZER PRIZES IN JOURNALISM Public Service ...........................................................................................6 Reporting ...............................................................................................24 Local Reporting .....................................................................................27 Local Reporting, Edition Time ..............................................................32 Local General or Spot News Reporting ..................................................33 General News Reporting ........................................................................36 Spot News Reporting ............................................................................38 Breaking News Reporting .....................................................................39 Local Reporting, No Edition Time .......................................................45 Local Investigative or Specialized Reporting .........................................47 Investigative Reporting ..........................................................................50 Explanatory Journalism .........................................................................61 Explanatory Reporting ...........................................................................64 Specialized Reporting .............................................................................70
    [Show full text]
  • Deterring Iran After the Nuclear Deal
    MARCH 2017 COVER PHOTO NIEL HESTER | FLICKR 1616 Rhode Island Avenue NW Washington, DC 20036 202 887 0200 | www.csis.org Lanham • Boulder • New York • London 4501 Forbes Boulevard Lanham, MD 20706 301 459 3366 | www.rowman.com Deterring Iran After the Nuclear Deal PROJECT DIRECTORS AND EDITORS Kathleen H. Hicks Melissa G. Dalton CONTRIBUTING AUTHORS Melissa G. Dalton Thomas Karako Jon B. Alterman J. Matthew McInnis Michael Connell Hijab Shah Michael Eisenstadt Michael Sulmeyer ISBN 978-1-4422-7993-3 Farideh Farhi Ian Williams Kathleen H. Hicks 1616 Rhode Island Avenue NW Washington,Ë|xHSLEOCy279933z DC 20036v*:+:!:+:! 202-887-0200 | www.csis.org Blank MARCH 2017 Deterring Iran after the Nuclear Deal PROJ ECT DIRECTORS AND EDITORS Kathleen H. Hicks Melissa G. Dalton CONTRIBUTING AUTHORS Melissa G. Dalton Thomas Karako Jon B. Alterman J. Matthew McInnis Michael Connell Hijab Shah Michael Eisenstadt Michael Sulmeyer Farideh Farhi Ian Williams Kathleen H. Hicks Lanham • Boulder • New York • London 594-68742_ch00_6P.indd 1 3/13/17 7:13 AM About CSIS For over 50 years, the Center for Strategic and International Studies (CSIS) has worked to develop solutions to the world’s greatest policy challenges. T oday, CSIS scholars are providing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organ ization headquartered in Washington, D.C. The Center’s 220 full- time staff and large network of affiliated scholars conduct research and analy sis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M.
    [Show full text]
  • Trend Analysis the Israeli Unit 8200 an OSINT-Based Study CSS
    CSS CYBER DEFENSE PROJECT Trend Analysis The Israeli Unit 8200 An OSINT-based study Zürich, December 2019 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Trend analysis: The Israeli Unit 8200 – An OSINT-based study Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. Center for Security Studies (CSS), ETH Zürich. 1 Trend analysis: The Israeli Unit 8200 – An OSINT-based study . Table of Contents 1 Introduction 4 2 Historical Background 5 2.1 Pre-independence intelligence units 5 2.2 Post-independence unit: former capabilities, missions, mandate and techniques 5 2.3 The Yom Kippur War and its consequences 6 3 Operational Background 8 3.1 Unit mandate, activities and capabilities 8 3.2 Attributed and alleged operations 8 3.3 International efforts and cooperation 9 4 Organizational and Cultural Background 10 4.1 Organizational structure 10 Structure and sub-units 10 Infrastructure 11 4.2 Selection and training process 12 Attractiveness and motivation 12 Screening process 12 Selection process 13 Training process 13 Service, reserve and alumni 14 4.3 Internal culture 14 5 Discussion and Analysis 16 5.1 Strengths 16 5.2 Weaknesses 17 6 Conclusion and Recommendations 18 7 Glossary 20 8 Abbreviations 20 9 Bibliography 21 2 Trend analysis: The Israeli Unit 8200 – An OSINT-based study selection tests comprise a psychometric test, rigorous Executive Summary interviews, and an education/skills test.
    [Show full text]
  • The Munich Massacre: a New History
    The Munich Massacre: A New History Eppie Briggs (aka Marigold Black) A thesis submitted in partial fulfilment of the requirements of the degree of BA (Hons) in History University of Sydney October 2011 1 Contents Introduction and Historiography Part I – Quiet the Zionist Rage 1. The Burdened Alliance 2. Domestic Unrest Part II – Rouse the Global Wrath 3. International Condemnation 4. The New Terrorism Conclusion 2 Acknowledgments I would like to thank first and foremost Dr Glenda Sluga to whom I am greatly indebted for her guidance, support and encouragement. Without Glenda‟s sage advice, the writing of this thesis would have been an infinitely more difficult and painful experience. I would also like to thank Dr Michael Ondaatje for his excellent counsel, good-humour and friendship throughout the last few years. Heartfelt thanks go to Elise and Dean Briggs for all their love, support and patience and finally, to Angus Harker and Janie Briggs. I cannot adequately convey the thanks I owe Angus and Janie for their encouragement, love, and strength, and for being a constant reminder as to why I was writing this thesis. 3 Abstract This thesis examines the Nixon administration’s response to the Munich Massacre; a terrorist attack which took place at the 1972 Olympic Games in Munich. By examining the contextual considerations influencing the administration’s response in both the domestic and international spheres, this thesis will determine the manner in which diplomatic intricacies impacted on the introduction of precedent setting counterterrorism institutions. Furthermore, it will expound the correlation between the Nixon administration’s response and a developing conceptualisation of acts of modern international terrorism.
    [Show full text]
  • 0.1 Problems
    0.1. PROBLEMS 1 0.1 Problems 1. Among the fundamental challenges in information security are confi- dentiality, integrity, and availability, or CIA. a. Define each of these terms: confidentiality, integrity, availability. b. Give a concrete example where confidentiality is more important than integrity. c. Give a concrete example where integrity is more important than confidentiality. d. Give a concrete example where availability is the overriding con- cern. 2. From a bank's perspective, which is usually more important, the in- tegrity of its customer's data or the confidentiality of the data? From the perspective of the bank's customers, which is more important? 3. Instead of an online bank, suppose that Alice provides an online chess playing service known as Alice's Online Chess (AOC). Players, who pay a monthly fee, log into AOC where they are matched with another player of comparable ability. a. Where (and why) is confidentiality important for AOC and its customers? b. Why is integrity necessary? c. Why is availability an important concern? 4. Instead of an online bank, suppose that Alice provides an online chess playing service known as Alice's Online Chess (AOC). Players, who pay a monthly fee, log into AOC where they are matched with another player of comparable ability. a. Where should cryptography be used in AOC? b. Where should access control used? c. Where would security protocols be used? d. Is software security a concern for AOC? Why or why not? 5. Some authors distinguish between secrecy, privacy, and confidential- ity. In this usage, secrecy is equivalent to our use of the term con- fidentiality, whereas privacy is secrecy applied to personal data, and 2 confidentiality (in this misguided sense) refers to an obligation not to divulge certain information.
    [Show full text]
  • NISCOM Publication Espionage 1989
    COMMENTS ................................... ........................................ 1 INTRODUCTION ... ... .... ........................................................ ... 2 SIGNIFICANT CASES ........ ...................................... ...............3 Michael Hahn Allen ...................................................................... 5 Stephen Anthony Baba ................................. ............................... 6 Robert Ernest Cordrey ..................................................................7 Nelson Cornelious Drummond ..................................................... 8 Wilfredo Garcia ............................................................................ 9 Stephen Dwayne Hawkins ...........................................................10 Brian Patrick Horton ....................................................................11 Clayton John Lonetree ................................................ ......... ...... 12 Samuel Lori ng Morison ............................................................. ..14 Jeffery Loring Pickerlng ......................................... .....................15 Jonathan Jay Pollard .................................................................. 16 Brian Everett Slavens .................................................................17 Michael Timothy Tobias .............................................................. 18 John Anthony Walker, Jr.... ............................................... ......... 19 Michael Lance Walker ...............................................................
    [Show full text]
  • On Security and Privacy for Networked Information Society
    Antti Hakkala On Security and Privacy for Networked Information Society Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes Turku Centre for Computer Science TUCS Dissertations No 225, November 2017 ON SECURITY AND PRIVACY FOR NETWORKED INFORMATIONSOCIETY Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes antti hakkala To be presented, with the permission of the Faculty of Mathematics and Natural Sciences of the University of Turku, for public criticism in Auditorium XXII on November 18th, 2017, at 12 noon. University of Turku Department of Future Technologies FI-20014 Turun yliopisto 2017 supervisors Adjunct professor Seppo Virtanen, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland Professor Jouni Isoaho, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland reviewers Professor Tuomas Aura Department of Computer Science Aalto University Espoo, Finland Professor Olaf Maennel Department of Computer Science Tallinn University of Technology Tallinn, Estonia opponent Professor Jarno Limnéll Department of Communications and Networking Aalto University Espoo, Finland The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service ISBN 978-952-12-3607-5 (Online) ISSN 1239-1883 To my wife Maria, I am forever grateful for everything. Thank you. ABSTRACT Our society has developed into a networked information soci- ety, in which all aspects of human life are interconnected via the Internet — the backbone through which a significant part of communications traffic is routed. This makes the Internet ar- guably the most important piece of critical infrastructure in the world.
    [Show full text]