Cyber, Intelligence, and Security Cyber, Intelligence, and Security
Total Page:16
File Type:pdf, Size:1020Kb
Cyber, Intelligence, and Security Intelligence, Cyber, Cyber, Intelligence, and Security Volume 2 | No. 3 | December 2018 Identity Theft and Exposure to Harmful Content— Internet Risks for Teenagers Limor Ezioni Ubiquitous Presence: Protecting Privacy and Forbidding Volume 2 Volume Intrusion into a Person’s Records in Jewish Law Aviad Hacohen and Gabi Siboni Cyberspace: The Next Arena for the Saudi-Iranian Conflict? Ron Deutch and Yoel Guzansky | No. 3 Jihadi Johns: Virtual Democracy and Countering Violent Extremism Propaganda Matthew Crosston | December 2018 December The European Union’s Foreign Policy Toolbox in International Cyber Diplomacy Annegret Bendiek Global Changes in the Proliferation of Armed UAVs: Risks, Challenges, and Opportunities Facing Israel Liran Antebi Lectures by Lt. Gen. Gadi Eizenkot and Professor Yaël Ronen on October 24, 2018 Operations in Cyberspace from the Perspective of International Law Yaël Ronen Cyberspace and the Israel Defense Forces Gadi Eizenkot Cyber, Intelligence, and Security Volume 2 | No. 3 | December 2018 Contents Identity Theft and Exposure to Harmful Content— Internet Risks for Teenagers | 3 Limor Ezioni Ubiquitous Presence: Protecting Privacy and Forbidding Intrusion into a Person’s Records in Jewish Law | 15 Aviad Hacohen and Gabi Siboni Cyberspace: The Next Arena for the Saudi-Iranian Conflict? | 25 Ron Deutch and Yoel Guzansky Jihadi Johns: Virtual Democracy and Countering Violent Extremism Propaganda | 37 Matthew Crosston The European Union’s Foreign Policy Toolbox in International Cyber Diplomacy | 57 Annegret Bendiek Global Changes in the Proliferation of Armed UAVs: Risks, Challenges, and Opportunities Facing Israel | 73 Liran Antebi Lectures by Lt. Gen. Gadi Eizenkot and Professor Yaël Ronen on October 24, 2018 Operations in Cyberspace from the Perspective of International Law | 93 Yaël Ronen Cyberspace and the Israel Defense Forces | 99 Gadi Eizenkot The purpose of Cyber, Intelligence, and Security is to stimulate Cyber, and enrich the public debate on related issues. Intelligence, Cyber, Intelligence, and Security is a refereed journal published three times a year within the framework of the and Security Cyber Security Program at the Institute for National Security Studies. Articles are written by INSS researchers and guest contributors. The views presented here are those of the authors alone. The Institute for National Security Studies is a public benefit company. Editor in Chief: Amos Yadlin Editor: Gabi Siboni Journal Coordinators: Hadas Klein and Gal Perl Finkel Editorial Advisory Board • Myriam Dunn Cavelty, Swiss Federal International Corporation, US Institute of Technology Zurich, Switzerland • James Lewis, Center for Strategic and • Frank J. Cilluffo, George Washington International Studies, US University, US • Kobi Michael, The Institute for National • Stephen J. Cimbala, Penn State Security Studies, Israel University, US • Theo Neethling, University of the Free • Rut Diamint, Universidad Torcuato Di State, South Africa Tella, Argentina • John Nomikos, Research Institute for • Maria Raquel Freire, University of European and American Studies, Greece Coimbra, Portugal • T.V. Paul, McGill University, Canada • Peter Viggo Jakobson, Royal Danish • Glen Segell, Securitatem Vigilate, Ireland Defence College, Denmark • Bruno Tertrais, Fondation pour la • Sunjoy Joshi, Observer Research Recherché Strategique, France Foundation, India • James J. Wirtz, Naval Postgraduate • Efraim Karsh, King’s College London, School, US United Kingdom • Ricardo Israel Zipper, Universidad • Kai Michael Kenkel, Pontifical Catholic Autónoma de Chile, Chile University of Rio de Janeiro, Brazil • Daniel Zirker, University of Waikato, • Jeffrey A. Larsen, Science Applications New Zealand Graphic Design: Michal Semo-Kovetz, Yael Bieber, Tel Aviv University Graphic Design Studio Printing: Elinir The Institute for National Security Studies (INSS) 40 Haim Levanon • POB 39950 • Tel Aviv 6997556 • Israel Tel: +972-3-640-0400 • Fax: +972-3-744-7590 • E-mail: [email protected] Cyber, Intelligence, and Security is published in English and Hebrew. The full text is available on the Institute’s website: www.inss.org.il © 2018. All rights reserved. ISSN 2519-6677 (print) • E-ISSN 2519-6685 (online) Identity Theft and Exposure to Harmful Content—Internet Risks for Teenagers Limor Ezioni Children and teenagers are part of a weak and vulnerable population group. Their internet activity exposes them to two substantial risks: exposure to harmful content and identity theft and its use for slander and bullying. This article examines the characteristics and scope of the problem. It proposes ways of minimizing the damage that these risks pose to children and teenagers, while dealing with the existing privacy restrictions. Keywords: Internet, internet bullying, identity theft, pornography, children, teenagers Introduction Technological development has many advantages but also more than a few disadvantages, ranging from society’s absolute dependence on technology, which causes exposure to the shutdown of services and information leaks due to cyberattacks, to the possibility of financial fraud, and physical damage to critical processes. Despite the severity of these disadvantages, children and teenagers continue to be exposed to them, particularly to two dangerous phenomena: identity theft through the internet and exposure to harmful content. Identity theft through the internet has become one of the main concerns in cyberspace, with teenagers being one of the most vulnerable risk groups. Adv. Dr. Limor Ezioni, dean of law at the Academic College for Law and Science (Sha‘arei Mishpat), is currently writing a book about cyber law and regulation. She provides professional legal counsel and representation in both criminal and civil law for teenagers and adults. Cyber, Intelligence, and Security | Volume 2 | No. 3 | December 2018 3 LIMOR EZIONI | Identity THEFT AND EXposure to HARMFUL CONTENT 4 Identity theft and the use of false identities are, in many cases, aimed at slander and shaming campaigns, which are liable to have severe consequences for the teenagers whose identities were stolen, by affecting their future and their development. In addition to identity theft, children and teenagers are exposed to harmful content. Prolonged exposure to such content affects their social development, augments their violent inclinations, and is also liable to lead to the formation of distorted models of interpersonal relationships. The information revolution, particularly digital communications on the internet, is based on leveling the differences between societies and cultures | Volume 2 | No. 3 | December 2018 2 | No. 3 December | Volume for the lofty purposes of educational, economic, and social development. The freedom to use the internet was a phenomenon that presumably promised social and economic development even in the most inaccessible places. Globalization ensued, in which information, knowledge, intellectual property, and capital were transferred quickly and easily between different countries. At the same time, the information revolution caused people to be dependent on the ability to transmit large volumes of various types of information at Cyber, Intelligence, and Security Intelligence, Cyber, high speeds on diverse platforms.1 The focus on—and some would say the addiction to—the ability to share information has repressed the need for controls over the content of the information. Under the banner of “net neutrality,” the need and ability to exercise any control of content whatsoever has been suppressed. In theory, justice was on the side of the advocates of freedom who claimed and understood that this approach was likely to have desirable social effects even beyond the immediate benefits, such as those based on the desired externalities of net neutrality. In practice, however, the conditions justifying fair use of the internet do not exist in a place where the net neutrality model is in effect.2 As a result, an unconstrained space has been created that allows the transmission of harmful content of any type whatsoever to any user. In the absence of any control mechanisms by both the party distributing the information and the party receiving it, the internet has become a theater of lawlessness that victimizes mainly the weak. Teenagers and children are exposed to extremely harmful content, even against their will. The situation 1 M. F. Mahmood and N. Hussin, “Information in Conversion Era: Impact and Influence from 4th Industrial Revolution,” International Journal of Academic Research in Business and Social Sciences 8, no. 9 (October 13, 2018): 320–328. 2 Keith N. Hylton, “Law, Social Welfare, and Net Neutrality,” Review of Industrial Organization 50, no. 4 (June 2017): 417–429. LIMOR EZIONI | Identity THEFT AND EXposure to HARMFUL CONTENT 5 has become intolerable; in many cases, even an internet search for innocent content leads to pop-up windows with pornographic content inviting the user to enter a pornographic website. The inconceivable availability of this content makes it difficult for parents to cope with the phenomenon. Thus, without having any system of control, children and teenagers have become unwilling consumers of pornography. As a weak and vulnerable population group, children and teenagers are subject to rapid manipulation and influence, creating a broad platform for another harmful use of the internet. The development of social networks | Volume 2 | No. 3 | December 2018 2 | No. 3 December | Volume has