Cyber, Intelligence, and Security

Volume 1 | No. 1 | January 2017

Jointness in Intelligence Organizations: Theory Put into Practice Kobi Michael, David Siman-Tov, and Oren Yoeli

The ’ Cyber Warfare History: Implications on Modern Cyber Operational Structures and Policymaking Omry Haizler

Lessons Learned from the “Viral Caliphate”: Viral Effect as a New PSYOPS Tool? Miron Lakomy

An Intelligence Civil War: “HUMINT’” vs. “TECHINT” Matthew Crosston and Frank Valli

Israeli Cyberspace Regulation: A Conceptual Framework, Inherent Challenges, and Normative Recommendations Gabi Siboni and Ido Sivan-Sevilla

Artificial Intelligence in Cybersecurity Nadine Wirkuttis and Hadas Klein

Pedal to the Metal? The Race to Develop Secure Autonomous Cars Andrew Tabas

Cyber, Intelligence, and Security Volume 1 | No. 1 | January 2017

Contents

Editor’s Foreword | 3

Jointness in Intelligence Organizations: Theory Put into Practice | 5 Kobi Michael, David Siman-Tov, and Oren Yoeli

The United States’ Cyber Warfare History: Implications on Modern Cyber Operational Structures and Policymaking | 31 Omry Haizler

Lessons Learned from the “Viral Caliphate”: Viral E"ect as a New PSYOPS Tool? | 47 Miron Lakomy

An Intelligence Civil War: “HUMINT’” vs. “TECHINT” | 67 Matthew Crosston and Frank Valli

Israeli Cyberspace Regulation: A Conceptual Framework, Inherent Challenges, and Normative Recommendations | 83 Gabi Siboni and Ido Sivan-Sevilla

Arti#cial Intelligence in Cybersecurity | 103 Nadine Wirkuttis and Hadas Klein

Pedal to the Metal? The Race to Develop Secure Autonomous Cars | 121 Andrew Tabas The purpose of Cyber, Intelligence, and Security is to stimulate Cyber, and enrich the public debate on related issues. Intelligence, Cyber, Intelligence, and Security is a refereed journal published and Security three times a year within the framework of the Cyber Security Program at the Institute for National Security Studies. Articles are written by INSS researchers and guest contributors. The views presented here are those of the authors alone. The Institute for National Security Studies is a public bene"t company.

Editor in Chief: Amos Yadlin Editor: Gabi Siboni Journal Coordinator: Hadas Klein Asst. Coordinator: Gal Perl Finkel

Editorial Advisory Board • Myriam Dunn Cavelty, Swiss Federal • Je#rey A. Larsen, Science Applications Institute of Technology Zurich, Switzerland International Corporation, US • Frank J. Cillu#o, George Washington • James Lewis, Center for Strategic and University, US International Studies, US • Stephen J. Cimbala, Penn State • Theo Neethling, University of the Free University, US State, South Africa • Rut Diamint, Universidad Torcuato Di • John Nomikos, Research Institute for Tella, Argentina European and American Studies, Greece • Maria Raquel Freire, University of • T.V. Paul, McGill University, Canada Coimbra, Portugal • Glen Segell, Securitatem Vigilate, Ireland • Peter Viggo Jakobson, Royal Danish • Bruno Tertrais, Fondation pour la Defence College, Denmark Recherché Strategique, France • Sunjoy Joshi, Observer Research • James J. Wirtz, Naval Postgraduate Foundation, India School, US • Efraim Karsh, King’s College London, • Ricardo Israel Zipper, Universidad Autónoma de Chile, Chile • Kai Michael Kenkel, Ponti"cal Catholic • Daniel Zirker, University of Waikato, University of Rio de Janeiro, Brazil New Zealand

Graphic Design: Michal Semo-Kovetz, Yael Bieber, Tel Aviv University Graphic Design Studio Printing: Elinir

The Institute for National Security Studies (INSS) 40 Haim Levanon • POB 39950 • Tel Aviv 6997556 • Israel Tel: +972-3-640-0400 • Fax: +972-3-744-7590 • E-mail: [email protected]

Cyber, Intelligence, and Security is published in English and Hebrew. The full text is available on the Institute’s website: www.inss.org.il

© 2017. All rights reserved.

ISSN 2519-6677 (print) • E-ISSN 2519-6685 (online) Editor’s Foreword Dear Readers,

The periodical Cyberspace, Intelligence, and Security is proud to present LWV¿UVWLVVXH,WLVDGLUHFWFRQWLQXDWLRQRI Military and Strategic Affairs , ZKLFKWKH,QVWLWXWHIRU1DWLRQDO6HFXULW\6WXGLHVKDVSXEOLVKHGIRUWKHODVW HLJKW\HDUV7KHQHZMRXUQDOLVDLPHGDWZULWHUVDQGUHDGHUVLQWHUHVWHGRU ZRUNLQJLQWKHPDQ\¿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¿FDWLRQVDVZHOODVWKHEDODQFHRIGHWHUUHQFHDQDO\VLVRIF\EHUWKUHDWV DQGULVNVLQWHOOLJHQFHLQIRUPDWLRQVKDULQJDQGSXEOLFSULYDWHSDUWQHUVKLSV DLPHGDWLPSURYLQJF\EHUGHIHQVH7HFKQRORJLFDOH[SHUWVZLOOEHHQFRXUDJHG WRZULWHDERXWWHFKQRORJLFDOGHYHORSPHQWVFDVHVWXGLHVUHVHDUFKPHWKRGV DQGWKHGHYHORSPHQWRISURFHVVHVFRQQHFWHGWRF\EHUVSDFH $FDOOIRUSDSHUVDQGZULWLQJLQVWUXFWLRQVZLOOEHDSSHQGHGWRHYHU\LVVXH RIWKHMRXUQDODQGZLOOEHDYDLODEOHDWWKH,166ZHEVLWH ,KRSH\RXZLOO¿QGWKLVMRXUQDODQLPSRUWDQWIRUXPIRUOHDUQLQJDQG GHYHORSLQJNQRZOHGJHDERXWF\EHUVSDFHLQWHOOLJHQFHDQGVHFXULW\

'U*DEL6LERQL

Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017 3

Jointness in Intelligence Organizations: Theory Put into Practice

Kobi Michael, David Siman-Tov, and Oren Yoeli

Jointness—a concept popular in recent decades in military, intelligence, and civilian systems—represents a change in the way organizations function in a complex and challenging environment, which is characterized by a networked structure, or multiple connections among various entities. The most striking difference between cooperation and jointness is the process of fusion, which is typical of jointness. While cooperation preserves distinct organizational settings, authority, and areas of responsibility, in jointness we see new organizational formats, which represent a synergy that is greater than the sum of all the existing capabilities. This essay focuses on jointness in intelligence. New ways of thinking over the past years have led to the breakdown of the compartmentalizing of intelligence organizations and have given rise to models of jointness within intelligence organizations, military forces, and civilian entities so that they can carry out complex missions. This essay surveys the theoretical and practical development of the concept of jointness and presents four archetypes of jointness, based on several Israeli and American case histories. These case histories indicate that jointness has not always been applied accurately. The success of jointness depends upon several essential components that may be defined as its ecology. The most prominent is organizational freedom, which provides the space where it is possible and, indeed, recommended to provide autonomy to

Dr. Kobi Michael is a senior research fellow at INSS. David Siman-Tov is a research fellow at INSS. Oren Yoeli is an intern at INSS.

Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017 5 KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

6 various working echelons; this autonomy allows for flexibility and creativity even if it deviates from familiar modes of action.

Keywords: jointness, the intelligence community, intel, learning processes

Introduction 7KHFRQFHSWRIMRLQWQHVVSRSXODULQUHFHQWGHFDGHVLQPLOLWDU\LQWHOOLJHQFH | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | DQGFLYLOLDQV\VWHPVUHSUHVHQWVDFKDQJHLQWKHZD\RUJDQL]DWLRQVRSHUDWHLQ DFRPSOH[DQGFKDOOHQJLQJHQYLURQPHQW7KLVHQYLURQPHQWLVFKDUDFWHUL]HG E\DQHWZRUNHGVWUXFWXUHWKDWLVPXOWLSOHFRQQHFWLRQVDPRQJHQWLWLHV -RLQWQHVVLVGLVWLQJXLVKHGIURPFRRSHUDWLRQE\WKHSURFHVVRIIXVLRQ:KLOH FRRSHUDWLRQSUHVHUYHVGLVWLQFWRUJDQL]DWLRQDOVHWWLQJVDXWKRULW\DQGDUHDV RIUHVSRQVLELOLW\LQFRQWUDVWWKHSURFHVVRIIXVLRQLQMRLQWQHVVFUHDWHVQHZ RUJDQL]DWLRQDOIRUPDWVDQGV\QHUJ\WKDWLVJUHDWHUWKDQWKHVXPRIDOOWKH

Cyber, Intelligence, and Security Security and Intelligence, Cyber, H[LVWLQJFDSDELOLWLHV*HQHUDOO\VSHDNLQJRUJDQL]DWLRQVVK\DZD\IURP MRLQWQHVV\HWLQDUHDOLW\FKDUDFWHUL]HGE\FULVHVDQGFRPSHWLWLRQLQZKLFK RUJDQL]DWLRQV¿QGWKHPVHOYHVWKUHDWHQHGDQGYXOQHUDEOHWRIDLOWKHLULQDELOLW\ WRSURGXFHDQHIIHFWLYHUHVSRQVHWRWKHWKUHDWVDQGFKDOOHQJHVXOWLPDWHO\ VWUHQJWKHQVWKHLUZLOOLQJQHVVWRHQJDJHLQMRLQWQHVV 7KLVHVVD\IRFXVHVRQMRLQWQHVVLQLQWHOOLJHQFHKDYLQJGHYHORSHGDVQHZ DSSURDFKHVFROODSVHGWKHERXQGDULHVDQGVHSDUDWLRQEHWZHHQLQWHOOLJHQFH RUJDQL]DWLRQVZKLFK²DORQJVLGHKLVWRULFDOULYDOULHVRYHUSUHVWLJHDQG FRPSHWLWLYHQHVV²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| JOINTNESS IN INTELLIGENCE ORGANIZATIONS

7 UHVHDUFKHUVRQWKHFRQFHSWWKHHVVD\ZLOOVHHNWRH[SDQGXSRQWKHH[LVWLQJ WKHRUHWLFDOGHEDWHDERXWMRLQWQHVV)LQDOO\WKHHVVD\GHVFULEHVDQGDQDO\]HV YDULRXVPRGHOVRIMRLQWQHVVLQWKHLQWHOOLJHQFHFRPPXQLW\²VSHFL¿FDOO\LQ FRQWH[WVUHTXLULQJWKHXVHRIIRUFH²HVSHFLDOO\LQWKH8QLWHG6WDWHVDQGLQ DPRUHOLPLWHGZD\LQ,VUDHOLQDQHIIRUWWRXQGHUVWDQGLIMRLQWQHVVLQWKH LQWHOOLJHQFHFRPPXQLW\LVGLVWLQFWLYH

The Development of the Concept of Jointness

The Military 2017 January | 1 No. | 1 Volume | 7KHLGHDRIMRLQWQHVVGHYHORSHGLQWKH$PHULFDQGHIHQVHHVWDEOLVKPHQWLQ WKHODWHV 1,QWKHVWKHWHUP³MRLQWQHVV´ZDVFRLQHGWRGHVFULEH DFWLRQVRSHUDWLRQVDQGRUJDQL]DWLRQVLQZKLFKHQWLWLHVEHORQJLQJWRWZRRU PRUHEUDQFKHVRIWKHDUPHGIRUFHVWRRNSDUW 28QWLOWKHVWKHFRPPDQG VWUXFWXUHRIWKH86PLOLWDU\IRUFHVZDVVSOLWDPRQJ¿YHEUDQFKHVHDFK FRPSOHWHO\LQGHSHQGHQWLQWHUPVRIGHYHORSLQJGRFWULQHPDQSRZHUDQG

HTXLSPHQW%DWWOHVRYHUEXGJHWVWRRNSODFHDPRQJWKHEUDQFKHVRIWHQOHDGLQJ Security and Intelligence, Cyber, WRLUUDWLRQDO¿QDQFLDODOORFDWLRQVEDVHGRQVL]HRIDSDUWLFXODUEUDQFKDQGDOVR WRDQLQFUHDVHLQWKHRYHUDOOGHIHQVHVSHQGLQJ 3,IRQHEUDQFKH[SHULHQFHG DSUREOHPRIUHVRXUFHVLWZRXOGSUHIHUWRKDQGOHLWE\OREE\LQJ&RQJUHVV UDWKHUWKDQE\FRRSHUDWLQJDQGXVLQJH[LVWLQJUHVRXUFHVDOUHDG\GHYHORSHG LQDGLIIHUHQWEUDQFK 4 ,QWKH*ROGZDWHU1LFKROV'HSDUWPHQWRI'HIHQVH5HRUJDQL]DWLRQ $FWZDVSDVVHGWRUHVROYHWKHGLI¿FXOWLHVGHVFULEHGDERYH 57KHDFWEURXJKW VZHHSLQJFKDQJHVWRWKHFRPPDQGVWUXFWXUHRIWKH86PLOLWDU\E\VWUHQJWKHQLQJ WKHFRQFHSWRIMRLQWQHVVWKHDXWKRULW\DQGUHVSRQVLELOLW\IRUIRUFHFRQVWUXFWLRQ ZDVWUDQVIHUUHGIURPWKHEUDQFKFRPPDQGHUVWRWKHMRLQWFKLHIVRIVWDIIDQG JHRJUDSKLFDOFRPPDQGVDQGWKH6SHFLDO)RUFHVFRPPDQGZHUHHVWDEOLVKHG,Q WKH¿UVW86PLOLWDU\GRFWULQHUHIHUULQJLQDGHWDLOHGDQGFRPSUHKHQVLYH PDQQHUWRMRLQWQHVVZDVLVVXHGLQFRQMXQFWLRQZLWKWKHLPSOHPHQWDWLRQRI WKH*ROGZDWHU1LFKROV$FW 7KHGRFWULQHVHWRXWJXLGHOLQHVIRUWKHDUPHG IRUFHVRQDSSO\LQJMRLQWQHVVLQDYDULHW\RIZD\VLQRUGHUWRDWWDLQRSWLPDO HIIHFWLYHQHVV 77KHSXEOLFDWLRQDQGLPSOHPHQWDWLRQRIWKHGRFWULQHOHGWRWKH HVWDEOLVKPHQWRIVHYHUDOUHVHDUFKFHQWHUVZKLFKGHYHORSHGMRLQWVWUDWHJLHV EDWWOHSODQVDQGWUDLQLQJ7KH¿UVWZDULQ,UDTKRZHYHUKLJKOLJKWHGWKH GH¿FLHQFLHVRIMRLQWQHVVDPRQJWKHYDULRXVIRUFHVUHYHDOLQJWKHJDSVEHWZHHQ WKHZULWWHQGRFWULQHVWKDWVWUHVVHGVHSDUDWHDFWLYLW\DQGWKHLQWHUIDFHVWKDW KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

8 UHTXLUHGDKLJKGHJUHHRIMRLQWQHVVDQGDVDUHVXOWFDWDO\]HGWKHGHYHORSPHQW RIFRRSHUDWLYHGRFWULQHVWKDWSURPRWHGWKHMRLQWQHVVDSSURDFK 

The Civilian Sphere 6HYHUDO\HDUVDIWHUWKHGHYHORSPHQWRIMRLQWQHVVLQWKH$PHULFDQPLOLWDU\ WKHFRQFHSWJDLQHGDFFHSWDQFHZLWKLQWKHFLYLOLDQDQGFRUSRUDWHVSKHUHV &KDQJHVLQPDQDJHPHQWDQGLQIRUPDWLRQWHFKQRORJLHVOHGWRWKHGHYHORSPHQW RILPSRUWDQWWKHRULHVDQGDSSOLFDWLRQV7KHF\EHUVSDFHUHYROXWLRQHQDEOHG

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | EXVLQHVVHVWRKDUQHVVDGYDQFHGFRPSXWHUDSSOLFDWLRQVIRUWKHLUQHHGVVSHHG XSSURFHVVLQJPHWKRGVFXWFRVWVDQGPDNHLQIRUPDWLRQDQGNQRZOHGJH DFFHVVLEOHWRDOO$WWKHVDPHWLPHWKHDFFHOHUDWLRQRI5 'SURFHVVHVDQG WUDGHDQGFRRSHUDWLRQDPRQJRUJDQL]DWLRQVDQGQDWLRQVFRQWULEXWHGWRWKH GHFOLQLQJVWDWXVRIWKHODUJHEXVLQHVVRXW¿WVZKLFKZHUHPDQDJHGLQD WUDGLWLRQDOKLHUDUFKLFDODQGFHQWUDOL]HGIDVKLRQDQGWRWKHLQFUHDVLQJSUHVWLJH RIWKHPRUHDJLOHDQGG\QDPLFEXVLQHVVHVFKDUDFWHUL]HGE\VPDOOVWDIIVDQG LQGHSHQGHQWGLYLVLRQVWKDWPDQDJHQHWZRUNVRIUHODWLRQVKLSV7KHWUDGLWLRQDO Cyber, Intelligence, and Security Security and Intelligence, Cyber, VWUXFWXUHW\SLFDORIRUJDQL]DWLRQVIRUPRVWRIWKHWZHQWLHWKFHQWXU\JUDGXDOO\ PDGHZD\IRUDÀDWWHUPRUHGHFHQWUDOL]HGQHWZRUNHGDQGG\QDPLFPRGHO VWUHVVLQJLWVPDQ\LQWHUVHFWLQJUHODWLRQV 9 7KHPRVWVXFFHVVIXOFRPSDQLHVZHUHWKHPRVWFRRSHUDWLYHRQHVDJURZLQJ VHJPHQWRIEXVLQHVVDFWLYLW\DURXQGWKHZRUOGLVQRZFDUULHGRXWFRRSHUDWLYHO\ ZLWKLQDQRUJDQL]DWLRQDVZHOODVEHWZHHQRUJDQL]DWLRQV3URFHVVHVRI PDQXIDFWXULQJDQGGHYHORSPHQWLQPDQ\LQGXVWULHV WHFKQRORJ\PDUNHWLQJ ELRPHGLFLQHDQGPRUH KDYHEHFRPHLQFUHDVLQJO\FRPSOH[PDNLQJDORQH RUJDQL]DWLRQ¶VDWWHPSWWRKDQGOHWKHVHSURFHVVHVLQGHSHQGHQWO\YLUWXDOO\ LPSRVVLEOH)RUH[DPSOHWKHGHYHORSPHQWRILQIRUPDWLRQV\VWHPVDWSUHVHQW FDQQRWEHFDUULHGRXWDVDQLQGHSHQGHQWSURFHVV&RPSHWLQJFRPSDQLHV SUHIHUWRLQFRUSRUDWHH[WHUQDOVHUYLFHVLQWKHLUSURGXFWVLQVWHDGRIHQJDJLQJ LQLQGHSHQGHQWGHYHORSPHQWZKLFKZRXOGUHTXLUHWKHPWRPHHWFRQVWDQWO\ FKDQJLQJVWDQGDUGV 10

Developments in the Theory of Jointness =YL/DQLUZKRZRUNHGRQGHYHORSLQJWKHQRWLRQRIMRLQWQHVVLQPLOLWDU\ RUJDQL]DWLRQVGH¿QHGLWDV³FUHDWLQJDQHZV\VWHPLFFDSDELOLW\EDVHG RQWKHIXVLRQRIWKHXQLTXHDVVHWVRIWKHGLIIHUHQWHQWLWLHVDQGHYLQFLQJ DGHHSHUFRQQHFWLRQWKDQFRRUGLQDWLRQRUFRRSHUDWLRQ´ 11 /DQLUFODVVL¿HV KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

9 MRLQWDFWLYLWLHVLQDKLHUDUFKLFPDQQHUDFFRUGLQJWRWKHTXDOLW\DQGGHSWKRI V\VWHPLFLQÀXHQFHWKDWWKH\DFKLHYHZLWKLQWKHPLOLWDU\FRQWH[W$FFRUGLQJ WR/DQLULWLVQHFHVVDU\WRGLVWLQJXLVKEHWZHHQWKHWHUPV³FRRUGLQDWLRQ´ ³FRRSHUDWLRQ´DQG³MRLQWQHVV´ZKHUHHDFKLQWHUIDFHFKDUDFWHUL]HVDGLIIHUHQW OHYHORIUHODWLRQVKLSEHWZHHQHQWLWLHV/DQLUGH¿QHV³FRRUGLQDWLRQ´DV³D OHYHORILQWHUIDFHDOORZLQJ>RUJDQL]DWLRQV@WRDWWDLQV\VWHPLF HI¿FLHQF\ E\ DVWDQGDUGL]DWLRQRISURFHVV´VXFKDVFRRUGLQDWLRQRIWLPHORFDWLRQDQG LQWHQVLW\EHWZHHQDSLQQLQJIRUFHDQGDVWULNHIRUFHGXULQJEDWWOH/DQLU

UDQNVFRRSHUDWLRQRQHUXQJDERYHFRRUGLQDWLRQ+HDUJXHVWKDWLQRUGHU 2017 January | 1 No. | 1 Volume | WRDWWDLQV\VWHPLFHIIHFWLYHQHVV UHOHYDQFH LWLVQRWHQRXJKWRHQJDJHLQ FRRUGLQDWHGV\VWHPLFWKLQNLQJ:KLOHLWDOORZVIRUFHVWRDFWHI¿FLHQWO\LW GRHVQRWJXDUDQWHHWKHGHVLUHGHIIHFWYLVjYLVWKHHQHP\(YHU\FDPSDLJQ KDVLWVRZQXQLTXHIHDWXUHVDQGHYHU\HQHP\UHTXLUHVXQLTXHV\VWHPLF XQGHUVWDQGLQJ³&RRSHUDWLYHV\VWHPLFWKLQNLQJ´UHSUHVHQWVWKHLQWHUIDFH RIFRRSHUDWLRQGXULQJZKLFKWKHUDWLRQDOHRIWKHRSSRQHQW¶VV\VWHPLV

FRQFHSWXDOL]HG Security and Intelligence, Cyber, /DQLUSODFHVMRLQWQHVVDERYHERWKFRRUGLQDWLRQDQGFRRSHUDWLRQ 12 /DQLUH[SODLQVWKDWWKHREMHFWLYHRIMRLQWQHVVLVWRHQVXUHWKDWWKHV\VWHPLF HIIHFWLYHQHVVZLOOFRQWLQXHHYHQXQGHUFKDQJLQJFLUFXPVWDQFHVWKHUHOHYDQFH RIDV\VWHPFDQEHPDLQWDLQHGRQO\LIWKHV\VWHPLVG\QDPLFDQGLIDOOWKH HFKHORQVRIWKHGLIIHUHQWHQWLWLHVDUHLQYROYHGLQGHYHORSLQJNQRZOHGJH7KH QHZNQRZOHGJHLVFUHDWHGLQWKHHQFRXQWHUEHWZHHQWKHGLIIHUHQWHQWLWLHVDQG UHVXOWVLQRQJRLQJRUJDQL]DWLRQDOWUDQVIRUPDWLRQ7KHNQRZOHGJHLVFUHDWHG LQWKH³QRPDQ¶VFRJQLWLYH]RQH´WKHYDFXRXVVSDFHRXWVLGHRIWKHGRPDLQ WKDWDVLQJOHHQWLW\FDQHQFRPSDVVFRJQLWLYHO\DQGH[FOXVLYHO\/DQLUUHIHUV WRWKHNQRZOHGJHFUHDWHGLQWKLV]RQHDV³MRLQWV\VWHPLFWKLQNLQJ´ 13 (IURQ5D]LDQG3LQKDV

10 HFKHORQVDJRRGÀRZRILQIRUPDWLRQHQDEOHVWKHRUJDQL]DWLRQWRFRQVWUXFW SURFHVVHVIURPWKHERWWRPXSUDWKHUWKDQEHLQJWKHUHVXOWRIFHQWUDOL]HG SODQQLQJIURPWKHWRSGRZQ 7KHLGHDVGHVFULEHGDERYHFXUUHQWO\VKDSHWKHSHUFHSWLRQRIMRLQWQHVV LQERWKWKH86PLOLWDU\DQGWKH,VUDHO'HIHQVH)RUFHV ,') DQGFRQVWLWXWH DFHQWUDOFRPSRQHQWRIWKHLUDSSURDFKHV7KLVLVSDUWLFXODUO\WUXHRIWKH86 DUP\ZKLFKVLQFHWKHHDUO\VKDVSHUFHLYHGMRLQWQHVVDVIXQGDPHQWDO WRLWVVWUDWHJ\  ZKLOHGLVWLQJXLVKLQJEHWZHHQWKHFRQFHSW¶VGLPHQVLRQVDQG

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | LWVLPSOHPHQWDWLRQ 17 6LPLODUO\WKH,')GLVWLQJXLVKHVEHWZHHQMRLQWQHVVDV DQDFWLRQRUDSURFHVVUHVXOWLQJIURPDQDFWLRQDQGMRLQWQHVVDVDFRQFHSW DQGDVSDUWRIRUJDQL]DWLRQDOFXOWXUH 

The Dimensions and Stages of Jointness -RLQWQHVVLVIXQGDPHQWDOO\DSURFHVVRIFRQWLQXRXVOHDUQLQJDQGKDVWZR PDMRUGLPHQVLRQVWKHFRJQLWLYHDQGWKHRUJDQL]DWLRQDO-RLQWQHVVWDNHVSODFH LQWKUHHVWDJHVGHVLJQSODQQLQJDQGLPSOHPHQWDWLRQ 19 The literature tends Cyber, Intelligence, and Security Security and Intelligence, Cyber, WRGLVWLQJXLVKEHWZHHQWZRPDLQW\SHVRIOHDUQLQJFDXVDOOHDUQLQJRFFXUULQJ ZKHQQHZLQIRUPDWLRQOHDGVWRDFKDQJHLQPHDQVDQGPHWKRGVDQGGLDJQRVWLF OHDUQLQJZKLFKVWHPVIURPXQGHUVWDQGLQJWKHWHQVLRQEHWZHHQYDOXHVDQG FRQFHSWVDQGUHVXOWVLQFKDQJHVERWKLQWKHREMHFWLYHVDVZHOODVWKHPHDQV RIDWWDLQLQJWKHP&DXVDOOHDUQLQJPD\DOVREHGH¿QHGDVWDFWLFDOOHDUQLQJ FKDUDFWHUL]HGE\DGDSWLQJDQGDGMXVWLQJZKHUHDVGLDJQRVWLFOHDUQLQJFDQ DOVREHGH¿QHGDVVWUDWHJLFOHDUQLQJZKLFKDWLWVFRUHLVDUHVWUXFWXUHGYLHZ RIUHDOLW\,QFRJQLWLYHWHUPVWDFWLFDOOHDUQLQJFDQEHVHHQDVDQXSGDWHRI H[LVWLQJFRJQLWLYHVWUXFWXUHVUHVXOWLQJLQDGDSWDWLRQDQGDGMXVWPHQWDQG VWUDWHJLFOHDUQLQJFDQEHSHUFHLYHGDVDFKDQJHLQFRJQLWLYHVWUXFWXUHVDQG WKHLUH[SDQVLRQOHDGLQJWRDFKDQJHLQDWWLWXGHVDQGEHOLHIV 20 $WWKHEDVLVRIWKHVWUDWHJLFOHDUQLQJSURFHVVLVWKHFRQFHSWRI³GHVLJQ´ DVDQDEVWUDFWFRJQLWLYHSURFHVVLQZKLFKWKHFRQFHSWXDOIUDPHZRUNLV IRUPXODWHG$WWKHGHVLJQVWDJHH[LVWLQJSDUDGLJPVDUHFKDOOHQJHGXSGDWHG RUUHSODFHGDQGDQHZYLVLRQLVIRUPHG7KHGHVLJQVWDJHUHVWVRQDYLVLRQ WKDWUHODWHVWRDQVZHULQJWKHTXHVWLRQ³:KDWGRZHZDQWWRGHVLJQ"´,W UHODWHVWRPDNLQJGHFLVLRQVDQGVHWWLQJDJHQHUDOGLUHFWLRQWKDWSURYLGHV PHDQLQJWRWKHSURFHVV7KHYLVLRQLVVHHPLQJO\GLVFRQQHFWHGIURPWKH PDWHULDORUSUDFWLFDOWHUUDLQZKLFKLVOLPLWHGWRD¿[HGWRWDORIUHVRXUFHV KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

11 DQGLWFKDOOHQJHVWKHRUJDQL]DWLRQWRWKLQNDERXWVROXWLRQVWKDWWUDQVFHQG WKHVHOLPLWDWLRQV &RJQLWLRQLVERWKDVWDJHRIMRLQWQHVVDVZHOODVDQRXWSXW VXFKDV RUJDQL]DWLRQDOXQGHUVWDQGLQJ ZLWKLQDZLGHUHDFKLQJRUJDQL]DWLRQDOSURFHVV ,WLVDOVRDQRXWFRPHRIFRJQLWLYHMRLQWQHVVLQWKHVHQVHRIMRLQWQHVVDWWKH VWDJHRIIRUPXODWLQJDQGGHVLJQLQJDFRQFHSWVXFKDVFRJQLWLYHVWUXFWXULQJ WRLQWHUSUHWUHDOLW\7KHUHIRUHLWZRXOGEHFRUUHFWWRFRQFHSWXDOL]HFRJQLWLRQ DV³FRJQLWLYHMRLQWQHVV´&RJQLWLYHMRLQWQHVVLVPDQLIHVWHGE\MRLQWLQWHUIDFHV

DQGVKDUHGWKRXJKWSURFHVVHVDPRQJGLUHFWRUVRIRUJDQL]DWLRQVZKRDQDO\]H 2017 January | 1 No. | 1 Volume | DQGUHWKLQNWKHFKDOOHQJHVWKDWWKHLURUJDQL]DWLRQVIDFHDQGDOVRGH¿QH VKDUHGYDOXHV7KLVHQFRXQWHUEHWZHHQRUJDQL]DWLRQVDEXWVXSRQWKHLQWHU RUJDQL]DWLRQDOVSDFHDOORZLQJIRUWKHFUHDWLRQRIQHZNQRZOHGJHLQWKHDUHDV RXWVLGHWKHRUJDQL]DWLRQDO]RQHVRIWKRXJKW WKHVRFDOOHG³QRPDQ¶VFRJQLWLYH ]RQHV´ &RJQLWLRQDWWKHGHVLJQVWDJHRFFXUVE\PHDQVRIGLDJQRVWLFVWUDWHJLF OHDUQLQJSURFHVVHVDQGFRQVLVWVRIFKDOOHQJLQJH[LVWLQJSDUDGLJPVEULQJLQJ

WKHPXSWRGDWHRUUHSODFLQJWKHP Security and Intelligence, Cyber, ,QFRQWUDVWWRFRJQLWLYHMRLQWQHVVRUJDQL]DWLRQDOMRLQWQHVVLVPDQLIHVWHG E\VKDUHGLQWHUIDFHVDQGFRRSHUDWLYHZRUNDPRQJRUJDQL]DWLRQV,WLQFOXGHV VKDUHGRUJDQL]DWLRQDOVWUXFWXUHVZRUNLQJSURFHVVHVDQGWKHRUJDQL]DWLRQDO FOLPDWH ³HFRORJ\´ ZKLFKDOORZVHYHUDORUJDQL]DWLRQVRUIUDPHZRUNVWR RSHUDWHLQDV\QFKURQL]HGPDQQHUDQGPD[LPL]HWKHLUFDSDELOLWLHV²FUHDWLQJ DZKROHWKDWLVJUHDWHUWKDQWKHVXPRILWVSDUWV²DQGFRQFXUUHQWO\KHOSLQJ WRSURPRWHVKDUHGREMHFWLYHV2UJDQL]DWLRQDOMRLQWQHVVLVDOVRQHHGHGIRU IRUFHEXLOGLQJLQWHUPVRIWUDLQLQJSHUVRQQHODQGFUHDWLQJRUJDQL]DWLRQDO LQIUDVWUXFWXUHVWKDWHI¿FLHQWO\PD[LPL]HUHVRXUFHVDQGFDSDELOLWLHVDVD¿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¿QLWLRQVRUQHZSURIHVVLRQDOZD\VRIORRNLQJDWWKLQJVZKLFKPD\DIIHFW WKHZRUNRIH[LVWLQJSRVLWLRQKROGHUVDVZHOODVGH¿QLQJWKHFRPSRQHQWV QHHGHGWRFUHDWHDMRLQWHFRORJ\2UJDQL]DWLRQDOMRLQWQHVVVKRXOGDOVRLQFOXGH KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

12 WKHLPSOHPHQWDWLRQVWDJHZKLFKLVIRUPXODWHGGXULQJWKHSODQQLQJVWDJH 7KHLPSOHPHQWDWLRQVWDJHLVHVVHQWLDOWRRUJDQL]DWLRQDOMRLQWQHVVDVLWLVD UHDOWHVWRIWKHRUJDQL]DWLRQVLQGHDOLQJZLWKFKDOOHQJHV'XULQJWKH¿QDO VWDJHWKHOHDUQLQJSURFHVVLVVLPSOHOHDUQLQJDQGFRQVLVWVRIDGDSWLQJSODQV PHDQVRURUJDQL]DWLRQDODVSHFWVGXHWRDQH[SHFWHGFKDOOHQJHDQGRQWKH EDVLVRIDQH[LVWLQJSDUDGLJPRUFRQFHSW 'LDJUDPEHORZGHVFULEHVWKHGLPHQVLRQVRIMRLQWQHVV FRJQLWLYHDQG RUJDQL]DWLRQDO DVWKH\DUHPDQLIHVWHGDWHDFKRIWKHGLIIHUHQWVWDJHV GHVLJQ

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | SODQQLQJDQGLPSOHPHQWDWLRQ ZKLOHUHODWLQJWRWKHSURFHVVRIOHDUQLQJ DWHDFKVWDJH&RJQLWLYHMRLQWQHVVLVUHDOL]HGDWWKHGHVLJQVWDJHZKHUHDV RUJDQL]DWLRQDOMRLQWQHVVLVUHTXLUHGWKURXJKRXWDOORIWKHVWDJHV Cyber, Intelligence, and Security Security and Intelligence, Cyber,

Diagram 1: Jointness as a Learning Process—Dimensions and Stages

$V'LDJUDPGHPRQVWUDWHVHDFKVWDJHRIMRLQWQHVVJHQHUDWHVSURFHVVHVRI OHDUQLQJZKLFKDOORZWKHUHDOL]DWLRQRIWKHQH[WVWDJH7KH¿QDOVWDJHRI MRLQWQHVV²LPSOHPHQWDWLRQ²LVWKHVWDJHZKHUHZHFDQH[SHFWWRHQFRXQWHU DOOWKHSUREOHPVDQGFKDOOHQJHV'XULQJWKH¿QDOVWDJHWKHSURFHVVRIVLPSOH OHDUQLQJOHDGVWRFKDQJLQJSODQVPHDQVRURUJDQL]DWLRQDODVSHFWVZKLOH KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

13 WKHSURFHVVRIFRPSOH[OHDUQLQJLVQHHGHGIRUPXFKJUHDWHUSUREOHPVRU FKDOOHQJHVDQGHQDEOHVWKHEURDGHUFRQFHSWXDOIUDPHZRUNWREHUHH[DPLQHG

Transition from Crisis to the Relevance and Importance of the Organizational Ecology -RLQWQHVVPD\EHIUDPHGDVDSURFHVVWKDWEHJLQVZLWKDFULVLVSURJUHVVHV LQWRDFRQFHSWXDORUJDQL]DWLRQDODQGRSHUDWLRQDOGHYHORSPHQWDQGOHDGVWR LPSURYLQJWKHRUJDQL]DWLRQ¶VUHOHYDQFHLQIDFLQJSUREOHPVDQGFKDOOHQJHV

LQLWV¿HOG7KHVXFFHVVRIWKHSURFHVVDOVRGHSHQGVRQWKHRUJDQL]DWLRQ¶V 2017 January | 1 No. | 1 Volume | HFRORJ\DQGHQYLURQPHQW

First Stage: Crisis &ULVHVDUHWKHIDFWRUWKDWJHQHUDWHRUJDQL]DWLRQDOSURFHVVHVDOORZLQJIRUWKH GHYHORSPHQWRIMRLQWQHVVDVDFRQFHSWDQGPHWKRGRIDFWLRQ7KHOLWHUDWXUH GH¿QHVDFULVLVDVDVLWXDWLRQLQZKLFKDFKDQJHDSSHDUVDVWKHUHVXOWRID VXGGHQHYHQWDVKDUSFKDQJHLQWUHQGGLUHFWLRQRUWLPH,QVXFKDFDVH Cyber, Intelligence, and Security Security and Intelligence, Cyber, DQRUJDQL]DWLRQQHHGVWRUHDVVHVVWKHVLWXDWLRQLQRWKHUZRUGVLWQHHGVWR UHFRQVLGHUWKHWKUHDWVYDOXHVDQGREMHFWLYHVRIWKHSOD\HUVLQYROYHG7KH FKDQJHPD\OLHLQWKHLQWHUQDORUH[WHUQDOHQYLURQPHQWDQGWKHWKUHDWPD\EH DLPHGDWWKHRUJDQL]DWLRQ¶VKLJKO\SULRULWL]HGREMHFWLYHVRUDWLWVEDVLFYDOXHV 21 $WWKHEHJLQQLQJRIWKHFULVLVWKHRUJDQL]DWLRQPDQLIHVWVDNLQGRI³VWUDWHJLF KHOSOHVVQHVV´H[SUHVVLQJWKHJDSEHWZHHQWKHRUJDQL]DWLRQ¶VUHOHYDQFHDQG WKHHQYLURQPHQW¶VFKDOOHQJHVWKDWLVWKHRUJDQL]DWLRQH[SUHVVHVLWVLQDELOLW\ WRFRSHZLWKQHZSUREOHPVDQGIRUPXODWHUHVSRQVHVWRFKDOOHQJHVJLYHQWKH RUJDQL]DWLRQ¶VH[LVWLQJXQGHUVWDQGLQJUHVRXUFHVDQGFDSDELOLWLHV 22

Second Stage: Systemic Learning $IWHUUHFRJQL]LQJDFULVLVRUWKHGHVLUHWRDYRLGDQLPSHQGLQJFULVLVWKH RUJDQL]DWLRQQHHGVWRXQGHUWDNHFRPSOH[OHDUQLQJSURFHVVHVLQRUGHUWRIRUP WKHFRQFHSWXDOIUDPHZRUNVRWKDWLWFDQDGGUHVVWKHFULVLVVLPSOHOHDUQLQJ SURFHVVHVGHVLJQHGWRDOORZRUJDQL]DWLRQVWRDGMXVWDFWLRQPHWKRGVEDVHG RQLWVSUHVHQWNQRZOHGJHDUHLQVXI¿FLHQW:KHQVHYHUDOSDUWLHVIURPD QXPEHURIRUJDQL]DWLRQVMRLQWO\FDUU\RXWWKLQNLQJDQGOHDUQLQJSURFHVVHV WKH\UHDOL]HWKDWWKHEDVHVRINQRZOHGJHDQGSDUDGLJPVRIHDFKRUJDQL]DWLRQ DUHLQVXI¿FLHQWWRGHYHORSVLJQL¿FDQWLQVLJKWVWKLVUHDOL]DWLRQFDQEH GH¿QHGDVFRJQLWLYHMRLQWQHVV7KHFRPSOH[OHDUQLQJSURFHVVUHH[DPLQHV KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

14 WKHRUJDQL]DWLRQLWVREMHFWLYHVWKHLPSDFWLWVHHNVDQGWKHHQYLURQPHQW LQZKLFKLWRSHUDWHV2QHSRVVLEOHPHDQVRIUHVROYLQJWKHRQJRLQJFULVLV LVWKURXJKRUJDQL]DWLRQDOMRLQWQHVVDOWKRXJKLWLVQRWWKHRQO\PHDQV,Q RUGHUWRSURPRWHMRLQWQHVVDVDVROXWLRQWKHRUJDQL]DWLRQVPXVWUHFRJQL]H MRLQWQHVVDVKDYLQJWKHSRWHQWLDOWRSURYLGHDPXWXDOUHZDUGWKDWLVJUHDWHU WKDQWKHRQHSURGXFHGE\VHSDUDWHLQGLYLGXDODFWLRQV

Third Stage: Organizational Processes and Ecology

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | 7KHVXFFHVVRIWKHSURFHVVHVDQGSODQRIDFWLRQWKDWDUHEDVHGRQQHZLQVLJKWV DQGNQRZOHGJHDUHDIIHFWHGE\YDULRXVFRQGLWLRQVRIWKHRUJDQL]DWLRQDO DQGLQWHURUJDQL]DWLRQDOHFRORJ\LQFOXGLQJZRUNLQJQRUPVRUJDQL]DWLRQDO G\QDPLFVWUXVWDPRQJWKHSOD\HUVDQGWKHH[WHQWRIDXWRQRP\JLYHQWRWKH YDULRXVHFKHORQV$OWKRXJKWKHLQFXEDWLRQSURFHVVHVRIWKHRUJDQL]DWLRQDO HFRORJ\FDQEHJLQIURPWKHERWWRPXSLWVFRPSOHWLRQDQGLQVWLWXWLRQDOL]DWLRQ PXVWWDNHSODFHIURPWKHWRSGRZQ:LWKRXWWKHVXSSRUWHQFRXUDJHPHQW

Cyber, Intelligence, and Security Security and Intelligence, Cyber, DQGSHUPLVVLRQRIWKHRUJDQL]DWLRQ¶VPDQDJHPHQWLWLVLPSRVVLEOHWRUHVKDSH DQRUJDQL]DWLRQ¶VHFRORJ\ -RLQWQHVVLVIHDVLEOHRQO\ZKHQWKHLQIRUPDWLRQÀRZVIUHHO\EHWZHHQDQG ZLWKLQRUJDQL]DWLRQV7KHUHIRUHWKHPDQDJHPHQWPXVWSURYLGHVWDIIZLWK WKHDXWRQRP\WRGHYHORSMRLQWLQWHUIDFHVDQGDOORZWKHÀRZRIRSHQDQG IUHHLQIRUPDWLRQLQWKHLQWHURUJDQL]DWLRQDOVSDFH7KHVLGHVSDUWLFLSDWLQJ LQWKHMRLQWLQWHUIDFHZLOOEHZLOOLQJWRWDNHULVNVLIWKH\H[SHFWSRVLWLYH EHKDYLRUIURPWKHRWKHUSDUWLFLSDQWVWUXVWLVDIXQFWLRQRIH[SHFWDWLRQDQG RIWKHZLOOLQJQHVVWRWDNHULVN 23 ,QDVLWXDWLRQLQZKLFKWKHVLGHVGRQRWKDYH DQ\VKDUHGKLVWRU\WKH\ZLOOKDYHQRLGHDZKDWWRH[SHFWRIWKHRWKHUSDUW\ DQGWKHVWDUWLQJSRLQWIRUWKHLUUHODWLRQVKLSZLOOEHQHXWUDO6XFKDVLWXDWLRQ UHTXLUHVWKHJUDGXDOEXLOGLQJRIWUXVWE\PHDQVRIHPSRZHULQJDQGUHZDUGLQJ SRVLWLYHEHKDYLRUV 

KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

15

##)"%%! $! "!$%''!#  #&$%

&%#&$%  &$"!&$ $$ 

##)"%%! $! ## ! %''!#  )"%%! $! %' '!# 

$!&% &%#%* 2017 January | 1 No. | 1 Volume | $%#&$%

## !)"%%! $! "!$%''!# 

Diagram 2: Trust as a Function of Expectations 24 !#  -RLQWQHVVUHTXLUHVZRUNLQJQRUPVDQGDVXSSRUWLYHHQYLURQPHQWIRU Cyber, Intelligence, and Security Security and Intelligence, Cyber, LQIRUPDWLRQVKDULQJUHODWLRQVKLSGHYHORSPHQWDQGVKDUHGSURFHVVHVLQZKLFK VHYHUDOSDUWLHVGLYLGHWKHEXUGHQRIZRUN7KHH[WHQWRIDXWRQRP\DPRQJ HPSOR\HHVRSHUDWLQJRQEHKDOIRIDQRUJDQL]DWLRQLQDVKDUHGVHWWLQJDIIHFWV WKHLUDZDUHQHVVRIMRLQWQHVVH[SHULHQFHSURYHVWKDWZKHQHPSOR\HHVHQMR\ DXWRQRP\LWLVHDVLHUWRZRUNWRJHWKHUDQGWREXLOGDZRUNLQJHQYLURQPHQW RIPXWXDOWUXVW 25 ,QDGGLWLRQMRLQWQHVVUHTXLUHVWKDWRUJDQL]DWLRQVWRVRPH H[WHQWIRUJRWKHLURULJLQDOLGHQWLW\DQGFUHDWHDQHZSURIHVVLRQDOLGHQWLW\ RULHQWHGWRZDUGWKHVKDUHGPLVVLRQ7KHUHIRUHLQDGGLWLRQWRWKHDGYDQWDJHV RIEHLQJSDUWRIDQHWZRUNHGDVVRFLDWLRQZKHQIDFLQJFKDOOHQJHVWKHQHZ QHWZRUNVKRXOGDYRLGDOLHQDWLQJLQGLYLGXDOVIURPWKHLUPRWKHURUJDQL]DWLRQV ZKLFKHPSOR\WKHPDQGSURYLGHWKHPZLWKWUDLQLQJDGYDQFHPHQWDQG SURIHVVLRQDOLGHQWLWLHV KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

16

#  

! !   

    &+!!$!  "!&(! " !(# !

'!!    !#!  "! 

$     !!! #  #  " !  !     ! $ '! | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | !  * ! "!" ) *     !! "!   $ $ !& ,%!&.& -   !!$ #   ! 

 Diagram 3: The Jointness Process—From Crisis to Relevance Cyber, Intelligence, and Security Security and Intelligence, Cyber, Jointness in Intelligence Organizations 7KHGHYHORSPHQWRIMRLQWQHVVLQLQWHOOLJHQFHRUJDQL]DWLRQVZDVLQÀXHQFHG E\VLPLODUSURFHVVHVWDNLQJSODFHLQWKHPLOLWDU\DQGWKHEXVLQHVVZRUOG DVZHOODVE\WHFKQRORJLFDOWUDQVIRUPDWLRQVDQGDFFRPSDQ\LQJFKDQJHVLQ LQWHOOLJHQFH)RUH[DPSOH,WDL%UXQZKRVHUYHGDVWKHKHDGRIWKHUHVHDUFK GLYLVLRQLQ,VUDHO¶V0LOLWDU\,QWHOOLJHQFH'LUHFWRUDWHGHVFULEHVWKHVHFKDQJHV DVIROORZV³,QWKLVGD\DQGDJHWKHFHQWUDOLW\RILQIRUPDWLRQWHFKQRORJ\LV VWULNLQJ,QVXFKDZRUOGRQHFDQJDWKHULQWHOOLJHQFHRIDTXDQWLW\DQG TXDOLW\LPSRVVLEOHWRJDWKHULQWKHSDVWWKHQDQDO\]HDQGSURFHVVLWLQWLPH FRQVWDQWVWKDWZHUHHTXDOO\LPSRVVLEOH7KHQHZZRUOGLVEULPPLQJ RYHUZLWKLQIRUPDWLRQOHDGLQJWRFRPSHWLWLRQZLWKRWKHULQIRUPDWLRQDQG NQRZOHGJHSURYLGHUVDQGUHYHDOLQJZHDNQHVVHV´  &KDQJHVLQWKHWHFKQRORJLFDOHQYLURQPHQWDQGLQWHOOLJHQFHFKDOOHQJHV KDYHWUDQVIRUPHGWKHQDWXUHRILQWHOOLJHQFHZRUNDQGWKHRXWSXWVQRZ H[SHFWHG,QWHOOLJHQFHRUJDQL]DWLRQVPXVWQRZVXUYHLOGLVDSSHDULQJWDUJHWV DQGLQFULPLQDWHWKHPDQGIROORZSURFHVVHVWKDWODFNSULRUSODQQLQJRU HYHQDFOHDUDLPDVGH¿QHGE\GHFLVLRQPDNHUV 27 6LPLODUO\WKHLQWHOOLJHQFH FRPPXQLW\LVH[SHFWHGWRKDQGOHLQFLGHQWVLQDVKRUWHUDPRXQWRIWLPH IRU H[DPSOHDVDUHVXOWRIWKHXVHKLJKWUDMHFWRU\ZHDSRQVZKLFKGRQRWUHTXLUH DQ\VSHFLDOSUHSDUDWLRQ ZKLOHWKHLQIRUPDWLRQUHYROXWLRQKDVFRPSHOOHG KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

17 LQWHOOLJHQFHSHUVRQQHOWRKDQGOHDPXFKJUHDWHUYROXPHRILQIRUPDWLRQ DQGNQRZOHGJHWKDQLWGLGLQWKHSDVW  $FFRUGLQJWRDVHQLRUPHPEHURI WKH,VUDHOLLQWHOOLJHQFHFRPPXQLW\VSHDNLQJLQDFORVHGIRUXPWKH,VUDHOL LQWHOOLJHQFHFRPPXQLW\KDVXQGHUJRQHDFKDQJHRIFRQVFLRXVQHVV,QWKLV FRQWH[WWKHLQWHOOLJHQFHFRPPXQLW\KDVLQWHJUDWHGVHYHUDORUJDQL]DWLRQV WRJHWKHULWKDVUHFRJQL]HGWKDWEDUULHUVEHWZHHQLQWHOOLJHQFHJDWKHULQJDQG UHVHDUFKVKRXOGEHEURNHQGRZQDQGKDVFUHDWHGMRLQWLQWHOOLJHQFHVSKHUHV DOORZLQJDFFHVVLELOLW\WRHYHU\SDUWQHURQDQHHGVEDVLV | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | Generating Jointness in Intelligence: Information Systems Management Frameworks )UDPHZRUNVIRUPDQDJLQJWKHLQWHOOLJHQFHFRPPXQLW\KHOSWRSURPRWH MRLQWQHVV E\PHDQVRIV\QFKURQL]LQJWKHYDULRXVFRPPXQLW\PHPEHU RUJDQL]DWLRQV7KHVHRUJDQL]DWLRQVFRPSHWHZLWKRQHDQRWKHUIRUUHVRXUFHV DQGSUHVWLJHRIWHQUHVXOWLQJLQGXSOLFDWLRQDQGUHGXQGDQF\WKDWLVOLDEOHWR GDPDJHWKHLUSRWHQWLDOFRQWULEXWLRQWRWKHFRPPXQLW\ 29 An overall supervising Cyber, Intelligence, and Security Security and Intelligence, Cyber, ERG\FRXOGSURPRWHMRLQWQHVVLQERWKWKHFRJQLWLYHDQGWKHRUJDQL]DWLRQDO ¿HOGV7KLVERG\FRXOGRSHUDWHLQDWRSGRZQSURFHVVWRFUHDWHVWDQGDUGV LQFOXGLQJZRUNLQJQRUPVDQGFRXOGRYHUVHHWKHHVWDEOLVKPHQWRIVKDUHG PLVVLRQGULYHQIUDPHZRUNVWKDWZRXOGDOORZVHYHUDOSDUWLHVWRZRUNWRJHWKHU 7KH2I¿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³'D\3ODQ ,QWHJUDWLRQDQG&ROODERUDWLRQ´IURP7KHSODQ¶VVWDWHGREMHFWLYHZDV WRVWUHQJWKHQWKHSULQFLSOHVRIMRLQWQHVVZLWKLQWKH$PHULFDQLQWHOOLJHQFH FRPPXQLW\LQVHYHUDOZD\V 30 7KHSODQZDVZULWWHQDVSDUWRILPSOHPHQWLQJ WKH$PHULFDQQDWLRQDOLQWHOOLJHQFHVWUDWHJ\LWSUHVHQWVMRLQWQHVVDQGV\VWHP LQWHJUDWLRQDVNH\RUJDQL]DWLRQDOREMHFWLYHVDQGLVXSGDWHGHYHU\IHZ\HDUV 31 ,WGH¿QHVMRLQWQHVVDVDPXOWLSOLHUIRUFHWKDWLVHVVHQWLDOWRWKHIXQFWLRQLQJRI KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

18 DOOUHDOPVRILQWHOOLJHQFHDFWLYLW\ LQIRUPDWLRQWHFKQRORJ\ODQJXDJHDQDO\VLV DVVHVVPHQWDQGPRUH 7KHSODQGLVFXVVHVWKHFUHDWLRQRIFRPPXQLW\ZLGH VWDQGDUGVIRUGLVVHPLQDWLQJLQIRUPDWLRQDQGGRFXPHQWVLQIRUPDWLRQVHFXULW\ DQGDFFHVVLELOLW\WRVRXUFHVZKLOHLWDOVRSURSRVHVWKHFRQVWUXFWLRQRIDVKDUHG XQLIRUPLQWHUIDFHIRUH[WUDFWLQJDQGZRUNLQJZLWKSLHFHVRILQIRUPDWLRQ $QRWKHUSULQFLSOHWKDWWKH'1,SURPRWHVDOVRPHQWLRQHGLQ86LQWHOOLJHQFH VWUDWHJ\SXEOLFDWLRQVLV³PLVVLRQGULYHQLQWHOOLJHQFHZRUNIRUFHV´ 32 This SULQFLSOHDFNQRZOHGJHVWKDWWKHPLVVLRQVKRXOGGHWHUPLQHWKHVWUXFWXUHV

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | E\ZKLFKWKHLQWHOOLJHQFHDFWLYLW\VKRXOGEHRUJDQL]HGDQGQRWDOORZDQ\ IRUPDOGLVWLQFWLRQEHWZHHQDUHDVRIH[SHUWLVHDQGRUJDQL]DWLRQVWRIRLOWKH UHRUJDQL]DWLRQRUWKHFUHDWLRQRIDQLQWHJUDWLYHPLVVLRQGULYHQVHWWLQJ7KLV SULQFLSOHVWUHVVHVWKHQHHGIRUGHFLGLQJRQFRPPXQLW\ZLGHPLVVLRQVDV DQRUJDQL]LQJSULQFLSOHDQGDVWKHEDVLVIRUMRLQWSODQQLQJDQGH[HFXWLRQ ZKLOHWDNLQJRSWLPDODGYDQWDJHRIWKHUHVRXUFHVDQGFDSDELOLWLHVRIHDFK RUJDQL]DWLRQDQGUHGXFLQJDQ\REVWDFOHVEDVHGRQRUJDQL]DWLRQDOGLIIHUHQFHV

Cyber, Intelligence, and Security Security and Intelligence, Cyber, $VLQWKH8QLWHG6WDWHV,VUDHO¶VLQWHOOLJHQFHRUJDQL]DWLRQVDOVRVHHNWR SURPRWHMRLQWQHVVDQGEUHDNGRZQEDUULHUV$NH\VWHSLQWKLVGLUHFWLRQZDVWKH HVWDEOLVKPHQWRIDQRSHUDWLQJGLYLVLRQLQWKH,')¶VLQWHOOLJHQFHEUDQFK²D PRGHUQUHLQFDUQDWLRQRIWKHLQWHOOLJHQFHJDWKHULQJSODWRRQ²DVDUHVXOWRIWKH OHVVRQVRIWKH6HFRQG/HEDQRQ:DU7KHSXUSRVHRIWKLVGLYLVLRQLVWRFUHDWH EHWWHUOLQHVRIFRPPXQLFDWLRQEHWZHHQWKHYDULRXVLQWHOOLJHQFHV\VWHPVLQ WKH,')¶V0LOLWDU\,QWHOOLJHQFH'LUHFWRUDWHDVZHOODVEHWZHHQLQWHOOLJHQFH LQJHQHUDODQGWKHYDULRXVRSHUDWLRQDO¿HOGHFKHORQV7KHRSHUDWLQJGLYLVLRQ LVPHDQWWRVHUYHDVDNLQGRIRSHUDWLRQDOFRPPDQGFHQWHUIRUDOOWKHHQWLWLHV LQWKHLQWHOOLJHQFHEUDQFK,WZDVJLYHQWKHDXWKRULW\WRGLUHFWWKHVSHFLDO RSHUDWLRQDOXQLWVVXERUGLQDWHWRWKH0LOLWDU\,QWHOOLJHQFH'LUHFWRUDWHDOORFDWH LQWHOOLJHQFHJDWKHULQJUHVRXUFHVEDVHGRQFKDQJLQJVLWXDWLRQDODVVHVVPHQWV DQGVWHHUMRLQWSURFHVVHV 33 7KHOHVVRQVRIWKH6HFRQG/HEDQRQ:DUFDXVHGWKH GLYLVLRQWRIRUPXODWHDQHZXQGHUVWDQGLQJRIFRPSDUWPHQWDOL]DWLRQZKLFK DOORZVIDVWHUDQGEHWWHUDVVLPLODWLRQRILQWHOOLJHQFHDPRQJWKH¿JKWLQJIRUFHV 7UDLQLQJLVDQRWKHUVSKHUHWKDWKHOSVWRSURPRWHMRLQWQHVV)RUH[DPSOH LQWKHODWHVWKH,')EHJDQDVHQLRULQWUDVHUYLFHLQWHOOLJHQFHFRXUVH ZKRVHSULPDU\SXUSRVHZDVWRHQFRXUDJHFRRSHUDWLRQE\EULQJLQJWRJHWKHU WKHVHQLRUPHPEHUVRIWKHLQWHOOLJHQFHFRPPXQLW\,QUHFHQW\HDUVWKHFRXUVH KDVEHHQWKRURXJKO\UHYDPSHGDQGQRZIRFXVHVRQFUHDWLQJDQGHQDEOLQJ KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

19 MRLQWQHVVERWKZLWKLQWKHVHQLRUPDQDJHPHQWDQGFRPPDQGHFKHORQVDV ZHOODVZLWKLQWKHSURIHVVLRQDO¿HOGV 34 7KHWHFKQRORJLFDOWUDQVIRUPDWLRQVLQWKHF\EHUHUDKDYHDIIHFWHGJUHDWO\ WKHHFRORJ\QHFHVVDU\WRPDLQWDLQMRLQWQHVVDPRQJWKHYDULRXVLQWHOOLJHQFH VHUYLFHV7KHFKDQJHVWKDWKDYHRFFXUUHGLQPDQDJHPHQWDQGLQIRUPDWLRQ V\VWHPVKDYHSURYLGHGWKHLQWHOOLJHQFHFRPPXQLW\ZLWKQHZFKDOOHQJHVDQG RSSRUWXQLWLHV7KLVLVPDQLIHVWHGE\QHZPRGHVRILQWHUDFWLRQDQGGLVFRXUVH DPRQJDQDO\VWVDQGLQWHOOLJHQFHJDWKHUHUVVXFKDVWKH:LNLSODWIRUPVEDVHG

RQWKH:LNLSHGLDPRGHO²DQRSHQHQF\FORSHGLDLQZKLFKXVHUVFUHDWHDQG 2017 January | 1 No. | 1 Volume | HGLWHQWULHVDQGFRQWULEXWHWKHLUH[SHUWLVH²RUVRFLDOPHGLDEDVHGSODWIRUPV LQZKLFKDYDULHW\RISDUWLHVFRQFHUQHGZLWKDFHUWDLQLVVXHFDQGLVFXVVDQG FRQWULEXWHWKHLURZQLQWHUSUHWDWLRQVDQGLQVLJKWV7KHGLVFRXUVHZLWKLQWKH LQWHOOLJHQFHVRFLDOQHWZRUNQHXWUDOL]HVDQ\REVWDFOHVWKDWDUHUHODWHGWRWKH SDUWLFLSDQWV¶RUJDQL]DWLRQDOPHPEHUVKLSVRUUDQNVZKLFKXVXDOO\KDYH FRQVLGHUDEOHLQÀXHQFHLQRWKHUQRQQHWZRUNHGGLVFRXUVHV 35 ,QWKLVFRQWH[W

$PHULFDQUHVHDUFKHUVKDYHSURSRVHGWKHFRQFHSWRID³VKDUHGLQWHOOLJHQFH Security and Intelligence, Cyber, HQYLURQPHQW´WKDWKDVFKDUDFWHULVWLFVRIVRFLDOPHGLDLQFOXGLQJYLUWXDO PHHWLQJVVKDUHGZULWLQJDQGZRUNLQJRQ³OLYLQJ´RU³G\QDPLF´GRFXPHQWV GRFXPHQWVWKDWDUHFRQWLQXDOO\HGLWHGDQGXSGDWHG EORJVDQGVRIRUWK 

Jointness Models in the Intelligence Community: American and Israeli Case Histories Presenting the Typology $VVKRZQE\'LDJUDPEHORZMRLQWQHVVPRGHOVLQLQWHOOLJHQFHPD\ EHFKDUDFWHUL]HGE\WZRYDULDEOHVWKHRSHUDWLRQDOHQYLURQPHQWDQGWKH FRQFHSWXDOFRUH7KH¿UVWYDULDEOHWKHRSHUDWLRQDOHQYLURQPHQWFDQEH GHVFULEHGE\DQD[LVZKHUHRQHHQGUHSUHVHQWVDSXUHLQWHOOLJHQFHRSHUDWLQJ HQYLURQPHQWDQGWKHRWKHUHQGUHSUHVHQWVDPL[HGRUPXOWLHQWLW\RSHUDWLQJ HQYLURQPHQWLQZKLFKLQWHOOLJHQFHLVRQO\RQHRIWKHSOD\HUV$SXUHO\ LQWHOOLJHQFHRSHUDWLQJHQYLURQPHQWUHOLHVXSRQLQWHOOLJHQFHPHWKRGRORJ\ DQGFRQFHSWVZKLOHFRPSDUWPHQWDOL]DWLRQLVOLPLWHGRUQRQH[LVWHQW,Q FRQWUDVWDPL[HGRSHUDWLQJHQYLURQPHQWLQZKLFKLQWHOOLJHQFHLVRQHRIPDQ\ HQWLWLHVHPSOR\VYDULRXVPHWKRGRORJLHVDQGLVFKDUDFWHUL]HGE\GLIIHUHQW RUJDQL]DWLRQDOLGHQWLWLHV,QWHOOLJHQFHLVWKHQUHTXLUHGWRDGDSWWRGLIIHUHQW H[WHUQDOUXOHVDGMXVWLWVHOIFRQFHSWXDOO\DQGRSHUDWLRQDOO\DQGDGKHUHWRWKH UXOHVRIFRPSDUWPHQWDOL]DWLRQ7KHVHFRQGYDULDEOH²WKHFRQFHSWXDOFRUH² KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

20 FDQDOVREHGHVFULEHGE\DQD[LVZKRVHRQHHQGUHSUHVHQWVWKHFRQFHSWXDO LGHDRIMRLQWQHVVDQGWKHRWKHU²WKHRUJDQL]DWLRQDOFRQFHSW7KHLQWHUVHFWLRQ RIWKHWZRD[HVFUHDWHVDPDWUL[RIIRXUDUFKHW\SHVRILQWHOOLJHQFHMRLQWQHVV PRGHOVDVIROORZV D 7KH¿UVWDUFKHW\SHUHSUHVHQWVFRJQLWLYHMRLQWQHVVFKDUDFWHUL]HGE\MRLQW WKLQNLQJDQGOHDUQLQJE\VHYHUDOSOD\HUVIURPDYDULHW\RILQWHOOLJHQFH RUJDQL]DWLRQVDQGWKHIRUPXODWLRQRIRWKHULQWHOOLJHQFHFRQFHSWV E 7KHVHFRQGDUFKHW\SHDOVRGHDOVZLWKWKHIUDPHZRUNRIMRLQWQHVVIRU

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | WKLQNLQJDQGGHVLJQLQJWKHV\VWHPLQWKLVFDVHKRZHYHUWKHLQWHOOLJHQFH RUJDQL]DWLRQVUHSUHVHQWRQO\RQHRIDJURXSRISOD\HUVZKLOHWKHHPSKDVLV LVSODFHGRQWKHGHYHORSPHQWRINQRZOHGJHRIWKHV\VWHPDVDZKROH F 7KHWKLUGDUFKHW\SHUHSUHVHQWVLQWUDLQWHOOLJHQFHMRLQWQHVVZKLFKWDNHVSODFH DPRQJWKRVHZKRHQJDJHLQUHVHDUFKLQIRUPDWLRQJDWKHULQJF\EHUVSDFH DQGWHFKQRORJ\7KLVMRLQWQHVVUHODWHVWRWKHFUX[RILQWHOOLJHQFHZRUN DQGHQDEOHVLQWHOOLJHQFHWRJDLQWKHPRVWIURPLWVFDSDELOLWLHV

Cyber, Intelligence, and Security Security and Intelligence, Cyber, G 7KHIRXUWKDUFKHW\SHUHSUHVHQWVMRLQWQHVVEHWZHHQLQWHOOLJHQFHDQGQRQ LQWHOOLJHQFHV\VWHPVDQGRUJDQL]DWLRQV 7KLVHVVD\ZLOOH[SDQGXSRQWKHODWWHUWZRDUFKHW\SHV



% !"#%   '#!  % 

&$ ! %#0 %   !# %! !# $*$% %   %#* !#&  %  #%!#%0  #&#%* &%0# $%% $, #' -%#%  !#"!#%! ! $$$$ %! .  % %#  ! "% # +%!    *$$  ! %' ! % $$  ! % $$ 

! % $$%(   %  !#$ ! %#!&   - !"* !#. ! % $$%(   %  % %  !'#  %  %  !#& $ "#%!%%  )%# !"#%   '#!  % 

Diagram 4: Typology of Jointness Models

"!  KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

21 Examples of Jointness in Intelligence 0DQ\H[DPSOHVRIMRLQWLQWHOOLJHQFHVHWWLQJVFDQEHIRXQGZLWKLQWKH$PHULFDQ LQWHOOLJHQFHFRPPXQLW\:HOOFRYHUHGLQWKHUHVHDUFKWKH1DWLRQDO&RXQWHU 7HUURULVP&HQWHU 1&7& ZDVHVWDEOLVKHGDWWKHUHFRPPHQGDWLRQRIWKH &RPPLVVLRQRI,QTXLU\RQ7KHFRPPLVVLRQKDGWRGHDOZLWKWKHQHHG IRULQWHJUDWLYHLQWHOOLJHQFHDVVHVVPHQWVRIYDULRXVWHUURULVWWKUHDWVDQGIRU UHVHDUFKVHWWLQJVWKDWZRXOGFROOHFWWKHYDULRXVDVVHVVPHQWVRIWKHGLIIHUHQW HQWLWLHVZLWKLQWKH$PHULFDQLQWHOOLJHQFHFRPPXQLW\7KH1&7&UHSUHVHQWV

WKHXQGHUVWDQGLQJWKDWWHUURULVPLVDXQLTXHEDWWOH¿HOGWKDWLQWHJUDWHVWKH 2017 January | 1 No. | 1 Volume | LQWHUQDODQGWKHH[WHUQDODQGWKDWRQO\DQLQWHJUDWLYHLQWHOOLJHQFHFRPPXQLW\ FDQIRLOWHUURULVPXQOLNHWKHGLYLVLYHQDWXUHWKDWKDGFKDUDFWHUL]HGWKH86 LQWHOOLJHQFHDJHQFLHVXQWLOWKHQ 7KH1&7&LQFOXGHVDODUJHGLYLVLRQIRULQWHOOLJHQFHUHVHDUFKZKLFK DUHGLYLGHGLQWREUDQFKHVFRUUHVSRQGLQJWRGLIIHUHQWDUHQDVRIWKUHDW (DFKEUDQFKFRQVLVWVRIUHSUHVHQWDWLYHVIURPVHYHUDO$PHULFDQHVSLRQDJH 37

DJHQFLHV 7KH1&7&UHFHLYHVWKHUDZLQWHOOLJHQFHSURGXFHGE\HDFKRI Security and Intelligence, Cyber, WKHHVSLRQDJHDJHQFLHVDQGLWVUHVHDUFKHUVPXVWFRQVWUXFWFRPSUHKHQVLYH KROLVWLFDVVHVVPHQWVRIWKHYDULRXVWHUURULVWWKUHDWV$VWXG\ZULWWHQE\ D&,$UHVHDUFKHU  ZKRKDGZRUNHGIRUWKH1&7&IRUDERXWWZR\HDUV LQGLFDWHVWKDWWKH1&7&¶VSUHVWLJHDQGVWDWXVDUHQRWRQSDUZLWKWKHRWKHU RUJDQL]DWLRQVZKRVHUHSUHVHQWDWLYHVZRUNZLWKWKH1&7&WKHLQIHULRUSRVLWLRQ RIWKH1&7&LVWKHUHVXOWRIWKHRUJDQL]DWLRQDODQGSROLWLFDOHQYLURQPHQWLQ ZKLFKLWRSHUDWHV 39 2YHUWKH\HDUVYHWHUDQHVSLRQDJHRUJDQL]DWLRQVVXFK DVWKH&,$KDYHQXUWXUHGDWUDGLWLRQRIRUJDQL]DWLRQDOSULGHWKDWIXUWKHUV LQWUDRUJDQL]DWLRQDOH[FHOOHQFHEXWPDNHVMRLQWQHVVZLWKRWKHUH[WHUQDO HVSLRQDJHDJHQFLHVGLI¿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| JOINTNESS IN INTELLIGENCE ORGANIZATIONS

22 Fusion Centers: Jointness Between Intelligence and Government and Civilian Sectors )XVLRQFHQWHUVDUHVLWXDWLRQURRPVWKDWFRQQHFWWKHDFWLYLWLHVRIJRYHUQPHQW DQGLQWHOOLJHQFHEUDQFKHVDQGVHUYHJRYHUQPHQWDXWKRULWLHVLQYDULRXVVWDWHV ,QWKH8QLWHG6WDWHVIXVLRQFHQWHUVRSHUDWHLQFRQMXQFWLRQZLWKWKHFLYLO VHFWRUDQGGLIIHUHQWJRYHUQPHQWGHSDUWPHQWVDVSDUWRIWKHHIIRUWWRSUHYHQW WHUURULVPFULPHDQGGLVDVWHUV 42 ,QWKHGHFDGHDIWHUWHQIXVLRQFHQWHUV ZHUHHVWDEOLVKHGLQWKH8QLWHG6WDWHVRSHUDWLQJDWWKHUHJLRQDOVWDWHDQG

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | IHGHUDOOHYHOV 43 7KHVHFHQWHUVDUHVXERUGLQDWHWRWKH'HSDUWPHQWRI+RPHODQG 6HFXULW\ '+6 DQGLQFOXGHUHSUHVHQWDWLYHVIURPJRYHUQPHQWDJHQFLHVWKH SULYDWHVHFWRUDQGVRPHWLPHVDOVRWKHPLOLWDU\$OOFHQWHUVKDYHUHSUHVHQWDWLYHV IURPDWOHDVWRQH86LQWHOOLJHQFHDJHQF\LQDGGLWLRQWRWKHOHJDOV\VWHPWKH SROLFHDQG)%,ORFDOJRYHUQPHQWDXWKRULWLHVDXWKRULWLHVRSHUDWLQJQDWLRQDO LQIUDVWUXFWXUHVDQGWKHSULYDWHEXVLQHVVVHFWRUWKHSUHVHQFHRISDUWLHV IURPWKHSULYDWHVHFWRULVPHDQWWRJLYHWKHIXVLRQFHQWHUVDFFHVVWRSULYDWH 44

Cyber, Intelligence, and Security Security and Intelligence, Cyber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ÀRRGHGWKH86LQWHOOLJHQFH FRPPXQLW\DQGWKH'+6ZLWKLQIRUPDWLRQDERXWFLYLOLDQDFWLYLW\WKDWKDG QRWKLQJWRGRZLWKWHUURULVP  $QRWKHUSUREOHPZKLFKZDVPHQWLRQHGLQ VHYHUDOIXVLRQFHQWHUUHSRUWVKDVEHHQWKHORZOHYHORIWUXVWDPRQJWKHWHDP PHPEHUVRIWKHYDULRXVIXVLRQFHQWHUV2QHRIWKHUHDVRQVIRUWKLVVWDWHRI DIIDLUVLVWKHOLPLWDWLRQRQWKHXVHRIKLJKO\FODVVL¿HGPDWHULDOVZKLFKDUH JHQHUDOO\UHYHDOHGRQO\WRPHPEHUVRIWKHLQWHOOLJHQFHFRPPXQLW\49 KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

23 Jointness Between Intelligence and Operational Units 8QOLNHWKHIXVLRQFHQWHUVWKHLQWHOOLJHQFHRSHUDWLRQDOLQWHUIDFHFRQFHUQV RSHUDWLRQDODQGLQWHOOLJHQFHSURFHVVHVRQWKHEDWWOH¿HOG7KLVLQWHUIDFH RFFXUVDWWKHVWDJHVRILQWHOOLJHQFHJDWKHULQJSURFHVVLQJDQGDQDO\VLVDV ZHOODVGXULQJWKHRSHUDWLRQDOPLVVLRQLWVHOI7KHSUHVHQFHRILQWHOOLJHQFH LQRUQHDUWKHVSKHUHRIRSHUDWLRQVFRQQHFWVLWWRWKHUHDOZRUOGDQGDVVLVWV LQSURGXFLQJLQIRUPDWLRQWKDWLVUHOHYDQWWRFDUU\LQJRXWDQRSHUDWLRQDQG LQFRPSUHKHQGLQJWKHLQWHOOLJHQFHJDWKHUHGE\WKHIRUFHVEHIRUHDQGGXULQJ WKH¿JKWLQJ 2017 January | 1 No. | 1 Volume |

The American Case ,QWKH86DUP\-RLQW,QWHU$JHQFLHV7DVN)RUFHV -,$7)V 50 KDYHEHHQ HVWDEOLVKHGLQRUGHUWRLPSURYHWKHDELOLW\RI86LQWHOOLJHQFHDQGGHIHQVH V\VWHPVWRFRQIURQWDUPHGPLOLWLDVDQGWHUURULVWFHOOVWKDWDUHHPEHGGHG LQFLYLOLDQVXUURXQGLQJV7KHWHDPVDUHFRPSRVHGRIUHSUHVHQWDWLYHVIURP

VHYHUDOLQWHOOLJHQFHDJHQFLHVDQGRSHUDWLRQDODQGDGPLQLVWUDWLYHXQLWVZKR Security and Intelligence, Cyber, ZHUHSUHVHQWLQDUHDVZKHUHWKH86DUP\RSHUDWHGWKHLGHDRIWKH-,$7)V UHODWHVERWKWRKHDGTXDUWHUVDQG¿HOGVHWWLQJV7KHZRUNLQJDVVXPSWLRQLQ WKHFUHDWLRQRIWKH-,$7)VLVWKDWQRVLQJOHDJHQF\FDQSURYLGHDIXOODQG UHOLDEOHDVVHVVPHQWVRIDUPHGWHUURULVWJURXSVDQGFHOOV2QHRIWKHSDUWLHVRI D-,$7)PXVWVHUYHDVPLVVLRQOHDGHUDQGWKLVSHUVRQLVJLYHQWKHDXWKRULW\ WRPDQDJHWKHDFWLYLW\7KHVL]HRIWKHDJHQF\UHSUHVHQWHGRUWKHVFRSHRI WKDWDJHQF\¶VFRQWULEXWLRQWRWKHPLVVLRQDWKDQGGHWHUPLQHVZKROHDGVWKH PLVVLRQEDVHGRQWKHDVVXPSWLRQWKDWWKHVL]HRIWKHFRQWULEXWLRQRUWKH RUJDQL]DWLRQ¶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¿FLHQWZRUNLQJSURFHVVHV DQGPRUHVLJQL¿FDQWRXWFRPHV KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS

24 The Israeli Test Case: Confronting Palestinian 6LQFHWKHHDUO\V,VUDHO¶VPLOLWDU\LQWHOOLJHQFHDQGWKH*HQHUDO6HFXULW\ 6HUYLFH *66LQ+HEUHZNQRZQDVWKH6KLQ%HW KDYHVWRRGDWWKHIRUHIURQW RIWKHEDWWOHDJDLQVW3DOHVWLQLDQWHUURULVP7KHFULVLVWKDW,VUDHOH[SHULHQFHGLQ IDFLQJWKHVXLFLGHWHUURULVWVGXULQJWKH6HFRQG,QWLIDGDOHGWRWKHGHYHORSPHQW RIKLJKO\HIIHFWLYHLQWHOOLJHQFHDQGRSHUDWLRQDOMRLQWQHVVZKLFKVLQFHWKHQKDV EHHQXVHGLQURXWLQHWLPHVDQGZDU'XULQJWKHORQJ\HDUVRIFRQIURQWDWLRQ ZLWKWKH3DOHVWLQLDQV,VUDHO¶VPLOLWDU\LQWHOOLJHQFHWUDQVIRUPHGIURPEHLQJ

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | FKDUJHGZLWKKHOSLQJLQGHFLVLRQPDNLQJWRIRUPXODWLQJVWUDWHJ\DQGVKDSLQJ PLOLWDU\FDPSDLJQVDQGEHLQJDVLJQL¿FDQWRSHUDWLRQDOWRRO 52 ZKLFKIRFXVHG SULPDULO\RQ³FRPSOHWLQJWKHFLUFOH´RUUHWDOLDWLRQDVDUHVSRQVHWRWHUURU53 7KHFRQFHSWWKDWSUHYDLOHGZLWKLQWKH,VUDHOLLQWHOOLJHQFHFRPPXQLW\LQWKH VIRUUHJXODWLQJUHODWLRQVEHWZHHQWKH0LOLWDU\,QWHOOLJHQFH'LUHFWRUDWH DQGWKH*66ZDVWKH³0DJQD&DUWD´7RDJUHDWH[WHQWRQHFDQYLHZWKH ³0DJQD&DUWD´DVWKHUHYHUVHRIWKHMRLQWQHVVDSSURDFKEHFDXVHLWGUHZFOHDU

Cyber, Intelligence, and Security Security and Intelligence, Cyber, OLQHVRIUHVSRQVLELOLW\EHWZHHQWKHLQWHOOLJHQFHVHUYLFHVDQGGH¿QHGVSKHUHV RIDFWLYLW\DQGDXWKRULW\OHDYLQJDOPRVWQRURRPIRUMRLQWDFWLRQ$IWHUD IHZ\HDUVRI¿JKWLQJWHUURULVPWRJHWKHULQDSHULRGGHVFULEHGDV³\HDUVRI PDVVDUUHVWVDQGWDUJHWHGDVVDVVLQDWLRQV´WKHLQVWLWXWLRQVRIWKHLQWHOOLJHQFH FRPPXQLW\HVSHFLDOO\WKH0LOLWDU\,QWHOOLJHQFH'LUHFWRUDWHDQGWKH*66 JUHZFORVHUWRRQHDQRWKHU 54 DQDWPRVSKHUHRIWUXVWDQGLQWLPDF\HQVXHG TXLWHGLVWLQFWIURPWKHDWPRVSKHUHRIGLVDJUHHPHQWWKDWKDGFKDUDFWHUL]HG WKHLUHDUOLHUUHODWLRQVKLS

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

LQGHYHORSLQJMRLQWQHVVDWDYHU\KLJKOHYHOEDVHGRQIXVLQJLQIRUPDWLRQ 2017 January | 1 No. | 1 Volume | IURPDPRQJDOOWKHLQWHOOLJHQFHJDWKHULQJDQGUHVHDUFKDJHQFLHV7KHODVW WKUHHURXQGVRI¿JKWLQJLQWKH*D]D6WULS DQG ZHUHJRRG H[DPSOHVRILQWHURUJDQL]DWLRQDOMRLQWQHVVZKLFKHQDEOHGLQIRUPDWLRQWREH VKDUHGVRWKDWDKLJKOHYHOODUJH³EDQNRIWDUJHWV´FRXOGEHFUHDWHG 55 Another H[SUHVVLRQRIMRLQWQHVVEHWZHHQLQWHOOLJHQFHERGLHVDQGRSHUDWLRQDO¿JKWLQJ XQLWVLVWKH³FDQRS\RI¿UH´SURMHFW²WKH,')¶VYHUVLRQRIWKHWDUJHWHG

DVVDVVLQDWLRQPRGHOGHYHORSHGE\WKH*66,QWKHFRQWH[WRIWKDWSURMHFW Security and Intelligence, Cyber, SDUWLHVLQERWKLQWHOOLJHQFHDQGWKH,VUDHOL$UWLOOHU\&RUSVRUWKH$LU)RUFH RSHUDWHLQMRLQWDWWDFNXQLWVWRIRLOURFNHWODXQFKLQJDQGDQWLWDQNFHOOVDQG WRWKZDUWWKHSHQHWUDWLRQRIWHUURULVWVLQWR,VUDHO 

Conclusions and Insights 7KHUHFHQWGHFDGHVKDYHZLWQHVVHGVLJQL¿FDQWFKDQJHVLQWKHFRQFHSWRI MRLQWQHVVDQGLWVSUDFWLFDODSSOLFDWLRQ$WWKHEHJLQQLQJRIWKHWZHQW\¿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| JOINTNESS IN INTELLIGENCE ORGANIZATIONS

26 7KLVHVVD\VXUYH\HGWKHWKHRUHWLFDODQGSUDFWLFDOGHYHORSPHQWRI WKHMRLQWQHVVDSSURDFKGLVWLQJXLVKHGEHWZHHQFRJQLWLYHMRLQWQHVVDQG RUJDQL]DWLRQDOMRLQWQHVVDQGH[DPLQHGWKHLQWHUUHODWLRQVDQGFRQQHFWLRQV EHWZHHQWKHPDQGWKHW\SHVRIOHDUQLQJ7KHPDWUL[FUHDWHGE\WKHLQWHUVHFWLRQ RIWKHD[HVRIWKHWZRYDULDEOHV WKHRSHUDWLRQDOHQYLURQPHQWDQGWKH FRQFHSWXDOFRUH PDNHVLWSRVVLEOHWRLGHQWLI\DQGGH¿QHIRXUDUFKHW\SHVRU PRGHOVRIMRLQWQHVVZKLFKWKHHVVD\DQDO\]HGXVLQJVHYHUDOFDVHVVWXGLHV IURPERWKWKH8QLWHG6WDWHVDQG,VUDHO

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | -RLQWQHVVLVQRWDPDJLFDOVROXWLRQLWKDVQRWSURYHQWREHWKHEHVW RUJDQL]DWLRQDOVROXWLRQLQHYHU\VLWXDWLRQLQZKLFKLWKDVEHHQWULHG7HVWFDVHV DOVRVKRZWKDWMRLQWQHVVLVQRWDOZD\VSURSHUO\DSSOLHG,WVVXFFHVVGHSHQGV RQVHYHUDOFRPSRQHQWVZKLFKZKHQYLHZHGWRJHWKHUFDQEHUHIHUUHGWRDV WKHRUJDQL]DWLRQDOHFRORJ\7KHPRVWSURPLQHQWFRPSRQHQWLVRUJDQL]DWLRQDO IUHHGRPDQGFUHDWLQJDVSDFHLQZKLFKLWLVSRVVLEOHDQGHYHQUHFRPPHQGHG WRJLYHDXWRQRP\WRWKHYDULRXVSOD\HUV7KLVDXWRQRP\DOORZVIRUÀH[LELOLW\

Cyber, Intelligence, and Security Security and Intelligence, Cyber, DQGFUHDWLYLW\HYHQLILWPHDQVVWUD\LQJIURPIDPLOLDUZRUNLQJPHWKRGV )XUWKHUPRUHWUXVWDPRQJWKHSOD\HUVLVYHU\LPSRUWDQWIRUWKHVXFFHVVRI WKHLQWHUIDFHV-RLQWQHVVDPRQJYDULRXVPHPEHUVRIDVLQJOHLQWHOOLJHQFH FRPPXQLW\DQGLQSDUWLFXODUMRLQWQHVVEHWZHHQLQWHOOLJHQFHDJHQFLHVDQG H[WHUQDOSDUWLHVLVSRVVLEOHPDLQO\LQVLWXDWLRQVLQZKLFKLQWHOOLJHQFHSHUVRQQHO DUHDEOHWRGHYHORSH[SHFWDWLRQVRISRVLWLYHEHKDYLRUIURPWKHLUSDUWQHUV DQGUHGXFHWKHLUFRQFHUQVDERXWQHJDWLYHEHKDYLRU7KLVEXLOGVWUXVWZKLFK LQFUHDVHVSOD\HUV¶ZLOOLQJQHVVWRWDNHFKDQFHVLQFOXGLQJUHYHDOLQJWKHPVHOYHV DQGVKDULQJZLWKHDFKRWKHU7KHQRWLRQRIDQRYHUDUFKLQJERG\ VXFKDVWKH '1,LQWKH8QLWHG6WDWHV WKDWIDFLOLWDWHVDQGJHQHUDWHVMRLQWQHVVDQGFDQ LQÀ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| JOINTNESS IN INTELLIGENCE ORGANIZATIONS

27 ,QFRQFOXVLRQMRLQWQHVVLVDUHVSRQVHWRVRPHRIWKHNH\LVVXHVWKDWWKH LQWHOOLJHQFHFRPPXQLWLHVDUHFXUUHQWO\FRQIURQWLQJDGRSWLQJWKHFRQFHSWRI MRLQWQHVVZRXOGHQDEOHWKHPWRSURYLGHDEHWWHUVROXWLRQWRWKHVHFKDOOHQJHV $WWKHVDPHWLPHLWLVQRWDSDQDFHDWKDWREYLDWHVWKHQHHGIRUWUDGLWLRQDO FRQFHSWVDQGRUJDQL]DWLRQDOVWUXFWXUHV5HDOL]LQJMRLQWQHVVLQSODFHVDQG FRQWH[WVZKHUHLWLVQHHGHGDOVRUHTXLUHVVKDUHGIRUFHFRQVWUXFWLRQVXFK DVSHUVRQQHOFRPPXQLFDWLRQVLQIUDVWUXFWXUHVDQGPRUHDOOZKLFKIRUPD FULWLFDOIRXQGDWLRQIRUDWWDLQLQJWKLVREMHFWLYH | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | Notes  7KH¿UVWVHHGVRIMRLQWQHVVFDQEHWUDFHGWR6RYLHWPLOLWDU\WKRXJKWRQWKHDUW RIWKHFDPSDLJQ)RUPRUHRQWKLVWRSLFVHH6KLPRQ1DYHK The Art of the Campaign: The Making of Military Excellence  7HO$YLY0LQLVWU\RI'HIHQVH 3XEOLFDWLRQVDQG0DDUDNKRW  +HEUHZ   86'HSDUWPHQWRI'HIHQVH Department of Defense Dictionary of Military and Associated Terms -RLQW3XEOLFDWLRQ :DVKLQJWRQ'& DPHQGHGWKURXJK 6HSWHPEHU S  $QH[DPSOHLVWKH86QDYDOVWUDWHJ\³6KLS0DULWLPH6WUDWHJ\´ZKLFK Security and Intelligence, Cyber, LQYROYHGZDUVKLSVDQGDURXVHGWKHLUHRIWKHKHDGVRIWKHRWKHUEUDQFKHVZKHQLW ZDVSUHVHQWHG6HH'RQ06QLGHU³7KH860LOLWDU\LQ7UDQVLWLRQWR-RLQWQHVV 6XUPRXQWLQJ2OG1RWLRQVRI,QWHUVHUYLFH5LYDOU\´ Airpower Journal QR )DOO KWWSZZZDLUSRZHUPD[ZHOODIPLODLUFKURQLFOHVDSMDSMIDOO VQLGHUKWPO  ,ELG  7KHWH[WRIWKHDFWLVDYDLODEOHDW³*ROGZDWHU1LFKROV$FWRI´86&RGH /HJDO,QIRUPDWLRQ,QVWLWXWH&RUQHOO/DZ6FKRROKWWSZZZDXDIPLODXDZF DZFJDWHFRQJUHVVWLWOHBKWPIRUPRUHRQWKHDFWVHH³*ROGZDWHU1LFKROV$FW´ :LNLSHGLDKWWSVHQZLNLSHGLDRUJZLNL*ROGZDWHU(1LFKROVB$FW  -RLQW&KLHIVRI6WDII Joint Warfare of the US Armed Forces -RLQW3XEOLFDWLRQ :DVKLQJWRQ'&1DWLRQDO'HIHQVH8QLYHUVLW\3UHVV1RYHPEHU KWWS KGOKDQGOHQHWXLXJ  7KHGRFWULQHZDVVKDSHGKLHUDUFKLFDOO\LQDWRSGRZQPDQQHUXQOLNHWKHQDY\ GRFWULQHZKLFKZDVIRUPXODWHGE\WKHGLIIHUHQWÀHHWVLQDERWWRPXSIDVKLRQ)RU PRUHVHH3DXO-%ROW'DPRQ9&ROHWWDDQG&ROOLQV*6KDFNHOIRUG Defense Organization: The Need for Change: Staff Report to the Committee on Armed Services  :DVKLQJWRQ'&86*RYHUQPHQW3ULQWLQJ2I¿FH KWWSEDEHO KDWKLWUXVWRUJFJLSW"LG PGSYLHZ XSVHT   6QLGHU³7KH860LOLWDU\LQ7UDQVLWLRQ´  (IURQ5D]LDQG3LQKDV

28  7KLVDSSURDFKWRGHYHORSLQJDQDSSOLFDWLRQLVFDOOHGVHUYLFHRULHQWHGDUFKLWHFWXUH 62$ 6HH³6HUYLFH2ULHQWHG$UFKLWHFWXUH 62$ DQG6SHFLDOL]HG0HVVDJLQJ 3DWWHUQV´$GREH ,KWWS[POFRYHUSDJHVRUJ62$$GREHSGI  =YL/DQLU³:K\:H1HHGWKH&RQFHSWRI-RLQWQHVV´ Maarakhot QR -XQH  S +HEUHZ   )RUPRUHRQWKHGLVWLQFWLRQEHWZHHQFRRUGLQDWLRQFRRSHUDWLRQDQGMRLQWQHVVVHH WKHMRLQWQHVVFKDUWDWKWWSVGRDORJXHFRLOZLNL  /DQLU³:K\:H1HHGWKH&RQFHSWRI-RLQWQHVV´S  5D]LDQG

29  ,WDL%UXQ Intelligence Research: Clarifying Reality in an Era of Change QS ,VUDHO,QWHOOLJHQFH+HULWDJHDQG&RPPHPRUDWLRQ&HQWHU ,,&& 7KH,QVWLWXWHIRU ,QWHOOLJHQFHDQG3ROLF\5HVHDUFK(I¿0HOW]HU/WG S +HEUHZ   )RUPRUHRQWKHFKDOOHQJHLQVXUYHLOOLQJDGLVDSSHDULQJHQHP\VHHLELGS2Q WKHFKDOOHQJHLQWKHPDNLQJVHHLELGS  ,ELGS  %ULGJHW5RVH1RODQ ³,QIRUPDWLRQ6KDULQJDQG&ROODERUDWLRQLQWKH8QLWHG6WDWHV ,QWHOOLJHQFH&RPPXQLW\$Q(WKQRJUDSKLF6WXG\RIWKH1DWLRQDO&RXQWHUWHUURULVP &HQWHU´ 3K'GLVV8QLYHUVLW\RI3HQQV\OYDQLD S  8QLWHG6WDWHV2I¿FHRIWKH'LUHFWRURI1DWLRQDO,QWHOOLJHQFH 500 Day Plan, Integration and Collaboration  2FWREHU KWWSIDVRUJLUSGQLGD\ 2017 January | 1 No. | 1 Volume | SODQSGI  8QLWHG6WDWHV2I¿FHRIWKH'LUHFWRURI1DWLRQDO,QWHOOLJHQFH The National Intelligence Strategy of the United States of America  6HSWHPEHU  KWWSZZZRGQLJRY¿OHVGRFXPHQWVB1,6B3XEOLFDWLRQSGI The idea was UHIHUUHGWRLQVHYHUDOYHUVLRQVRIWKHGRFXPHQWRYHUWKH\HDUVEHWZHHQ± )RUVHHKWWSIDVRUJLUSRIIGRFVQLVSGIIRUVHHKWWSIDVRUJLUS RIIGRFVQLVSGI6HHDOVR-RLQW&KLHIVRI6WDII Joint Intelligence , Joint 3XEOLFDWLRQ 2FWREHU KWWSZZZGWLFPLOGRFWULQHQHZBSXEVMSB Cyber, Intelligence, and Security Security and Intelligence, Cyber, SGI  6HHIRUH[DPSOH8QLWHG6WDWHV2I¿FHRIWKH'LUHFWRURIWKH1DWLRQDO ,QWHOOLJHQFH The National Intelligence Strategy of the United States of America $XJXVW S  $PLU5DSDSRUW³8SKHDYDOLQ,QWHOOLJHQFH´,VUDHOGHIHQVH0DUFK +HEUHZ KWWSZZZLVUDHOGHIHQVHFRLOKHFRQWHQWʺʩʰʩʲʩʣʥʮʤʬʨʬʨ  6KDL6KDEWDLDQG2PUL*HIHQ Promoting Jointness in the Intelligence Community Using the Senior Inter-Service Intelligence Course  LQWHUQDOSXEOLFDWLRQ  +HEUHZ 7KHGRFXPHQWZDVSUHVHQWHGWRDQLQWHOOLJHQFHIRUXPDWWKH,QVWLWXWH IRU1DWLRQDO6HFXULW\6WXGLHV  'DYLG6LPDQ7RYDQG2IHU*³,QWHOOLJHQFH$1HZ$SSURDFKWR,QWHOOLJHQFH 3URGXFWLRQ´ Military and Strategic Affairs QR 'HFHPEHU ± KWWSZZZLQVVRUJLOXSORDG,PDJHVV\VWHP)LOHV0$6$SGI  &KULV5DVPXVVHQ³7RZDUG/LYLQJ,QWHOOLJHQFH´*RY([SR6KRZFDVH :DVKLQJWRQ'&6HSWHPEHUKWWSZZZJRYH[SRFRPJRYH[SR SXEOLFVFKHGXOHGHWDLO6HHDOVRWKH

30  7RP$VKEURRN³5HIRUPLQJWKH$PHULFDQ,QWHOOLJHQFH6\VWHP´2Q3RLQW5DGLR 6KRZ0DUFKKWWSRQSRLQWZEXURUJFLDUHIRUPMRKQ EUHQQDQVHQDWHVSLHVQDWLRQDOVHFXULW\  *XGUXQ3HUVVRQ Fusion Centers—Lessons Learned—A Study of Coordination Functions for Intelligence and Security Services  6ZHGLVK1DWLRQDO'HIHQVH &ROOHJH   7KHOLVWRIIXVLRQFHQWHUVDFWLYHLQWKH8QLWHG6WDWHVPD\EHIRXQGDWWKHRI¿FLDO ZHEVLWHRIWKH'+6DW)XVLRQ&HQWHU/RFDWLRQVDQG&RQWDFW,QIRUPDWLRQ KWWSZZZGKVJRYIXVLRQFHQWHUORFDWLRQVDQGFRQWDFWLQIRUPDWLRQ  7RULQ0RQDKDQ³7KH0XUN\:RUOGRI)XVLRQ&HQWHUV´ Criminal Justice Matters | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | QR  ±KWWSSXEOLFVXUYHLOODQFHFRPSDSHUV)&&-0SGI  86'HSDUWPHQWRI+RPHODQG6HFXULW\86'HSDUWPHQWRI-XVWLFH)XVLRQ3URFHVV 7HFKQLFDO$VVLVWDQFH3URJUDPDQG6HUYLFHV Considerations for Fusion Center and Emergency Operations Center Coordination Comprehensive Preparedness , Comprehensive Preparedness Guide (CPG) 502  0D\ SKWWSV ZZZIHPDJRYPHGLDOLEUDU\GDWDFSJBB FRPSUHKHQVLYHBSUHSDUHGQHVVBJXLGHBFRQVLGHUDWLRQVBIRUBIXVLRQBFHQWHUBBBHRFB FRRUGLQDWLRQBSGI  &KXFN'RGVRQ³8VHRI7HFKQRORJ\LQ,QWHOOLJHQFH)XVLRQ&HQWHUV´$Q2UDFOH Cyber, Intelligence, and Security Security and Intelligence, Cyber, :KLWH3DSHU$SULOSKWWSZZZRUDFOHFRPXVLQGXVWULHVSGI  )RUWKHUHSRUWRIDIHGHUDOFRPPLVVLRQRILQTXLU\WRH[DPLQHWKHDFWLYLW\RIWKH IXVLRQFHQWHUVVHH866HQDWH7KH3HUPDQHQW6XEFRPPLWWHHRQ,QYHVWLJDWLRQV ³,QYHVWLJDWLYH5HSRUW&ULWLFL]HV&RXQWHUWHUURULVP5HSRUWLQJ:DVWHDW6WDWH /RFDO ,QWHOOLJHQFH)XVLRQ&HQWHUV´3UHVV5HOHDVH2FWREHUKWWSZZZKVJDF VHQDWHJRYVXEFRPPLWWHHVLQYHVWLJDWLRQVPHGLDLQYHVWLJDWLYHUHSRUWFULWLFL]HV FRXQWHUWHUURULVPUHSRUWLQJZDVWHDWVWDWHDQGORFDOLQWHOOLJHQFHIXVLRQFHQWHUV  )RUDQHVVD\GHVFULELQJWKHGDPDJHWRSULYDF\JHQHUDWHGE\WKHIXVLRQ FHQWHUVVHH5REHUW2¶+DUURZ³'+6µ)XVLRQ&HQWHUV¶3RUWUD\HGDV3RROVRI ,QHSWLWXGHDQG&LYLO/LEHUWLHV,QWUXVLRQV´ Washington Post 2FWREHU KWWSZZZZDVKLQJWRQSRVWFRPLQYHVWLJDWLRQVGKVIXVLRQFHQWHUVSRUWUD\HGDV SRROVRILQHSWLWXGHDQGFLYLOOLEHUWLHVLQWUXVLRQVFE HEGDEHGHEBVWRU\KWPO  3HUVVRQ Fusion Centers—Lessons Learned S  +XOO³:H¶UH$OO6PDUWHUWKDQ$Q\RQHRI8V´  ,ELGS  /W&RO$³7KH3ODFHIRU,QWHOOLJHQFHLQWKH&ODXVHZLW]7ULDQJOH´ Maarakhot , QR± 'HFHPEHU ± +HEUHZ   $PLU2UHQ³7KHPDVWHURILQWHUSUHWDWLRQVRUWKHVHUYDQWRIRSHUDWLRQV´ Haaretz , -XQH +HEUHZ   ,ELG  ,QUHIHUHQFHWR2SHUDWLRQ&DVW/HDGVHH

Omry Haizler

This article will touch upon two main components of the United States’ cybersphere and cyber warfare. First, it will review three cyber incidents during different time periods, as the US infrastructure, mechanisms, and policies were gradually evolving. It will analyze the conceptual, operational, and legislative evolution that led to the current decision-making paradigm and institutional structure of the US cybersphere. Secondly, the paper will examine the procedures and policies of the Intelligence Community (IC), and the US cyber operational structure. It will review the missions and background of the IC and its responsibilities before, during, and after a cyberattack, and will touch upon the IC’s organizational architecture. The paper will also briefly review the current cyber threats in the United States and will elaborate on some of the fundamental strategies and policies that it uses to provide a suitable response. Lastly, it analyzes the cybersphere’s macro-level, addressing the data coordination of the IC’s agencies, as well as the federal, state, and private sector institutions during a cyber crisis.

Keywords: Moonlight Maze, Morris Worm, Stuxnet, cyberattacks, United States intelligence community, cyber crisis, cyber threats, internet governance, cyber policy, cyber strategy

Omry Haizler is a former IDF Officer and a Prime Minister’s Office operative. He holds an MPA from Columbia University’s School of International and Public Affairs (SIPA). He currently teaches at Columbia’s School of Continuing Education.

Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017 31 OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

32 History of Cyber Warfare 7KHUHDUHWKUHHKLVWRULFDOVWDJHVRIWKHHYROXWLRQRIF\EHUZDUIDUH WKH UHDOL]DWLRQSKDVHGXULQJWKHHDUO\HUDRIWKHLQWHUQHW WKHWDNHRIISKDVH GXULQJWKHLQWHULPSHULRGRISUHDQGSRVWLQZKLFKDWWDFNVZHUHVWLOO PDLQO\RIDQLQIRUPDWLRQJDWKHULQJQDWXUHDQG WKHPRGHUQPLOLWDUL]DWLRQ SKDVHGXULQJZKLFKF\EHUZDUIDUHPD\FDXVHVLPLODUGDPDJHWR86VWUDWHJLF FDSDELOLWLHVDQGFULWLFDOLQIUDVWUXFWXUHDVDNLQHWLFDWWDFNRQDFRORVVDOOHYHO )LJXUHEHORZGHVFULEHVWKHVHVWDJHV 1 | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | Stages 5HDOL]DWLRQ 7DNHRII 0LOLWDUL]DWLRQ 7LPHIUDPH  ± ±SUHVHQW Attackers have Attackers have Attackers have '\QDPLFV advantage over advantage over advantage over GHIHQGHUV GHIHQGHUV GHIHQGHUV 8QLWHG6WDWHV5XVVLD 8QLWHG6WDWHVDQG :KR+DV 8QLWHG6WDWHVDQGIHZ &KLQDDQGPDQ\PRUH 5XVVLDZLWKPDQ\ &DSDELOLWLHV" other superpowers DFWRUVZLWKVXEVWDQWLDO VPDOODFWRUV FDSDELOLWLHV Cyber, Intelligence, and Security Security and Intelligence, Cyber, 1HR+DFNWLYLVWV agents, +DFNWLYLVWVSDWULRW PDOZDUHQDWLRQDO Adversaries +DFNHUV hackers, viruses, PLOLWDULHVVSLHV DQGZRUPV DQGWKHLUSUR[LHV hacktivists (OLJLEOH5HFHLYHU &XFNRRV(JJ   Titan Rain, 6RODU6XQULVH 0RUULV:RUP   (VWRQLD 0DMRU 0RRQOLJKW0D]H 'XWFK+DFNHUV   *HRUJLD ,QFLGHQWV $OOLHG)RUFH 5RPH/DEV   %XFNVKRW

Attacks as Catalyzers for Institutional Evolution (DFKRIWKHDERYHSHULRGVFKDUDFWHUL]HVDIXQGDPHQWDOO\GLIIHUHQWGRFWULQH ERWKZLWKUHVSHFWWRWHFKQRORJLFDOSURJUHVVLRQDQGW\SHRIWKUHDWVDQGWR WKHDGPLQLVWUDWLRQ¶VF\EHUSROLFLHVDWHDFKJLYHQWLPH&HUWDLQSDVWDWWDFNV HPERGLHGIXWXUHF\EHUFKDOOHQJHVVHUYLQJDVZDUQLQJVLJQVWRLQVWLWXWLRQV¶ YXOQHUDELOLWLHVDQGODFNRIVHFXULW\$VVRFLHW\¶VGHSHQGHQF\RQWHFKQRORJ\ OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

33 LQFUHDVHGWKHSRVVLEOHUDPL¿FDWLRQVRILQHI¿FLHQWVHFXULW\LQDVSHFL¿F EUHDFKDOVRLQFUHDVHG

1. Realization—the Morris Worm 7KLVF\EHULQFLGHQWDFWHGDVWKH¿UVWZDNHXSFDOOWRWKH$PHULFDQ,QWHOOLJHQFH &RPPXQLW\ ,& SROLF\PDNHUVDQGDFDGHPLFV:KLOHLWZDVQRWWKH¿UVW F\EHUDWWDFNRQ86FRPSXWHUV\VWHPV²WKH&XFNRR¶V(JJKDFNLQYROYLQJ WKH6RYLHW.*%ZDVWKH¿UVWVLJQL¿FDQWF\EHUHVSLRQDJHDWWDFN²LWLVZLGHO\

FRQVLGHUHGWKH¿UVWODUJHVFDOHDWWDFNERWKLQWHUPVRIWKHTXLFNSKDVHRI 2017 January | 1 No. | 1 Volume | HYHQWVLWVVFDOHDQGLWVLPSOLFDWLRQV/DXQFKHGDVDSUDQNIURPDODEDW&RUQHOO 8QLYHUVLW\WKH0RUULV:RUPZDVGHVLJQHGWRLQIHFWDVPDQ\PDFKLQHVDV SRVVLEOHZLWKRXWEHLQJGHWHFWHGWKHZRUPFUDVKHGFRPSXWHUV²URXJKO\ SHUFHQWRIWKHLQWHUQHWLQ 27KH86*RYHUQPHQW$FFRXQWDELOLW\ 2I¿FHDVVHVVHGWKHGDPDJHDW±LOOXVWUDWLQJWKHGLI¿FXOW\ RIDVVHVVLQJF\EHUDWWDFNGDPDJHDSUREOHPSUHYDOHQWHYHQWRGD\ 3 Despite WKHVHYHUHUDPL¿FDWLRQVWKHLQFLGHQWSURYLGHGDQLPSRUWDQWZDUQLQJWRWKH Cyber, Intelligence, and Security Security and Intelligence, Cyber, ,&KLJKOLJKWLQJWKHSRWHQWLDOGDQJHUVRIKLJKO\FRQQHFWHGFRPSXWHUQHWZRUNV DQGWKHQHHGIRULQVWLWXWLRQDOL]HGGHIHQVLEOHFDSDELOLWLHVDQGVWUXFWXUHVLQ WKHF\EHUVSKHUH 7KH0RUULV:RUPDFWHGDVDFDWDO\]HUIRUWKH¿UVWVWHSVWRZDUGVDPRUH UHJXODWHGF\EHUVSDFHDQGOHGWRGUDPDWLFFKDQJHVERWKFRQFHSWXDOO\DQG RSHUDWLRQDOO\ Paradigm Shift $WWKHWLPHRIWKHLQFLGHQWWKHLQWHUQHWZDVWDNLQJLWV ¿UVWVXEVWDQWLDOVWHSVDQGZDVFRQVLGHUHGD³IULHQGO\SODFH´ZKHUHHYHU\RQH NQRZVHYHU\RQH7KH0RUULV:RUPPDGHLWFOHDUWKDWVRPHSHRSOHLQ F\EHUVSDFHGLGQRWKDYHWKHEHVWLQWHUHVWVLQPLQGWKHLQFLGHQWZDVWKH¿UVW WLPHZKHUHF\EHULQQRYDWLRQVKLIWHGIURPIRFXVLQJVROHO\RQLQWHUFRQQHFWLYLW\ WRVHFXULW\FRQFHUQV Operations (VWDEOLVKHGDIWHUWKH0RUULV:RUPLQFLGHQWE\WKH'HIHQVH $GYDQFHG5HVHDUFK3URMHFWV$JHQF\ '$53$ DW&DUQHJLH0HOORQ8QLYHUVLW\ WKH&RPSXWHU(PHUJHQF\5HVSRQVH7HDP &(57 GHPRQVWUDWHGWKHVKLIW IURPDGKRFVROXWLRQVWRSURIHVVLRQDOWHDPVZKLFKZHUHWUDLQHGDQGHTXLSSHG WRFRRUGLQDWHHYHQWVDQGSURYLGHDVVHVVPHQWVDQGVROXWLRQVWRDJLYHQ F\EHUDWWDFN 4 Regulations $ORQJZLWKWKHFRQFHSWXDOVKLIWLQF\EHUVHFXULW\&RQJUHVV SDVVHGVHYHUDOODZVLQWKH\HDUVIROORZLQJWKH0RUULV:RUPLQFLGHQWLQFOXGLQJ OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

34 WKH(OHFWURQLF&RPPXQLFDWLRQV3ULYDF\$FWRIDQGWKH&RPSXWHU 6HFXULW\$FWRIWRHQVXUHSULYDF\LQF\EHUGRPDLQVWKURXJKOHJDO SURWHFWLRQV 5$GGLWLRQDOO\5REHUW7DSSDQ0RUULVZKRFUHDWHGWKH0RUULV :RUPZDVWKH¿UVWSHUVRQWREHFRQYLFWHGXQGHUWKHQHZ&RPSXWHU)UDXG DQG$EXVH$FWRI 

2. Takeo"—The Moonlight Maze ,Q86RI¿FLDOVDFFLGHQWDOO\GLVFRYHUHGDSDWWHUQRIVXVWDLQHGSURELQJ

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | RIWKH3HQWDJRQ¶VFRPSXWHUV\VWHPVSULYDWHXQLYHUVLWLHV1$6$(QHUJ\ 'HSDUWPHQWDQGUHVHDUFKODEV6RRQWKH\OHDUQHGWKDWWKHSURELQJKDG RFFXUUHGFRQWLQXDOO\IRUQHDUO\WZR\HDUV7KRXVDQGVRIXQFODVVL¿HG\HW VHQVLWLYHGRFXPHQWVUHODWLQJWRWHFKQRORJLHVZLWKPLOLWDU\DSSOLFDWLRQVKDG EHHQH[DPLQHGRUVWROHQLQFOXGLQJPDSVRIPLOLWDU\LQVWDOODWLRQVWURRS FRQ¿JXUDWLRQVDQGPLOLWDU\KDUGZDUHGHVLJQV 7$OWKRXJKWKH'HIHQVH 'HSDUWPHQWWUDFHGWKHWUDLOEDFNWRDPDLQIUDPHFRPSXWHULQWKHIRUPHU 6RYLHW8QLRQWKHVSRQVRURIWKHDWWDFNVUHPDLQVXQNQRZQ5XVVLDGHQLHG Cyber, Intelligence, and Security Security and Intelligence, Cyber, DQ\LQYROYHPHQWDQGWKHVXVSLFLRQVKDYHQHYHUEHHQFRQFOXVLYHO\SURYHQ  0RRQOLJKW0D]HLVZLGHO\FRQVLGHUHGWKH¿UVWODUJHVFDOHF\EHUHVSLRQDJH DWWDFNE\DZHOOIXQGHGDQGZHOORUJDQL]HGVWDWHDFWRU7KHDWWDFNZDVZHOO SODQQHGDVWKHDWWDFNHUVOHIW³EDFNGRRUV´WRHQDEOHKDFNHUVWRSHQHWUDWH WKHV\VWHPDWGLIIHUHQWWLPHVOHIWIHZWUDFHVDQGFRQWLQXHGIRUDORQJWLPH ZLWKRXWGHWHFWLRQ 90RRQOLJKW0D]HKLJKOLJKWHGWKHLQFUHDVLQJUROHRI VWDWHDXWKRULWLHVLQJHQHUDWLQJVSRQVRULQJRUDWOHDVWSDVVLYHO\WROHUDWLQJ VRSKLVWLFDWHGDQGIDUUHDFKLQJHVSLRQDJHLQFLGHQWV0RUHRYHULWVWUHVVHG WKHYXOQHUDELOLWLHVRIWKHLQIRVSKHUHLQZKLFKDGYHUVDULHVFRXOGQRWRQO\ FDXVHGLVUXSWLRQRIVHUYLFHEXWDOVRFRXOGH[SORLWVHQVLWLYHLQIRUPDWLRQ ,WHPSKDVL]HGWKHFUXFLDOQHHGIRU¿UHZDOOVDQGHQFU\SWLRQVDQGDERYH DOOWKHGLI¿FXOWLHVRILGHQWLI\LQJDQGDWWULEXWLQJDQDWWDFNWRDVSHFL¿F DGYHUVDU\0RRQOLJKW0D]HZDVDQLPSRUWDQWSURJUHVVLRQLQF\EHUZDUIDUH DQGF\EHUVHFXULW\GXHWRLWVLPSOLFDWLRQVRQIXWXUHFRQÀLFWV 10 ,WSRLQWHG RXWWKHIXWXUHVKLIWLQWKHPRGHUQEDWWOH¿HOGIURPDNLQHWLFZDU²LQZKLFK HQHPLHVKDYHQDPHVDQGSK\VLFDOORFDWLRQVDQGLQZKLFKDWWDFNVFDQEH ZLWQHVVHGDQGDVVHVVHG²LQWRDQDV\PPHWULFDOZDUIDUHZLWKRIIHQVLYHF\EHU RSHUDWLRQVZKHUHDWWDFNVPLJKWEHLQYLVLEOHDGYHUVDULHVDUHXQNQRZQDQG GDPDJHLVKDUGWRTXDQWLI\7KHLQFLGHQWOHGWRGUDPDWLFVKLIWVLQWKH86 DGPLQLVWUDWLRQ¶VDSSURDFKWRF\EHUVHFXULW\ OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

35 Paradigm Shift: 7KHDZDUHQHVVRIWHUURULVWWKUHDWVDQGVXSSRUWRI FRXQWHUWHUURULVPLQLWLDWLYHVSRVWDPRQJSROLF\PDNHUVZHUHOLPLWHG 7KH0RRQOLJKW0D]HLQFLGHQWFDXVHGDUHWKLQNLQJRIWKH86F\EHUGHIHQVH VWUDWHJ\F\EHUZDUIDUHDWWULEXWLRQF\EHUGHWHUUHQFHDQGWKHFXUUHQWGHIHQVH RIVHQVLWLYHQRQHQFU\SWHGQHWZRUNVVXFKDV1,3(5QHW 1RQ6HFXUH,QWHUQHW 3URWRFRO5RXWHU1HWZRUNWKH3HQWDJRQ¶VQRQFODVVL¿HGQHWZRUN )RUWKH ¿UVWWLPHSROLWLFDODQGFRQVWLWXWLRQDOTXHVWLRQVZHUHUDLVHGDERXWVHFXULW\ SULYDF\DQGQRWLRQVRIDFWLYHPRQLWRULQJDQGSRVVLEOHH[SRVXUHWRWUDQVQDWLRQDO

WKUHDWV 11 0RRQOLJKW0D]HFDXVHGWKH86DJHQFLHVDQGJRYHUQPHQWWRUHDOL]H 2017 January | 1 No. | 1 Volume | WKDWFOHDUSROLFLHVDQGVWUDWHJLHVZHUHQHHGHGIRUDV\PPHWULFZDUIDUHWKH ¿HOGRIIXWXUHLQWHOOLJHQFHJDWKHULQJDQGHVSLRQDJHDQGWKHWHFKQRORJLFDO LPSOLFDWLRQVWKH\HQWDLO Legislative Acts 7KH3UHVLGHQWLDO'HFLVLRQ'LUHFWLYH 3''  UHJDUGLQJFULWLFDOLQIUDVWUXFWXUHSURWHFWLRQZDVLQSDUWWKHUHVXOWRI0RRQOLJKW 0D]H7KLVZDVDVHPLQDOSROLF\GRFXPHQWVHWWLQJIRUWKUROHVUHVSRQVLELOLWLHV

DQGREMHFWLYHVIRUSURWHFWLQJWKHQDWLRQ¶VXWLOLW\WUDQVSRUWDWLRQ¿QDQFLDODQG Security and Intelligence, Cyber, RWKHUHVVHQWLDOLQIUDVWUXFWXUH 12 7KH3''OHGWRWZRVLJQL¿FDQWVWUDWHJLF LPSOLFDWLRQV2QHZDVWKHFUHDWLRQRIWKH1DWLRQDO,QFLGHQW3URWHFWLRQ&HQWHU 1,3& DQLQWHUDJHQF\ERG\ZLWKWKHSRZHUWRVDIHJXDUGWKHQDWLRQ¶VFLYLOLDQ DQGJRYHUQPHQWDOFULWLFDOLQIUDVWUXFWXUHIURPFRPSXWHUEDVHGDWWDFNV 13 The VHFRQGZDVWKHFUHDWLRQRIWKH-RLQW7DVN)RUFH&RPSXWHU1HWZRUN'HIHQVH -7)&1' DERG\HQWUXVWHGZLWKWDNLQJWKHOHDGLQFRRUGLQDWLQJDUHVSRQVH WRQDWLRQDOF\EHUDWWDFNVDQGFHQWUDOL]LQJWKHGHIHQVHRIPLOLWDU\QHWZRUNV 14 Operational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

3. Militarization—Stuxnet 7KH6WX[QHWDWWDFNLVFRQVLGHUHGRQHRIWKHPRVWVRSKLVWLFDWHGPDOZDUH DWWDFNVSXEOLFO\UHFRUGHG$OWKRXJKXQYHUL¿HGPDQ\H[SHUWVDUJXHWKDWRQO\ OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

36 DQDWLRQVWDWHFRXOGKDYHFUHDWHGDQGODXQFKHGWKHDWWDFNDQGPDQ\PHGLD RXWOHWVVXJJHVWHGLWZDVDMRLQW,VUDHOL$PHULFDQRSHUDWLRQ 15 &RQVLGHUHGDV RQHPRVWLPSDFWIXOF\EHUDWWDFNVLQYROYLQJVRYHUHLJQFRXQWULHVWKHPDOZDUH GDPDJHG,UDQ¶VFHQWULIXJHVDQGGHOD\HGLWVXUDQLXPHQULFKPHQWHIIRUWV 2QFHLQVLGHWKHQHWZRUNLWXVHGDYDULHW\RIPHFKDQLVPVWRSURSDJDWHWR RWKHUPDFKLQHVZLWKLQWKDWQHWZRUNDQGJDLQSULYLOHJHVDVVRRQDVLWKDG LQIHFWHGWKRVHPDFKLQHV7KHVHPHFKDQLVPVLQFOXGHGERWKNQRZQDQG SDWFKHGYXOQHUDELOLWLHVDVZHOODVIRXUYXOQHUDELOLWLHVWKDWZHUHXQNQRZQDQG

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | XQSDWFKHGZKHQWKHZRUPZDVUHOHDVHG DND³]HURGD\´H[SORLWV   :KLOH WKHLQWHUQDWLRQDOFRPPXQLW\UHPDLQVXQVXUHRIWKHVRXUFHDQGH[DFWSXUSRVH RIWKHYLUXVWKHLQFLGHQWUDLVHGDZDUHQHVVRIQHWZRUNV¶YXOQHUDELOLWLHV 17 ,GHQWL¿HGLQ6WX[QHW¶VLPSDFWDQGXQFOHDURULJLQKLJKOLJKWWKH GLI¿FXOW\LQQRWLFLQJDQDWWDFNDQGVXJJHVWWKDWDWDQDWLRQOHYHOLWLV LPSRVVLEOHWRIXOO\GHIHQGDOOYLWDOUHVRXUFHV  7KHUHIRUHLWEHFDPHFUXFLDO WRXQGHUVWDQGWKHG\QDPLFVRIEDWWOHOLNHVLWXDWLRQVLQPRGHUQDJHF\EHU

Cyber, Intelligence, and Security Security and Intelligence, Cyber, ZDUIDUHLQZKLFKHYHQDFRORVVDODWWDFNGRHVQRWQHFHVVDULO\KDYHDQ DWWULEXWHGDWWDFNHURUDWUDFHRIDQ\DWWDFNDWDOO7KLVPHDQVWKDWLQPRGHUQ QRQNLQHWLFEDWWOH¿HOGVSROLF\PDNHUVUHDOL]HWKHHIIHFWRIDQDWWDFN IURP GHQLDORIVHUYLFHWRWKHGHVWUXFWLRQRIDQDWLRQ¶VFULWLFDOLQIUDVWUXFWXUHV  ZLWKRXWKDYLQJDVPRNLQJJXQRUDQ\OHJDORUSROLWLFDOWRROWR¿JKWZLWK 7KLVSKHQRPHQRQUHTXLUHVOHJLVODWRUVDQGDXWKRULWLHVWRVWDUWIRUPXODWLQJ UHVSRQVHRSWLRQVDQGGHWDLOHGSURWRFROVQRZUDWKHUWKDQWU\LQJWRGHYHORS DGKRFRSWLRQVODWHUGXULQJDFULVLV 7KHF\EHUZDUIDUHRISRVWVKLIWHGWKHFRXQWHUDWWDFNDSSURDFKIURP an operational level 19 WRDVWUDWHJLFGLSORPDWLFRQHZKHUHSROLF\LQWHUQDWLRQDO ODZVLQWHUQHWJRYHUQDQFHDQGDJUHHPHQWVSOD\DVLJQL¿FDQWSDUWLQWKH RYHUO\EUHDFKHGF\EHUHQYLURQPHQW7KUHHVXEVWDQWLDOLQWHUQHWJRYHUQDQFH DJUHHPHQWVDQGFROODERUDWLYHHIIRUWVKDYHWDNHQSODFHRQDPXOWLQDWLRQDOOHYHO D 7KH8QLWHG6WDWHV&KLQD&\EHU$JUHHPHQW7KLVDJUHHPHQWHQVXUHVWKDW QHLWKHUJRYHUQPHQW³ZLOOFRQGXFWRUNQRZLQJO\VXSSRUWF\EHUHQDEOHG WKHIWRILQWHOOHFWXDOSURSHUW\LQFOXGLQJWUDGHVHFUHWVRURWKHUFRQ¿GHQWLDO EXVLQHVVLQIRUPDWLRQIRUFRPPHUFLDODGYDQWDJH´ 20 :KLOHLWLVRQO\D EDVLFDJUHHPHQWWKDWGRHVQRWHQVXUHDVDIHF\EHUHQYLURQPHQWEHWZHHQ WKHWZRVWDWHVLWVLPSRUWDQFHVWHPVIURPWKHDELOLW\WREXLOGXSRQLWLQ IXWXUH\HDUVDQGDFWDVDJHVWXUHRIJRRGZLOO OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

37 E 7KH8QLWHG1DWLRQV¶:RUOG6XPPLWRQWKH,QIRUPDWLRQ6RFLHW\SURFHVV :6,6 7KLVVXPPLWUHQHZHGWKH,QWHUQHW*RYHUQDQFH)RUXP ,*)  DYHQXHZKHUHPHPEHUVWDWHVFLYLOVRFLHW\DQGWKHSULYDWHVHFWRUGHEDWH LQWHUQHWSROLF\F\EHUVHFXULW\VXUYHLOODQFHLQWHOOHFWXDOSURSHUW\DQG FRS\ULJKW1DWLRQVKDYHVWUHQJWKHQHGGLSORPDWLFRSHQFKDQQHOVUHJDUGLQJ F\EHUSROLF\UHLWHUDWLQJWKHLUFRPPLWPHQWWREULGJHWKHGLJLWDOGLYLGH DQGLPSURYHDFFHVVWRLQIRUPDWLRQDQGFRPPXQLFDWLRQVWHFKQRORJLHV ,&7V E\UHFRJQL]LQJWKH:6,6GRFXPHQW 21

F 7KH6DIH+DUERU$JUHHPHQW7KLVDJUHHPHQWZDVVLJQHGEHWZHHQWKH 2017 January | 1 No. | 1 Volume | 86'HSDUWPHQWRI&RPPHUFHDQGWKH(XURSHDQ8QLRQDQGUHJXODWHV WKHZD\WKDW86FRPSDQLHVFDQH[SRUWDQGKDQGOHWKHSHUVRQDOGDWDRI (XURSHDQFLWL]HQVIRUWKH¿UVWWLPH 22

US Cybersphere Operational Structure 'XHWRWKHFRPSOH[LW\RIFRRUGLQDWLRQIUDJPHQWHGUHVSRQVLELOLWLHVDQG RYHUODSSLQJRYHUVLJKWWKHPXOWLIDFHWHGF\EHUVSDFHLVVDWXUDWHGZLWKPLOLWDU\ Cyber, Intelligence, and Security Security and Intelligence, Cyber, WKLQNWDQNVDFDGHPLDSULYDWHVHFWRUDQGJRYHUQPHQWLQVWLWXWLRQVEUDQFKHV DQGRI¿FHV$WWKHQDWLRQDOOHYHOLVWKH,QWHOOLJHQFH&RPPXQLW\ZKLFKKDV ERWKGHIHQVLYHDQGRIIHQVLYHFDSDELOLWLHVDQGKDVWKHXOWLPDWHUHVSRQVLELOLW\ LQDGGUHVVLQJDQGPRQLWRULQJPRGHUQF\EHUZDUIDUH:KHWKHULWLVDQDWWDFN DJDLQVWPLOLWDU\RUJRYHUQPHQWRI¿FHVRUDVLJQL¿FDQWDWWDFNDJDLQVWDSULYDWH LQVWLWXWLRQRUFULWLFDOLQIUDVWUXFWXUHWKH,&KROGVWKHRSHUDWLRQDOUHVSRQVLELOLW\ IRUDOODVSHFWVRIWKH8QLWHG6WDWHV¶F\EHUVSKHUH (VWDEOLVKHGLQWKH,&LVDIHGHUDWLRQRIVHYHQWHHQ86JRYHUQPHQW DJHQFLHVWKDWZRUNVHSDUDWHO\DQGWRJHWKHUWRFRQGXFWLQWHOOLJHQFHDFWLYLWLHV 23 0HPEHURUJDQL]DWLRQVLQFOXGHLQWHOOLJHQFHDJHQFLHVPLOLWDU\LQWHOOLJHQFH FLYLOLDQLQWHOOLJHQFHDQGDQDO\VLVRI¿FHVZLWKLQIHGHUDOH[HFXWLYHGHSDUWPHQWV DOOKHDGHGE\WKHGLUHFWRURI1DWLRQDO,QWHOOLJHQFHZKRUHSRUWVGLUHFWO\WRWKH SUHVLGHQW 24 :KLOHPRVWRIWKHDVVRFLDWHGDJHQFLHVDUHRI¿FHVRUEXUHDXVZLWKLQ IHGHUDOH[HFXWLYHGHSDUWPHQWVQLQHRIWKHPRSHUDWHXQGHUWKH'HSDUWPHQW RI'HIHQVHDQGWRJHWKHUVSHQGSHUFHQWRIWKHWRWDO86LQWHOOLJHQFHIXQGV 7UDGLWLRQDOLQWHOOLJHQFHJDWKHULQJUHOLHVRQDFRXQWHUWHUURULVP¶VLQWHOOLJHQFH F\FOHZKLFKLQFOXGHVKXPDQLQWHOOLJHQFH +80,17 VLJQDOVLQWHOOLJHQFH 6,*,17 LPDJHU\LQWHOOLJHQFH ,0,17 DQGPHDVXUHPHQWDQGVLJQDWXUH LQWHOOLJHQFH 0$6,17 :KLOHDOOGLVFLSOLQHVDUHVWLOOQHHGHGWRIRUPDQ LQFOXVLYHLQWHOOLJHQFHDVVHVVPHQWF\EHUDQGFU\SWRORJ\FDSDELOLWLHVKDYH OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

38 JDLQHGPRUHUHFRJQLWLRQDVWKHQHHGIRULQYHVWPHQWLQKXPDQFDSLWDODQG UHVRXUFHVULVHVDQGDVWKHZRUOG¶VUHOLDQFHRQWHFKQRORJ\LQFUHDVHV 7KH,&IRFXVHVRQWKUHHDVSHFWVRIPDLQWDLQLQJF\EHUVHFXULW\RUJDQL]DWLRQ GHWHFWLRQDQGGHWHUUHQFH9DULRXVRUJDQL]DWLRQVZLWKLQWKH,&SXUVXHGLIIHUHQW WDVNV 25 7KH2I¿FHRIWKH'LUHFWRURI1DWLRQDO,QWHOOLJHQFH 2'1, KHDGV DWDVNIRUFHFRRUGLQDWLQJHIIRUWVWRLGHQWLI\VRXUFHVRIIXWXUHF\EHUDWWDFNV 7KH'HSDUWPHQWRI+RPHODQG6HFXULW\ '+6 OHDGVWKHSURWHFWLRQRI JRYHUQPHQWFRPSXWHUV\VWHPV7KH'R'GHYLVHVVWUDWHJLHVIRUSRWHQWLDO

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | F\EHUFRXQWHUDWWDFNV7KH1DWLRQDO6HFXULW\$JHQF\ 16$ PRQLWRUVGHWHFWV UHSRUWVDQGUHVSRQGVWRF\EHUWKUHDWV7KH)HGHUDO%XUHDXRI,QYHVWLJDWLRQ )%, OHDGVQDWLRQDOHIIRUWVWRLQYHVWLJDWHDQGSURVHFXWHF\EHUFULPHV0DQ\ RWKHUF\EHURUJDQL]DWLRQVRXWVLGHWKH,&¶VXPEUHOODDGGUHVVF\EHUWKUHDWV WKHPRVWSURPLQHQWRIZKLFKLVWKH86&\EHU&RPPDQG 86&<%(5&20  'XULQJDFULVLVWKH,&DVVHVVHVLQWHOOLJHQFHZLWKLQLWVVHYHQWHHQDJHQFLHV DQGWKHQIRUPXODWHVRYHUDOOLQWHOOLJHQFHUHFRPPHQGDWLRQVE\WKH2'1,

Cyber, Intelligence, and Security Security and Intelligence, Cyber, ,Q-DPHV&ODSSHUWKHGLUHFWRURI1DWLRQDO,QWHOOLJHQFHZKRRYHUVHHV WKH,&DQGLVUHVSRQVLEOHIRUWKHFRPSOH[FRRUGLQDWLRQEHWZHHQDOOWKHDUPV RIWKH,&UHOHDVHGDULVNDVVHVVPHQWLQZKLFKF\EHUWKUHDWVWRSWKHOLVWRI JOREDOWKUHDWV 26 DKHDGRISK\VLFDOWHUURULVPIRUWKH¿UVWWLPHVLQFHWKHDWWDFNV RI6HSWHPEHU$OWKRXJKF\EHUDWWDFNVDJDLQVWWKH8QLWHG6WDWHVDUH constant and on the rise, 27 &ODSSHUUHIHUUHGWRWKHSRVVLELOLW\RID³F\EHU $UPDJHGGRQ´ DND³F\EHU3HDUO+DUERU´RU³F\EHU´   DVFXUUHQWO\ UHPRWH5DWKHUWKDQD³F\EHU$UPDJHGGRQ´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¿FDQWOHYHORIH[SHUWLVHWRH[HFXWHLWLWGRHVQRWQHFHVVLWDWH VWDWHOHYHO¿QDQFLDODELOLWLHVRUZRUOGFODVVRSHUDWLRQDOWDOHQW$JLYHQDFWRU ZKHWKHUDQDWLRQVWDWHRUDQRQVWDWHJURXSFDQSXUFKDVHPDOZDUHVS\ZDUH ]HURGD\VDQGRWKHUFDSDELOLWLHVRQWKHEODFNPDUNHWDQGFDQSD\H[SHUWV WRVHDUFKIRUYXOQHUDELOLWLHVDQGGHYHORSH[SORLWV,QDJOREDOHQYLURQPHQW EULPPLQJZLWKDGYHUVDULHVDVZHOODVDODFNRILQWHUQDWLRQDOF\EHUODZVDQG OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

39 clear regulations, these threats have created a dangerous and uncontrolled PDUNHWZKLFKVHUYHVPXOWLSOHDFWRUVZLWKLQWKHLQWHUQDWLRQDOV\VWHP 30 Despite the increase in F\EHU DFWLYLW\ E\ non state actors, top 86 intelligence RI¿FLDOV still EHOLHYH that state actors are the greatest threat in F\EHUVSDFH to 86 interests  The ,& LGHQWL¿HV several potential actors who PD\ cause a F\EHU crisis, including nation states with KLJKO\ sophisticated F\EHU SURJUDPV , such as Russia or &KLQD31 nations with lesser technical FDSDELOLWLHV , EXW SRVVLEO\ PRUH disruptive intent, such as ,UDQ or 1RUWK Korea  nonstate actors with

DFFHVVLELOLW\ to VLJQL¿FDQW resources and PRWLYDWLRQ to create F\EHU chaos  and 2017 January | 1 No. | 1 Volume | SUR¿WPRWLYDWHG FULPLQDOV and LGHRORJLFDOO\PRWLYDWHG hackers or H[WUHPLVWV The various SRVVLEOH targets include: D 7KH3ULYDWHVHFWRU7KLVVHFWRULVLGHQWL¿HGQRWRQO\DVDYLFWLPRI F\EHUDWWDFNVEXWDOVRDVDSDUWLFLSDQWLQLQYHVWLJDWLRQVDQGDWWULEXWLRQ *LYHQWKHLPSRUWDQFHRI¿QDQFLDOLQVWLWXWLRQV HJ*ROGPDQ6DFKV WRWKH HFRQRP\LQWKHLUGHSHQGHQF\RQWHFKQRORJ\WKLVVHFWRULVDQLPSRUWDQW 32

¿HOGWRGHIHQGLQFDVHRIDVHULRXVDWWDFN Security and Intelligence, Cyber, E &ULWLFDOLQIUDVWUXFWXUH7KHFULWLFDOLQIUDVWUXFWXUH²WKHSK\VLFDODQGYLUWXDO DVVHWVV\VWHPVDQGQHWZRUNVYLWDOWRQDWLRQDODQGHFRQRPLFVHFXULW\ KHDOWKDQGVDIHW\²LVYXOQHUDEOHWRF\EHUDWWDFNVE\IRUHLJQJRYHUQPHQWV FULPLQDOHQWLWLHVDQGORQHDFWRUV$ODUJHVFDOHDWWDFNFRXOGWHPSRUDULO\ KDOWWKHVXSSO\RIZDWHUHOHFWULFLW\DQGJDVKLQGHUWUDQVSRUWDWLRQDQG FRPPXQLFDWLRQVDQGFULSSOH¿QDQFLDOLQVWLWXWLRQV 33 F *RYHUQPHQW3HQHWUDWLQJWKH86QDWLRQDOGHFLVLRQPDNLQJDSSDUDWXV DQG,QWHOOLJHQFH&RPPXQLW\ZLOOUHPDLQSULPDU\REMHFWLYHVIRUIRUHLJQ LQWHOOLJHQFHHQWLWLHV$GGLWLRQDOO\WKHWDUJHWLQJRIQDWLRQDOVHFXULW\ LQIRUPDWLRQDQGSURSULHWDU\LQIRUPDWLRQIURP86UHVHDUFKLQVWLWXWLRQV GHDOLQJZLWKGHIHQVHHQHUJ\¿QDQFHGXDOXVHWHFKQRORJ\DQGRWKHU DUHDVZLOOEHDSHUVLVWHQWWKUHDWWR86LQWHUHVWV 34 G 0LOLWDU\DQGJRYHUQPHQWDJHQFLHV7KHVHDUHWKHIURQWOLQHRIERWKGHIHQVH DQGRIIHQVHDVLWVLQIUDVWUXFWXUHPXVWGHIHQGWKHHQWLUHQDWLRQDVZHOO DVLWVRZQUHVRXUFHVLQFDVHRIDIXOOVFDOHF\EHUFRQÀLFW,&DVVXPHV WKDWLQDF\EHUFULVLVWKLV³FRQWDFWOLQH´ZLOOEHDWWDFNHGDQGGDPDJHG

The Intelligence Community Policies 7KH,&FRQGXFWVDYDULHW\RILQWHOOLJHQFHRSHUDWLRQVRQDGDLO\EDVLV7KH 8QLWHG6WDWHVLVXQGHUFRQVWDQWF\EHUDWWDFNIURPERWKVWDWHDQGQRQVWDWH OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

40 DFWRUV2QWKHQDWLRQDOLQWHOOLJHQFHOHYHOEHLQJXQGHUF\EHUDWWDFNPHDQV QRWRQO\DGHIHQVLYHHIIRUWEXWDOVRGHVLJQLQJYDULRXVRSHUDWLRQDORSWLRQV IRUUHWDOLDWLRQ*LYHQLWVVL]HWKH,&LQWHUDFWVDQGFROODERUDWHVZLWKDJHQFLHV RQWKHRSHUDWLRQDOOHYHO PLOLWDU\'R''+6 DQGWKHVWDWHDQGIHGHUDOOHYHO SULYDWHVHFWRURQDODUJHVFDOH'HSDUWPHQWRI6WDWH:KLWH+RXVH  7KH,&¶VVWUDWHJLFSUHSDUDWLRQJRDOV 35 include: D %XLOGLQJDQGPDLQWDLQLQJUHDG\IRUFHVDQGFDSDELOLWLHVWRFRQGXFW F\EHUVSDFHRSHUDWLRQV

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | E 'HIHQGLQJLWVRZQLQIRUPDWLRQQHWZRUNVHFXULQJGDWDDQGPLWLJDWLQJ ULVNVWRPLVVLRQV F 3UHSDULQJWRGHIHQG86KRPHODQGDQG86YLWDOLQWHUHVWVDJDLQVWGLVUXSWLYH RUGHVWUXFWLYHF\EHUDWWDFNVRIVLJQL¿FDQWFRQVHTXHQFH G %XLOGLQJDQGPDLQWDLQLQJYLDEOHF\EHURSWLRQVDQGSODQQLQJWRXVHWKRVH RSWLRQVWRFRQWUROFRQÀLFWHVFDODWLRQDQGWRDFWLYHO\H[WUDFWLQIRUPDWLRQ WRSUHSDUH³WDUJHWEDQNV´

Cyber, Intelligence, and Security Security and Intelligence, Cyber, H %XLOGLQJDQGPDLQWDLQLQJUREXVWLQWHUQDWLRQDODOOLDQFHVDQGSDUWQHUVKLSV WRGHWHUVKDUHGWKUHDWVDQGLQFUHDVHLQWHUQDWLRQDOVHFXULW\DQGVWDELOLW\

,&¶VSROLF\RIF\EHUDWWDFNUHVSRQVHLVDVIROORZV D ,GHQWLI\LQJDWWDFNV$VSDUWRIWKHPRGHUQF\EHUEDWWOH¿HOGVRSKLVWLFDWHG DWWDFNHUVZLOODWWHPSWWRFRQFHDOWKHDWWDFN-XVWDVLQDFRQYHQWLRQDO FRQÀLFWLQWHOOLJHQFHLVQHHGHGWRSUHSDUHWKHEDWWOHJURXQGDQGDFFXUDWHO\ DVVHVVWKHSUREDELOLW\RIVXFFHVVDQGXWLOLW\IRUDQ\NLQGRIRSHUDWLRQ  E ,QIRUPLQJ$OWKRXJKWKH,&KDVVLJQL¿FDQWRIIHQVLYHDELOLWLHVLWVPDLQ UROHLVWRDVVHVVLQIRUPDQGUHSRUW7KH,&PXVWLQIRUPWKHRSHUDWLRQDO DUPVLWFROODERUDWHVZLWKDQGWKH6WDWH'HSDUWPHQW7KDWLVXQGHUDWWDFN WKH,&¶VVXFFHVVLVPHDVXUHGE\WKHSUHFDXWLRQVLWJDYHSULRUWRWKHDWWDFN DQGE\LWVUHVSRQVLYHQHVVFRPPXQLFDWLRQDQGJXLGDQFHGXULQJWKHDWWDFN F 3URYLGLQJ options: The ,& PXVW provide a set RI options to decision PDNHUV and HQDEOH strategic ÀH[LELOLW\ E\ providing YDOXDEOH LQIRUPDWLRQ The ,& DGPLQLVWHUV guidance during attack and provides strategic operational and political OHHZD\ with its UHFRPPHQGDWLRQV and intelligence DVVHVVPHQW G 'DPDJH $VVHVVPHQW : 8QOLNH the conventional EDWWOH¿HOG , a F\EHUDWWDFN PD\ EH hard to detect at WLPHV , even LI it is a large scale attack  The ,& PXVW assess the GDPDJH caused so that it can provide SROLF\PDNHUV with the DELOLW\ to retaliate in a PHDVXUDEOH PDQQHU This does not QHFHVVDULO\ require operational HIIRUWV during an attack, EXW rather DVVHVVPHQW , OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

41 coordination, and LQIRUPDWLRQsharing with other RI¿FHV so that there is an HI¿FLHQW ÀRZ RI LQIRUPDWLRQ

Multidimensional Cyber Response 7KH,&¶VUROHRYHUODSVLQPDQ\ZD\VZLWKGLIIHUHQWLQVWLWXWLRQVJRYHUQPHQWDO GHSDUWPHQWVDQGPLOLWDU\XQLWVPDQ\RIZKLFKLVRXWRILWVMXULVGLFWLRQ :KLOHLWGRHVQRWVLQJXODUO\KDYHUHVSRQVLELOLW\IRUF\EHUUHVSRQVHDWWKH QDWLRQDORUVWDWHOHYHOWKH,&GHPDQGVDFRPSOH[FKDLQRILQIRUPDWLRQÀRZ

DQGKLHUDUFK\2WKHULQVWLWXWLRQVWKDWSURYLGHF\EHUUHVSRQVHVDUH 2017 January | 1 No. | 1 Volume | D 'HSDUWPHQWRI+RPHODQG6HFXULW\$VSDUWRILWVUROHWRSURWHFWWKH8QLWHG 6WDWHV¶WHUULWRULHVDQGUHVSRQGWRWHUURULVWDWWDFNVPDQPDGHDFFLGHQWV DQGQDWXUDOGLVDVWHUVWKH'+6LVLQFKDUJHRI&RDVW*XDUG,QWHOOLJHQFH &*, DQGWKH2I¿FHRI,QWHOOLJHQFHDQG$QDO\VLV , $ 7KHODWWHULV UHVSRQVLEOHIRUPDQDJLQJWKHFROOHFWLRQDQDO\VLVDQGIXVLRQRILQWHOOLJHQFH 7KH2I¿FHRI, $GLVVHPLQDWHVLQWHOOLJHQFHWKURXJKRXWWKH'+6DQGWR WKHRWKHUPHPEHUVRIWKH,&FRPPXQLW\DQGLVWKH¿UVWUHVSRQGHUDWWKH Cyber, Intelligence, and Security Security and Intelligence, Cyber, VWDWHORFDODQGWULEDOOHYHOV 37 7KH2'1,LVUHVSRQVLEOHIRUDQHI¿FLHQW LQIRUPDWLRQÀRZEHWZHHQWKHUHVWRIWKHLQWHOOLJHQFHFRPPXQLW\DQG WKH'+6LQRUGHUWRFUHDWHV\QHUJ\RILQIRUPDWLRQGXULQJDF\EHUDWWDFN E 'HSDUWPHQWRI'HIHQVH 'R' &RQVLGHUHGWKHIRFDOSRLQWIRUWKH LQWHOOLJHQFHFRPPXQLW\¶VRSHUDWLRQDOVRXUFHDQGOHDGLQJQLQHRILWV DJHQFLHVLQFOXGLQJWKH16$WKH'R'LVWKH2'1,¶VPDLQVRXUFHRIF\EHU LQWHOOLJHQFH$VVXFKWKH'LUHFWRURI1DWLRQDO,QWHOOLJHQFH '1, RIWHQ UHSRUWVWRGHFLVLRQPDNHUVDQGWKH:KLWH+RXVHEDVHGRQWKHLQWHOOLJHQFH UHFHLYHGIURPWKH'R',QDGGLWLRQWKH16$DQG&<%(5&20OHGE\ $GPLUDO0LFKDHO5RJHUVDQGWKH'1,ZRUNFORVHO\WRJHWKHUGXULQJDQ DWWDFN,WLVQHFHVVDU\WKDWWKHRSHUDWLRQDOGDWDVWUHDPEHSURFHVVHGWKURXJK WKH2'1,DQGUHFHLYHGDVSROLF\UHFRPPHQGDWLRQVDWWKHIHGHUDOOHYHO F 6WDWH'HSDUWPHQW7KHJRYHUQPHQWLVGHSHQGHQWRQWKH,&GXULQJD F\EHUFULVLV8QOLNHLQFRQYHQWLRQDOFRQÀLFWVLWLVVDIHWRDVVXPHWKDW GHFLVLRQPDNHUVRIWHQGRQRWNQRZZKDWKDVKDSSHQHGDQGGRQRWNQRZ WKHRULJLQRIDQDWWDFNLQDF\EHUFULVLVVFHQDULR,WLVXSWRWKH,&WR SURYLGHDQLQWHOOLJHQFHDVVHVVPHQWLQDWLPHO\PDQQHUDQGWRSDVVRQWKH GDWD6PDOOFHQWHUVWKDWDUHWUXVWHGWRHYDOXDWHDQGFRRUGLQDWHVHUYHDV OLDLVRQVEHWZHHQVWDWHLQVWLWXWLRQVDQGWKHF\EHULQWHOOLJHQFH¿HOGVXFK DVWKH1DWLRQDO&\EHUVHFXULW\DQG&RPPXQLFDWLRQV,QWHJUDWLRQ&HQWHU OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

42 1&&,& WKH8QLWHG6WDWHV&RPSXWHU(PHUJHQF\5HDGLQHVV7HDP 86 &(57 DQGWKH&\EHU7KUHDW,QWHOOLJHQFH,QWHJUDWLRQ&HQWHU &7,,&  6WDWLRQHGLQWKH2I¿FHRIWKH'LUHFWRURI1DWLRQDO,QWHOOLJHQFHWKHODWWHU ZLOOPLUURUWKHHIIRUWVDQGDVVHVVPHQWVIRUFRXQWHUWHUURULVPLQIRUPDWLRQ VKDULQJGXULQJF\EHUDWWDFNV  G 3ULYDWH6HFWRU,QIUDVWUXFWXUHF\EHUEUHDFKHVDQGDWWDFNVKDYHEHHQ GH¿QHGDVWKHQXPEHURQHWKUHDWRIWKH8QLWHG6WDWHVLQE\WKH'1, 7KH,QIRUPDWLRQ6KDULQJDQG$QDO\VLV&HQWHU ,6$& LVWKHPDLQDFWRU

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | LQRYHUVHHLQJSULYDWHVHFWRUF\EHUWKUHDWVDV,6$&DVVLVWVIHGHUDODQG ORFDOJRYHUQPHQWVZLWKLQIRUPDWLRQSHUWDLQLQJWRF\EHUWKUHDWV3ULYDWH VHFWRUF\EHUFULVHVPD\DIIHFWQDWLRQDOLQWHUHVWV HJWKH6RQ\LQFLGHQW  DQGWKXVLQFROODERUDWLRQZLWK'+6'HSDUWPHQWRI6WDWHDQGWKH)%, WKHSULYDWHVHFWRUGHPDQGVWKDWDQRSHUDWLRQDOLQWHOOLJHQFHDSSURDFKEH WDNHQDWWKHQDWLRQDOOHYHO

Conclusions Cyber, Intelligence, and Security Security and Intelligence, Cyber, 7KHKLVWRU\RIF\EHUZDUIDUHSRVHVPDQ\OHVVRQVDQGPD\LQGLFDWHWKH SURJUHVVLRQDQGGLUHFWLRQRIWKHF\EHUVSKHUHDVZHOODVWKHFRPSUHKHQVLYH DWWHQWLRQUHTXLUHGE\WKH¿HOGDWDOOOHYHOV&\EHUZDUIDUH¶VQDWXUDOHYROXWLRQ LVDQLPSRUWDQWWRROWRDVVHVVPLVWDNHVDQGSURMHFWWKHIXWXUHRIWKHLQIRVSKHUH SULYDF\UHJXODWLRQVF\EHUHVSLRQDJHDQGF\EHUVHFXULW\QHHGV3ROLF\PDNHUV DUHDGGUHVVLQJWKHF\EHUVSKHUHWRGD\PRUHVHULRXVO\WKDQHYHUEHIRUHDQG LQVWLWXWLRQVDWDOOOHYHOVDUHGLUHFWLQJVXEVWDQWLDOUHVRXUFHVWRDGGUHVVF\EHU WKUHDWV,QWHOOLJHQFHDJHQFLHVFRQVWDQWO\DUHSHUIHFWLQJWKHLUGHIHQVLYHDQG RIIHQVLYHF\EHUFDSDELOLWLHV3ULYDWHLQVWLWXWLRQVHVSHFLDOO\LQWKH¿HOGVRI PHGLFLQH¿QDQFHFULWLFDOLQIUDVWUXFWXUHDQGHQHUJ\LQDGGLWLRQWRGDWDGULYHQ FRUSRUDWLRQVDOORFDWHPRUHUHVRXUFHVDQGKXPDQSRZHUWRGDWDSURWHFWLRQ DQGF\EHUVHFXULW\WKDQHYHUEHIRUH/DVWO\WKH$PHULFDQJRYHUQPHQWLV DZDUHRIWKHULVNVWRLWVRZQQHWZRUNVDQGZKLOHEUHDFKHVDUHPRUHFRPPRQ WKDQHYHULQYHVWPHQWVWRQXUWXUHDPRUHGHIHQVLEOHF\EHUVSDFHDUHDWDQ DOOWLPHSHDN 7KHUHDUHVHYHUDOIXQGDPHQWDOSROLF\UHDOL]DWLRQVDWWKHLQWHUQDWLRQDOOHYHO 0RVWSROLF\PDNHUVDQGOHJLVODWRUVGRQRWKDYHDFRPSUHKHQVLYHFDSDFLW\WR DGGUHVVLQWHUQDWLRQDOF\EHUDWWDFNV)RUH[DPSOHWKHUHLVQRWDQDOOLQFOXVLYH GH¿QLWLRQIRU³DFWVRIZDU´LQWKHQRQNLQHWLFVSKHUHDQGWKHH[LVWLQJ GH¿QLWLRQVDUHXQFOHDUDQGQRWVKDUHGDQGDJUHHGXSRQDWWKHLQWHUQDWLRQDO OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

43 OHYHO0RUHRYHUUHWDOLDWLRQPHFKDQLVPVIRUD¿QDQFLDOF\EHUFULVLVDUHQRWLQ SODFHSUHYHQWLQJQDWLRQVWDWHVIURPDWWULEXWLQJODUJHVFDOHDWWDFNVWRVSHFL¿F DWWDFNHUVDQGDOORZLQJRWKHUDFWRUVWRDYRLGDFFRXQWDELOLW\,QWHUQDWLRQDO FROODERUDWLRQDWDOOOHYHOVHVSHFLDOO\LQWKH¿QDQFLDOGLSORPDWLFDQGWKH MXGLFLDU\IURQWVDUHLQQHHGDVDODFNRIFROODERUDWLRQPD\SUHYHQWDVWDEOH IRXQGDWLRQXSRQZKLFKDFFRXQWDELOLW\PHFKDQLVPVFDQEHIRUPHG'HVSLWH WKHJURZLQJPXOWLVHFWRULQYHVWPHQWVLQF\EHUVHFXULW\PRUHVRSKLVWLFDWHG DWWDFNVKDYHWDNHQSODFHLQWKHODVWWKUHH\HDUVWKDQSUHYLRXVO\7KHUHIRUHLW

DSSHDUVWKDWRQO\PXOWLQDWLRQDOVXEVWDQWLDODQGELQGLQJF\EHUDJUHHPHQWV 2017 January | 1 No. | 1 Volume | DQGSURJUHVVLYHLQWHUQHWJRYHUQDQFHOHJLVODWLRQZLOODOORZIRUDVXEVWDQWLDOO\ VDIHUF\EHUVSKHUH 2QWKHVHFXULW\IURQWWKH,&IRUPVQDUUDWLYHDQGRSHUDWLRQDO UHFRPPHQGDWLRQVWRSROLF\PDNHUVGXHWRLWVFRRUGLQDWLRQDELOLW\DQGYDVW MXULVGLFWLRQ7KHELJJHVWFKDOOHQJHGXULQJDF\EHUDWWDFNLVWRLGHQWLI\DQG FRQQHFWWKHGLIIHUHQWGRWVIRUJHQHUDWLQJDUHVSRQVLEOHDQGPHDVXUDEOH

UHVSRQVH:LWKRXWDERG\OLNHWKH,&WKHDEXQGDQFHRIGDWDZRXOGJHWORVW Security and Intelligence, Cyber, LQDPD]HRILQIRUPDWLRQ-XVWOLNHLQDNLQHWLFEDWWOH¿HOGWKHGHIHQVHOLQH ZLOOHYHQWXDOO\EHSHQHWUDWHGJLYHQDSHUVLVWHQWDWWDFNHU8QOLNHWKHFODVVLF EDWWOH¿HOGKRZHYHUDJLYHQF\EHUDWWDFNPD\QRWEHVHHQDWWULEXWLRQPD\ QRWEHSODXVLEOHDQGWKHLPSDFWPD\QRWEHQRWLFHDEOH&\EHUWHUURULVPPD\ EHFRPHDJURZLQJFRQFHUQZLWKWLPHDQGPD\UHTXLUHJUHDWHULQWHUQDWLRQDO LQWHOOLJHQFHFROODERUDWLRQVWKDQHYHU,QWHUQDOQDWLRQDOLQWHOOLJHQFHVHFXULW\ DJHQFLHVPD\EHIRUFHGWRFKDQJHGLVFLSOLQHVDQGVKLIWWKHLUVWUDWHJLF DWWHQWLRQ,WLVWKXVSODXVLEOHWRSURMHFWWKDWLQWKHIXWXUHQXFOHDUZHDSRQV ZLOOQRORQJHUEHWKHXOWLPDWHDQGJUHDWHVWWKUHDW

Notes  -DVRQ+HDOH\HG $)LHUFH'RPDLQ&RQÀLFWLQ&\EHUVSDFHWR 9LHQQD9$&\EHU&RQÀLFW6WXGLHV$VVRFLDWLRQ   7HG(LVHQEHUJHWDO“7KH&RUQHOO&RPPLVVLRQ2Q0RUULVDQGWKH:RUP´ Communications of the ACM QR  ±KWWSSRUWDODFPRUJ FLWDWLRQFIP"LG   'XULQJWKH0RUULVDSSHDOSURFHVVWKH86&RXUWRI$SSHDOVHVWLPDWHGWKHFRVW RIUHPRYLQJWKHYLUXVIURPHDFKLQVWDOODWLRQZDVLQWKHUDQJHRI± 3RVVLEO\EDVHGRQWKHVHQXPEHUV+DUYDUGVSRNHVPDQ&OLIIRUG6WROOHVWLPDWHGWKH WRWDOHFRQRPLFLPSDFWZDVEHWZHHQWR  (LVHQEHUJHWDO³7KH&RUQHOO&RPPLVVLRQ2Q0RUULVDQGWKH:RUP´ OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

44  0LFKDHO5XVWDGDQG'LDQH'¶$QJHOR³7KH3DWKRI,QWHUQHW/DZ$Q$QQRWDWHG *XLGHWR/HJDO/DQGPDUNV´LQ Duke Law & Technology Review HG %HDWULFH+DKQ 'XUKDP'XNH8QLYHUVLW\6FKRRORI/DZ   8QLWHG6WDWHVY0RUULV G&LU XSKROGLQJWKHFRQYLFWLRQRIDFRPSXWHU VFLHQFHJUDGXDWHVWXGHQWXQGHUWKH&RPSXWHU)UDXGDQG$EXVH$FW 7 Hearing before Committee on Governmental Affairs, US Senate  0DUFK  WHVWLPRQ\RI-DPHV$GDPV&KLHI([HFXWLYH2I¿FHU,QIUDVWUXFWXUH'HIHQVH,QF   $GDP(ONXV³0RRQOLJKW0D]H´LQ $)LHUFH'RPDLQ&RQÀLFWLQ&\EHUVSDFH WR  5\DQ5LFKDUG*HOLQDV³&\EHUGHWHUUHQFHDQGWKH3UREOHPRI$WWULEXWLRQ ,´ | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | PDVWHU¶VWKHVLV*HRUJHWRZQ8QLYHUVLW\ KWWSSDSHUVHHEXJRUJSDSHUV $37$37B&\EHU&ULPLQDOB&DPSDJLQKLVWRULFDOJHOLQDV5\DQSGI  0DUFLD0F*RZDQ³

45  ([HFXWLYH2UGHU1R8QLWHG6WDWHV,QWHOOLJHQFH$FWLYLWLHV 'HFHPEHU  &HQWUDO,QWHOOLJHQFH$JHQF\KWWSVZZZFLDJRYDERXWFLDHRKWPO  ³7KH2UJDQL]DWLRQDO$UUDQJHPHQWVIRUWKH,QWHOOLJHQFH&RPPXQLW\´ Federation of American Scientists )HEUXDU\KWWSIDVRUJLUSRIIGRFVLQWKWPO  (ULF5RVHQEDFKDQG$NL-3HULW]³&\EHU6HFXULW\DQGWKH,QWHOOLJHQFH &RPPXQLW\´LQ Confrontation or Collaboration? Congress and the Intelligence Community HG(ULF5RVHQEDFK +DUYDUG.HQQHG\6FKRRO%HOIHU&HQWHUIRU 6FLHQFHDQG,QWHUQDWLRQDO$IIDLUV   Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community, Senate Armed Security Committee  )HEUXDU\  VWDWHPHQWRI -DPHV5&ODSSHU'LUHFWRURI1DWLRQDO,QWHOOLJHQFH  2017 January | 1 No. | 1 Volume |  KWWSZZZGQLJRY¿OHVGRFXPHQWV8QFODVVL¿HGBB$7$B6)5BB6$6&B ),1$/SGI  ³1RUVH,QWHOOLJHQFH3ODWIRUP´1RUVHKWWSPDSQRUVHFRUSFRP  .ULVWHQ(LFKHQVHKU³&\EHUVHFXULW\LQWKH,QWHOOLJHQFH&RPPXQLW\¶V :RUOGZLGH7KUHDW$VVHVVPHQW´ JustSecurity 0DUFKKWWSVZZZ MXVWVHFXULW\RUJF\EHUVHFXULW\XVLQWHOOLJHQFHFRPPXQLW\V ZRUOGZLGHWKUHDWDVVHVVPHQW  ,ELG Cyber, Intelligence, and Security Security and Intelligence, Cyber,  'HSDUWPHQWRI'HIHQVH³7KH'R'&\EHU6WUDWHJ\´$SULO KWWSZZZGHIHQVHJRY3RUWDOVIHDWXUHVBF\EHUVWUDWHJ\)LQDOBB 'R'B&\EHUB6WUDWHJ\BIRUBZHESGI  0DUN3RPHUOHDX³,&OHDGHUV)XWXUHF\EHUDWWDFNVZLOOGRUHDOGDPDJH´ Defense Systems 6HSWHPEHUKWWSVGHIHQVHV\VWHPVFRPDUWLFOHVLF OHDGHUVPDSRXWQDWLRQVWDWHF\EHUWKUHDWVDVS[   ,ELG  $QGUHZ0HROD³&\EHUDWWDFNVDJDLQVWRXUFULWLFDOLQIUDVWUXFWXUHDUHOLNHO\WR LQFUHDVH´ Business Insider 0D\KWWSZZZEXVLQHVVLQVLGHUFRPF\EHU DWWDFNVDJDLQVWRXUFULWLFDOLQIUDVWUXFWXUHDUHOLNHO\WRLQFUHDVH  ,ELG  ,ELG  $DURQ%UDQWO\³'H¿QLQJWKHUROHRILQWHOOLJHQFHLQF\EHU´LQ Understanding the Intelligence Cycle ed  0DUN3K\WKLDQ /RQGRQDQG1HZ

Lessons Learned from the “Viral Caliphate”: Viral Effect as a New PSYOPS Tool?

Miron Lakomy

This paper aims to analyze still unnoticed aspects of the so-called Islamic State’s cyber jihadist campaign in order to indicate its potential utility for state-sponsored information warfare. To begin with, it tends to present the most important features of the “Islamic Caliphate’s” online campaign, which aims to generate the “viral effect.” Moreover, the paper attempts to provide an overview of earlier military conflicts, in which the viral effect could be noticed. And finally, based on these considerations, it answers the question how viral marketing methods and mechanisms can be used as viable tools in psychological operations.

Keywords: cyber jihadism, cyber propaganda, information warfare, PSYOPS, viral effect, viral marketing

Introduction ,QIRUPDWLRQZDUIDUH 1LVEHFRPLQJDQLQFUHDVLQJO\LPSRUWDQWDVSHFWRI FRQWHPSRUDU\PLOLWDU\FRQÀLFWV 2$VPDQ\UHFHQWH[DPSOHVKDYHSURYHQWKH PDQLSXODWLRQRILQIRUPDWLRQLVIUHTXHQWO\FULWLFDOWRJDLQLQJDQDGYDQWDJH RYHUWKHHQHP\ 32QHPHWKRGRIGRLQJWKLVLVWKURXJKWKHXVHRISV\FKRORJLFDO RSHUDWLRQV 36<236  4ZKLFKDLPVWRLQÀXHQFHDWWLWXGHVDQGWKHEHKDYLRU RIKRVWLOHSRSXODWLRQVFRXQWHUHQHP\SURSDJDQGDDQGGLVLQIRUPDWLRQDQG HVWDEOLVKFUHGLELOLW\DPRQJWKHSHRSOHWDUJHWHG8QWLOWKHHQGRIWKH&ROG:DU

Dr. Miron Lakomy is an assistant professor at the Institute of Political Sciences and Journalism, University of Silesia, Katowice, Poland.

Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017 47 MIRON LAKOMY | LESSONS LEARNED FROM THE “VIRAL CALIPHATE”: VIRAL EFFECT AS A NEW PSYOPS TOOL?

48 WKHVHJRDOVZHUHXVXDOO\UHDFKHGWKURXJKYDULRXVEXWUDWKHUXQVRSKLVWLFDWHG PHWKRGVVXFKDVORXGVSHDNHUVOHDÀHWGURSVUDGLRSURJUDPPLQJFRPLF ERRNVSRVWHUVDQG79VSRWVDQGEXOOHWLQV 5$QHZHUDRILQIRUPDWLRQZDUIDUH HPHUJHGDWWKHHQGRIWKHWZHQWLHWKFHQWXU\ZLWKWKHZRUOGZLGHSURSDJDWLRQ RIWKH,QWHUQHW&\EHUVSDFHEHLQJDQHZGRPDLQRIPXOWLGLPHQVLRQDOKXPDQ DFWLYLWLHVSURYHGWRKDYHPXOWLSOHXQLTXHIHDWXUHVZKLFKHQDEOHGQHZNLQGV RIRIIHQVLYHDQGGHIHQVLYHLQIRUPDWLRQRSHUDWLRQV 7KHPRVWIXQGDPHQWDO RIWKHVHRSHUDWLRQVZDVDFFXUDWHO\GHVFULEHGE\:7HFXPVHK)LWFK³:KHQ

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | ,FRQVLGHUWKHHIIHFWRIWKH,QWHUQHWRQP\WKRXJKW,NHHSFRPLQJEDFN WRWKHVDPHPHWDSKRU:KDWPDNHVWKH,QWHUQHWIXQGDPHQWDOO\QHZLVWKH PDQ\WRPDQ\W\SRORJ\RIFRQQHFWLRQLWDOORZV6XGGHQO\DQ\WZR,QWHUQHW HTXLSSHGKXPDQVFDQWUDQVIHUHVVHQWLDOLQIRUPDWLRQÀH[LEO\DQGHI¿FLHQWO\ :HFDQWUDQVIHUZRUGVFRGHHTXDWLRQVPXVLFRUYLGHRDQ\WLPHWRDQ\RQH HVVHQWLDOO\IRUIUHH´ 7 ,WLVZHOONQRZQWKDWWKHXVHRIF\EHUVSDFHIRULQIRUPDWLRQZDUIDUHLVQRW

Cyber, Intelligence, and Security Security and Intelligence, Cyber, DQHZSKHQRPHQRQ0DQ\HDUO\H[DPSOHVVXFKDVWKH86LQWHUYHQWLRQLQ,UDT RUWKH&DXFDVXVZDULQLQGLFDWHGWKDWF\EHUSURSDJDQGDXVXDOO\UHVWHG RQDGDSWLQJWKHPHDQVRIWUDGLWLRQDO36<236WRWKHHOHFWURQLFHQYLURQPHQW ,QVWHDGRIOHDÀHWVDQGORXGVSHDNHUVWKH\IUHTXHQWO\XWLOL]HGSRRUO\GHVLJQHG VSDPLQWKHIRUPRIHPDLOVRUZHEVLWHFRPPHQWV3RVWHUVZHUHWUDQVIRUPHG LQWREDQQHUVDQGPHVVDJHVWKDWZHUHSRVWHGRQGHIDFHGZHEVLWHVDQGVRFLDO PHGLDVLWHV 79EXOOHWLQVHPHUJHGDVYLGHRVWKDWZHUHUHOHDVHGYLDSRSXODU KRVWLQJVHUYLFHVVXFKDV

49 ,QWKLVFRQWH[WWKLVVWXG\KDVWKUHHJRDOV)LUVWWKLVVWXG\ZLOOSUHVHQWWKH PRVWLPSRUWDQWIHDWXUHVRIWKH³,VODPLF&DOLSKDWH¶V´RQOLQHFDPSDLJQZKLFK JHQHUDWHWKH³YLUDOHIIHFW´6HFRQGWKLVVWXG\ZLOOSURYLGHDQRYHUYLHZRI HDUOLHUPLOLWDU\FRQÀLFWVLQZKLFKWKHYLUDOHIIHFWFRXOGEHVSRWWHG7KLUG EDVHGRQWKHVHFRQVLGHUDWLRQVWKLVVWXG\ZLOODQVZHUKRZYLUDOPDUNHWLQJ PHWKRGVDQGPHFKDQLVPVFDQEHXVHGDVYLDEOHWRROVLQSV\FKRORJLFDO RSHUDWLRQV7RVXPPDUL]HWKHSDSHUDLPVWRDQDO\]HVWLOOXQQRWLFHGDVSHFWV RIWKH,6F\EHUMLKDGLVWFDPSDLJQLQRUGHUWRLQGLFDWHLWVSRWHQWLDOXWLOLW\IRU

VWDWHVSRQVRUHGLQIRUPDWLRQZDUIDUH7RDFKLHYHWKHVHREMHFWLYHVWKHSDSHU 2017 January | 1 No. | 1 Volume | KDVEHHQGLYLGHGLQWRWKUHHVHFWLRQV7KH¿UVWVHFWLRQDWWHPSWVWRFKDUDFWHUL]H WKHSKHQRPHQRQRIWKHYLUDOHIIHFWIURPWKHSHUVSHFWLYHRILWVSRWHQWLDO XVDELOLW\IRUSV\FKRORJLFDORSHUDWLRQV7KHVHFRQGVHFWLRQSUHVHQWVDVKRUW RYHUYLHZRIFRQÀLFWVLQZKLFKSURSDJDQGDZHQWYLUDO)LQDOO\WKHODVWSDUW IRFXVHVRQWKH³YLUDOFDOLSKDWH´LHWKHUHDVRQVZK\WKHYLUDOHIIHFWLVVR HYLGHQWLQ,6¶VF\EHUMLKDGLVWDFWLYLWLHV Cyber, Intelligence, and Security Security and Intelligence, Cyber, De#ning the Viral E"ect 7KHYLUDOHIIHFWLVDVXEMHFWRILQGHSWKPDUNHWLQJUHVHDUFKZKLFKKDV GLVFRYHUHGWKDWF\EHUVSDFHHQDEOHVWKHGHYHORSPHQWRIWKHZHOONQRZQ PHFKDQLVP³ZRUGRIPRXWK´,WFDQEHGH¿QHGDVWKHXVHRILQÀXHQFHUV ³WRJHQHUDWHSHHUWRSHHUSURGXFWUHFRPPHQGDWLRQVRUEX]]´ 11 +LVWRULFDOO\ ZRUGRIPRXWKZDVVWULFWO\GHSHQGHQWRQGLUHFWSK\VLFDOFRQWDFWEHWZHHQ SHHUVZKLFKOLPLWHGLWVJHRJUDSKLFDOFRYHUDJHDQGPHVVDJHSUROLIHUDWLRQ UDWH 12 ,QWKHLQIRUPDWLRQUHYROXWLRQHUDZRUGRIPRXWKKDVHYROYHGLQWR YLUDOPDUNHWLQJZKLFKLVGH¿QHGE\0DULD:RHUQGODQGRWKHUVDV³WKH WUDQVPLVVLRQRIPDUNHWLQJPHVVDJHVWKURXJKYDULRXV,QWHUQHWEDVHGFKDQQHOV E\SHHUV'XULQJWKHVHWUDQVPLVVLRQVLQIRUPDWLRQSDVVHVEHWZHHQLQGLYLGXDOV ZLWKRXWWKHLQYROYHPHQWRIWKHRULJLQDOPHVVDJHVRXUFHSURSDJDWLQJOLNHD YLUXVZRXOGKDYHGRQHLQIHFWLQJWKHKRVWV´ 13 9LUDOPDUNHWLQJWHFKQLTXHV WKHUHIRUHDLPWRLQFLWHWKH³YLUDOHIIHFW´ZKLFKFDQEHEURDGO\GH¿QHGDV DSURFHVVRIWKHH[SRQHQWLDOSUROLIHUDWLRQRIDPHVVDJHRQOLQHLQZKLFK LQGLYLGXDOV³LQIHFWHG´E\LWVFRQWHQWVKDUHLWZLWKWKHLUSHHUVWKURXJKWKHLU HOHFWURQLFHQYLURQPHQW7KHIRUPRIVXFKDPHVVDJHYDULHVVWDUWLQJIURP VLPSOHHPDLOVZHEVLWHVSLFWXUHV HJ³PHPHV´ WRJDPHVYLGHRVPXVLF DQGGRFXPHQWV,QSULQFLSOHDOPRVWDQ\IRUPRIXQFRPPRQFRQWHQWXQGHU DSSURSULDWHFRQGLWLRQVPD\LQVSLUHLQGLYLGXDOVWRSURSDJDWHLWDPRQJWKHLU MIRON LAKOMY | LESSONS LEARNED FROM THE “VIRAL CALIPHATE”: VIRAL EFFECT AS A NEW PSYOPS TOOL?

50 IULHQGVDVVRFLDWHVDQGIDPLO\7KHWHUP³YLUDOPDUNHWLQJ´ZDVFRLQHG E\6WHYH-XUYHWVRQDQG7LP'UDSHUWRGHVFULEHWKHG\QDPLFH[SDQVLRQRI +RWPDLOLQZKLFKKDGDGYHUWLVHGLWVVHUYLFHVLQWKHRXWJRLQJHPDLOVRI LWVXVHUV,WKDGDOORZHGWKHFRPSDQ\WRJURZWZHQW\IRXUWLPHVODUJHURYHU DRQH\HDUSHULRG 14 ,QWKHWZHQW\¿UVWFHQWXU\YLUDOPDUNHWLQJWHFKQLTXHV KDYHIRFXVHGPRVWO\RQWKHXVHRIVKRUWLQWHUHVWLQJDQGXQFRQYHQWLRQDO YLGHRV2QHRIWKH¿UVWDGYHUWLVHPHQWFDPSDLJQVWRGRVRZDVE\WKHEOHQGHU PDQXIDFWXUHU%OHQG7HFZKLFKKDGSUHSDUHGDVHULHVRIRQOLQHYLGHRVHQWLWOHG

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | ³:LOOLWEOHQG"´,WSUHVHQWHGWHVWVRILWVSURGXFWVXVLQJXQXVXDOLWHPVVXFK DVH[SHQVLYHVPDUWSKRQHVZRRGHQERDUGVRUZDWFKHV7KLVXQLTXHDSSURDFK WRDGYHUWLVLQJKLWWKHPDUNDVWKHVHULHVZHQWYLUDO%OHQG7HF¶V

Cyber, Intelligence, and Security Security and Intelligence, Cyber, 3UDQNDUHZRUWKPHQWLRQLQJ 7KHYLUDOHIIHFWLVQRWRQO\OLPLWHGWRSURIHVVLRQDODGYHUWLVHPHQWV WKHVDPHPHFKDQLFVDUHH[SORLWHGE\KREE\LVWVDQGDPDWHXUV,QIDFWD ODUJHSDUWRIWKH³JRLQJYLUDO´FRQWHQWLVFUHDWHGSXUHO\³IRUIXQ´DQGQRW IRUSUR¿WUHOHDVHGRQVRFLDOPHGLDVXFKDV

51 DVOHVVLQWHUUXSWLYHDQGPRUHFUHGLEOHWKXVOLPLWLQJWKHSRVVLEOHQHJDWLYH HIIHFWVRIDSURSDJDQGDFDPSDLJQ 19 ,QRUGHUWRLQFUHDVHWKHFKDQFHVRIWKHRFFXUUHQFHRIWKHYLUDOHIIHFWLQ 36<236DQXPEHURIFRQGLWLRQVVKRXOGEHFRQVLGHUHG7RVWDUWZLWKLWV DSSHDUDQFHLVGHSHQGHQWRQWKHFRQWHQWRIWKHPHVVDJHZKLFKQHHGVWREH SUHVHQWHGLQDQHDVLO\UHFHLYDEOHLQWHUHVWLQJDQGXQFRQYHQWLRQDOIRUP+XPRU YLROHQFHDQGVH[XDOLW\DUHXVXDOO\WKHWKHPHVWKDWFDQLQÀXHQFHLQGLYLGXDOV WRWUDQVPLWWKHPHVVDJHDVWKH\DUHWKHHDVLHVWZD\WRDURXVHHPRWLRQV 20

7KLVIHDWXUHLVFUXFLDOIRULQIRUPDWLRQZDUIDUHDVHPRWLRQFDQ³LQIHFW´ 2017 January | 1 No. | 1 Volume | UHFLSLHQWVZLWKDQLGHDDQGHQFRXUDJHWKHPWRGLVVHPLQDWHLW)XUWKHUPRUH DOWKRXJKWKHYLUDOHIIHFWZDVVXFFHVVIXOO\WHVWHGLQ:HEFRQWDLQLQJPRVWO\ VWDWLFFRQWHQW ³UHDGRQO\ZHE´  21 QRZDGD\VLWLVVWULFWO\GHSHQGHQWRQWKH VRSKLVWLFDWHGXVHRIVRFLDOQHWZRUNLQJ7KDQNVWRWKHSRSXODULW\RIVXFK VHUYLFHVDV)DFHERRN7ZLWWHU,QVWDJUDPRU

SUROLIHUDWHH[SRQHQWLDOO\DQGDOPRVWLQVWDQWO\UHDFKDXGLHQFHVZRUOGZLGH Security and Intelligence, Cyber, -XVWRQHVKDUHRQDSRSXODUVRFLDOPHGLDDFFRXQWPD\HQFRXUDJHWKRXVDQGV RUHYHQPLOOLRQVWRFOLFNWKHOLQN 22 7KLVLVVWULFWO\FRQQHFWHGWRWKHEURDGHU LVVXHRIWKHQHWZRUNWRSRORJ\ZKLFKREYLRXVO\LQÀXHQFHVWKHVSUHDGLQJ RILQIRUPDWLRQ$V5RPXDOGR3DVWRU6DWRUUDVDQG$OHVVDQGUR9HVSLJQDQL VWUHVVHG³WKHW\SRORJ\RIWKHQHWZRUNKDVDJUHDWLQÀXHQFHLQWKHRYHUDOO EHKDYLRURIHSLGHPLFVSUHDGLQJ7KHFRQQHFWLYLW\ÀXFWXDWLRQVRIWKHQHWZRUN SOD\DPDMRUUROHE\VWURQJO\HQKDQFLQJWKHLQIHFWLRQ¶VLQFLGHQFH´ 23 There LVDGLIIHUHQFHKRZHYHULQYLUXVDQGLQIRUPDWLRQSUROLIHUDWLRQDFFRUGLQJ WR$OEHUW/iV]OR%DUDEiVLDQGRWKHUVWKHLQIRUPDWLRQVSUHDGVSXUSRVHIXOO\ ZKHUHDVWKHYLUXVGRHVQRWDQGWKXVLWUHSUHVHQWVDPRUHFRPSOH[EHKDYLRU 24 0RUHRYHUYLUDOHI¿FLHQF\GHSHQGVRQWKHOHYHORIWKHLQIRUPDWLRQDQG FRPPXQLFDWLRQVWHFKQRORJ\ ,&7 GHYHORSPHQWRIWKHFRXQWU\VRFLHW\EHLQJ WDUJHWHG(OHFWURQLFDOO\XQGHUGHYHORSHGQDWLRQVDUHOHVVVXVFHSWLEOHWRRQOLQH SURSDJDQGD6LPXOWDQHRXVO\VRFLHWLHVWKDWDUHKLJKO\GHSHQGHQWRQHOHFWURQLF FRPPXQLFDWLRQSRVHDPRUHVXLWDEOHWDUJHWDVWKHPDQLSXODWLYHPHVVDJHZLOO KDYHDELJJHUFKDQFHWRDFWXDOO\³JRYLUDO´GXHWRWKHTXDQWLW\DQGTXDOLW\ RIRQOLQHLQWHUDFWLRQV$QG¿QDOO\WKHSRSXODWLRQEHLQJWDUJHWHGPD\EHOHVV NHHQWRXVHWKH,QWHUQHWLQDQRUGLQDU\PDQQHUGXULQJDFULVLVRUFRQÀLFWDV WKHLULQWHUHVWVZLOOEHGUDZQDZD\IURPHYHU\GD\RQOLQHDFWLYLWLHV0RUHRYHU DXGLHQFHVPD\EHPXFKPRUHVXVSLFLRXVRIXQNQRZQRQOLQHFRQWHQW7KXV MIRON LAKOMY | LESSONS LEARNED FROM THE “VIRAL CALIPHATE”: VIRAL EFFECT AS A NEW PSYOPS TOOL?

52 WKHYLUDOHIIHFWWKHRUHWLFDOO\VKRXOGEHPRUHGLI¿FXOWWRDFKLHYH$VWKH$UDE 6SULQJH[SHULHQFHVVXJJHVW 25 however, even during serious crises, people WHQGWRXVHHOHFWURQLFFRPPXQLFDWLRQH[WHQVLYHO\IRULQIRUPDWLRQFROOHFWLRQ RUFRRUGLQDWLRQSXUSRVHV7KDWLVZK\LQPRVWVLWXDWLRQVLWVKRXOGVWLOOEH SRVVLEOHWRJHQHUDWHDYLUDOHIIHFWWKDWZRXOGUHVRQDWHWKURXJKRXWWKHWDUJHWHG VRFLHWLHV¶HOHFWURQLFHQYLURQPHQW ,QVXPPDU\YLUDOPHVVDJHVZKHWKHUIRUSUR¿WRUQRQSUR¿WDPDWHXURU SURIHVVLRQDODUHXQFRQYHQWLRQDOLQQDWXUHDQGVWDQGRXWDPRQJVWWKHSOHWKRUD

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | RI,QWHUQHWFRQWHQWZKLFKLVWKHNH\WRWKHLUSRSXODULW\7KH\IUHTXHQWO\ WUDQVJUHVVW\SLFDORQOLQHFRPPXQLFDWLRQPHWKRGVWKHUHIRUH attracting the DWWHQWLRQRI,QWHUQHWXVHUV7KHYLUDOHIIHFWUHIHUVWRDSSHDOLQJWRWKHLQWHUHVW RIWKH,QWHUQHWXVHUVLQRUGHUWR³LQIHFW´WKHPZLWKDFRQFHSWLGHDRUEUDQG ZKLFKWKHQVKRXOGEHWUDQVIHUUHGWRRWKHUXVHUVWKURXJKWKHZLGHVSHFWUXPRI VRFLDOPHGLDFKDQQHOV$VDPDWWHURIIDFWZLWKRXWWKHXVHRIFRQWHPSRUDU\ VRFLDOPHGLDDQGYDULRXVLQWHUFRQQHFWHGDSSOLFDWLRQVDWUHQGRIWKLVVFDOH

Cyber, Intelligence, and Security Security and Intelligence, Cyber, ZRXOGEHYLUWXDOO\LPSRVVLEOH$VDUHVXOWYLUDOPHVVDJHVKDYHHPHUJHGDV DQHZDQGSRZHUIXOSKHQRPHQRQLQRQOLQHFRPPXQLFDWLRQ%\H[SORLWLQJ HPRWLRQVDQGFXULRVLW\WKH\FDQYLVLEO\DIIHFWWKHZD\,QWHUQHWXVHUVVHH YDULRXVLVVXHVDQGDFWRIÀLQHZKLFKLQFHUWDLQFLUFXPVWDQFHVFDQEHXWLOL]HG E\VNLOOIXOSV\FKRORJLFDORSHUDWLRQV

Information Warfare Goes Viral *LYHQWKHDIRUHPHQWLRQHGFRQVLGHUDWLRQVLWVKRXOGEHQRWHGWKDWWKHYLUDO HIIHFWLVQRWKLQJQHZLQWKHRQOLQHGLPHQVLRQRIZDUV6LQFHWKHEHJLQQLQJ RIWKHWZHQW\¿UVWFHQWXU\DUPHGFRQÀLFWVKDYHEHHQDFFRPSDQLHGE\F\EHU SURSDJDQGDPRVWO\GXHWRWKHSURSDJDWLRQRIPRELOHGHYLFHVZLWKFDPHUDV² VXFKDVVPDUWSKRQHV²DQGWKHGHYHORSPHQWRI:HEWHFKQRORJLHV  As a UHVXOWRIWKHVHWZRGHYHORSPHQWVWKH,QWHUQHWEHFDPHÀRRGHGZLWKSLFWXUHV DQGPRYLHVGRFXPHQWLQJYDULRXVZDUWLPHHYHQWV1DWXUDOO\VRPHRIWKHP SURYHGWREHVRXQFRPPRQWKDWWKH\PDQDJHGWRJRYLUDOWRYDULRXVGHJUHHV $IHZHDUO\H[DPSOHVRFFXUUHGGXULQJWKH86LQYDVLRQRI,UDTLQDQG WKH&DXFDVXVZDULQ7KHUHDOFKDQJHKRZHYHUEHJDQGXULQJWKH$UDE 6SULQJZKLFKSURYHGWKHXWLOLW\RIVRFLDOPHGLDIRULQÀXHQFLQJSROLWLFDO DWWLWXGHVDQGWKHPRUDOHRISRSXODWLRQV0LGGOH(DVWHUQDFWLYLVWVLQ PDGHH[WHQVLYHXVHRI:HEWRROVWRRUJDQL]HWKHPVHOYHVSURPRWHWKHLU political agenda, and inspire populations to revolt against authoritarian MIRON LAKOMY | LESSONS LEARNED FROM THE “VIRAL CALIPHATE”: VIRAL EFFECT AS A NEW PSYOPS TOOL?

53 UHJLPHV 27 ,WLVWKHUHIRUHQRWVXUSULVLQJWKDWWKHVDPHSROLWLFDODFWLYLVWVZKR SDUWLFLSDWHGLQWKH$UDE6SULQJUHYROXWLRQVWKHQXVHGWKHLUULFKH[SHULHQFH ZLWKVRFLDOPHGLDWRFRQGXFWSURSDJDQGDGXULQJWKHVXEVHTXHQWPLOLWDU\ FRQÀLFWV:LWKWKHVFRSHRIQHZPDQLSXODWLYHFRQWHQWUHOHDVHGRQOLQHWKH YLUDOHIIHFWRFFXUUHGLQDQXPEHURILQWHUHVWLQJFDVHV 7KH/LE\DQFLYLOZDULQEHWZHHQWKHZHVWHUQEDFNHGUHEHOVDQG 0XDPPDU4DGGD¿¶VUHJLPHZDVWKH¿UVWFDVHLQKLVWRU\ZKHUHVRFLDOPHGLD ZDVXVHGWRVXFKDQH[WHQWWKDWLWLQÀXHQFHGLQWHUQDWLRQDOSXEOLFRSLQLRQ

6RRQDIWHUWKH¿UVWEDWWOHVEURNHRXWWKH,QWHUQHWZDVÀRRGHGZLWKYLGHRV 2017 January | 1 No. | 1 Volume | DQGSLFWXUHVGRFXPHQWLQJEDWWOHVDJDLQVWWKH4DGGD¿UHJLPH7KHVHYLGHRV DQGSLFWXUHVVRPHWLPHVDOVRFRQWDLQHGVWDWHPHQWVRUPDQLSXODWLRQVDLPHGDW JDLQLQJH[WHUQDOVXSSRUW7KHLUWHFKQLFDODQGVXEVWDQWLYHVLGHVZHUHXVXDOO\ DPDWHXULVK1RQHWKHOHVVWKHYLUDOHIIHFWZDVHYLGHQWLQWZRFDVHV7KH¿UVW RQHFRQFHUQHGWKHIDPRXV³/LE\DQJXLWDUKHUR´SLFWXUHZKLFKTXLFNO\ SUROLIHUDWHGWKURXJKWKHYDULRXVSLFWXUHKRVWLQJVHUYLFHV  DQGFRQWULEXWHGWR

WKHSRVLWLYHLPDJHRIWKH/LE\DQUHEHOV'XHWRWKHXQFRQYHQWLRQDOLW\RIWKLV Security and Intelligence, Cyber, SKRWRPHUJLQJWZRVHSDUDWHWKHPHV²IXVLOODGHDQGPXVLF²LWZDVTXLFNO\ QRWLFHGE\WKHPHGLDZKLFKDOVRGLVVHPLQDWHGWKHPHVVDJHWRWKH:HVW 29 ,QHIIHFWWKHSLFWXUHPD\KDYHUHDFKHGKXQGUHGVRIWKRXVDQGVRIQHWL]HQV 7KHXVDELOLW\RIWKHYLUDOHIIHFWIRU36<236ZDVDOVRFRQ¿UPHGE\WKH GHDWKRI0XDPPDU4DGGD¿LQ2FWREHUZKLFKZDVUHFRUGHGIURP VHYHUDOSHUVSHFWLYHVDQGUHOHDVHGRQOLQHE\WKHUHEHOVVRRQDIWHU,QMXVW DIHZKRXUVYLGHRVVKRZLQJWKHEUXWDOO\QFKLQJRIWKHIRUPHUGLFWDWRU SUROLIHUDWHGDFURVV,QWHUQHWQHZVVHUYLFHVDQGVRFLDOPHGLD7KH\ZHUHDOVR TXLFNO\SLFNHGXSE\OHDGLQJ79VWDWLRQVVXFKDV&11%%&DQG1%& 30 ,QHIIHFWDWWKHWLPHWKHVHUHFRUGLQJVSURYHGWREHWKHPRVWSRSXODUFRQWHQW QRWRQO\RQWKH,QWHUQHWEXWDOVRLQWKHJOREDOPHGLD'R]HQVRIFRSLHVRI WKHO\QFKLQJSRVWHGRQ

54 IXOORIPDWHULDOVUHVWULFWHGWR\HDUVDQGRYHU0RUHRYHUWKHVHUHFRUGLQJV SUHVHQWHGLQGHWDLOWKHGHDWKRIDZLGHO\KDWHGGLFWDWRUZKLFKLQLWVHOIZDV YHU\XQXVXDO4DGGD¿¶VGHDWKDOVRV\PEROLFDOO\HQGHGWKHFLYLOZDULQ/LE\D ZKLFKZDVFORVHO\IROORZHGE\WKHLQWHUQDWLRQDOFRPPXQLW\7RVXPPDUL]H WKHVHIDFWRUVWRJHWKHUFUHDWHGWKHELJJHVWDQGWKHPRVWDSSDUHQWYLUDOHIIHFW GXULQJDPLOLWDU\FRQÀLFWWRGDWH 7KLVOHVVRQZDVTXLFNO\OHDUQHGE\WKH6\ULDQUHEHOVZKRVWDUWHGWR SRVWDVWDJJHULQJDPRXQWRISURSDJDQGDRQOLQH:KLOHWKHRSSRVLWLRQWR

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | WKH%DVKDUDO$VVDGUHJLPHH[WHQVLYHO\XVHGWKH:HEHQYLURQPHQWWR LQVSLUHQDWLRQDODQGLQWHUQDWLRQDOVXSSRUWWKHLUDWWHPSWVXVXDOO\IDLOHGDV WKH\IUHTXHQWO\UHOHDVHGYLGHRVDQGSLFWXUHVSUHVHQWLQJWKHLURZQWHUURULVW DFWLYLWLHVRUZDUFULPHV 32 7KLVLJQRUDQFHZDVPDQLIHVWHGE\DYLGHRRI UHEHOFRPPDQGHU$EX6DNNDUPXWLODWLQJWKHFRUSVHRID6\ULDQVROGLHUDQG HDWLQJKLVÀHVK,QWKHRU\DVKHODWHUH[SODLQHGLQDQLQWHUYLHZZLWKWKH %%&KHGLGWKLVWRWHUULI\KLVHQHPLHV 33 ,QUHDOLW\WKHYLGHRDFWXDOO\ZHQW

Cyber, Intelligence, and Security Security and Intelligence, Cyber, YLUDOGXHWRLWVXQSDUDOOHOHGVDYDJHU\,WVHIIHFWVKRZHYHUZHUHFRPSOHWHO\ WKHRSSRVLWHRIZKDWWKH\KDGZDQWHGDVLWGHHSHQHGWKH:HVW¶VGLVWUXVWRI WKH³PRGHUDWH´UHEHOV 7KHYLUDOHIIHFWDOVRZDVDSSDUHQWLQWKHLQIRUPDWLRQZDUIDUHGXULQJWKH UHFHQW8NUDLQLDQFRQÀLFW$OWKRXJKRI¿FLDO5XVVLDQSURSDJDQGDIRFXVHG PRVWO\RQWUDGLWLRQDOPHGLDVXFKDV79VWDWLRQVUDGLRDQGQHZVSDSHUV 0DULD6QHJRYD\DQRWHGWKDWKDFNHUVERWVDQGWUROOVSOD\HGDQLPSRUWDQW UROHLQSURPRWLQJ5XVVLDQSURSDJDQGDLQWKHRQOLQHHQYLURQPHQW 34 3UR 5XVVLDQSURSDJDQGLVWVUHOHDVHGRQOLQHPDQLSXODWLYHYLGHRVDQGHGLWHG SLFWXUHVWKURXJKRXWVRFLDOPHGLDVXFKDV9.RQWDNWH 35 DLPHGDWVSUHDGLQJ IHDUDPRQJ8NUDLQLDQVRFLHW\LQWLPLGDWLQJZHVWHUQQDWLRQVGLVUXSWLQJWKHLU SHUFHSWLRQRIHYHQWVDQGSURPRWLQJWKH.UHPOLQ¶VDJHQGD$PRQJWKHSOHWKRUD RI5XVVLDQSURSDJDQGDRQOLQHWKHYLUDOHIIHFWVWUHQJWKHQHGLWVUHDFKLQWZR HYLGHQWFDVHV7KH¿UVWFRQFHUQHGDSLFWXUHRIDQDOOHJHG8NUDLQLDQVROGLHU LQFRUUHFWO\ORDGLQJWKHDPPXQLWLRQRIDQ53*,WZDVHGLWHGE\SUR5XVVLDQ propagandists  DQGUHOHDVHGRQOLQHWRULGLFXOHWKHZDUHIIRUWRI8NUDLQH7KH SLFWXUHZDVSRVWHGRQVLWHVVXFKDVUHGGLWFRPDQGHSLFIDLOFRPZKHUHWKH\ ZHUHYLHZHGDQGVKDUHGE\WKRXVDQGVRI,QWHUQHWXVHUV 37 The second case ZDVSURRIWKDWSUR5XVVLDQSURSDJDQGDDOVRKDGPDMRUVKRUWFRPLQJV2QH RIWKH³GRFXPHQWV´UHOHDVHGE\WKH5XVVLDQVSHDNLQJPHGLDLQF\EHUVSDFH GHSLFWHGWKHPLVWUHDWPHQWRI8NUDLQLDQ32:VLQ'RQHWVN  ,QSULQFLSOH MIRON LAKOMY | LESSONS LEARNED FROM THE “VIRAL CALIPHATE”: VIRAL EFFECT AS A NEW PSYOPS TOOL?

55 LWVDLPZDVWRGDPDJHWKHPRUDOHRI8NUDLQLDQVRFLHW\LQVWHDGLWLQFLWHG DOLPLWHGYLUDOHIIHFWDVLWTXLFNO\SUROLIHUDWHGWKURXJKRXWZHVWHUQ,QWHUQHW QHZVVHUYLFHVDQGVRFLDOPHGLDEHFRPLQJDV\PERORIWKHEUXWDOLW\DQGZDU FULPHVFRPPLWWHGE\SUR.UHPOLQUHEHOV 39

The Case of the “Viral Caliphate” $OORIWKHVHH[DPSOHVSURYHWKUHHSRLQWV)LUVWO\WKHYLUDOHIIHFWLQFHUWDLQ FLUFXPVWDQFHVFDQDFFRPSDQ\SV\FKRORJLFDORSHUDWLRQV6HFRQGO\

PDQLSXODWLYHFRQWHQWPD\JRYLUDOZLWKRXWDQ\VSHFL¿FLQWHQWLRQDVDVLGH 2017 January | 1 No. | 1 Volume | HIIHFWRIRUGLQDU\RQOLQHSURSDJDQGDDFWLYLWLHV7KLUGO\WKHSURSDJDQGLVWV GRQRWDOZD\VKDYHDQ\DZDUHQHVVRIWKHVHPHFKDQLVPV ,QWKLVFRQWH[WWKHYLUDOHIIHFWKDVEHHQXVHGLQWHQWLRQDOO\WRLQFUHDVH WKHHI¿FLHQF\DQGUHDFKRIWKHPRVWDGYDQFHGF\EHUMLKDGLVWSURSDJDQGD FDPSDLJQHYHUFRQGXFWHG 40 7KHFDVHRIWKH,VODPLF6WDWHSURYHVWKDWWKLV WHUURULVWRUJDQL]DWLRQKDVPRGL¿HGWUDGLWLRQDOF\EHUMLKDGLVWPHWKRGVWR LQFUHDVHWKHFKDQFHVRIDYLUDOHIIHFWRFFXUUHQFH7KHUHVSRQVLELOLW\IRU Cyber, Intelligence, and Security Security and Intelligence, Cyber, DGDSWLQJWKLVDSSURDFKUHVWVZLWKWKHGHGLFDWHG36<23FHOOVRIWKH,VODPLF 6WDWH²DO+D\DW0HGLD&HQWHU²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¶VVWUDWHJ\ WDUJHWLQJ0XVOLPSRSXODWLRQV7KH\DUJXHWKDW³LWLVDVRXUFHRIDWWUDFWLRQ IRUSRWHQWLDOUHFUXLWVE\DSSHDOLQJWRVHQVHVRIEDVLF,VODPLFPRUDOLW\ZLWKLQ WKHIUDPHZRUNRIDUHWXUQWRWKHIXQGDPHQWDOVRIHDUO\,VODP´ 43 7RUHDFKWKHVHREMHFWLYHVWKH,VODPLF6WDWH¶VSURSDJDQGDPDFKLQHSODQQHG LWVDFWLRQVLQF\EHUVSDFHLQZD\VRIPD[LPL]LQJWKHFKDQFHVRIJHQHUDWLQJ MIRON LAKOMY | LESSONS LEARNED FROM THE “VIRAL CALIPHATE”: VIRAL EFFECT AS A NEW PSYOPS TOOL?

56 WKHYLUDOHIIHFW6HYHUDODUJXPHQWVVXSSRUWWKLVVWDWHPHQW)LUVWRIDOO,6¶V SURSDJDQGDFDPSDLJQLVEDVHGRQH[WHQVLYHDQGKLJKO\VRSKLVWLFDWHGXVH RIVRFLDOPHGLD 44 ,QWKHQXPEHURIDFFRXQWVRQ7ZLWWHUDORQHWKDW VKDUHG,6SURSDJDQGDUDQJHGIURPWRPRUHWKDQ2QDYHUDJH 7ZLWWHUDFFRXQWVVXSSRUWLQJWKH,VODPLF6WDWHKDGDERXWIROORZHUV HDFK 45 7KH,VODPLF6WDWHDOVRXWLOL]HVRWKHUVRFLDOQHWZRUNVDVZHOODVSHHU WRSHHUDSSOLFDWLRQV 7HOHJUDPDQG6XUHVSRW DQGFRQWHQWVKDULQJVHUYLFHV -XVW3DVWHLWDQG$UFKLYHRUJ   0RUHRYHUWKH\H[WHQVLYHO\XVHYDULRXVYLGHR

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | VKDULQJVHUYLFHVVWDUWLQJIURPWKHPRVWSRSXODURQHVOLNH

Cyber, Intelligence, and Security Security and Intelligence, Cyber, ÀDZOHVV7KHLUWHFKQLFDOOHYHOLVVRPHWLPHVHYHQFRPSDUHGWR+ROO\ZRRG PRYLHV  3URGXFWLRQDQGSRVWSURGXFWLRQHTXLSPHQWDQGPHWKRGVXVHGE\WKH DO+D\DW0HGLD&HQWHULQFOXGLQJYLGHRJUDSK\HGLWLQJFRPSXWHUJUDSKLFV VRXQGVHIIHFWVDQGSKRWRJUDSK\DUHRIWKHKLJKHVWTXDOLW\7KLVZDVKLJKOLJKWHG E\&KDUOLH:LQWHUZKRDUJXHGWKDW³XQGHQLDEO\WKHSURGXFWLRQHIIRUWEHKLQG Although the Disbelievers Dislike It ZDVIRUPLGDEOH,WLVFOHDUWKDWWKHFRQWHQW RIWKHYLGHRZDVFDUHIXOO\FRQVLGHUHGDQGWKHLQGLYLGXDO RULQGLYLGXDOV ZKR GLUHFWHGLWZHUHREYLRXVSHUIHFWLRQLVWVWKHHTXLSPHQWWKDW,6DWWHPSWHG WRNHHSRXWIURPVKRRWLQJ²WKHFDPHUDVLQSDUWLFXODU²GHPRQVWUDWHVWKH SURIHVVLRQDOLVPRIWKHRSHUDWLRQ´ 49 7KLVLVZKHUHWKHXQLTXHQHVVIDFWRU FRPHVLQ7KHWHFKQLFDOTXDOLW\RI,6SURSDJDQGDGLVWLQJXLVKHVLWVHOIIURP RWKHUF\EHUMLKDGLVWSURGXFWLRQV7KHUHLVQRFRPSDULVRQEHWZHHQWKHFUXGH UHOHDVHVRIDO4DHGDDO6KDEDERU%RNR+DUDPIRUH[DPSOHDQGWKHKLJK GH¿QLWLRQ+ROO\ZRRGVW\OHPRYLHVZLWKPXOWLOLQJXDOWUDQVODWLRQSURGXFHG E\WKH,VODPLF6WDWH0RUHRYHUVXFKSURGXFWLRQVPDWFKWKHRUGLQDU\ FRPPXQLFDWLRQKDELWVRIWKHZHVWHUQDXGLHQFHV7KHUHIRUHERWKRIWKHVH LVVXHVQDWXUDOO\LQFUHDVHWKHFKDQFHVRIWKHYLUDOHIIHFW ,QFRPSDULVRQWRWKHPDMRULW\RIF\EHUMLKDGLVWUHOHDVHV,6IUHTXHQWO\ DGRSWVXQFRQYHQWLRQDOIRUPVRISURSDJDQGDZKLFKDOVRGUDZWKHDWWHQWLRQ RIZHVWHUQFLWL]HQV0HVVDJHVSURGXFHGE\WKHDO+D\DW0HGLD&HQWHU IUHTXHQWO\UHIHUWRF\EHURUPDVVFXOWXUHFDQRQV)RULQVWDQFHRQHRIWKH MIRON LAKOMY | LESSONS LEARNED FROM THE “VIRAL CALIPHATE”: VIRAL EFFECT AS A NEW PSYOPS TOOL?

57 YLGHRVH[SORLWHGDYHU\SRSXODUJDPLQJEUDQG 50 2WKHUH[DPSOHVLQFOXGH WKHVRFDOOHGPXMDWZHHWVRQ7ZLWWHU 51 H[WHQVLYHXVHRIPHPHVDQGWKH $PHULFDQVW\OL]HG nasheed PXVLFYLGHRV7KHVHUHIHUHQFHVIUHTXHQWO\DUH FRPELQHGZLWKEDUEDURXVVDYDJHU\VXFKDVGHFDSLWDWLRQVRUFRUSVHPXWLODWLRQV ZKLFKDLPWRJHQHUDWHH[WUHPHHPRWLRQV7KHGLVWLQFWFRQWUDVWEHWZHHQ SURSHUO\LQWURGXFHGF\EHUFXOWXUHFOLFKpVDQGKRUULEOHDWURFLWLHVLVXQLTXH DPRQJF\EHUMLKDGLVWSURSDJDQGD,QHIIHFWVXFKDFRQYHUJHQFHHVSHFLDOO\ VHGXFHV\RXWKPRUHHI¿FLHQWO\WKDQWKHSUHYLRXVO\GXOOVWDWHPHQWVWKDWZHUH

UHOHDVHGIRUH[DPSOHE\2VDPDELQ/DGHQ7KDQNVWRHYLGHQWUHIHUHQFHV 2017 January | 1 No. | 1 Volume | WRPDVVDQGF\EHUFXOWXUHWDUJHWHGDXGLHQFHVFDQPRUHHDVLO\XQGHUVWDQG DQGHPEUDFHWKHPHVVDJHWKXVHQDEOLQJWKHYLUDOPHFKDQLVP,QVXPPDU\ WHUURULVWRUJDQL]DWLRQVKDGQHYHUEHIRUHUHOHDVHGJUDSKLFLPDJHVDQGYLGHRV DVZHOODVSURSDJDQGDPXVLFLQDZD\WKDWZDVVSHFL¿FDOO\IRUWKHZHVWHUQ HQWHUWDLQPHQWVHFWRU7KLVIHDWXUHQDWXUDOO\DWWUDFWVWKHDWWHQWLRQRIQHWL]HQV ZKLFKLVDFUXFLDOFRQGLWLRQIRULQFLWLQJWKHYLUDOHIIHFW

7KH,VODPLF6WDWHFRPELQHGWKHWUHQGLHVWPHWKRGVRIRQOLQHFRPPXQLFDWLRQ² Security and Intelligence, Cyber, VRFLDOPHGLDDQGWKHPRVWSRSXODUDSSV²ZLWKWHFKQRORJLFDODGYDQFHPHQW FUXGHVDYDJHU\DQGPDQLSXODWLYHVRSKLVWLFDWLRQRQDQXQSUHFHGHQWHG VFDOH 52 7KLVLVWKHNH\WRWKHLUJUHDWSURSDJDQGD³VXFFHVV´V\PEROL]HGE\ WKHVFDOHDQGSUROLIHUDWLRQRIDVHULHVRIYLGHRVSUHVHQWLQJGHFDSLWDWLRQVRI ZHVWHUQFLWL]HQV HJ-DPHV)ROH\6WHYH6RWORII'DYLG+DLQHVDQG$ODQ +HQQLQJ 7KHVHEHKHDGLQJVSXEOLVKHGIURP$XJXVWRQZDUGVZHQW YLUDORQDJOREDOVFDOHVKRUWO\DIWHUWKHLULQLWLDORQOLQHUHOHDVH$IHZIHDWXUHV FRQWULEXWHGWRWKHLUYLUDOHIIHFWWKHDIRUHPHQWLRQHGWHFKQLFDOÀDZOHVVQHVV WKHVKHHUEUXWDOLW\WKH\SUHVHQWHGDQGWKHVRSKLVWLFDWHGPDQLSXODWLYHFRQWHQW HYLGHQWLQWKHVWDWHPHQWVE\WKHSULVRQHUVDQGE\³-LKDGL-RKQ´)LQDOO\WKH\ DOOH[SORLWHGWKHVDPHYLGHRVKDULQJVHUYLFHVLQFOXGLQJ

58 PHGLDDQGYLGHRVKDULQJVHUYLFHV$OWKRXJKDGPLQLVWUDWRUVIUHTXHQWO\GHOHWHG WKHRULJLQDOUHOHDVHVHGLWHGRULQWDFWFRSLHVSUROLIHUDWHGLQVWDQWO\RYHUWKH ZHEVXSSRVHGO\GXHWRWKHDFWLYLWLHVRIXQDI¿OLDWHGQHWL]HQV

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | -RXUQDOLVWVDOVRTXLFNO\VSRWWHGWKHVHYLGHRV$VDUHVXOWOHDGLQJJOREDO PHGLDERWKRIÀLQH YLD79QHZV DQGRQOLQH WKURXJKRI¿FLDO

Cyber, Intelligence, and Security Security and Intelligence, Cyber, RIÀLQHDQGRQOLQHJOREDOPHGLDRXWOHWVZHUHIXOORILWVVFUHHQVKRWVHGLWHG UHFRUGLQJVDQGGHWDLOHGGHVFULSWLRQV$JRRJOHYLGHRVHDUFKRIWKHZRUGV ³-DPHV)ROH\´KDVDERXWKLWVIUHTXHQWO\UHODWHGWRKLVH[HFXWLRQ,W VKRXOGEHHPSKDVL]HGWKDWERWKWKHVHYHFWRUVZHUHVHOISHUSHWXDWLQJ:KLOH WKHPHGLDUHSRUWVLQFUHDVHGWKHFXULRVLW\DPRQJQHWL]HQVLQWKHRULJLQDO YLGHRVWKHSRSXODULW\RIWKHXQHGLWHGYHUVLRQVHVFDODWHGYLHZHUV¶LQWHUHVW LQVXFFHVVLYHPHGLDUHSRUWVWKXVWKHPHGLDXQZLWWLQJO\FRQWULEXWHGWRWKH VXFFHVVRIWKH,VODPLF6WDWH¶V36<237KDQNVWRWKHPDXGLHQFHVFRXOG NQRZZKDWWKH,VODPLF6WDWHZDQWHGWRWHOOWKHPHYHQLIWKH\GLGQRWVHH WKHRULJLQDOUHFRUGLQJV )XUWKHUPRUHWKHYLUDODVSHFWRIWKH,6EHKHDGLQJVLVPDQLIHVWHGE\WKH SRSXODULW\RIWKLVWKHPHDPRQJWKHEORJRVSKHUHSXQGLWVDQGDPDWHXUV FUHDWLQJDPXOWLWXGHRIFRQWHQWUHIHUULQJWR,6DWURFLWLHV7KHVHLQFOXGH YDULRXVDQDO\VHVFRPPHQWDULHVDQGHYHQSDURGLHV7KHVFRSHRIWKLVWUHQG LVH[HPSOL¿HGE\WKHSRSXODULW\RIWKH

59 ,WPXVWEHVWUHVVHGWKDWWKHH[SRVXUHRIPLOOLRQVRIZHVWHUQFLWL]HQVWR the unusual ,6GHFDSLWDWLRQVZKLFKZHQWYLUDORQOLQHDQGRIÀLQHDQGZHUH VWUHQJWKHQHGE\DODUPLQJUHSRUWVIURPWKH0LGGOH(DVWDQGE\WHUURULVW DWWDFNVLQ(XURSHKDYHFRQWULEXWHGWRWKHLQFUHDVLQJIHDURIWKH,VODPLF 6WDWHHVSHFLDOO\LQWKH:HVW7KHVXFFHVVRIWKH,VODPLF6WDWH¶VSURSDJDQGD LVHYLGHQWLQWKHVWDWLVWLFVRIWKH3HZ5HVHDUFK&HQWHUZKLFKLQGLFDWHWKDW ZHVWHUQVRFLHWLHVSHUFHLYHWKH,VODPLF6WDWHDVWKHWRSJOREDOVHFXULW\WKUHDW 

Conclusions 2017 January | 1 No. | 1 Volume | 7KHDFWLYLWLHVRIWKH³YLUDOFDOLSKDWH´SRVHDVHULRXVWKUHDWWRLQWHUQDWLRQDO VHFXULW\LQFOXGLQJDPRQJRWKHUVDQLQFUHDVHGULVNRIPLFURWHUURULVPDV ZHOODVDGHHSHQLQJIHDUDQGFRQIXVLRQDPRQJZHVWHUQQDWLRQV7KHUHIRUH WKHLQIRUPDWLRQVHFXULW\SROLFLHVRIWKH1$72(8VWDWHVDLPWRTXLFNO\ VXSSUHVVWKLVIHDWXUHRIWKH,VODPLF6WDWH¶VF\EHUVWUDWHJ\ 3DUDGR[LFDOO\WKH,VODPLF6WDWH¶VVXFFHVVDOVRDOORZVVHYHUDOFRQFOXVLRQV WREHGUDZQDERXWWKHXVDELOLW\RIWKHYLUDOHIIHFWLQSV\FKRORJLFDORSHUDWLRQV Cyber, Intelligence, and Security Security and Intelligence, Cyber, )LUVWO\WKHUHLVQRFHUWDLQW\WKDWDPHVVDJHGHVLJQHGWRJRYLUDOLQ36<23 ZLOOHYHUGRVR7KHWDSHVWU\RIKXPDQUHODWLRQVRQYDULRXVOHYHOVLQWKH ,QWHUQHWLVWRRG\QDPLFDQGHOXVLYHWRH[SORLWLWVXFFHVVIXOO\HYHU\WLPH 'HVLJQLQJDFWLRQVWKDWZLOOPHHWWKHFRQVWDQWO\FKDQJLQJIHDWXUHVRIRQOLQH FRPPXQLFDWLRQLQFOXGLQJYDU\LQJWUHQGVDQGPRRGVRIQHWL]HQVLVKLJKO\ SUREOHPDWLF$V'DYLG0HHUPDQ6FRWWVWDWHV³QRWKLQJLVJXDUDQWHHGWR JRYLUDO´ 57 )URPWKRXVDQGVRI,6PHVVDJHVUHOHDVHGRQOLQHLQWKHIRUPRI YLGHRVPXVLFVWDWHPHQWVEDQQHUVDQGPHPHVRQO\DIHZDFWXDOO\KDYH JRQH³HSLGHPLF´ 6HFRQGO\WKHFDVHRIWKH³YLUDOFDOLSKDWH´VKRZVKRZLPSRUWDQWLWLVWR FRQGXFWSURSHUF\EHUUHFRQQDLVVDQFH$GDSWLQJDPHVVDJHWRWKHWDUJHWHG JURXS¶V³F\EHUFXOWXUDO´EDFNJURXQGDVZHOODVWRWKHOHYHORI,&7GHYHORSPHQW LQFUHDVHVWKHFKDQFHVRIWKHYLUDOHIIHFW7KLUGO\36<23LQWHQGLQJWRH[SORLW WKLVHIIHFWVKRXOGXVHPXOWLSOH³YHFWRUVRIDWWDFN´ERWKLQWHUPVRIFRQWHQW DQGWHFKQRORJ\2QHPHVVDJHSRVWHGRQOLQHKDVOLWWOHFKDQFHRIJRLQJYLUDO $KXQGUHGPHVVDJHVLQYDULRXVIRUPVPD\VRPHWLPHVPDNHDGLIIHUHQFH DVWKHSUREDELOLW\RIDWWUDFWLQJWKHDXGLHQFH¶VDWWHQWLRQZLOOLQFUHDVH7KLV LVXQGHUVWRRGE\WKHDO+D\DW0HGLD&HQWHUZKLFKKDVÀRRGHGWKH,QWHUQHW ZLWKLWVSURSDJDQGD0RUHRYHUWKHVHPHVVDJHVVKRXOGEHSUROLIHUDWHG WKURXJKRXWDZLGHUDQJHRIFKDQQHOVZHEVLWHVVRFLDOPHGLDQHWZRUNVDQG MIRON LAKOMY | LESSONS LEARNED FROM THE “VIRAL CALIPHATE”: VIRAL EFFECT AS A NEW PSYOPS TOOL?

60 RWKHURQOLQHVHUYLFHVLQFOXGLQJWKRVHWKDWDUHWKHPRVWSRSXODUDPRQJWKH WDUJHWHGSRSXODWLRQ )RXUWKO\YLUDOFDPSDLJQVKRXOGERWKSUHFHGHDQGFRLQFLGHZLWKSROLWLFDO DQGPLOLWDU\HYHQWVZKLFKZDVHYLGHQWLQWKHDIRUHPHQWLRQHGH[HFXWLRQVLQ ZKLFK³-LKDGL-RKQ´UHIHUUHGWR3UHVLGHQW2EDPD¶VVWDWHPHQWV$QWLFLSDWLRQ PD\PLQLPL]HWKHFKDQFHVRIWKHPHVVDJHVEHLQJUHFRJQL]HGDVKRVWLOH SURSDJDQGDE\WKHWDUJHWHGSRSXODWLRQV$WWKHVDPHWLPHPHVVDJHVVKRXOG VWULFWO\UHIHUWRWKHPRVWLPSRUWDQWHYHQWVIRU36<236XFKDVROXWLRQPD\

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | VWUHQJWKHQRSHUDWLRQDOHI¿FLHQF\DVLWGUDZVDWWHQWLRQWRPHVVDJHVWKDWDUH XSWRGDWHDQGFRQWURYHUVLDORUXQXVXDO7KLVZDVDOVRGRQHLQWKHLQIDPRXV H[HFXWLRQYLGHRV)LIWKO\WKHFDVHRIWKH³YLUDOFDOLSKDWH´SURYHVWKDWWKH PHVVDJHLQFLWLQJWKHYLUDOHIIHFWVKRXOGEHLQFRPSDFWIRUPDQGEHHDVLO\ DFFHVVLEOHPHDQLQJWKDWLWPXVWQRWUHTXLUHDQ\ORJLQVSDVVZRUGVZHE EURZVHUDGGRQVRUSOXJLQV7KLVLVGXHWRWKHIDFWWKDWXVHUVXVXDOO\DUH QRWNHHQWRORJLQRULQVWDOOQHZVRIWZDUHLQRUGHUWRIDPLOLDUL]HWKHPVHOYHV

Cyber, Intelligence, and Security Security and Intelligence, Cyber, ZLWKHYHQWKHPRVWLQWHUHVWLQJRQOLQHFRQWHQW0RUHRYHUFRQWHQWVKRXOGEH VLPSO\QDPHGLQDZD\WKDWZLOOLQFUHDVHWKHFKDQFHVRI¿QGLQJLWWKURXJK VRFLDOPHGLDRUVHDUFKHQJLQHV,QWKH:HEHQYLURQPHQWWKLVDOVRKHDYLO\ GHSHQGVRQWKHXVHRISURSHUKDVKWDJV  VXFKDV,6¶VPXMDWZHHWV $QG¿QDOO\WKHFRQWHQWRIWKHPHVVDJHVKRXOGEHDVLQWULJXLQJ XQFRQYHQWLRQDODQGXQLTXHDVSRVVLEOH7KLVGRHVQRWPHDQWKDW36<23 VKRXOGMXVWFRS\FODVVLFYLUDOPDUNHWLQJWHFKQLTXHVIUHTXHQWO\EDVHGRQ VH[XDOWKHPHV,QVWHDGKXPRUDQGYLROHQFHSUHVHQWHGLQDXQLTXHDQG XQFRQYHQWLRQDOIRUP²ERWKXVHGE\WKH,VODPLF6WDWH²PD\EHWKHULJKWZD\ WRJR+XPRUPD\EHPRUHHODVWLFDQGLIXVHGSURSHUO\FDQVSDUNYDULRXV UHDFWLRQVIURPWKHDXGLHQFHVERWKSRVLWLYHDQGQHJDWLYH)RULQVWDQFHDO +D\DW0HGLD&HQWHUIUHTXHQWO\PRFNHGWKH$PHULFDQPLOLWDU\HIIRUWLQWKH 0LGGOH(DVWXVLQJKXPRUDVDWRRO9LROHQFHDOVRPD\KDYHDGLIIHUHQWUROH DVLWPD\VKRFNDQGLQWLPLGDWHUHFLSLHQWVWKLVZDVFDUULHGRXWSHUIHFWO\LQ PDQ\RIWKHH[HFXWLRQYLGHRVSRVWHGRQOLQHE\WKH,VODPLF6WDWH ,QFRQFOXVLRQWKHFDVHRIWKH³,VODPLF&DOLSKDWH´DQGWKHDIRUHPHQWLRQHG PLOLWDU\FRQÀLFWVVXJJHVWWKDWWKHYLUDOHIIHFWFDQEHHI¿FLHQWO\H[SORLWHGE\ SV\FKRORJLFDORSHUDWLRQVLQF\EHUVSDFH$OWKRXJKLWLVDKLJKO\XQFHUWDLQ WRROZLWKHQRXJKGHOLEHUDWLRQLWLVSRVVLEOHWRLQFUHDVHWKHFKDQFHVRILWV RFFXUUHQFHDQGJDLQRXWVWDQGLQJEHQH¿WVIRULWVFUHDWRUVDVSURYHQE\WKH FDVHRIWKHLQIDPRXV,6H[HFXWLRQV MIRON LAKOMY | LESSONS LEARNED FROM THE “VIRAL CALIPHATE”: VIRAL EFFECT AS A NEW PSYOPS TOOL?

61 Notes  %ULDQ1LFKLSRUXNGH¿QHGLQIRUPDWLRQZDUIDUHDV³WKHSURFHVVRISURWHFWLQJRQH¶V RZQVRXUFHVRIEDWWOH¿HOGLQIRUPDWLRQDQGDWWKHVDPHWLPHVHHNLQJWRGHQ\ GHJUDGHFRUUXSWRUGHVWUR\WKHHQHP\¶VVRXUFHVRIEDWWOH¿HOGLQIRUPDWLRQ´ $FFRUGLQJWR1LFKLSRUXNLQIRUPDWLRQZDUIDUHLQFOXGHVRSHUDWLRQDOVHFXULW\ HOHFWURQLFZDUIDUHSV\FKRORJLFDORSHUDWLRQVGHFHSWLRQSK\VLFDODWWDFNRQ LQIRUPDWLRQSURFHVVHVDQGLQIRUPDWLRQDWWDFNRQLQIRUPDWLRQSURFHVVHV6HH %ULDQ1LFKLSRUXN³86PLOLWDU\RSSRUWXQLWLHVLQIRUPDWLRQZDUIDUHFRQFHSWVRI RSHUDWLRQ´LQ Strategic Appraisal: The Changing Role of Information in Warfare , HGV=DOPD\.KDOLOL]DG-RKQ:KLWHDQG$QG\:0DUVKDOO 6DQWD0RQLFD | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | 5$1'&RUSRUDWLRQ S  6HHIRUH[DPSOH&DWKHULQH(7KHRKDU\³,QIRUPDWLRQ:DUIDUH7KH5ROHRI 6RFLDO0HGLDLQ&RQÀLFW´ CRS Insights 0DUFK6FRW0DFGRQDOG Propaganda and Information Warfare in the Twenty-First Century  1HZ

62 .RIPDQDQG0DWWKHZ5RMDQVN\³$&ORVHUORRNDW5XVVLD¶Vµ+\EULG:DU¶´ Kennan Cable QR    &RUL('DXEHU YouTube War: Fighting in a World of Cameras in Every Cell Phone and Photoshop on Every Computer  &DUOLVOH3$86$UP\:DU&ROOHJH 6WUDWHJLF6WXGLHV,QVWLWXWH   &KULVWLQD6FKRUL/LDQJ³&\EHU-LKDG8QGHUVWDQGLQJDQG&RXQWHULQJ,VODPLF 6WDWH3URSDJDQGD´ GSCP Policy Paper QR  S  0LQG&RPHW&RUSRUDWLRQ Viral marketing: Understanding the Concepts and %HQH¿WVRI9LUDO0DUNHWLQJ 7KH5HODWLRQVKLS$JHQF\:KLWH3DSHU  S KWWSFPJLQWHUDFWLYHFRPXSORDGVYLUDOBPDUNHWLQJSGI | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume |  ,ELG  0DULD:RHUQGO6DYYDV3DSDJLDQQLGLV0LFKDHO%RXUODNLVDQG)HQJ/L³,QWHUQHW LQGXFHG0DUNHWLQJ7HFKQLTXHV&ULWLFDO)DFWRUVLQ9LUDO0DUNHWLQJ&DPSDLJQV´ International Journal of Business Science and Applied Management QR  S  9LFWRULD)DLUEDQN³$6WXG\LQWRWKH(IIHFWLYHQHVVRI9LUDO0DUNHWLQJRYHU WKH,QWHUQHW´ 8QLYHUVLW\RI*ORXFHVWHUVKLUH ,  SS±KWWSFW¿OHV JORVDFXNPZGPRGXOHVFRVKRZFDVH08BB)DLUEDQN9SGI6WHYH -XUYHWVRQDQG7LP'UDSHU³9LUDO0DUNHWLQJ9LUDO0DUNHWLQJ3KHQRPHQRQ Cyber, Intelligence, and Security Security and Intelligence, Cyber, ([SODLQHG´ DFJ -DQXDU\KWWSGIMFRPQHZVDUWLFOHBVKWPO  &KULVWLDQ%ULJJV³%OHQG7HF:LOO,W%OHQG"9LUDO9LGHR&DVH6WXG\´ SocialLens , -DQXDU\KWWSZZZVRFLDOHQVFRPZSFRQWHQWXSORDGVB FDVHBEOHQGWHFSGI  /DXUD&ULPPRQV³7RS9LUDO0DUNHWLQJ&DPSDLJQVRI$OO7LPH´ Branded3 , 'HFHPEHUKWWSVZZZEUDQGHGFRPEORJWKHWRSYLUDOPDUNHWLQJ FDPSDLJQVRIDOOWLPH  7KLVNLQGRIYLUDOFRQWHQWVRPHWLPHVFRQWULEXWHVWRWKHJOREDOF\EHUFXOWXUH2QH RIWKHJUHDWHVWH[DPSOHVRIWKLVWUHQGFRQFHUQVDVHWRISRSXODUFRPLFVW\OHPHPH SLFWXUHVZKLFKZHQWYLUDOVHYHUDO\HDUVDJRLQÀXHQFLQJFRPPXQLFDWLRQKDELWV LQVRFLDOPHGLDZRUOGZLGH2QHFDQPHQWLRQ³1HLOGH*UDVVH7\VRQUHDFWLRQ´ ³IRUHYHUDORQH´³WUROOIDFH´RU³

63  )RUPRUHDERXW:HEVHH6DUHK$JKDHL0RKDPPDG$OL1HPDWEDNKVKDQG +DGL.KRVUDYL)DUVDQL³(YROXWLRQRIWKH:RUOG:LGH:HE)URP:HEWR:HE ´International Journal of Web & Semantic Technology QR  ±  7KLVPHFKDQLVPLVVLPSOHVRXUFHDFFRXQWVVKDUHWKHPHVVDJHDPRQJIROORZHUV DQGWKHQWKHLUIROORZHUVFDQWUDQVPLWWKHPHVVDJHIXUWKHUWRWKHLUIROORZHUVDQGVR IRUWK  5RPXDOGR3DVWRU6DWRUUDVDQG$OHVVDQGUR9HVSLJQDQL³(SLGHPLFVDQG ,PPXQL]DWLRQLQ6FDOH)UHH1HWZRUNV´LQ Handbook of Graphs and Networks: From the Genome to the Internet HGV6%RUQKROGWDQG+*6FKXVWHU :LOH\ 9&+%HUOLQ SKWWSDU[LYRUJSGIFRQGPDWSGI  $OEHUW/iV]OR%DUDEiVL'DVKXQ:DQJ=KHQ:HQ+DQJKDQJ7RQJ&KLQJ

64  ³6\ULD´ YouTube DFFHVVHG$SULOKWWSVZZZ\RXWXEHFRP UHVXOWV"VS &$0' VHDUFKBTXHU\ V\ULD SDJH  QRKWPO )DOVH  3DXO:RRG³)DFHWRIDFHZLWK$EX6DNNDU6\ULD¶VµKHDUWHDWLQJFDQQLEDO¶´ BBC News -XO\KWWSZZZEEFFRPQHZVPDJD]LQH  0DULD6QHJRYD\D Putin’s Information Warfare in Ukraine: Soviet Origins of Russia’s Hybrid Warfare ,QVWLWXWHIRUWKH6WXG\RI:DU6HSWHPEHU  SS±  KWWSXQGHUVWDQGLQJZDURUJVLWHVGHIDXOW¿OHV5XVVLDQ5HSRUW 3XWLQV,QIRUPDWLRQ:DUIDUHLQ8NUDLQH6RYLHW 2ULJLQVRI5XVVLDV+\EULG:DUIDUHSGI | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume |  0\URVODY6KNDQGULM³+RZ5XVVLDQ3URSDJDQGD:RUNV7KURXJK6RFLDO0HGLD´ Myroslav Shkandrij’s Blog 0D\KWWSZZZXNUDLQLDQZLQQLSHJFD UXVVLDQSURSDJDQGDZRUNVVRFLDOPHGLD  2ULJLQDOSKRWRDW Imgur KWWSLLPJXUFRP%XL3V7MMSJ  ³,W¶V*RQQDEHD6KRUW:DU´ Epic Fail 'HFHPEHUKWWSZZZHSLFIDLO FRPLWVJRQQDEHDVKRUWZDU5HGGLWKWWSVZZZUHGGLWFRPUSLFV FRPPHQWVNKRVRUU\BFDSWDLQBLBDPBRIBVWLOOBOHDUQLQJVBKRZBWR  6HH³8$)6WRUP'RQHWVN$LUSRUWDQG*HWWKHLU$VVHVV+DQGHGWRWKHPE\1$) )8//9(56,21>:DUQLQJ*UDSKLF@´ YouTube KWWSVZZZ\RXWXEHFRP Cyber, Intelligence, and Security Security and Intelligence, Cyber, ZDWFK"Y 7=4+.O4  6HH³8NUDLQHUHEHOVODXQFKJULVO\SURSDJDQGDZDU´ France24 KWWSREVHUYHUV IUDQFHFRPHQXNUDLQHUHEHOVODXQFKJULVO\SURSDJDQGDZDU  6HH&KULVWLQD6FKRUL/LDQJ³&\EHU-LKDG8QGHUVWDQGLQJDQG&RXQWHULQJ,VODPLF 6WDWH3URSDJDQGD´ GSCP Policy Paper QR  $GDP+RIIPDQDQG

65  -0%HUJHUDQG-RQDWKRQ0RUJDQ³7KH,6,67ZLWWHU&HQVXV'H¿QLQJDQG GHVFULELQJWKHSRSXODWLRQRI,6,6VXSSRUWHUVRQ7ZLWWHU´ The Brookings Project RQ865HODWLRQVZLWKWKH,VODPLF:RUOG$QDO\VLV3DSHU QR  KWWSV ZZZEURRNLQJVHGXZSFRQWHQWXSORDGVLVLVBWZLWWHUBFHQVXVBEHUJHUB PRUJDQSGI  %UHQGDQ,.RHUQHU³:K\,6,6,V:LQQLQJWKH6RFLDO0HGLD:DU´ Wired  $SULO  KWWSVZZZZLUHGFRPLVLVZLQQLQJVRFLDOPHGLDZDUKHUHV EHDW 47 0LURQ/DNRP\ &\EHUSU]HVWU]HĔMDNRQRZ\Z\PLDUU\ZDOL]DFMLLZVSyáSUDF\ SDĔVWZ  .DWRZLFH:\GDZQLFWZR8QLZHUV\WHWXĝOąVNLHJR   0LFKDHO66FKPLGW³,VODPLF6WDWH,VVXHV9LGHR&KDOOHQJHWR2EDPD´ New 2017 January | 1 No. | 1 Volume | York Times 6HSWHPEHUKWWSZZZQ\WLPHVFRPZRUOG PLGGOHHDVWLVLVLVVXHVYLGHRULSRVWHWRREDPDKWPO"BU   &ODLUH'DYLVDQG&KDUOLH:LQWHU Detailed Analysis of Islamic State Propaganda Video: Although the Disbelievers Dislike It  /RQGRQ4XLOOLDP)RXQGDWLRQDQG 75$&'HFHPEHU SKWWSVZZZTXLOOLDPIRXQGDWLRQRUJZSZS FRQWHQWXSORDGVSXEOLFDWLRQVIUHHGHWDLOHGDQDO\VLVRILVODPLFVWDWHSURSDJDQGD YLGHRSGI  0LFKHOOH0DOND*URVVPDQ³:DWFK,VODPLF6WDWH¶VWHUURUYLGHRJDPH´ Jerusalem Cyber, Intelligence, and Security Security and Intelligence, Cyber, Post 6HSWHPEHUKWWSZZZMSRVWFRP0LGGOH(DVW,6FODLPVLW FUHDWHGDWHUURUYLGHRJDPH 51 Mujatweets KWWSVWZLWWHUFRPKDVKWDJPXMDWZHHWV 52 0LURQ/DNRP\³,QWHUQHWZG]LDáDOQRĞFLW]Z3DĔVWZD,VODPVNLHJRQRZDMDNRĞü F\EHUGĪLKDG\]PX"´ Studia Politologiczne   ±  6RPHRIFHQVRUHGYHUVLRQVKDYHEHHQYLHZHGRQ

An Intelligence Civil War: “HUMINT’” vs. “TECHINT”

Matthew Crosston and Frank Valli

Since 9/11, intelligence has evolved within a changing atmosphere of modern tactics and techniques for information collection. This atmosphere, coupled with massive leaps in technological advancement such as social media, mobile communications, processing analytics, large-form solid-state data storage, novel computational hardware, and software equipment, has thrust intelligence communities around the world into a strange new world of multi-dimensional intelligence. While science and technology and human capability both remain valuable facets of the same overlapping intelligence construct, there is an emerging trend of diametrically opposed camps pushing for one method over the other. This article explains how in terms of field application and intelligence information processing and analysis, both HUMINT and TECHINT could be maximized by the elimination of forced rivalry and by the encouragement of mutual cooperation that is currently lacking.

Keywords: cyber, intelligence, TECHINT, HUMINT, science and technology, national security

An earlier version of this paper was published by Frank Valli as “‘HumInt’ vs. ‘TechInt’: A Forced Intelligence Dichotomy,” The Security and Intelligence Studies Journal 1, no. 3 (Summer 2014). Parts of this paper were also published in Matthew Crosston, “American UAV Apartheid and the ‘Blowback’ of New Drone Armies,” New Eastern Outlook (April 3, 2015). Dr. Matthew Crosston, professor of political science, is the director of the International Security and Intelligence Studies (ISIS) program at Bellevue University. Frank Valli earned a Master of Science degree in the International Security and Intelligence Studies program at Bellevue University.

Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017 67 MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

68 Introduction 6LQFHLQWHOOLJHQFHKDVHYROYHGZLWKLQDFKDQJLQJDWPRVSKHUHRIPRGHUQ WDFWLFVDQGWHFKQLTXHVIRULQIRUPDWLRQFROOHFWLRQ7KLVDWPRVSKHUHFRXSOHG ZLWKPDVVLYHOHDSVLQWHFKQRORJLFDODGYDQFHPHQW²VXFKDVVRFLDOPHGLD PRELOHFRPPXQLFDWLRQVSURFHVVLQJDQDO\WLFVODUJHIRUPVROLGVWDWHGDWD VWRUDJHQRYHOFRPSXWDWLRQDOKDUGZDUHDQGVRIWZDUHHTXLSPHQW²KDVWKUXVW LQWHOOLJHQFHFRPPXQLWLHVDURXQGWKHZRUOGLQWRDVWUDQJHQHZZRUOGRIPXOWL GLPHQVLRQDOLQWHOOLJHQFH:LWKWKHLPSOHPHQWDWLRQRIQHZWHFKQRORJLHVDQG | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | WKHLUH[SDQVLRQLQWRWKHSXEOLFDUHQDLQWHOOLJHQFHFROOHFWLRQPHWKRGV²RQFH UHVHUYHGVSHFL¿FDOO\IRUJRYHUQPHQWVRUPDMRUFRQJORPHUDWLRQV²KDYH LQFUHDVHGIDUEH\RQGWUDGLWLRQDOKXPDQLQWHOOLJHQFHFDSDELOLW\&RXQWHULQJ WKLVKRZHYHUDQGVHWWLQJWKHVWDJHIRUWKHH[DPLQHGWHQVLRQLVWKHDGPLVVLRQ WKDWKXPDQVPXVWQRWEH³GHYROYHG´IURPWKH¿HOGRILQWHOOLJHQFH1RPDWWHU KRZWHFKQRORJLFDOO\DGYDQFHGZDUPD\EHFRPHKXPDQDVVHWVZLOOUHPDLQ SDUDPRXQWLQVRPHIRUPRURWKHU³+XPDQ,QWHOOLJHQFH´ +80,17 VKRXOG

Cyber, Intelligence, and Security Security and Intelligence, Cyber, WKXVDOZD\VEHFRQVLGHUHG¿UVWDPRQJHTXDOV $OOWKHVHDGYDQFHVKDYHEHHQXWLOL]HGH[WHQVLYHO\E\WKHLQWHOOLJHQFH FRPPXQLW\LQWKHSDVWDQGQRZ¿QGWKHPVHOYHVIUHHO\DYDLODEOHIRUSXEOLF XVH0RUHRYHUWKHPRUHUHFHQWFRQWURYHUVLDOUHYHODWLRQVLQYROYLQJPHWDGDWD XVDJHIRUWKUHDWDVVHVVPHQWDQGLGHQWL¿FDWLRQ²LQVKRUWWKHHQWLUH6QRZGHQ DIIDLU²FDQDOVREHLQFOXGHGLQWKLVHQFURDFKPHQWRIWKHWHFKQRORJLFDOLQWR WKH+80,17VSKHUH7HFKQLTXHVWDXJKWQRZDGD\VWRXQLYHUVLW\VWXGHQWVIRU FRQGXFWLQJULJRURXVTXDQWLWDWLYHUHVHDUFK VXFKDVPL[HGPHWKRGVVRIWZDUH DXWRPDWLFFRPSXWHUFRGLQJFRQWHQWDQDO\VLVWH[WPLQLQJDQGERRWVWUDSSLQJ  LQWKHSUHYLRXVJHQHUDWLRQZRXOGKDYHEHHQKDUGWRDFFHVVWHFKQRORJ\IRXQG DOPRVWH[FOXVLYHO\ZLWKLQJRYHUQPHQWFLUFOHV7KHLQFRUSRUDWLRQRIVFLHQFH DQGWHFKQRORJ\LQWRWKHORRVHO\WHUPHG³7HFKQLFDO,QWHOOLJHQFH´ 7(&+,17  KDVEHFRPHDPDMRUFRQWULEXWRUWRERWKGDWDDQGVWUDWHJ\ 1:KLOHVFLHQFH DQGWHFKQRORJ\DQGKXPDQFDSDELOLW\UHPDLQYDOXDEOHIDFHWVRIWKHVDPH RYHUODSSLQJLQWHOOLJHQFHFRQVWUXFWDQHPHUJLQJWUHQGVHHVGLDPHWULFDOO\ RSSRVHGFDPSVSXVKLQJIRURQHPHWKRGRYHUWKHRWKHU7KLVDUWLFOHH[SODLQV KRZLQWHUPVRI¿HOGDSSOLFDWLRQDQGLQWHOOLJHQFHLQIRUPDWLRQSURFHVVLQJ DQGDQDO\VLVERWK+80,17DQG7(&+,17DUHPD[LPL]HGE\PXWXDO FRRSHUDWLRQWKDWLVFXUUHQWO\ODFNLQJWKHLUIRUFHGULYDOU\PXVWLQRXURSLQLRQ EHHOLPLQDWHG0RVWLPSRUWDQWO\WKHIDLOXUHRIGHYHORSHGFRXQWULHVWRIRFXV RQWKH7(&+,17+80,17IXVLRQZLOOFUHDWHIXWXUHQDWLRQDOVHFXULW\ MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

69 SUREOHPVIDUPRUHFRPSOLFDWHGDQGFKDOOHQJLQJWKDQSUHVHQWO\DQWLFLSDWHG HVSHFLDOO\DVRWKHUFRXQWULHVDURXQGWKHZRUOGVHHPWREHPRUHPRWLYDWHG DQGDFFHSWLQJRIWKLVQHHGIRUIXVLRQ

A Snapshot of the TECHINT and HUMINT Relationship $VFDQEHVHHQLQPRGHUQWKHDWHUWDFWLFVKXPDQLQWHOOLJHQFHFROOHFWLRQ WHFKQLTXHVDUHVWLOOUHDGLO\HPSOR\HGLQLQWHOOLJHQFHRSHUDWLRQV7KH SURIHVVLRQDODGDSWDWLRQWRQHZHUVFLHQWL¿FWHFKQLTXHVRIFROOHFWLQJLQIRUPDWLRQ

KDVLQGHHGEHHQFKDOOHQJLQJ7KRXJKDGYDQWDJHRXVIRUVHDVRQHGDQG 2017 January | 1 No. | 1 Volume | QRYLFHFROOHFWRUVDOLNHWKHUHUHPDLQVDKLJKO\RSLQLRQDWHGELDVDJDLQVW ³SXUHO\´VFLHQWL¿FPHWKRGVRILQIRUPDWLRQFROOHFWLRQ7KLVELDVLVPRVW SURQRXQFHGDWWKHRSHUDWLRQDODQG¿HOGOHYHOVZKHUHSULRULW\LVVWLOOSODFHG RQWKHYDOXHRIVSRQWDQHRXVGHFLVLRQPDNLQJZKLFKLVVXSSRVHGO\XQLTXH WRKXPDQFROOHFWRUV2QWKHRWKHUKDQGFULWLFVDVNZKHWKHULWLVZRUWK ULVNLQJDFRPEDWDQWZKHQVLPLODULQIRUPDWLRQPD\EHFROOHFWHGWKURXJKWKH WHFKQRORJLFDODGYDQFHPHQWVVRSUHYDOHQWLQWRGD\¶VPRGHUQVRFLHW\GURQHV Cyber, Intelligence, and Security Security and Intelligence, Cyber, OLVWHQLQJGHYLFHVVHQVRUVLPDJHU\LQWUDQHWLQ¿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¿HOG:KDWLVRIWHQXQVDLGLVWKDWSDUWRIWKLVFKDQJHLQPLQGVHWLV DOVRDQLVVXHRILPPHGLDF\DQGFRQYHQLHQFHWKHQHHGIRUIRUPDO+80,17 YDOLGDWLRQRIWDUJHWVRQWKHJURXQGVORZVGRZQDQGOLPLWVGURQHFDSDELOLWLHV DQGXVDJH 22YHUWLPHWKHWHQGHQF\WRPD[LPL]H7(&+,17LQVXFKFDVHV KDVUHGXFHGWKHYDOXHSODFHGRQ+80,17DQGOHVVHQHGWKHLPSRUWDQFHRI SURSHU7(&+,17+80,17IXVLRQ MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

70 :KHQGLVFXVVLQJWKLVULYDOU\DVRFDOOHGNQRZOHGJHLQIHULRULW\FRPSOH[ VKRXOGDOVREHPHQWLRQHGDQ\VKLIWDZD\IURPFODVVLF+80,17WRZDUG 7(&+,17ZRXOGVXGGHQO\SODFHPDQ\LQWHOOLJHQFHSURIHVVLRQDOVRQWKH RXWVLGHORRNLQJLQ:RUVHSHUKDSVWKHUHTXLUHPHQWWRXSJUDGHRQH¶VVNLOOV IURPDPRUHWUDGLWLRQDO+80,17RSHUDWLYHWRD7(&+,17VSHFLDOLVWLV OLNHO\EH\RQGWKHOHDUQLQJFXUYHRIPDQ\VHDVRQHGYHWHUDQV7KLVDVSHFWRI WKHULYDOU\LVOLWWOHGLVFXVVHGSRVVLEO\VHHQDVWKHHOHSKDQWLQWKHURRP7KH ³VFLHQFHSKRELD´WKDWDIÀLFWVPDQ\XQLYHUVLWLHVLQWKH:HVW DFFRUGLQJWR

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | ZKLFKVWXGHQWVVK\DZD\IURPKLJKO\WHFKQLFDOKDUGVFLHQFHPDMRUV 3 KDV EHHQORQJODPHQWHGLQWHUPVRILWVLPSDFWRQWKHDELOLW\RIFRXQWULHVOLNHWKH 8QLWHG6WDWHVWRVWD\FRPSHWLWLYHLQWKHJOREDOHFRQRP\%XWWKLVUHDOLW\DOVR KDVDGHHSLPSDFWRQWKHWHFKQRORJLFDOSUHSDUHGQHVVRI\RXQJQHZFDGUHV RIWKHLQWHOOLJHQFHFRPPXQLW\,WLVDWZROHYHOSUREOHPRQWKHRQHKDQG WKHUHLVQRWHQRXJKQHZEORRGFDSDEOHRIXWLOL]LQJWKHWRROVDYDLODEOHIRU LQWHOOLJHQFHFROOHFWLRQRQWKHRWKHUKDQGDQGSHUKDSVPRUHLPSRUWDQWO\

Cyber, Intelligence, and Security Security and Intelligence, Cyber, WKHUHGRQRWVHHPWREHDQ\HIIRUWVLQYHVWHGLQFRQVWUXFWLQJDFRQQHFWLYH EULGJHEHWZHHQWKHVHWZRERGLHVRILQWHOOLJHQFHDLPLQJWRLQWHQVLI\WKHLU UHDFKDQGPD[LPL]HWDOHQWFDSDELOLW\

Human Intelligence: Collection and Information 7KHKXPDQIDFWRULQLQWHOOLJHQFHFROOHFWLRQLVDVROGDVZDULWVHOI,QWKH¿HOG LWLVWKHPRVWUHDGLO\XWLOL]DEOHDQGDGDSWDEOHPHWKRGIRUUDSLGO\REWDLQLQJ SURFHVVLQJDQGDFWLQJRQWDUJHWVDQGREMHFWLYHV7KHELDVLQIDYRURIKXPDQ LQIRUPDWLRQFROOHFWLRQWHFKQLTXHVLVPRVWHYLGHQWDPRQJXSSHUHFKHORQ SROLF\JHQHUDWRUVEXWDOVRDPRQJYHWHUDQ¿HOGDQDO\VWVDQGZDU¿JKWHUV$V GHVFULEHGLQPDQ\DFFRXQWVVROGLHUVDV³ERRWVRQWKHJURXQG´IRULQIRUPLQJ KXPDQLQWHOOLJHQFHDUHYLWDOWRZLQQLQJZDU 4$FFRUGLQJWR3DWULFN0XUSK\ IRUPHUFKLHIHQJLQHHUIRUWKH'HIHQVH$GYDQFHG5HVHDUFK3URMHFWV$JHQF\¶V 308QLWRI$FWLRQ7HFKQRORJLHV³ZHWDONDORWDERXWWHFKQRORJLHV,QWKH XUEDQZDUIDUHVHWWLQJ\RXFDQ¶WJHWDZD\IURPWKHKXPDQ

71 WKHLQWHOOLJHQFHFRPPXQLW\WUDGLWLRQDOSROLF\PDNHUVDQGJRYHUQPHQWDFWRUV RIWHQIDUROGHUWKDQWKHLQWHOOLJHQFHRSHUDWLRQVDJHQWVLQWKH¿HOG PLJKW EHHYHQPRUHVNHSWLFDORIRYHUUHOLDQFHRQLQIRUPDWLRQREWDLQHGUHPRWHO\ IURPDPDFKLQHUDWKHUWKDQIURPDSHUVRQRQWKHJURXQG &ROOHFWLRQLVRQO\RQHIDFHWRIKXPDQLQWHOOLJHQFH7KHLQIRUPDWLRQ GHGXFHGIURPWKHLQWHOOLJHQFHFROOHFWHGLVLPSRUWDQWDVLWLVUHVSRQVLEOHQRW RQO\IRUIRUPXODWLQJSROLF\EXWDOVRIRUDOWHULQJDQGGHYHORSLQJRSHUDWLRQDO FDSDFLWLHVLQWKH¿HOG+XPDQLQWHOOLJHQFHLQIRUPDWLRQRIWHQSURYHVFUXFLDO

IRUORFDWLQJDQGQHXWUDOL]LQJDGYHUVDULHVDQGIRUDOORZLQJH[SHGLWLRXVDFWLRQ 2017 January | 1 No. | 1 Volume | DQGUHDFWLRQLQWKHDWWDLQPHQWRIQDWLRQDOVHFXULW\JRDOV)RUH[DPSOHD 1DWLRQDO3XEOLF5DGLREURDGFDVWRQZRPHQLQFRPEDWHPSKDVL]HGWKDWPDQ\ VXFFHVVIXOQLJKWUDLGVLQ$IJKDQLVWDQZHUHWKHUHVXOWRI86VHUYLFHZRPHQ¶V SURZHVVLQFROOHFWLQJKXPDQLQWHOOLJHQFHLQIRUPDWLRQIURP$IJKDQLZRPHQ  7KRVHZLWKLQWKHLQWHOOLJHQFHFRPPXQLW\ZKRVWLOOIDYRUWKH+80,17ELDV ZRXOGEHMXVWL¿HGLQDUJXLQJWKDWWKLVZRXOGQRWKDYHEHHQSRVVLEOHLIWKH

FRPPDQGKDGEHHQPRUHIRFXVHGRQ7(&+,17FDSDELOLWLHVDQGOHVVUHDG\ Security and Intelligence, Cyber, WRHQJDJHKXPDQRSHUDWLYHVLQVHQVLWLYHDQGGDQJHURXVVLWXDWLRQV :KLOHVRPHHOHPHQWRIWKH+80,17ELDVLVXQGRXEWHGO\EDVHGRQ SURIHVVLRQDOVHOISUHVHUYDWLRQWKHUHDUHVWLOOLPSRUWDQWUHDOZDUDVSHFWV LQPRGHUQFRQÀLFWWKDWKHLJKWHQWKHUHOHYDQFHRI+80,17FDSDELOLWLHV 7KHHPHUJHQFHRIQRQVWDWHDFWRUVWKDWEOHQGLQWRFLYLOLDQVRFLHWLHVWKHLU LQWHJUDWLRQDQGWKHVXEVHTXHQWFRQIXVLRQDURXQGPDQDJLQJWRGLVFUHHWO\ DQGH[SOLFLWO\LGHQWLI\FRPEDWDQWVDQGWDUJHWDUHDVKDYHPDGHWKHH[FOXVLYH XVHRI7(&+,17ZLWKRXW+80,17PHVV\DQGFKDRWLF 7 Advances in drone WHFKQRORJ\DOVRLOOXVWUDWHWKLVWKH\DUHQRW\HWVRVRSKLVWLFDWHGDVWRDOORZ GURQHVWRÀ\XQHQFXPEHUHGDQGXQQRWLFHGLQWRKHDYLO\SRSXODWHGFLYLOLDQ DUHDVDQGWRLGHQWLI\DQGWKHQHOLPLQDWHLQGLYLGXDOWDUJHWV+ROO\ZRRGPRYLHV PD\KDYHJRQHLQWKLVGLUHFWLRQPXFKWRJOREDOHQWHUWDLQPHQWGHOLJKWEXW UHDOZRUOGPLOLWDU\FDSDELOLW\LVQRW\HWWKHUH3DUDGR[LFDOO\+80,17FDQ WKHUHIRUHEHXVHGWRPDNHWKHH[HFXWLRQRIPLVVLRQREMHFWLYHV less PHVV\ DQGFKDRWLF,QRWKHUZRUGVFRQWHPSRUDU\PRGHUQZDUIDUHVHHPVWRKDYH VRPHDVSHFWVWKDWXOWLPDWHO\PDNHWKHH[FOXVLYHXVHRI7(&+,17PRUH FKDRWLFDQGLQHI¿FLHQWWKHLQMHFWLRQRI+80,17LQWRWKLVDUHQDZRXOGLQ IDFWLQWHQVLI\7(&+,17VXFFHVVUDWLRV MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

72 Science and Technology: Collection and Information 7KHHPSOR\PHQWRISXUHO\WHFKQRORJLFDOPHDQVIRULQWHOOLJHQFHJDWKHULQJ LVUHODWLYHO\QHZ,QPRGHUQZDUIDUHPXOWLSOHKLJKWHFKGHYLFHVKDYHEHHQ DGGHGWRWKHWRROVRIFRQYHQWLRQDOLQWHOOLJHQFHFROOHFWLRQ:KHWKHUWKURXJK HPDLOWUDFLQJF\EHUFROOHFWLRQWDFWLFVVDWHOOLWHLPDJHU\DQDO\VLVRUORFDWLRQ WHFKQLTXHVHPSOR\HGE\GURQHVVFLHQFHDQGWHFKQRORJ\KDYHSURYLGHGD SLYRWDOQHZFDSDELOLW\LQPRGHUQZDUIDUHZLWKREYLRXVWHFKQRORJLFDOVFLHQWL¿F EHQH¿WVIRULQWHOOLJHQFHLQIRUPDWLRQ 7KHDVVHVVPHQWRIWKHWHFKQRORJLFDO | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | FDSDELOLWLHVRIWHUURULVWJURXSV²IRUH[DPSOHZKHWKHUWKH\FDQGHYHORSDQG GHSOR\³GLUW\ERPEV´RURWKHU,('V²LVDWDVNZKHUHE\WKHLQIRUPDWLRQLV DQDO\]HGPRVWHI¿FLHQWO\LQDULJRURXVO\VFLHQWL¿FDQGWHFKQRORJLFDOPDQQHU $QRWKHURIWKHPRVWYDOXDEOHEHQH¿WVRI7(&+,17LVWKHDELOLW\WRNHHS RSHUDWLYHVDQGZDU¿JKWHUVRXWRIKDUP¶VZD\7KLVEHQH¿WKRZHYHUDOVR has its critics: 7KLVFKDQJHIURP+80,17RULHQWHGDFWLYLWLHVWRDPRUH

Cyber, Intelligence, and Security Security and Intelligence, Cyber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¿QGLQJDQGWUDLQLQJSHRSOHWREHDGHSWLQERWK YHUVLRQVRILQWHOOLJHQFHFROOHFWLRQWKHQHIIRUWVVKRXOGEHLQYHVWHGLQSROLFLHV WKDWHQFRXUDJHLQWHOOLJHQFHDJHQFLHVWRFRPELQHWKHLUUHVSHFWLYHHPSKDVHV PRUHFRKHUHQWO\DQGHIIHFWLYHO\8QIRUWXQDWHO\WKLVHQFRXUDJHPHQWKDVQRW WRGDWHEHHQYHU\VWURQJRUFRPSHOOLQJ

TECHINT vs. HUMINT: The Policy Angle ,QWKHSDVWWZHQW\\HDUVWKHVSDZQLQJRIWKHGLJLWDODJHKDVFUHDWHGDQHQWLUHO\ QHZGLPHQVLRQIRULQWHOOLJHQFH²ERWKLQFROOHFWLRQDQGLQIRUPDWLRQ²IXUWKHU DFFHOHUDWHGE\DIWHUZKLFKQHZO\IHOW$PHULFDQQDWLRQDOLQVHFXULW\ MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

73 DGYDQFHGWRIHYHUSLWFK:LWKWKHSURJUHVVLRQRIWKHGLJLWDODJHKRZHYHU WHFKQRORJ\RQFHUHVHUYHGIRUDJHQWVZLWKWRSVHFUHWFOHDUDQFHLVQRZ DYDLODEOHWRWKHPDVVHVZLWKVLPSOHUEXWVWLOOSRZHUIXOYHUVLRQVDYDLODEOHIRU SXUFKDVHDWDQ\FRPSXWHUVWRUH²EHLWHQFU\SWLRQFRGLQJGDWDPLQLQJWKH RUJ\RIDGYDQFHGDSSVIUHHRQDQ\VPDUWSKRQHRUWKHLQFDOFXODEOHDPRXQW RIGDQJHURXVLQIRUPDWLRQDFFHVVLEOHRQOLQHDWWKHPHUHSUHVVRIDEXWWRQ 7HFKQRORJ\SUROLIHUDWLRQDQGWUDQVSDUHQF\KDYHFUHDWHGWKHPHDQV IRUPDVVLYHGDWDFROOHFWLRQIURPRSHQVRXUFHV 26,17 FDXVLQJVRPHWR

DUJXHIRUOLPLWLQJWKHDSSOLFDWLRQRI+80,17'HYDVWDWLQJO\IRU+80,17 2017 January | 1 No. | 1 Volume | SURSRQHQWVWKLVDUJXPHQWLVIRXQGHGRQWKHGXDOKLWVRIPLVVLRQVXFFHVVDQG DVVHWVDIHW\LI7(&+,17FDQJHWWKHMREGRQHHI¿FLHQWO\ZLWKRXWKXPDQ LQMHFWLRQZK\ERWKHUNHHSLQJ+80,17RSHUDWLRQVSDFHVRZLGHDQGEURDG" 10 7KHSROLFLHVWKDWSUHYLRXVO\JRYHUQHGLQWHOOLJHQFHFROOHFWLRQZHUHIDUIURP SUHSDUHGWRKDQGOHWKLVQHZWHFKQRORJLFDO26,17DYDODQFKH7KHVRFDOOHG JUD\EHDUGVRIFODVVLFKXPDQLQWHOOLJHQFHWHFKQLTXHVZHUHFRQIURQWHGZLWK

DQHZFDSDELOLW\IRUFROOHFWLQJTXDQWLWLHVRILQIRUPDWLRQQHYHUH[SHULHQFHG Security and Intelligence, Cyber, EHIRUHZKLOHPDQDJLQJWKDWRQVODXJKWHIIHFWLYHO\WKURXJKWUDGLWLRQDOPHWKRGV SURYHGSUREOHPDWLF)RUPLQJSROLF\LQWKLVQHZDWPRVSKHUHDQGZLWKWKHVH QHZFDSDELOLWLHVKDVEHHQDVWUXJJOHIRUHYHU\RQH 3ROLF\RULJLQDWLQJLQWKH$PHULFDQLQWHOOLJHQFHFRPPXQLW\WRRNDGYDQWDJH RIWKLVQHZVFLHQWL¿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¿HGWKH ELDVDJDLQVWDOOHJHGO\RYHUSURPLVLQJDQGXQGHUGHOLYHULQJ7(&+,17WRROV ,WFDQQRWEHGHQLHGWKDWPRGHUQDQGDGYDQFLQJWHFKQRORJ\DOORZVIRUJUHDWHU HDVHRILQWUXVLRQLQWRDUHDVDQGORFDWLRQVWKDWZHUHSUHYLRXVO\FKDOOHQJLQJIRU KXPDQDJHQWV,QDGGLWLRQWKHVHVDPHWHFKQRORJLHVDLGLQWKHGHYHORSPHQW RIFRQVWDQWDQGORQJWHUPVXUYHLOODQFHDQGLQWHOOLJHQFHJDWKHULQJ&UHDWLQJ VXFKFRQWLQXLW\ZLWKH[FOXVLYHO\KXPDQLQWHOOLJHQFHDJHQWVZDVSUHYLRXVO\ UDWKHUFXPEHUVRPHGDQJHURXVDQGDWWLPHVLPSRVVLEOH MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

74 Nobody’s Happy: The Fiscal Dilemma between HUMINT and TECHINT 7KHUHKDVDOZD\VEHHQDQHFRQRPLFHOHPHQWWRWKLVGHEDWHWKDWLVSHUKDSV PRUHLPSRUWDQWWKDQPRVWSDUWLFLSDQWVOHWRQ)URPD¿VFDOVWDQGSRLQWIRU WKRVHRQWKH+80,17VLGHIXQGLQJWKHDFTXLVLWLRQDQGWUDLQLQJRIDKXPDQ DJHQWIRUXWLOL]DWLRQLQWKHLQWHOOLJHQFHFRPPXQLW\FDQEHIDUPRUHEHQH¿FLDO )RUWKLVFDPSWKHPXOWLSXUSRVHXWLOLW\RIKXPDQDJHQWVZLWKWKHLUDQDO\WLFDO LQJHQXLW\DQGÀH[LELOLW\FUHDWHVDQDSSHDOLQJORJLFIRUJUHDWHULQYHVWPHQWWKDQ

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | DFROGPDFKLQHWKDWVHUYHVRQO\RQHXWLOLW\7KLVEDVLFIXQGLQJGLOHPPDRIWHQ EUHDNVGRZQLQEXGJHWDU\GLVFXVVLRQVZLWKRQHVLGHODPHQWLQJWKHODFNRI IXQGLQJWRVXSSRUWLWVQHZ³WR\V´ZKLOHWKHRWKHUFDPSIHHOVGLVHQIUDQFKLVHG IURPWKH¿QDQFLDOVXSSRUWQHFHVVDU\WRNHHSLWVFRUHRIFDGUHVUHIUHVKHG UHFUXLWHGDQGUHLQYLJRUDWHG,WFDQLQGHHGEHDQRGGGLOHPPDDVHDFKVLGH LVEDVLFDOO\DUJXLQJWKDWLWGRHVQRWJHWHQRXJKIXQGLQJZKLOHFODLPLQJWKH RWKHUVLGHLVZDVWLQJYDOXDEOHPRQLHVRQOHVVHI¿FLHQWSUDFWLFHV

Cyber, Intelligence, and Security Security and Intelligence, Cyber, 7KLVRIFRXUVHÀLHVLQWKHIDFHRIWKHIDFWWKDWWKHDQQXDO86LQWHOOLJHQFH EXGJHWKDVFRQVLVWHQWO\LQFUHDVHGRYHUWKHODVWWHQ\HDUVGXHLQJUHDWSDUWWR WKHKLJKGHPDQGIRUVXFFHVVIXODQGUHOHYDQWLQWHOOLJHQFHDQGWKHQHFHVVLW\IRU resources, both KXPDQDQGWHFKQRORJLFDOWRVDWLVI\WKDWGHPDQG+RZHYHU DVWHFKQRORJLFDOGHYHORSPHQWLVDOUHDG\DODUJHSURSRUWLRQRILQWHOOLJHQFH H[SHQGLWXUHDQGFRPHVZLWKWKHULVNRIREVROHVFHQFHDQGLQDGHTXDF\LQ UHODWLYHO\VKRUWSHULRGVRIWLPHWKHUHLVDEXUHDXFUDWLFGULYHWRFRPSHQVDWH IRUWKLVE\IRFXVLQJRQ³SOLDEOH´UHVRXUFHVLQWKH+80,17UHDOP7KH LQWHOOLJHQFHFRPPXQLW\¶VORQJKHOGUHSXWDWLRQIRURSHUDWLQJDWWKHFXWWLQJ HGJHRIWHFKQRORJLFDOUHVHDUFKDQGGHYHORSPHQWUHVXOWVSDUDGR[LFDOO\LQZKDW LVDWWLPHVSHUFHLYHGDVDPDVVLYHEXGJHWDU\LPEDODQFHUHVROYHGRQO\E\ DEDQGRQLQJWUDGLWLRQDOEXGJHWDOLJQPHQWV$VDUHVXOW7(&+,17KDVEHHQ JDLQLQJXQIDLU¿QDQFLDODWWHQWLRQDQGSULRULWL]DWLRQFRPSDUHGWRLQYHVWPHQW DQGVXSSRUWLQ+80,17 7KLVLVKRZHYHUDJUHDWO\ÀDZHGDSSURDFKEXGJHWDU\SULRULWLHVVKRXOGEH EDODQFHGHIIHFWLYHO\VRWKDWWHFKQRORJLFDOFDSDELOLWLHVFDQEHQH¿WIXQGDPHQWDO +80,17WHFKQLTXHVDQGWDFWLFV7KLVPLJKWUHVXOWLQUHGXFHGULVNLQWHUPV RIKXPDQDVVHWVEHLQJSODFHGLQKDUP¶VZD\ZKLOHDOVRDOORZLQJIRUIDU JUHDWHU¿GHOLW\LQWKHLQWHOOLJHQFHFROOHFWHGDQGWKHDFFXUDF\RIVXEVHTXHQW DQDO\VLV%XGJHWDU\DOLJQPHQWIRU7(&+,17QHHGVWREHHVWDEOLVKHGLQDZD\ WKDWVHHNVWRIXUWKHUDGYDQFHDQGDFWLYDWHWKHIXQGLQJJLYHQWR+80,17 MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

75 7KHWHFKQRORJLFDOEDWWOH¿HOGWKDWKDVEHHQIRUHFDVWDVWKHZDUIURQWRIWKH IXWXUHLVERWKYLUWXDO and SK\VLFDOZKHWKHUWKDWEHZLWK¿HOGOHYHORSHUDWLYHV XWLOL]LQJGURQHFDSDELOLWLHVRUF\EHUDQDO\VWVWUDFNLQJGRZQDQHOHFWURQLF WUDLOWKHUHIRUH7(&+,17DWLWVPD[LPXPHI¿FLHQF\DQGJUHDWHVWUHOHYDQFH VKRXOGEHUHJDUGHGDVDFUXFLDODGYDQWDJHIRUERWKRSHUDWLRQVDQGDQDO\VLV 7RFRQWLQXHWKHFRQWHPSRUDU\WHQGHQF\WRSULRULWL]HVRXUFHIXQGLQJLQ ZKLFKWHFKQLFDOFDSDELOLWLHVDUHFRPSHWLQJDJDLQVWKXPDQWDOHQWLVWRKLQGHU LQWHOOLJHQFHFDSDELOLWLHVDQGIXUWKHUH[DFHUEDWHDQXQQHFHVVDU\ULYDOU\

)XQGLQJVKRXOGIRFXVRQUHVHDUFKGHYHORSPHQWDQGRSHUDWLRQDOHIIRUWV 2017 January | 1 No. | 1 Volume | WKDWIXVH7(&+,17DQG+80,17

Bridging the Gap ,Q¿HOGDSSOLFDWLRQVWKHHQGJRDORIREWDLQLQJDGHTXDWHDFFXUDWHDQG DFWLRQDEOHLQIRUPDWLRQLVEHVWDWWDLQHGZKHQ+80,17DQG7(&+,17 FDSDELOLWLHVDUHFRPELQHG%ULGJLQJWKLVJDSLVQRHDV\WDVNDVWKHUHDUHIHZ FROOHFWRUVZKRRSHUDWHIUHHO\ZLWKLQERWK¿HOGVDQGDQDO\VWVDQGSROLF\PDNHUV Cyber, Intelligence, and Security Security and Intelligence, Cyber, WHQGWRKDYHWKHLURZQSUHIHUHQWLDOELDVDVWRZKLFKLQWHOOLJHQFHFDSDELOLW\ SURGXFHVWKHEHVWDQGPRVWUHOLDEOHLQIRUPDWLRQDQGWKXVUHFHLYHVWKHLU SUHIHUHQWLDOWUHDWPHQWZKHWKHUSURFHGXUDOO\EXUHDXFUDWLFDOO\RU¿QDQFLDOO\ :LWKWKHEDWWOH¿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¿HOGRILQWHOOLJHQFH1RPDWWHUKRZWHFKQRORJLFDO DQGVFLHQWL¿FDOO\DGYDQFHGIXWXUHZDUIDUHEHFRPHVLWZLOOVWLOOUHO\RQ KXPDQFDSLWDOLQVRPHIRUP 13 %XWWKHHPSOR\PHQWRIVFLHQWL¿FWRROVDQG WHFKQRORJLFDOFDSDELOLWLHVWRSUHYHQWWKUHDWVWRVROGLHUVLQFUHDVHFDSDELOLWLHV DQGSUHVHQW¿HOGRSHUDWRUVZLWKWKHPHDQVQHFHVVDU\WRDFKLHYHPLVVLRQ JRDOVVKRXOGEHFRQVLGHUHGDQHVVHQWLDODFFHVVRU\WRWKHKXPDQDJHQW )RUWXQDWHO\WKHELDVNHHSLQJWKHVHWZR,17VDSDUWLVWKHUHVXOWRISHUVRQDO SHUVSHFWLYHVZLWKLQWKH¿HOGRILQWHOOLJHQFHUDWKHUWKDQDQ\XQVXUPRXQWDEOH MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

76 LQQDWHGLFKRWRP\7KLVSHUVRQDOELDVLVIRXQGHGKHDYLO\RQWKHLQDGHTXDF\ WKDWYHWHUDQRSHUDWLYHVVNLOOHGLQWUDGLWLRQDO+80,17WHFKQLTXHVDWWULEXWH WRWKHHPHUJLQJLPSRUWDQFHRIWHFKQRORJ\$VPHQWLRQHGHDUOLHUWKHIHDURI QRWEHLQJDEOHWRDFTXLUHWKHQHFHVVDU\WHFKQLFDOVNLOOVLVQRWEDVHGVLPSO\ RQWKHLUGHVLUHIRUMRESUHVHUYDWLRQEXWUDWKHURQDGHHSSKLORVRSKLFDODQG SURIHVVLRQDOGLVDJUHHPHQWZLWKKRZHIIHFWLYHO\DQGWRZKDWH[WHQW7(&+,17 FDQUHSODFHWKHXQLTXHDGYDQWDJHVRIKXPDQDVVHWVLQWKH¿HOG7KLVLV\HW DQRWKHUUHDVRQSURSHUIXVLRQEHWZHHQWKHWZRWHFKQLTXHVLVHVVHQWLDO7KH

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | NH\IRUVKRUWDQGPHGLXPWHUPSURJUHVVLVREYLRXVO\QRWWRGLVFDUGWKRVH ZKRGRQRWKDYHRUFDQQRWDFTXLUHWHFKQRORJLFDOWDOHQWEXWUDWKHUWRIRFXV RQZD\VLQZKLFKHDFKEHFRPHVFRPSHWHQWLQWKHODQJXDJHDSSURDFKHVDQG REMHFWLYHVRIWKHRWKHU,QWKLVZD\7(&+,17DQG+80,17ZLOOXQGHUVWDQG KRZWRLQWHUDFWHIIHFWLYHO\WKXVLPSURYLQJWKHLPSDFWRIWKHLQWHOOLJHQFH SURGXFHGDQGEHVWVHUYLQJQDWLRQDOVHFXULW\

The Fusion Dilemma around the World – A Brief Overview Cyber, Intelligence, and Security Security and Intelligence, Cyber, :KLOHIRUQRZLWLVODUJHO\WUXHWKDWWHFKQRORJLFDOO\DGYDQFHGVWDWHV H[SHULHQFHWKLVVHOILPSRVHGULYDOU\WRDKLJKHUGHJUHHWKHGLOHPPDEHWZHHQ 7(&+,17DQG+80,17LVQRWGHVWLQHGWREHOLPLWHGWRKLJKO\GHYHORSHG QDWLRQV7KLVLVDSUREOHPWKDWZLOOXQGRXEWHGO\HYROYHIXUWKHUDVLQWHOOLJHQFH SUDFWLFHVDQGFRRSHUDWLRQFRQWLQXHWREHFRPHPRUHRIDJOREDOQRUP 14 :LWK ¿QDQFLDODQGWHFKQLFDOUHVRXUFHVKRUWIDOOVPDQ\OHVVGHYHORSHGFRXQWULHV DUHVRPHZKDWIRUFHGWRIDYRU+80,17LQERWKFROOHFWLRQDQGDVVHVVPHQW RYHUWKHQHZHUPHWKRGVJHQHUDWHGE\VFLHQFHDQGWHFKQRORJ\ &RXQWULHVVXFKDV%ULWDLQ$XVWUDOLD5XVVLD&KLQDDQG,VUDHOKDYH EHJXQWRHPSKDVL]H7(&+,17RYHU+80,17DVFDQEHVHHQE\XVLQJ PRGHUQLQWHOOLJHQFHVWDSOHVVXFKDVGURQHVDHULDODQGVDWHOOLWHVXUYHLOODQFH LPDJHU\DQGRWKHU0$6,176,*,17DQG,0,17WRROV7KHVDPHULYDOU\ VHHQLQWKH8QLWHG6WDWHVLVOLNHO\WREHVHHQLQWKHVHFRXQWULHVDVZHOOLI QRWDOUHDG\HYLGHQW&RXQWULHVWKDWKDYHSURJUHVVHGWHFKQRORJLFDOO\WHQG WRFUHDWHWKHLURZQLQWHUQDO+80,17GLOHPPDVZLWKLQWKHLULQWHOOLJHQFH FRPPXQLWLHVVLPSO\EHFDXVHVFLHQWL¿FLQQRYDWLRQZLOODOZD\VRXWSDFH WKHDELOLW\RILWVSHRSOHWRNHHSXS%\QRW¿QGLQJWKHQHFHVVDU\V\QWKHVLV DQGIXVLRQDFRXQWU\HQGDQJHUVLWVRZQQDWLRQDOVHFXULW\HVSHFLDOO\ZKHQ PDQ\OHVVHUDGYDQWDJHGFRXQWULHVDUHZLOOLQJWRGHIDFWRDFKLHYHWKDWIXVLRQ MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

77 WKURXJKXQVFUXSXORXVPHDQV$EULHIH[DPLQDWLRQRI8$9 XQPDQQHGDHULDO YHKLFOHV SUROLIHUDWLRQLVDSHUIHFWH[DPSOHRIWKLVSKHQRPHQRQ

De Facto Fusion in the Middle East ,QWKH,VUDHO'HIHQVH)RUFHV ,') VXFFHHGHGLQGHVWUR\LQJDGURQH that it WUDFNHGÀ\LQJRYHUVHQVLWLYHPLOLWDU\LQVWDOODWLRQVDQGDSSURDFKLQJ the 'LPRQDQXFOHDUUHDFWRU7KHGURQHZDVXQDUPHGEXWRSHUDWHGE\ agents HOVHZKHUHDQGDWWHPSWHGWRUHOD\LPDJHVEDFNWRDKRPHEDVH7KH,VUDHOLV

GLGQRWGLVFORVHZKHWKHUWKHHQHP\REMHFWLYHKDGEHHQVXFFHVVIXOEXWWKH\ 2017 January | 1 No. | 1 Volume | ZHUHFHUWDLQWKDWWKHGURQHZDVQRW$PHULFDQ&KLQHVHRU5XVVLDQFODLPLQJ LQVWHDGWKDWLWZDVDQ,UDQLDQGURQHDVVHPEOHGLQ/HEDQRQDQGÀRZQE\ +H]EROODK 15 :HKDYHUHIHUUHGWRWKLVHOVHZKHUHDVWKHZRUOG¶V¿UVW³,VODPLF &UHVFHQWGURQH´DQGLWVLJQDOVWKHWUDQVQDWLRQDOQDWXUHRIGURQHWHFKQRORJ\ SUROLIHUDWLRQDOUHDG\LQH[LVWHQFH  ,Q,UDQFODLPHGWRKDYHGHYHORSHGERWK(SLFDGURQHVXSSRVHGO\ GHVLJQHGIRUERWKFRPEDWDQGUHFRQQDLVVDQFHDQG7KURQHDORQJUDQJH Cyber, Intelligence, and Security Security and Intelligence, Cyber, FRPEDW8$9ZLWKDOOHJHGVWHDOWKFDSDELOLWLHV,UDQFHUWDLQO\LVQRWVK\LQ LWVSXEOLFUHODWLRQVHIIRUWVWRFODLPUHJLRQDOGRPLQDQFHLQ7(&+,17 17 This VKRXOGEHWUHDWHGZLWKVRPHVNHSWLFLVPJLYHQWKH,VUDHOLIDFWRULWLVGRXEWIXO ,UDQFDQFRPSHWHZLWKWKHWHFKQLFDOSURZHVVRIWKH,VUDHOLPLOLWDU\DQGLWV WHFKQLFDODUVHQDODQGWKXVVRPHRIWKHVHSUHVVUHOHDVHVDUHSUREDEO\PRUHIRU HIIHFWUDWKHUWKDQDFWXDOO\EHLQJHIIHFWLYH,QGHHGWKHJHQHUDOJOREDOUHDFWLRQ EH\RQG,VUDHOKDVEHHQRYHUZKHOPLQJO\VNHSWLFDO+DYLQJVDLGWKDWWKHUHDUH VWLOOLPSRUWDQWWKLQJVWRFRQVLGHULWLVOLNHO\SUXGHQWIRUWKRVHZKRDUHQRWLQ IDYRURIDQDVVHUWLYH,UDQWRDVFHUWDLQWKHYHUDFLW\RILWVFODLPWKDWLWVGURQHV KDYHGXDOFDSDELOLW\²ERWKFRPEDWDQGVXUYHLOODQFHUHFRQQDLVVDQFH  ,UDQ DOVRKDVPDGHEROGFODLPVDERXWKRZLWKDVGHYHORSHGWKHKXPDQFDSLWDO WRFRPSHWHQWO\XWLOL]HWKHWHFKQRORJ\7KLVDOVRQHHGVWREHYHUL¿HG1RW FRLQFLGHQWDOO\DIWHUWKHVHVRFDOOHG,UDQLDQ³DFKLHYHPHQWV´ERWK(J\SW DQG6DXGL$UDELDEHFDPHIDUPRUHLQWHUHVWHGLQDFTXLULQJGURQHVIRUWKHLU PLOLWDULHVDQGVRXJKWWKHQHFHVVDU\WHFKQLFDODQG¿QDQFLDOLQYHVWPHQWIRU GHYHORSLQJWKHLURZQSURJUDPVDQGUHFUXLWLQJWKHULJKWDPRXQWRIKXPDQ FDSLWDO 7KHLQLWLDOSXUVXLWRIWDFWLFDOGURQHVE\RWKHUFRXQWULHVKDVXSWRQRZ EHHQIRFXVHGPXFKPRUHRQVWUDWHJLFJOREDOSRVLWLRQLQJDQGWKHSURMHFWLRQ RISRZHULQIRUHLJQSROLF\RUDWOHDVWWKHSRVVLEOHFDSDFLW\RIWKDWDXWRPDWHG MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

78 SURMHFWLRQ7XUNH\KRZHYHUKDVDGLVWLQFWO\GRPHVWLFDVSHFWIRULWVGURQH SXUVXLWVWKDWFRXOGSURYLGHDQH[WUHPHO\GDQJHURXVSUHFHGHQWPRYLQJIRUZDUG :KLOHLWPDNHVFODLPVDERXWWKHSRVLWLYHXVHRIGURQHVGRPHVWLFDOO\LQRUGHU WRNHHSSHDFHDQGUHVROYHFRQÀLFWLWVHHPVWKHPRUHLPPHGLDWHYLROHQW XVHRIGURQHVZLWKLQ7XUNH\LVJRLQJWREHSUHGLFDWHGXSRQWKHFRQWLQXHG GHVWUXFWLRQRIWKH.XUGLVK:RUNHUV3DUW\ 3.. 7KH7XUNLVK$UP\KDV RIFRXUVHWRWDOO\DYRLGHGPHQWLRQLQJWKH3..E\QDPHLQFRQQHFWLRQWR LWVGURQHSROLF\,WLQVWHDGKDVIRFXVHGPRUHRQKRZHIIHFWLYH8$9VFDQ

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | EHZLWKERUGHUVHFXULW\XUEDQZDUIDUHDQGRWKHURSHUDWLRQDOPLVVLRQV2Q WKHVXUIDFHWKHUHLVYHU\OLWWOHWRSURWHVW%XWZKHQRQHFRQVLGHUVWKDWWKHVH LVVXHVIRU\HDUVKDYHEHHQFRGHZRUGVIRU3..XQUHVWLWEHFRPHVUDWKHU WUDQVSDUHQWWKDWWKHGHSOR\PHQWRIDUPHGGURQHVZLWKLQWKHVRYHUHLJQWHUULWRU\ RI7XUNH\LVJRLQJWREHIRU3..GHVWUXFWLRQ7KLVVXEWOHGLVWLQFWLRQVKRZV KRZWKHQHHGWRGHYHORSKXPDQWDOHQWDORQJVLGHWHFKQRORJLFDODFTXLVLWLRQ LVEHFRPLQJHYHUPRUHLPSRUWDQWDVGURQHVDFTXLUHPRUHXVHVLQVLGHRI

Cyber, Intelligence, and Security Security and Intelligence, Cyber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

De Facto Fusion in Greater Asia ,I7XUNH\SURYLGHVDSRWHQWLDOQHZSUHFHGHQWIRUDUPHG8$9VLQWHUPVRI YLROHQWGRPHVWLFXVHVWKHQ6LQJDSRUHPLJKWDOVREHVHWWLQJDSUHFHGHQW DVZHOOLQWKDWLWKDVEHHQVXUSULVLQJO\H[SOLFLWDQGGLUHFWLQLWVORQJ WHUPREMHFWLYHVDQGJRDOV,WKDVRSHQO\GHFODUHGWKHVLPSOHSXUFKDVHDQG DFTXLVLWLRQRI8$9VIURPPDMRUVHOOHUVOLNH,VUDHODVWKHQHFHVVDU\¿UVWVWHS LQDORQJUDQJHVWUDWHJLFSODQWKDWGHPDQGVQDWLYHERUQDQGGRPHVWLFDOO\ WUDLQHGSHUVRQQHOWRRSHUDWHGURQHÀHHWV7KLVLVFRQVLGHUHGHTXDOO\FUXFLDO LIQRWWKHPRUHFUXFLDOVWUDWHJLFSLHFHWRLWVQDWLRQDOSODQ 19 ,IWKH6LQJDSRUH MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

79 PRGHOIRUODFNRIDEHWWHUWHUPEHFRPHVPRUHHPEUDFHGWKHQWKHGD\LV GUDZLQJQHDUZKHQPRUHFRXQWULHVZLOOEHXWLOL]LQJGURQHSXUFKDVHVQRWDV WKHIRXQGDWLRQRIGRPHVWLFÀHHWVEXWUDWKHUDVWKHLQVWLJDWRUVWRGHYHORS DQGHYROYHQDWLYHLQGXVWULHVDQGKRPHJURZQRSHUDWRUV,QRWKHUZRUGV 6LQJDSRUHLVWKHFRXQWU\WKDWLVWKHPRVWDGDPDQWLQGHFODULQJLWVULJKWWR DFKLHYHH[SDQVLYHGURQHLQGHSHQGHQFH²IURPFRQVWUXFWLRQWRPLOLWDUL]DWLRQ WRRSHUDWLRQFDSDFLWLHV,IVXFFHVVIXOWKLVZLOOVLJQDOLIQRWWKHHQGWKHQ FHUWDLQO\DPLWLJDWLQJFKDOOHQJHWRWKHVRFDOOHG$PHULFDQH[SHUWLVHDQG

WHFKQRORJLFDOGRPLQDQFH 2017 January | 1 No. | 1 Volume | ,QIDFWDSRVVLELOLW\H[LVWVWKDWRWKHUFRXQWULHVZLWKLQWKHJUHDWHU$VLD 3DFL¿FUHJLRQZLOOIROORZWKH6LQJDSRUHPRGHODQGWKXVFUHDWHZKDWFRXOG HQGXSEHLQJWKHVHFRQGODUJHVW8$9PDUNHWLQWKHZRUOG 7KLVIDFW KRZHYHUFDQEHDUJXHGDVVWDWLVWLFDOWULFNHU\WKHJUHDWHU$VLD3DFL¿FUHJLRQ as a whole FRXOGRYHUWDNH,VUDHOIRUVHFRQGSODFH%XWWKLVLVFRQÀDWLQJDOO QDWLRQDODFTXLVLWLRQVLQWRRQHZKROHVXP:KHQ,VUDHOLVFRPSDUHGWRWKH

DFTXLVLWLRQVRILQGLYLGXDOQDWLRQVRIJUHDWHU$VLDLWPDLQWDLQVLWVVROLGKROG Security and Intelligence, Cyber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¿QG WKHPVHOYHVDWRGGVZLWK$PHULFDQREMHFWLYHVDQGSROLFLHV 7KLVLVDQLPSRUWDQWGLVWLQFWLRQWRPDNHZKLFKDWSUHVHQWLVEHLQJ XQGHUHPSKDVL]HGZLWKLQ8$9SUROLIHUDWLRQGHEDWHVDQGGLVFXVVLRQVWKH DELOLW\WRIXVHWKHSRZHURI7(&+,17ZLWKWKHDJLOLW\RI+80,17SURYLGHV QHZSRZHUSURMHFWLRQWRFRXQWULHVWKDWZHUHSUHYLRXVO\OLPLWHG7KH8QLWHG 6WDWHVDQG,VUDHOKDYHLQWKHSDVWMXVWL¿DEO\PDLQWDLQHGVXSUHPHFRQ¿GHQFH LQWKHLUDELOLW\WRRXWSDFHDQGRXWUDFHDQ\RWKHUVWDWH¶VDFTXLVLWLRQDQG GHYHORSPHQW%XWWKLVORJLFPD\KDYHEHHQWRRDEVROXWLVWLWLVQRWQHFHVVDU\ IRUDOHVVHUULYDOWRSHUIHFWO\PDWFKWKHWHFKQLFDODQGKXPDQFDSDELOLWLHVRI MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

80 WKH8QLWHG6WDWHVRU,VUDHOLQRUGHUWRSUHVHQWUHDOFKDOOHQJHVDQGGDQJHUV WRWKHLULQWHUHVWV7KHIXVLRQDWWHPSWVGHVFULEHGDERYHZLWKLQWKHGURQH DUHQDVKRZMXVWKRZPXFKSRWHQWLDOIRUGLVDVWHUOLHVLQDUHODWLYHLQFUHDVH LQFDSDELOLW\$EVROXWHHTXDOL]DWLRQLVQRWQHFHVVDU\IRUGDPDJHWREHGRQH

Changing of the Guard 5HWDLQLQJSROLF\IRFXVRQWKHQHHGVDQGUHTXLUHPHQWVRIWKHVROGLHURSHUDWRU DQGDQDO\VWZLOOUHVXOWLQHIIHFWLYHDQGVXVWDLQDEOHHYROXWLRQDU\SROLF\²

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | HPEUDFLQJWKHJURZWKRIWKHWHFKQLFDO¿HOGDVZHOODVWKHGHYHORSPHQWRI PRGHUQKXPDQDJHQWV²DQGZLOODGYDQFHQDWLRQDOVHFXULW\LQWHUHVWVRQWKH EDWWOH¿HOGDQGLQWKHLQWHOOLJHQFHDUHQD7RUHFRJQL]HWKLVQHHGDQGDGDSW DFFRUGLQJO\DUHWKHVWHSVUHTXLUHGIRUWKHLQWHOOLJHQFHFRPPXQLW\RIWKH QH[WJHQHUDWLRQ 2IWHQWKHEHVWWUDLQHGNQRZOHGJHDEOHDQGH[SHULHQFHGSHUVRQQHOGRQRW PRYHXSWKHUXQJVRIWKHEXUHDXFUDWLFODGGHUWREHFRPHHIIHFWLYHSROLF\PDNHUV 7KLVODFNRIUHDOLVWLF¿HOGH[SHULHQFHLQWKHSROLF\PDNLQJDUHQDHTXDWHVWR Cyber, Intelligence, and Security Security and Intelligence, Cyber, DODFNRIVXFFHVVIXOLQWHOOLJHQFHSULRULWL]DWLRQDQGIXWXUHLQQRYDWLRQ$V ³SXULVWV´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³HQHP\´PD\QRWEHVXFKDEDGLGHD7UDQVLWLRQDOWUDLQLQJSURJUDPV FRXOGHQDEOHDQGIDFLOLWDWHSUHVHQWJHQHUDWLRQLQWHOVSHFLDOLVWVWRIROORZDQG MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

81 XQGHUVWDQGWKHQHHGIRUWKLVIXVLRQ7KHUHLVQRH[SHFWDWLRQIRUQRQWHFKQLFDOO\ RULHQWHGHPSOR\HHVWREHFRPHFRPSXWHUVFLHQWLVWVRUWHFKQLFDOVSHFLDOLVWV WRVXGGHQO\EHFRPHDGURLW³VXSHUVSLHV´LQWKH¿HOG5DWKHUHIIRUWVQHHGWR EHPDGHWRSURSHUO\HQKDQFHDQGHQJDJHFRPPXQLFDWLRQEHWZHHQWKHWZR FRPPXQLWLHVVRWKDWWKH\FDQWDONDQGFROODERUDWHHYHQLIHDFKUHPDLQV UHODWLYHO\QRQSUR¿FLHQWLQWKHVSHFLDOL]DWLRQRIWKHRWKHULWLVPRUHDERXW IDFLOLWDWLQJFRPSHWHQFHWKDQGHPDQGLQJH[SHUWLVH6XUSULVLQJO\WKHEHQH¿W RIWKHVHDSSURDFKHVVRIDUKDVEHHQODUJHO\RYHUORRNHG1RWWDNLQJVHULRXVO\

WKHIXVLRQEHWZHHQ7(&+,17DQG+80,17DVWKHIXWXUHRILQWHOOLJHQFH 2017 January | 1 No. | 1 Volume | PHDQVDQXQVSRNHQDQGFULSSOLQJFLYLOZDUFRQWLQXHVIRUZDUGZKDWVKRXOG EHFRPHDQDOOLDQFHXQIRUWXQDWHO\DQGGDQJHURXVO\ZLOOUHPDLQDULYDOU\

Notes  ,QWHOOLJHQFH6FLHQFH%RDUG The Intelligence Community and Science and Technology: The Challenge of the New S&T Landscape :DVKLQJWRQ'&2I¿FH RIWKH'LUHFWRUDWHRI1DWLRQDO,QWHOOLJHQFH KWWSVIDVRUJLUSGQLLVE

ODQGVFDSHSGI Security and Intelligence, Cyber,  $VKOH\-7HOOLV 3DNLVWDQ²&RQÀLFWHG$OO\LQWKH:DURQ7HUURULVP :DVKLQJWRQ'&&DUQHJLH(QGRZPHQWIRU,QWHUQDWLRQDO3HDFH KWWS FDUQHJLHHQGRZPHQWRUJ¿OHVSEBWHOOLVBSDNLVWDQB¿QDOSGI  .DWKHULQH%HDUG³%HKLQG$PHULFD¶V'HFOLQHLQ0DWK6FLHQFHDQG7HFKQRORJ\´ US News & World Report 1RYHPEHUKWWSZZZXVQHZVFRPQHZV DUWLFOHVEHKLQGDPHULFDVGHFOLQHLQPDWKVFLHQFHDQGWHFKQRORJ\  $QG\6DYRLH³%RRWVRQWKH*URXQG+80,171HHGHGIRU8UEDQ:DUIDUH´ Aerospace Daily & Defense Report 'HFHPEHUKWWSDYLDWLRQZHHNFRP DZLQRI¿FLDOERRWVJURXQGKXPLQWQHHGHGXUEDQZDUIDUH  ,ELG  ³:RPHQLQ&RPEDWDQGWKH3ULFH7KH\3D\´³0RUQLQJ(GLWLRQ´ NPR 0DUFK KWWSZZZQSURUJZRPHQLQFRPEDWDQGWKH SULFHWKH\SD\  :0'&RPPLVVLRQ Final Report of The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction :DVKLQJWRQ'&/LEUDU\RI&RQJUHVV KWWSVIDVRUJLUSRIIGRFV ZPGFRPPKWPO  .HYLQ02¶&RQQHOO³7KH5ROHRI6FLHQFHDQG7HFKQRORJ\LQ7UDQVIRUPLQJ $PHULFDQ,QWHOOLJHQFH´LQ The Future of American Intelligence HG3HWHU %HUNRZLW] 6WDQIRUG+RRYHU,QVWLWXWLRQ3UHVV SS±KWWSPHGLD KRRYHURUJVLWHVGHIDXOW¿OHVGRFXPHQWVBSGI  5DQG&/HZLV³(VSLRQDJHDQGWKH:DURQ7HUURULVP,QYHVWLJDWLQJ86(IIRUWV´ Brown Journal of World Affairs QR  ± MATTHEW CROSSTON AND FRANK VALLI | AN INTELLIGENCE CIVIL WAR: “HUMINT’” VS. “TECHINT”

82  ,VKPDHO-RQHV The Human Factor: Inside the CIA’s Dysfunctional Intelligence Culture  1HZ

Gabi Siboni and Ido Sivan-Sevilla

The cybersecurity challenge cuts across fields, sectors, and approaches. This essay presents the fundamentals of the problem, embraces a risk-based approach that perceives the state as society’s risk manager, and overviews the development of regulatory processes in modern societies. The essay then compares how the United States, , and Israel have chosen to confront the cybersecurity challenge and stresses the importance and difficulties of imposing cybersecurity regulation on the civil sector. Finally, the essay explores some possible avenues for progress and suggests some solutions for increasing the resilience of cyberspace in the civic sector.

Keywords: regulation, risks, cybersecurity, civic sector

Introduction &\EHUVSDFHSRVHVYDULRXVFKDOOHQJHVRQGHFLVLRQPDNHUV7KHVHFKDOOHQJHV VWHPSULPDULO\IURPWKHKHDY\GHSHQGHQFHRIVWDWHVDQGVRFLHWLHVRQVXFK DYXOQHUDEOHVSKHUH:KLOHF\EHUVSDFHHQDEOHVWKHÀRZRILQIRUPDWLRQ ZKLFKLQPRVWFDVHVOHDGVWRHFRQRPLFSURVSHULW\HI¿FLHQF\DQGVRFLDO EHQH¿WVLWLVDOVRDWDUJHWIRUQDWLRQDOVHFXULW\FULPLQDODQGFRPPHUFLDO

Dr. Gabi Siboni is the director of the Cyber Security Program at the Institute for National Security Studies. Ido Sivan-Sevilla is a research fellow in the Cyber Security Program at the Institute for National Security Studies.

Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017 83 GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

84 WKUHDWV7KHFKDOOHQJHVWRWKHUHVLOLHQFHRIF\EHUVSDFH 1 are rooted in several NH\IDFWRUV)LUVWWKHUHLVDQREYLRXVDV\PPHWU\EHWZHHQWKHPLQLPDO REVWDFOHVRIKDFNHUVWRSHQHWUDWHF\EHUVSDFHDQGWKHKLJKFRVWVRIGHIHQGLQJ LW:KLOHDVXFFHVVIXODWWDFNQHHGVRQO\DVLQJOHYHFWRUWRDGYDQFHGHIHQVH HIIRUWVDVSLUHWRFRYHUDOOSRVVLEOHYXOQHUDELOLWLHV6HFRQGF\EHUVSDFHUHOLHV RQRXWGDWHGFRPPXQLFDWLRQVSURWRFROVDOORZLQJDWWDFNHUVDJUHDWGHDORI DQRQ\PLW\DQGPDNLQJLWGLI¿FXOWIRUODZHQIRUFHPHQWDJHQFLHVWRLGHQWLI\ WKHVRXUFHRIWKHDWWDFNV 27KLUGF\EHUVSDFHDOORZVSRWHQWLDODWWDFNHUVWR

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | H[SORLWWKHQXPHURXVKDUGZDUHDQGVRIWZDUHZHDNQHVVHVDQGWRXVHH[LVWLQJ DWWDFNWRROVWKDWVXFFHHGHGLQSUHYLRXVDWWDFNVWKLVSKHQRPHQRQDFFHOHUDWHV WKHUDFHWRGHIHQGRQHVHOIIXUWKHUHURGLQJWKHVHFXULW\OHYHO7KHH[LVWHQFH RIDÀRXULVKLQJPDUNHWWRH[SORLW]HURGD\ZHDNQHVVHVRQO\VWUHVVHVWKLV SRLQW 3)XUWKHUPRUHUHFHQWO\LWWUDQVSLUHGWKDWFRPPHUFLDOHQWLWLHVKDYH VKDUHGVRIWZDUHZHDNQHVVHVDQGDWWDFNVWRROVZLWKJRYHUQPHQWVWRIDFLOLWDWH VS\LQJRQFLWL]HQVDQG³UHJLPHRSSRQHQWV´ 4

Cyber, Intelligence, and Security Security and Intelligence, Cyber, )RXUWKWKHODFNRIPHFKDQLVPVWRVKDUHLQIRUPDWLRQDERXWF\EHUVSDFH WKUHDWVDQGWKHPHDQVRIGHIHQVHHPSOR\HGE\FRPPHUFLDOFRPSDQLHVPDNH LWGLI¿FXOWWRIRUPXODWHDFROOHFWLYHSURDFWLYHHIIRUWWRSUHYHQWF\EHUDWWDFNV 7KLVVWHPVSULPDULO\IURPRQO\SDUWLDOLQIRUPDWLRQVKDULQJDQGOLPLWHG WUDQVSDUHQF\RIFRPPHUFLDOFRPSDQLHVLQWKHFLYLFVHFWRU 5ZKLOHERWKWKH PLOLWDU\DQGWKHVWDWHVHFWRUVIDLOWRGRWKHLUSDUW)LIWKWKHUHLVDODFNRI HFRQRPLFLQFHQWLYHVDQGWHFKQRORJLFDOWRROVWRGHYHORSDSSURSULDWHGHIHQVH :KLOHF\EHUVSDFHGDPDJH²FXUUHQWO\HVWLPDWHGLQWKHELOOLRQVRIGROODUV²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¿FLHQWWRFUHDWHKHUPHWLFGHIHQVHV )LQDOO\ PRVWF\EHUVSDFHXVHUVDUHXQDZDUHRIWKHGDQJHUVDQGSURYLGHF\EHUVSDFH ZLWKVHQVLWLYHFULWLFDOLQIRUPDWLRQWKDWLVQRWVXI¿FLHQWO\SURWHFWHG0DQ\ XVHUVDOVRIDOOYLFWLPWRVRFLDOHQJLQHHULQJDWWHPSWVFKRRVHZHDNSDVVZRUGV GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

85 DQGLQPRVWFDVHVUHSUHVHQWWKHZHDNHVWOLQNWKURXJKZKLFKV\VWHPVDUH EUHDFKHG 7 ,WLVWKHUHIRUHQRWVXUSULVLQJWKDWZHDUHLQXQGDWHGGDLO\ZLWKUHSRUWV IURPDOORYHUWKHZRUOGDERXWQHZO\GLVFRYHUHGZHDNQHVVHVGDWDEDVH EUHDFKHVVHQVLWLYHLQIRUPDWLRQWKHIWDQGFRPSXWHUV\VWHPVWKDWKDYHEHHQ PDOLFLRXVO\GDPDJHG 7KHHDVHDWZKLFKFRPPHUFLDOLQVWLWXWLRQVDQGVWDWHV FROOHFWDQGVWRUHFULWLFDOLQIRUPDWLRQXQGHUFXWVWKHHI¿FDF\RIWKHHIIRUWV H[SHQGHGWRSURWHFWF\EHUVSDFHWKXVZH¿QGRXUVHOYHVGHSHQGHQWRQWKH

SURSHUIXQFWLRQLQJRIDYXOQHUDEOHVSKHUH)RULWVSDUWWKHVWDWHWULHVWR 2017 January | 1 No. | 1 Volume | SDUWLDOO\¿[WKLVPDUNHWIDLOXUHDQGLQWHUYHQHWRHLWKHUSUHYHQWF\EHUVSDFH GDQJHUVIURPEHLQJUHDOL]HGRUPLWLJDWHWKHLULPSDFWDIWHUWKH\DOUHDG\KDYH RFFXUUHG 7KHULVNVSRVHGE\F\EHUVSDFHDUHWKHQDWXUDOSURJUHVVLRQRIWKHULVNV IDFLQJWKHPRGHUQVWDWHDVGHVFULEHGLQE\VRFLRORJLVW8OULFK%HFN LQKLVJURXQGEUHDNLQJERRN 5LVN6RFLHW\ 9$FFRUGLQJWR%HFNPRGHUQOLIH

DQGLWVWHFKQRORJLFDOGHYHORSPHQWVRIIHUPDQ\RSSRUWXQLWLHVEXWDOVRFUHDWH Security and Intelligence, Cyber, QHZGDQJHUVWRKXPDQLW\DQGWKHHQYLURQPHQW,QHFRQRPLVW'DYLG 0RVVUHIHUUHGWRWKHFRPSOH[LW\RIULVNPDQDJHPHQWE\JRYHUQPHQWV 10 0RVV VKRZHGKRZWKH86DGPLQLVWUDWLRQDVWKHULVNPDQDJHURIWKH$PHULFDQ VRFLHW\ZHQWWKURXJKWKUHHVXFFHVVLYHGHYHORSPHQWDOVWDJHVLQLWVULVN PDQDJHPHQWVWUDWHJ\7KHSURFHVVEHJDQLQWKHQLQHWHHQWKFHQWXU\ZKHQ WKH8QLWHG6WDWHVLQWHUYHQHGDJJUHVVLYHO\LQ¿QDQFLDOULVNPDQDJHPHQWWR HQFRXUDJHLQYHVWPHQWVDQGHFRQRPLFJURZWK E\OHJLVODWLRQVXFKDVWKH OLPLWHGLQFRUSRUDWLRQODZWKDWUHGXFHGLQYHVWRUULVNDQGWKHHDUO\YROXQWDU\ EDQNUXSWF\ODZWKDWSURWHFWHGLQYHVWRUVIURPORVLQJHYHU\WKLQJWKH\RZQHG  /DWHUWKHVWDWHWUDQVLWLRQHGWRULVNPDQDJHPHQWRQEHKDOIRIZRUNHUV¶VDIHW\ DQGMREPDUNHWVWDELOLW\ ZRUNHUV¶FRPSHQVDWLRQVRFLDOVHFXULW\DQGWKH ELUWKRIWKHZHOIDUHVWDWH )LQDOO\LQWKHFXUUHQWVWDJHWKHVWDWHPDQDJHV ULVNVIRUWKHHQWLUHVRFLHW\²HQYLURQPHQWDOGDQJHUVIRRGDQGGUXJVDIHW\ DQGQRZF\EHUVSDFHULVNV²DULVLQJIURPPRGHUQGHYHORSPHQWV 11 7KHULVNVWUDWHJLHVWKDWVWDWHVXVHUDQJHIURPULVNUHGXFWLRQWRWKHLU GLVWULEXWLRQWKURXJKRXWVRFLHW\2QWKHRQHKDQGUHGXFLQJULVNVFRQVLVWV PDLQO\RIERWKSUHYHQWLQJWKHPLQWKH¿UVWSODFH HJVDIHW\UHJXODWLRQV WUDI¿FVLJQVZDUQLQJWRVORZGRZQLQIRUPDWLRQVHFXULW\UHTXLUHPHQWVWR SUHYHQWKDFNLQJDQGVRIRUWK DQGPLWLJDWLQJWKHGDPDJHIURPDULVNWKDW KDVDOUHDG\RFFXUUHG HJ¿UH¿JKWLQJUHJXODWLRQVIRUGHDOLQJZLWK¿UHV GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

86 VWHSVWRUHGXFHWKHGDPDJHUHVXOWLQJIURPF\EHUDWWDFNV 12 DQGQRWLI\LQJ WKHSXEOLFDQGVWDWHHQWLWLHVRIDVHFXULW\EUHDFKVRWKDWWKH\FDQSURWHFW WKHPVHOYHVEHIRUHEHLQJWDUJHWHG 2QWKHRWKHUKDQGUHGLVWULEXWLQJWKHULVNV FRQVLVWVRIWUDQVIHUULQJWKHUHVSRQVLELOLW\IRUWKHULVNWRDUDQJHRIHQWLWLHV IRUH[DPSOHSURGXFWOLDELOLW\ODZVVKLIWWKHUHVSRQVLELOLW\IURPWKHFRQVXPHU WRWKHPDQXIDFWXUHU$FRQWHPSRUDU\H[DPSOHLVWKH&\EHU,QIRUPDWLRQ 6KDULQJ$FWWKDWOLPLWVWKHOLDELOLW\IRUDGDWDEUHDFKLQFRPPHUFLDOFRPSDQLHV WKDWFKRRVHWRVKDUHLQIRUPDWLRQRQF\EHUWKUHDWVZLWKWKHJRYHUQPHQW5LVN

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | UHGLVWULEXWLRQFDQDOVRRFFXUE\VSUHDGLQJWKHULVNVDPRQJYDULRXVSDUWLHV YLDLQVXUDQFHFRPSDQLHVIRUH[DPSOH(YHU\LQVXUHGHQWLW\SD\VDFHUWDLQ SUHPLXPWRFRYHUWKHGDPDJHIURPDULVNEHLQJUHDOL]HGZLWKVRPHRWKHU SDUW\HQVXUHGXQGHUWKHVDPHXPEUHOOD,QF\EHUVSDFHWKHSULYDWHVHFWRU PDQDJHVULVNGLVWULEXWLRQPDLQO\IRUWKLUGSDUW\ULVNV 13 VRIDUZLWKRXWDQ\ VWDWHLQWHUYHQWLRQ 'HVSLWHWKHPDQ\ULVNVWUDWHJLHVDYDLODEOHWKHVWDWHKDVQRW\HWGHWHUPLQHG

Cyber, Intelligence, and Security Security and Intelligence, Cyber, WKHULJKWZD\WRLQWHUYHQH²HVSHFLDOO\LQWKHFLYLFVHFWRU²WRHQVXUHWKH FRQWLQXRXVIXQFWLRQLQJUHVLOLHQFHDQGVWDELOLW\RIF\EHUVSDFH,QWHUPVRI WKHUHVLOLHQFHRIF\EHUVSDFHWKHFLYLFVHFWRUKDVWUHPHQGRXVLPSRUWDQFH %HFDXVHWKLVVHFWRUUHSUHVHQWVWKHOLRQ¶VVKDUHRIDFWLYLW\LQF\EHUVSDFHLWLV H[SRVHGWRPRVWRIWKHULVNVWKHUHIRUHGDPDJHWRWKHFLYLFVHFWRUKDVPDMRU HFRQRPLFDQGVHFXULW\LPSOLFDWLRQVIRUWKHUHVLOLHQFHRIWKHHQWLUHVRFLHW\ DVWKLVHVVD\GHPRQVWUDWHV

State Regulation: Background and Development $WLWVPRVWEDVLFUHJXODWLRQFRQVLVWVRIFRQWUROVXSHUYLVLRQDQGHQIRUFHPHQW FDUULHGRXWE\WKHVWDWHRUWKURXJKLQGHSHQGHQWVWDWHVSRQVRUHGDJHQFLHVWR OHJDOO\HQIRUFHELQGLQJFRGHVRIFRQGXFW 14 ,WDSSOLHVWRWKRVHHQWLWLHVWKDW WKHUHJXODWRU\ERG\ZLVKHVWRUHJXODWH7KHFRQFHSWRIUHJXODWLRQHPHUJHG LQWKH8QLWHG6WDWHVDWWKHHQGRIWKHQLQHWHHQWKFHQWXU\DVDSROLWLFDO DQGPDQDJHPHQWPHWKRGWRFRQWUROWKHHFRQRP\5HJXODWLRQEHFDPHWKH JRYHUQPHQW¶VFHQWUDOWRRODQGZDVDQDWXUDOUHDFWLRQWRPDUNHWIDLOXUHV DEVHQFHRIVXSHUYLVLRQDQGWKHHPHUJHQFHRIVRFDOOHGQDWXUDOPRQRSROLHV %\FRQWUDVW(XURSHWHQGHGWRQDWLRQDOL]HWKHPDUNHW6XSHUYLVLRQWKURXJK QDWLRQDOL]DWLRQGHOD\HGWKHGHYHORSPHQWRIDUHJXODWRU\WUDGLWLRQLQ(XURSH LQWDQGHPZLWKWKH8QLWHG6WDWHV 15 )URPWKHHQGRIWKHVDQGLQWR WKHVWKH8QLWHG6WDWHVEHJDQH[SDQGLQJWKHXVHRIUHJXODWLRQDQG GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

87 HVWDEOLVKHGLQGHSHQGHQWUHJXODWRU\DJHQFLHVZKLOH(XURSHVWDUWHGWRXVH UHJXODWRU\WRROVWRDFFHOHUDWHLWVHFRQRPLFXQLW\  :KHQ0DUJDUHW7KDWFKHUZDVHOHFWHGSULPHPLQLVWHURIWKH8QLWHG .LQJGRPLQDQG5HDJDQEHFDPHWKH86SUHVLGHQWLQQHR OLEHUDOLVPDQGSULYDWL]DWLRQRIJRYHUQPHQWVHUYLFHVZHUHRQWKHULVH7KLV OHGWRLQGHSHQGHQWUHJXODWRU\DJHQFLHVZLGHQLQJWKHVFRSHRIWKHLUDFWLYLWLHV WRUHJXODWHWKHPDUNHWWKXVJLYLQJULVHWRWKHQLFNQDPH³WKHUHJXODWRU\ VWDWH´ 17 7KHVWDWH¶VIXQFWLRQKDVJUDGXDOO\VKLIWHGIURPVXEVLGL]LQJVHUYLFHV

DQGKHOSLQJWRUHGXFHJDSVWKHVWDWHQRZVHHNVWREULQJJUHDWHUHI¿FLHQF\ 2017 January | 1 No. | 1 Volume | WRWKHPDUNHWE\PHDQVRILQFUHDVHGUHJXODWLRQ RUE\GHUHJXODWLRQ   ,Q SUDFWLFHUHJXODWLRQLVXVXDOO\XQGHUVWRRGDVOHJLVODWLRQRUVXEOHJLVODWLRQE\ WKHVWDWHRULQGHSHQGHQWUHJXODWRU\DJHQFLHVH[SUHVVHGLQELQGLQJGLUHFWLYHV GHFUHHVDQGJXLGHOLQHV,WVIXQFWLRQLVWRFRQWUROPDUNHWDFWLYLW\ZKLOHWKH VWDWHVHWVWKHRYHUDOOSROLF\,QWKHUHJXODWRU\VWDWHH[SHUWVSOD\DNH\UROH WKHGHPDQGIRUKLJKH[SHUWLVHDFURVVLVVXHVLVWKHLQLWLDOPRWLYDWLRQIRUWKH 19

HVWDEOLVKPHQWRILQGHSHQGHQWDJHQFLHV Security and Intelligence, Cyber, -XVWL¿FDWLRQIRUVWDWHUHJXODWLRQFDQEHH[SODLQHGLQVHYHUDOZD\V)LUVW UHJXODWLRQVWULYHVWRSURWHFWWKHYDOXHVDQGOLEHUWLHVRIFLWL]HQVZKRDUH OLDEOHWRVXIIHUDWWKHKDQGVRIWKHSRZHUIXORUIURPH[WHUQDOWKUHDWV7KLV MXVWL¿FDWLRQH[SODLQVWKHQHHGIRUWKHDUP\DQGVHFXULW\IRUFHVRQWKHRQH KDQGDQGIRUDXWKRULWLHVWKDWFKHFNDQGEDODQFHWKHPRQWKHRWKHU6HFRQG WKHHFRQRPLFMXVWL¿FDWLRQIRUUHJXODWLRQLVWR¿[PDUNHWIDLOXUHVUHVXOWLQJ IURPIUHHPDUNHWSUDFWLFHVWKDWGRQRWVHUYHWKHSXEOLFLQWHUHVW 20 HJWKH FUHDWLRQRIDPRQRSRO\RUDFDUWHOWKDWSULFHVDQGSURYLGHVSURGXFWVDVLW VHHV¿WPDNLQJVXSHUYLVLRQQHFHVVDU\7KLUGUHJXODWLRQFDQEHMXVWL¿HGE\ ODFNRILQIRUPDWLRQRUDV\PPHWU\RILQIRUPDWLRQZKLFKFDXVHVFRQVXPHUV FRPSDQLHVDQGHYHQVWDWHVWREHKDYHLQDPDQQHULQFRQVLVWHQWZLWKWKHSXEOLF JRRG,QWKLVFDVHWKHMRERIWKHUHJXODWRU\ERG\LVWRDOORZWUDQVSDUHQF\ DQGWKHIUHHÀRZRILQIRUPDWLRQ)LQDOO\UHJXODWLRQFDQEHH[SODLQHGDV WKHGHVLUHWRHQVXUHWKHFRQWLQXHGH[LVWHQFHRIGZLQGOLQJHVVHQWLDOSXEOLF UHVRXUFHVWKDWRQHFDQQRWDYRLGXVLQJIURPWKHTXDOLW\RIWKHDLUWRWKH QXPEHURI¿VKLQWKHRFHDQ7KHUHJXODWRU\ERG\PXVWHQVXUHWKDWWKHVH UHVRXUFHVFRQWLQXHWRH[LVWGHVSLWHPDUNHWIRUFHVWKDWZRXOG²ZKHQOHIWWR WKHLURZQGHYLFHV²FRPSOHWHO\FRQVXPHWKHP 7KHOLWHUDWXUHH[SODLQVKRZWKHUHJXODWRU\ERGLHVZRUNDVSDUWRISXEOLF SROLF\SURFHGXUHVDQGWKHFUHDWLRQRIUHJXODWLRQLQWKH¿UVWSODFHXVLQJ GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

88 PDQ\DSSURDFKHV7KHWKHRU\RIWKHSXEOLFLQWHUHVWDOVRNQRZQDVWKH IXQFWLRQDOLVWWKHRU\DVVHUWVWKDWUHJXODWLRQRSHUDWHVWRSURPRWHWKHFRPPRQ JRRGDQGLQFUHDVHVRFLDOZHOIDUH 21 %\FRQWUDVWWKHSULYDWHLQWHUHVWWKHRU\ PDLQWDLQVWKDWSULYDWHLQWHUHVWVPRWLYDWHUHJXODWRU\ERGLHVWRLQFUHDVHWKH JDLQVRIFHQWUDOL]HGLQWHUHVWJURXSVXVXDOO\UHSUHVHQWLQJDVPDOOVOLFHRI WKHSRSXODWLRQ,QWKDWVHQVHUHGXQGDQWUHJXODWLRQLVDSURGXFWRILQWHUHVW JURXSV¶UHODWLRQVZLWKWKHVWDWHDQGDPRQJVWRQHDQRWKHU 22 )XUWKHUPRUHDQ LQVWLWXWLRQDOH[SODQDWLRQIRUUHJXODWRU\UHJLPHVFDQEHJLYHQ$QLQVWLWXWLRQ¶V

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | FDSDFLW\ 23 RULWVKLVWRULFDOORFDWLRQLQWKHSXEOLFSROLF\SURFHVV 24 H[SODLQVWKH VWUXFWXULQJRIWKHUHJXODWLRQLQWKHZD\LQZKLFKLWZDVFUHDWHG,QWKHODVW WZHQW\\HDUVRUVRDQRWKHUVFKRRORIWKRXJKWKDVHPHUJHGZKLFKH[SODLQV UHJXODWLRQEDVHGRQLGHDV$FFRUGLQJWRWKLVVFKRRORIWKRXJKWSDUDGLJPV SOD\DFHQWUDOUROHLQWKHVKDSLQJRISXEOLFSROLF\ 25 $FHUWDLQLGHDZLOOEH SHUFHLYHGDV³ULJKW´DQGDV³DZLQGRZRIRSSRUWXQLW\´FDXVLQJGHFLVLRQ PDNHUVWRHVWDEOLVKUHJXODWLRQLQWKHVSLULWRIWKHSDUDGLJPDQGLWVDWWHQGDQW 

Cyber, Intelligence, and Security Security and Intelligence, Cyber, LQWHUHVWV ,QRWKHUZRUGVLQPDQ\FDVHVLGHDVDQGLQWHUHVWVDUHLQWHUWZLQHG WRWKHGHJUHHWKDWDQLGHDFDQSURYLGHOHJLWLPDF\DQGH[SUHVVLRQIRULQWHUHVWV JURXSVZKLFKDUHFDSDEOHRIJHQHUDWLQJUHJXODWLRQWRVHUYHWKHLUREMHFWLYHV 27

Regulatory Approaches in Cyberspace: Israel, the United States, and the European Union 5HJXODWLRQWKXVLVH[SDQGLQJLQPRGHUQVRFLHWLHVDQGLWVMXVWL¿FDWLRQV DQGH[SODQDWLRQVDUHULFKDQGYDULHG1HYHUWKHOHVVWKHOLWHUDWXUHKDV\HWWR H[SORUHWKHUHJXODWRU\SURFHVVLQF\EHUVSDFH7KHSDUDJUDSKVEHORZGHVFULEH WKHFKDOOHQJHVIRUUHJXODWLRQRIF\EHUVSDFHWKHZD\VLQZKLFKUHJXODWRU\ ERGLHVGHDOZLWKF\EHUVHFXULW\DQGKRZWKH8QLWHG6WDWHVDQGWKH(XURSHDQ 8QLRQ  KDYHVWUXFWXUHGWKHLUUHJXODWLRQUHJLPHVRIF\EHUVSDFHFRPSDUHG WR,VUDHO)LQDOO\WKHHVVD\IRFXVHVRQ,VUDHOLUHJXODWLRQRIF\EHUVSDFHDQG KLJKOLJKWVWKHODUJHVWJDSLQWKDWUHJLPH²WKHFLYLFVHFWRU 5HJXODWLRQLQF\EHUVSDFHGRHVQRWUHIHURQO\WRGHIHQVHLQWKHFODVVLFDO VHQVHUDWKHULWFRQVLVWVRIPDQ\DVSHFWVGLUHFWO\UHODWHGWRQDWLRQDOVHFXULW\ GHIHQVHRIDVVHWVDQGLQWHOOHFWXDOSURSHUW\FULPHSUHYHQWLRQLQIRUPDWLRQ VHFXULW\DQGWKHULJKWWRSULYDF\6XFKUHJXODWRU\REMHFWLYHVFKDOOHQJH UHJXODWRU\ERGLHVIRUWKUHHSULPDU\UHDVRQV)LUVWWKHFRVWVLQYROYHGIRU UHTXLULQJSURWHFWLRQDUHKLJKDQGFUHDWHYHKHPHQWUHVLVWDQFHDPRQJWKHSULYDWH VHFWRUZKLFKUHSUHVHQWVWKHODUJHVWSURSRUWLRQRIF\EHUVSDFH 29 6HFRQGWKHUH GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

89 LVQRVWDWHLVVXHGJXLGHOLQHGHPDQGLQJWKDWFRPSDQLHVEHWUDQVSDUHQWDERXW WKHLUOHYHORIVHFXULW\DQGWKHVHYHULW\RIDWWDFNVLQSUDFWLFH%RWKDWWDFNHUVDQG GHIHQGHUVVKDUHLQIRUPDWLRQ 30 EXWJHQHUDOO\GHIHQVLYHHIIRUWVGRQREHQH¿W IURPH[WHQVLYHFROOHFWLYHRUJDQL]LQJ:KHQFRPPHUFLDOVHFUHWVDQGFRPSDQ\ UHSXWDWLRQVDUHDWVWDNHLWLVKDUGO\VXUSULVLQJWKDWWKHFLYLFVHFWRUZRXOG EHXQKDSS\WRVKDUHLQIRUPDWLRQDERXWWKHJRLQJVRQLQLWVGLJLWDOVSKHUH 7KLUGUHJXODWLRQLQF\EHUVSDFH²DVDQ\ZKHUHHOVH²LQYROYHVDFRQÀLFWRI LQWHUHVWV0RVWSURPLQHQWDUHWKHVWUXJJOHVEHWZHHQVWDWLVP 31 DQGOLEHUDOLVP

DQGWKHULJKWWRSULYDF\YHUVXVWKHULJKWWRVHFXULW\ 32 )XUWKHUPRUHVWUXJJOHV 2017 January | 1 No. | 1 Volume | LQWKHFRQWH[WRIQDWLRQDOVHFXULW\LQWHUHVWVYHUVXVWKHGHVLUHIRUHFRQRPLF GHYHORSPHQW DVUHÀHFWHGLQVXSHUYLVLRQRIH[SRUWVRIVHQVLWLYHJRRGV DVZHOO DVREVWDFOHVRILQIRUPDWLRQVKDULQJDPRQJFRPSDQLHVLQOLJKWRIWKHVWULQJHQW GLUHFWLYHVLVVXHGE\WKHGLUHFWRUJHQHUDORIWKH,VUDHO$QWLWUXVW$XWKRULW\ VHUYHDVDSDUWLDOUHÀHFWLRQRIWKHGLI¿FXOWLHVLQLQVWLWXWLQJUHJXODWLRQLQWKH ¿HOG7KHVHFRQÀLFWVOHWORRVHFRQWUDGLFWLQJLQWHUHVWVDQGSRZHUVWUXJJOHV

ZKLFKLPSHGHWKHLPSOHPHQWDWLRQRIUHJXODWLRQLQF\EHUVSDFH Security and Intelligence, Cyber, *LYHQWKHVHFKDOOHQJHVUHJXODWLRQRIF\EHUVSDFHXVXDOO\LQYROYHVIRXU ZD\VRIGHDOLQJZLWKWKHSUREOHPRIF\EHUVHFXULW\ 33 7KHPRVWFRPPRQRQH LVWRFUHDWHVWDQGDUGVDQGUHTXLUHPHQWVLQLQIRUPDWLRQVHFXULW\LQFOXGLQJ HQFU\SWLRQPRQLWRULQJEDFNXSVVWURQJDXWKHQWLFDWLRQDQGVRIRUWK,Q DGGLWLRQUHJXODWLRQ²HVSHFLDOO\LQWKH8QLWHG6WDWHV²VHHNVWRHQFRXUDJHDQG FUHDWHPHFKDQLVPVIRULQIRUPDWLRQVKDULQJEHWZHHQFRPPHUFLDOFRPSDQLHV DQGWKHVWDWHEDVHGRQWKHPXWXDOGHVLUHWRFRQIURQWWKHSUREOHPRIWKH ODFNRILQIRUPDWLRQDQGWKHUHE\SURWHFWDJDLQVWDWWDFNVEHIRUHWKH\RFFXU DVZHOODVPLWLJDWHWKHGDPDJHE\DWWDFNVWKDWKDYHDOUHDG\RFFXUUHG7KH UHJXODWRU\¿HOGLVDOVRQRWDEOHIRUFUHDWLQJUHJXODWRU\DJHQFLHVDQGEHVWRZLQJ DXWKRULW\RQVWDWHLQVWLWXWLRQVWRHQIRUFHGHIHQVLYHF\EHUVHFXULW\VWDQGDUGVDQG SUDFWLFHV 34 )LQDOO\UHJXODWRU\UHJLPHVLQFOXGHVWHSVWRPLWLJDWHWKLUGSDUW\ KDFNLQJGDPDJHLQFOXGLQJQRWLI\LQJWKHQDWLRQDO&(57 35 DQGFXVWRPHUV ZKRVHSHUVRQDOLQIRUPDWLRQZDVVWROHQ7KLVLVFRQVLVWHQWZLWKWKH³IXOO FLUFOHRIGHIHQVH´  ZKLFKLQFOXGHVSUHYHQWLYHVWHSVLQIRUPDWLRQVKDULQJ DQGGDPDJHPLWLJDWLRQDIWHUDQDWWDFNWRJHWKHUWKH\FUHDWHDFRKHUHQW SURWHFWLYHVKHOOIRURUJDQL]DWLRQVRSHUDWLQJLQF\EHUVSDFH 7KHUHJXODWRU\WRROVXVHGWRFRQIURQWF\EHUVHFXULW\ULVNVJHQHUDOO\LQYROYH OHJLVODWLRQELQGLQJVWDWHJXLGHOLQHVLVVXHGE\WKHUHJXODWRU\DJHQFLHV 37 and VHOIUHJXODWLRQE\FRQIRUPLQJWRUHFRPPHQGHGVWDQGDUGVVXFKDVWKH,62 GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

90 LQIRUPDWLRQVHFXULW\VWDQGDUGV  WKH3&,VWDQGDUGVIRURQOLQHFRPSDQLHV providing clearing services, 39 RUE\LQWHUQDORUJDQL]DWLRQDOH[SHUWLVHZKLFK SURYLGHVJXLGHOLQHVIRUSURWHFWLQJWKHRUJDQL]DWLRQ¶VFRPSXWHUQHWZRUNV DOWKRXJKWKLVLVQRWDOZD\VSXEOLFO\NQRZQ,QDGGLWLRQWKHVWDWHDOVRLVVXHV VWDQGDUGVDQGJXLGHOLQHVRQWKHUHFRPPHQGHGZD\WRGHIHQGWKHRUJDQL]DWLRQ DQGRUWKHVWUDWHJLHVWKDWRXJKWWREHXVHG,QWKH8QLWHG6WDWHVIRUH[DPSOH WKH1DWLRQDO,QVWLWXWHRI6WDQGDUGVDQG7HFKQRORJ\LVSXQFWLOLRXVLQLVVXLQJ VWDQGDUGVIRUGHIHQGLQJDQGHQFU\SWLQJLQIRUPDWLRQV\VWHPV 40 while the

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | )LQDQFLDO,QGXVWU\5HJXODWRU\$XWKRULW\DVVHVVHVWKHEHVWGHIHQVLYHF\EHUVSDFH VWUDWHJLHVIRU¿QDQFLDOFRPSDQLHV 41 ,QWKH:HVWHUQZRUOGWKHUHDUHWZRPDLQDSSURDFKHVIRUVWDWHVWRFRQIURQW F\EHUVSDFHULVNV:KLOHUHJXODWLRQLQWKH8QLWHG6WDWHVLVEDVHGSULPDULO\RQ PXOWLSOHYROXQWDU\VHFWRUEDVHGDJHQFLHVZLWKFRQVLGHUDEOHZHLJKWJLYHQ WRPDUNHWIRUFHV 42 WKH(XURSHDQ8QLRQSUHVHQWVDGLIIHUHQWKLHUDUFKLF PRGHO/DWHUDOLQVWLWXWLRQVKDYHVWURQJHQIRUFHPHQWSRZHUVLQZKLFKWKH

Cyber, Intelligence, and Security Security and Intelligence, Cyber, VWDWHLVDWWKHFHQWHUDQGODUJHVHJPHQWVRIWKHSULYDWHVHFWRUDUHVXEMHFW WRUHJXODWLRQ:KLOHWKH8QLWHG6WDWHVEHOLHYHVWKDWEXVLQHVVLQWHUHVWVZLOO OHDGFRPSDQLHVWRGHIHQGWKHPVHOYHVWKH(XURSHDQ8QLRQWDNHVDPRUH LQWHUYHQWLRQLVWDSSURDFKLQZKLFKWKHVWDWHLQVWLWXWLRQPDNHVVXUHWRGHIHQG WKHYDULRXVVHFWRUVIRUWKHJRRGRIWKHFLWL]HQV%RWKWKH8QLWHG6WDWHVDQG WKH(XURSHDQ8QLRQHQIRUFHWUDQVSDUHQF\RQGDWDEUHDFKHV,QWKH8QLWHG 6WDWHVWUDQVSDUHQF\LVFDUULHGRXWDWWKHVWDWHOHYHO WKHUHDUHYHUVLRQV RIGDWDEUHDFKQRWL¿FDWLRQUXOHV  43 ZKHUHDVWKH(XURSHDQ8QLRQUHFHQWO\ LVVXHGDQXSJUDGHG*HQHUDO'DWD3URWHFWLRQ5HJXODWLRQ *'35 'LUHFWLYH ²HIIHFWLYHLQ0D\DQGIXOO\DSSOLHGVWDUWLQJLQ0D\²WKDWHQVXUHV DXQLIRUPVWDQGDUGIRUQRWL¿FDWLRQDQGFRPSHQVDWLRQIRUVHFXULW\EUHDFKHV 7KHUDWLRQDOHRIWKH(XURSHDQGHFLVLRQPDNHUVZDVWRFUHDWHLQFHQWLYHVIRU WKHPDUNHWWRSURWHFWLWVHOIDKHDGRIWLPHVRDVQRWWRKDYHWREHDUWKHULJLG EXUGHQVRIQRWL¿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| ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

91 NLQGRILQIRUPDWLRQVKDULQJJLYHVOHJLWLPDF\WRFRPPHUFLDOFRPSDQLHVWR LQFUHDVHWKHLUFROOHFWLQJRILQIRUPDWLRQDQGIRUZDUGLQJLWWRWKHVWDWHZLWKRXW DSSURSULDWHUHVSRQVLELOLW\DQGWUDQVSDUHQF\LWLVGLI¿FXOWWREHOLHYHWKLVZLOO HYHUEHFRQVLGHUHGVHULRXVO\LQWKH(XURSHDQ8QLRQ %RWKDSSURDFKHVSURYLGHRQO\DSDUWLDOVROXWLRQWKH\GRQRWLQFOXGH UHJXODWLRQRIWKHVWDWH¶VVHFXULW\VHFWRU WKHDUP\LQWHOOLJHQFHDJHQFLHVDQG VRRQ ZKLFKLVQRUPDOO\H[HPSWIURPJRYHUQPHQWUHJXODWLRQDQGPRVWO\ DSSOLHVDVHOIUHJXODWLRQPRGHO7KH\DOVRGRQRWSURYLGHDFRPSUHKHQVLYH

UHVSRQVHIRUWKHFLYLFVHFWRUDQGLWVPXOWLSOHOD\HUVLQFOXGLQJFRPPHUFLDO 2017 January | 1 No. | 1 Volume | FRPSDQLHVLQGXVWULDOLQVWLWXWLRQVDQGWKHFLYLOLDQVWKHPVHOYHV ,VUDHOSUHVHQWVDK\EULGPRGHO2QWKHRQHKDQGWKHFLYLFVHFWRULVIRU WKHPRVWSDUWQRWVXEMHFWWRDQ\ELQGLQJUHJXODWLRQDQGOLNHWKH8QLWHG 6WDWHVWKHVWDWHUHOLHVRQPDUNHWIRUFHVWR¿QGWKHULJKWEDODQFHEHWZHHQ SURWHFWLRQDQGHFRQRPLFLQYHVWPHQW2QWKHRWKHUKDQGWKHVWDWLVWDSSURDFK LVPDQLIHVWHGLQSULYDWHFRPSDQLHVLQFOXGLQJWKHFRXQWU\¶VEDQNVLQZKLFK

WKHVWDWHGLFWDWHVWKHLQIRUPDWLRQVHFXULW\SUDFWLFHEHFDXVHRIWKHLUVWUDWHJLF Security and Intelligence, Cyber, LPSRUWDQFH7KHVWDWHHYHQLPSRVHVVDQFWLRQVRQVXFKFRPSDQLHVVKRXOG WKH\IDLOWRPHHWLQJWKHQHFHVVDU\WKUHVKROGFRQGLWLRQV7KHUHLVDQH[FHSWLRQ H[SUHVVHGLQWKH3URWHFWLRQRI3ULYDF\/DZZKLFKLQFOXGHVDVSHFWVRI LQIRUPDWLRQSURWHFWLRQDQGLVDSSOLHGWRDOOVHFWRUVDJDLQVWDQ\RQHSRVVHVVLQJ SHUVRQDOLQIRUPDWLRQWKLVODZKRZHYHUGDWHVIURPDQGLWVLQIRUPDWLRQ SURWHFWLRQDVSHFWVKDYH\HWWREHXSGDWHG 6HHEHORZWKHFRPSDUDWLYHFKDUWKLJKOLJKWLQJWKHVLPLODULWLHVDQGGLIIHUHQFHV DPRQJWKH8QLWHG6WDWHV,VUDHODQGWKH(XURSHDQ8QLRQ

8QLWHG6WDWHV ,VUDHO (XURSHDQ8QLRQ $OLEHUDOUHJXODWRU\ +\EULGEHWZHHQ $VWDWLVWUHJXODWRU\ UHJLPHUHOLDQFHRQ OLEHUDOLVPDQG UHJLPHFHQWUDOL]HG 7\SHRI PDUNHWIRUFHVDQG VWDWLVPFULWLFDO DQGELQGLQJ UHJXODWRU\ PRVWO\YROXQWDU\ LQIUDVWUXFWXUHVXQGHU UHJLPH VWDWHVXSHUYLVLRQWKH PDUNHWLVGULYHQE\ LWVRZQIRUFHV 2QO\LQFULWLFDO 2QO\LQFULWLFDO ,QFULWLFDOVHFWRUV 6WDWH VHFWRUVHQHUJ\ VHFWRUVHQHUJ\ and online service presence KHDOWKFDUHHOHFWULFLW\ KHDOWKFDUHHOHFWULFLW\ providers ZDWHUHWF ZDWHUHWF GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

92 8QLWHG6WDWHV ,VUDHO (XURSHDQ8QLRQ 3URJUHVVLYHVWUDWHJ\ 6ROHO\IRFXVRQWKH 3UHYHQWLRQ0LWLJDWLRQ 3UHYHQWLRQRI SUHYHQWLRQRIULVNV RIULVNV6WUDWHJ\RI F\EHUDWWDFNVDQG ,VUDHOKDVQROLPLWHG preventing attacks UHGLVWULEXWLRQRI OLDELOLW\ODZVZLWK DQGPLWLJDWLQJ Risk OLDELOLW\IRUULVNVLQ UHJDUGVWRF\EHU GDPDJHZLWKRXW PDQDJHPHQW civic sector VHFXULW\RURQH UHGLVWULEXWLRQRI strategies WKDWUHTXLUHVF\EHU OLDELOLW\IRUFRPSDQ\ GDPDJHPLWLJDWLRQIRU risks FRPSDQLHVDQGWKHLU

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | FXVWRPHUVLQFDVHRID GDWDEUHDFK ([LVWVDWWKHVWDWH 1RQH[LVWHQW ([LVWVLQDFRKHUHQW 7UDQVSDUHQF\ OHYHOLQDQRQ XQLIRUPPDQQHU towards XQLIRUPPDQQHU under Directives FRQVXPHUV states, each with a DSSURYHGLQWKDW during a data GLIIHUHQWYHUVLRQ ZLOOEHLPSOHPHQWHG EUHDFK E\ 3ULYDF\LVD 0RVWO\PDQDJHG 0DQDJHGE\WKHVWDWH FRPPRGLW\²PRVWO\ E\PDUNHWIRUFHV ZLWKELQGLQJODZV Cyber, Intelligence, and Security Security and Intelligence, Cyber, PDQDJHGE\PDUNHW ZLWKUHODWLYHO\VWULFW institutions with IRUFHVH[FHSWIRU UHTXLUHPHQWVQRW SRZHUDQGPRWLYDWHG VSHFL¿FVHFWRUV IXOO\HQIRUFHGE\ E\WKHLQWHUHVWRI &RQÀLFWZLWK KHDOWKUHFRUGV WKH,VUDHOL/DZ VDIHJXDUGLQJSULYDF\ the right to LQIRUPDWLRQDERXW ,QIRUPDWLRQDQG DVDKXPDQULJKW SULYDF\ PLQRUVHWF 7HFKQRORJ\$XWKRULW\ RYHUULGLQJHFRQRPLF LQWHUHVWV$WWKH PHPEHUVWDWHVOHYHO WKHULJKWWRSULYDF\LV ZHDNHUYLVjYLVORFDO intelligence agencies Figure 1: Comparison of Cyberspace Regulatory Regimes in Israel, the United States, and the European Union

7KHSURFHVVZKHUHE\F\EHUVSDFHUHJXODWLRQLVIRUPXODWHGLQ,VUDHOFRQVLVWV RIWZRPDMRUVWDJHVEXWWKH\WRRDVQRWHGODFNDQDWLRQDOVWUDWHJ\IRUDOO PDUNHWVHFWRUV 45 ,VUDHO¶VF\EHUVSDFHUHJLPHVWDUWHGLQZLWKWKHODZ UHJXODWLQJVHFXULW\LQSXEOLFLQVWLWXWLRQV7KHODZOLVWHGDOOWKHUHTXLUHPHQWV IRUSURWHFWLQJLQIRUPDWLRQV\VWHPVRILQVWLWXWLRQVGH¿QHGDV³FULWLFDO´WR WKHVWDWH7KHVHLQFOXGHGDHURVSDFHZDWHUHOHFWULFLW\DQGFRPPXQLFDWLRQV ERGLHV,QWKHVWDWHGHWHUPLQHGWKDWWKHSURIHVVLRQDOVXSHUYLVRUIRUWKHVH LQVWLWXWLRQVZRXOGEHWKH1DWLRQDO,QIRUPDWLRQ6HFXULW\$XWKRULW\ZKLFK LVVXERUGLQDWHWRWKH,VUDHO6HFXULW\$JHQF\ 6KLQ%HW   )XUWKHUPRUHWKH GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

93 VWDWHGHWHUPLQHGWKDWWKHLQVWLWXWLRQVUHFHLYLQJGLUHFWLYHVIURPWKH1DWLRQDO ,QIRUPDWLRQ6HFXULW\$XWKRULW\ZRXOGEHFDUHIXOO\VHOHFWHGE\DVSHFLDO VWHHULQJFRPPLWWHHLQSUDFWLFHWKHOLVWRIERGLHVVZHOOHGZLWKWKHSDVVDJH RIWLPH,QRWKHUZRUGVERGLHVGH¿QHGDVFULWLFDOWRWKHVWDWHEDVHGRQWKH LPSDFWRIWKHSRWHQWLDOGDPDJH IRUWKH*'3IRUH[DPSOH UHFHLYHGDVWDWH PDQGDWHGGLUHFWLYHZKHUHDVPDQ\RWKHUERGLHVZKLFKZHUHQRWGH¿QHGDV KDYLQJWKHSRWHQWLDOIRUJUHDWGDPDJHZHUHOHIWZLWKRXWJXLGHOLQHVWKXV OHDGLQJWRDVLWXDWLRQLQZKLFKWKHHFRQRPLFFRQVLGHUDWLRQVRIWKHPDUNHW

IRUFHVEHFDPHWKHPDMRUIDFWRULQWKHLUGHIHQVH,WVKRXOGEHQRWHGWKDWWKH 2017 January | 1 No. | 1 Volume | LQVWLWXWLRQVUHFHLYLQJGLUHFWLYHVLQFOXGHERWKSULYDWHDQGSXEOLFRQHV RLO UH¿QHULHV(O$OWKH,VUDHOL(OHFWULF&RUSRUDWLRQ,VUDHO5DLOZD\VDQGVRIRUWK  ,Q,VUDHOHQWHUHGWKHVHFRQGVWDJHRILWVGHYHORSPHQWRIF\EHUVSDFH UHJXODWLRQZKHQWKHJRYHUQPHQWFKDQJHGLWVDSSURDFKDQGVWDUWHGWRDGGUHVV WKHZRUNUHTXLUHGZLWKWKHSULYDWHVHFWRU7KH1DWLRQDO&\EHU%XUHDX 1&%  ZDVHVWDEOLVKHGXQGHUWKH3ULPH0LQLVWHU¶V2I¿FHDPRYHGHVLJQHGWRFUHDWH

EHWWHULQWHJUDWLRQZLWKPDUNHWDFWRUV/DWHULQWKH1DWLRQDO&\EHU Security and Intelligence, Cyber, $XWKRULW\ZDVIRXQGHGZLWKWKHREMHFWLYHWRZRUNGLUHFWO\ZLWKWKHFLYLF VHFWRUDQGVHUYHDVWKHH[HFXWLYHERG\IRUWKHVWDWH¶VF\EHUGHIHQVHHIIRUWV 7KH,VUDHOLUHJXODWRU\VWDWHLQF\EHUVSDFHFDQEHGHVFULEHGVFKHPDWLFDOO\ DVIROORZV

Figure 2: State regulation of cyberspace in Israel

7KHFKDUWDERYHSDUWLFXODUO\KLJKOLJKWVWZRDVSHFWV$VSUHYLRXVO\QRWHG WKHFLYLFVHFWRULVPRVWO\OHIWXQVXSHUYLVHG$OWKRXJKWKHUHDUHOLWWOHLVODQGV GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

94 RIVXSHUYLVLRQ²WKH¿QDQFLDOHQHUJ\DQGKHDOWKFDUHVHFWRUV²JXLGHGE\ GLUHFWLYHVIURPJRYHUQPHQWXQLWVWKHPVHOYHVVXEMHFWWRWKHJXLGHOLQHVRIWKH *RYHUQPHQW,QIRUPDWLRQDQG&RPPXQLFDWLRQ7HFKQRORJ\ ,&7 $XWKRULW\ %XWE\DQGODUJHWKHFLYLFVHFWRUHQJDJHVLQVHOIUHJXODWLRQODFNVLQIRUPDWLRQ VKDULQJDQGPLWLJDWHVGDWDEUHDFKHVWRLWVFXVWRPHUVDVLWVHHV¿W 2WKHUWKDQLWVVHOHFWLYHVXSHUYLVLRQRIGLIIHUHQWVHFWRUV,VUDHOUHFHQWO\ LVVXHGWZRVLJQL¿FDQWSROLF\JXLGHOLQHV7KH¿UVWGHVLJQHGWRHQKDQFH VXSHUYLVLRQDOUHDG\FDUULHGRXWE\WKH'HIHQVH([SRUWV6XSHUYLVLRQ'LYLVLRQ

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | DWWKH'HIHQVH0LQLVWU\H[SDQGHGWKHOLVWRISURGXFWVUHTXLULQJVWDWH VXSHUYLVLRQUHÀHFWLQJWKHVWDWH¶VGHVLUHWRVXSHUYLVHWKHF\EHUVSDFHDUPV UDFHDQGPDLQWDLQ,VUDHO¶VUHODWLYHDGYDQWDJH 47 The state has decided to KDOWWKLVSURFHVVDQGFRQWLQXHFRQVXOWLQJZLWKWKHF\EHULQGXVWU\DERXWWKH LVVXHDQGIRUQRZDGKHUHRQO\WRLQWHUQDWLRQDOVXSHUYLVRU\DUUDQJHPHQWV JLYHQWKHRSSRVLWLRQIURPWKHORFDOLQGXVWU\WKDWZDVFRQFHUQHGLWZRXOG QRWEHDEOHWRFRPSHWHZLWKLQGXVWULHVLQXQVXSHUYLVHGVWDWHV  The desire

Cyber, Intelligence, and Security Security and Intelligence, Cyber, WRPDLQWDLQ,VUDHO¶VVWDQGLQJLQWKHZRUOGDVDOHDGLQJF\EHUVSDFHH[SRUWHU relative to its population 49 UHVXOWHGLQWKHSUHVHUYDWLRQRIWKHVWDWXVTXRLQ WKHLVVXHRIVXSHUYLVLRQ7KLVLVLQVWUXFWLYHUHJDUGLQJWKHGHSWKRIWKHPXWXDO XQGHUVWDQGLQJDQGH[WHQVLYHFRRSHUDWLRQEHWZHHQWKHYDULRXVLQGXVWULHVDQG WKH'HIHQVH0LQLVWU\ 50 7KHPLQLVWU\OLVWHQHGWRWKHFRQFHUQVRIWKHLQGXVWU\ PDQDJHGWRJHWDWRHKROGDQGLVQRZSDUWRIWKHGHFLVLRQPDNLQJSURFHVV IRUHYHU\F\EHUVSDFHSURGXFWGHVLJQHGIRUDWWDFN 7KHREMHFWLYHRIWKHVHFRQGJXLGHOLQHLVWRQXUWXUHKXPDQFDSLWDODQGFUHDWH VWDQGDUGVIRUWKRVHGHIHQGLQJF\EHUVSDFH7KLVLVDQHQWU\UHJXODWLRQEDVHG RQRI¿FLDOUHFRPPHQGDWLRQLQZKLFKWKHVWDWHGHOLQHDWHVWKHSURIHVVLRQDO OHYHOUHTXLUHGRISHUVRQQHOLQDOOIRUPVRIF\EHUGHIHQVH 51 7KLVLVDVLJQL¿FDQW JXLGHOLQHZKLFKKDVQRWEHHQWULHGH[WHQVLYHO\HOVHZKHUHLQWKHZRUOG,W PD\RQWKHRQHKDQGUDLVHWKHSURIHVVLRQDOOHYHORQWKHVKRUWWHUPWKURXJK YDULRXVWUDLQLQJSURJUDPVWKDWFRXOGEHGHYHORSHGHVSHFLDOO\IRUUHJXODUL]DWLRQ \HWRQWKHRWKHUKDQGWKLVJXLGHOLQHFRXOGREYLDWHWKHVHOIWDXJKWPRGHOE\ ZKLFKPRVWH[SHUWVLQWKLVG\QDPLF¿HOGFXUUHQWO\DWWDLQWKHLUNQRZOHGJH 52

Cyberspace Regulation in the Civic Sector: Importance and Di%culties 'HVSLWHWKHZLGHUDQJHRIHIIRUWVGHVFULEHGKHUHLQWKHFLYLFVHFWRULQ ,VUDHOLVQRWVXEMHFWHGWRF\EHUVSDFHUHJXODWLRQDQGLWVVHFXULW\ODFNVVWDWH GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

95 VXSHUYLVLRQ 53 7KLVFKDOOHQJHWUDYHUVHVQDWLRQDOERUGHUVDVPDQLIHVWHGERWK LQWKH8QLWHG6WDWHVDQGWKH(XURSHDQ8QLRQ XQWLOWKHWZRPRVWUHFHQW (XURSHDQ8QLRQGLUHFWLYHVZKLFKIRUWKH¿UVWWLPHDOVRFRYHULQGXVWULHVLQ WKHFLYLFVHFWRU :KHQLWFRPHVWRWKHUHVLOLHQFHRIWKHVKDUHGF\EHUVSDFH LWLVGLI¿FXOWWRRYHUVWDWHWKHLPSRUWDQFHRIWKHFLYLFVHFWRU)LUVWWKHFLYLF VHFWRUUHSUHVHQWVWKHOLRQ¶VVKDUHRIWKHVSKHUH,WLVH[SRVHGWRPRVWRIWKH WKUHDWVDQGLVWUDGLWLRQDOO\WKHZHDNHVWOLQNWKURXJKZKLFKDWWDFNVEHJLQ DQGVSUHDGWRRWKHUVHFWRUV6HFRQGSULYDWHFRPSDQLHVUHJXODUO\SURYLGH

VHUYLFHVWRJRYHUQPHQWPLQLVWULHVDQGVHQVLWLYHVWDWHLQVWLWXWLRQVPDNLQJ 2017 January | 1 No. | 1 Volume | WKHLUUHVLOLHQFHLQF\EHUVSDFHDSULPDU\FRQFHUQ7KLUGGDPDJHWRWKH SULYDWHVHFWRULVGDPDJHWRWKHVWDELOLW\RIWKHHQWLUHHFRQRP\8QGHUFHUWDLQ FRQGLWLRQVWKLVFRXOGVLJQL¿FDQWO\KDUPWKHQDWLRQ¶VUHVLOLHQFH7KHSROLF\ RIH[SDQGHGSULYDWL]DWLRQKDVRQO\H[DFHUEDWHGWKHSUREOHPPDNLQJWKH SULYDWHVHFWRUWKHNH\SOD\HULQWKHVWDWH¶VUHJXODWRU\HIIRUWV)RXUWKWKH FLYLFVHFWRULVUHVSRQVLEOHIRUWHFKQRORJLFDOGHYHORSPHQWVXSRQZKLFK

PRUHVHQVLWLYHVHFWRUVUHO\WKXVGDPDJHWRLWFRXOGVHUYHDVDEDFNGRRUWR Security and Intelligence, Cyber, DWWDFNVRQVHQVLWLYHLQIRUPDWLRQ 54 7KLVLVHVSHFLDOO\WUXHIRUVWDUWXSVSRRULQ GHIHQVLYHUHVRXUFHVEXWWKDWVRPHWLPHVHQGXSGHYHORSLQJGHIHQVHSURGXFWV IRUJHQHUDOXVH 55 7KHSULYDWHVHFWRU¶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ÀH[LELOLW\WKH\HQMR\WRGD\)LQDOO\ WKHLGHDRIVWDWHLQWHUYHQWLRQLVLQFRQVLVWHQWZLWKWKHQHROLEHUDODSSURDFKWKDW KDVVSUHDGOLNHZLOG¿UHLQWZHQWLHWKFHQWXU\¶VFDSLWDOLVWVRFLHWLHV  where the UHJQDQWSDUDGLJPLVRQHRISULYDWL]DWLRQDQGGHUHJXODWLRQZKHUHE\WKHVWDWH LQWHUYHQHVRQO\PLQLPDOO\LIDWDOOLQWKHPDUNHWWRPD[LPL]HWKHEHQH¿WV DFFUXHGE\FRPPHUFLDOHQWLWLHV 59 GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

96 Concluding Insights $OWKRXJK,VUDHOLVGHYHORSLQJLWV1DWLRQDO&\EHU$XWKRULW\PDQ\HFRQRPLF sectors still lack guidelines and supervision that would ensure appropriate SURWHFWLRQ7KHUHLVQRURDGPDSWRHQVXUHWKHUHVLOLHQFHRIWKHFLYLFVHFWRU DQGWRVHUYHDVDPRGHOWREHDGRSWHGE\WKHGLIIHUHQWSOD\HUVLQWKHHFRQRP\ 6XFKDPRGHOZRXOGKDYHWRDGGUHVVVHYHUDONH\LVVXHV )LUVWWKHPRGHOZRXOGKDYHWRJHQHUDWHDVWUXFWXUHGSURFHVVWKDWZRXOG SURYLGHFLYLOLDQERGLHVZLWKWKHLQFHQWLYHWRDGRSWF\EHUVHFXULW\(QWU\ | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | UHJXODWLRQVXFKDVDORFDOJRYHUQPHQWEXVLQHVVOLFHQVLQJODZLVRQHZD\ EXWRWKHURSWLRQVDOVRPD\EHFRQVLGHUHG7KHVWDWHLVFXUUHQWO\ZRUNLQJRQD ³F\EHUODZ´WKDWDLPVWRFUHDWHDNLQGRIF\EHUVHFXULW\YHUL¿FDWLRQVHDOWKDW ZRXOGGH¿QHDXQLIRUPGHIHQVHVWDQGDUGQHFHVVDU\WRPDUNHWFRPSDQLHV  7KHQHHGIRUVXFKDVHFXULW\VHDOPLJKWLQFHQWLYL]HLQVWLWXWLRQVWRSURWHFW WKHPVHOYHVEHWWHU 6HFRQGLWLVQHFHVVDU\WRFRQVLGHUWKHYDULRXVOD\HUVRIWKHFLYLFVHFWRU

Cyber, Intelligence, and Security Security and Intelligence, Cyber, 7KHUHLVQRRQHVL]H¿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²ZLWKWKHEXLOWLQWHQVLRQRYHUVDIHJXDUGLQJWKHULJKWWRSULYDF\² PLJKWPDNHLWSRVVLEOHWRUHOLHYHWKHERWWOHQHFNRILQIRUPDWLRQVKDULQJDQG FUHDWHDPRUHHIIHFWLYHSURDFWLYHF\EHUVHFXULW\,QDGGLWLRQLWLVQHFHVVDU\ WRHQKDQFHWUDQVSDUHQF\RYHUGDWDEUHDFKHVE\UHTXLULQJDOOVHFWRUVWRQRWLI\ DQDWLRQDO&(57DQGVKDUHLQIRUPDWLRQZLWKWKHSXEOLF7KLVZLOOKHOS RWKHUVXQGHUVWDQGZKHUHFDXWLRQLVQHHGHGDQGWKHH[WHQWWRZKLFKVHQVLWLYH LQIRUPDWLRQLVDWULVN7KHVHFRXOGVHUYHDVLQFHQWLYHVIRUEHWWHUGHIHQVHDQG PRUHHIIHFWLYHGDPDJHPLWLJDWLRQ&RPPHUFLDOFRPSDQLHVWKDWZRUU\DERXW GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

97 KDYLQJWRSD\IRUGDPDJHPLWLJDWLRQE\ODZZLOOGHIHQGWKHPVHOYHVDKHDG RIWLPHDVEHVWWKH\FDQ 7RFRQFOXGHWKHQHHGIRUUHJXODWLQJF\EHUVSDFHLQWKHFLYLFVHFWRULV REYLRXVEXWWKHGLI¿FXOWLHVRIGHYHORSLQJVXFKUHJXODWLRQDUHQXPHURXVWKH\ UDQJHIURPWKHSUREOHPVDQGEDWWOHVEHWZHHQVWDWHLQVWLWXWLRQVWKHWHQVLRQV EHWZHHQFRPSHWLQJLQWHUHVWVWKHFRVWVLQYROYHGLQDGKHULQJWRUHJXODWLRQ DQGWKHDWWHPSWVWR¿QGWKHULJKWEDODQFHEHWZHHQWUDQVSDUHQF\DQGVHFUHF\ DVZHOODVEHWZHHQFHQWUDOL]DWLRQDQGGHFHQWUDOL]DWLRQ$WSUHVHQWHYHQ

WKRXJKF\EHUVSDFHLVHVVHQWLDOO\DFLYLFVSKHUH²PRVWRILWEHLQJEDVHG 2017 January | 1 No. | 1 Volume | RQFLYLOLDQLQIUDVWUXFWXUHVV\VWHPVDQGWHFKQRORJLHVRSHUDWHGE\FLYLOLDQ RUJDQL]DWLRQV²WKLVVHFWRUKDVQRW\HWEHHQUHJXODWHGDQGLQFRUSRUDWHGLQWR ,VUDHO¶VUHJXODWRU\UHJLPH7KHUHVSRQVLELOLW\IRUF\EHUVHFXULW\FXUUHQWO\ UHVWVRQWKHRUJDQL]DWLRQVDORQHHYHQWKRXJKWKHORQHRUJDQL]DWLRQODFNV WKHH[SHUWLVHDQGUHVRXUFHVWRFRQIURQWF\EHUWKUHDWVZLWKRXWFUHDWLQJDQ LQIUDVWUXFWXUHIRUFRRSHUDWLRQEHWZHHQWKHYDULRXVVHFWRUVLQWKHHFRQRP\

,VUDHOLVTXLWHDFWLYHLQWKHVWDWH¶VF\EHUVSDFHDVF\EHUXQLWVZHUHHVWDEOLVKHG Security and Intelligence, Cyber, LQWKH3ULPH0LQLVWHU¶V2I¿FHWKHGHFLVLRQWRHVWDEOLVKDF\EHUIRUFHZDV PDGHDQGYDULRXV5 'VHWWLQJVDQGQDWLRQDOUHVHDUFKFHQWHUVZHUHIRXQGHG 1RQHWKHOHVVLWLVLQFXPEHQWXSRQWKHVWDWHWRFRQWLQXHWRVWULYHWRVWUHQJWKHQ WKHGHIHQVHRIWKHUHOHYDQWFLYLFVHFWRUVXVLQJDUDQJHRIWRROVDQGFDSDELOLWLHV EHFDXVHGDPDJHWRWKHFLYLFVHFWRULVOLDEOHWRFDXVHIXQGDPHQWDOKDUPWR WKHHQWLUHQDWLRQ

Notes  7KHUHVLOLHQFHRIF\EHUVSDFHUHIHUVWRWKHVSKHUH¶VDELOLW\WRZLWKVWDQGSRVVLEOH DWWDFNVDLPHGDWVRIWZDUHDQGKDUGZDUHZHDNQHVVHVQRQVHFXUHSURWRFROVDQG XQDXWKRUL]HGLQIRUPDWLRQDFFHVV  7KHGHYHORSPHQWRIWKHVHSURWRFROVPHWWKHQHHGVDWWKHEHJLQQLQJRIWKH ZRUOGZLGHZHELQWKHV,QWKRVHGD\VLWZDVQHFHVVDU\WRDOORZFRQQHFWLYLW\ DPRQJMXVWDIHZGR]HQFRPSXWHUV$WWKHWLPHQRERG\SUHGLFWHGWKDWDZHE FRQVLVWLQJRIELOOLRQVRIXVHUVZRXOGEHXVLQJWKHVDPHSURWRFROV  =HURGD\ZHDNQHVVHVDUHKDUGZDUHRUVRIWZDUHZHDNQHVVHVJHQHUDOO\XQNQRZQ WRWKHPDQXIDFWXUHUWKDWKDYH\HWWREH¿[HG6RPHWLPHVWKH\DUHNQRZQ ZHDNQHVVHVIRUZKLFKSDWFKHVKDYHQRW\HWEHHQLVVXHGWRDOOUHOHYDQWV\VWHPV $ERXWWKLVÀRXULVKLQJPDUNHWVHH$QG\*UHHQEHUJ³1HZ'DUN:HE0DUNHWLV 6HOOLQJ=HUR'D\([SORLWVWR+DFNHUV´:LUHGFRP$SULOKWWSVZZZ ZLUHGFRPWKHUHDOGHDO]HURGD\H[SORLWV  ,QWHUQDOGRFXPHQWVRIDQ,WDOLDQFRPSDQ\+DFNLQJ7HDPUHFHQWO\ZHUH H[SRVHGVKRZLQJWKHFRPSDQ\WUDI¿FNHGLQZHDNQHVVHVDQGWKHGHYHORSPHQW GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

98 RIDWWDFNWRROV7KHGRFXPHQWVVKRZHGWKHFRPSDQ\¶VFRPPHUFLDOWLHVZLWK YDULRXVUHJLPHVDURXQGWKHZRUOG)RUPRUHRQWKHSKHQRPHQRQVHH1LFROH 3HUOURWK³*RYHUQPHQWV7XUQWR&RPPHUFLDO6S\ZDUHWR,QWLPLGDWH'LVVLGHQWV´ New York Times 0D\KWWSZZZQ\WLPHVFRP WHFKQRORJ\JRYHUQPHQWVWXUQWRFRPPHUFLDOVS\ZDUHWRLQWLPLGDWHGLVVLGHQWV KWPO"UHI WRSLFV BU   -DVRQDQG3HWHU³&\EHU6HFXULW\$FULWLFDOH[DPLQDWLRQRILQIRUPDWLRQVKDULQJ YHUVXVGDWDVHQVLWLYLW\LVVXHVIRURUJDQL]DWLRQVDWULVNRIF\EHUDWWDFN´ Journal of Business Continuity & Emergency Planning QR  ±  *DEL6LERQLDQG2IHU$VVDI Guidelines for a National Cyber Strategy , | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | 0HPRUDQGXP 7HO$YLY7KH,QVWLWXWHIRU1DWLRQDO6HFXULW\6WXGLHV  KWWSZZZLQVVRUJLOXSORDG,PDJHVV\VWHP)LOHV,1660HPRUDQGXP *XLGHOLQHVIRUD1DWLRQDO&\EHU6WUDWHJ\SGI  %UXFH6FKQHLHU³&UHGHQWLDO6WHDOLQJDVDQ$WWDFN9HFWRU´;FRQRP\FRP$SULO KWWSZZZ[FRQRP\FRPERVWRQFUHGHQWLDOVWHDOLQJDV DWWDFNYHFWRU  1DWH/RUG³7KH+LVWRU\RI'DWD%UHDFKHV´GLJLWLDOJXDUGLDQFRP6HSWHPEHU KWWSVGLJLWDOJXDUGLDQFRPEORJKLVWRU\GDWDEUHDFKHV 9 8OULFK%HFN Risikogesellschaft: auf dem Weg in eine andere Moderne )UDQNIXUW Cyber, Intelligence, and Security Security and Intelligence, Cyber, DP0DLQ6XKUNDPS 7KHERRNDSSHDUHGLQ(QJOLVKDV Risk Society: Towards a New Modernity /RQGRQ6DJH   'DYLG0RVV When All Else Fails: Government as the Ultimate Risk Manage &DPEULGJH +DUYDUG8QLYHUVLW\3UHVV   ,ELG  6HHWKHIXOOGHIHQVHFLUFOHLQ*DEL6LERQL³$Q,QWHJUDWHG6HFXULW\$SSURDFK7KH .H\WR&\EHU'HIHQVH´ Georgetown Journal of International Affair V0D\   7KLUGSDUW\ULVNVLQF\EHUVSDFHDUHWKHULVNVWRWKHSULYDF\RIFXVWRPHUVRI FRPPHUFLDOFRPSDQLHVGDPDJHGE\F\EHUDWWDFNVDQGE\WKHWKHIWRISHUVRQDO LQIRUPDWLRQ2QWKHRWKHUKDQGLQVXUDQFHFRPSDQLHVDUHOHVVWKDQWKULOOHG WRHQVXUH¿UVWSDUW\ULVNVEHFDXVHWKHUHLVDODFNRIDFWXDULDOGDWDWKDWZRXOG KHOSWKHPSULFHWKHLQVXUDQFHSUHPLXPVIRUF\EHUVSDFHULVNVRIWKHFRPSDQLHV WKHPVHOYHV LH¿UVWSDUW\ULVNV   'DYLG/HYL)DXU³5HJXODWLRQ&RQFHSWXDODQG+LVWRULFDO%DFNJURXQG´ 8QLYHUVLW\RI+DLIDQRGDWH  LQ+HEUHZ 6HHDOVR'DYLG/HYL)DXU ³7KH2G\VVH\RIWKH5HJXODWRU\6WDWH´ Jerusalem Papers in Regulation & Governance :RUNLQJ3DSHUQR 1RYHPEHU KWWSUHJXODWLRQKXMLDFLO SDSHUVMSSGI  ,ELG  ,ELG  $VWDWHWKDWPDLQO\UHJXODWHVIRUHI¿FLHQF\SXUSRVHVWKURXJKODZVUDWKHU WKDQLQYHVWPHQWVDQGVXEVLGLHV6HH*LDQGRPHQLFR0DMRQH³7KH5LVHRI7KH 5HJXODWRU\6WDWHLQ(XURSH´ West European Politic VQR  ± KWWSG[GRLRUJ . GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

99  ,QKLVHVVD\³5HJXODWLRQDQG5HJXODWRU\*RYHUQDQFH´/HYL)DXUH[SODLQVZK\ GHUHJXODWLRQREYLDWHVWKHIRUPDWLRQRIPRUHDJHQFLHVDQGWKHKLULQJRIPRUH EXUHDXFUDWVWRVXSHUYLVHSULYDWL]DWLRQSURFHVVHVDQGJXDUGWKHVWDWH¶VLQWHUHVWV ZKLOHLWDOVRDFFHOHUDWHVWKHSURFHVV6HH'DYLG/HYL)DXU³5HJXODWLRQDQG 5HJXODWRU\*RYHUQDQFH´ Jerusalem Papers in Regulation & Governance , :RUNLQJ3DSHUQR )HEUXDU\ KWWSOHYLIDXUZLNLKXMLDFLOLPDJHV5HJ SGI  ,ELG  6KXULN'U\VKSLW] ³5HJXODWLRQ:KDW:KHUHDQG:KHQ"$7KHRUHWLFDO DQG&RPSDUDWLYH3HUVSHFWLYH´LQ³:KR3ULYDWL]HG0\6WDWH"3ULYDWL]DWLRQ 5HJXODWLRQDQGWKH7KLUG6HFWRU7KHRU\DQG3UDFWLFH´ Parliament  2017 January | 1 No. | 1 Volume | -HUXVDOHP7KH,VUDHO'HPRFUDF\,QVWLWXWH  LQ+HEUHZ KWWSZZZLGL RUJLOSDUOLDPHQWV  6HHIRUH[DPSOH+DUROG'HPVHW]³:K\5HJXODWH8WLOLWLHV"´ Journal of Law and Economics   ±  )RUDQHPSLULFDOUHVHDUFKRQWKHDFWLRQVRILQWHUHVWJURXSVLQWKH8QLWHG6WDWHV VHH)UDQN5%DXPJDUWQHUDQG%HWK//HHFK³,QWHUHVW1LFKHVDQG3ROLF\ %DQGZDJRQV3DWWHUQVRI,QWHUHVW*URXS,QYROYHPHQWLQ1DWLRQDO3ROLWLFV´ Journal of Politics   ± Cyber, Intelligence, and Security Security and Intelligence, Cyber,  2QWKHZD\WKDWSROLF\QHWZRUNVWRSURWHFWSULYDF\LQ(XURSHFUHDWHGVWURQJHU LQVWLWXWLRQVZKLFKSDVVHGPRUHULJLGSULYDF\ODZVFRQWUDU\WRWKHVSLULWRI WKHWLPHVHH$EUDKDP/1HZPDQ³%XLOGLQJ7UDQVQDWLRQDO&LYLO/LEHUWLHV 7UDQVJRYHUQPHQWDO(QWUHSUHQHXUVDQGWKH(XURSHDQ'DWD3ULYDF\'LUHFWLYH´ International Organization QR  ±  2QWKHFRQVLVWHQF\RIWKHPRGHUQZHOIDUHVWDWHVHH3DXO3LHUVRQHG The New Politics of the Welfare State  2[IRUG3ROLW\3UHVV   2QVKDWWHULQJWKH.H\QHVLDQSDUDGLJPDQGWUDQVLWLRQLQJWRDPRQHWDU\HFRQRP\LQ WKH8QLWHG.LQJGRPVHH3HWHU+DOO³3ROLF\3DUDGLJPV6RFLDO/HDUQLQJDQGWKH 6WDWH7KH&DVHRI(FRQRPLF3ROLF\PDNLQJLQ%ULWDLQ´ Comparative Politics 25, QR   ±  -RKQ.LQJGRQ¶VVWXG\FRLQHGSKUDVHVVXFKDV³ZLQGRZRIRSSRUWXQLW\´DQG ³SROLF\HQWUHSUHQHXU´ZKLFKH[SODLQ²ZLWKDVWRQLVKLQJDFFXUDF\²SXEOLFSROLF\ SURFHGXUHV6HH-RKQ:.LQJGRQ Agendas, Alternatives, and Public Policy , 2nd HGLWLRQ %RVWRQ/LWWOH%URZQ   'DQLHO%pODQGDQG5REHUW+HQU\&R[HGV Ideas and Politics in Social Science Research  2[IRUG2[IRUG8QLYHUVLW\3UHVV   :KLOHWKH(XURSHDQ8QLRQGLIIHUVIURPWKHFODVVLFDOVWDWHLQVWLWXWLRQLWLVVWLOOD VHPLQDOREMHFWIRUFRPSDUDWLYHUHVHDUFKLQWKH¿HOG'HFLVLRQVDWWKH(8OHYHOOHG WRDULJLGLQIRUPDWLRQVHFXULW\SROLF\WKURXJKWKH(XURSHDQ8QLRQ VHH1HZPDQ DQGEHORZ DQGWKHGLUHFWLYHVIRUPXODWHGDWWKH(8OHYHOOHGWKHZD\IRU WKHLQGLYLGXDOVWDWHV7KLVLVYDOLGQRWRQO\IRUWKHZRUOGRIF\EHUVSDFHEXWDOVR FDQDOVREHREVHUYHGLQFRQWH[WVRIIRRGVDIHW\UHJXODWLRQDQGWKHLQWURGXFWLRQRI JHQHWLFDOO\HQJLQHHUHGIRRGWKURXJKRXWWKHFRQWLQHQW)RUWKHLPSRUWDQFHRI(8 UHJXODWLRQVHH'DYLG%DFKDQG$EUDKDP/1HZPDQ³7KH(XURSHDQ5HJXODWRU\ GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

100 6WDWHDQG*OREDO3XEOLF3ROLF\´ Journal of European Public Policy QR  ±  $PLWDL(W]LRQL³7KH3ULYDWH6HFWRU$5HOXFWDQW3DUWQHULQ&\EHU6HFXULW\´ Georgetown Journal of International Affairs ,QWHUQDWLRQDO(QJDJHPHQWRQ&\EHU ,9  ±  )RUWKHZD\VLQZKLFKKDFNHUVVKDUHLQIRUPDWLRQLQWKHGDUNQHWVHHWKHLQWHUYLHZ ZLWK6WXDUW0DGQLFNIURP0,7LQ/LQGD7XFFL³6WXDUW0DGQLFN'DUN:HE KDFNHUVWUXPSJRRGJX\VLQVKDULQJLQIRUPDWLRQ´WHFKWDUJHWFRP$SULO KWWSVHDUFKFLRWHFKWDUJHWFRPQHZV6WXDUW0DGQLFN'DUN:HE KDFNHUVWUXPSJRRGJX\VLQVKDULQJLQIRUPDWLRQ | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume |  ,QFUHDVHGJRYHUQPHQWLQWHUYHQWLRQDQGFHQWUDOL]DWLRQ  6HHWKHWKRXJKWSURYRNLQJSKLORVRSKLFDOGHEDWHRYHUWKHWHUPV³]HURVXPJDPH´ DQG³QHFHVVDU\EDODQFH´EHWZHHQVHFXULW\DQGLQGLYLGXDOOLEHUW\LQ-HUHP\ :DOGURQ³6HFXULW\DQG/LEHUW\7KH,PDJHRI%DODQFH´ Journal of Political Philosophy QR  ±  7KHVHPHWKRGVWRFRQIURQWWKHULVNVFRPHXSLQWKHH[DPLQDWLRQRIKRZUHJXODWLRQ KDVEHHQSXWLQSODFHRYHUWKH\HDUVLQWKH8QLWHG6WDWHV DWWKHIHGHUDODQGVWDWH OHYHOV DQGLQWKH(XURSHDQ8QLRQ DWWKH(8OHYHODQGLQGLYLGXDOVWDWHOHYHOV   )RUH[DPSOH86FRXUWVUHFHQWO\JDYHWKH)HGHUDO7UDGH&RPPLVVLRQWKHDXWKRULW\ Cyber, Intelligence, and Security Security and Intelligence, Cyber, WRHQIRUFHLQIRUPDWLRQSURWHFWLRQODZVLQWKHSULYDWHVHFWRU)RUPRUHLQIRUPDWLRQ VHH%UHQW.HQGHO³$SSHDOV&RXUW$I¿UPV)7&$XWKRULW\2YHU&RUSRUDWH 'DWD6HFXULW\3UDFWLFHV´ Wall Street Journal $XJXVWKWWSZZZZVM FRPDUWLFOHVDSSHDOVFRXUWDI¿UPVIWFDXWKRULW\RYHUFRUSRUDWHGDWDVHFXULW\ SUDFWLFHV  7KHDEEUHYLDWLRQVWDQGVIRU&\EHU(PHUJHQF\5HDGLQHVV7HDPDUHJXODWRU\ DJHQF\QRZLQH[LVWHQFHLQYLUWXDOO\HYHU\VWDWH,WFROOHFWVGDWDRQDOO F\EHUEUHDFKHVUHTXLULQJQRWL¿FDWLRQDQGLQWHJUDWHVUHVSRQVHVWRVLJQL¿FDQWHYHQWV KDSSHQLQJLQF\EHUVSDFH  *DEL6LERQL0D\  )RUH[DPSOHJXLGHOLQHVLVVXHGE\WKH,QIRUPDWLRQ6HFXULW\$XWKRULW\LQ,VUDHO DERXWWKHZD\WRVHFXUHRUJDQL]DWLRQDOQHWZRUNV  )RUDQH[SODQDWLRQRI,62VWDQGDUGVDWWKHRI¿FLDOZHEVLWHVHH KWWSZZZLVRVHFXULW\FRPKWPOKWPO  )RUDQH[SODQDWLRQRI3&,VWDQGDUGVDWWKHRI¿FLDOZHEVLWHVHHKWWSVZZZ SFLVHFXULW\VWDQGDUGVRUJ  6HHIRUH[DPSOHWKHVWDQGDUGVWKHRUJDQL]DWLRQLVVXHGKWWSFVUFQLVWJRY SXEOLFDWLRQVQLVWSXEV63SGI  )RUH[DPSOHWKHODWHVW),15$UHSRUWLVVXHGRQWKHWRSLFKWWSVZZZ¿QUDRUJ VLWHVGHIDXOW¿OHVS5HSRUWRQ&\EHUVHFXULW\3UDFWLFHVB SGI  5LFKDUG-+DUNQHWWDQG-DPHV$6WHYHU³7KH1HZ3ROLF\:RUOGRI &\EHUVHFXULW\´ Public Administration Review   ±  )RUGHWDLOVVHH1DWLRQDO&RQIHUHQFHRI6WDWH/HJLVODWRUV 1&6/ 6HFXULW\ %UHDFK1RWL¿FDWLRQ/DZV$SULOKWWSZZZQFVORUJUHVHDUFK GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

101 WHOHFRPPXQLFDWLRQVDQGLQIRUPDWLRQWHFKQRORJ\VHFXULW\EUHDFKQRWL¿FDWLRQ ODZVDVS[  )RUGHWDLOVRQWKHHIIHFWRI(XURSHDQUHJXODWLRQRQWKHVHFXULW\OHYHORI FRPPHUFLDOFRPSDQLHVVHH$VKIRUG:DUZLFN³%UHDFK1RWL¿FDWLRQWKH%LJJHVW ,PSDFWRI(8'DWDODZ2YHUKDXO6D\V/DZ)LUP´FRPSXWHUZHHNO\FRP 1RYHPEHUKWWSZZZFRPSXWHUZHHNO\FRPQHZV%UHDFK QRWL¿FDWLRQWKHELJJHVWLPSDFWRI(8GDWDODZRYHUKDXOVD\VODZ¿UP  6LERQLDQG$VVDI Guidelines for a National Cyber Strategy   ,QWKH1DWLRQDO&\EHU'HIHQVH$XWKRULW\ZDVHVWDEOLVKHGDVVXPLQJ UHVSRQVLELOLW\RIPRVWRI,VUDHO VFULWLFDOLQIUDVWUXFWXUH  7KHH[SDQVLRQDSSOLHVSULPDULO\WRSHQHWUDWLRQSURGXFWVKDFNLQJDQDO\VLVDQG 2017 January | 1 No. | 1 Volume | NQRZOHGJHRIVRIWZDUHDQGKDUGZDUHZHDNQHVVHV  )RUPRUHLQIRUPDWLRQVHHDUWLFOHE\JXHVWZULWHU³:KDW/D\%HKLQGWKH 5HSHDORIWKH1HZ&\EHU,QMXQFWLRQ´ Geektime $SULO LQ+HEUHZ  KWWSZZZJHHNWLPHFRLOWKHGHFOLQHRIWKHLVUDHOLF\EHUODZ  )RUWKHFKDQJHLQWKHVRXWKHUQFLW\RI%HHU6KHEDZKLFKWKHVWDWHGHFLGHG WRUHFUHDWHDVWKHUHJLRQ¶VF\EHUVSDFHH[SRUWFDSLWDOVHH$VKIRUG:DUZLFN ³,VUDHO¶VF\EHUVHFXULW\IURQWLHU´FRPSXWHUZHHNO\FRP0D\ KWWSZZZFRPSXWHUZHHNO\FRPRSLQLRQ,VUDHOVF\EHUVHFXULW\IURQWLHU Cyber, Intelligence, and Security Security and Intelligence, Cyber,  6HH:H[PDQDQG+LQGLQ³+RZ'RHV,VUDHO5HJXODWH(QFU\SWLRQ"´ODZIDUHEORJ FRP1RYHPEHUKWWSVZZZODZIDUHEORJFRPKRZGRHVLVUDHO UHJXODWHHQFU\SWLRQ  )RUWKHRI¿FLDOUHJXODUL]DWLRQGRFXPHQWVHH3ULPH0LQLVWHU¶V2I¿FH1DWLRQDO &\EHU6WDII³3URIHVVLRQ5HJXODWLRQ3ROLF\IRU&\EHUGHIHQVHLQ,VUDHO´'HFHPEHU  LQ+HEUHZ KWWSZZZSPRJRYLO6LWH&ROOHFWLRQ'RFXPHQWVF\EHU KDJDQDSGI  6HHUHSRUWRQWKHVXEMHFW1DWLRQDO$FDGHP\RI6FLHQFH³3URIHVVLRQDOL]LQJWKH 1DWLRQ¶V&\EHUVHFXULW\:RUNIRUFH´ 2013KWWSZZZQDSHGXFDWDORJ SURIHVVLRQDOL]LQJWKHQDWLRQVF\EHUVHFXULW\ZRUNIRUFHFULWHULDIRUGHFLVLRQ PDNLQJ  7KLVLVZLWKWKHH[FHSWLRQRIVSHFL¿FHQWLWLHVVXFKDVWKHEDQNVDQGWKHSULYDF\ ODZZKLFKDSSOLHVWRWKHHQWLUHHFRQRP\DOWKRXJKLWLVQRWVXI¿FLHQWO\XSWR GDWHLQWHUPVRIDOODVSHFWVRILQIRUPDWLRQVHFXULW\)RUDVXUYH\RIWKHVLWXDWLRQ VHH5DSKDHO.DKDQ³1HWDQ\DKXPDUNHWV,VUDHOLF\EHUEXWOHJLVODWLRQLVIXOORI KROHV´ Calcalist -XQH LQ+HEUHZ KWWSZZZFDOFDOLVWFRLOLQWHUQHW DUWLFOHV/KWPO  )RUDPRUHLQGHSWKVXUYH\RIVRPHRIWKHVHUHDVRQVVHH$PLWDL(W]LRQL³7KH 3ULYDWH6HFWRU$5HOXFWDQW3DUWQHULQ&\EHU6HFXULW\´ Georgetown Journal of International Affairs, ,QWHUQDWLRQDO(QJDJHPHQWRQ&\EHU,9  ±  *DEL6LERQLDQG'DYLG,VUDHO³&\EHUVSDFH(VSLRQDJHDQG,WV(IIHFWRQ &RPPHUFLDO&RQVLGHUDWLRQV´ Military and Strategic Affairs QR 'HFHPEHU  ±KWWSZZZLQVVRUJLOXSORDG,PDJHVV\VWHP)LOHV,1660$6$ )XOO (1* SGI  (W]LRQL³7KH3ULYDWH6HFWRU$5HOXFWDQW3DUWQHULQ&\EHU6HFXULW\´ GABI SIBONI AND IDO SIVAN$SEVILLA | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

102  ,ELG  )RUDVXUYH\RIWKHQHROLEHUDOWUHQGLQFDSLWDOLVWVRFLHWLHVVHH-RKQ'U\]HN Democracy in Capitalist Times: Ideas, Limits, and Struggles  2[IRUG8QLYHUVLW\ 3UHVV   'RHVSULYDWL]DWLRQUHDOO\OHDGWRGHUHJXODWLRQ")RUDFKDOOHQJHWRWKHMXVWL¿FDWLRQV IRUSULYDWL]DWLRQVHH

Nadine Wirkuttis and Hadas Klein

Cybersecurity arguably is the discipline that could benefit most from the introduction of artificial intelligence (AI). Where conventional security systems might be slow and insufficient, artificial intelligence techniques can improve their overall security performance and provide better protection from an increasing number of sophisticated cyber threats. Beside the great opportunities attributed to AI within cybersecurity, its use has justified risks and concerns. To further increase the maturity of cybersecurity, a holistic view of organizations’ cyber environment is required in which AI is combined with human insight, since neither people nor AI alone has proven overall success in this sphere. Thus, socially responsible use of AI techniques will be essential to further mitigate related risks and concerns.

Keywords: cybersecurity, artificial intelligence (AI), security intelligence, Integrated Security Approach (ISA), cyber kill chain

Introduction 6LQFHZKHQWKH¿UVWGHQLDORIVHUYLFH 'R6 DWWDFNZDVODXQFKHG 1 WKHVRSKLVWLFDWLRQQXPEHUDQGLPSDFWRIF\EHUDWWDFNVKDYHLQFUHDVHG VLJQL¿FDQWO\$VF\EHUDWWDFNVKDYHEHFRPHPRUHWDUJHWHGDQGSRZHUIXOVR KDYHF\EHUVHFXULW\FRXQWHUPHDVXUHV:KLOHWKH¿UVWVHFXULW\WRROZDVOLPLWHG WRVSRWWLQJVLJQDWXUHVRIYLUXVHVDQGSUHYHQWLQJWKHLUH[HFXWLRQWRGD\ZH¿QG solutions that are designed to provide holistic protection against a wide range

Nadine Wirkuttis is a PhD candidate at the Okinawa Institute of Science and Technology Graduate University and former research intern in the Cyber Security Program at the Institute for National Security Studies . Hadas Klein is the Cyber Security Program Manager at the Institute for National Security Studies.

Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017 103 NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

104 RIDWWDFNW\SHVDQGDYDULHW\RIWDUJHWV\VWHPVQHYHUWKHOHVVLWKDVEHFRPH LQFUHDVLQJO\FKDOOHQJLQJWRSURWHFWLQIRUPDWLRQDVVHWVLQWKHYLUWXDOZRUOG 7RLPSOHPHQWUHVLOLHQWDQGFRQWLQXRXVSURWHFWLRQVHFXULW\V\VWHPVQHHG WRFRQVWDQWO\DGMXVWWRFKDQJLQJHQYLURQPHQWVWKUHDWVDQGDFWRUVLQYROYHG LQWKHF\EHUSOD\&\EHUUHDOLW\KRZHYHUDSSHDUVVRPHZKDWGLIIHUHQW 6HFXULW\DSSURDFKHVDUHUHJXODUO\WDLORUHGWRNQRZQDWWDFNVDQGGXHWRD ODFNRIÀH[LELOLW\DQGUREXVWQHVVVHFXULW\V\VWHPVW\SLFDOO\DUHXQDEOHWR DGDSWDXWRPDWLFDOO\WRFKDQJHVLQWKHLUVXUURXQGLQJV(YHQZLWKKXPDQ

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | LQWHUDFWLRQDGDSWLRQSURFHVVHVDUHOLNHO\WREHVORZDQGLQVXI¿FLHQW 2 'XHWRWKHLUÀH[LEOHDQGDGDSWDEOHV\VWHPEHKDYLRUDUWL¿FLDOLQWHOOLJHQFH $, WHFKQLTXHVFDQKHOSRYHUFRPHYDULRXVVKRUWFRPLQJVRIWRGD\¶V F\EHUVHFXULW\WRROV 3$OWKRXJK$,KDVDOUHDG\JUHDWO\LPSURYHGF\EHUVHFXULW\ 4 WKHUHDUHDOVRVHULRXVFRQFHUQV6RPHYLHZ$,DVDQHPHUJLQJH[LVWHQWLDOULVN IRUKXPDQLW\ 5$FFRUGLQJO\VFLHQWLVWVDQGOHJDOH[SHUWVKDYHH[SUHVVHGDODUP DWWKHLQFUHDVLQJUROHWKDWDXWRQRPRXV$,HQWLWLHVDUHSOD\LQJLQF\EHUVSDFH  Cyber, Intelligence, and Security Security and Intelligence, Cyber, DQGKDYHUDLVHGFRQFHUQVDERXWWKHLUHWKLFDOMXVWL¿DELOLW\ 7KHSXUSRVHRIWKLVZRUNLVWRKLJKOLJKWWKHVKRUWFRPLQJVRIWUDGLWLRQDO VHFXULW\PHDVXUHVDVZHOODVWKHSURJUHVVWKDWKDVEHHQPDGHVRIDUE\ DSSO\LQJ$,WHFKQLTXHVWRF\EHUVHFXULW\,QDGGLWLRQWKLVZRUNVXPPDUL]HV WKHULVNVDQGFRQFHUQVOLQNHGWRWKLVGHYHORSPHQWE\H[SORULQJ$,¶VVWDWXV TXRDGGUHVVLQJSUHVHQWFRQFHUQVDQGRXWOLQLQJGLUHFWLRQVIRUWKHIXWXUH

Challenges of Today’s Cybersecurity $OWKRXJKDZDUHQHVVRIF\EHUWKUHDWVKDVLQFUHDVHGODUJHDPRXQWVRIPRQH\ KDVEHHQLQYHVWHGDQGHIIRUWVDUHEHLQJPDGHWR¿JKWF\EHUFULPHVWKHDELOLW\ RIRUJDQL]DWLRQVWRVXI¿FLHQWO\SURWHFWWKHLURZQYLUWXDODVVHWVLVQRW\HW NQRZQ 77KHLQYROYHGSDUWLHVLQF\EHUVSDFHUDQJHIURPVLQJOHLQGLYLGXDOV SULYDWHRUJDQL]DWLRQVQRQVWDWHDFWRUVWRJRYHUQPHQWDORUJDQL]DWLRQVDOO DLPLQJWRSURWHFWWKHLUF\EHUDVVHWVDWWDFNWKRVHRIRWKHUVRUERWK,QDGGLWLRQ WKHVRXUFHVRIF\EHUWKUHDWVDUHPDQLIROGF\EHUWKUHDWVEDVLFDOO\DULVHIURP SRWHQWLDOPDOLFLRXVDFWVGXHWR¿QDQFLDOSROLWLFDORUPLOLWDU\UHDVRQV  +RZHYHUKHWHURJHQHRXVDQGG\QDPLFWKHQDWXUHRIF\EHUVSDFHPLJKWEH FHUWDLQVLPLODULWLHVRIDWWDFNVDQGWKHLUFRXQWHUPHDVXUHVFDQEHXVHGWRGHVFULEH DQGDOORZIRUDKROLVWLFVHFXULW\IUDPHZRUN0RVWF\EHUDWWDFNVIROORZFHUWDLQ DWWDFNSKDVHVWKDWFDQEHGHVFULEHGDVD F\EHUNLOOFKDLQ 97KLVIUDPHZRUN DVVXPHVWKDWHYHU\DWWDFNVHTXHQFHVWDUWVZLWKD UHFRQQDLVVDQFH phase , in NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

105 ZKLFKDQDWWDFNHUWULHVWRORFDWHJDSVDQGYXOQHUDELOLWLHVRIDWDUJHWV\VWHP The ZHDSRQL]LQJ SKDVHIROORZVGXULQJZKLFKWKHXQFRYHUHGZHDNQHVVHV DUHXVHGWRGHYHORSWDUJHWHGPDOLFLRXVFRGH7KLVLVIROORZHGE\WKH GHOLYHU\ phase when WKHPDOZDUHLVWUDQVIHUUHGWRWKHSRWHQWLDOWDUJHW$IWHUWKH PDOZDUHLVGHOLYHUHGVXFFHVVIXOO\WKH H[SORLW phase occurs during which WKHPDOZDUHWULJJHUVWKHLQVWDOODWLRQRIDQLQWUXGHU¶VFRGH$IWHUZDUGVWKH FRPSURPLVHGKRVWV\VWHPDOORZVWKHHVWDEOLVKPHQWRIDFRPPDQGDQGFRQWURO FKDQQHOVRWKDWWKHDWWDFNHUFDQLQLWLDWHPDOLFLRXVDFWLRQV&RXQWHUDFWLRQV

FDQEHGHWHUPLQHGGHSHQGLQJXSRQZKHUHDPDOLFLRXVDFWLRQDSSHDUVLQWKH 2017 January | 1 No. | 1 Volume | F\EHUNLOOFKDLQ The LQWHJUDWHGVHFXULW\DSSURDFK 10  ,6$ SURYLGHVNH\LGHDVIRUDKROLVWLF YLHZRQF\EHUGHIHQVHDQGDIUDPHZRUNIRUVXFKFDWHJRUL]DWLRQ7KHPDLQ DLPRIWKH,6$LVWRJHQHUDWH HDUO\ZDUQLQJV RUDODUPVSUHIHUDEO\EHIRUH WKHDWWDFNLVODXQFKHG EHIRUHWKHH[SORLWSKDVH )7KHDODUPLVVXSSRVHGWR JHQHUDWHDUHOHYDQWZDUQLQJPHVVDJHWKDWWUDQVODWHVQHZO\JDWKHUHGWKUHDW

GDWDLQWRDFWLRQDEOHWDVNV%\WKLVPHDQVWKHPHVVDJHIXUWKHUVXSSRUWVWKH Security and Intelligence, Cyber, VHOHFWLRQRIFRXQWHUPHDVXUHVRUDOUHDG\FRQWDLQVGHGLFDWHGFRXQWHUDFWLRQV WRSUHYHQWRUJDQL]DWLRQVIURPEHLQJYLFWLPVRIDQDWWDFN,IDQLQWUXVLRQ FDQQRWEHSUHYHQWHGLQDGYDQFHWKHH[WHQWRIWKHDWWDFNPXVWEHGHWHFWHG IROORZHGUHVSHFWLYHO\E\UHDFWLRQDQGUHVSRQVH7KHVHPHDVXUHVVKRXOG LQFOXGHDFWLRQVWRVWRSRUFRXQWHUDWWDFNWKHLQYDGHULQDGGLWLRQWRGH¿QLQJ UHFRYHU\SURFHGXUHVWRTXLFNO\UROOEDFNWKHV\VWHPWRLWVLQLWLDOVWDWH

FigureFigure 1. Cyber 1: Cyber kill chain kill phases chain encapsulated phases in encapsulated countermeasures of in the countermeasures integrated security approach of the integrated security approach

)LJXUHDERYHGHSLFWVWKHLQWHUFRQQHFWLRQRIF\EHUDWWDFNVGHVFULEHGE\ WKHF\EHUNLOOFKDLQZLWKWKHLUFRXQWHUPHDVXUHVFRYHUHGE\WKH,6$7KH GLDJUDPGHSLFWVWKHF\EHUNLOOFKDLQKHUHYLVXDOL]HGDVWKHJUD\DUURZLQ WKHFHQWHUHQFDSVXODWHGE\WKH,6$7KHF\EHUNLOOFKDLQLQFOXGHVWKHVHYHQ NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

106 SKDVHVRIDF\EHUDWWDFNZKHUHDVWKH,6$FRQVLVWVRIIRXUFRXQWHUDFWLRQ SKDVHV)RUGHWHFWLQJDQGEORFNLQJDWWDFNVDVHDUO\DVSRVVLEOHDOODWWDFN SKDVHVRIWKHF\EHUNLOOFKDLQQHHGWREHFRQVLGHUHGZLWKLQWKHFRPSUHKHQVLYH ,6$IUDPHZRUN 11 $VVWDWHGDERYHWKHHPSKDVLVLVRQSUHYHQWLQJDWWDFNDQG GHWHFWLQJPDOLFLRXVDFWLYLWLHVGXULQJWKH¿UVWWKUHHSKDVHVRIDQLQWUXVLRQKHUH YLVXDOL]HGDVUHFRQZHDSRQL]HDQGGHOLYHURQWKHOHIWVLGHRIWKHGLDJUDP ZLWKLQWKHJUD\DUURZ$IWHUWKHDWWDFN²GHSLFWHGDVH[SORLWLQWKHFHQWHURI WKHDUURZ²WKH,6$PHDVXUHVGHWHFWLRQUHDFWLRQDQGUHVSRQVHQHFHVVDU\

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | WRLQWHUIHUHZLWKWKHFRPSURPLVLQJPDOLFLRXVDFWLYLWLHV 7KHFRPSOH[DQGG\QDPLFQDWXUHRIF\EHUVSDFHOHDGVWRYDULRXVVWUDWHJLF DQGWHFKQRORJLFDOFKDOOHQJHVWKDWKLQGHUDQGFRPSOLFDWHDQRUJDQL]DWLRQ¶V DELOLW\WRSURWHFWLWVHOIVXI¿FLHQWO\LQWKLVYLUWXDOHQYLURQPHQW7KHVH FKDOOHQJHVFRPSULVHGDWDDFTXLVLWLRQWHFKQRORJ\GULYHQPDWWHUVDVZHOODV VKRUWFRPLQJVLQUHJXODWLRQDQGSURFHVVPDQDJHPHQW

Challenges in Gathering Cyber Intelligence Cyber, Intelligence, and Security Security and Intelligence, Cyber, 7KHIDFWWKDWSHUSHWUDWRUVOHDYHWUDFNVZKHQDWWHPSWLQJWRDWWDFNDSRWHQWLDO WDUJHWV\VWHPLVWKHNH\WREHWWHUXQGHUVWDQGLQJDQDWWDFNHU&RQVHTXHQWO\ DQ,6$ZLWKLWVKROLVWLFYLHZRIDQRUJDQL]DWLRQ¶VVHFXULW\UHTXLUHVJDWKHULQJ DQGDQDO\VLVRIDUDQJHRILQIRUPDWLRQIRUJDLQLQJF\EHULQWHOOLJHQFH 12 There are challenges, however, in acquiring relevant data as well as in processing, DQDO\]LQJDQGXVLQJLW7KHUHIRUHUHODWHGHIIRUWVWRHIIHFWLYHO\SUHYHQW GHWHFWDQGUHVSRQGWRPDOLFLRXVLQWUXVLRQVDUHUHJXODUO\DLGHGE\VHFXULW\ WRROVWKDWDLPWRDXWRPDWHVXSSRUWLQJVHFXULW\SURFHVVHV7KHPDLQ FKDOOHQJHV LQDFTXLULQJUHOHYDQWGDWDWUDFNV are: 13 D $PRXQWRIGDWD7KHDPRXQWRIGDWDKDVLQFUHDVHGH[SRQHQWLDOO\VLQFH HOHFWURQLFGHYLFHVDQGWKHLUXVHKDVEHFRPHXELTXLWRXVLQRXUZRUNDQG GDLO\OLYHV)RUWKHLPSOHPHQWDWLRQRIDQ,6$GDWDIURPDOOV\VWHPV DFURVVHQWLUHRUJDQL]DWLRQVPD\QHHGWREHFRQVLGHUHG E +HWHURJHQHLW\RIGDWDDQGWKHLUVRXUFHV7KHYDULDQFHLQGDWDDQGLWV VRXUFHVPDNHVLWGLI¿FXOWWRLGHQWLI\DQGFROOHFWWKRVHGDWDPRUHRYHU ERWKDUHVSUHDGDFURVVRUJDQL]DWLRQDODQGQDWLRQDOERUGHUV(YHQLI WKHUHOHYDQWKHWHURJHQHLW\ZLWKLQWKHF\EHUHQYLURQPHQWLVLGHQWL¿HG WRSRORJ\DQGEHKDYLRURIV\VWHPVDQGQHWZRUNVPD\FKDQJHDQGWKXV UHTXLUHFRQVWDQWDGDSWLRQ NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

107 F +LJKGDWDYHORFLW\ The high rate at which data is produced and processed within its sources leads to challenges in data storing and processing, ZKLFKLQWXUQLVHVVHQWLDOIRUVXEVHTXHQWDQDO\VLV :KHQLWFRPHVWRSURFHVVLQJDQDO\]LQJDQGXVLQJWKHDFTXLUHGGDWH LQWUXVLRQ GHWHFWLRQSUHYHQWLRQV\VWHPV  ,'36 KDYHSURYHGWREHDQLQYDOXDEOH WRROIRUF\EHUVHFXULW\ 14 RQHRIPDQ\LQWRGD\¶VF\EHUVHFXULW\DUVHQDO$Q ,'36LVHLWKHUVRIWZDUHRUKDUGZDUHFRQ¿JXUHGWRSURWHFWVLQJOHV\VWHPV RUHQWLUHQHWZRUNV7KHUHDUHWZRPDLQSULQFLSOHVIRU,'36VWKH PLVXVH | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | GHWHFWLRQ DSSURDFKZKLFKLGHQWL¿HVPDOLFLRXVDFWLYLWLHVE\GH¿QLQJSDWWHUQV RIDEQRUPDOQHWZRUNDQGRUV\VWHPEHKDYLRUDQGWKH DQRPDO\GHWHFWLRQ DSSURDFKZKLFKLVEDVHGRQGH¿QLQJSDWWHUQVRIQRUPDOQHWZRUNDQGRU V\VWHPEHKDYLRU6HFXULW\H[SHUWVGH¿QHERWKSDWWHUQVPDLQO\EDVHGRQ WKHLUH[SHULHQFHVSOXVWKHLUSULRUNQRZOHGJHRIF\EHUWKUHDWV 15 &\EHUUHDOLW\KRZHYHULVDKLJKO\FRPSOH[DQGG\QDPLFQDWXUHQHZ WKUHDWVDSSHDUFRQVWDQWO\DQGDWWDFNVDUHVSHFL¿FDOO\WDLORUHGWRFLUFXPYHQW

NQRZQSURWHFWLRQVFHQDULRV:KLOHWKHGHVLUHGFKDUDFWHULVWLFVRI,'36VDUH Security and Intelligence, Cyber, RSWLPL]HGSHUIRUPDQFHPD[LPXPSURWHFWLRQDQGPLQLPXPHUURU  traditional VHFXULW\V\VWHPVDUHQRORQJHUDEOHWRIXOO\IXO¿OOWKHVHUHTXLUHPHQWV7KH PRVW FULWLFDOWHFKQRORJLFDOZHDNQHVVHV are: 17 D /RZGHWHFWLRQUDWH$Q\LQDFFXUDF\LQGH¿QLQJSDWWHUQVRIDEQRUPDORU QRUPDOQHWZRUNDQGRUV\VWHPEHKDYLRUPD\DIIHFWWKH,'36¶VGHWHFWLRQ UDWH7KHFRQWLQXRXVO\FKDQJLQJQHWZRUNHQYLURQPHQWPDNHVWKLVWDVN HYHQPRUHFKDOOHQJLQJ(UURUVLQGH¿QLQJDEQRUPDOSDWWHUQVFDQOHDGWR KLJKIDOVHQHJDWLYHGHWHFWLRQUDWHV+HUHWKHPDOLFLRXVQHWZRUNDFWLYLWLHV RIDWWHPSWHGDWWDFNVDUHQRWGHWHFWHGLQDGYDQFHEHFDXVHDQRQPDOLFLRXV QHWZRUNEHKDYLRUZDVDVVXPHGLQVWHDG%\FRQWUDVWHUURQHRXVGH¿QLWLRQ RIQRUPDOSDWWHUQVFDQFDXVHKLJKIDOVHSRVLWLYHUDWHVFDXVLQJQRQ PDOLFLRXVQHWZRUNDFWLYLWLHVWREHFDWHJRUL]HGDVPDOLFLRXV E 6ORZWKURXJKSXW,'36VFDQVKRZOLPLWDWLRQVLQSURFHVVLQJDQGDQDO\]LQJ JLJDELWVRIGDWDSHUVHFRQG0HFKDQLVPVWKDWDGGUHVVWKLVLVVXHDUHEDVHG PDLQO\RQWKHGLVWULEXWLRQRIGDWDSURFHVVLQJDQGWKXVFDQIXUWKHUDIIHFW WKHV\VWHP¶VRSHUDWLRQPDLQWHQDQFHDQGUHODWHGFRVWV F /DFNRIVFDODELOLW\DQGUHVLOLHQFH&\EHUHQYLURQPHQWVDUHG\QDPLF ,QIUDVWUXFWXUHVDQGQHWZRUNWUDI¿FFKDQJHDQGH[SDQGFRQVWDQWO\DQG YDVWDPRXQWVRIKHWHURJHQHRXVGDWDQHHGVWREHSURFHVVHGDQGDQDO\]HG 7KHVHG\QDPLFVIXUWKHUOHDGWRSHUIRUPDQFHLVVXHVDQGDORVVRIHI¿FLHQF\ NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

108 DV,'36VPLJKWEHQRWDEOHWRSURYLGHDQGPDLQWDLQWKHLUIXQFWLRQDOLWLHV ZKHQFRSLQJZLWKWKHVHG\QDPLFV G /DFNRIDXWRPDWLRQ ,'36VDUHQRW\HWDEOHWRDGDSWDXWRPDWLFDOO\WR FKDQJHVLQWKHLUHQYLURQPHQW7KLVFDQUHVXOWLQWKHQHHGIRULQGLYLGXDO DQDO\VLVRIORJGDWDWKHPDQXDOUHDGMXVWPHQWRIV\VWHPVWRFKDQJHVLQ WKHQHWZRUNHQYLURQPHQWRUIRUH[SHUWVWRGHWHUPLQHWKHDSSURSULDWH UHDFWLRQIRUHYHU\LQGLYLGXDOZDUQLQJPHVVDJH7KLVODFNRIDXWRPDWLRQ UHVXOWVLQDFRQVWDQWQHHGIRUKXPDQVXSHUYLVLRQDQGFDXVHVGHOD\VDV

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | ZHOODVDQRYHUKHDGLQFRVWVDQGUHVRXUFHV 'XHWRWKHWHFKQRORJLFDOFKDOOHQJHVRUJDQL]DWLRQVPD\IDFHVHFXULW\GH¿FLWV DWVRPHSRLQWWKH\PD\XVHVHYHUDOVHFXULW\V\VWHPVRUSXUFKDVHVHFXULW\ LQWHOOLJHQFHLQWHUPVRIVHFXULW\FRQVXOWLQJWKURXJKWKLUGSDUW\SURYLGHUV 

Additional Challenges %HVLGHVWKHFRPSUHKHQVLYHDFTXLVLWLRQRIGDWDDQGWKHXVHRIVROLGVHFXULW\

Cyber, Intelligence, and Security Security and Intelligence, Cyber, WHFKQRORJLHVIRUSURWHFWLQJWKHIXOOUDQJHRILQIRUPDWLRQLQDWLPHO\PDQQHU VXSSRUWLQJSURFHVVHVDOVRQHHGWREHFRQVLGHUHG7KHHVWDEOLVKPHQWDQG PDLQWHQDQFHRIWKHVHSURFHVVHVLVDVLPSRUWDQWDVGDWDDFTXLVLWLRQDQGWKH XVHRIDSSURSULDWHVHFXULW\WHFKQRORJLHV,QWHURUJDQL]DWLRQDODVZHOODV LQWUDRUJDQL]DWLRQDOSURFHVVHVFDQKHOSWRIXUWKHULPSURYHDQGPDLQWDLQ RUJDQL]DWLRQV¶,6$VLQDGGLWLRQWRLQFUHDVLQJWKHLUF\EHUVHFXULW\PDWXULW\ OHYHO 19 )XUWKHUPRUHWKHFUHDWLRQRIDVRFDOOHG F\EHUHFRV\VWHP 20 encourages SDUWQHUVKLSVEHWZHHQGLYHUVHDFWRUVDFURVVWKHF\EHUODQGVFDSHWKDWDLPWR DGGUHVVDQGVKDUHVHFXULW\WKUHDWVH[SHULHQFHRUUHVRXUFHV 2UJDQL]DWLRQVRSHUDWLQJLQGLIIHUHQWVHFWRUVDOVRWHQGWRKDYHLQFRQVLVWHQW GHPDQGVRIF\EHUVHFXULW\7KHVHGLIIHUHQFHVFDQFRUUHVSRQGWRKHWHURJHQHRXV VHFXULW\UHTXLUHPHQWVDVZHOODVYDU\LQJUHVSRQVHVZKHQIDFLQJVLPLODU F\EHUDWWDFNV 21 ,QFDVHVZKHUHRUJDQL]DWLRQVQHHGWRSURWHFWFULWLFDO LQIUDVWUXFWXUHVVXFKDVZDWHUWUHDWPHQWRUQXFOHDUSRZHUSODQWVWKH\IRFXV RQLQFUHDVHGVHFXULW\UDWKHUWKDQRQ¿QDQFLDODVSHFWV,QFRPSDULVRQSULYDWH RUJDQL]DWLRQVWHQGWRIRFXVRQ¿QDQFLDOORVVHVDQGGRQRWJLYHWRRPXFK LPSRUWDQFHWRHQGDQJHULQJSXEOLFVDIHW\ 22 7KHVHDUHRQO\VRPHRIWKHFKDOOHQJHVWKDWWURXEOHRUJDQL]DWLRQVZKHQ VHWWLQJXSWKHLUVHFXULW\VWUDWHJ\*LYHQWKHLPSRUWDQWUROHRIVHFXULW\V\VWHPV LQWKLVFRQWH[WWKHIROORZLQJVHFWLRQZLOOIRFXVRQWKHWHFKQRORJLFDOPHDVXUHV NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

109 Intelligent Techniques to Facilitate Security Measures ,QWDFNOLQJLQWHOOLJHQFHJDWKHULQJLVVXHVIRUF\EHUVHFXULW\LQWHOOLJHQWPDFKLQHV VKRZSURPLVHRILPSURYLQJWRGD\¶VVHFXULW\PHDVXUHV,QWHOOLJHQWPDFKLQHV FDQSHUIRUPVRPHKXPDQFRJQLWLYHDELOLWLHV DELOLW\WROHDUQRUUHDVRQ DV ZHOODVKDYLQJVHQVRU\IXQFWLRQV DELOLW\WRKHDURUVHH 7KHVHPDFKLQHV H[KLELWZKDWZHFRXOGFDOO LQWHOOLJHQFH 23 6XFKDUWL¿FLDOLQWHOOLJHQFHHQDEOHV PDFKLQHVWREHKDYHLQWHOOLJHQWO\DQGLPLWDWHKXPDQLQWHOOLJHQFH²DOEHLWWR DOLPLWHGH[WHQW 7KHGHYHORSPHQWRILQWHOOLJHQWV\VWHPVHLWKHUVRIWZDUHRUKDUGZDUH 2017 January | 1 No. | 1 Volume | SURYLGHVPHWKRGVWRVROYHFRPSOH[SUREOHPV²SUREOHPVWKDWFRXOGQRWEH VROYHGZLWKRXWDSSO\LQJVRPHLQWHOOLJHQFH 24 :KHUHDVWUDGLWLRQDOFRPSXWHU V\VWHPVDUHEDVHGRQ¿[HGDOJRULWKPV 25 DQGUHTXLUHNQRZQGDWDIRUPDWVIRU GHFLVLRQPDNLQJWKHFRPSXWHUVFLHQFHGLVFLSOLQHRI$,GHYHORSHGÀH[LEOH WHFKQLTXHVVXFKDVWKHUHFHQWO\UHYLYHGDSSURDFKRIGHHSQHXUDOQHWZRUNV WKDWHQDEOHVPDFKLQHVWROHDUQ  DQGDGDSWDXWRPDWLFDOO\WRWKHG\QDPLFVRI

WKHLUHQYLURQPHQW,QF\EHUVSDFHWKLVPD\LQFOXGHWKHDXWRPDWLFDGDSWLRQ Security and Intelligence, Cyber, WRKHWHURJHQHRXVGDWDIRUPDWVFKDQJLQJGDWDVRXUFHVRUQRLVH 27 LQF\EHU DFWLYLWLHV ,QWKHUHDOPRI$,F\EHUVHFXULW\DUJXDEO\LVWKHLQGXVWU\WKDWFRXOG EHQH¿WPRVWIURPWKHLQWURGXFWLRQRIPDFKLQHLQWHOOLJHQFHIXUWKHUPRUHWKH FKDOOHQJHVRIFRQYHQWLRQDOVHFXULW\V\VWHPVDUHVXSSRVHGWREHRYHUFRPHE\ XVLQJDXWRQRPRXV$,V\VWHPV  &RQVHTXHQWO\WKHLVVXHVLQGDWDDFTXLVLWLRQ DPRXQWKHWHURJHQHLW\DQGYHORFLW\RIGDWD DVZHOODVWKHSUREOHPVRIWKH UHODWHGWRROV ORZGHWHFWLRQUDWHVORZWKURXJKSXWDODFNRIVFDODELOLW\DQG UHVLOLHQFHDQGDODFNRIDXWRPDWLRQ FRXOGEHPLWLJDWHGWKURXJK$,7KXV HI¿FLHQF\DQGWKHHIIHFWLYHQHVVRIF\EHUVHFXULW\DQGLWVUHVSHFWLYHWRROV FRXOGEHLPSURYHG 7KH¿HOGRI$,KDVGHYHORSHGDQGLVVWLOOGHYHORSLQJQXPHURXVWHFKQLTXHV WRDGGUHVVLQWHOOLJHQWV\VWHPEHKDYLRUDQGPDQ\KDYHEHHQHVWDEOLVKHG DOUHDG\LQWKH¿HOGRIF\EHUVHFXULW\7KHVHV\VWHPVFDQWKHUHIRUHKDQGOH DQGDQDO\]HYDVWDPRXQWVRILQIRUPDWLRQZLWKLQDUHDVRQDEOHWLPHIUDPH DQGLQWKHHYHQWRIDQDWWHPSWHGDWWDFNFDQDQDO\]HWKHLQIRUPDWLRQDQG VHOHFWGHGLFDWHGFRXQWHUDFWLRQV3RVVLEOHVFHQDULRVZKHUH$,WHFKQLTXHVDUH DSSOLHGWRVHFXULW\LVVXHVUHODWHGWRWKHIRXUFDWHJRULHVZLWKLQWKH,6$FDQ GHPRQVWUDWHWKHYDVWSRVVLELOLWLHVRIWKHYDULRXVEUDQFKHVRI$, NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

110 Interacting Intelligent Cyber Police Agents to Monitor Entire Networks 7KHSDUDGLJPRI LQWHOOLJHQWDJHQWV LVDEUDQFKRI$,WKDWDURVHIURP WKHLGHDWKDWNQRZOHGJHLQJHQHUDODQGHVSHFLDOO\NQRZOHGJHWRVROYH SUREOHPVRXJKWWREHVKDUHGEHWZHHQGLIIHUHQWHQWLWLHV$VLQJOHDJHQWLVDQ DXWRQRPRXVFRJQLWLYHHQWLW\ 29 ZLWKLWVRZQLQWHUQDOGHFLVLRQPDNLQJV\VWHP DQGDQLQGLYLGXDOJRDO7RDFKLHYHLWVJRDODQDJHQWDFWVSURDFWLYHO\ZLWKLQ LWVHQYLURQPHQWDQGZLWKRWKHUDJHQWV,QDGGLWLRQDJHQWVKDYHDUHDFWLYH

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | EHKDYLRUWKH\XQGHUVWDQGDQGUHVSRQGWRFKDQJHVLQWKHLUHQYLURQPHQWDQG LQWHUDFWZLWKLWDQGRWKHUGHFHQWUDOL]HGDJHQWV2YHUWLPHDJHQWVVHOIDGDSW WRG\QDPLFFKDQJHVLQWKHLUHQYLURQPHQWVJLYHQWKHLURZQDFFXPXODWHG H[SHULHQFHV 30 'XHWRWKHLUGHFHQWUDOL]HGDQGLQWHUDFWLQJQDWXUHLQWHOOLJHQWDJHQWV DUHSUHGHVWLQHGWRJDWKHULQIRUPDWLRQRQHQWLUHQHWZRUNVDQGVXUURXQGLQJ V\VWHPV,WDSSHDUVWKDWWKLVIDYRUDEOHFKDUDFWHULVWLFKDVEHHQXVHGQRWRQO\

Cyber, Intelligence, and Security Security and Intelligence, Cyber, LQWHUPVRIGHIHQVHPHDVXUHVEXWDOVRIRUUHFRQQDLVVDQFHDQGH[SORLWDWLRQ VHHWKHF\EHUNLOOFKDLQGLVFXVVHGDERYH RISRWHQWLDOWDUJHWV\VWHPV 31 6LQFHWKHEHKDYLRURIHYHU\DJHQWLVIRUPHGE\LWVH[SHULHQFHVZLWKLQLWV RZQSHUVRQDOHQYLURQPHQWLWLVTXLWHFKDOOHQJLQJWRSURWHFWDJDLQVWVXFK LQGLYLGXDOL]HGWKUHDWV

FigureFigure 1. Intelligent 2 : Intelligent Cyber Police Cyber Agents Police for Early Agents Warning sfor in an Early Integrated Warnings Security Approachin an Integrated Security Approach

$SRZHUIXOZD\WRXWLOL]HDJHQWVDJDLQVWGLVWULEXWHGF\EHUDWWDFNVLVE\ EXLOGLQJXSDQLQWHOOLJHQWDJHQW¶VF\EHUSROLFH7KLVDSSURDFKSXUVXHVWKH LGHDRIDUWL¿FLDO SROLFHDJHQWV LQDGH¿QHGF\EHUHQYLURQPHQWWRGHWHFW PDOLFLRXVDFWLYLWLHVLQDGHFHQWUDOL]HGZD\ 32 $VYLVXDOL]HGLQ)LJXUHDERYH VXFKSROLFHDJHQWVFDQIDFLOLWDWHSURWHFWLRQDOUHDG\LQWKHHDUOLHVWVWDJHVRI DF\EHUDWWDFN NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

111 ,QWHOOLJHQWDJHQWVFDQDOVREHIRXQGLQKXPDQLQVSLUHGDUWL¿FLDOLPPXQH V\VWHPV $,6V %\XVLQJWZRGLIIHUHQWW\SHVRIDJHQWVGHWHFWLRQDQG FRXQWHUDWWDFNDJHQWVWKHEHQH¿FLDOFKDUDFWHULVWLFVRIWKHKXPDQLPPXQH V\VWHPLVLPLWDWHG'HWHFWLRQDJHQWVPRQLWRUF\EHUHQYLURQPHQWVDQGWU\ WRGHWHFWDEQRUPDODFWLYLWLHV:KHQWKHVHDJHQWVVSRWPDOLFLRXVDFWLYLWLHV WKH\SURDFWLYHO\VHQGRXWGHFHQWUDOL]HGLQVWUXFWLRQVWRFRXQWHUDWWDFNDJHQWV ZKLFKDUHWKHQDFWLYDWHGWRSUHYHQWPLWLJDWHRUHYHQFRXQWHUDWWDFNQHWZRUN LQWUXGHUV 33 | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | Arti#cial Neural Networks to Prevent Malicious Intrusions $QRWKHUWHFKQLTXHWKDWHPHUJHGIURPWKH¿HOGRI$,LVWKH DUWL¿FLDOQHXUDO QHWZRUN $11 $11VDUHVWDWLVWLFDOOHDUQLQJPRGHOVLPLWDWLQJWKHVWUXFWXUH DQGWKHIXQFWLRQRIWKHKXPDQEUDLQ7KH\FDQKHOSWROHDUQDQGVROYHSUREOHPV HVSHFLDOO\LQHQYLURQPHQWVZKHUHDOJRULWKPVRUUXOHVIRUVROYLQJDSUREOHP DUHGLI¿FXOWWRH[SUHVVRUDUHXQNQRZQ6LQFH$11V¶V\VWHPEHKDYLRULVNLQG RIHOXVLYHWKH\DUHFRQVLGHUHGXQGH¿QHGEODFNER[PRGHOV 34 Cyber, Intelligence, and Security Security and Intelligence, Cyber, ,QF\EHUVHFXULW\$11VKDYHEHHQXVHGVXFFHVVIXOO\ZLWKLQDOOVWDJHV RI,6$VDQGKHQFHFDQHQFDSVXODWHDOOSKDVHVRIWKHF\EHUNLOOFKDLQ ,QWHJUDWHGLQF\EHUVHFXULW\$11VFDQEHXVHGIRUPRQLWRULQJQHWZRUN WUDI¿F$VGHSLFWHGLQ)LJXUHEHORZPDOLFLRXVLQWUXVLRQVFDQEHGHWHFWHG DOUHDG\GXULQJWKHGHOLYHU\SKDVHDQGEHIRUHDQDFWXDODWWDFNRFFXUV 35 7KLVLVDGHVLUHGJRDORIF\EHUVHFXULW\DQGLWLVDJUHDWDFKLHYHPHQWZKHQ F\EHUDWWDFNVFDQEHKLQGHUHGEHIRUHWKH\WDNHSODFHWKXVHODERUDWLQJXSRQ WKHPDLQLGHDRISHULPHWHUGHIHQVH 36 $11VFDQEHVXFFHVVIXOO\XVHGWROHDUQ IURPSDVWQHWZRUNDFWLYLWLHVDQGDWWDFNVLQRUGHUWRSUHYHQWIXWXUHDWWDFNV IURPDFWXDOO\WUDQVSLULQJ

Figure 3: Arti"cial Neural Networks to Prevent Attacks within an Integrated Security Approach NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

112 &RPSDUHGWRFRQYHQWLRQDOWHFKQLTXHVXVHGIRUF\EHUGHIHQVHWKHJUHDW DGYDQWDJHRIXVLQJ$11VLVWKHLUOHDUQLQJDELOLW\$VPHQWLRQHGDERYH SDWWHUQVWKDWGHVFULEHQRUPDODQGDEQRUPDOQHWZRUNDFWLYLWLHVDUHWUDGLWLRQDOO\ GH¿QHGPDQXDOO\E\VHFXULW\SURIHVVLRQDOVEDVHGRQWKHLUH[SHUWNQRZOHGJH $11VKRZHYHUFDQEHWUDLQHGWRLGHQWLI\VXFKSDWWHUQVDXWRPDWLFDOO\E\ XVLQJSUHYLRXVGDWDWKDWKDVEHHQWUDQVIHUUHGRYHUWKHQHWZRUN :LWKLQDQDQRPDO\EDVHG,'36DSSURDFKLWZDVVKRZQWKDW$11VFDQ EHVXFFHVVIXOO\XWLOL]HGWRHYDOXDWHKHDGHULQIRUPDWLRQ 37 RIQHWZRUNGDWD

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | packages to learn SDWWHUQVIRUQRUPDOQHWZRUNEHKDYLRU  ,QD¿UVWSUHSDUDWRU\ VWHSWKH$11ZDVWUDLQHGWRLGHQWLI\DQGOHDUQSDWWHUQVRIKHDGHUDWWULEXWHV WKDWEHORQJHGWRQRUPDOQHWZRUNWUDI¿F(YHU\IXWXUHGDWDSDFNHWWKDWZDV WUDQVIHUUHGRYHUWKHPRQLWRUHGQHWZRUNZDVFRPSDUHGDIWHUZDUGVZLWKWKHVH SUHOHDUQHGSDWWHUQV:KHQDWWULEXWHVRISDFNHWKHDGHUVPDWFKHGWKH normal SDWWHUQWKH\ZHUHWUDQVIHUUHGDVXVXDO,UUHJXODULWLHVLQDGDWDSDFNHW¶V KHDGHULQIRUPDWLRQWKDWPLVPDWFKHGWKHOHDUQHGSDWWHUQZHUHFODVVL¿HGDV

Cyber, Intelligence, and Security Security and Intelligence, Cyber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¿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| ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

113 VHHWUDGLWLRQDODSSURDFKHVRIF\EHUVHFXULW\VKLIWLQJIURPDWWDFNGHWHFWLRQWR DWWDFNSUHYHQWLRQ'11WHFKQLTXHVFDQQRZSRVVLEO\OHDGLQDQHZSKDVH RIF\EHUVHFXULW\²QDPHO\F\EHUDWWDFNSUHGLFWLRQ

Expert Systems to Provide Decision Support for Security Professionals ([SHUWV\VWHPV DUHFRPSXWHUSURJUDPVGHVLJQHGWRSURYLGHGHFLVLRQ VXSSRUWIRUFRPSOH[SUREOHPVLQDGRPDLQWKHVHDUHWKHPRVWZLGHO\XVHG

$,DSSOLFDWLRQ&RQFHSWXDOO\DQH[SHUWV\VWHPFRQVLVWVRIDNQRZOHGJH 2017 January | 1 No. | 1 Volume | EDVHZKLFKVWRUHVWKHH[SHUWNQRZOHGJHDQGDQLQIHUHQFHHQJLQHZKLFKLV XVHGIRUUHDVRQLQJDERXWSUHGH¿QHGNQRZOHGJHDVZHOODV¿QGLQJDQVZHUV WRJLYHQSUREOHPV 43 'HSHQGLQJRQWKHZD\RIUHDVRQLQJH[SHUWV\VWHPVDSSO\WRGLIIHUHQW SUREOHPFODVVHV$FDVHEDVHGUHDVRQLQJ &%5 DSSURDFKDOORZVVROYLQJ SUREOHPVE\UHFDOOLQJSUHYLRXVVLPLODUFDVHVDVVXPLQJWKHVROXWLRQRIDSDVW FDVHFDQEHDGDSWHGDQGDSSOLHGWRDQHZSUREOHPFDVH6XEVHTXHQWO\QHZO\ Cyber, Intelligence, and Security Security and Intelligence, Cyber, SURSRVHGVROXWLRQVDUHHYDOXDWHGDQGLIQHFHVVDU\UHYLVHGWKXVOHDGLQJ WRFRQWLQXDOLPSURYHPHQWVRIDFFXUDF\DQGDELOLW\WROHDUQQHZSUREOHPV RYHUWLPH5XOHEDVHGV\VWHPV 5%6 VROYHSUREOHPVXVLQJUXOHVGH¿QHG E\H[SHUWV5XOHVFRQVLVWRIWZRSDUWVDFRQGLWLRQDQGDQDFWLRQ3UREOHPV DUHDQDO\]HGVWHSZLVH¿UVWWKHFRQGLWLRQLVHYDOXDWHGDQGWKHQWKHDFWLRQ WKDWVKRXOGEHWDNHQQH[WLVGHWHUPLQHG8QOLNH&%5V\VWHPV5%6VDUH QRWDEOHWROHDUQQHZUXOHVRUDXWRPDWLFDOO\PRGLI\H[LVWLQJUXOHV7KLVIDFW UHIHUVWRWKH³NQRZOHGJHDFTXLVLWLRQSUREOHP´ which is crucial in adapting WRG\QDPLFHQYLURQPHQWV 44 6HFXULW\SURIHVVLRQDOVZLGHO\XVHH[SHUWV\VWHPVIRUGHFLVLRQVXSSRUWLQ F\EHUHQYLURQPHQWV,QJHQHUDOHYDOXDWLQJVHFXULW\V\VWHPV¶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¿FLHQWO\ FIUHDFW UHVSRQGLQ)LJXUHEHORZ  NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

114 $WWKLVSRLQWLWLVFUXFLDOWRUHFDOOWKDWH[SHUWV\VWHPVVRIDUVROHO\DVVLVW GHFLVLRQPDNHUVEXWDUHQRWDEOHWRVXEVWLWXWHIRUWKHP 

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | Figure 4 : Expert Systems to Support React & Response Measures in an Integrated Security Approach

Drawbacks of Arti#cial Intelligence within Cybersecurity 7KHSUHYLRXVVHFWLRQGLVFXVVHGWKHEHQH¿WVRI$,DVZHOODVWKHYDULRXV WHFKQLTXHVWKDWFDQDGGUHVVVLJQL¿FDQWWHFKQRORJLFDOLVVXHVLQWRGD\¶V

Cyber, Intelligence, and Security Security and Intelligence, Cyber, F\EHUVHFXULW\GRPDLQ'HVSLWHWKHVHSRVLWLYHDVSHFWVWKHFRQFHUQVDQGULVNV

IURPXVLQJ$,ZLWKLQF\EHUVHFXULW\DUHDVIROORZV D ,QDELOLW\WRPDLQWDLQF\EHUVHFXULW\DXWRQRPRXVO\$OWKRXJKWKHUHKDYH EHHQKXJHDGYDQFHVLQDGDSWLQJ$,WHFKQLTXHVWRF\EHUVHFXULW\VHFXULW\ V\VWHPVDUHQRW\HWIXOO\DXWRQRPRXV6LQFHWKH\DUHQRW\HWDEOHWR FRPSOHWHO\UHSODFHKXPDQGHFLVLRQVWKHUHDUHVWLOOWDVNVWKDWUHTXLUH KXPDQLQWHUYHQWLRQ 47 E 'DWDSULYDF\$,WHFKQLTXHVOLNH$11VDQG'11VDUHEHFRPLQJPRUH DGYDQFHGDQGQHZWHFKQLTXHVHPHUJHUHJXODUO\²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¶VDXWRQRP\'XHWRWKHXQLTXHDQGXQIRUHVHHDEOH QDWXUHRI$,H[LVWLQJOHJDOIUDPHZRUNVGRQRWQHFHVVDULO\DSSO\WRWKLV GLVFLSOLQH 49 NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

115 G (WKLFDOFRQFHUQV$,EDVHGVHFXULW\V\VWHPVLQFUHDVLQJO\PDNHGHFLVLRQV IRUKXPDQLQGLYLGXDOVRUDVVLVWWKHPWRGRVR HJDVGLVFXVVHGDERYH LQWKHFDVHRI([SHUW6\VWHPV &RQVLGHULQJWKLVGHYHORSPHQWLWLV SDUWLFXODUO\ZRUULVRPHWKDWWKHVHV\VWHPVGRQRWFXUUHQWO\KDYHDPRUDO FRGH&RQVHTXHQWO\WKHGHFLVLRQVWKDWDUHPDGHIRUXVDUHQRWQHFHVVDULO\ WKHRQHVWKDWDSHUVRQZRXOGWDNH 50

Conclusions

$,LVFRQVLGHUHGDVRQHRIWKHPRVWSURPLVLQJGHYHORSPHQWVLQWKHLQIRUPDWLRQ 2017 January | 1 No. | 1 Volume | DJHDQGF\EHUVHFXULW\DUJXDEO\LVWKHGLVFLSOLQHWKDWFRXOGEHQH¿WPRVW IURPLW1HZDOJRULWKPVWHFKQLTXHVWRROVDQGHQWHUSULVHVRIIHULQJ$, EDVHGVHUYLFHVDUHFRQVWDQWO\HPHUJLQJRQWKHJOREDOVHFXULW\PDUNHW &RPSDUHGWRFRQYHQWLRQDOF\EHUVHFXULW\VROXWLRQVWKHVHV\VWHPVDUH PRUHÀH[LEOHDGDSWDEOHDQGUREXVWWKXVKHOSLQJWRLPSURYHVHFXULW\ SHUIRUPDQFHDQGEHWWHUSURWHFWV\VWHPVIURPDQLQFUHDVLQJQXPEHURI VRSKLVWLFDWHGF\EHUWKUHDWV&XUUHQWO\GHHSOHDUQLQJWHFKQLTXHVDUHSRVVLEO\ Cyber, Intelligence, and Security Security and Intelligence, Cyber, WKHPRVWSURPLVLQJDQGSRZHUIXOWRROVLQWKHUHDOPRI$,'11VFDQSUHGLFW F\EHUDWWDFNVLQDGYDQFHLQVWHDGRIVROHO\SUHYHQWLQJWKHPDQGPLJKWOHDG WRDQHZSKDVHRIF\EHUVHFXULW\ 'HVSLWHWKHSURPLVLQJQDWXUHRI$,LWKDVHPHUJHGDVDJOREDOULVNIRU KXPDQFLYLOL]DWLRQZKLOHWKHULVNVDQGFRQFHUQVIRULWVXVHLQF\EHUVSDFH DUHMXVWL¿HG+HUHIRXUPDMRULVVXHVFDQEHLGHQWL¿HGWKHODFNRI$,¶V IXOODXWRQRP\FRQFHUQVDERXWGDWDSULYDF\WKHDEVHQFHRIVXI¿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| ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

116 VWURQJLQWHUGHSHQGHQFHEHWZHHQ$,V\VWHPVDQGKXPDQIDFWRUVLVQHFHVVDU\ IRUDXJPHQWLQJF\EHUVHFXULW\¶VPDWXULW\0RUHRYHUDKROLVWLFYLHZRQWKH F\EHUHQYLURQPHQWRIRUJDQL]DWLRQVLVUHTXLUHG&\EHUVHFXULW\LVQRWRQO\D WHFKQRORJLFDOLVVXHLWLVDOVRDERXWUHJXODWLRQDQGWKHZD\WKDWVHFXULW\ULVNV DUHGHDOWZLWK,WLVQHFHVVDU\WRLQWHJUDWHDQ\WHFKQLFDOVROXWLRQVUHOHYDQW SURFHVVHVDQGSHRSOHLQWRDQ,6$IUDPHZRUNWRDFKLHYHRSWLPDOVHFXULW\ SHUIRUPDQFH,QWKHHQGLWLVVWLOOWKHKXPDQIDFWRUWKDWPDWWHUV²QRW RQO\  WKHWRROV | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | Notes  ,Q5REHUW7DSSHQ0RUULVDJUDGXDWHVWXGHQWLQFRPSXWHUVFLHQFHZURWHWKH ¿UVWFRPSXWHUSURJUDPZKLFKZDVGLVWULEXWHGYLDWKHLQWHUQHWWKH0RUULV:RUP 7KHSURJUDPZDVQRWGHVLJQHGWRFDXVHGDPDJHEXWUDWKHUWRJDXJHWKHVL]HRIWKH LQWHUQHWDFULWLFDOHUURUKRZHYHUWUDQVIRUPHGWKHSURJUDPFDXVLQJLWWRODXQFK WKH¿UVWGHQLDORIVHUYLFHDWWDFN  $ERXWWKH,'36ZHDNQHVVHVVHH$PMDG5HKPDQDQG7DQ]LOD6DED³(YDOXDWLRQ RI$UWL¿FLDO,QWHOOLJHQW7HFKQLTXHVWR6HFXUH,QIRUPDWLRQLQ(QWHUSULVHV´ Cyber, Intelligence, and Security Security and Intelligence, Cyber, $UWL¿FLDO,QWHOOLJHQFH5HYLHZ QR  ±HVSHFLDOO\WKHVHFWLRQ ³3HUIRUPDQFHLVVXHV,'6´  6HOPD'LOHN+VH\LQdDNÕUDQG0XVWDID$\GÕQ³$SSOLFDWLRQVRI$UWL¿FLDO ,QWHOOLJHQFH7HFKQLTXHVWR&RPEDWLQJ&\EHU&ULPHV$5HYLHZ´ International -RXUQDORI$UWL¿FLDO,QWHOOLJHQFH $SSOLFDWLRQV QR  ±  (QQ7\XJX³$UWL¿FLDO,QWHOOLJHQFHLQ&\EHU'HIHQVH´LQ Proceedings of 3rd ,QWHUQDWLRQDO&RQIHUHQFHRQ&\EHU&RQÀLFW>,&&&@±-XQH7DOOLQQ Estonia HGV&&]RVVHFN(7\XJXDQG7:LQJ¿HOG 7DOOLQQ(VWRQLD&&' &2( SS±;LDRELQ:DQJ*XDQJ\XDQ

117  7KHUHDUHYDULRXVDSSURDFKHVWRGHVFULEHWKHGLIIHUHQWVWDJHVRIDF\EHUDWWDFN 7KLVDUWLFOHUHIHUVWRWKH Cyber Kill Chain® E\/RFNKHHG0DUWLQZKLFKKDVEHHQ ZLGHO\XVHGE\WKHVHFXULW\FRPPXQLW\)RUPRUHVHHZZZORFNKHHGPDUWLQFRP  *DEL6LERQL³$Q,QWHJUDWHG6HFXULW\$SSURDFK7KH.H\WR&\EHU'HIHQVH´ Georgetown Journal of International Affairs 0D\KWWSMRXUQDO JHRUJHWRZQHGXDQLQWHJUDWHGVHFXULW\DSSURDFKWKHNH\WRF\EHUGHIHQVH  7RQ\6DJHU³.LOOLQJ$GYDQFHG7KUHDWVLQ7KHLU7UDFNV$Q,QWHOOLJHQW$SSURDFK WR$WWDFN3UHYHQWLRQ´$6$16$QDO\VW:KLWHSDSHU  KWWSVZZZVDQV RUJUHDGLQJURRPZKLWHSDSHUVDQDO\VWNLOOLQJDGYDQFHGWKUHDWVWUDFNVLQWHOOLJHQW DSSURDFKDWWDFNSUHYHQWLRQ  &\EHULQWHOOLJHQFHLVPRUHWKDQWKHDYDLODELOLW\RIUDZGDWDUDWKHULWSURYLGHV 2017 January | 1 No. | 1 Volume | DFWLRQDEOHLQIRUPDWLRQRISUHVRUWHGSURFHVVHGDQGHYDOXDWHGGDWD)RU PRUHDERXWF\EHUWKUHDWLQWHOOLJHQFHDQGWKHFRQFHSWXDOGHOLPLWDWLRQRIF\EHU LQWHOOLJHQFHDQGF\EHULQIRUPDWLRQVHH³:KDW,V&\EHU7KUHDW,QWHOOLJHQFHDQG :K\'R,1HHG,W"´L6,*+73DUWQHUV,QF  KWWSZZZLVLJKWSDUWQHUVFRP ZSFRQWHQWXSORDGVL6,*+7B3DUWQHUVB:KDWB,VBB&ODULW\B%ULHI SGI  6LERQL³$Q,QWHJUDWHG6HFXULW\$SSURDFK´  $KPHG3DWHO0RQD7DJKDYL.DYHK%DNKWL\DULDQG-RDTXLP&HOHVWLQR-~QLRU Cyber, Intelligence, and Security Security and Intelligence, Cyber, ³$Q,QWUXVLRQ'HWHFWLRQDQG3UHYHQWLRQ6\VWHPLQ&ORXG&RPSXWLQJ$ 6\VWHPDWLF5HYLHZ´ Journal of Network and Computer Applications QR -DQXDU\ ±  6XVDQ0%ULGJHVDQG5D\IRUG%9DXJKQ³)X]]\'DWD0LQLQJDQG*HQHWLF $OJRULWKPV$SSOLHGWR,QWUXVLRQ'HWHFWLRQ´ WK$QQXDO&DQDGLDQ,QIRUPDWLRQ Technology Security Symposium  ±  3DWHO7DJKDYL%DNKWL\DULDQG&HOHVWLQR-~QLRU³$Q,QWUXVLRQ'HWHFWLRQDQG 3UHYHQWLRQ6\VWHPLQ&ORXG&RPSXWLQJ$6\VWHPDWLF5HYLHZ´  5HKPDQDQG6DED³(YDOXDWLRQRI$UWL¿FLDO,QWHOOLJHQW7HFKQLTXHV´  6DJHU³.LOOLQJ$GYDQFHG7KUHDWVLQ7KHLU7UDFNV$Q,QWHOOLJHQW$SSURDFKWR $WWDFN3UHYHQWLRQ´  7KH)HGHUDO)LQDQFLDO,QVWLWXWLRQV([DPLQDWLRQ&RXQFLOGHYHORSHGWKH &\EHUVHFXULW\$VVHVVPHQW7RROWRKHOSRUJDQL]DWLRQVLGHQWLI\WKHLUULVNVDQG GHWHUPLQHWKHLUF\EHUVHFXULW\SUHSDUHGQHVV7KHPDWXULW\OHYHOKHOSVRUJDQL]DWLRQV WRGHWHUPLQHZKHWKHUWKHLUEHKDYLRUVSUDFWLFHVDQGSURFHVVHVFDQVXSSRUWWKHLU F\EHUVHFXULW\SUHSDUHGQHVV,WDOVRLGHQWL¿HVSRWHQWLDODFWLRQVWKDWZRXOGLQFUHDVH WKLVSUHSDUHGQHVV)RUPRUHVHHKWWSVZZZI¿HFJRYF\EHUDVVHVVPHQWWRROKWP  $PLUXGLQ$EGXO:DKDE³)DFLQJ&\EHUDWWDFNVLQDQG%H\RQG´ The Star , -DQXDU\KWWSZZZWKHVWDUFRPP\WHFKWHFKRSLQLRQ IDFLQJF\EHUDWWDFNVLQDQGEH\RQG  5HKPDQDQG6DED³(YDOXDWLRQRI$UWL¿FLDO,QWHOOLJHQW7HFKQLTXHV´  /LQGD2QGUHM7RGG9ROOPHUDQG0LORV0DQLF³1HXUDO1HWZRUN%DVHG ,QWUXVLRQ'HWHFWLRQ6\VWHPIRU&ULWLFDO,QIUDVWUXFWXUHV´ ,QWHUQDWLRQDO-RLQW Conference on Neural Networks  $WODQWD*$ ± NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK

118 

119 &RPSXWHU:RUPV´ Neural Computing and Applications QR   ± 41 Geoffrey E. Hinton, Simon Osindero, and Yee-Whye Teh, “A Fast Learning Algorithm for Deep Belief Nets,” Neural Computation 18, no. 7 (2006): 1527– 1554. 42 9LFWRU7KRPVRQ³&\EHU$WWDFNV&RXOG%H3UHGLFWHG:LWK$UWL¿FLDO,QWHOOLJHQFH´ iTechPost $SULOZZZLWHFKSRVWFRPDUWLFOHVF\EHU DWWDFNVSUHGLFWHGDUWL¿FLDOLQWHOOLJHQFHKHOSKWP  7\XJX³$UWL¿FLDO,QWHOOLJHQFHLQ&\EHU'HIHQVH´  6HUHQD+&KHQ$QWKRQ\--DNHPDQDQG-RKQ31RUWRQ³$UWL¿FLDO,QWHOOLJHQFH 7HFKQLTXHV$Q,QWURGXFWLRQWR7KHLU8VHIRU0RGHOOLQJ(QYLURQPHQWDO6\VWHPV´ 2017 January | 1 No. | 1 Volume | Mathematics and Computers in Simulation QR±  ±  ,ELG  'HEUD$QGHUVRQ7KDQH)ULYROGDQG$OIRQVR9DOGHV³1H[W*HQHUDWLRQ,QWUXVLRQ 'HWHFWLRQ([SHUW6\VWHP 1,'(6 $6XPPDU\´65,,QWHUQDWLRQDO&RPSXWHU 6FLHQFH/DERUDWRU\0D\ 47 .DWKHULQH1R\HV³$,+XPDQV 6HULRXV&\EHUVHFXULW\´ Computerworld , $SULOZZZFRPSXWHUZRUOGFRPDUWLFOHVHFXULW\DLKXPDQV VHULRXVF\EHUVHFXULW\KWPO Cyber, Intelligence, and Security Security and Intelligence, Cyber,  7RP6LPRQLW³0LFURVRIWDQG*RRJOH:DQWWR/HW$UWL¿FLDO,QWHOOLJHQFH/RRVHRQ 2XU0RVW3ULYDWH'DWD´ MIT Technology Review $SULOKWWSVZZZ WHFKQRORJ\UHYLHZFRPVPLFURVRIWDQGJRRJOHZDQWWROHWDUWL¿FLDO LQWHOOLJHQFHORRVHRQRXUPRVWSULYDWHGDWD 49 %HUQG6WDKO'DYLG(OL]RQGR0RLUD&DUUROO0D\HU

Pedal to the Metal? The Race to Develop Secure Autonomous Cars

Andrew Tabas

The advent of Autonomous Vehicles (AVs) will have profound effects on car ownership, transportation, and security. It is already possible to hack into individual cars through their entertainment and navigation systems. The connecting of AVs to networks will make it possible to hack them on a large scale. Policymakers should act now to implement both technical and legal security mechanisms. Potential solutions include the establishment of a system of certificates, an effort to establish an air gap between different computer networks in the vehicles, and the creation of laws that penalize hackers. Still, manufacturers should not be deterred by the risks of AVs. Instead, they should race ahead in the development of this potentially lifesaving technology.

Keywords: autonomous vehicles, self-driving cars, V2V, V2I, intelligent transportation systems, Internet of Things, public key encryption, cybersecurity, hacking, air gap

Introduction ³*HWWKHP´,QKLVVKRUWVWRU\³6DOO\´,VDDF$VLPRYWHOOVWKHVWRU\RI ³SRVLWURQLF´FDUVWKDWGULYHWKHPVHOYHV7KHFDUVDOVRFRPPXQLFDWH LQDQ DXWRQRPRXVYHKLFOHQHWZRUN GHIHQGWKHPVHOYHV DUHVSRQVHWRVHFXULW\ FRQFHUQV DQGNLOO GHPRQVWUDWLQJWKHHWKLFDOSUREOHPVDWSOD\ZLWKDXWRQRPRXV

Andrew Tabas (Bachelor of Science in Foreign Service, Georgetown University, 2016) is a research analyst at the Cadmus Group.

Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017 121 ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

122 YHKLFOHV  1³6DOO\´LVDJRRGVWDUWLQJSRLQWIRUDGLVFXVVLRQRIDXWRQRPRXV YHKLFOHV $9V EHFDXVHWKHVWRU\KLJKOLJKWVLVVXHVWKDWWHFKQRORJ\FRPSDQLHV DQGFDUPDQXIDFWXUHUVIDFHWRGD\ :KDWYXOQHUDELOLWLHVFRXOGWKUHDWHQ$9VDQGWKHLUGULYHUV"+RZFDQ PDQXIDFWXUHUVDQGSROLF\PDNHUVUHVSRQGWRWKHVHYXOQHUDELOLWLHV"$9VKDYH XQLTXHYXOQHUDELOLWLHVWKDWQHFHVVLWDWHLQQRYDWLYHVHFXULW\VROXWLRQV)LUVW $9VGHSHQGRQVHQVRUVIRULQSXW7KHVHVHQVRUVFDQEHWULFNHGULVNLQJWKH VHFXULW\RIWKHYHKLFOHDQGLWVSDVVHQJHUV6HFRQG$9VJDLQLQIRUPDWLRQIRU

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | OLIHDQGGHDWKVLWXDWLRQVLQDV\VWHPWKDWUHOLHVRQFORXGLQIUDVWUXFWXUH*36 V\VWHPVFULWLFDOVRIWZDUHXSGDWHVDQGFRPPXQLFDWLRQZLWKRWKHUYHKLFOHVDOO UHO\RQWKHFORXGDQGFRXOGEHYXOQHUDEOHWRKDFNV7KLUGDIXWXUHQHWZRUN RI$9VFRXOGEHYXOQHUDEOHWRODUJHVFDOHH[SORLWVDQGDWWDFNV0DQXIDFWXUHUV VKRXOGHPEUDFHWKHVHFKDOOHQJHVDVWKHZLQQHURIWKHUDFHWRGHYHORSVDIH DQGVHFXUH$9VZLOOVDYHOLYHVDQGFKDQJHWKHZRUOG

The Technology Cyber, Intelligence, and Security Security and Intelligence, Cyber, ,WLVXVHIXOWRGLVWLQJXLVKEHWZHHQ³DXWRQRPRXVFDUV´DQG³VHOIGULYLQJFDUV´ $XWRQRPRXVFDUVZLOOEHDEOHWRGULYHWKHPVHOYHVLQFHUWDLQFRQGLWLRQV EXWZLOOPDLQWDLQWKHFDSDELOLW\WREHGULYHQE\SHRSOH7KHGHYHORSPHQW RIDXWRQRPRXVFDUVEHQH¿WVDXWRPDNHUVEHFDXVHWKH\FDQDGYHUWLVHWKDW WKHLUYHKLFOHVKDYHVRSKLVWLFDWHGWHFKQRORJ\$XWRQRPRXVFDUVPXVWEH FDSDEOHRI³JUDFHIXOGHJUDGDWLRQ´RUDVPRRWKWUDQVLWLRQEDFNWRDKXPDQ GULYHU 2+XPDQVRQWKHRWKHUKDQGZLOOQRWEHDEOHWRGULYHVHOIGULYLQJ FDUV7KHVHYHKLFOHVZLOOORRNPDUNHGO\GLIIHUHQWIURPWRGD\¶VFDUVDVWKH\ ZLOOODFNVWHHULQJZKHHOVSHGDOVDQGPLUURUV7KH\FRXOGIRUP³DÀHHWRI VKDUHGYHKLFOHV´WKDWZLOOHQGWUDGLWLRQDOFDURZQHUVKLS 3,QWKDWFDVHWKH\ ZRXOGWKUHDWHQWUDGLWLRQDOFDUPDQXIDFWXUHUVDVIDPLO\FDUVEHFRPHDOX[XU\ LWHP,QGHHG7HVODKDVSURSRVHGWKDWRZQHUVRI$9VFRXOGPDNHPRQH\E\ FRQWULEXWLQJWKHLUFDUVWRWKHÀHHWZKHQWKH\DUHQRWXVLQJWKHPDQDFWLRQ WKDWZRXOGKHOSWRPDNH$9VPRUHDIIRUGDEOH 4 7KH1DWLRQDO+LJKZD\7UDI¿F6DIHW\$GPLQLVWUDWLRQ 1+76$ KDV VSHFL¿HG¿YH³OHYHOV´RIDXWRPDWLRQ³1R$XWRPDWLRQ´  ³)XQFWLRQ 6SHFL¿F$XWRPDWLRQ´  ³&RPELQHG)XQFWLRQ$XWRPDWLRQ´  ³/LPLWHG 6HOI'ULYLQJ$XWRPDWLRQ´  DQG³)XOO6HOI'ULYLQJ$XWRPDWLRQ´   $QLQFUHDVHGOHYHOUHSUHVHQWVPRUHIHDWXUHVZRUNLQJWRJHWKHUZLWKRXWWKH GULYHU¶VLQSXW/HYHO=HURUHSUHVHQWVWUDGLWLRQDOFDUV$W/HYHO2QHWKHFDU ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

123 FDQSHUIRUPVSHFL¿FWDVNVE\LWVHOI$W/HYHO7ZRWKHFDU¶VDXWRQRPRXV FDSDELOLWLHVFDQLQWHUDFWEXWWKHGULYHUVWLOOQHHGVWREHDFWLYH)RUH[DPSOHD /HYHO7ZRFDUFRXOGFRPELQH³DGDSWLYHFUXLVHFRQWURO´DQG³ODQHFHQWHULQJ´ /HYHO7KUHHYHKLFOHVFDQGULYHWKHPVHOYHVLQFHUWDLQHQYLURQPHQWVEXWWKH GULYHUPXVWVWD\DWWHQWLYH 5,WPD\EHGLI¿FXOWKRZHYHUIRUGULYHUVWRIRFXV ZKHQWKH$9LVGRLQJPRVWRIWKHZRUN$W/HYHO)RXUWKHGULYHUGRHVQRW QHHGWRUHPDLQDWWHQWLYHRUHYHQVWD\LQWKHYHKLFOH /HYHO)RXUFDUVZKLFK UHSUHVHQWWKH³VHOIGULYLQJFDUV´GHVFULEHGDERYHZLOOQRWQHHGVWHHULQJ

ZKHHOVEUDNHSHGDOVRURWKHUH[SHFWHGFRPSRQHQWVRIFDUV 2017 January | 1 No. | 1 Volume | ,QWUDGLWLRQDOFDUVKXPDQGULYHUVDUHWKHOLQNEHWZHHQYHKLFOHVDQGWKHLU HQYLURQPHQW'ULYHUVZDWFKWUDI¿FVLJQVDQGVLJQDOVPRQLWRUURDGFRQGLWLRQV DYRLGRWKHUYHKLFOHVFRPPXQLFDWHZLWKRWKHUGULYHUVDQGQDYLJDWH7R IXO¿OOWKHVHIXQFWLRQV$9VHPSOR\VHQVRUVYHKLFOHWRYHKLFOH 99  FRPPXQLFDWLRQVDQGYHKLFOHWRLQIUDVWUXFWXUH 9, FRPPXQLFDWLRQV$9V OLNHRWKHUREMHFWVLQWKH,QWHUQHWRI7KLQJV ,R7 UHO\RQFORXGLQIUDVWUXFWXUH

$QGHUVRQDQGRWKHUVGHVFULEHWKH³VHQVRUVXLWHV´WKDWSURYLGHLQIRUPDWLRQ Security and Intelligence, Cyber, WR$9V)LUVWFDPHUDVJDWKHUGDWDDERXWWKHRXWVLGHZRUOG 7&DPHUDVDUH OLPLWHGE\ZHDWKHUFRQGLWLRQVDQGE\WKHFDSDELOLW\RIVRIWZDUHWKDWFRQYHUWV LPDJHVWRGDWD 6HFRQG$9VUHO\RQVHQVRUV5DGDUDQGOLGDUERWKHPLWD VLJQDODQGWUDFNWKHWLPHWKDWLWWDNHVIRUWKHVLJQDOWRERXQFHRIIRIDQREMHFW DQGUHWXUQWRWKHVHQVRUWRGHWHUPLQHGLVWDQFH 9%RWKWHFKQRORJLHVKDYH OLPLWDWLRQVEHFDXVHVRPHVXUIDFHVGRQRWDGHTXDWHO\UHÀHFWUDGLRZDYHVDQG OLJKW 10 8OWUDVRQLFVHQVRUVGHWHFWQHDUE\REMHFWVZKLOHLQIUDUHGVHQVRUVGHWHFW REMHFWVDWQLJKW 11 7KLUG$9VFDQXVH*36DQGLQWHUQDOQDYLJDWLRQV\VWHPV ,16 IRUORFDWLRQLQIRUPDWLRQ 12 ,16UHOLHVRQJ\URVFRSHVDOWLPHWHUVDQG DFFHOHURPHWHUV 13 )LQDOO\$9VFDQKDYHDFFHVVWRPDSVWKDWLQFOXGHLQIRUPDWLRQ RQWUDI¿FVLJQDOV 14 )RUH[DPSOH*RRJOHKDVGHVLJQHGYHKLFOHVWKDWFROOHFW LQIRUPDWLRQDQGEXLOGYLUWXDOPDSVRIURDGIHDWXUHVDVWKH\GULYH 15 $9VFRPPXQLFDWHZLWKYHKLFXODUDGKRFQHWZRUNV 9$1(7V   9$1(7V ³DUHWKHEDVLVIRULQWHOOLJHQWWUDQVSRUWDWLRQV\VWHPV ,76V ´ 17 9,WHFKQRORJLHV VKDUHLQIRUPDWLRQRQWUDI¿FVLJQDOVDQGRWKHUH[WHUQDOIDFWRUVZLWKFDUV7KHVH V\VWHPVKHOS$9VWRXQGHUVWDQGWKHZRUOGDURXQGWKHP%OXHWRRWKFRXOG EHXVHGWRLPSURYH9,FRPPXQLFDWLRQV  ,QDGGLWLRQ99WHFKQRORJLHV HQDEOHFDUVWRVKDUHLQIRUPDWLRQZLWKHDFKRWKHUDERXWWKHLURZQORFDWLRQDQG VSHHGWRUHGXFHWKHOLNHOLKRRGRIDFUDVK$9VFRPPXQLFDWHZLWKHDFKRWKHU XVLQJGHGLFDWHGVKRUWUDQJHFRPPXQLFDWLRQV '65&  19 7KH86*RYHUQPHQW ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

124 $FFRXQWDELOLW\2I¿FHUHFHQWO\UHOHDVHGDVWXG\RQWKHSRWHQWLDODSSOLFDWLRQ RIWHFKQRORJ\WRFDUVZLWKKXPDQGULYHUV 20 $9VXVHD³VHQVHSODQDFWGHVLJQ´ 21 &DUVGHWHFWLQIRUPDWLRQUXQDOJRULWKPV WRGHWHUPLQHWKHEHVWUHVSRQVHDQGH[HFXWHWKHQHFHVVDU\DFWLRQ$9VDUHDQ H[DPSOHRI³0DVVLYHO\,QWHJUDWHG6\VWHPVRI6PDUW7UDQVGXFHUV´ 0,67  ZKLFK³XVHFORXGFRQFHSWVWRDFTXLUHLQIRUPDWLRQVHQVHWKHLUVXUURXQGLQJV DQGDFWLYHO\LQWHUYHQHLQVLWXDWLRQVWRHIIHFWGHVLUDEOHRXWFRPHV´ 22 $9VSUHVHQWDXQLTXHFKDOOHQJHEHFDXVHWKH\PXVWDWDOOFRVWVHQVXUHWKH

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | VDIHW\RIWKHLUSDVVHQJHUV(QJLQHHUVPXVWHQVXUHWKDWVHQVRUVDUHHIIHFWLYHLQ DOOW\SHVRIZHDWKHUDQGWUDI¿FFRQGLWLRQV7KH\PXVWSURWHFWWKHVHVHQVRUV IURPRXWVLGHLQWHUIHUHQFHZKLFKFRXOGWKUHDWHQWKHVDIHW\RIWKHSDVVHQJHUV LQWKH$9DQGLQQHLJKERULQJYHKLFOHVF\EHUVHFXULW\WKHUHIRUHEHFRPHVD NH\FRQFHUQLQWKHSURGXFWLRQRI$9V

Towards a Collective Vehicular Network 99DQG9,FRPPXQLFDWLRQVHQDEOHWKHFUHDWLRQRID³FROOHFWLYHYHKLFXODU Cyber, Intelligence, and Security Security and Intelligence, Cyber, QHWZRUN´+XPDQVFDUVDQGLQIUDVWUXFWXUHFRPPXQLFDWHLQWKLVQHWZRUNWR FUHDWHHI¿FLHQWYHKLFOHV&DUVOHDUQRIZHDWKHUFRQGLWLRQVDQGRWKHULQIRUPDWLRQ WKURXJKFORXGLQIUDVWUXFWXUH&DUVZLOOQHHGWRGHDOZLWKKXPDQGULYHUVDW ¿UVWEXWHYHQWXDOO\ZLOOFRPPXQLFDWHVROHO\ZLWKHDFKRWKHU,QDQHWZRUN ZLWKRXWKXPDQGULYHUVSURJUDPPHUVZLOOQHHGWRGHWHUPLQHPHWKRGVWR LQFUHDVHWKHÀRZRIWUDI¿F5LHQHUSUHGLFWVWKDWWKHIXWXUHRIDXWRQRPRXV FDUVLVDVKDUHGÀHHWLQZKLFKDSDVVHQJHUFDQRUGHUDFDUIRUDWULSDQGWKHQ DOORZWKHFDUWRUHWXUQWRDFHQWUDOORFDWLRQ 23 /LNHVHQVRUV99DQG9,FRPPXQLFDWLRQSUHVHQWF\EHUVHFXULW\ FKDOOHQJHV0DOLFLRXVFRPPXQLFDWLRQFRXOGFRQFHDORULQYHQWURDGKD]DUGV 7KHVHLPDJLQHGKD]DUGVZRXOGFDXVHWKHFDUWREHKDYHHUUDWLFDOO\0RUH DGYDQFHGKDFNHUVFRXOGXVHWKH$9¶VFRPPXQLFDWLRQVV\VWHPWRDFFHVVWKH FDU¶VFHQWUDOFRPSXWHUDQGJDLQFRQWURORIWKH$9¶VVWHHULQJDQGEUDNLQJ,W ZLOOEHQHFHVVDU\WKHUHIRUHWRVHFXUHWKHH[WHUQDOFRPPXQLFDWLRQVRIWKH$9V

Current Industry Trends ,QWKHUDFHWRGHYHORSVHFXUH$9VDUHERWKWUDGLWLRQDODXWRPDNHUVDQG WHFKQRORJ\FRPSDQLHV&RPSDQLHVLQFOXGH9RONVZDJHQ0HUFHGHV%HQ]7HVOD %RVFK8EHU/RFNKHHG0DUWLQ*RRJOH$SSOHDQGRWKHUV'HYHORSPHQWKDV H[WHQGHGWRWUXFNVDQGPLOLWDU\YHKLFOHV 24 (ORQ0XVNWKHIRXQGHURI7HVOD ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

125 UHFHQWO\SUHGLFWHGWKDWPRVWFDUVZLOOEHDXWRQRPRXVE\RU 25 8EHUUHFHQWO\HVWDEOLVKHGDODELQ3LWWVEXUJKLQZKLFKDODUJHFRQWLQJHQW RI&DUQHJLH0HOORQ8QLYHUVLW\JUDGXDWHVLVUHVHDUFKLQJVHOIGULYLQJFDUV 0HDQZKLOH*RRJOHKDVVHQWFDUVFUXLVLQJWKURXJKPLOHVZLWKRXW DQ\DFFLGHQWVFDXVHGE\LWVFDUV  7UDGLWLRQDODXWRPDQXIDFWXUHUVRUWHFKQRORJ\FRPSDQLHVKDYHGLIIHUHQW VWUHQJWKVOHDGLQJWRGHEDWHVDERXWZKLFKW\SHRIGHYHORSHUZLOOEHPRUH VXFFHVVIXO7UDGLWLRQDODXWRPRWLYHFRPSDQLHVDUHEHWWHUHTXLSSHGWRKDQGOH

FKDOOHQJHVWKDWDUHXQLTXHWRDXWRPDQXIDFWXUHUVDQGFDQJUDGXDOO\SKDVHLQ 2017 January | 1 No. | 1 Volume | QHZIHDWXUHV0HDQZKLOHWHFKQRORJ\FRPSDQLHVPD\IDFHDXVHUDFFHSWDQFH SUREOHPLIWKH\MXPSLQWRWKHDXWRPRWLYHPDUNHW$WWKHVDPHWLPHRQH *RRJOHH[HFXWLYHDUJXHGWKDWLWVSODQWRPRYHLQWRVHOOLQJIXOO\DXWRQRPRXV FDUVFRXOGSURYHWREHDPRUHHIIHFWLYHEXVLQHVVVWUDWHJ\ 27 0DQXIDFWXUHUVPXVWGHYHORS³XVHUDFFHSWDQFH´RI$9VWKURXJKLQQRYDWLYH GHVLJQDGYDQFHGVHFXULW\DQGZHOOSXEOLFL]HGVWDWLVWLFV)LUVWVHOIGULYLQJ

FDUV DW/HYHORQWKH1+76$VFDOH FRXOGUHSODFHWKHVWHHULQJZKHHOZLWK Security and Intelligence, Cyber, DGLVSOD\WKDWLQVSLUHVFRQ¿GHQFHLQWKHFDU  6HFRQGVHFXULW\H[SHUWVPXVW FRQVLGHUWKHULVNVRIGDWDH[SORLWDWLRQDQGGLUHFWDWWDFN$FRQJUHVVLRQDO KHDULQJRQWKHVXEMHFWDFNQRZOHGJHGWKDW³KDFNLQJFRXOGWKUHDWHQZLGHVSUHDG DFFHSWDQFH´RI$9VDVFRQFHUQVJURZRYHUGDWDVHFXULW\DQGSHUVRQDOVDIHW\ 29 8VHUVFRXOGEHFRQFHUQHGWKDWWKHLUFDUV¶99FRPPXQLFDWLRQVDUHQRW SURWHFWHG 30 7KH\FRXOGDOVRKDYHFRQFHUQVDERXWDWWDFNVRQWKHVDIHRSHUDWLRQ RIWKHFDULWVHOI7KLUGPDQXIDFWXUHUVFRXOGVWUHVVWKHIDFWWKDW$9VDUHVDIHU WKDQKXPDQGULYHQYHKLFOHV 31 &DUFUDVKHVSHUFHQWRIZKLFKDUHFDXVHG E\³KXPDQHUURU´WRRNOLYHVLQ 32 These violent events cost DSSUR[LPDWHO\ELOOLRQSHU\HDU 33 $9VFRXOGKHOSWRPRYHWRZDUGWKH ³XOWLPDWHJRDO´RIEHLQJ³WKHVDIHVWDQGPRVWHI¿FLHQWWUDQVSRUWDWLRQV\VWHP LPDJLQDEOH´ 34 +RZHYHULIDQ$9GRHVFUDVKWKHPHGLDZLOOGLVFXVVWKH HYHQWPRUHWKDQLWZRXOGGLVFXVVDQRUGLQDU\FDUDFFLGHQW)RUH[DPSOHWKH ¿UVWHYHUGHDWKLQDQ$9FUDVKRFFXUUHGLQ-XQHZKHQD7HVODFUDVKHG LQWRDWXUQLQJWUDFWRUWUDLOHU 35 $OWKRXJKWKHFUDVKUHFHLYHGVLJQL¿FDQWPHGLD FRYHUDJH7HVODZDVTXLFNWRUHDVVXUHWKHSXEOLFWKDWHYHQDIWHUWKHFUDVK WKHDXWRSLORWIHDWXUHKDVDORZHUGHDWKUDWHWKDQKXPDQGULYHUV  ,WLVDOVRSRVVLEOHWRSURPRWHXVHUDFFHSWDQFHE\VWUHVVLQJWKHRWKHU EHQH¿WVRI$9V7KHVHLQFOXGHJUHDWHUPRELOLW\IRUSHRSOHZKRDUHXQDEOH WRGULYHDVPDOOHUGHSHQGHQFHRQSDUNLQJDQGSRWHQWLDOHQYLURQPHQWDO ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

126 EHQH¿WV 37 0DQXIDFWXUHUVVKRXOGHPSKDVL]HWKDWWKHVHEHQH¿WVRXWZHLJK WKHSRWHQWLDOLQFUHDVHLQWRWDOPLOHVWUDYHOHGDQGWKHOLNHO\GHFUHDVHLQWKH QXPEHURISURIHVVLRQDOGULYLQJMREV 

Vulnerabilities 7RGD\ODUJHVFDOHKDFNVDUHERWKLQHI¿FLHQWDQGH[SHQVLYHEHFDXVHFDUVXVH GLIIHUHQWFRPSXWHUV\VWHPV$VFDUVEHFRPHLQWHJUDWHGWKURXJKDGYDQFHG FRPPXQLFDWLRQVV\VWHPVDQGYHKLFXODUQHWZRUNVKRZHYHUODUJHVFDOH

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | KDFNVPD\EHFRPHSRVVLEOH0RUHRYHUKDFNVRILQGLYLGXDOFDUVDUHDOUHDG\ SRVVLEOHWZRKDFNHUVIRUH[DPSOHZHUHDEOHWRFRQWUROWKHVWHHULQJEUDNLQJ DQGDFFHOHUDWLRQRIDMHHSWKURXJKWKHFDU¶V8FRQQHFWV\VWHP7KHMHHS¶V HQWHUWDLQPHQWV\VWHPZDVFRQQHFWHGWRLWVVWHHULQJDQGEUHDNLQJFRQWUROV WKURXJKLWVFRPSXWHUQHWZRUNNQRZQDVWKH³&$1EXV´ 39 $9VKDYHHYHQ PRUHFRQQHFWLRQVZLWKWKHRXWVLGHZRUOGDQGJUHDWHUFRPSXWHUL]HGFRQWURO RIWKHFDU¶VV\VWHPVWKDQWKHKDFNHGMHHSLQFUHDVLQJWKHYXOQHUDELOLW\RI WKHVHW\SHVRIFDUV8EHUUHFHQWO\KLUHGWKHWZRKDFNHUVWRLPSURYHLWVRZQ Cyber, Intelligence, and Security Security and Intelligence, Cyber, YHKLFOHV¶VHFXULW\ 40 &DUPDQXIDFWXUHUVPXVWSURDFWLYHO\SURWHFW$9VIURPKDFNVGLUHFWHGDW VRIWZDUHXSGDWHVVHQVRUVDQGFRPPXQLFDWLRQVQHWZRUNV)LUVWDOWKRXJK VRIWZDUHXSGDWHVDUHQHFHVVDU\IRU$9VWRIXQFWLRQHIIHFWLYHO\WKH\DUH DOVRDPDMRUYXOQHUDELOLW\ 41 ,IWKHXSGDWHVDUHLQVWDOOHGRQOLQHWKHV\VWHP EHFRPHVHYHQPRUHDWULVN 42 6HFRQG$9V¶VHQVRUVFDQEHIRROHG,IDQ$9 PLVWDNHQO\GHWHFWVDSHGHVWULDQRQWKHURDGWKHFDUFRXOGVXGGHQO\VWRS 43 ,QGHHGOLGDUVHQVRUVFDQEHIRROHGZLWKDVL[W\GROODUODVHU 44 There is also DULVNWKDWGULYHUVFRXOG³MDLOEUHDN´WKHLUFDUVRUKDFNWKHLURZQYHKLFOHVWR FKDQJHWKHZD\WKDWWKH\EHKDYH 45 2ZQHUVZKR³MDLOEUHDN´WKHLUFDUVZRXOG LQFUHDVHFRQWUROEXWULVNVHFXULW\  7KDWULVNLQFUHDVHVZKHQDMDLOEURNHQFDU GULYHVQHDUDQRUGLQDU\FDUWKDWH[SHFWVLWWRDFWLQDFHUWDLQZD\)LQDOO\WKH IDFWWKDW$9VZLOOEHFRQQHFWHGWRHDFKRWKHUE\FRPPXQLFDWLRQVQHWZRUNV ZLOOFDXVHDGGLWLRQDOYXOQHUDELOLWLHV$WWDFNVRQ999,DQG*36FDQ WDUJHWVDIHW\XVHUDFFHSWDQFHDQGSULYDF\ 47 99FRPPXQLFDWLRQLVWKHUHIRUH YXOQHUDEOHWRERWKFRPSXWHUQHWZRUNH[SORLW &1( DQGFRPSXWHUQHWZRUN DWWDFN &1$ &1(DJDLQVWDQ$9¶VFRPPXQLFDWLRQVFRXOGWDUJHWWKHYLFWLP¶V SULYDF\  'DWDDERXWZKHUHDFHUWDLQGULYHUWUDYHOHGFRXOGWKHQEHXVHG DJDLQVWKLPRUKHU&1$DJDLQVWDQ$9FRXOGJHQHUDWHDQGUHSRUW¿FWLRQDO LOOHJDODFWLYLW\FDXVLQJXQIRUWXQDWHUHSHUFXVVLRQVIRUWKHGULYHU 49 +DFNHUV ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

127 RI99FRPPXQLFDWLRQVFDQWDUJHWNH\VVRIWZDUHVHQVRUVDQGRXWJRLQJ FRPPXQLFDWLRQV 50 'R6DWWDFNVFRXOGRYHUORDGWKHFDUZLWKLQIRUPDWLRQRU SUHYHQWWKHFDUIURPVHQGLQJVLJQDOV 51 /DFH\LGHQWL¿HVWKUHHW\SHVRIDWWDFNDJDLQVW99DQG9,FRPPXQLFDWLRQV $KDFNHUFDQXVH³PHVVDJHOLQNLQJ´DQGWUDFNWKH99³%DVLF6DIHW\ 0HVVDJH´WRGLVFRYHUWKHORFDWLRQRIDFDU,QD³IUDPLQJDWWDFN´WKHKDFNHU ¿UVWVWHDOVWKHFDU¶VRQOLQHFHUWL¿FDWHWKHQVHQGVLQFRUUHFWPHVVDJHVWR VKRZ¿FWLRQDOLOOHJDOGULYLQJ$³IUDPLQJDWWDFN´FRXOGFDXVHWKHDUUHVWRI

DQLQQRFHQWGULYHU,QD³6\ELODWWDFN´DKDFNHUVWHDOVFHUWL¿FDWHVRIPDQ\ 2017 January | 1 No. | 1 Volume | FDUVWKHQVHQGVPHVVDJHVIURPHDFKFDUWKDWSRLQWWRDVLQJOHFDU¶VLOOHJDO GULYLQJ 52 $³6\ELODWWDFN´FRXOGDOVRIUDPHDODZDELGLQJGULYHU(DFKRI WKHVHYXOQHUDELOLWLHVUHSUHVHQWVDQREVWDFOHRQWKHUDFHFRXUVHWRGHYHORS VHFXUH$9V$VPDQXIDFWXUHUVDQGWHFKQRORJ\FRPSDQLHV¿QGQHZVROXWLRQV WKH\ZLOOPRYHFORVHUWRYLFWRU\

Hacking Motivations Cyber, Intelligence, and Security Security and Intelligence, Cyber, 7HUURULVPLVDPDMRUWKUHDWWR$9V)RUDQDVSLULQJLQWHUQDWLRQDOWHUURULVWZLWK WHFKQLFDOH[SHUWLVHKDFNLQJRQHRUPXOWLSOH$9VZRXOGEHDQH[FHOOHQWZD\ WRFUHDWHYLVLEOHFDUQDJH(YHQDVPDOOVFDOHKDFNRIDIHZFDUVFRXOGVKXW GRZQWUDQVSRUWDWLRQ$QDWWDFNZRXOGFDXVHIHDUDPRQJFRPPXWHUVLQ$9V DQGWUDGLWLRQDOYHKLFOHVDOLNHEHFDXVHLIDKDFNHG$9LVRQWKHURDGQRFDU LVVDIH7KLVIHDUFRXOGUHVXOWLQDGHFOLQHLQFDUXVDJHDQGDVORZGRZQRIWKH 86HFRQRP\,QGHHGDIWHUWKHDWWDFNVRI6HSWHPEHUDLUSODQHWUDYHO GHFUHDVHG³GUDPDWLFDOO\´DQGGLGQRWUHFRYHUXQWLO 53 $9VFRXOGDOVR EHDXVHIXOZD\IRUWHUURULVWVWRDVVDVVLQDWHVSHFL¿FWDUJHWV$ZHOOGLVJXLVHG DWWDFNRQDVLQJOHFDUPD\UHJLVWHUDVDWHFKQLFDOPDOIXQFWLRQ +DFNHUVFRXOGDOVRWDUJHW$9VWRWU\WREODFNPDLOFRQVXPHUVRUWKH86 JRYHUQPHQW,IDFRQVXPHUUHFHLYHGDQRWL¿FDWLRQIURPWKHLUFDUWKDWWKH FDUZRXOGGHOLEHUDWHO\FUDVKXQOHVVPRQH\ZDVVHQWWRDQRQOLQHDFFRXQW WKHFRQVXPHUPD\EHIRUFHGWRFRPSO\6LPLODUO\DFULPLQDORUJDQL]DWLRQ FRXOGWHOOWKH86JRYHUQPHQWWKDWLWKDGKDFNHGVHYHUDOXQLGHQWL¿HGFDUV,W FRXOGWKHQIRUFHWKHJRYHUQPHQWWRPHHWLWVGHPDQGVRUWKUHDWHQWRODXQFK DPDVVLYHDWWDFN/XFNLO\DQHFRQRPLFDOO\PRWLYDWHGKDFNHUZRXOG¿QG WKHSURFHVVRIKDFNLQJDQ$9WREHH[SHQVLYH 54 +DFNLQJ$9VZLOORQO\EH DWWUDFWLYHLIKDFNHUVFDQ¿QGDZD\WRPDNHDSUR¿W 55 ,QDGGLWLRQDVRQH white hat hacker points out, the people who have the technical knowledge ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

128 QHFHVVDU\WRKDFNFDUV¶FRPPXQLFDWLRQVV\VWHPVJHQHUDOO\GRQRWZDQWWR NLOOSHRSOH  $JUDYHUULVNLVSROLWLFDOEODFNPDLO7KHJURXS$QRQ\PRXV IRUH[DPSOHFRXOGKDFN$9VWRGHPDQGWKDWWKH86JRYHUQPHQWFKDQJH FHUWDLQSROLFLHV)RUHLJQJRYHUQPHQWVDUHOHVVRIDWKUHDWWKDQWHUURULVWVDQG FULPLQDOV7KH\FRXOGWDUJHW$9V¶FRPPXQLFDWLRQVQHWZRUNEXWWKHUHVXOWLQJ GLVUXSWLRQRIWKH86HFRQRP\ZRXOGOLNHO\DIIHFWWKHLURZQHFRQRP\DVZHOO ,WLVULVN\KRZHYHUWRUHO\RQRWKHUJRYHUQPHQWVWRPDNHWKLVFDOFXODWLRQ

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | Potential Solutions 7RUHGXFHWKHSUREDELOLW\RIF\EHUDWWDFNVRQ$9VLWLVQHFHVVDU\WRVHFXUHFORXG LQIUDVWUXFWXUHSURWHFWWHOHFRPPXQLFDWLRQVDQGH[DPLQHWKHYXOQHUDELOLWLHV VSHFL¿FWR$9V7KH¿QDOFDWHJRU\LQFOXGHVDUDQJHRIWHFKQLFDODQGOHJDO VROXWLRQV 3URWHFWLQJFORXGLQIUDVWUXFWXUHIURPF\EHUDWWDFNVLVHVVHQWLDOIRUWKHVHFXULW\ RI$9V7RVHFXUHWKHFORXGWHFKQRORJ\FRPSDQLHVVKRXOGEHUHTXLUHGWR IROORZ³EHVWSUDFWLFHVRIDSSOLFDWLRQVHFXULW\´WREHJUDQWHGDFFHVVWRWKH Cyber, Intelligence, and Security Security and Intelligence, Cyber, QHWZRUN 57 Rigorous testing and reporting practices will help to ensure a VHFXUHQHWZRUN  )LQDOO\F\EHUVHFXULW\WHDPVPXVWDFWOLNH³¿UH¿JKWHUV´ UHDG\WRUHVSRQGWRF\EHUDWWDFNVTXLFNO\ 59 3URWHFWLQJWHOHFRPPXQLFDWLRQVLQFOXGLQJ99DQG9,LVHVVHQWLDO IRUSULYDF\DQGVHFXULW\(GXFDWLRQFROODERUDWLRQWKDWUHVSHFWVSULYDF\ ULJKWVODZVDQGOHDGHUVKLSFDQSURWHFWWHOHFRPPXQLFDWLRQVLQIUDVWUXFWXUH IURPF\EHUDWWDFNV  )RUHIIHFWLYH99DQG9,FRPPXQLFDWLRQYHKLFOHV FDQVHQGRXWRQHZD\XQHQFU\SWHG³%DVLF6DIHW\0HVVDJHV´WKDWFDQEH UHDGE\QHDUE\YHKLFOHVLQDGGLWLRQWRWZRZD\HQFU\SWHG³WUXVWHGDQG VHFXUHFRPPXQLFDWLRQV´  2QH,VUDHOLVWDUWXSFDOOHG$UJRVIRUH[DPSOH LVGHYHORSLQJDZD\WRGHWHUPLQHZKLFKPHVVDJHVDUHOHJLWLPDWHDQGZKLFK DUHPDOLFLRXV  7KHUHDUHDOVRSRWHQWLDOVROXWLRQVWKDWDUHVSHFL¿FWR$9V7KHVHVROXWLRQV ZKHQFRPELQHGUHGXFHWKHOLNHOLKRRGRIDVXFFHVVIXODWWDFNDJDLQVWDQ$9 )LUVWGHYHORSHUVZLOOQHHGWRKDYHDFOHDUXQGHUVWDQGLQJRIWUDI¿FSDWWHUQV DQGWKHZD\WKDW$9VLQWHUDFWZLWKRWKHUFDUVF\FOLVWVDQGSHGHVWULDQV7KLV XQGHUVWDQGLQJZLOOHQDEOHWKHPWRGLVWLQJXLVKQRUPDOGULYLQJEHKDYLRUIURP KDFNHGEHKDYLRU6HFRQGWKH\ZLOOQHHGWRHQVXUHWKDWDJLYHQ$9RUVRIWZDUH XSGDWHVRXUFHFDQEHSRVLWLYHO\LGHQWL¿HG3XEOLF.H\,QIUDVWUXFWXUH 3.,  FRXOGPDQDJHWKHLGHQWLI\LQJFHUWL¿FDWHVRI$9VRQOLQH  $³&HUWL¿FDWH ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

129 $XWKRULW\´ZRXOGEHUHVSRQVLEOHIRUDVVLJQLQJRQOLQHFHUWL¿FDWHVWR$9V  7KHV\VWHPWKDWDVVLJQVWKRVHFHUWL¿FDWHVFRXOGEH³FHQWUDOL]HGGHFHQWUDOL]HG RUK\EULG´  7KHFHUWL¿FDWHVZRXOGLGHQWLI\FDUVWKDWEHORQJLQWKHV\VWHP  1H[WFRPSDQLHVZLOOQHHGWRHQVXUHWKDWFDUVFDQLGHQWLI\OHJLWLPDWHVRIWZDUH XSGDWHV$9VFDQGLVWLQJXLVKEHWZHHQOHJLWLPDWHDQGPDOLFLRXVVRIWZDUH XSGDWHVWKURXJK³KDQGVKDNH´PHFKDQLVPV  T KHUHDUHDOVRDUDQJHRI WHFKQLFDOVROXWLRQVWKDWHQDEOHFDUV¶FRPSXWHUV\VWHPVWRPDNHVXUHWKDW WKH\DUHFRQQHFWHGWRWKHFRUUHFWFDUDQGWKDWWKH\DUHUXQQLQJOHJLWLPDWH

VRIWZDUH  ³3ODXVLELOLW\FKHFNV´OLPLWWKHVRIWZDUHWKDWFDQUXQRQDFDU¶V 2017 January | 1 No. | 1 Volume | ³HOHFWURQLFFRQWUROXQLW´ (&8   ³&RPSRQHQWLGHQWL¿FDWLRQ´SDLUVRQH(&8 ZLWKRQHFDU 70 $QRWKHUSLHFHRIVRIWZDUHDWWHPSWVWRGHWHFWXQXVXDOGDWD 71 7KLUG$9GHYHORSHUVVKRXOGVHSDUDWHHVVHQWLDODQGQRQHVVHQWLDOFRPSXWHU V\VWHPV7KH-HHSKDFNGHPRQVWUDWHGWKHYXOQHUDELOLW\RIFDUVZKRVH IXQFWLRQVDUHDOOOLQNHGHOHFWURQLFDOO\&DPHNDQGRWKHUVUHFRPPHQGWKDW car PDQXIDFWXUHUVEXLOGFDUVZLWK³PXOWLSOHLQGHSHQGHQWOD\HUVRIVHFXULW\´

0,/6 WKDWDUH³DGDSWLYH´DQG³GLVWULEXWHG´³0,/6DUFKLWHFWXUH´HVWDEOLVKHV Security and Intelligence, Cyber, DEDUULHUEHWZHHQHVVHQWLDODQGQRQHVVHQWLDOFRPSXWHUVLQWKHFDU7KH VHSDUDWLRQRIFRPSXWHUV\VWHPVFDQSUHYHQWDYLUXVIURPUHDFKLQJDFDU¶V HVVHQWLDOIXQFWLRQV 72 $³GLVWULEXWHG´V\VWHPZRXOGDOORZ0,/6DUFKLWHFWXUH WRIXQFWLRQDFURVVPXOWLSOHFRPSXWHUV$Q³DGDSWLYH´V\VWHPFDQEHXSGDWHG ZLWKQHZFDSDELOLWLHV 73 7KHVHHOHPHQWVZLOOKHOSWRUHGXFHWKHOLNHOLKRRG RIDWWDFNRQIXWXUH$9V )RXUWKPDQXIDFWXUHUVVKRXOGH[SORUHDGGLWLRQDOWHFKQLFDOVROXWLRQV ³%ODFNER[HV´ZKLFKZHUHRULJLQDOO\XVHGLQDLUSODQHVFDQUHFRUGGDWDRQ FUDVKHVZLWKRXWQHFHVVDULO\UHFRUGLQJSULYDWH*36GDWD 74 7KLVGDWDFDQEH XVHGWRXQGHUVWDQGPLVWDNHVWKDWOHGWRDFUDVKDQGFRXOGSURYLGHDFOXHDV WRZKHWKHUWKHYHKLFOHZDVKDFNHG$9VVKRXOGDOVREHHTXLSSHGZLWKD³VDIH PRGH´LQZKLFKWKHFDU¶VDXWRQRPRXVIHDWXUHVFDQEHGLVDEOHG 75 ,QWKHHYHQW RIDKDFNDGULYHUFRXOGWKHQVDIHO\JDLQFRQWURORIWKHYHKLFOH)RUD³VDIH PRGH´WRH[LVW$9VZRXOGQHHGWRPDLQWDLQWKHWUDGLWLRQDOVWHHULQJZKHHO DQGEUDNHSHGDO0DQXIDFWXUHUVVKRXOGDOVRDGKHUHWRLQGXVWU\VWDQGDUGV DQGH[WHQVLYHO\WHVWWKHLUYHKLFOHV  )LIWKZKLOHPDQ\HIIRUWVKDYHEHHQWDNHQWRSURWHFW$9VIURPWHFKQLFDO FKDOOHQJHVLWLVXVHIXOWRH[SORUHOHJDOVROXWLRQV7KHULJKWODZVFRXOGERWK GHWHUKDFNHUVDQGPDNHKDFNLQJPRUHGLI¿FXOW,QGHHGYDULRXVVWDWHVDUH DOUHDG\LPSOHPHQWLQJODZVDERXWWKHWHVWLQJRIDXWRQRPRXVYHKLFOHV 77 The ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

130 VWDWHVVKRXOGDLPWRLPSOHPHQWODZVWKDWUHTXLUH$9PDNHUVWRIROORZVHFXULW\ EHVWSUDFWLFHV6WDWHDQGQDWLRQDOOHJLVODWXUHVFDQDOVRPDNHOHJLVODWLRQWKDW SURWHFWVFHUWL¿FDWHV$VLWLVLPSRVVLEOHWRGHVLJQDFDUZKRVHKDUGZDUHLV WDPSHUSURRIODZVZLOOQHHGWRGHWHUSHRSOHIURPVWHDOLQJVRIWZDUHNH\V RQFHWKH\KDYHSK\VLFDODFFHVVWRDYHKLFOH  ,QDGGLWLRQWKH\FDQGHYHORS ODZVWKDWSURWHFWH[LVWLQJDXWRQRPRXVV\VWHPVVXFKDVWKRVHXVHGE\DLU FRQWUROV\VWHPV7KHVHODZVFRXOGEHH[WHQGHGWRFRYHU$9VDVWKH\EHFRPH PRUHFRPPRQ

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | 6L[WKFRXUWVDQGSULYDWHFRPSDQLHVFDQDOVRSOD\DUROH&RXUWVPXVW GHWHUPLQHKRZWRUHVSRQGWRDFFLGHQWVWKDWDUHFDXVHGE\KDFNV&RPSDQLHV WKDWJDWKHUGDWDRQ$9VVKRXOGEHOHJDOO\UHVSRQVLEOHWRSURWHFWWKDWGDWD 79 7KHUHTXLUHPHQWVZLOOHQFRXUDJHWKHFRPSDQLHVWRLQYHVWLQGDWDVHFXULW\

Ethical Dilemmas $9VDSSO\FORXGLQIUDVWUXFWXUHWROLIHDQGGHDWKVLWXDWLRQVDQGWKHUHIRUH UDLVHPDQ\HWKLFDOTXHVWLRQV:KLOHDIXOOHWKLFDOGLVFXVVLRQLVEH\RQGWKH Cyber, Intelligence, and Security Security and Intelligence, Cyber, VFRSHRIWKLVSDSHULWLVXVHIXOWRUHYLHZVRPHRIWKHH[LVWLQJOLWHUDWXUHDQG RQJRLQJTXHVWLRQV(WKLFDOV\VWHPVFDQIRFXVRQXWLOLWDULDQLVPULJKWVMXVWLFH WKH³FRPPRQJRRG´RUYLUWXHV  ,EHJLQZLWKDXWLOLWDULDQDSSURDFKEHFDXVH $9VVHHNWRVDYHDVPDQ\OLYHVDVSRVVLEOH$FFRUGLQJWR$OH[DQGHU.RWW ³VHOIGULYLQJFDUVZLOONLOOSHRSOHEXWIHZHUSHRSOH´  )URPDXWLOLWDULDQ SRLQWRIYLHZWKHREYLRXVFKRLFHLVWRLPSOHPHQWDXWRQRP\ Turck goes a VWHSIXUWKHUDQGDUJXHVWKDWDQ$9VKRXOGEHSURJUDPPHGQRWRQO\WRVDYH OLYHVEXWDOVRWRNHHSWUDI¿FÀRZLQJVPRRWKO\IRUPLOOLRQVRIRWKHUGULYHUV  6LQFH$9V¶DOJRULWKPVDUHZULWWHQLQDGYDQFHHYHU\WUDGHRIILQWHUPV RIOLYHVDQGFRQYHQLHQFHLVPDGHDKHDGRIWLPH:KHQFRGHUVSURJUDP $9V¶DOJRULWKPVWKH\ZLOOQHHGWRPDNHWKHDOJRULWKPV³FRQVLVWHQW´DYRLG ³SXEOLFRXWUDJH´DQG³QRW>GLVFRXUDJH@EX\HUV´  $9PDNHUVZLOOQHHG WRFKRRVHEHWZHHQNLOOLQJSHGHVWULDQVDQGGULYHUV)URZHDUJXHVWKDWE\ FKRRVLQJWRJHWLQWRDFDUDGULYHUDVVXPHVUHVSRQVLELOLW\DQGWKHUHIRUH VKRXOGULVNEHLQJNLOOHGEHIRUHDSHGHVWULDQ  3V\FKRORJLVWVDQGSROOLQJGDWD ZLOOEHUHTXLUHGWRFRQVWUXFWDFFHSWDEOHDOJRULWKPVDVLQGLYLGXDOVFRXOGEH UHOXFWDQWWRJHWLQDXWLOLWDULDQYHKLFOHWKDWPD\NLOOWKHPEXWPD\VDYHD SHGHVWULDQ  &RQVLVWHQF\LQDOJRULWKPVLVDOVRHVVHQWLDORWKHUZLVHWKHUH FRXOGEHHFRQRPLFGLVFULPLQDWLRQDVWKRVHFDSDEOHRISXUFKDVLQJFDUVWKDW SURWHFWWKHGULYHUZLOOGRVR ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

131 ,WLVDOVRFKDOOHQJLQJWRH[DPLQHZKRLVUHVSRQVLEOHIRUDFUDVK$V$9V EHFRPHPRUHFRPPRQLWZLOOEHQHFHVVDU\WRGHWHUPLQHZKHWKHUPDQXIDFWXUHUV RUWKHSHUVRQLQWKHIURQWVHDWRIWKH$9LVUHVSRQVLEOH  The answer could GHSHQGRQZKHWKHUWKHFDULVDXWRQRPRXV /HYHO RUVHOIGULYLQJ /HYHO  )LQDOO\WKHUHLVWKHLVVXHRIDQDXWRQRPRXVYHKLFOHQHWZRUNWKDWWDNHV DZD\LQGLYLGXDOIUHHGRPV,IWKHJRYHUQPHQWFRQWUROVWKHQHWZRUNLWFRXOG GHWHUPLQHQRWRQO\GULYHUV¶VSHHGEXWDOVRWKHLUGHVWLQDWLRQ$FROOHFWLYH YHKLFXODUQHWZRUNFRXOGWKHUHIRUHJLYHULVHWRDJRYHUQPHQWWKDWFRQWUROV

LQGLYLGXDOV¶WUDQVSRUWDWLRQ  2017 January | 1 No. | 1 Volume |

Implications and Areas of Further Research 6RVKRXOGDXWRPDNHUVWKURZLQWKHWRZHO"$UHWKHXQLTXHVHFXULW\DQGWHFKQLFDO FKDOOHQJHVVRJUHDWWKDWWHFKQRORJ\FRPSDQLHVDQGFDUPDQXIDFWXUHUVVKRXOG SXW$9VRQKROGXQWLOWKH\DUHPRUHVHFXUH"$EVROXWHO\QRW$9GHYHORSHUV VKRXOGFRQWLQXHWRUDFHDKHDGEHFDXVH$9VHYHQZLWKWKHLULPSHUIHFWLRQV FDQSUHYHQWFUDVKHVDQGVDYHOLYHV(ORQ0XVNWKHIRXQGHURI7HVODUHFHQWO\ Cyber, Intelligence, and Security Security and Intelligence, Cyber, PDGHWKLVSRLQW+HZURWHWKDWWKHFRPSDQ\LVQRWZDLWLQJWRUHOHDVH$9V EHFDXVH³ZKHQXVHGFRUUHFWO\>DXWRQRP\@LVDOUHDG\VLJQL¿FDQWO\VDIHUWKDQD SHUVRQGULYLQJE\WKHPVHOYHVDQGLWZRXOGWKHUHIRUHEHPRUDOO\UHSUHKHQVLEOH WRGHOD\UHOHDVHVLPSO\IRUIHDURIEDGSUHVVRUVRPHPHUFDQWLOHFDOFXODWLRQRI OHJDOOLDELOLW\´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| PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

132 Notes  ,VDDF$VLPRY³6DOO\´LQ Nightfall Two  )URJPRUH*UDQDGD   -DPHV0$QGHUVRQ1LGKL.DOUD.DUO\Q'6WDQOH\3DXO6RUHQVHQ&RQVWDQWLQH 6DPDUDVDQG2OXZDWREL$2OXZDWROD Autonomous Vehicle Technology: A Guide for Policymakers  6DQWD0RQLFD5$1' S  ³:K\$XWRQRPRXVDQG6HOI'ULYLQJ&DUV$UH1RWWKH6DPH´ Economist -XO\ KWWSZZZHFRQRPLVWFRPEORJVHFRQRPLVWH[SODLQVHFRQRPLVW H[SODLQV  (ORQ0XVN³0DVWHU3ODQ3DUW'HX[´ Tesla  EORJ , -XO\KWWSVZZZ WHVODFRPEORJPDVWHUSODQSDUWGHX[ | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume |  ³86'HSDUWPHQWRI7UDQVSRUWDWLRQ5HOHDVHV3ROLF\RQ$XWRPDWHG9HKLFOH 'HYHORSPHQW´ NHTSA 0D\KWWSZZZQKWVDJRY$ERXW1+76$ 3UHVV5HOHDVHV86'HSDUWPHQWRI7UDQVSRUWDWLRQ5HOHDVHV3ROLF\RQ$XWR PDWHG9HKLFOH'HYHORSPHQW  ,ELG 7 Anderson and others, Autonomous Vehicle Technology S  ,ELGS  ,ELGSS±  ,ELG Cyber, Intelligence, and Security Security and Intelligence, Cyber,  ,ELGS  ,ELGS  ³+RZ'RHVD6HOI'ULYLQJ&DU:RUN"´ Economist , April 29, 2013, KWWSZZZHFRQRPLVWFRPEORJVHFRQRPLVWH[SODLQVHFRQRPLVW H[SODLQVKRZVHOIGULYLQJFDUZRUNVGULYHUOHVV"IVUF VFQIEZOEOWUVW KRZGRHVDVHOIGULYLQJFDUZRUN 14 Anderson and others, Autonomous Vehicle Technology, S  ,ELG  &KULVWRSK3RQLNYDUDQG+DQV-RDFKLP+RI³2YHUYLHZRQ6HFXULW\$SSURDFKHV LQ,QWHOOLJHQW7UDQVSRUWDWLRQ6\VWHPV6HDUFKLQJIRU+\EULG7UXVW(VWDEOLVKPHQW 6ROXWLRQVIRU9$1(7V´ 6HFXUHZDUH  7KH1LQWK,QWHUQDWLRQDO&RQIHUHQFH on Emerging Security Information, Systems and Technologies HGV5DLQHU)DON &DUOD0HUNOH:HVWSKDOODQG+DQV-RDFKLP+RI :LOPLQJWRQ'(,$5,$  KWWSWRFSURFHHGLQJVFRPZHEWRFSGI  ,ELGS  $QGHUVRQDQGRWKHUV Autonomous Vehicle Technology, S  'RXJODV/DFH\ Vehicle-to-Vehicle Technologies for Intelligent Transportation Systems: Development, Challenges and Security Proposals  1HZ

133  $QGUHDV5LHQHU³:KR&DUHVDERXW7UXVW*UDGHRI7UDYHOLQJDQG4XDOLW\RI 8VHU([SHULHQFHLQD:RUOGRI$XWRQRPRXV&DUV"´ $XWRPRWLYH8,µ $GMXQFW 3URFHHGLQJVRIWKH6L[WK,QWHUQDWLRQDO&RQIHUHQFHRQ$XWRPRWLYH8VHU,QWHUIDFHV DQG,QWHUDFWLYH9HKLFXODU$SSOLFDWLRQV  SS±  1LFN/DYDUV³6HOIGULYLQJ7UXFN+LWVWKH+LJKZD\LQ:RUOG)LUVW´ New Atlas, 2FWREHUKWWSQHZDWODVFRPGDLPOHUVSURGXFWLRQDXWRQRPRXV WUXFNGHEXWVSXEOLFURDGV'DYLG6HGJZLFN³$UP\(\HV6HOI'ULYLQJ &RQYR\V´ Automotive News $XJXVWKWWSVZZZDXWRQHZVFRP DUWLFOH2(0DUP\H\HVVHOIGULYLQJFRQYR\V  %HQMDPLQ6Q\GHU³7HVOD&(2(ORQ0XVN-XVW7ROG8V:KHQ$OO&DUV:LOO%H 6HOI'ULYLQJ´ Fortune, 1RYHPEHUKWWSIRUWXQHFRPWHVOD 2017 January | 1 No. | 1 Volume | HORQPXVNVHOIGULYLQJFDUV  8QLWHG6WDWHV*RYHUQPHQW$FFRXQWDELOLW\2I¿FH³,QWHOOLJHQW7UDQVSRUWDWLRQ 6\VWHPV9HKLFOHWR9HKLFOH7HFKQRORJLHV([SHFWHGWR2IIHU6DIHW\%HQH¿WVEXWD 9DULHW\RI'HYHORSPHQW&KDOOHQJHV([LVW´  S  ³8SVHWWLQJWKH$SSOH&DU´ Economist )HEUXDU\KWWSZZZHFRQRPLVW FRPQHZVEXVLQHVVHVWDEOLVKHGFDUPDNHUVQRWWHFK¿UPVZLOOZLQ UDFHEXLOGYHKLFOHV  1LNKLO*RZGD:HQG\-XDQG.LUVWHQ.RKOHU³'DVKERDUG'HVLJQIRUDQ Cyber, Intelligence, and Security Security and Intelligence, Cyber, $XWRQRPRXV&DU´ $XWRPRWLYH8,¶ $GMXQFW3URFHHGLQJVRIWKH6L[WK ,QWHUQDWLRQDO&RQIHUHQFHRQ$XWRPRWLYH8VHU,QWHUIDFHVDQG,QWHUDFWLYH9HKLFXODU $SSOLFDWLRQV  SS±  8QLWHG6WDWHV*RYHUQPHQW$FFRXQWDELOLW\2I¿FH³,QWHOOLJHQW7UDQVSRUWDWLRQ 6\VWHPV9HKLFOHWR9HKLFOH7HFKQRORJLHV([SHFWHGWR2IIHU6DIHW\%HQH¿WVEXWD 9DULHW\RI'HYHORSPHQW&KDOOHQJHV([LVW´  S  /DFH\ Vehicle-to-Vehicle Technologies for Intelligent Transportation Systems, S 31 Anderson and others, Autonomous Vehicle Technology, SS±  8QLWHG6WDWHV6XEFRPPLWWHHRQ+LJKZD\VDQG7UDQVLW³+RZ$XWRQRPRXV 9HKLFOHV:LOO6KDSHWKH)XWXUHRI6XUIDFH7UDQVSRUWDWLRQ´  SYLL  ,ELG  ,ELGS  7KH7HVOD7HDP³$7UDJLF/RVV´ Tesla  EORJ -XQHKWWSVZZZWHVOD FRPEORJWUDJLFORVV  ,ELG 37 Anderson and others, Autonomous Vehicle Technology, S  ,ELGS[YLL  $QG\*UHHQEHUJ³+DFNHUV5HPRWHO\.LOOD-HHSRQWKH+LJKZD\²:LWK0HLQ ,W´ Wired, -XO\KWWSVZZZZLUHGFRPKDFNHUVUHPRWHO\NLOO MHHSKLJKZD\  5REHUWR%DOGZLQ³-HHS+DFNHUV*HW1HZ-REVDW8EHU¶V$XWRQRPRXVFDU/DE´ Egadget $XJXVWKWWSVZZZHQJDGJHWFRPXEHUMHHS KDFNHUV 41 Anderson and others, Autonomous Vehicle Technology, S ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

134  ,ELG  ,ELGS  $QQD3HHO³6HOI'ULYLQJ&DUV&DQ%H'LVDEOHGZLWK/DVHUV´ ValueWalk , 6HSWHPEHUKWWSZZZYDOXHZDONFRPVHOIGULYLQJFDUVFDQEH GLVDEOHGZLWKODVHUV 45 Anderson and others, Autonomous Vehicle Technology, S  ,ELGS  /DFH\ Vehicle-to-Vehicle Technologies for Intelligent Transportation Systems, S  ,ELGS | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume |  ,ELG  ,ELGSS±  ,ELGS  ,ELGSS±  8QLWHG6WDWHV'HSDUWPHQWRI7UDQVSRUWDWLRQ5HVHDUFKDQG,QQRYDWLYH7HFKQRORJ\ $GPLQLVWUDWLRQ³$LU7UDYHO6LQFH´ Bureau of Transportation Statistics Issue Brief, QR 'HFHPEHU KWWSZZZULWDGRWJRYEWVVLWHVULWDGRWJRYEWV ¿OHVSXEOLFDWLRQVVSHFLDOBUHSRUWVBDQGBLVVXHBEULHIVLVVXHBEULHIVQXPEHUBKWPO HQWLUHKWPO Cyber, Intelligence, and Security Security and Intelligence, Cyber,  -DPHV*X\DQG0DW*UHHQ¿HOG³&DQ'ULYHUOHVV&DUV(YHU%H0DGH +DFN3URRI"´ Guardian, 0DUFKKWWSVZZZWKHJXDUGLDQFRP WHFKQRORJ\PDUGULYHUOHVVFDUVVDIHKDFNHUVJRRJOH  ,ELG  ,ELG  -HUU\/$UFKHU³'\QDPLFDQG(IIHFWLYH6HFXULW\LQWKH5DSLGO\(YROYLQJ*OREDO &ORXG&RPSXWLQJ&\EHUVSDFH´ Georgetown Journal of International Affairs  S  ,ELG  ,ELG  7DUHN6DDGDZLDQG+DLGDU&KDPDV³6HFXULQJ7HOHFRPPXQLFDWLRQV,QIUDVWUXFWXUH DJDLQVW&\EHU$WWDFNV´ Georgetown Journal of International Affairs   ±   /DFH\ Vehicle-to-Vehicle Technologies for Intelligent Transportation Systems, S  .REH/LDQL³,VUDHOL6WDUW8S:LOO3URWHFWIURP@&\EHU7HUURULVP´ Walla 0DUFKKWWSFDUVZDOODFRLOLWHP  /DFH\ Vehicle-to-Vehicle Technologies for Intelligent Transportation Systems, S  ,ELGS  &KULVWRSK3RQLNZDUDQG+DQV-RDFKLP+RI³2YHUYLHZRQ6HFXULW\$SSURDFKHV LQ,QWHOOLJHQW7UDQVSRUWDWLRQ6\VWHPV6HDUFKLQJIRU+\EULG7UXVW(VWDEOLVKPHQW 6ROXWLRQVIRU9$1(7V´ SECUREWARE  ±KWWSVZZZ WKLQNPLQGRUJGRZQORDGSKS"DUWLFOHLG VHFXUZDUHBBBB  ,ELG ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

135  $QGHUVRQDQGRWKHUV Autonomous Vehicle Technolog \S  /DFH\ Vehicle-to-Vehicle Technologies for Intelligent Transportation Systems, S  ,ELGS  ,ELGS  ,ELG  ³)LYH6WDU$XWRPRWLYH&\EHU6DIHW\3URJUDP´,$PWKH&DYDOU\)HEUXDU\ KWWSVZZZLDPWKHFDYDOU\RUJGRPDLQVDXWRPRWLYHVWDU 73 $OH[DQGHU*HRUJ&DPHN&KULVWLDQ%XFNODQG$ORLV.QROO³)XWXUH&DUV 1HFHVVLW\IRUDQ$GDSWLYHDQG'LVWULEXWHG0XOWLSOH,QGHSHQGHQW/HYHOV RI6HFXULW\$UFKLWHFWXUH´ HiCoNS µ3URFHHGLQJVRIWKH6HFRQG$&0 2017 January | 1 No. | 1 Volume | ,QWHUQDWLRQDO&RQIHUHQFHRQ+LJK&RQ¿GHQFH1HWZRUNHG6\VWHPV   SS±  ³)LYH6WDU$XWRPRWLYH&\EHU6DIHW\3URJUDP´  ,ELG  ,ELG 77 Anderson and others, Autonomous Vehicle Technology, SS±  /DFH\ Vehicle-to-Vehicle Technologies for Intelligent Transportation Systems, S Cyber, Intelligence, and Security Security and Intelligence, Cyber,  -HUU\/$UFKHU³,QWHUQDWLRQDO(QJDJHPHQWRQ&\EHU96HFXULQJ&ULWLFDO ,QIUDVWUXFWXUH´ Georgetown Journal of International Affairs   S  0DQXHO9HODVTXH]'HQQLV0REHUJ0LFKDHO-0H\HU7KRPDV6KDQNV 0DUJDUHW50F/HDQ'DYLG'H&RVVH&ODLUH$QGUpDQG.LUN2+DQVRQ³$ )UDPHZRUNIRU7KLQNLQJ(WKLFDOO\´ Markkula Center for Applied Ethics, August KWWSVZZZVFXHGXHWKLFVHWKLFVUHVRXUFHVHWKLFDOGHFLVLRQPDNLQJD IUDPHZRUNIRUHWKLFDOGHFLVLRQPDNLQJ  $OH[DQGHU.RWW/HFWXUHDW*HRUJHWRZQ8QLYHUVLW\:DVKLQJWRQ'&  0LWFK7XUFN³$Q$XWRQRPRXV&DU0LJKW'HFLGHFV&<@KWWSDU[LYRUJ SGIYSGI  2OLYLD*ROGKLOO³6KRXOG'ULYHUOHVV&DUV.LOO7KHLU2ZQ3DVVHQJHUVWR6DYHD 3HGHVWULDQ"´ Quartz 1RYHPEHUKWWST]FRPVKRXOGGULYHUOHVV FDUVNLOOWKHLURZQSDVVHQJHUVWRVDYHDSHGHVWULDQ  %RQQHIRQDQGRWKHUV³$XWRQRPRXV9HKLFOHV1HHG([SHULPHQWDO(WKLFV´  $OH[DQGHU+HYHONHDQG-XOLDQ1LGD5PHOLQ³5HVSRQVLELOLW\IRU&UDVKHVRI $XWRQRPRXV9HKLFOHV$Q(WKLFDO$QDO\VLV´ Science and Engineering Ethics 21, QR  ±  ,QWHUYLHZE\WKHDXWKRUZLWK)U'HQQLV0F0DQXV'HFHPEHU  (ORQ0XVN³0DVWHU3ODQ3DUW'HX[´ Tesla  EORJ , -XO\KWWSVZZZ WHVODFRPEORJPDVWHUSODQSDUWGHX[ ANDREW TABAS | PEDAL TO THE METAL?THE RACE TO DEVELOP SECURE AUTONOMOUS CARS

136  $QGHUVRQDQGRWKHUV Autonomous Vehicle Technology, S  -RQ)LQJDV³7KH861DY\:DQWVWR3URWHFW,WV'URQHVDJDLQVW+DFNV´ Egadget , 0D\KWWSVZZZHQJDGJHWFRPXVQDY\ZDQWVKDFN UHVLVWDQWGURQHV  0DWW5LFKWHODQG&RQRU'RXJKHUW\³*RRJOH¶V'ULYHUOHVV&DUV5XQLQWR3UREOHP &DUVZLWK'ULYHUV´ New York Times 6HSWHPEHUKWWSZZZQ\WLPHV FRPWHFKQRORJ\SHUVRQDOWHFKJRRJOHVD\VLWVQRWWKHGULYHUOHVVFDUV IDXOWLWVRWKHUGULYHUVKWPO"BU   ³6DIHUDW$Q\6SHHG"´ Economist 0DUFKKWWSZZZHFRQRPLVWFRP QRGH | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | Cyber, Intelligence, and Security Security and Intelligence, Cyber, Cyber, Intelligence, and Security Call for Papers

The Institute for National Security Studies (INSS) at Tel Aviv University invites submission of articles for Cyber, Intelligence, and Security , a new peer-reviewed journal, published three times a year in English and Hebrew. The journal is edited by Gabi Siboni, Head of the Cyber Security Program and the Military and Strategic Affairs Program at INSS.

Articles may relate to the following issues: • Global policy and strategy on cyber issues • Cyberspace regulation • National cybersecurity resilience • Critical infrastructure cyber defense • Cyberspace force buildup • Ethical and legal aspects of cyberspace • Cyberspace technologies • Military cyber operations and warfare • Military and cyber strategic thinking • Intelligence, information sharing, and public-private partnership (PPP) • Cyberspace deterrence • Cybersecurity threats and risk-analysis methodologies • Cyber incident analysis and lessons learned • Techniques, tactics, and procedures (TTPs)

Articles submitted for consideration should not exceed 6,000 words (including citations and footnotes), and should include an abstract of up to120 words and up to ten keywords. Articles should be sent to:

Hadas Klein Coordinator, Cyber, Intelligence, and Security Tel: +972-3-6400400 / ext. 488 Cell: +972-54-4510411 [email protected]

The Institute for National Security Studies – Cyber Security Program 40, Haim Levanon St, POB 39950, Ramat Aviv, Tel Aviv 61398 | Tel: +972-3-6400400 | Fax: +972-3-7447588