Cyber, Intelligence, and Security
Total Page:16
File Type:pdf, Size:1020Kb
Cyber, Intelligence, and Security Volume 1 | No. 3 | December 2017 Cybersecurity and Economic Espionage: The Case of Chinese Investments in the Middle East Sharon Magen The British Response to Threats in Cyberspace Daniel Cohen Campaign in Cyber or Cyber in the Campaign Avner Simchoni Cyber Threats to Democratic Processes David Siman-Tov, Gabi Siboni, and Gabrielle Arelle “The Missing Effort:” Integrating the “Non-lethal” Dimension in the Israeli Military Lines of Operation David Siman-Tov and David Sternberg Not Merely a Technological Advantage: The United States’ Organizational Change in Cyber Warfare Amit Sheniak The Vulnerable Architecture of Unmanned Aerial Systems: Mapping and Mitigating Cyberattack Threats Gabriel Boulianne Gobeil and Liran Antebi Cyber, Intelligence, and Security Volume 1 | No. 3 | December 2017 Contents Cybersecurity and Economic Espionage: The Case of Chinese Investments in the Middle East | 3 Sharon Magen The British Response to Threats in Cyberspace | 19 Daniel Cohen Campaign in Cyber or Cyber in the Campaign | 37 Avner Simchoni Cyber Threats to Democratic Processes | 51 David Siman-Tov, Gabi Siboni, and Gabrielle Arelle “The Missing Effort:” Integrating the “Non-lethal” Dimension in the Israeli Military Lines of Operation | 65 David Siman-Tov and David Sternberg Not Merely a Technological Advantage: The United States’ Organizational Change in Cyber Warfare | 83 Amit Sheniak The Vulnerable Architecture of Unmanned Aerial Systems: Mapping and Mitigating Cyberattack Threats | 107 Gabriel Boulianne Gobeil and Liran Antebi The purpose of Cyber, Intelligence, and Security is to stimulate Cyber, and enrich the public debate on related issues. Intelligence, Cyber, Intelligence, and Security is a refereed journal published three times a year within the framework of the and Security Cyber Security Program at the Institute for National Security Studies. Articles are written by INSS researchers and guest contributors. The views presented here are those of the authors alone. The Institute for National Security Studies is a public benefit company. Editor in Chief: Amos Yadlin Editor: Gabi Siboni Journal Coordinator: Hadas Klein and Gal Perl Finkel Editorial Advisory Board • Myriam Dunn Cavelty, Swiss Federal International Corporation, US Institute of Technology Zurich, Switzerland • James Lewis, Center for Strategic and • Frank J. Cilluffo, George Washington International Studies, US University, US • Kobi Michael, The Institute for National • Stephen J. Cimbala, Penn State Security Studies, Israel University, US • Theo Neethling, University of the Free • Rut Diamint, Universidad Torcuato Di State, South Africa Tella, Argentina • John Nomikos, Research Institute for • Maria Raquel Freire, University of European and American Studies, Greece Coimbra, Portugal • T.V. Paul, McGill University, Canada • Peter Viggo Jakobson, Royal Danish • Glen Segell, Securitatem Vigilate, Ireland Defence College, Denmark • Bruno Tertrais, Fondation pour la • Sunjoy Joshi, Observer Research Recherché Strategique, France Foundation, India • James J. Wirtz, Naval Postgraduate • Efraim Karsh, King’s College London, School, US United Kingdom • Ricardo Israel Zipper, Universidad • Kai Michael Kenkel, Pontifical Catholic Autónoma de Chile, Chile University of Rio de Janeiro, Brazil • Daniel Zirker, University of Waikato, • Jeffrey A. Larsen, Science Applications New Zealand Graphic Design: Michal Semo-Kovetz, Yael Bieber, Tel Aviv University Graphic Design Studio Printing: Elinir The Institute for National Security Studies (INSS) 40 Haim Levanon • POB 39950 • Tel Aviv 6997556 • Israel Tel: +972-3-640-0400 • Fax: +972-3-744-7590 • E-mail: [email protected] Cyber, Intelligence, and Security is published in English and Hebrew. The full text is available on the Institute’s website: www.inss.org.il © 2017. All rights reserved. ISSN 2519-6677 (print) • E-ISSN 2519-6685 (online) Cybersecurity and Economic Espionage: The Case of Chinese Investments in the Middle East Sharon Magen The utilization of emerging technologies for purposes of cyber espionage is the cornerstone of this paper. Although many have referred to cyber security risks that are directly connected to the security sphere, national security threats due to economic cyber espionage have not been dealt with to the same extent, and this oversight is rather puzzling. As cyberspace becomes increasingly utilized for espionage purposes, it is imperative to further examine the possibility of exploiting cyberspace for the purpose of espionage specifically in the international arena; economic globalization has made the international economic scene vastly interconnected, thus intensifying the vulnerability of the world economy to possible cyber security breaches. Keywords: Cyber espionage, economic espionage, globalization, national security Introduction The recent usage of emerging technologies for the purposes of cyberattacks or acts of cyber espionage in general and the subsequent threat specifically posed to the national security interests of governments in the economic sphere is the focus of this paper. Although many have examined cybersecurity Sharon Magen holds a Master’s degree in Security Studies from Tel Aviv University and completed her internship at the Institute for National Security Studies (INSS) on China-Israel relations and the Gulf Cooperation Council (GCC). Cyber, Intelligence, and Security | Volume 1 | No. 3 | December 2017 3 SHARON Magen | Cybersecurity and Economic Espionage: THE CASE OF CHINESE Investments 4 risks that are directly connected to the security sphere, national security threats posed by cyberattacks or acts of cyber espionage in the economic sphere have not been dealt with to the same extent, and this lack of interest is rather puzzling. As cyberspace is increasingly being utilized for espionage purposes in various fields, it is imperative to further examine the possibility of exploiting cyberspace specifically for the purpose of espionage in the international economic arena; globalization has made the international economy vastly interconnected, thus making the world economy more vulnerable to possible | Volume 1 | No. 3 | December 2017 1 | No. 3 December | Volume cybersecurity breaches, with such a breach rendering the possible repercussions on national security interests even more intense and on a much wider scale. This lack of contemporary research on the utilization of cyber means for conducting economic espionage and the subsequent consequences regarding national security has compelled me to examine this subject in this paper. The growing importance of this phenomenon, in which foreign entities may utilize cyber means for carrying out economic espionage to achieve Cyber, Intelligence, and Security Intelligence, Cyber, strategic goals, is the incentive for this research. The growing risk posed to national security by economic cyber espionage, coupled specifically with the economic and political rise of China, rather intensifies the importance of dealing with this issue. As a country seeking to become a game-changer in the global arena, it is highly likely that China—significantly more than other countries—fully engages in cyber espionage in the economic sphere so that it can achieve its goals in other fields, such as in the security and political spheres. This issue should be further studied, in order to determine whether cyber espionage in the economic sphere is a threat posed especially by China, and whether this threat should therefore be taken into consideration when considering integration with Chinese entities. In this case, foreign governments, through private or state-owned companies, can target certain economies or foreign companies for making an investment. The government will then be able to obtain new technologies—an act that may tip the scale in favor of the investing country, which otherwise would not have been able to receive these technologies. This phenomenon cements cyber espionage in the economic arena now as an undeniable threat to national security. The United States mostly directs this accusation against China, as Chinese companies, which are mostly state- owned, are suspected of utilizing global cyber and economic integration as SHARON Magen | Cybersecurity and Economic Espionage: THE CASE OF CHINESE Investments 5 a vessel for conducting economic espionage; however, some contend that China is not the only country committing cyber espionage in the economic sector and therefore should not be targeted as such. All countries today engage in cyber economic espionage to a certain degree; therefore, this paper will question the reason why the United States is spearheading the notion that China conducts gross economic espionage, even though it is maintained that other countries do so as well. My methodology for examining this theoretical assumption entails the assessment of other countries’ approaches toward China’s supposed cyber | Volume 1 | No. 3 | December 2017 1 | No. 3 December | Volume economic espionage intentions. If other countries similarly claim that China is the main source of global cyber economic espionage, even though it has been asserted that other countries take part in such espionage acts as well, it would be vital to clarify the reasons for this type of behavior. In order to assess the attitudes of other countries toward China’s cyber economic espionage, I contend that it would be most effective to focus on non-western countries, such as the Middle Eastern countries, which may contribute to a more balanced portrayal