Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Cyber Espionage

View through CrossRef
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized definition of cyber espionage exists, the following definitions of espionage will be used only to frame the subject under examination. “Cyber espionage” describes the exploitation of cyberspace for the purpose of accessing and collecting confidential data. It can occur via close or remote access. “Close access cyber espionage” involves the collection of confidential data through the installation of hardware or software by malicious actors in close physical proximity to the targeted computer network or system. In contrast, “remote access cyber espionage” is launched some distance from the targeted network, usually by exploiting pathways created by the Internet. Cyber espionage takes different forms depending upon the type of confidential data targeted, the actor undertaking this activity, and the context in which it occurs. “Political” cyber espionage is usually state-sponsored (although it can be undertaken by nonstate actors such as terrorist groups) and describes the appropriation of political and military information belonging to state and nonstate actors during times of peace or armed conflict. “Economic” cyber espionage is also state-sponsored but instead involves the theft of confidential business information from foreign companies. “Industrial” cyber espionage entails the theft of confidential business information, but, unlike economic cyber espionage, it is carried out by companies against foreign rivals without the support or assistance of a state. The dawn of cyberspace has heralded an exponential increase in political, economic, and industrial espionage for several reasons: first, cyberspace is used to store huge amounts of confidential information, and is therefore a resource-rich environment for cyber spies to target; second, the instantaneous nature of cyberspace means that cyber spies can access confidential information quickly, cheaply, and efficiently; and third, cyberspace is a virtual and interconnected domain, meaning that espionage can be conducted remotely and anonymously, thus making it a relatively risk-free enterprise. Peacetime espionage is not specifically regulated by international law, and thus there is no “international law of espionage” that can be applied to cyber-enabled espionage. But this does not mean that cyber espionage exists in an international law vacuum. In fact, there is an array of general principles of international law as well as specialized regimes that are potentially applicable to cyber espionage. Unlike peacetime espionage, cyber espionage committed during times of armed conflict is directly regulated by international humanitarian law.
Title: Cyber Espionage
Description:
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage.
Because no internationally and legally recognized definition of cyber espionage exists, the following definitions of espionage will be used only to frame the subject under examination.
“Cyber espionage” describes the exploitation of cyberspace for the purpose of accessing and collecting confidential data.
It can occur via close or remote access.
“Close access cyber espionage” involves the collection of confidential data through the installation of hardware or software by malicious actors in close physical proximity to the targeted computer network or system.
In contrast, “remote access cyber espionage” is launched some distance from the targeted network, usually by exploiting pathways created by the Internet.
Cyber espionage takes different forms depending upon the type of confidential data targeted, the actor undertaking this activity, and the context in which it occurs.
“Political” cyber espionage is usually state-sponsored (although it can be undertaken by nonstate actors such as terrorist groups) and describes the appropriation of political and military information belonging to state and nonstate actors during times of peace or armed conflict.
“Economic” cyber espionage is also state-sponsored but instead involves the theft of confidential business information from foreign companies.
“Industrial” cyber espionage entails the theft of confidential business information, but, unlike economic cyber espionage, it is carried out by companies against foreign rivals without the support or assistance of a state.
The dawn of cyberspace has heralded an exponential increase in political, economic, and industrial espionage for several reasons: first, cyberspace is used to store huge amounts of confidential information, and is therefore a resource-rich environment for cyber spies to target; second, the instantaneous nature of cyberspace means that cyber spies can access confidential information quickly, cheaply, and efficiently; and third, cyberspace is a virtual and interconnected domain, meaning that espionage can be conducted remotely and anonymously, thus making it a relatively risk-free enterprise.
Peacetime espionage is not specifically regulated by international law, and thus there is no “international law of espionage” that can be applied to cyber-enabled espionage.
But this does not mean that cyber espionage exists in an international law vacuum.
In fact, there is an array of general principles of international law as well as specialized regimes that are potentially applicable to cyber espionage.
Unlike peacetime espionage, cyber espionage committed during times of armed conflict is directly regulated by international humanitarian law.

Related Results

An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber resilience fra...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
Abstrak Artikel ini menyajikan hasil pelaksanaan cyber extension yang dilaksanakan oleh penyuluh agama Kota Semarang, serta efektifitas dari pelaksanaannya. Cyber extension ...
The challenges of cybersecurity insurance development: The case of Latvia
The challenges of cybersecurity insurance development: The case of Latvia
Purpose. This paper aims to provide an overview of the current challenges of cybersecurity insurance, focusing on the identification of development constraints and opportunities an...
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
“CYBER SECURITY UNVEILED: PROTECTING THE DIGITAL FRONTIER” is a comprehensive guide designed to illuminate the multifaceted world of cyber security, offering both novices and exper...
KONSTRUKSI HUKUM DALAM PEMBUKTIAN TERHADAP KEJAHATAN MAYANTARA
KONSTRUKSI HUKUM DALAM PEMBUKTIAN TERHADAP KEJAHATAN MAYANTARA
Tujuan penulisan ini untuk memenuhi dan melengkapi persyaratan untuk memperoleh gelar Magiter Ilmu Hukum pada Fakultas Hukum Universitas Udayana. Tujuan khusus dari penulisan ini y...
CHINESE ESPIONAGE ACTIVITIES AGAINST THE UNITED STATES MILITARY INDUSTRY
CHINESE ESPIONAGE ACTIVITIES AGAINST THE UNITED STATES MILITARY INDUSTRY
This research aims to analyze China's espionage activities against the United States, especially in the military industry. In analyzing the case the author uses the concepts of the...

Back to Top