Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the issue based on empirical or primary data.
Keywords: cyber espionage, acceptability, state behavior, cyberattacks, relationship, intelligence gathering, national security, cyber warfare, cyber capabilities.
Introduction
Cyberspace has become an important element in the operations of any given country since we are living in an information age. Countries across the globe use cyberspace for various purposes including business and in modern warfare. Cyberspace has developed into a crucial component of modern warfare as adversaries continue to exploit the potential of the Internet to carry out their activities. Cyberspace is used in the operational level and strategic level of modern warfare. At the strategic level, cyberspace is use to deter and influence the strategic balance of power in relation to the strengths and weaknesses of a state.[footnoteRef:1] As cyberspace dominates modern warfare, the concept and practice of cyber espionage has emerged. Cyber espionage refers to the practice of obtaining secrets with the permission of the owner/possessor of the information.[footnoteRef:2] As a form of cyberattack, cyber espionage is one of the most complex international problems in today’s world despite being seen as an acceptable state behavior. [1: Magnus Hjortdal, “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence”, Journal of Strategic Security 4, no. 2 (2011):1] [2: Atul Agarwal & CERT-IN, “Cyber Espionage, Infiltration and Combating Techniques”, Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf]
Background Information
Cyber espionage has become one of the most important and complex international problem in today’s world. It can generate numerous risks or threats to security and other critical operations because it involves illegitimate possession of personal, sensitive, classified or proprietary information. Cyber espionage is carried out through various exploitation methods or techniques on individual computers, networks or the Internet. It incorporates intentional activities to infiltrate or penetrate computer systems/networks used by a rival to obtain information within or transmitted through these networks or systems.[footnoteRef:3] Cyber espionage is used by different nations across the globe including the United States, China and Russia despite concerns regarding its legitimacy and view as an acceptable state behavior. [3: William C. Banks, “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage”, Emory law Journal 66, (2017):513.]
Problem Statement
Cyber espionage involves illegal practices that result in information theft that could be used to attack an adversary. It poses threats and risks to relations between states and has become a complex international problem in the modern world. Cyber espionage is largely viewed as a new intelligence gathering approach and strategy for national security decisions. However, cyber espionage remains a form of cyberattack, which is legally and ethically unacceptable.
Research Question
How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?
Purpose Statement
The purpose of this study is to examine the proposition that cyber espionage is an acceptable state behavior despite being a form of cyberattack, which is deemed unacceptable. The evaluation includes an exploration of norms that are established to promote the acceptability of cyber espionage despite its potential damaging impacts on relations between states.
Significance of the Study
This study will help address existing concerns regarding the acceptability of cyber espionage though it seemingly promotes information theft. It is important to study this issue because cyber espionage has generated numerous concerns regarding its legitimacy and acceptability vis-à-vis cyberattack as well as global security concerns.
Literature Review
The issue of cyber espionage has attracted considerable attention in existing literature because of the challenges it poses to international relations. Existing studies examine different aspects relating to cyber espionage and its increased use in the modern international relations framework as well as cyber warfare.
Proliferation of Cyber Espionage
Banks (2017) define cyber espionage as intentional activities used by an adversary to collect information resident on or transmitted through computer systems or networks.[footnoteRef:4] Cyber espionage has become common in the modern international relations framework due to use of cyberspace and the emergence of cyber warfare. In addition, the rise of cyber espionage is attributable to the long-standing practice of intelligence gathering and espionage in national security apparatus of every nation. Cyber espionage involves electronic surveillance of computer systems or networks to intercept communication between two or more parties. Using electronic surveillance, adversaries intercept what is said and planned. Such surveillance always result in processing and exploitation of huge volumes of communications transmitted on the Internet. Therefore, electronic surveillance has provided an avenue for transformation of conventional state-sponsored surveillance and espionage. [4: Ibid., 3]
Lotrionte (2015) provide a different perspective regarding the proliferation of cyber espionage. Even though the proliferation...
Cyber Espionage Over the last several years, cyber espionage has become a major problem that is impacting a variety of organizations. This is because hackers and other groups are actively seeking to exploit vulnerabilities in security networks. Evidence of this can be seen by looking no further than the below tables (which are illustrating the motivations and targets of attacks). Motivations behind Attacks on Computer Networks Percentage Cyber Crime Hactivism Cyber Warfare / Espionage ("Cyber Attack Statistics,"
Abstract Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence
Abstract Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence
Cyber-Crime, Cyber-Terrorism, Cyber-Espionage, and Cyber-Warfare Threats, Risks, and Vulnerabilities In the contemporary business and IT (information technology) environments, increasing number of business organizations are investing in the IT tools to enhance competitive market advantages. Integrating the IT tools in a business model has become a crucial strategy that organizations can employ to achieve a market success. While IT tools deliver several market benefits for businesses, nevertheless, businesses face enormous risks when integrating
Corporate espionage is and interesting topic and it mirrors espionage that is conducted by governments except for the fact that the activities are directed at commercial purposes as opposed to national security or other related items. Corporate espionage, also called industrial or economic espionage, encompasses a wide range of different activities that involve the illegal acquisition of trade secrets or other corporate information that can be used for financial gain
gathered on the DOD The tools and a description of the how they are used What sort of attacks would work in this case? Give some examples and how you would carry them out What social engineering and physical security aspects were discovered / devised? Give a detailed explanation What methods could you employ to help secure these vulnerabilities? What suggestions would you make to the organization if you were a penetration tester? Attack
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now