0% found this document useful (0 votes)
18 views37 pages

Cyber Crime and National Security Threats: Leaks As A Model

The article discusses the evolution of the concept of security to include non-traditional threats, particularly focusing on leaks as a form of cybercrime that poses significant risks to national security. It categorizes leaks into corrupt, ideological, and whistleblowing types, highlighting their varying impacts on state stability and public perception. The study employs a Realist framework and empirical observations to analyze these threats and their implications for national security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views37 pages

Cyber Crime and National Security Threats: Leaks As A Model

The article discusses the evolution of the concept of security to include non-traditional threats, particularly focusing on leaks as a form of cybercrime that poses significant risks to national security. It categorizes leaks into corrupt, ideological, and whistleblowing types, highlighting their varying impacts on state stability and public perception. The study employs a Realist framework and empirical observations to analyze these threats and their implications for national security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/387143255

ً ‫ اﻟﺘﺴﺮﻳﺒﺎت ﻧﻤﻮذﺟﺎ‬:‫ اﻟﺠﺮﻳﻤﺔ اﻹﻟﻜﺘﺮوﻧﻴﺔ وﺗﻬﺪﻳﺪ اﻷﻣﻦ اﻟﻘﻮﻣﻲ‬Cyber crime and National
Security Threats: Leaks as a Model

Article in ‫ · ﻣﺠﻠﺔ ﮐﻠﻴﺔ اﻻﻗﺘﺼﺎد واﻟﻌﻠﻮم اﻟﺴﻴﺎﺳﻴﺔ‬December 2026

CITATIONS READS

0 20

2 authors, including:

Mohamed Salman Tayie


Cairo University
43 PUBLICATIONS 50 CITATIONS

SEE PROFILE

All content following this page was uploaded by Mohamed Salman Tayie on 18 December 2024.

The user has requested enhancement of the downloaded file.


‫ التسريبات منوذجا‬:‫اجلرمية اإللكرتونية وتهديد األمن القومي‬
2
) ( 1
) (
‫ حممد ساملان طايع‬.‫د‬ ‫آية حممد حيي‬

Non
Traditional Security

2
Email: [email protected]
8

Email: [email protected]
[email protected]

Page 1 of 36
Page 2 of 36
Abstract
Since the early 1970s, the literature on international relations and strategic studies has
increasingly focused on redefining the concept of "security" to encompass threats beyond
mere military ones. As a result, the narrow understanding of security no longer accurately
reflects the diverse challenges that states face. The concept of "security" has evolved into a
"systemic concept," expanding to include various dimensions such as "strategic security,"
"economic security," "environmental security," "water security," "food security," "energy
security," and "cybersecurity," among others.
In this context, leaks have emerged as a significant threat to national security, particularly as
the concept of security has recently expanded to accommodate forms of non-traditional
security. Leaks are considered a form of cybercrime that currently threatens the national
security of states and societies, taking various forms including political, military, and economic
leaks. This threat can extend beyond a state's internal borders, impacting its external
relations. Some argue that leaks are not always intended to harm national security, as certain
leaks may have ethical purposes, such as disclosing information about violations within
government agencies. This process is carried out with the aim of correcting situations and
upholding principles of integrity. Conversely, other leaks are harmful, aiming to destabilize
the state's security and stability by causing confusion, disturbances, and influencing public
opinion.
Methodologically, the study relies on the premises of the Realist school, particularly Offensive
Realism, as well as the "Securitization School" framework. Additionally, it employs empirical
observation tools applied to several case studies. The study concluded with several findings,
including that leaks can be classified into corrupt leaks, which involve the dissemination of
misleading or false information; ideological leaks, which seek to criticize and attack a specific
ideology or belief; and whistleblowing leaks, which aim to reveal significant violations related
to politics, administration, or financial matters.

Keywords:
National Security – Cyber Security – Cyber Threats – Leaks – Cyber Crime – Cyber Terrorism

Page 3 of 36
1

Page 4 of 36
1

1
2
-3
-4
-5

Page 5 of 36
2
"

Page 6 of 36
6

Page 7 of 36
10

11

Page 8 of 36
Speech of Act

12

13

Page 9 of 36
2

14

15

16

Page 10 of 36
(17)

ICT

(18)

(Digital Mediation)

Digital medium

DDoS

Page 11 of 36

(Botnets)

(19)

Far-reaching Impact

Lack of Global Impact


physical proximity

20

Page 12 of 36

(21)

Anonymity

22


VPNs Tor
IP
IP

IP

(23)

Page 13 of 36
Rapid Adaptation

Zero-Day •

24

Trojan Horse)

Social Engineering •

Page 14 of 36
Dark Web and Underground •

(25)

Inconsistency

Inconsistency

(26)

Low Cost of Entry

Page 15 of 36

Bitcoin •

(27)

Page 16 of 36
Neittaanmäki Pekka

Amoroso Edward

(28)

Page 17 of 36
(29)

(30)

(31)

(32)

Page 18 of 36
33

34)

35

Page 19 of 36
(36)

(37)

David J. Smith

38

Page 20 of 36
39

40

Page 21 of 36
41

42

Gone Terril
43

Page 22 of 36
. 44

"

.45

46

Page 23 of 36
47

48

49

50

Page 24 of 36

51

Page 25 of 36
.

52

53

Page 26 of 36

Page 27 of 36

(NSA)

.54

Shadow Brokers •

Shadow Brokers

Shadow iOS macOS Windows


Brokers
55

2017 •

Vault 7

.
Vault 7

.56

Page 28 of 36
57

58

Page 29 of 36
.

.
59

Page 30 of 36
‫‪.‬‬

‫‪60‬‬

‫‪ ،‬يمكن القول إنه‬

‫ما قد يضر‬

‫‪Page 31 of 36‬‬
Page 32 of 36
‫العرب للبحوث القانونية والقضائية‪ ،(2017،‬ص ‪.50‬‬ ‫)‪(1‬‬
‫ي‬ ‫السيبانية هاجس العرص‪ ( ،‬ربيوت‪ :‬المركز‬
‫ر‬ ‫من األشقر جبور‪،‬‬
‫ي‬
‫الحرب ‪ ،‬مفهوم األمن‪ :‬مسل ل ل ل ا وص ل ل للي و هديدا ‪ ،‬دراس ل ل للة نظر ة يف المفاهيم واألطر‪ ،‬المجلة العربية للعلوم‬
‫ي‬ ‫)‪ (2‬س ل ل للليما‬
‫السياسية‪ ،‬العدد ‪( ،19‬لبنا ‪ :‬المنظمة العربية للعوم السياسية‪ ،‬يوليو ‪ ،)2008‬ص ص ‪.14-13‬‬
‫ً‬
‫العرب بعد ‪ 40‬عاما عىل حرب أك بر "‪ ،‬مجلة الس ييياس يية ال لية‪ ،‬العدد‬
‫ي‬ ‫)‪ (3‬عزت عبد الواحد‪ " ،‬حوالت المفهوم وال طبيق‪ :‬األمن‬
‫االسيا يجية‪ ،‬أك بر ‪ ،(2013‬ص ص ‪.92-91‬‬ ‫ر‬ ‫‪) ،194‬القاهرة‪ ،‬مركز األهرام للدراسات‬
‫)‪ (4‬عزت عبد الواحد‪ " ،‬أص ل للي نظرا‪ :‬مقومات وس ل للياس ل للات األمن القو ي "‪ ،‬مجلة السي ي ييياسي ي يية ال لية‪ ،‬العدد ‪( ،197‬القاهرة‪ ،‬مركز‬
‫االسيا يجية‪ ،‬يوليو ‪ ،(2014‬ص ص ‪.32-31‬‬ ‫ر‬ ‫األهرام للدراسات‬
‫واليامات الدور‪ ،‬مجلة دراسات أﺑﺤاث‪ ،‬المجلة‬ ‫‪ 5‬اﯾناس شﯿباب‪ ،‬ال حلﯿ النظرا للسﯿاسة الﺨارجﯿة‪ :‬بﯿ الحسابات العقﻼنﯿة ر‬
‫ر‬ ‫ي‬
‫العربﯿة يف العلوم اﻹﻧسانﯿة واالج ماعﯿة‪ ،‬العدد ‪ ،29‬دﯾسمي ‪ ،2017‬ص ص ‪.190-189‬‬
‫لليجمة‪ ،)2014 ،‬ص ‪.59‬‬ ‫ر‬ ‫‪6‬‬
‫محمد صفار‪ ،‬نظرية العالقات ال لية‪( ،‬القاهرة‪ :‬المركز القو ي‬
‫)‪(7‬‬
‫‪Robert S. McNamara, The Essence of Security: Reflections in Office, (Harper & Row, 1968), p176.‬‬
‫‪8‬‬
‫‪Danilo Di Mauro, The Transatlantic Relationship and the future Global Governance, trans world,‬‬
‫‪WORKING PAPER 32, JUNE 2014, available at: https://sciencespo.fr/ceri/fr/content/transworld-‬‬
‫‪transatlantic-relations-and-future-global-governance, accessed on: 1 October 2017.‬‬
‫‪9‬‬
‫‪João Reis Nunes, POLITICS, SECURITY, CRITICAL THEORY: A CONTRIBUTION TO CURRENT DEBATES‬‬
‫‪ON SECURITY, University of Wales, Aberystwyth, Available at: http://www.eisa-net.org/be-‬‬
‫‪bruga/eisa/files/events/turin/Nunes-joaonunes-politicssecuritycriticaltheory.pdf, accessed on: 3‬‬
‫‪October 2017.‬‬
‫‪10‬‬
‫‪Ibid.‬‬
‫)‪(11‬‬
‫‪Vladimir Šulović, Meaning of Security and Theory of Securitization, (Belgrade center for security‬‬
‫‪policy, Serbia, October 2010), pp 2-4.‬‬
‫‪ ،‬مركز المس ل ل ل قب ل بحاث‬ ‫العرب‪ ،‬ل ل ل للاعد الجدف حوف ال وس ل ل ل يف مفاهيم االمن‪ ،‬د رية مفاهيم المسي ي ي ي‬
‫ي‬ ‫‪ 12‬محمد مس ل ل للعد‬
‫والدراسات الم قدمة‪ ،‬العدد ‪ ،8‬مارس ‪.2015‬‬
‫)‪(13‬‬
‫‪Vladimir Šulović, OP. Cit, pp 4-5.‬‬
‫العرب‪ ،‬مرج سبق ذكره‪.‬‬
‫ي‬ ‫‪ 14‬محمد مسعد‬
‫العرب للبحوث القانونية والقضائية‪ ،)2017 ،‬ص ص ‪.51-50‬‬ ‫)‪(15‬‬
‫ي‬ ‫(بيوت‪ ،‬المركز‬
‫السيبانية هاجس العرص‪ ،‬ر‬
‫ر‬ ‫من األشقر جبور‪،‬‬
‫ي‬
‫ر‬
‫اإلنبنت‪( ،‬القاهرة‪ :‬دار الك ب والوثائق المرص ة‪ ،(2007،‬ص ‪.38‬‬ ‫)‪ (16‬عبد الف اح مراد‪ ،‬رشح جرائم الكمبيوتر‬
‫يس لام الس ي ي رييبا ي ‪ ،‬م اح عىل الرابط‪:‬‬ ‫ر‬ ‫ر‬ ‫ر‬ ‫)‪(17‬‬
‫حم نفسل للا من الجرائم اﻹلكيونية‪ ،‬شكة كاس ي ي ريبس ي ي ي‬
‫ي‬ ‫اﻹلكيونية؟ كيف‬ ‫ه الجر مة‬‫ما ي‬
‫‪ ،https://me.kaspersky.com/resource-center/threats/what-is-cybercrime‬ار للخ الدخوف‪ 28 :‬أك بر ‪.2023‬‬
‫المعن ﺑالمخ رات الجرمية‪ ،‬م اح عىل الرابط‪،https://rb.gy/1rysf :‬‬ ‫ر‬
‫اﻹلكيونية يف سطور‪ ،‬مك ب األمم الم ﺤ ة‬ ‫(‪ (18‬الجرائم‬
‫ي‬
‫ار للخ الدخوف‪ 28 :‬أك بر ‪.2023‬‬
‫) ‪( 19‬‬
‫‪Tina Freiburger and Jeffret S. Crane, “The Internet as a Terrorist’s Tool: A Social Learning‬‬
‫‪Perspective”, In: K. Jaishankar (ed.), Cyber Criminology: Exploring Internet Crimes and Criminal‬‬
‫‪Behavior, (New York: CRC Press, 2011), pp 127-136.‬‬
‫)‪(20‬‬
‫‪Kristen Boon, Aziz Z. Huq and Douglas C. Lovelace, Catastrophic Possibilities Threatening U.S.‬‬
‫‪Security, (New York: Oxford University Press,2011), pp 394-397.‬‬
‫(‪(21‬‬
‫‪Thomas W. Edgar and David O. Manz, Research Methods for Cyber Security, (united states: Elsevier‬‬
‫‪Inc., 2017), pp 34-39.‬‬

‫‪Page 33 of 36‬‬
(22)
Gabriella Coleman , Hacker, Hoaxer, Whistleblower, Spy The Many Faces of Anonymous, (Verso
Books, 2015), pp 143-170.
(23(
Russell G. Smith, Cyber Criminals on Trial, (UK: Cambridge University Press, 2004), pp 16-64.
(24)
Byron Acohido, Zero Day Threat: The Shocking Truth of how Banks and Credit Bureaus Help Cyber
Crooks Steal Your Money and Identity, (New York: Union Square Press, 2008), pp 171-180.
(25)
Robert Moore, Cybercrime: Investigating High-Technology Computer Crime, 2nd ed., (New York:
Routledge, 2019), pp 61 – 79.
(26)
Thomas W. Edgar and David O. Manz, Op. cit., p 57
( 27 )
Eoghan Casey, Digital Evidence and Computer Crime: Forensic Science, Computers, and the
Internet, 4th Ed., (USA: Elsevier Inc., 2019) ,pp 35-47
)28(
https://shorturl.at/GLMS1 :‫ م اح عىل الرابط‬،‫ الموسوعة السياسية‬،"Cyber Security – ‫اب‬
‫ "األمن السيي ي‬،‫فارس قرة‬
2023 ‫ نوفمي‬2 :‫ ار للخ الدخوف‬،
)29(
‫ مجلية كليية‬،"‫اب ألنظملة المعلوملات اﻹدار لة بجلامعلة المللا س ل ل ل ل للعود‬
‫ "م طلبلات حقيق األمن الس ل ل ل ل لليي ي‬، ‫ر من عبلد الس ل ل ل ل للمحلا‬
.10 ‫ ص‬،(2020 ‫ يوليو‬،‫ مرص‬،‫ )جامعة المنلورة‬،111 ‫ العدد‬،‫الببية‬
( 30(
What is Cyber Security? Definition and Best Practices, IT Governance Ltd, available at:
https://www.itgovernance.co.uk/what-is-cybersecurity, accessed on: 2 November 2023
:‫ مل ل ل ل ل ل ل للاح عل ل ل للىل الل ل ل لرابل ل ل للط‬،Kaspersky Cybersecurity Company ،‫وب؟‬ ‫ر‬ ( 31 )
‫مل ل ل للا الل ل ل لمل ل ل للقل ل ل ل ل ل ل ل للود بل ل ل للاألمل ل ل للن اﻹلل ل ل لكل ل ل للي ي‬
‫ نوفمي‬2 :‫ ل للار للخ ال ل للدخوف‬،https://me.kaspersky.com/resource-center/definitions/what-is-cyber-security
2023
‫ ص‬،(2017،‫العرب‬ ‫ دار‬:‫ (القاهرة‬، ‫اإلنبنت‬ ‫رص ي ي ي ي ر‬
‫ كيف يمك أن ت ير ال ل ش ي ي ي ييرص نإلا ير ع ي‬:‫اإللكب نية‬ ‫ر‬ ‫ ال وة‬،‫( إيهاب خليفة‬32)
‫ي‬
.55-54 ‫ص‬
(33)
Hans Hillen, The Defence Cyber Strategy, (Netherlands: Netherlands Ministry of Defense, 2012),
pp 8-9.
( 34)
Jennie M. Williamson, information operation, computer network attacks in the 21st century,
(United States: U.S. Army War College, 2002), pp 15-22.
(35)
Michael Connell and Sarah Vogler, “Russia’s Approach to Cyber Warfare”, CNA’s Occasional Paper
series, September 2016, p 12, available at: https://apps.dtic.mil/sti/pdfs/AD1019062.pdf, accessed
on: 3 November 2023.
( 36 )
North Atlantic Treaty Organization, “Cyber defence", 14 September 2023, available at:
https://www.nato.int/cps/en/natohq/topics_78170.htm, accessed on: 3 November 2023.
‫ )كلية الحقوق‬،‫ رس ل ل للالة ماجس ل ل ل ري‬، ‫وا الوتيات الم ﺤ ة أنمو جا‬
‫ أثر ال إل ي ات الس ي ي ي رييبانية عل األم ال ي‬،‫دحماب‬
‫ي‬ ‫( س ل ل للليم‬37)
.55-54 ‫( ص‬2018 ،‫ الجزائر‬،‫ جامعة بوضياف‬،‫والعلوم السياسية‬
(38)
Michael Connell and Sarah Vogler, Op. cit., p 14.
،185 ‫ العللدد‬،‫ مجليية السي ي ي ي ي يييياسي ي ي ي ي يية الي لييية‬،"‫في الللدوف يف المنطقللة العربيللة‬ ‫ "أنمللا وأدوار الفل ر‬،‫( إيمللا أحمللد رجللب‬39)
‫لاعلﯿ من ر‬
‫ر‬
.89-88 ‫ ص ص‬،)2011 ‫ يوليو‬،‫ مركز األهرام للدراسات السياسية واالسيا يجية‬:‫(القاهرة‬
(40)
Margaret B. Kwoka, “Leaking and Legitimacy”, University of California, Vol. 48, 2015, p 1395,
available at: https://lawreview.law.ucdavis.edu/issues/48/4/Articles/48-4_Kwoka.pdf, accessed
on: 3 November 2023.
(41)
Alan M. Katz, “Government information leaks and The first Amendment”, California law review,
Vol 64, Jan.1976, pp 108 – 113, available at: https://doi.org/10.2307/3479769, accessed on: 3
November 2023.

Page 34 of 36
(42)
Kathryn Flynn, “The practice and politics of leaking”, Social Alternatives, Vol. 30, Faculty of Law,
Humanities and the Arts papers, University of Wollongong, 2011, available at:
https://tinyurl.com/yk9v9f67, accessed on: 5 November 2023.
( 43 )
Greg Terrill, Secrecy and openness: the federal government from Menzies to Whitlam and
beyond, (Australia: Melbourne University Press, Carlton South, Vic, 2000), pp 222-225.
‫ر‬
‫ مجلية الي راسي ي ي ي ي ييات اتسي ي ي ي ي ي ريباتيجيية‬،‫األخﻼف والﺨلدا االس ل ل ل ل ل ﺨبلارا‬ ‫الرسي ل ل ل ل بلات االس ل ل ل ل ل ﺨبلار لة ربﯿ اللداف‬ ‫ل‬ ،،‫( محملد بمﺨيوا‬44)
‫ي‬
:‫ م ل ل ل ل للاح ع ل للىل ال ل لراب ل للط‬،15 ‫ ص‬،(2022 ‫ مل ل للارس‬، ‫لرب الل ل للدي ل لم ل لق ل لرا ي‬
‫ ال ل لم ل للرك ل للز ال ل لع ل ل ي‬:‫ ) ب ل لرل ل ل رلﯿ‬،14 ‫ ال ل لعل ل للدد‬،‫ال ي ييعس ي ي ي ي ي ي يك ي ييريي ي يية‬
.2023 ‫ نوفمي‬5 :‫ ار للخ الدخوف‬،https://tinyurl.com/yt8pqvoz
.16 ‫ ص‬،‫( المرج السابق‬45)
‫( جر نواللد ر‬46)
،،‫ الطبعلة األو‬،‫ الوتييات الم ﺤي ة األمريكيية د لية المراق ية األمريكيية‬:‫ ود ارد سي ي ي ي ي ييمودن‬: ‫ ت مكيان لالت يا‬،‫جلﯿ‬
‫ر‬
.120 ‫ ص‬،( 2014 ، ‫ الدار العربية للعلوم ناشو‬:‫(بيوت‬ ‫ ر‬،‫ بسام شيحا‬:‫رجمة‬
‫ر‬ ‫ر‬
‫ دار فكر وفن‬:‫ (القاهرة‬، ‫اإللكب ي‬ ‫رسييي اتتت ال جس ي ييستت اإلرها‬
‫ الت ي‬:‫اإللكب نية‬ ‫( حسل ل ر‬47)
‫ اإلعالم الج ي الجرائم‬،‫لنﯿ شل للفيق‬
‫ر‬
.26 ‫ ص‬،)2014 ، ‫للطباعة والني وال وز ل ل‬
( 48 )
House of Commons Public Administration Select Committee, Leaks and whistleblowing in
Whitehall, Tenth Report of Session 2008–09, (London: The Stationery Office Limited, August 2009),
p 61-66, available at: https://tinyurl.com/yv73yvm2, accessed on: 5 November 2023.
(49)
Lee C. Bollinger and Geoffrey R. Stone, National Security, Leaks and Freedom of the Press: The
Pentagon Papers Fifty Years on, (UK: Oxford University Press, 2021), pp 57-74
(50)
Richard M. Perloff, Political Communication Politics, Press, and Public in America, (London and
New York: Routledge Taylor & Francis, 2013), pp 185-207
(51)
“What We Know About Leaked Military Documents”, Associated Press, April 2023, available at
https://www.voanews.com/a/what-we-know-about-leaked-military-documents-/7046657.html,
accessed on: 3 November 2023.
(52)
Suzanne Spaulding and Devi Nair, “Restore Trust in National Security Institutions”, CSIS, Jan 2021,
available at: https://www.csis.org/analysis/restore-trust-national-security-institutions, accessed
on: 6 November 2023.
(53)
Bruno S. Sergi and Elena G. Popkova, “Digital Economy: Complexity and Variety Vs. Rationality”,
(Springer International Publishing, 2019), pp 534-578
( 54 )
Glenn Greenwald, No place to hide: Edward snowden, the NSA and the surveillance state,
available at: http://glenngreenwald.net/, accessed on: 6 November 2023.
(55)
Dan Goodin, “Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers
leak”, Ars Technica, Jun 2019, available at: https://arstechnica.com/information-
technology/2019/05/stolen-nsa-hacking-tools-were-used-in-the-wild-14-months-before-shadow-
brokers-leak/ accessed on: 6 November 2023.
(56)
Vault 7: A Technical Analysis of the CIA Hacking Toolkit, WikiLeaks, March 2017, available at:
https://wikileaks.org/ciav7p1/, accessed on: 6 November 2023.
(57(
Al Jazeera Investigative Unit, “Unprecedented leak exposes inner workings of UK Labour Party”, Al
Jazeera, 23 Sep 2022, available at: https://tinyurl.com/2ogm7xre, accessed on: 6 November 2023.
(58)
For more details look: The Pentagon Papers: The Defense Department History of United States
Decisionmaking on Vietnam, Volume 1, The Senator Gravel Edition, Beacon Press, 1971.
(59)
Ed Pilkington, “Chelsea Manning prepares for freedom: 'I want to breathe warm spring air again”,
the guardian UK, May 2017, available at: https://www.theguardian.com/us-
news/2017/may/13/chelsea-manning-freedom-us-military-wikileaks, accessed on: 6 November
2023.
Page 35 of 36
‫الرسي ل ل ل ل ب للات االق ل ل ل ل ل ل للادي للة ك للأداة حرب يف المس ل ل ل ل ل قب ل ؟‪ ،‬نون بوس ي ي ي ي ي ييت‪ 23 ،‬فياير ‪ ،2015‬م للاح عىل الرابط‪:‬‬
‫ل‬ ‫(‪ )60‬كيف عم ل‬
‫‪ ،https://www.noonpost.com/5562/‬ار للخ الدخوف‪ 6 :‬نوفمي ‪.2023‬‬

‫‪Page 36 of 36‬‬

‫‪View publication stats‬‬

You might also like