Cyber Crime and National Security Threats: Leaks As A Model
Cyber Crime and National Security Threats: Leaks As A Model
net/publication/387143255
ً اﻟﺘﺴﺮﻳﺒﺎت ﻧﻤﻮذﺟﺎ: اﻟﺠﺮﻳﻤﺔ اﻹﻟﻜﺘﺮوﻧﻴﺔ وﺗﻬﺪﻳﺪ اﻷﻣﻦ اﻟﻘﻮﻣﻲCyber crime and National
Security Threats: Leaks as a Model
CITATIONS READS
0 20
2 authors, including:
SEE PROFILE
All content following this page was uploaded by Mohamed Salman Tayie on 18 December 2024.
Non
Traditional Security
2
Email: [email protected]
8
Email: [email protected]
[email protected]
Page 1 of 36
Page 2 of 36
Abstract
Since the early 1970s, the literature on international relations and strategic studies has
increasingly focused on redefining the concept of "security" to encompass threats beyond
mere military ones. As a result, the narrow understanding of security no longer accurately
reflects the diverse challenges that states face. The concept of "security" has evolved into a
"systemic concept," expanding to include various dimensions such as "strategic security,"
"economic security," "environmental security," "water security," "food security," "energy
security," and "cybersecurity," among others.
In this context, leaks have emerged as a significant threat to national security, particularly as
the concept of security has recently expanded to accommodate forms of non-traditional
security. Leaks are considered a form of cybercrime that currently threatens the national
security of states and societies, taking various forms including political, military, and economic
leaks. This threat can extend beyond a state's internal borders, impacting its external
relations. Some argue that leaks are not always intended to harm national security, as certain
leaks may have ethical purposes, such as disclosing information about violations within
government agencies. This process is carried out with the aim of correcting situations and
upholding principles of integrity. Conversely, other leaks are harmful, aiming to destabilize
the state's security and stability by causing confusion, disturbances, and influencing public
opinion.
Methodologically, the study relies on the premises of the Realist school, particularly Offensive
Realism, as well as the "Securitization School" framework. Additionally, it employs empirical
observation tools applied to several case studies. The study concluded with several findings,
including that leaks can be classified into corrupt leaks, which involve the dissemination of
misleading or false information; ideological leaks, which seek to criticize and attack a specific
ideology or belief; and whistleblowing leaks, which aim to reveal significant violations related
to politics, administration, or financial matters.
Keywords:
National Security – Cyber Security – Cyber Threats – Leaks – Cyber Crime – Cyber Terrorism
Page 3 of 36
1
Page 4 of 36
1
1
2
-3
-4
-5
Page 5 of 36
2
"
Page 6 of 36
6
Page 7 of 36
10
11
Page 8 of 36
Speech of Act
12
13
Page 9 of 36
2
14
15
16
Page 10 of 36
(17)
ICT
(18)
(Digital Mediation)
Digital medium
DDoS
Page 11 of 36
•
(Botnets)
(19)
Far-reaching Impact
20
Page 12 of 36
•
(21)
Anonymity
22
•
VPNs Tor
IP
IP
IP
(23)
Page 13 of 36
Rapid Adaptation
Zero-Day •
24
Trojan Horse)
Social Engineering •
Page 14 of 36
Dark Web and Underground •
(25)
Inconsistency
Inconsistency
(26)
Page 15 of 36
•
Bitcoin •
(27)
Page 16 of 36
Neittaanmäki Pekka
Amoroso Edward
(28)
Page 17 of 36
(29)
(30)
(31)
(32)
Page 18 of 36
33
34)
35
Page 19 of 36
(36)
(37)
David J. Smith
38
Page 20 of 36
39
40
Page 21 of 36
41
42
Gone Terril
43
Page 22 of 36
. 44
"
.45
46
Page 23 of 36
47
48
49
50
Page 24 of 36
•
51
Page 25 of 36
.
52
53
Page 26 of 36
•
Page 27 of 36
•
(NSA)
.54
Shadow Brokers •
Shadow Brokers
2017 •
Vault 7
.
Vault 7
.56
Page 28 of 36
57
58
Page 29 of 36
.
.
59
Page 30 of 36
.
60
ما قد يضر
Page 31 of 36
Page 32 of 36
العرب للبحوث القانونية والقضائية ،(2017،ص .50 )(1
ي السيبانية هاجس العرص ( ،ربيوت :المركز
ر من األشقر جبور،
ي
الحرب ،مفهوم األمن :مسل ل ل ل ا وص ل ل للي و هديدا ،دراس ل ل للة نظر ة يف المفاهيم واألطر ،المجلة العربية للعلوم
ي ) (2س ل ل للليما
السياسية ،العدد ( ،19لبنا :المنظمة العربية للعوم السياسية ،يوليو ،)2008ص ص .14-13
ً
العرب بعد 40عاما عىل حرب أك بر " ،مجلة الس ييياس يية ال لية ،العدد
ي ) (3عزت عبد الواحد " ،حوالت المفهوم وال طبيق :األمن
االسيا يجية ،أك بر ،(2013ص ص .92-91 ر ) ،194القاهرة ،مركز األهرام للدراسات
) (4عزت عبد الواحد " ،أص ل للي نظرا :مقومات وس ل للياس ل للات األمن القو ي " ،مجلة السي ي ييياسي ي يية ال لية ،العدد ( ،197القاهرة ،مركز
االسيا يجية ،يوليو ،(2014ص ص .32-31 ر األهرام للدراسات
واليامات الدور ،مجلة دراسات أﺑﺤاث ،المجلة 5اﯾناس شﯿباب ،ال حلﯿ النظرا للسﯿاسة الﺨارجﯿة :بﯿ الحسابات العقﻼنﯿة ر
ر ي
العربﯿة يف العلوم اﻹﻧسانﯿة واالج ماعﯿة ،العدد ،29دﯾسمي ،2017ص ص .190-189
لليجمة ،)2014 ،ص .59 ر 6
محمد صفار ،نظرية العالقات ال لية( ،القاهرة :المركز القو ي
)(7
Robert S. McNamara, The Essence of Security: Reflections in Office, (Harper & Row, 1968), p176.
8
Danilo Di Mauro, The Transatlantic Relationship and the future Global Governance, trans world,
WORKING PAPER 32, JUNE 2014, available at: https://sciencespo.fr/ceri/fr/content/transworld-
transatlantic-relations-and-future-global-governance, accessed on: 1 October 2017.
9
João Reis Nunes, POLITICS, SECURITY, CRITICAL THEORY: A CONTRIBUTION TO CURRENT DEBATES
ON SECURITY, University of Wales, Aberystwyth, Available at: http://www.eisa-net.org/be-
bruga/eisa/files/events/turin/Nunes-joaonunes-politicssecuritycriticaltheory.pdf, accessed on: 3
October 2017.
10
Ibid.
)(11
Vladimir Šulović, Meaning of Security and Theory of Securitization, (Belgrade center for security
policy, Serbia, October 2010), pp 2-4.
،مركز المس ل ل ل قب ل بحاث العرب ،ل ل ل للاعد الجدف حوف ال وس ل ل ل يف مفاهيم االمن ،د رية مفاهيم المسي ي ي ي
ي 12محمد مس ل ل للعد
والدراسات الم قدمة ،العدد ،8مارس .2015
)(13
Vladimir Šulović, OP. Cit, pp 4-5.
العرب ،مرج سبق ذكره.
ي 14محمد مسعد
العرب للبحوث القانونية والقضائية ،)2017 ،ص ص .51-50 )(15
ي (بيوت ،المركز
السيبانية هاجس العرص ،ر
ر من األشقر جبور،
ي
ر
اإلنبنت( ،القاهرة :دار الك ب والوثائق المرص ة ،(2007،ص .38 ) (16عبد الف اح مراد ،رشح جرائم الكمبيوتر
يس لام الس ي ي رييبا ي ،م اح عىل الرابط: ر ر ر )(17
حم نفسل للا من الجرائم اﻹلكيونية ،شكة كاس ي ي ريبس ي ي ي
ي اﻹلكيونية؟ كيف ه الجر مةما ي
،https://me.kaspersky.com/resource-center/threats/what-is-cybercrimeار للخ الدخوف 28 :أك بر .2023
المعن ﺑالمخ رات الجرمية ،م اح عىل الرابط،https://rb.gy/1rysf : ر
اﻹلكيونية يف سطور ،مك ب األمم الم ﺤ ة ( (18الجرائم
ي
ار للخ الدخوف 28 :أك بر .2023
) ( 19
Tina Freiburger and Jeffret S. Crane, “The Internet as a Terrorist’s Tool: A Social Learning
Perspective”, In: K. Jaishankar (ed.), Cyber Criminology: Exploring Internet Crimes and Criminal
Behavior, (New York: CRC Press, 2011), pp 127-136.
)(20
Kristen Boon, Aziz Z. Huq and Douglas C. Lovelace, Catastrophic Possibilities Threatening U.S.
Security, (New York: Oxford University Press,2011), pp 394-397.
((21
Thomas W. Edgar and David O. Manz, Research Methods for Cyber Security, (united states: Elsevier
Inc., 2017), pp 34-39.
Page 33 of 36
(22)
Gabriella Coleman , Hacker, Hoaxer, Whistleblower, Spy The Many Faces of Anonymous, (Verso
Books, 2015), pp 143-170.
(23(
Russell G. Smith, Cyber Criminals on Trial, (UK: Cambridge University Press, 2004), pp 16-64.
(24)
Byron Acohido, Zero Day Threat: The Shocking Truth of how Banks and Credit Bureaus Help Cyber
Crooks Steal Your Money and Identity, (New York: Union Square Press, 2008), pp 171-180.
(25)
Robert Moore, Cybercrime: Investigating High-Technology Computer Crime, 2nd ed., (New York:
Routledge, 2019), pp 61 – 79.
(26)
Thomas W. Edgar and David O. Manz, Op. cit., p 57
( 27 )
Eoghan Casey, Digital Evidence and Computer Crime: Forensic Science, Computers, and the
Internet, 4th Ed., (USA: Elsevier Inc., 2019) ,pp 35-47
)28(
https://shorturl.at/GLMS1 : م اح عىل الرابط، الموسوعة السياسية،"Cyber Security – اب
"األمن السيي ي،فارس قرة
2023 نوفمي2 : ار للخ الدخوف،
)29(
مجلية كليية،"اب ألنظملة المعلوملات اﻹدار لة بجلامعلة المللا س ل ل ل ل للعود
"م طلبلات حقيق األمن الس ل ل ل ل لليي ي، ر من عبلد الس ل ل ل ل للمحلا
.10 ص،(2020 يوليو، مرص، )جامعة المنلورة،111 العدد،الببية
( 30(
What is Cyber Security? Definition and Best Practices, IT Governance Ltd, available at:
https://www.itgovernance.co.uk/what-is-cybersecurity, accessed on: 2 November 2023
: مل ل ل ل ل ل ل للاح عل ل ل للىل الل ل ل لرابل ل ل للط،Kaspersky Cybersecurity Company ،وب؟ ر ( 31 )
مل ل ل للا الل ل ل لمل ل ل للقل ل ل ل ل ل ل ل للود بل ل ل للاألمل ل ل للن اﻹلل ل ل لكل ل ل للي ي
نوفمي2 : ل للار للخ ال ل للدخوف،https://me.kaspersky.com/resource-center/definitions/what-is-cyber-security
2023
ص،(2017،العرب دار: (القاهرة، اإلنبنت رص ي ي ي ي ر
كيف يمك أن ت ير ال ل ش ي ي ي ييرص نإلا ير ع ي:اإللكب نية ر ال وة،( إيهاب خليفة32)
ي
.55-54 ص
(33)
Hans Hillen, The Defence Cyber Strategy, (Netherlands: Netherlands Ministry of Defense, 2012),
pp 8-9.
( 34)
Jennie M. Williamson, information operation, computer network attacks in the 21st century,
(United States: U.S. Army War College, 2002), pp 15-22.
(35)
Michael Connell and Sarah Vogler, “Russia’s Approach to Cyber Warfare”, CNA’s Occasional Paper
series, September 2016, p 12, available at: https://apps.dtic.mil/sti/pdfs/AD1019062.pdf, accessed
on: 3 November 2023.
( 36 )
North Atlantic Treaty Organization, “Cyber defence", 14 September 2023, available at:
https://www.nato.int/cps/en/natohq/topics_78170.htm, accessed on: 3 November 2023.
)كلية الحقوق، رس ل ل للالة ماجس ل ل ل ري، وا الوتيات الم ﺤ ة أنمو جا
أثر ال إل ي ات الس ي ي ي رييبانية عل األم ال ي،دحماب
ي ( س ل ل للليم37)
.55-54 ( ص2018 ، الجزائر، جامعة بوضياف،والعلوم السياسية
(38)
Michael Connell and Sarah Vogler, Op. cit., p 14.
،185 العللدد، مجليية السي ي ي ي ي يييياسي ي ي ي ي يية الي لييية،"في الللدوف يف المنطقللة العربيللة "أنمللا وأدوار الفل ر،( إيمللا أحمللد رجللب39)
لاعلﯿ من ر
ر
.89-88 ص ص،)2011 يوليو، مركز األهرام للدراسات السياسية واالسيا يجية:(القاهرة
(40)
Margaret B. Kwoka, “Leaking and Legitimacy”, University of California, Vol. 48, 2015, p 1395,
available at: https://lawreview.law.ucdavis.edu/issues/48/4/Articles/48-4_Kwoka.pdf, accessed
on: 3 November 2023.
(41)
Alan M. Katz, “Government information leaks and The first Amendment”, California law review,
Vol 64, Jan.1976, pp 108 – 113, available at: https://doi.org/10.2307/3479769, accessed on: 3
November 2023.
Page 34 of 36
(42)
Kathryn Flynn, “The practice and politics of leaking”, Social Alternatives, Vol. 30, Faculty of Law,
Humanities and the Arts papers, University of Wollongong, 2011, available at:
https://tinyurl.com/yk9v9f67, accessed on: 5 November 2023.
( 43 )
Greg Terrill, Secrecy and openness: the federal government from Menzies to Whitlam and
beyond, (Australia: Melbourne University Press, Carlton South, Vic, 2000), pp 222-225.
ر
مجلية الي راسي ي ي ي ي ييات اتسي ي ي ي ي ي ريباتيجيية،األخﻼف والﺨلدا االس ل ل ل ل ل ﺨبلارا الرسي ل ل ل ل بلات االس ل ل ل ل ل ﺨبلار لة ربﯿ اللداف ل ،،( محملد بمﺨيوا44)
ي
: م ل ل ل ل للاح ع ل للىل ال ل لراب ل للط،15 ص،(2022 مل ل للارس، لرب الل ل للدي ل لم ل لق ل لرا ي
ال ل لم ل للرك ل للز ال ل لع ل ل ي: ) ب ل لرل ل ل رلﯿ،14 ال ل لعل ل للدد،ال ي ييعس ي ي ي ي ي ي يك ي ييريي ي يية
.2023 نوفمي5 : ار للخ الدخوف،https://tinyurl.com/yt8pqvoz
.16 ص،( المرج السابق45)
( جر نواللد ر46)
،، الطبعلة األو، الوتييات الم ﺤي ة األمريكيية د لية المراق ية األمريكيية: ود ارد سي ي ي ي ي ييمودن: ت مكيان لالت يا،جلﯿ
ر
.120 ص،( 2014 ، الدار العربية للعلوم ناشو:(بيوت ر، بسام شيحا:رجمة
ر ر
دار فكر وفن: (القاهرة، اإللكب ي رسييي اتتت ال جس ي ييستت اإلرها
الت ي:اإللكب نية ( حسل ل ر47)
اإلعالم الج ي الجرائم،لنﯿ شل للفيق
ر
.26 ص،)2014 ، للطباعة والني وال وز ل ل
( 48 )
House of Commons Public Administration Select Committee, Leaks and whistleblowing in
Whitehall, Tenth Report of Session 2008–09, (London: The Stationery Office Limited, August 2009),
p 61-66, available at: https://tinyurl.com/yv73yvm2, accessed on: 5 November 2023.
(49)
Lee C. Bollinger and Geoffrey R. Stone, National Security, Leaks and Freedom of the Press: The
Pentagon Papers Fifty Years on, (UK: Oxford University Press, 2021), pp 57-74
(50)
Richard M. Perloff, Political Communication Politics, Press, and Public in America, (London and
New York: Routledge Taylor & Francis, 2013), pp 185-207
(51)
“What We Know About Leaked Military Documents”, Associated Press, April 2023, available at
https://www.voanews.com/a/what-we-know-about-leaked-military-documents-/7046657.html,
accessed on: 3 November 2023.
(52)
Suzanne Spaulding and Devi Nair, “Restore Trust in National Security Institutions”, CSIS, Jan 2021,
available at: https://www.csis.org/analysis/restore-trust-national-security-institutions, accessed
on: 6 November 2023.
(53)
Bruno S. Sergi and Elena G. Popkova, “Digital Economy: Complexity and Variety Vs. Rationality”,
(Springer International Publishing, 2019), pp 534-578
( 54 )
Glenn Greenwald, No place to hide: Edward snowden, the NSA and the surveillance state,
available at: http://glenngreenwald.net/, accessed on: 6 November 2023.
(55)
Dan Goodin, “Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers
leak”, Ars Technica, Jun 2019, available at: https://arstechnica.com/information-
technology/2019/05/stolen-nsa-hacking-tools-were-used-in-the-wild-14-months-before-shadow-
brokers-leak/ accessed on: 6 November 2023.
(56)
Vault 7: A Technical Analysis of the CIA Hacking Toolkit, WikiLeaks, March 2017, available at:
https://wikileaks.org/ciav7p1/, accessed on: 6 November 2023.
(57(
Al Jazeera Investigative Unit, “Unprecedented leak exposes inner workings of UK Labour Party”, Al
Jazeera, 23 Sep 2022, available at: https://tinyurl.com/2ogm7xre, accessed on: 6 November 2023.
(58)
For more details look: The Pentagon Papers: The Defense Department History of United States
Decisionmaking on Vietnam, Volume 1, The Senator Gravel Edition, Beacon Press, 1971.
(59)
Ed Pilkington, “Chelsea Manning prepares for freedom: 'I want to breathe warm spring air again”,
the guardian UK, May 2017, available at: https://www.theguardian.com/us-
news/2017/may/13/chelsea-manning-freedom-us-military-wikileaks, accessed on: 6 November
2023.
Page 35 of 36
الرسي ل ل ل ل ب للات االق ل ل ل ل ل ل للادي للة ك للأداة حرب يف المس ل ل ل ل ل قب ل ؟ ،نون بوس ي ي ي ي ي ييت 23 ،فياير ،2015م للاح عىل الرابط:
ل ( )60كيف عم ل
،https://www.noonpost.com/5562/ار للخ الدخوف 6 :نوفمي .2023
Page 36 of 36