Intelligence, Cyberspace, and National Security

Received: 14 June 2021, Revised: 19 June 2021, Accepted: 11 Dec 2021, Available online: 22 Dec 2021, Version of Record: 22 Dec 2021

Amitai Gilad
,
Eyal Pecht
&
Asher Tishler

Abstract


This study evaluates military intelligence as the process of data collection and knowledge development and assessment for decision-making by the military and other governmental agencies. We argue that dominance in modern warfare is enabled by human and technological intelligence that uncovers the rivals’ capabilities and intentions, increases the effectiveness of the country’s own weapon systems, and facilitates the development of high-quality defense systems. Hence, gathering and evaluating intelligence is essential for countries involved in conflict or exposed to terror threats. We focus here on the strategic and tactical implications of intelligence in the context of an arms and intelligence race between two rivals. We present and assess models that show how security agencies in countries in a state of conflict (with other countries and/or non-country entities) should invest in developing their own intelligence capabilities to ensure adequate military (security) capabilities, national security, and welfare. Since advanced cyber attackers can infiltrate almost all complex computer networks to gather intelligence (and/or cause other harms), we show how countries can establish procedures and determine the budgets to optimally allocate cyber-defense resources to prevent harmful cyber-attacks on the complex computer networks that manage their infrastructure, business, security, and government operations.
KEYWORDS:



Description



   

Indexed in scopus

https://www.scopus.com/authid/detail.uri?authorId=57218204076
      

Article metrics

10.31763/DSJ.v5i1.1674 Abstract views : | PDF views :

   

Cite

   

Full Text

Download

Conflict of interest


“Authors state no conflict of interest”


Funding Information


This research received no external funding or grants


Peer review:


Peer review under responsibility of Defence Science Journal


Ethics approval:


Not applicable.


Consent for publication:


Not applicable.


Acknowledgements:


None.