Download Full Text
Contributing USMA Research Unit(s)
Army Cyber Institute
The Internet and the cyberenvironment offer an unprecedented opportunity for intelligence and espionage, not only because of the vulnerability or breaches but also because of the massive voluntary dissemination and sharing of data. Espionage has radically changed since the early 2000s, and open source intelligence is utilized to a great extent. Large quantities of personal information are voluntarily surrendered to social media, and the sheer size of this social media information creates intelligence assets, especially when aggregating, inferring, and analyzing the generated new knowledge of circumstances and facts that were not within the reach of intelligence agencies earlier. In addition, governments have pursued releasing unrestricted data in an effort to increase transparency and accountability and as an opportunity to increase economic activity. Businesses started to use open source intelligence in the 1990s to assess competitiveness, market offerings, and target marketing. These business practices have developed over time, and with the introduction of social media in the early 2000s, the amount of data available have increased every year. This entry examines the history of cyberespionage, the erosion of privacy in the age of big data, and emerging cyberespionage concerns.
Cybercrime, Cyberterrorism, Cyberwarfare, Hacking, Internet Fraud, Internet Surveillance, National Security Agency Surveillance, Spyware
Kallberg, Jan, "Cyberespionage" (2018). ACI Books & Book Chapters. 11.
Record links to items hosted by external providers may require fee for full-text.