ACI Books & Book Chapters

Cyberespionage

Title

Cyberespionage

Document Type

Other

Files

External Link

Download Full Text

Contributing USMA Research Unit(s)

Army Cyber Institute

Description

The Internet and the cyberenvironment offer an unprecedented opportunity for intelligence and espionage, not only because of the vulnerability or breaches but also because of the massive voluntary dissemination and sharing of data. Espionage has radically changed since the early 2000s, and open source intelligence is utilized to a great extent. Large quantities of personal information are voluntarily surrendered to social media, and the sheer size of this social media information creates intelligence assets, especially when aggregating, inferring, and analyzing the generated new knowledge of circumstances and facts that were not within the reach of intelligence agencies earlier. In addition, governments have pursued releasing unrestricted data in an effort to increase transparency and accountability and as an opportunity to increase economic activity. Businesses started to use open source intelligence in the 1990s to assess competitiveness, market offerings, and target marketing. These business practices have developed over time, and with the introduction of social media in the early 2000s, the amount of data available have increased every year. This entry examines the history of cyberespionage, the erosion of privacy in the age of big data, and emerging cyberespionage concerns.

Publication Date

Summer 6-6-2018

City

Thousand Oaks

Keywords

Cybercrime, Cyberterrorism, Cyberwarfare, Hacking, Internet Fraud, Internet Surveillance, National Security Agency Surveillance, Spyware

First Page

136

Cyberespionage

Record links to items hosted by external providers may require fee for full-text.

Share

COinS