Intelligence, Cyberspace, and National Security

Amitai Gilad, Eyal Pecht, Asher Tishler*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

10 Scopus citations

Abstract

This study evaluates military intelligence as the process of data collection and knowledge development and assessment for decision-making by the military and other governmental agencies. We argue that dominance in modern warfare is enabled by human and technological intelligence that uncovers the rivals’ capabilities and intentions, increases the effectiveness of the country’s own weapon systems, and facilitates the development of high-quality defense systems. Hence, gathering and evaluating intelligence is essential for countries involved in conflict or exposed to terror threats. We focus here on the strategic and tactical implications of intelligence in the context of an arms and intelligence race between two rivals. We present and assess models that show how security agencies in countries in a state of conflict (with other countries and/or non-country entities) should invest in developing their own intelligence capabilities to ensure adequate military (security) capabilities, national security, and welfare. Since advanced cyber attackers can infiltrate almost all complex computer networks to gather intelligence (and/or cause other harms), we show how countries can establish procedures and determine the budgets to optimally allocate cyber-defense resources to prevent harmful cyber-attacks on the complex computer networks that manage their infrastructure, business, security, and government operations.

Original languageEnglish
Pages (from-to)18-45
Number of pages28
JournalDefence and Peace Economics
DOIs
StatePublished - 2020

Keywords

  • Intelligence
  • arms race
  • budget allocation
  • cybersecurity
  • cyberspace
  • human capital
  • knowledge race

Fingerprint

Dive into the research topics of 'Intelligence, Cyberspace, and National Security'. Together they form a unique fingerprint.

Cite this