What is it about?
The paper compares the phases of intelligence illegal operations with the phases of advanced persistent threat operations and finds strong parallels. It also suggests that ways the methods used in countering intelligence illegals could be applied in countering advanced persistent threats, despite the physical differences between them..
Featured Image
Why is it important?
The paper is the first to compare these seemingly disparate phenomena. The conclusion is that computer-based threats are conceptually similar to human-based threats.
Perspectives
Nations tend to approach "cyber" threats as something new and different. In reality, they are simply a new venue for accomplishing the same goals that foreign intelligence services have been trying to achieve for many years. The difference is the speed, reach, and lower cost of computer-based operations in comparison to human-based operations. They are still foreign intelligence operations, however, which need to be mitigated with concepts.
Kevin Riehle
National Intelligence University
Read the Original
This page is a summary of: Human-cyber Nexus: the parallels between ‘illegal’ intelligence operations and advanced persistent threats, Intelligence & National Security, October 2018, Taylor & Francis,
DOI: 10.1080/02684527.2018.1534642.
You can read the full text:
Contributors
The following have contributed to this page







