Ways to deal with cyber espionage of the Zionist regime

Document Type : Original Article

Authors

1 PhD student, Department of Information Technology Management, Science and Research Unit, Islamic Azad University, Tehran, Iran

2 Master's student, Department of Law, South Tehran Branch, Islamic Azad University, Tehran, Iran

Abstract

In the age of information and communication technology, the increasing development of emerging technologies has undergone fundamental changes in all areas of human life, including the fields of espionage, defense, and military. Recognizing the challenges and threats of these new technologies and being prepared to deal intelligently with the macro-technological trends is one of the constant concerns of policymakers and beneficiaries of the cyber space, hence future research, deep exploratory study, review and analysis of reliable global documents and reports in this Scope is essential. In this research, looking for answers to the questions "What is the impact of disruptive technologies in cyber espionage of the Zionist regime?" and "What are the ways to deal with the cyber espionage of the Zionist regime?" This is a descriptive-case study and in order to collect data, library sources, reliable scientific sites, internal and external documents and reports are used. The results of this research show that the Zionist regime is one of the most prominent parties in the world that increasingly uses basic cyber technology, especially artificial intelligence, for its military and civilian purposes. These technologies give the Zionist regime more facilities for analysis, prediction and espionage operations, the most impact can be counted in the field of cyber espionage.

Keywords


ایسنا. (1402/04/25). بلومبرگ: رژیم صهیونیستی در عملیات نظامی خود از هوش مصنوعی استفاده می‌کند. قابل دسترس در [https://www.isna.ir](https://www.isna.ir).
جوان آنلاین. (1402/04/26). استفاده ارتش صهیونیستی از هوش مصنوعی. قابل دسترس در [https://www.javanonline.ir](https://www.javanonline.ir).
دویچه وله. (1402/07/05). رژیم صهیونیستی پیشگام در ساخت ربات‌های جنگی مبتنی بر هوش مصنوعی. قابل دسترس در [https://www.dw.com/fa-ir](https://www.dw.com/fa-ir).
فارس. (1402/01/23). هوش مصنوعی در خدمت اهداف جاسوسی رژیم صهیونیستی. قابل دسترس در [https://www.farsnews.ir](https://www.farsnews.ir).
گرداب. (1402/06/08). رژیم صهیونیستی، هوش مصنوعی و کشتار مردم بی‌گناه فلسطین. قابل دسترس در [https://gerdab.ir](https://gerdab.ir).
گرداب. (1399/09/11). ردپای جاسوسی سایبری در ترور شهید فخری‌زاده. قابل دسترس در [https://gerdab.ir](https://gerdab.ir).
گل محمدی، و. و جمشیدی، ط. (1401). بازدارندگی سایبری و تحول در دکترین امنیتی-دفاعی اسرائیل. فصلنامه جغرافیای سیاسی، 7(4).
مرکز اطلاع رسانی فلسطین. (1398/07/06). یگان 8200 رژیم صهیونیستی و نقش آن در فناوری‌های جاسوسی این رژیم. قابل دسترس در [https://farsi.palinfo.com](https://farsi.palinfo.com).
هلیلی خداداد، و. و ولوی محمدرضا، و. و موحدی صفت، م. (1396). مدلسازی فرایندهای C4I توسط سامانه‌های فیزیکی-سایبری-اجتماعی (CPSS). دهمین کنفرانس ملی فرماندهی و کنترل ایران، دانشگاه خاتم الانبیاء (ص).
Attatfa, A., Renaud, K., & De Paoli, S. (2020). Cyber Diplomacy: A Systematic Literature Review. *Procedia Computer Science, 176*, 60–69. https://doi.org/10.1016/j.procs.2020.08.00
Cook, P. J. (2018). Gun theft and crime. *Journal of Urban Health, 95*(3), 305–312. https://doi.org/10.1007/s11524-018-0253-
Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. *Center for Security Studies (CSS), ETH Zürich*. Available at https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2019-12-Unit-8200.pdf
Creswell, J. W. (2014). *Qualitative inquiry and research design: Choosing among five approaches* (4th ed.). Thousand Oaks, CA: Sage.
Gl, S., Jh, A., Roberts, K., Gordon, J., Smith, E. R., Afman, J., & Sm, S. (2019). The Joint Counterterrorism Awareness Workshop Series (JCTAWS): Integrating disciplines for enhanced capabilities during a complex coordinated attack. *Journal of Emergency Management, 17*(3), 210–212. https://doi.org/10.5055/jem.2019.0419
Herr, T. Prep. (2014). A framework for malware & cyber weapons. *The Journal of Information Warfare, 13*(1), 87-106.
Mat, S. R. T., Ab Razak, M. F., Kahar, M. N. M., Arif, J. M., Mohamad, S., & Firdaus, A. (2021). Towards a systematic description of the field using bibliometric analysis: malware evolution. *Scientometrics, 126*(3), 2013–2055. https://doi.org/10.1007/s11192-020-03834-6
 
Mese, I., Taslicay, C. A., & Sivrioglu, A. K. (2023). Improving radiology workflow using ChatGPT and artificial intelligence. *Clinical Imaging, 103*(109993), 109993. https://doi.org/10.1016/j.clinimag.2023.109993
Perenc, L. (2022). Psychopathic personality disorder and cybercriminality: an outline of the issue. *Current Issues in Personality Psychology*. https://doi.org/10.5114/cipp.2022.114205
Senor, D., & Singer, S. (2009). *Start-up nation: the story of Israel's economic miracle*. United States.
The Hague Centre for Strategic Studies. (2022). *The Cyber Arms*. Available at https://hcss.nl/wp-content/uploads/2022/05/Cyber-Arms-Watch-HCSS-2022-1.pdf
Vie, L. L., Scheier, L. M., Lester, P. B., Ho, T., Labarthe, D. R., & Seligman, M. E. P. (2015). The U.S. Army Person-Event Data Environment: a Military–Civilian big data enterprise. *Big Data, 3*(2), 67–79. https://doi.org/10.1089/big.2014.0055
Zou, L., Wang, Z., Han, Q., & Yue, D. (2023). Tracking control under Round-Robin scheduling: Handling impulsive transmission outliers. *IEEE Transactions on Cybernetics, 53*(4), 2288–2300. https://doi.org/10.1109/tcyb.2021.3115459