Document Type : مقالات علمی -پژوهشی

Authors

1 Assistant Professor, Department of International Relations, Tarbiat Modres University, Tehran, Iran.

2 M.A. in International Relations, Tarbiat Modares University, Tehran, Iran

Abstract

This article studies the transformation of Israel’s Security-Defense Doctrine in order to understand the framework of the cyber capabilities in shaping Israel’s new deterrence strategy against internal and external threats. Restrictions of geographical location in the turbulent Middle East, a lack of strategic depth, and vulnerabilities due to the asymmetry of the elements of national power against enemies and neighbors push Israel to avoid classical warfare and use the unconventional deterrence tools and new defense doctrine. In the context of cyber deterrence assumptions, this article introduces the basic idea that Israel has made targeted investments in developing cyber-deterrence capabilities by redefining its security-defense deterrence tools. The cyber deterrence strategy has expanded the scope of Israel's response to national security threats beyond its borders and significantly reduced the environmental vulnerability of internal threats. Accordingly, the transition from conventional military tools to unconventional tools persuades Israel to formulate national security strategies centered on cyber capabilities to meet new threats. The military vulnerability to Palestinian Resistance Groups in the recent war has shown that in the face of a more serious challenge like Iran, military warfare is not a viable option for Israel, and cyber deterrence is predicted to have a special place in Israel's Security-Defense Doctrine in the future.

Keywords

  1. Bar, S., (2020). Israeli strategic deterrence doctrine and practice. Tandfonline,3(1), 321-353. Published online: https://www.tandfonline.com/doi/abs/10.1080/01495933.2020.1772624
  2. BBC News. )2014(. Israel halts weapons shipment from Iran [WWW Document]. BBC News. URL https://www.bbc.com/news/world-middleeast-26451421
  3. Bencsáth, B., Ács-Kurucz, G., Molnár, G., Vaspöri, G., Buttyán, L., & Kamarás, R., (2015). Duqu 2.0: A comparison to Duqu. Budapest: Budapest University of Technology and Economics. https://www.crysys.hu/publications/files/duqu2.pdf
  4. Bencsath, B., Felegyh´azi, M., Buttyan, L., & Gabor, P., (2012). The Cousins of Stuxnet: Duqu, Flame, and Gauss. Budapest: Budapest University of Technology and Economics. mdpi.com/journal/futureinternet
  5. Bendiek, A., & Metzger, T., (2015). Deterrence theory in the cyber-century Lecture Notes in Informatics (LNI). Bonn: Gesellschaft für Informatik
  6. Ben-Horin, Y., & Posen, B., (1981). Israel's Strategic Doctrine.
  7. Burak Tolga, I., (2018). Principles of Cyber Deterrence and the Challenges in Developing a Credible Cyber Deterrence Posture. Estonia, Tallinn: CCDCOE.
  8. Cohen, M., & Freilich, C., (2016). Israel and Cyberspace: Unique Threat and Response. International Studies Perspectives, 1–15. https:// researchgate. net/ publication/ 288823312
  9. Cordey, S., (2019). The Israeli Unit 8200 – An OSINT-based study Trend Analysis. Center for Security Studies (CSS), ETH Zürich, https://doi.org/10.3929/ethz-b-000389135.
  10. Cristiano, F., (2020). Cyber defense and security as national trademarks of international legitimacy (Israel) in Romaniuk S. N. and Manjikian M. (2020, eds.) Routledge Companion to Global Cyber-Security Strategy.New York: Routlege.
  11. Cyber Fusion Team. (2018). Spies in the Middle East: Israeli Cyber Operations [WWW Document]. Secur. Alliance. URL https://www.secalliance.com/blog/spies-inthe-middle-east/
  12. Dehghani, A.A., (2018). Cyber Deterrence in the New Global Security: The Cyber Threat of Russia and China against Vital US Infrastructure. Political and International Approaches, 4(4), 121- 147.[in persion]
  13. (2019). How did the Stuxent virus enter the Natanz nuclear facility? https://www.dw.com/fa-ir [in persion]
  14. Eizenkot, G., (2016). Deterring Terror. How Israel Confronts the Next Generation of Threats. (Rosenberg, S., Trans.). Cambridge: Belfer Center.
  15. Frei, J., (2020). Israel’s National Cybersecurity and Cyberdefense Posture. Center for Security Studies (CSS), ETH Zürich.
  16. Fried, , (2020). Military, Civilian or Both: David Ben-Gurion’s Perception of National Security after the War of Independence. Contemporary Review of the Middle East, 7(2) 125–142.
  17. Gazit, , Brym, R.J., (2011). State-directed political assassination in Israel: A political hypothesis. International Sociology. 26(6) 862–877.
  18. Goodman, W., (2017). Cyber Deterrence: Tougher in Theory than in Practice? Strategic Studies Quarterly, 4(3), 102-135.
  19. (2019). Israel Says Iran Hacked Ex-general Gantz's Phone Ahead of Election. Haartez, 14.03.2019. https:// www.haaretz.com/ israel news/ elections/ benny- gantz- s-cellphone- hacked byiranian- intelligence-1.7022269
  20. Harkov, L., (2019). Politics: The cybersecurity election. The Jerusalem Post. 04.04.2019. https://www.jpost.com/Israel-Elections/Politics-Thecybersecurity-election-585802
  21. Holst, A., (2020. Israel: the Tech Innovation Nation, Released: October 2020 at: https://www.statista.com/study/82392/israel-the-tech-innovation-nation/ .
  22. (2018). 8200 Unit thwarts an ISIS attack [WWW Document]. IDF. URL https://www.idf.il/en/articles/terror-andthreats/8200-unit-thwarts-an-isis-attack /
  23. (2017). Israel National Cyber Security Strategy in Brief. Prime Minister Office. https://cyber.haifa.ac.il/images/pdf/cyber_english_A5_ final.pdf
  24. Libicki, M.C., (2009). Cyber deterrence and Cyberwar. In Cyber deterrence and Cyberwar, CA: RAND, 27-37.
  25. Liu, Sh., (2021). Active cybersecurity companies in Israel 2011-2020. Jan 18. https://www.statista.com/statistics/1003442/israel-cyber-security-companies/.
  26. Meisels, T., (2013). Assassination: Targeting Nuclear Scientists, Law and Philosophy (2014) 33: 207- 234.
  27. Muttahid Askari, E., (2000). Science and Technology in Israel. Regional Studies in Israeli Studies and American Studies 4. [in persion]
  28. Nye, J.S., (2017). Deterrence and Dissuasion in Cyberspace. International Security. International Security, 41(3), 44–71.
  29. Philbin, M.J., (2013). Cyber Deterrence: An Old Concept in a New Domain Carlisle. Available at: https://www.semanticscholar.org/ paper/ Cyber-Deterrence%3 A-An-Old-Concept- in- a- New- Domain Philbin/ 356d310b914e32596ea46f2beaf26048a5de1b2
  30. Rousseau, J.P., (2017). The history andimpact of unit 8200 on Israeli HI-TECH entrepreneurship. A Thesis Presented to The Honors Tutorial College. Ohio University.
  31. Ryan, N.J., (2018). Five Kinds of Cyber Deterrence. Technol. 31:331–338.
  32. Szmigiera, M., (2021). Research and development worldwide - Statistics & Facts. https://www.statista.com/topics/6737/research-and-development worldwide/?topicHeader wrapper
  33. Torabi, Q., (2016). An analysis of the military strategy document of the Zionist regime. National Watch, 54(3), 39-44. [in persion]
  34. World Intellectual Property Organization. (2020). Ranking the Tel Aviv startup ecosystem. https://www.savills.com/search/sitesearch.aspx?page=1&searchKeyRanking%20the%20Tel%20Aviv%20startup%20ecosystem&filter
  35. Zitun, Y., (2018). IDF’s Unit 8200 helped Australia thwart attempt to bomb plane. [WWW Document]. Ynet. URL https://www.ynetnews.com/articles/0,7340,L5124744,00.html
CAPTCHA Image