{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:00:59Z","timestamp":1747224059198,"version":"3.40.5"},"reference-count":27,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p>This article advances a conceptual framework for cyber counterintelligence (FCCI) as a theoretical construct, hopefully useful not only to this field's academic development, but also to sound practice. It is submitted within the context of the sharp increasing targeting of state and non-state actors by adversarial intelligence actors (such other nation states, crime syndicates and competitors). The signature role of cyber counterintelligence (CCI) is precisely the engagement, exploitation and neutralisation of such adversarial actors. CCI has been practised by nation states for well over a decade and has recently also been gaining traction in corporate board rooms and as an academic field. Sound theory is critical to not only CCI's academic evolvement but also to sound practice. The proposed FCCI comprises of eight notional building blocks essential to explaining what CCI is and how it works.<\/jats:p>","DOI":"10.4018\/ijcwt.2019100103","type":"journal-article","created":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T19:17:25Z","timestamp":1578079045000},"page":"44-62","source":"Crossref","is-referenced-by-count":2,"title":["Cyber Counterintelligence"],"prefix":"10.4018","volume":"9","author":[{"given":"Petrus","family":"Duvenage","sequence":"first","affiliation":[{"name":"University of Johannesburg, Johannesburg, South Africa"}]},{"given":"Thenjiwe","family":"Sithole","sequence":"additional","affiliation":[{"name":"University of Johannesburg, Johannesburg, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3586-6632","authenticated-orcid":true,"given":"Basie","family":"von Solms","sequence":"additional","affiliation":[{"name":"University of Johannesburg, Johannesburg, South Africa"}]}],"member":"2432","reference":[{"journal-title":"Reverse deception\u2013Organized cyber threat counter- exploitation","year":"2012","author":"S. A.Bodmer","key":"IJCWT.2019100103-0"},{"key":"IJCWT.2019100103-1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25133-2"},{"key":"IJCWT.2019100103-2","article-title":"Counterintelligence","author":"P. C.Duvenage","year":"2013","journal-title":"Intelligence and Private Investigation: Developing Sophisticated Methods for Conducting Inquiries"},{"key":"IJCWT.2019100103-3","doi-asserted-by":"crossref","unstructured":"Duvenage, P. C. (2019). A Conceptual Framework for Cyber Counterintelligence. Unpublished thesis, University of Johannesburg, Johannesburg.","DOI":"10.4018\/IJCWT.2019100103"},{"key":"IJCWT.2019100103-4","unstructured":"Duvenage, P. C., & Hough, M. (2011). The conceptual structuring of the intelligence and the counterintelligence processes. Strategic Review for Southern Africa, 33(2)."},{"key":"IJCWT.2019100103-5","doi-asserted-by":"crossref","unstructured":"Duvenage, P. C., Jaquire, V. J., & von Solms, S. H. (2019). A cyber counterintelligence matrix for outsmarting your adversaries. In Proceedings of the 18th European Conference on Cyber Warfare and Security. Academic Press.","DOI":"10.4018\/IJCWT.2019100103"},{"key":"IJCWT.2019100103-6","doi-asserted-by":"crossref","unstructured":"Duvenage, P. C., Jaquire, V. J., & von Solms, S. H. (2019). A cyber counterintelligence matrix for outsmarting your adversaries. In Proceedings of the 18th European Conference on Cyber Warfare and Security. Academic Press.","DOI":"10.4018\/IJCWT.2019100103"},{"key":"IJCWT.2019100103-7","unstructured":"Duvenage, P. C., Sithole, T. G., & von Solms, S. H. (2017). A conceptual framework for cyber counterintelligence \u2013 Theory that really matters! In Proceedings of the 16th European Conference on Cyber Warfare and Security. Academic Press."},{"key":"IJCWT.2019100103-8","doi-asserted-by":"crossref","unstructured":"Duvenage, P. C., & von Solms, S. H. (2013). The Case for Cyber Counterintelligence. In Proceedings of the5th International Workshop on ICT Uses In Warfare and Peace. IEEE.","DOI":"10.1109\/ICASTech.2013.6707493"},{"key":"IJCWT.2019100103-9","unstructured":"Duvenage, P. C. & von Solms. S.H. (2015). Cyber Counterintelligence: Back to the Future. Journal of Information Warfare, 13(1)."},{"key":"IJCWT.2019100103-10","unstructured":"Duvenage, P. C., Von Solms, S. H., & Corregedor, M. (2015). The Cyber Counterintelligence Process - a conceptual overview and theoretical proposition. In Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Press."},{"key":"IJCWT.2019100103-11","unstructured":"Duvenage, P. C., von Solms, S. H., & Jaquire, V. J. (2016). Conceptualising Cyber Counterintelligence \u2013 Two Tentative Building Blocks. In Proceedings of the 15th European Conference on Cyber Warfare and Security. Academic Press."},{"key":"IJCWT.2019100103-12","unstructured":"Gill, P. (2006). What is Intelligence Theory? In G.F. Treverton et al. (Eds.), Toward a Theory of Intelligence \u2013 Workshop Report. RAND. Retrieved from http:\/\/www.rand.org\/pubi\/larf\/proceedings\/2006Rand\u2013CF219.pdf"},{"journal-title":"Dirty tricks or trump cards \u2013 U.S. covert action and counterintelligence","year":"2001","author":"R.Godson","key":"IJCWT.2019100103-13"},{"issue":"2","key":"IJCWT.2019100103-14","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1177\/1745691611434210","article-title":"There is nothing so theoretical as a good method.","volume":"7","author":"A. G.Greenwald","year":"2012","journal-title":"Perspectives on Psychological Science"},{"key":"IJCWT.2019100103-15","unstructured":"Jaquire, V. J. (2018). A framework for a cyber counterintelligence maturity model. Unpublished thesis, University of Johannesburg, Johannesburg."},{"journal-title":"Advancing the capacity of a theater special operations command (TSOC) to counter hybrid warfare threats in the cyber gray zone","year":"2017","author":"J. E.Justiniano","key":"IJCWT.2019100103-16"},{"key":"IJCWT.2019100103-17","unstructured":"Kaspersky. (2018). State of Industrial Cybersecurity 2018. Retrieved from https:\/\/usa.kaspersky.com\/about\/press-releases\/2018_ics-cybersecurity"},{"journal-title":"Intelligence: From Secrets to Policy","year":"2012","author":"M. M.Lowenthal","key":"IJCWT.2019100103-18"},{"year":"2016","key":"IJCWT.2019100103-19"},{"key":"IJCWT.2019100103-20","unstructured":"Panda Security Labs. (2018) The hunter becomes the hunted: How cyber counterintelligence works. Retrieved from https:\/\/www.pandasecurity.com\/mediacenter\/panda-security\/cyber-counterintelligence\/"},{"journal-title":"Counterintelligence: Theory and Practice","year":"2012","author":"H.Prunckun","key":"IJCWT.2019100103-21"},{"key":"IJCWT.2019100103-22","article-title":"Twenty-first-century counterintelligence","author":"J. E.Sims","year":"2009","journal-title":"Vaults, mirrors and masks \u2013 Rediscovering U.S. counterintelligence"},{"key":"IJCWT.2019100103-23","doi-asserted-by":"crossref","unstructured":"Molander, R. C., Riddile, A., Wilson, P. A., & Williamson, S. (1996). Strategic Information Warfare - new face of war. RAND Cooperation Santa Monica.","DOI":"10.7249\/MR661"},{"key":"IJCWT.2019100103-24","unstructured":"Symantec. (2018). Internet Security Threat Report Volume 23 - March 2018. Retrieved from https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-executive-summary-en.pdf"},{"key":"IJCWT.2019100103-25","unstructured":"Symantec. (2019). Internet Security Threat Report Volume 24 - February 2019. Retrieved from https:\/\/www.symantec.com\/security-center\/threat-report"},{"key":"IJCWT.2019100103-26","unstructured":"The Economist. (2015). Counter-intelligence techniques may help firms protect themselves against cyber-attacks. Retrieved from http:\/\/www.economist.com\/news\/business\/21662540-counter-intelligence-techniques-may-help-firms-protectthemselves"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=246333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T14:15:19Z","timestamp":1651846519000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCWT.2019100103"}},"subtitle":["An Exploratory Proposition on a Conceptual Framework"],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":27,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2019100103","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"type":"print","value":"1947-3435"},{"type":"electronic","value":"1947-3443"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}