The Quest to Cyber Superiority pp 183-194 | Cite as
Cybersecurity in Gulf Cooperation Council Economies
Abstract
This chapter examines the cybersecurity landscape of the six Gulf Cooperation Council economies. Key elements of data protection regulations in these economies draw on a number of frameworks such as the Shari’ah principles, U.S. data privacy laws, EU data protection directive, UN Model Laws on e-commerce and electronic signatures and other sources. This chapter examines CS regulations in these economies, their principal triggers, drivers and facilitators as well as challenges facing these economies on the CS front. Also analyzed in the chapter are similarities and differences of these economies’ CS frameworks with those of the EU and the U.S. For the U.S. and other Western countries, the strategic significance of GCC economies’ CS initiatives is growing due to the fact that these economies are involved in intelligence gathering and sharing about key issues such as Iranian arms, and their rapidly growing CS market due primarily to some of the high profile cyber-attacks faced by some of the GCC economies has created opportunities for Western technology firms specializing in CS.
Keywords
Saudi Arabia Data Protection United Arab Emirate Gulf Cooperation Council Free ZoneReferences
- Allison, A. (2013). The hidden value of IT departments. MEED: Middle East Economic Digest, 57(18), 41.Google Scholar
- Al-Saud, N. B. A. (2012). Cybersecurity strategies. JFQ: Joint Force Quarterly, 64, 75–81 (1st Quarter).Google Scholar
- arabianindustry.com. (2013, August 1). Saudi Electricity Company’s IT transformation. http://arabianindustry.com/utilities/features/2013/aug/1/saudi-electricity-companys-it-transformation-4391218/#.VA8IPVcaTIY
- arabnews.com. (2014). 400,000 porn sites blocked by CITC. http://www.arabnews.com/news/598441
- Binham, C. (2013). The hacker hunters. http://www.ft.com/intl/cms/s/2/bccc8f3c-523c-11e3-8c42-00144feabdc0.html#axzz37vVS6Nvw
- Brenner, J. F. (2013). Eyes wide shut: The growing threat of cyber attacks on industrial control systems. Bulletin of the Atomic Scientists, 69(5), 15–20.CrossRefGoogle Scholar
- Bronk, C. (2014). Hacks on gas: Energy, cybersecurity, and U.S. defense. The James A. Baker Iii Institute For Public Policy, Rice University.Google Scholar
- Burgers, R., Baars, H., Adriaensen, M., & Raja, A. (2014). Middle East needs cyber security from within utilities face energy threat. DNV KEMA Energy & Sustainability.Google Scholar
- businessweekme.com. (2014). Fallout from the Saudi Aramco breach continues. http://businessweekme.com/Bloomberg/newsmid/190/newsid/35
- Carr, J. (2012). Why wasn’t Saudi Aramco’s oil production targeted? http://jeffreycarr.blogspot.de/2012/09/why-wasnt-saudi-aramcos-oil-production.html
- Cornish, J. (2013). Data protection and privacy laws in the Middle East. Latham & Watkins LL. http://www.jdsupra.com/legalnews/data-protection-and-privacy-laws-in-the-24928/
- Cornwell, A. (2014). Cyber attacks an increasing threat for Mideast oil and gas. http://gulfnews.com/business/oil-gas/cyber-attacks-an-increasing-threat-for-mideast-oil-and-gas-1.1399982
- dnaindia.com. (2013). Saudi Arabia to ban WhatsApp soon. http://www.dnaindia.com/scitech/report-saudi-arabia-to-ban-whatsapp-soon-1850251
- Eduard, K. (2014). Website of Kuwait’s Ministry of Interior Hacked and Defaced. http://news.softpedia.com/news/Website-of-Kuwait-s-Ministry-of-Interior-Hacked-and-Defaced-435068.shtml
- El-Guindy, M. N. (2013). Middle East Cyber Security Threat Report 2014. http://netsafe.me/category/cybercrime/
- Elliott, S. (2012). Privacy and data interception in Saudi Arabia. http://www.privacydatasecurityblog.com/2012/06/08/privacy-and-data-interception-in-saudi-arabia/
- Fielding-Smith, A. (2013). Middle East cyber crimes force concerted response from banks. http://www.ft.com/intl/cms/s/0/28010fda-25f1-11e3-8ef6-00144feab7de.html#axzz2osZmvj8v
- financierworldwide.com. (2013). Talking point: Cyber security and data protection in the Middle East. http://www.financierworldwide.com/article.php?id=11296&page=2
- gartner.com. (2013). Gartner says The Middle East and Africa IT infrastructure spending to reach US$ 4 billion. http://www.gartner.com/newsroom/id/2347215
- gitex.com. (2013). MENA outpacing most of world in cloud computing growth. http://www.gitex.com/Content/MENA-outpacing-most-of-world-in-cloud-computing-growth
- globalvoicesonline.org. (2014). 7 Cases that prove online activism is under siege in Saudi Arabia. http://advocacy.globalvoicesonline.org/2014/07/15/7-cases-that-prove-online-activism-is-under-siege-in-saudi-arabia/
- gulfnews.com. (2012). Oman forum calls for tough laws against cybercrime. http://gulfnews.com/news/gulf/oman/oman-forum-calls-for-tough-laws-against-cybercrime-1.1035332
- Hermida, A. (2002). Saudis block 2,000 websites. http://news.bbc.co.uk/2/hi/technology/2153312.stm
- Idlebi, N. (2008, February). Cyber legislation in the ESCWA region security issues. UN-Economic and Social Commission for Western Asia, Data Protection and Privacy (DP&P)Google Scholar
- ITA. (2011). Electronic transactions law. Information Technology Authority (ITA). http://www.ita.gov.om/ITAPortal/MediaCenter/Document_detail.aspx?NID=56
- jpost.com. (2013, June 9). US aids Gulf allies to counter Iran cyber-attacks. http://www.jpost.com/Iranian-Threat/News/US-aids-allies-defend-against-Iran-cyber-attacks-315903
- Karasik, T. (2013). Saudi Arabia’s defense posture is robust. http://english.alarabiya.net/en/views/news/middle-east/2013/09/23/Saudi-Arabia-s-defense-posture-is-robust.html
- Khaleej Times (United Arab Emirates). (2014, August). GCC cloud market to post seven-fold growth by 2020. http://www.khaleejtimes.com/article/20140821/ARTICLE/308219895/1037
- Knickmeyer, E. (2013). After cyberattacks, Saudi steps up online security. http://blogs.wsj.com/middleeast/2013/08/26/after-cyberattacks-saudi-steps-up-online-security/
- KPMG. (2012). International executive services: Thinking beyond borders Kuwait. KPMG International.Google Scholar
- Kshetri, N., & Murugesan, S. (2013). EU and US cybersecurity strategies: Impacts on businesses and consumers. IEEE Computer, 46(10), 84–88.CrossRefGoogle Scholar
- menafn.com. (2011). Rate of cyber crimes in Qatar negligible: Official, MENAFN, The Peninsula. http://www.menafn.com/menafn/qn_news_story_s.aspx?storyid=1093423127
- Mustafa, A. (2014). UAE to double security budget, focus on cyber. http://mobile.defensenews.com/article/302240015
- Nakashima, E. (2013). Pentagon to boost cybersecurity force. http://www.washingtonpost.com/world/national-security/pentagon-to-boost-cybersecurity-force/2013/01/19/d87d9dc2-5fec-11e2-b05a-605528f6b712_story.html?hpid=z4
- Nusca, A. (2014). It’s time for corporate boards to tackle cybersecurity. Here’s why. Fortune.com. 1-1.
- O’Connell, N. (2012). Data protection and privacy issues in the Middle East. http://www.legal500.com/c/united-arab-emirates/developments/17454
- Rains, T. (2011). The curious case of Qatar. http://blogs.technet.com/b/security/archive/2011/11/22/the-curious-case-of-qatar.aspx
- Ratnam, G. (2014). Pentagon aiding allies on cybersecurity in Gulf to Asia. http://www.bloomberg.com/news/2014-03-31/pentagon-aiding-allies-on-cybersecurity-in-gulf-to-asia.html
- Saudi Gazette. (2014). 38 percent Saudi companies unsure about cyber security. https://en-maktoob.news.yahoo.com/38-percent-saudi-companies-unsure-cyber-security-084219081.html
- saudigazette.com.sa. (2014). Haia asks ministry to arrest blasphemers. http://www.saudigazette.com.sa/index.cfm?method=home.regcon&contentid=20140819215183
- Schwentker, R. B. (2013). Cyber warfare – The new reality. Infrastructure, 52(3), 1–5 (cover story).Google Scholar
- scidev.net. (2013). Gulf countries ‘need early-warning on cyber attacks’. http://www.scidev.net/global/technology/news/gulf-countries-need-early-warning-on-cyber-attacks.html
- Smythe, C. (2013). Eight charged with debit card cyber-crime targeting banks. http://www.bloomberg.com/news/2013-05-09/eight-charged-with-debit-card-cyber-crime-targeting-banks.html
- The peninsulaqatar. (2014). Cyber attacks: Qatar third most targeted. http://thepeninsulaqatar.com/news/qatar/303181/cyber-attacks-qatar-third-most-targeted
- thepeninsulaqatar.com. (2013). Energy, water and cyber security top goals. http://thepeninsulaqatar.com/news/qatar/262025/energy-water-and-cyber-security-top-goals
- United Nations. (2007, August). National profile of the information society in Kuwait. Economic and Social Commission for Western Asia (Escwa), United Nations.Google Scholar
- ustr.gov. (2004). U.S.-Bahrain FTA: Fact sheet on access to medicines. http://www.ustr.gov/about-us/press-office/fact-sheets/archives/2004/september/us-bahrain-fta-fact-sheet-access-medicines
- washingtonpost.com. (2014). Saudi Arabia continues its outrageous repression of human rights activists. http://www.washingtonpost.com/opinions/saudi-arabia-continues-its-outrageous-repression-of-human-rights-activists/2014/08/26/dc6404fa-2258-11e4-958c-268a320a60ce_story.html