<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Comparative Analysis of Cyber Intelligence: the Italian case</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alessia Boi</string-name>
          <email>alessia.boi@consorzio-cini.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Center for Cybersecurity and International Relations Studies</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Cyber Intelligence</institution>
          ,
          <addr-line>Italy, China, NATO, MNE7</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>A complex operational domain as cyberspace, forces us to assess which strategy is better to implement in order to preserve and protect national interests. For many analysts, the best solution seems to be ANDM, that is "the National Multidimensional Approach to Crisis Management”, which appears to be applicable to any type of complex operational situation that requires the combined use of national resources and / or of the International Community. This paper therefore aims to assess whether the multidimensional approach is really the key to implement an effective and effective strategy in cyber space. The approach will be evaluated through a comparative analysis with the strategy, instead, applied by the People's Republic of China, selected also for its diametrically opposite political and strategic situation, obviously such analysis could concern as many state realities as Russia, India, Israel and as many others, but for the purposes of analysis in this case and for the synthetic need, the comparison with the Chinese reality has been considered comprehensive.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Threats in cyberspace represent a challenge to the stability, prosperity and security of all nations.
The cyber environment has implications in both the physical and informational domains, as it is
"transversal”[1] to traditional operating domains (terrestrial, maritime, air and space), directly
influencing the general and operational planning as well as conduct of operations. When made explicit
in the form of attacks, these implications can be aimed at governmental, economic and financial
structures, companies, and critical infrastructures. On the other hand, the perpetrators of the attacks may
originate from state entities, terrorists, criminal groups, or individuals aiming at information collection.</p>
      <p>Hence the need to develop, in the field of national defense, suitable capabilities to "connect" conflicts
beyond normal physical boundaries, compressing the space-time dimension through a complex
interaction between the traditional and the information environments of the cyber space.</p>
      <p>A complex operational domain as cyberspace, forces us to assess which strategy is better to
implement in order to preserve and protect national interests. For many analysts[2], the best solution
seems to be ANDM, that is "the National Multidimensional Approach to Crisis Management”[3], which
appears to be applicable to any type of complex operational situation that requires the combined use of
national resources and / or of the International Community.</p>
      <p>This paper therefore aims to assess whether the multidimensional approach is really the key to
implement an effective and effective strategy in cyber space. The approach will be evaluated through a
comparative analysis with the strategy, instead, applied by the People’s Republic of China, selected
also for its diametrically opposite political and strategic situation, obviously such analysis could
concern as many state realities as Russia, India, Israel and as many others, but for the purposes of
analysis in this case and for the synthetic need, the comparison with the Chinese reality has been
considered comprehensive.</p>
      <p>ITASEC 2021, Italy</p>
      <p>2020 Copyright for this paper by its authors.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Italian Governance and Strategy</title>
      <p>With the beginning of the new century, in cyberspace there have been numerous phenomena of
geopolitical importance and an exponential growth of crisis areas, attributable to the contemporary
global interconnection. This situation has therefore forced the adaptation of its legislative systems to
adequately address the new threats.</p>
      <p>In a more and more interconnected society, marked by the advent of technology, intelligence also
becomes the main mean for the acquisition of precious information. For this reason, many States have
re-evaluated the use of intelligence techniques for the acquisition of advantages in the cyber space and
a new branch of the subject has been created: The Cyber Intelligence.</p>
      <p>In this scenario, Italy has provided for the legislative update, through law no. 124 issued in 2007
"Information system for the security of the Republic and new discipline of State secret" (Sistema
d’informazione per la sicurezza della Repubblica e nuova disciplina del segreto di Stato). This law,
introduced in order to respond to the changed social-national and political-international contexts and to
the new economic, energy and cyber challenges, represents a significant turning point in the history of
our Services, since it defines and frames the tasks, criteria and principles that regulate the functions of
national intelligence, with newfound consistency and accuracy.</p>
      <p>This legislative text that does not establish a single Service but creates the Department of
Information and Security (DIS) an informative and analytical hub, superordinate to two new structures:
Agency for Information and External Security (AISE) and Agency for Information and Internal Security
(AISI).</p>
      <p>Within the legislative framework, a further turning point within the Italian information structure was
the regulation of cyber matters which, until then, had only been mentioned but never organically
organized with clear directives. The National Plan for Cyber Protection and Cyber Security is drawn up
through the Prime Ministerial Decree of 31 March 2017[4], proposing the following objectives:
•
•
•
•
•
•</p>
      <p>Strengthening the defense capabilities of National Critical Infrastructures and of the actors
of strategic importance for the country system;
Improvement, according to an integrated approach, of the technological, operational and
analytical skills of the institutional actors involved;
Encouragement of cooperation between national institutions and companies ;
Promotion and dissemination of the culture of cyber security;
Strengthening of international cooperation in the field of cyber security;</p>
      <p>Strengthening of capacity to combat illegal activities and online content.</p>
      <p>In the National Cyber Security Plan is reviewed the role of the Nucleus for Cyber Security (NSC)
as a support structure of the President and of the Interministerial Committee for the Security of the
Republic (CISR), with purpose of foresee and respond to any crisis situations and, in the event of an
accident, it must provide for the activation of the alert procedures. The operating logic of the NSC is
characterized by various activities, including:
• operational planning in response to situations of cyber crisis;
• evaluating and promoting information sharing procedures;
• carry out international exercises concerning simulations of cyber events.
• national reference point for relations with the UN, NATO, the EU, other international
organizations and other states.</p>
      <p>It is important to emphasize the relevance of this latter functionality, in order to establish solid
international cooperation and collaboration, because not only does it coordinate exercises from abroad,
but from abroad it can also receive reports of relevant cyber events and issue alarms to administrations
and private operators.</p>
      <p>The Italian cyber security strategy does not end in 2017, infact a text to which we cannot fail to
refer is the implementing decree of the NIS Directive[5], which has been applied to the Italian context
through the Legislative Decree 65/2018[6] on the basis of the 2016 European Directive, which required
for each European state to develop a national cyber security strategy, foreseeing:</p>
      <p>In the Italian system, still today no independent or additional authorities to the government structure
have been created, representing one of the weaknesses of the Italian national cyber strategy, indeed the
entire governance structure was placed under the control of the Executive power and the single point of
contact is identified at the top of our information services, within the DIS.</p>
    </sec>
    <sec id="sec-3">
      <title>3. China, NATO and United States of America: Comparing Models</title>
      <p>A recurring theme in the discussion and the great weakness of the Italian Cyber National Strategy
appears to be the need for a greater multidimensionality of strategy in the cyber context and greater
collaboration between the various institutional and non-institutional substrates, not-favored in the
Italian context also for the lack of an independent structure dedicated exclusively to cyber domain.</p>
      <p>The need of this cooperation appears to be shared by most of the state realities in the world and
appears complex to most of them to implement. It could therefore be said that the achievement of an
optimal harmony of the "process" of integration of the various actors, is almost utopian. But despite
this, there are some examples in the world of a beginning, albeit feeble, of a process of cooperation, as
in the case of India, China and Russia.</p>
      <p>Specifically, this paper will try to define through guidelines, the structures and principles that
support and regulate China's great "Intelligence" machine. Although it may seem pretentious to take
China as an example, for a country like Italy, which is diametrically opposed in principles and structure,
it may be useful to understand the profound differences, not to align ourselves with their system but to
try to integrate some of their aspects in our modus operandi.</p>
    </sec>
    <sec id="sec-4">
      <title>3.1 Chinese Information System</title>
      <p>The culture of security in China has very ancient origins, founded on the principles of Confucius
and Sun Tzu, espionage is elevated to a system; in fact, every citizen is obliged to keep not only the
secrecy relating to its functions, but is also urged to collect information that, in his opinion, is contrary
to the collective and party interests. For this reason, the Secret Services of Beijing, for us westerners,
are a puzzle both on a theoretical and operational level, despite the organizational structure we know.</p>
      <p>There is no idea how the government can manage billions of pieces of information provided by
billions of sources distributed around the world. It is not clear how a system of overlapping jurisdiction
works between internal and external security, police and secret services, party and state, private and
public [7].</p>
      <p>What is clear, however, is that the general direction of the entire process is in the hands of the
Communist Party. Given that, in terms of number and specific skills, all the intelligence organizations
of the People's Republic of China are difficult to identify and quantify, we can however try to outline
the structures of strategic importance.</p>
      <p>The Chinese secret service has thirty sections that report to the Central Committee of the Chinese
Communist Party, thirteen of these play a role of espionage and counterintelligence, directed by the
Ministry of State Security (MSS). The main areas of action dealt with by these institutions have been
for over half a century after the establishment of the People's Republic, the safeguarding of political
power, internal order against separatism, territorial sovereignty, military threat from the outside and
export of the revolution. But after the reformist invitation of Deng Xiao Ping to take advantage of the
free market, activities of hunting for business, resources, money, technology and vulnerabilities have
also been added.</p>
      <p>As previously mentioned, this quite logical and rational institutional framework is accompanied by
the non-institutional and almost spontaneous framework, which makes the Chinese Secret Services
unique in their kind. “Watching each other is a duty. Spying on foreigners is patriotic". [8]</p>
      <p>The duty of collaboration, inserted in the Chinese Constitution, which itself assigns security and
information tasks to all citizens. In this perspective, Chinese citizens are an integral part of the
information production chain. It is easy to understand the difficult process of collecting and analyzing
the countless reports a day provided by millions of sources scattered all over the world.</p>
      <p>The solution to this problem, it’s still unknown and for many years western analysts have
hypothesized through the "mosaic metaphor" that the bodies responsible for this function combined all
this information to arrive at a single and complete one. The mosaic theory, to date, however, appears to
be non-exhaustive, as it does not explain how a system of overlaps between police, secret services,
party, state and citizens can work. Furthermore, we do not know what the criteria and procedures are
adopted by the various agencies to process and disseminate information, if and where the analyzes and
the merging of this strategic information take place. What is clear, however, is that the Party is at the
head of the political and security management.</p>
      <p>Once this complex phenomenon of cooperation has been described, the application in the field of
Cyber Intelligence, in which China plays a key role worldwide, is easier to understand. The cyberspace
environment facilitates the immediate sharing of materials by millions and millions of users, who are
very often granted. In this difficult environment the role of "node" between the institutions and the
various militias is most likely played by telecommunications companies, which also represent a source
of technical expertise from which the Chinese army can draw. Chinese telecommunications companies
are not technically part of the government apparatus, nor are they officially classified as state
enterprises, however, there are indications that major Chinese telecommunications companies can
effectively act as delegates of the People’s Republic of China and play a supporting role in promoting
China’s strategic interests abroad.And although it does not appear that the companies in question are
currently in charge of conducting offensive attacks, they certainly play a key role in the transmission of
sensitive information.</p>
      <p>To date, China has not expressed any desire to militarize Western cyber confrontation, but despite
this, its defensive aggressive policy in the West is perceived as a military threat rather than merely
cyber. This is why the strategy declared by the United States, which is similar to that of NATO,
announces the militarization of cyber space and an offensive war against the critical infrastructures of
China and Russia, paraphrased by computer defense.</p>
    </sec>
    <sec id="sec-5">
      <title>3.2 Improving Cyber strategy: NATO and USA</title>
      <p>The policy in question was created by NATO in 2011 to highlight the main five missions to be
implemented in cyberspace, missions that logically need to be integrated with the iconic Article 5 that
defines the three "core tasks", fundamental tasks, for the Alliance: collective defence, crisis
management, and cooperative security.</p>
      <p>•
•
•
•
•</p>
      <p>Strategic Initiatives 1: organize and equip cyberspace so as to draw all the benefits of its
potential;
Strategic Initiatives 2: use new operational concepts to protect defence networks and systems;
Strategic Initiatives 3: participate with other government agencies and private individuals in
the creation of a unified strategy;
Strategic Initiatives 4: building strong relations with allies and international partners;
Strategic Initiatives 5: Leverage national ingenuity to build exceptional cyber strength and
accelerate technological innovation.</p>
      <p>The existence of these objectives enriched by the fundamental precepts means that nowadays an
armed attack against one or more of the member countries of the Atlantic Alliance, conducted in or
through cyberspace, is considered as a direct attack against all member countries. Therefore, should a
cyber-attack materialize, each of the Allies in the exercise of the right of self-defense, individual or
collective, must assist the party or parties attacked by undertaking immediately, individually and in
agreement with the other parties, the action deem as necessary, including the use of armed force, to
restore and maintain security in the North Atlantic region.</p>
      <p>The need to clarify the objectives and regulate the conduct in cyberspace by major international
organizations arises mainly as a result of the attack that still appears to be the most important in the
history of cyber operations in Europe, the attack on Estonia in 2007. In the spring of 2007, Estonia was
the victim of a 22-day cyber-attack, through a massive wave of Ddos cyberattacks, blocking the
information systems of banks, government institutions, and national media, which plunged Estonia into
22 days of complete blackout.</p>
      <p>To this an unprepared NATO did not know how to react and did not appeal to article 5, the allied
countries simply sent their best experts to Tallinn to stem the problem and look for the source of these
innumerable attacks. From the beginning it was quite clear who was responsible for this attack, but in
spite of this an official accusation was never formulated, not to increase the tension but also for the
scarce useful data that hackers had left. 2007, however, was a wake-up call, helping Estonians and
NATO to implement their cybersecurity standards. Estonia has now become the most digitalized state
in the European Union, where 90% of banking transactions are carried out via the Internet, political
consultations are carried out online, and 100% of the public administration is equipped with computer.
Not surprisingly, the name of the state is often ironically deformed in "E-stonia".</p>
      <p>Then this episode on a further evolutionary phase of the approach of the Atlantic Alliance to this
domain, the creation of the CCDCOE, or the Center of Cooperative Excellence for Computer Defense
of NATO, appears fundamental. The CCDCOE, located in Tallinn, established at the initiative of
Estonia along with six other nations Germany, Italy, Latvia, Lithuania, the Slovak Republic and Spain
on 14 May 2008.</p>
      <p>Unfortunately, having gone under heavy scrutiny, there has been a further step forward in cyberspace
by international organizations that have created a new center ready to collaborate with the CCDCOE
described by the NATO Secretary-General, Jens Stoltenberg, in his closing speech at the Defense
Ministers' meeting in November 2017. From the words of the Secretary General, in fact, it is very clearly
understood that NATO has decided to embrace the possibility of using cyber weapons in its military
operations and to do so by creating a Cyber Operations Center in which all Allied capabilities can be
channeled, to integrate the cyber capabilities of countries belonging to the block.</p>
      <p>In the new Cyber Operations Center, the cyber capabilities provided by the Allied Countries will
be under the complete command and control of the State that has made them available so that the
traditional reticence of the States to share even simple information on the real cyber capabilities
developed, which may be significant in a possible conflict.</p>
      <p>But despite the intent of militarization by NATO and the aggressive defense of China described
above, the most encouraging fact of this confrontation between China and the United States is that, at
least for the time being, those that will surely be the two great world powers competing between now
and the next few years, seem to prefer the cyber defensive aspects and not the offensive ones that in
this case could lead to a dramatic conflict in the open field.30</p>
      <p>Among Western actors that recognize a central role for cyber intelligence, the United States of
America also stands out. In 2015, they founded a new federal agency within the Office of the Director
of National Intelligence (ODNI); this new body is known as the Cyber Threat Intelligence Integration
Center (CTIIC) the newest of four multi-agency centers. In fact, along the lines of the Chinese model,
the multi-factor approach can be found in the new US government structure, whereby the agency will
be a fusion center between other existing federal agencies and the private sector to act in real time
against cyber-attacks.</p>
      <p>It was established in 2015 on the initiative of President Barack Obama, who appointed the former
Director of National Intelligence to establish the CTIIC. The normative text legitimizing the creation
of this structure is a Presidential Memorandum[9], in which five responsibilities can be extrapolated
that are assigned to the CTIIC:
• Provide integrated all-source analysis of intelligence related to foreign cyber threats or to cyber
incidents affecting US national interests.
•
•
•
•</p>
      <p>Support the National Cybersecurity and Communications Integration Center, the National
Cyber Investigative Joint Task Force, U.S. Cyber Command, and other relevant United States
Government cyber centers by providing access to intelligence necessary to carry out their
respective missions.</p>
      <p>Oversee development and implementation of intelligence-sharing capabilities to enhance
shared situational awareness of intelligence related to foreign cyber threats and incidents.
Ensure that indicators of malicious cyber activity and, as appropriate, related threat reporting
contained in intelligence channels are downgraded to the lowest classification possible for
distribution to both US Government and US private sector entities.</p>
      <p>Facilitate and support interagency efforts to develop and implement coordinated plans to
counter foreign cyber threats to US national interests using all instruments of national power,
including diplomatic, economic, military, intelligence, homeland security, and law enforcement
activities.</p>
      <p>In order to achieve these objectives, the Center has been divided into three sections:
1. Building Awareness: according to this role, the CTIIC engages with other cyber centers and
information and analysis providers, helping them to understand the potential significance of threats.
It builds an analysis of threat activity and makes it accessible to non-cyber specialists who need to
take it into account in their daily activities. CTIIC's work generates a greater understanding of the
big picture and trends;
2. Integrating Analysis: the CTIIC works with cyber and non-IT experts to initiate cyber threat
analysis and examine adversary strategies in a geopolitical context. The CTIIC will integrate trend
and event analysis to identify cyber gaps, and to support federal agencies in developing operations
to mitigate adversary threat capabilities;
3. Identifying Opportunities: the CTIIC supports whole-of-government decision-making. The
CTIIC provides analysis of opportunities and helps to develop effective response and intervention
measures.</p>
      <p>The CTIIT is a best practice of a support and coordination structure, whereby the center will not
collect information on its own but will analyze the information already collected on the basis of existing
authorities and work to fill in the gaps[10].</p>
    </sec>
    <sec id="sec-6">
      <title>4. The multinational approach to the cyber context: MNE7</title>
      <p>Among the Chinese intelligence targets, Italy is not yet a strategic military target, except as a mere
component of the Atlantic blockade. But its economic and industrial complex has been a goal for a long
time now.</p>
      <p>In this regard, in the half-yearly report of 2013 prepared by the Italian Services, it was clearly
indicated how the segments of luxury, industrial automation, capital goods and environmental
technologies, are carefully monitored by the diplomatic network-console China. The Italian
economicindustrial complex is vulnerable especially if threatened by the Chinese giant.</p>
      <p>These observations confirmed that Italian cybersecurity, to date, cannot be viewed in isolation from
cyber security at the level of multinational and supranational organizations, in particular the European
Union and NATO, with the difference that Italy does not yet have adequate defensive and response
capacity. But if we can count on the help of the largest militarized cyber-attacks, in the industrial
economic field, it is necessary to manage the threat independently.</p>
      <p>Despite the obvious difficulties, there is already an attempt to change the multidimensional/
multinational approach to the cyber problem, this through the activities carried out with the Campaign
of experimentation called Multinational Experiment 7 (MNE7). The MNE7 is a recent series of
experimentation campaigns in which Italy plays the role of leader of the working group aimed at
analyzing the international legal framework applicable to cyberspace.</p>
      <p>But despite the unquestionable efforts to integrate interoperability, the position of the Italian defence
is for now anchored to the previous organizational structures, not so far suited to new contexts. The
structure regarding cybersecurity, entrusts the President of the Council of Ministers with the absolute
leadership to which to ultimately lead the national policy, strategy and "governance"[11] on the cyber
environment. Decision on absolute leadership, but in the case of cyber defense is inadequate because
of the speed of these attacks, speed that implies an immediate response that due to the complex structure
proves impossible to give.</p>
      <p>The solution could therefore be a single National Authority on Cyber Defence (CD), which can
coordinate and optimize operations, capabilities and responsibilities attested in the various departments.
This position of the CD, such as to have a broad and strategic perspective of the problem and sufficient
delegation of authority to be able to take "strategic" decisions in case of serious entity.</p>
      <p>In the final analysis, to close the Italian strategic and operational framework on cyber, it is necessary
to identify in addition to the structure now overcome, the greatest criticality that lies in the preventive
aspect of the threat that by its nature involves different types of actors. Forecasting activity must be
understood as the timely knowledge of «when, where and how», to allow decision-makers, on various
levels, to understand the situation and to be promptly and constantly supported in decision-making
processes through a cyber picture.</p>
      <p>The secret of the effectiveness of this function, as indeed of all previous operations, lies in the ability
to share information, namely the information sharing process. Sharing, similarly feasible through the
multidimensional approach, involving partner countries, national institutional actors as well as
academia and the private sector. Although the discussion seems to have outlined the multiple adverse
elements and the respective possible solutions, which our country adopts in cyberspace, it remains to
examine the limits within which Italy can exercise its discretion in the cyber framework, that is, the
legislative doctrine.</p>
    </sec>
    <sec id="sec-7">
      <title>5. Conclusion</title>
      <p>Summing up, the addition of the cyber component to traditional war scenarios, leads to the
hypothetical creation of the most asymmetrical war ever seen before. New boundaries, new weapons,
new timing, and unknown enemies. We can safely say that to date no State is really ready for such a
conflict but certainly there are realities that are aiming all their resources for the achievement of this
purpose. In relation to this, the text analyzed the position of China and in part that of its counterpart
with respect to NATO.</p>
      <p>Approaches in some cases divergent, also depended on the type of power that they are required to
represent, in one democratic case and in the other a single-party socialist republic. In China, the Western
principle of the division and balance of powers is not the foundation of the institutional political system.</p>
      <p>The powers are not divided, they do not balance each other, but instead they are united in a single
central node, namely the Party. And it is precisely in this centralization of power that many experts
make reside the cause of China’s great success in cyber space, since, as previously explained, it is a
space in which every movement occurs with very fast timing and therefore a similar speed in response
is required. The answer is that in the case of China it is never slow to arrive because the decision-making
power is centralized in very few people, which to us, countries of democratic origin, it is impossible to
implement because of the various mandatory steps that ultimately constitute the decision-making
process. But despite our non-competitive timing, there is a solution in equating our position with the
great undemocratic giants of cyberspace, and it is, as already analyzed, multidimensionality.</p>
      <p>Finally, the difficult times that face our horizon should advise everyone to pay particular attention
and care to the national information and security system, that it may be enabled to protect our society
ever more effectively from the dangers that already exist and from those that will necessarily follow.</p>
      <p>Because today, more than in past historical periods, knowing has become an essential fact and who
is unable or does not want to do it, becomes irrelevant on the world scene.</p>
      <p>All States must therefore continue to invest in research and the improvement of new strategies, new
weapons that can be used in this now no longer new environment. Since it is useful to remember that
the cyber information activity is still managed by men who have as their ultimate goal the search for
the truth and then ultimately, the aspiration to freedom.</p>
    </sec>
    <sec id="sec-8">
      <title>6. References</title>
      <p>•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Camera dei deputati, Dominio cibernetico, nuove tecnologie e politiche di sicurezza e difesa
cyber, n°83, settembre 2019</p>
      <sec id="sec-8-1">
        <title>Mini F., Quel che i cinesi sanno di noi (e noi non di loro),in Limes n°7.</title>
        <p>Mori M., Servizi e segreti, introduzione allo studio dell’intelligence, ed. G Risk, Roma, 2016.</p>
      </sec>
      <sec id="sec-8-2">
        <title>Pagani A., Manuale di intelligence e servizi segreti, Rubbettino, 2019.</title>
      </sec>
      <sec id="sec-8-3">
        <title>Rapporto del Clusit sulla sicurezza ICT in Italia, 2019, Security Summit.</title>
        <p>Saccardi, Di Blasio, Florio, Sicurezza e protezione dei dati : cyber security, object storage,
biometria, difesa globale e intelligence per un business always-on , Milano ,Reportec, 2015.</p>
      </sec>
      <sec id="sec-8-4">
        <title>Sbaraglia G., Cyber Security, Kit di sopravvivenza, Goware, 2018. Sommella R., L’Italia preda di ladri di tecnologie, Milano Finanza, 14/04/2011.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>Antiseri D.</given-names>
            ,
            <surname>Soi</surname>
          </string-name>
          <string-name>
            <surname>A.</surname>
          </string-name>
          , Intelligence e metodo scientifico, Rubbettino, Soveria Mannelli,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Caliguri</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cyber</surname>
            <given-names>Intelligence</given-names>
          </string-name>
          , tra libertà e sicurezza,Roma, Donizelli 2016 Eftimiades N., “Chinese Intelligence: Agent Recruitment Methods”,
          <source>Intelligence Watch Report Quarterly</source>
          , vol.
          <volume>2</volume>
          , n 3,
          <string-name>
            <given-names>1995</given-names>
            <surname>Giannuli</surname>
          </string-name>
          <string-name>
            <surname>A.</surname>
          </string-name>
          ,
          <article-title>Come funzionano i servizi segreti</article-title>
          ,
          <source>Salani Editore</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Gori U. e Germani</surname>
            <given-names>L. S</given-names>
          </string-name>
          , Information warfare
          <year>2011</year>
          :
          <article-title>la sfida della cyber intelligence al sistema Italia: dalla sicurezza delle imprese alla sicurezza nazionale Milano</article-title>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Angeli</surname>
          </string-name>
          , 2012 Inkster N.,
          <source>Chinese Intelligence in cyber age, Survival, 01 marzo 2013</source>
          , vol.
          <volume>55</volume>
          , p
          <fpage>45</fpage>
          -
          <lpage>66</lpage>
          Keegan J., Intelligence in war.
          <source>Storia dello spionaggio militare da Napoleone ad al- Qaeda</source>
          , ed. A.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Mondadori</surname>
          </string-name>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>Libro Bianco per la sicurezza internazionale e la difesa</article-title>
          ,
          <source>presentato dal ministro Pinotti</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Magi</surname>
            <given-names>G,</given-names>
          </string-name>
          <article-title>I 36 stratagemmi. L'arte segreta della strategia cinese per trionfare in ogni campo della vita quotidiana</article-title>
          ,
          <source>Il punto d'incontro</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>