This graphic maps the various landing stations of submarine cables in both the US and China. To find out about cybersecurity in Sino-American relations, see Marie Baezner’s recent addition to the CSS’ Analyses in Security Policy series here. For more CSS charts and graphs on defense policy, click here.
This article was originally published by the Council on Foreign Relations (CFR) on 23 February 2018.
Without increased cooperation, the global digital economy is vulnerable to catastrophic cyberattack.
Information and communications technology (ICT) presents one of the most critical modern challenges to global security. Threat assessments predict that the next major international crisis could be due to a state or terrorist group weaponizing ICTs to devastate critical infrastructure or military logistics networks. The proliferation of asymmetric warfare (i.e., conflicts between nations or groups that have disparate military capabilities) has increased states’ use of ICTs, which necessitates the development of an international code of cyber conduct.
Image courtesy of Pexels/Pixabay
This article was originally published by ETH Zurich in the Zukunftsblog on 18 January 2018.
Cyberattacks must also be understood as a phenomenon of political violence and combated as such, says Myriam Dunn Cavelty.
Digitalisation will fundamentally alter many aspects of our lives – in many cases for the better. However, our increasing dependence on computers and networks for data exchange and storage is creating new vulnerabilities for both individuals and society. The key word here is: cybersecurity. This encompasses more than just technical solutions: it involves not only security in cyberspace, but also security that is influenced by cyberspace.
Image courtesy of TheDigitalArtist/Pixabay
This article was originally published by the Institute for Strategic, Political, Security and Economic Consultancy (ISPSW) in January 2018.
The systems and networks naval forces must protect are complex and large in size. Ships are increasingly using systems that rely on digitization, integration, and automation. Offensive actors understand the naval reliance on communications, ISR, and visualization technologies, and perceive them as vulnerable to disruption and exploitation. Cyber has been moving from a supportive to a rather active role within an operational force. With today’s rapidly evolving threats, naval forces are well advised to develop a sense of urgency not only to develop cyber resilience capabilities that will enable them to “fight through”, but also cyber warfighting capabilities as these will be particularly valuable when they can be delivered reliably and in concert with other capabilities.