This graphic plots the change in the perceived likelihood and impact of various societal, technological, geopolitical and environmental risks between 2012 and 2018. For more on resilience and the evolution of deterrence, see Tim Prior’s chapter for Strategic Trends 2018 here. For more CSS charts, maps and graphics on risk and resilience, click here.
Image courtesy of Taskin Ashiq/Unsplash
This article was originally published by Pacific Forum CSIS on 27 June 2018.
As China rolls out its 2016 cyber security law, its drive to develop national cyberspace sovereignty continues. China’s law outlines a rules-based view of privacy and emphasizes critical infrastructure and domestic collection of citizen data. With the second largest economy in the world and the largest number of internet users, China has a tough task attempting to establish a national framework for cyber security while fostering an innovative technology sector. China is now a rule maker in cyberspace and home to a number of very large and highly capable technology companies. However, China’s lofty goals in cyberspace and innovation are undercut by its behavior in other countries.
Image courtesy of Markus Spiske/Unsplash.
This article was originally published by the ETH Zukunftsblog on 15 June 2018.
Myriam Dunn Cavelty calls for a realistic assessment of what state institutions can do to combat cyberattacks.
When a cyberattack has been orchestrated by a state actor, people may be tempted to call it “war”. After all, it’s an attack waged on national infrastructures by a foreign power. But the term “cyber war” has been used so often for dramatic effect that I don’t just want to warn against hype. It’s also time to dampen expectations regarding the scope of governmental intervention.
Image courtesy of Taskin Ashiq/Unsplash.com
This article was originally published by the Australian Strategic Policy Institute (ASPI) on 1 June 2018.
In the past three years, barely a week has gone by without a report of a critical cyberattack on a business or government institution. We are constantly bombarded by revelations of new ransomware strains, new botnets executing denial of service attacks, and the rapidly expanding use of social media as a disinformation and propaganda platform.
This graphic maps the various landing stations of submarine cables in both the US and China. To find out about cybersecurity in Sino-American relations, see Marie Baezner’s recent addition to the CSS’ Analyses in Security Policy series here. For more CSS charts and graphs on defense policy, click here.