Cyber nationalism and the new world order

 

Connecting state and local government leaders

More transparency, better law enforcement and a more robust engagement among the cyber superpowers can mitigate against the worst cybersecurity risks and reduce the influence of catalytic actors.

Over the past few years, the cyber domain has been the chessboard on which these cyber powers in the world -- Russia, China and the United States --  have vied for influence and control. This cyber statecraft, or “cyber nationalism,” manifests itself in intrusions, leaks and, on occasion, physical destruction. The superpowers are not alone on the board. Catalytic actors like North Korea, Iran and criminal groups also have disproportionate influence in this domain and inject a degree of chaos and uncertainty that can be destabilizing. A new balance of power built on cyber dominance is emerging in this dynamic and potentially strained world order.

While Russia’s economic capabilities, military strength and diplomatic influence are not on par with that of the United States, it has been more assertive in its use of cyber operations in pursuit of national objectives, particularly in support of military operations and international influence. This was seen in the 2007 Russian-Estonian dispute, which first saw the use of large-scale cyber disruption. Russia conducted a similar campaign against Georgia in 2008, escalating to critical infrastructure attacks against Ukraine in 2015 and, supposedly again, in 2016. Most recently, and perhaps, most infamously, Russia is said to have used a mixture of cyber espionage, state media, social media proxies and influence operations to interfere in the 2016 U.S. presidential election. After the election, intelligence officials indicated Russia would target European elections next, further undercutting democratic institutions worldwide.

Although China possesses more economic and technological advantages than Russia, its cyber forces lag in sophistication and operational tradecraft. Though less assertive, Chinese cyber forces have traditionally focused on internal control and furthering economic growth. This is changing, however. There is a tepid consensus among security researchers that China has refocused its cyber forces away from economic espionage. Even as these instances of Chinese commercial hacking have gone down, reform of China’s military cyber forces raises new questions of how a formidable military component will be used. Instead of targeting companies for their intellectual property, the Chinese may be looking for intelligence in support of military and policy objectives, something federal agencies like Office of Personnel Management have long had to contend with.

And then there’s the United States. There is little doubt that the U.S. is the world’s pre-eminent cyber power. Besides reportedly having the most advanced global surveillance system in the world, the U.S. has allegedly developed and deployed the most advanced cyber capabilities yet seen, notably with Stuxnet against the Iranian nuclear program in 2010 and against the North Korean missile program in an ongoing campaign since 2014.

This dominance is not unchallenged, however. The Shadow Brokers and the Vault 7 leaks, which purportedly reveal U.S. spy agency techniques and exploits, undercut the U.S. message abroad. They also narrow the gap between rivals like Russia and China and empower lower-tier actors with advanced tradecraft.

The cyber superpowers, however, are being joined by an increasing array of evermore capable lower-tier actors. Although relatively unsophisticated, criminal groups, hacktivists and rogue states like Iran and North Korea act with disproportionate influence in the cyber domain. Their operations are enough to be disruptive and increasingly incorporate destructive attacks. Last year, criminal actors were able to launch the largest known DDoS attack by volume, using Mirai malware against poorly secured internet-of-things devices to create massive botnets that disrupted a portion of the internet on the East Coast of the United States. Their efforts are helped by the proliferation of malware and tradecraft on both the deep and dark web, which helps them accelerate development cycles and provide tools and techniques that would have otherwise taken them years to learn or acquire.

The cyber domain is a dynamic space that challenges state authorities, creating a void where threat actors can grow and leverage threats at scale that technology allows. More transparency, better law enforcement and intelligence exchanges as well as a more robust engagement among the states best able to effect change -- the cyber superpowers -- can mitigate against the worst dangers and reduce the influence of catalytic actors. Government agencies, private-sector companies and individuals must understand that their devices and networks are in the crossfire of a much larger series of conflicts and arm themselves with a greater awareness of security risks and take necessary steps to ensure they don’t become victims or unwitting accomplices in nefarious actions that exploit poorly secured devices.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.