scholarly journals International Regulatory Vacuum of Cyber Espionage

Author(s):  
Dodik Setiawan Nur Heriyanto
Keyword(s):  
2009 ◽  
Vol 2009 (7) ◽  
pp. 5-7 ◽  
Author(s):  
Catherine Everett
Keyword(s):  

2021 ◽  
pp. 496-513
Author(s):  
David Fidler

As private-sector enterprises became dependent on Internet-enabled technologies, cybersecurity threats developed into serious problems in international political economy. This chapter analyses how states use international organizations to address these threats. The chapter explains why international organizations were not prominent in the Internet’s emergence and impact on transnational trade and investment. It examines the main threats companies face, including cybercrime, economic cyber espionage, government surveillance and hacking, innovation in digital technologies, and poor corporate cyber defences. International organizations have been most involved in fighting cybercrime, but these efforts have not been successful. International organizations do not play significant roles in countering other cybersecurity threats in global commerce. The chapter argues that international organizations are unlikely to become more important in the future because geopolitics and shifts in domestic politics in democracies will make collective action on cybersecurity in global commerce more difficult.


2020 ◽  
Vol 19 (3) ◽  
pp. 85-98
Author(s):  
Gábor Selján

It has been ten years since Stuxnet, a highly sophisticated malware that was originally aimed at Iran’s nuclear facilities, was uncovered in 2010. Stuxnet is considered to be the first cyber weapon, used by a nation state threat actor in a politically motivated cyberattack. It has significantly changed the cybersecurity landscape, since it was the first publicly known malware that could cause physical damage to real processes or equipment. Its complexity and level of sophistication, due to the exploitation of four different zero-day vulnerabilities in Windows and the usage of two stolen certificates, has triggered a paradigm shift in the cybersecurity industry. The recently uncovered cyber espionage campaign known as SolarStorm is a worthy anniversary celebration for Stuxnet. Especially because now the tables have turned. This campaign targeted the United States Government and its interests with a highly sophisticated supply chain attack through the exploitation of the SolarWinds Orion Platform used by thousands of public and private sector customers for infrastructure monitoring and management. In this article, I attempt to summarise the key points about the malware deployed in the SolarStorm campaign that can be drawn from reports available at the time of the writing.


2018 ◽  
Vol 43 (1) ◽  
pp. 56-99 ◽  
Author(s):  
James M. Acton

Nonnuclear weapons are increasingly able to threaten dual-use command, control, communication, and intelligence assets that are spaced based or distant from probable theaters of conflict. This form of “entanglement” between nuclear and nonnuclear capabilities creates the potential for Chinese or Russian nonnuclear strikes against the United States or U.S. strikes against either China or Russia to spark inadvertent nuclear escalation. Escalation pressures could be generated through crisis instability or through one of two newly identified mechanisms: “misinterpreted warning” or the “damage-limitation window.” The vulnerability of dual-use U.S. early-warning assets provides a concrete demonstration of the risks. These risks would be serious for two reasons. First, in a conventional conflict against the United States, China or Russia would have strong incentives to launch kinetic strikes on U.S. early-warning assets. Second, even limited strikes could undermine the United States' ability to monitor nuclear attacks by the adversary. Moreover, cyber interference with dual-use early-warning assets would create the additional danger of the target's misinterpreting cyber espionage as a destructive attack. Today, the only feasible starting point for efforts to reduce the escalation risks created by entanglement would be unilateral measures—in particular, organizational reform to ensure that those risks received adequate consideration in war planning, acquisition decisions, and crisis decisionmaking. Over the longer term, unilateral measures might pave the way for more challenging cooperative measures, such as agreed restrictions on threatening behavior.


Significance In June, Morocco accused Algeria of illicitly facilitating the transfer of Western Saharan independence leader Brahim Ghali to Spain for medical treatment. In July, an investigative journalism consortium revealed that Morocco had been engaged in a cyber espionage offensive that targeted, among others, Algerian politicians, military officers, civil society activists and journalists. Morocco extended an olive branch, which Algeria immediately rejected. Impacts Though Brussels has long favoured Rabat over Algiers, Morocco’s recent actions may reinvigorate Algeria-EU relations The developments, which seem detrimental to Morocco’s foreign relations, may indicate that King Mohammed has less control than in the past. Moroccan and Algerian business communities are unlikely to be impacted by the diplomatic spats.


Sign in / Sign up

Export Citation Format

Share Document