/images/avatar.png

Cyberspace Operations

A Space in Cyberspace about Cyberspace Operations and Related Topics

Guiding the Future of Cyber Security Policy: The Importance of Supervision

/images/20230623-a-supervisor-in-a-library.png

Cyber Security, Definitions and Agencies

Cyber Security is a fundamental pillar and of utmost importance to secure our reliance on interconnected information systems in networks of networks facilitated by information and telecommunication technologies. Supervising two extraordinary individuals participating in the Leadership in International Security Course (LISC), a highly competitive eight-month course in international security designed for high-performing professionals seeking to enhance their careers and effectively respond to the world’s most pressing security challenges, has been a transformative journey: a journey where it not only underlines the importance of not only cyber security but also the invaluable role of guidance and supervision in updating and deepening the knowledge of the participants in the cyber security policy field.

Digital Authoritarianism: A Summary

/images/20230425-Digital-Authoritarianism.png

On 24 April 2023, The US Director of National Intelligence (DNI) Dr. Avril Haines was invited to a public conversation with Carnegie’s Dan Baer on combatting digital authoritarianism. This is a summary of her presentation. The entire presentation including the Q&A session is on Carnegie Endowment’s YouTube-page.

Today, democracy is increasingly challenged by autocratic leaders that contest over information, defined as “the increasing use of digital technology to promote authoritarianism.” The DNI highlighted the importance of intellectual exchange between the intelligence community and think tanks like Carnegie Endowment to “challenge our thinking and work to ensure that we are focused on what matters, and not missing the broader strategic pictures.” This collaboration is especially fruitful in understanding the landscape, addressing the problem, and focus in one aspect of a problem.

TikTok banned on Government Electronic Devices

On 16 March 2023, the U.K. Cabinet Office announced that the social media app TikTok is banned on government electronic devices. The reason?

A security review ordered by the Cabinet Office Ministers aimed to look “at the potential vulnerability of government data from social media apps on devices and risks around how sensitive information could be accessed and used by some platforms.”

Euronews reported on 17 March 2023 that in addition to the U.K., “New Zealand, The European Parliament, European Commission, and the E.U. Council,…, Belgium, Canada, Denmark, India, Taiwan, and the United States” have banned TikTok from government devices. Euronews reports that Afghanistan and Pakistan have also banned the app.

The Cyber Threat Landscape and its Implications for Civil Organizations

Today I had the honor of presenting on the cyber threat landscape and its implications for civil organizations. The increased interconnectedness provides many opportunities, but at the same time, threat actors and their behavior can put individuals and organizations at risk.

The purpose was to:

  • Minimize risks to staff, assets, and operations.
  • Raise awareness of possible threats and related tactics, techniques, and procedures, and
  • Present some cases to illustrate the impact of successful cyber attacks against companies.

The objective of the training was to raise staff awareness. After the presentation, staff can:

Digital Geopolitics: A Review of the Current State

/images/digGeopolitics.png

My latest article at the 19th International Conference on Cyber Warfare and Security, Towson University, raises the question what is the current state of digital geopolitics?

There is no technology that has transformed societies in the ways that information- and telecommunications technology (ITC) has. The increased pace of digitalization has opened opportunities to conduct e-commerce, e-governance, streamline processes, but also transformed intelligence, surveillance, reconnaissance, and command and control of joint military operations.

Offensive Cyberspace Operations for Cyber Security

My latest article at the 19th International Conference on Cyber Warfare and Security, Towson University, raises the question of what are offensive cyberspace operations for cyber security, and why now?

Offensive cyberspace operations are actions taken by an organized group of people with a defined purpose. The purpose is to take down an adversary’s devices, infrastructure, and tools. By taking the fight to the adversary, it may be possible to make them switch stance: from conducting attacks to defending themselves. These actions ensure cyber security.