View Post

International Cooperation and Cybersecurity in Africa

Nnenna Ifeanyi-Ajufo Commentary

International cooperation efforts have increasingly focused on cybersecurity in Africa. Despite the diversity of these initiatives, Africa has yet to prioritise cybersecurity. Without coordination and accountability, divergent cybersecurity visions and models may instead derail Africa’s cybersecurity development. Africa, cooperation and cybersecurity In March 2022, the First African Cybersecurity Summit was held in Lomé, Togo. A core purpose of the Summit …

View Post

How China Promotes Cyber Sovereignty 

Courtney J. Fung Commentary

China is a cyber norm entrepreneur, seeking a greater say in creating a global cyber order in line with its rise as a cyber power. China promotes ‘cyber sovereignty’ (wangluo zhuquan), which extends territorial sovereignty into human-created cyberspace as part of a ‘cyberspace shared future’. Financial incentives through ‘Digital Silk Road’ capacity building and coalition building in international institutions are …

View Post

Towards a data-driven EU Cyber Diplomacy 

Matthias Schulze Commentary

The EU and its member-states lack quantifiable data on cyber conflict that can guide EU Cyber diplomacy. But data is necessary to answer even basic questions like, whether cyber conflict is getting better or worse and does the EU cyber posture have the desired effect in reducing cyber operations or their damaging effects. A new European research project, the European …

View Post

Taiwan, China and Semiconductors

John Lee Commentary

Rising tensions surrounding Taiwan in the wake of Nancy Pelosi’s visit have illuminated the island’s critical role in the global economy, thanks to its singular place in the semiconductor supply chain. Yet rather than increasing Beijing’s incentives to pull the trigger on an invasion of Taiwan, the global importance of TSMC and other Taiwanese semiconductor companies discourages it. Taiwan’s position …

View Post

Cybersecurity Cooperation in the Indian Ocean

Asela Waidyalankara Commentary

Formal and informal regional organisations play an increasing role in shaping global debates about cybersecurity. Although countries in the Indo-Pacific region have varied levels of cyber maturity, they share similar cybersecurity challenges and needs. It is not surprising, therefore, that existing cooperation platforms – like the Colombo Security Conclave – increasingly also include a cybersecurity dimension. India’s role in this …

View Post

Getting the (Digital) Indo-Pacific Economic Framework Right

Arindrajit Basu Commentary

On the eve of the Tokyo Quad Summit in May 2022, President Biden unveiled the Indo-Pacific Economic Framework (IPEF), visualising cooperation across the Indo-Pacific based on four pillars: trade; supply chains; clean energy, decarbonisation and infrastructure; and tax and anti-corruption. Galvanised by the US, the other 13 founding members of the IPEF are Australia, Brunei Darussalam, India, Indonesia, Japan, Republic …

View Post

Strategies for Cyber Diplomacy Capacity Building

Patryk Pawlak Commentary

Strengthening global capacities to address the challenges in the field of cyber diplomacy has lately attracted the attention of the cyber capacity building community. Even though the scope and size of such projects remains underreported, the number of institutions and organisations funding, implementing and receiving support for such projects is growing. But how can we ensure that the burgeoning field …

View Post

Satellite Internet Access in Times of Cyber Conflict

Berna Akcali Gur Commentary

On 26 February 2022, two days after the Russian invasion of Ukraine, Elon Musk, SpaceX founder and CEO, responded to a request from the Ukrainian deputy prime minister, confirming on Twitter that Starlink satellite internet service is active in Ukraine. A technology that had thus far been considered an experimental alternative to undersea and on-the-ground telecommunication services suddenly became the …

View Post

The Curious Absence of Chinese Cyber Deterrence

Juha Vuori Commentary

While China’s political and academic discourse on cybersecurity uses many of the same concepts as other countries’, the notion of deterrence is largely missing from its vocabulary. This can be explained by China’s relative vulnerability to cyberattacks: deterrence through denial lacks credibility and deterrence through punishment would be counter-productive. China has chosen instead to promote an international convention on interstate …

View Post

Microtargeted Propaganda by Foreign Actors

Ronan Ó Fathaigh Commentary

Microtargeting involves collecting information about people and using that information to show them targeted political advertisements. Such microtargeting enables advertisers to tailor ads to specific groups of people, for instance people who visit certain websites or share specific characteristics. Microtargeted propaganda can be more effective, more efficient and more hidden than traditional propaganda. Consequently, its use, especially by foreign actors, …