View Post

Cyber Norms: Specialisation from Fragmentation?

Evan Burke Commentary

What are the ‘rules of the road’ for cyberspace, and who sets them? The question has risen in prominence and priority as cyber threats have grown more severe. A lack of clarity about acceptable behaviour enables destabilising cyber activity, such as the recent Microsoft Exchange hack by suspected state-sponsored actors and the persistent ransomware attacks targeting hospitals around the world. …

View Post

Southeast Asia in the Global Digital War

Gayathry Venkiteswaran Commentary

China’s push for “cyber sovereignty” in global tech discussions is attracting an audience in regions like Southeast Asia. Here, states and the private sector are ready markets for technologies, but they are also engaged in delicate diplomacy with China and the US against the backdrop of geo-security interests. Understanding the dynamics of the region requires a nuanced critical approach.

View Post

Data Transfers in EU-India Relations

Anna-Maria Osula Commentary

Transborder data flow is the norm in today’s globalised and interconnected world and yields great social as well as economic benefits. Can the EU and India find a common language to ensure the protection of basic rights when processing personal data? The explosive use of technology is transforming our economies and societies. The total amount of data in the world …

View Post

Ritual Reverence to Deterrence in Cyberspace

Maria Mälksoo Commentary

The efficacy of deterrence as a method of conflict management is highly disputed. Yet, deterrence persists as a go-to security strategy and is flourishing in the spheres of cyber and information warfare. The EU is now embracing deterrence and its political appeal to advance its cybersecurity posture. But the prudence of this move remains unproven, and it is counterintuitive to …

View Post

Cyber Arms Control and Risk Reduction

Caitriona Heinl Commentary

Discussions at the UN have revealed that “implementation is currently one of our biggest challenges”. Specifically, states are conscious of the need to translate non-military cyber confidence-building measures (CBMs) into concrete actions that are implementable by all states, thus moving beyond awareness-raising. This is especially the case where CBMs are viewed by bodies such as the EU as a practical …

View Post

Hurdles to Protecting Global Critical Infrastructure

Anastasiya Kazakova Commentary

The ongoing UN dialogues about responsible behaviour in cyberspace have brought hope that a global solution can be reached to ensure peace in the cyber domain. However, there are already obstacles visible on the road ahead. This is particularly true for the overprotection of ICT infrastructure. With growing cyber insecurity amid the ongoing pandemic, it is more important than ever …

View Post

Geopolitics of the Global Semiconductor Value Chain

Jan-Peter Kleinhans Commentary

The semiconductor value chain is highly interdependent, with some areas overwhelmingly dominated by a few companies or countries. Given Europe’s position in the value chain, European policymakers working toward strategic autonomy would do well to consider questions of access, leverage and resilience in addition to ownership. Semiconductors, such as processors or memory chips, are the drivers of the accelerating digitalization …

View Post

A New UN Path to Cyber Stability

Aude Géry Commentary

The creation of a Programme of Action for advancing responsible state behaviour in cyberspace offers a path forward for the elaboration, implementation and monitoring of a framework of responsible state behaviour. It constitutes an interesting evolution and opportunity, borrowing from the advantages of both the GGE and the OEWG without taking on their historical legacies. On 1 October 2020, 40 …

View Post

Elaborating International Law for Cyberspace

Duncan B. Hollis Commentary

The European Union has called for all states to publicise their views on how international law applies to cyberspace. To date, primarily European states have shared their national views. The OAS’s Improving Transparency project aims to add more American voices to the conversation. Early results of the initiative highlight the need for greater legal capacity building among states that have …

View Post

Partnering with Africa on Cyber Diplomacy

Enrico Calandro Commentary

As the world moves from words to action on cyber diplomacy and the international community focuses on implementing a cyber stability framework, Africa is still several steps behind. But with its vibrant digital ecosystem and potential for growth, Africa is an important element in the global cyber diplomacy puzzle. Its unique context and needs have to be better addressed within the current processes.