Strategic autonomy continues to be “hot” in Brussels, Berlin and Paris. Not a week passes without a new policy proposal by the European Commission or a letter from a number of European Heads of State urging the strengthening of strategic autonomy and defence of sovereignty. As the thinking on strategic autonomy is evolving, it’s time to take a critical look …
Digital Sovereignty Viewed from Asia
The rapid pace of global digital transformation has led to new ideas concerning the relationships between economic growth, human development, human rights and national security. The mix of these policies has resulted in many forms of techno-nationalism. Which paradigm a country chooses as dominant may determine its priorities and the future. The US-led objections, based on national security concerns, to …
India’s Vision for Cyber Diplomacy
India’s rapid integration into the Digital Economy has been driven by her financial and telecoms sector reforms. The growth of trade, manufacturing, services and investment sectors have generated a $3 trillion economy. The concerns over sustainability of this growth have turned India’s interest in a stable and secure international digital environment into a priority. International trade contributes 40% of India’s …
Could Cyber-Diplomacy Learn From Outer Space?
While the Open Ended Working Group (OEWG) consensus report on ICTs in the context of international security is perhaps a successful compromise, it brought limited novelty in terms of cyber norms. Fifty-five years ago, there was another “space” in need of international regulation as a consequence of technological innovation: outer space, which yielded concrete results in the form of the …
Parliaments Under Cyberattack
Democratic institutions are under cyber siege. Parliaments and parliamentarians need to up their game if they are going to defend themselves. National leaders’ and decision-makers’ widespread reliance on Internet-connected digital technologies makes it critical that they use those tools responsibly and with care. It also means that those supporting leaders need to make it safe, secure and reliable for them …
Cybercrime Negotiations: Affairs Beyond States
Effectively fighting cybercrime requires cooperation between different communities and stakeholders. Governments enjoy a monopoly on power when it comes to law enforcement and criminal justice, but they need the involvement of the private sector and civil society organisations to make their policies work. With the launch of a new UN process addressing cybercrime around the corner, states cannot afford to …
The ‘Invisible’ International Law in Cyberspace
Recent state contributions to the discussion of how international law applies in cyberspace suggest that the cybersecurity dialect of international law is losing sight of the mainstream – that is, how international law is applied outside of the cyber bubble. The fact that states contest certain rules and standards of international conduct when it suits their current interests and ambitions …
EU Cybersecurity Strategy 2020: First Impressions
When it comes to digital and cyber policies, a message from Brussels this week is clear: nobody puts the EU in a corner. Faced with the growing competition and challenge to its way of doing business, Brussels is pushing back hard with concrete ideas to fight disinformation, to ensure greater independence from foreign digital giants and build a more cybersecure …
Chinese Disinformation: What Should Be Done?
Chinese-origin disinformation and misinformation around the COVID pandemic has gained greater visibility and prominence. However, there is little evidence that these efforts have led to greater support for the Chinese line in Europe – rather the opposite. Nevertheless, European policymakers should give some thought to strengthening their own social structures, rather than just complaining about Beijing’s conduct. One of the …
The Future for EU-US Cybersecurity Cooperation
While the American strategy of persistent engagement and the EU’s Cyber Diplomacy Toolbox – a framework for joint EU diplomatic responses to malicious cyber activities – could not be more different, they share the same underlying philosophy: the use of foreign and security policy tools to strengthen cybersecurity. Though their strategies differ significantly, the US and EU still have many instruments and strategic goals in common, which could be used to complement each other’s efforts.