Jared Cohen former counter-terrorism advisor to Hillary Clinton says ‘we live in a world where wars will begin as cyberwars… it’s the combination of hacking and massive, well-coordinated disinformation campaigns’. Cohen as other contemporary experts on armed conflict emphasized cyber warfare and disinformation. The method and techniques employed to protect the digital space from any malicious exploitation refer to cyber security.
To make a distinction between disinformation and a cyber attack is the target. Cyber-attacks are aimed at computer infrastructure while disinformation exploits our inherent cognitive biases and logical fallacies. There is also a lot of similarity of the actions, strategies, tactics, and harms from cybersecurity and disinformation attacks. Infact, we see nefarious actors using both types of attacks for disruption. Using information operations and cyberattacks creates more havoc. They may lead with disinformation campaigns as reconnaissance for a cyberattack or data exfiltration from cyberattacks to launch a targeted disinformation campaign.
Western democratic leaders claim to fight against “authoritarian regimes,” which in their view deliberately deceive their citizens in order to create and maintain a virtual reality. There are, of course, many questions about which countries fall under this definition and why. But suddenly state-sponsored disinformation is no longer the preserve of undesirable states and dictators. It has infiltrated the Western, so-called democratic world, taking us all by surprise.
United States- who consider itself a global beacon of democratic and a trusted ally of other like-minded democratic states- spear headed massive disinformation campaigns, especially related to COVID-19. During the pandemic, which has seen a hugely disproportionate death toll in the US (relative to its percentage of the global population), we have seen democratically-elected political leaders flood the public discourse with disinformation in order to cover up the administrative laggings. United States spend more time and resource on blaming or shifting the public attention towards China rather introspecting the loopholes.
Where there is war or the categorization of a particular social phenomenon as war, there is an orientation toward allies and adversaries. The United States’ categorization of cyberwar involves foes and friends. And if there are no adversaries, then they must be created and allies must be convinced of the growing threat to their security, even if they are not threatened by anything.
With the slogan “Partnership for Bridging the Gap and Securing Democracy”
The report published by London school of Economics recently revealed that as part of defense strategy the United States should develop a strong collaborative relationship with the European Union (EU) in the digital and information sphere. This initiative could be included as part of a broader US government approach to the EU or be an exclusive objective for the US Department of Defense, which would narrow the relationship’s focus and separate it from other issues such as energy, migration, and trade.
The report further suggests that by building a nexus US-EU relationship would counter Russian and Chinese hybrid threats by unifying transatlantic defense and civilian digital and information governance. Big US tech companies may not like it, given their distaste for European regulations, but security needs should trump those concerns.
Harry I. Hannah a retired Central Intelligence Agency officer in her writing hints about the same partnership between US-EU which would give leverage for regulatory capabilities and effectively unify western defense and civilian governance of the digital and information environments. She reiterated about shaping this environment by choosing it as a battlefield and forcing adversaries to compete under preferred conditions.
According to a report from Harvard’s Belfer Center for Science and International Affairs, The collaboration between US-EU should extend beyond periodic conferences. The permanent link must regulate capacities of the EU with the powerful military-security digital and information capabilities of the United States and NATO. This would require both the United States and the EU to compromise and implement changes that benefit the other at their own expense, with the goal of improving collective security.
All this suggests that the goals have already been defined – preventing the creation of a large and strong Eurasia; the enemies have been appointed; the threats, primarily to the European partners, have been identified.
Amidst cyber strategic environment which is being created by the west and the joint strategy to regulate capacity and military-security digital and information capabilities deterrence, SCO cannot rely on passive, defensive strategy. US and EU are actively considering Chinese and Russian cyber capabilities as threats going defensively offensive over it. To many extents it does not seem to be a question of countering the perceived threats from China and Russia but to dominate the realm of cyber security and having an upper hand over Russia and China; a cyber arms race.
Strengthening Cyber security mechanism for SCO member states
Eastern understanding of cyber security varies from Western cyber security in that it considers not only network technical security but also the content of the Internet, they refer information security rather than cyber security. Russia views cyber security as information security in the same manner as China does. Furthermore, Russia’s Information Security Doctrine, which was published in 2000, is the most important document for Central Asia.
The SCO applies its concepts of sovereignty, non-interference in the internal affairs of nations, equality and mutual respect in the fulfilment of international standards, and the battle against the vicious triangle of separatism, extremism, and terrorism to the cyber sphere.
In 2009, SCO member states signed an agreement on cyber security defining what member states as main threats in cyberspace while calling for mutual assistance and cooperation to thwart and overcome them. With a spike in cyber-attacks on China and Russia, anti-Cyber-terrorism drills were held in 2017 in Xiamen China with the participation of all the 8 member states, was aimed at improving coordination between them to counter such attacks.
SCO must call on its member states to co-operate in combating cybercrime and terrorist use of Information and Communications Technology (ICT), not to use ICT for hostile activities and aggression, nor to proliferate information weapons. The strategy must envisage a wider coverage than just cyber-conflict, including Internet governance issues, information surveillance, and content policy.
Leave a Reply