• English
    • en_USEnglish
    • en_GBEnglish
28 °c
26 ° Tue
26 ° Wed
26 ° Thu
26 ° Fri
Wednesday, May 14, 2025
Asiafreepress
  • Home
    • Latest
  • World
  • Asia
    • China
    • Pakistan
    • Afghanistan
    • India
    • Central Asia
  • News
  • Politics
  • Security
  • Law
  • Business
  • Review
    • Editorial
    • Analysis
    • Perspective
    • Literature
  • Science & Tech
  • Entertainment
    • Showbiz
    • Lifestyle
  • Sports
  • Multimedia
Breaking News
Israel kills nearly 60 Palestinians in pre-dawn strikes across GazaTrigger for war: India’s aggression against PakistanPakistan Rejects Provocative and Inflammatory Assertions by the Indian Prime MinisterRussia considering closing Polish consulates: Deputy foreign ministerFrom Pahalgam to Provocation: India’s Escalation and Pakistan’s Response
No Result
View All Result
  • Home
    • Latest
  • World
  • Asia
    • China
    • Pakistan
    • Afghanistan
    • India
    • Central Asia
  • News
  • Politics
  • Security
  • Law
  • Business
  • Review
    • Editorial
    • Analysis
    • Perspective
    • Literature
  • Science & Tech
  • Entertainment
    • Showbiz
    • Lifestyle
  • Sports
  • Multimedia
No Result
View All Result
Asiafreepress
No Result
View All Result
Home Latest

Wild West & Cyber Security

Sabah Aslam by Sabah Aslam
March 14, 2022
in Latest, Security, World
0
Wild West & Cyber Security

Courtesy: istock

0
SHARES
244
VIEWS

The United States’ categorization of cyberwar involves foes and friends. And if there are no adversaries, then they must be created and allies must be convinced of the growing threat to their security, even if they are not threatened by anything.

Jared Cohen former counter-terrorism advisor to Hillary Clinton says ‘we live in a world where wars will begin as cyberwars… it’s the combination of hacking and massive, well-coordinated disinformation campaigns’. Cohen as other contemporary experts on armed conflict emphasized cyber warfare and disinformation. The method and techniques employed to protect the digital space from any malicious exploitation refer to cyber security.

To make a distinction between disinformation and a cyber attack is the target. Cyber-attacks are aimed at computer infrastructure while disinformation exploits our inherent cognitive biases and logical fallacies. There is also a lot of similarity of the actions, strategies, tactics, and harms from cybersecurity and disinformation attacks. Infact, we see nefarious actors using both types of attacks for disruption. Using information operations and cyberattacks creates more havoc. They may lead with disinformation campaigns as reconnaissance for a cyberattack or data exfiltration from cyberattacks to launch a targeted disinformation campaign.

Western democratic leaders claim to fight against “authoritarian regimes,” which in their view deliberately deceive their citizens in order to create and maintain a virtual reality. There are, of course, many questions about which countries fall under this definition and why. But suddenly state-sponsored disinformation is no longer the preserve of undesirable states and dictators. It has infiltrated the Western, so-called democratic world, taking us all by surprise.

United States- who consider itself a global beacon of democratic and a trusted ally of other like-minded democratic states- spear headed massive disinformation campaigns, especially related to COVID-19. During the pandemic, which has seen a hugely disproportionate death toll in the US (relative to its percentage of the global population), we have seen democratically-elected political leaders flood the public discourse with disinformation in order to cover up the administrative laggings. United States spend more time and resource on blaming or shifting the public attention towards China rather introspecting the loopholes.

Where there is war or the categorization of a particular social phenomenon as war, there is an orientation toward allies and adversaries. The United States’ categorization of cyberwar involves foes and friends. And if there are no adversaries, then they must be created and allies must be convinced of the growing threat to their security, even if they are not threatened by anything.

With the slogan “Partnership for Bridging the Gap and Securing Democracy”

The report published by London school of Economics recently revealed that as part of defense strategy the United States should develop a strong collaborative relationship with the European Union (EU) in the digital and information sphere. This initiative could be included as part of a broader US government approach to the EU or be an exclusive objective for the US Department of  Defense, which would narrow the relationship’s focus and separate it from other issues such as energy, migration, and trade.

The report further suggests that by building a nexus US-EU relationship would counter Russian and Chinese hybrid threats by unifying transatlantic defense and civilian digital and information governance. Big US tech companies may not like it, given their distaste for European regulations, but security needs should trump those concerns.

Harry I. Hannah a retired Central Intelligence Agency officer in her writing hints about the same partnership between US-EU which would give leverage for regulatory capabilities and effectively unify western defense and civilian governance of the digital and information environments. She reiterated about shaping this environment by choosing it as a battlefield and forcing adversaries to compete under preferred conditions.

According to a report from Harvard’s Belfer Center for Science and International Affairs, The collaboration between US-EU should extend beyond periodic conferences. The permanent link must regulate capacities of the EU with the powerful military-security digital and information capabilities of the United States and NATO. This would require both the United States and the EU to compromise and implement changes that benefit the other at their own expense, with the goal of improving collective security.

All this suggests that the goals have already been defined – preventing the creation of a large and strong Eurasia; the enemies have been appointed; the threats, primarily to the European partners, have been identified.

Amidst cyber strategic environment which is being created by the west and the joint strategy to regulate capacity and military-security digital and information capabilities deterrence, SCO cannot rely on passive, defensive strategy. US and EU are actively considering Chinese and Russian cyber capabilities as threats going defensively offensive over it. To many extents it does not seem to be a question of countering the perceived threats from China and Russia but to dominate the realm of cyber security and having an upper hand over Russia and China; a cyber arms race.

Strengthening Cyber security mechanism for SCO member states

Eastern understanding of cyber security varies from Western cyber security in that it considers not only network technical security but also the content of the Internet, they refer information security rather than cyber security. Russia views cyber security as information security in the same manner as China does. Furthermore, Russia’s Information Security Doctrine, which was published in 2000, is the most important document for Central Asia.

The SCO applies its concepts of sovereignty, non-interference in the internal affairs of nations, equality and mutual respect in the fulfilment of international standards, and the battle against the vicious triangle of separatism, extremism, and terrorism to the cyber sphere.

In 2009, SCO member states signed an agreement on cyber security defining what member states as main threats in cyberspace while calling for mutual assistance and cooperation to thwart and overcome them. With a spike in cyber-attacks on China and Russia, anti-Cyber-terrorism drills were held in 2017 in Xiamen China with the participation of all the 8 member states, was aimed at improving coordination between them to counter such attacks.

SCO must call on its member states to co-operate in combating cybercrime and terrorist use of Information and Communications Technology (ICT), not to use ICT for hostile activities and aggression, nor to proliferate information weapons. The strategy must envisage a wider coverage than just cyber-conflict, including Internet governance issues, information surveillance, and content policy.

Tags: ChinaCIACyber SecurityCyberwarsEuropean UnionICTInformation SecurityNATOrussiaScoUSWild West
Previous Post

China urges Indo-Pak to thoroughly investigate airspace violation incident

Next Post

US a typical example of big countries bullying small countries: Chinese FM spokesperson

Sabah Aslam

Sabah Aslam

Sabah Aslam is the Founder and Executive Director of IICR. A security analyst and human rights activist, she brings expertise in international relations to her work. Currently pursuing a PhD in Political Science and International Relations, Aslam combines academic rigor with practical advocacy to address global challenges.

Next Post
US a typical example of big countries bullying small countries: Chinese FM spokesperson

US a typical example of big countries bullying small countries: Chinese FM spokesperson

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected test

  • Trending
  • Comments
  • Latest
Heroic Tale of a Pakistani SULTAN in 1971 War

Heroic Tale of a Pakistani SULTAN in 1971 War

December 1, 2021
Jammu Genocide: Forgotten human carnage of disputed region

Jammu Genocide: Forgotten human carnage of disputed region

November 6, 2021
Indian forces kill under trial inmate in staged encounter in Kashmir

Indian forces kill under trial inmate in staged encounter in Kashmir

October 26, 2021
Peace, development make way to Xinjiang. Experts reject US allegations of genocide in Xinjiang China

Peace, development make way to Xinjiang. Experts reject US allegations of genocide in Xinjiang China

November 26, 2021
Jammu Genocide: Forgotten human carnage of disputed region

Jammu Genocide: Forgotten human carnage of disputed region

4
Pakistan summons Indian diplomat over killing of Muslims  in Assam

Pakistan summons Indian diplomat over killing of Muslims in Assam

4
India’s senior army officer booked on rape charges

India’s senior army officer booked on rape charges

3
Peace, development make way to Xinjiang. Experts reject US allegations of genocide in Xinjiang China

Peace, development make way to Xinjiang. Experts reject US allegations of genocide in Xinjiang China

3
Israel kills nearly 60 Palestinians in pre-dawn strikes across Gaza

Israel kills nearly 60 Palestinians in pre-dawn strikes across Gaza

May 14, 2025
Trigger for war: India’s aggression against Pakistan

Trigger for war: India’s aggression against Pakistan

May 14, 2025

Pakistan Rejects Provocative and Inflammatory Assertions by the Indian Prime Minister

May 13, 2025
Russia considering closing Polish consulates: Deputy foreign minister

Russia considering closing Polish consulates: Deputy foreign minister

May 13, 2025

Recent News

Israel kills nearly 60 Palestinians in pre-dawn strikes across Gaza

Israel kills nearly 60 Palestinians in pre-dawn strikes across Gaza

May 14, 2025
Trigger for war: India’s aggression against Pakistan

Trigger for war: India’s aggression against Pakistan

May 14, 2025

Pakistan Rejects Provocative and Inflammatory Assertions by the Indian Prime Minister

May 13, 2025
Russia considering closing Polish consulates: Deputy foreign minister

Russia considering closing Polish consulates: Deputy foreign minister

May 13, 2025
Asiafreepress

Follow Asia Free Press (AFP) on Twitter, Facebook, Linkedin, Youtube and Instagram for the latest news from China, Pakistan, Afghanistan, India, Kashmir and across Asia.

Follow Us

Photo Gallery

Quick Links

  • Submission Guidelines
  • Privacy Policy
  • About Us
  • Contact Us

Stay in Touch

To be updated with all the latest news, offers, and special announcements.

No Result
View All Result
  • Home
    • Latest
  • World
  • Asia
    • China
    • Pakistan
    • Afghanistan
    • India
    • Central Asia
  • News
  • Politics
  • Security
  • Law
  • Business
  • Review
    • Editorial
    • Analysis
    • Perspective
    • Literature
  • Science & Tech
  • Entertainment
    • Showbiz
    • Lifestyle
  • Sports
  • Multimedia

en_USEnglish (United States)
en_GBEnglish (UK) en_USEnglish (United States)