Academia.eduAcademia.edu

Review: 2017 Strategic Trends in the Global Cyber Conflict

Abstract

The present paper reviews the main strategic trends in cyber policy and security for 2017, pointing out the emergence of a new "Cyber Escalation Cycle:" while states are investing significant resources to improve their offensive cyber capabilities, these capabilities are subsequently being stolen, publicized and used by hostile countries to launch devastating cyber-attacks. This has led governments to pursue legislation that controls incoming technology and changes the technological relations between countries. Given the development of enhanced capabilities and the effectiveness of the attacks, we believe that leakage followed by immediate use of the leaked offensive cyber weapons against rival countries will only increase, making this issue even more contentious.

Key takeaways

  • Hackers have also managed to steal classified offensive cyber weapons, exploits and vulnerabilities, undermining the national security of various countries, in particular the U.S. After analyzing the main cyber policy and security strategic trends in 2017, we have identified a new phenomenon: while states are investing significant resources and making serious efforts to improve their defensive and offensive cyber capabilities, these capabilities are subsequently being stolen, publicized and used by hostile nations to launch devastating cyber-attacks.
  • Many countries devised measures to deal with their cyber vulnerabilities, be it by re-organizing their cyber defense bodies or by addressing R&D, legislation and regulation issues.
  • Singapore has a new cyber command that will improve coordination between military command and control networks and the growing cyber defense operations.
  • Australia announced its cybernetic diplomacy strategy, defining the use of offensive cyber capabilities and describing its deterrence and retaliation options in case of unacceptable cyberspace conduct.
  • The present paper shows how measures taken by governments to strengthen their national cyber systems and build up their cyber power has in fact led to an increase in the distribution of cyber weapons, with hostile elements stealing attack capabilities and using them to launch strategic cyber-attacks against rival countries.