6 research outputs found

    Are China and Russia on the Cyber Offensive in Latin America and the Caribbean?

    Get PDF
    Cyberspace—the newest domain of conflict—is among the most prominent forums of conflict in the twenty-first century. Increasingly nation-states utilize cyber and information capability in pursuit of foreign policy and national security objectives. This report focuses on two nation-states that are leading the charge in this respect: China and Russia. While Russia seeks to destabilize the global system for its own advantage, China’s goal is to maintain the current system and replace the United States as the global hegemon. To that end, China and Russia are pursuing robust cyber capabilities to advance their respective geopolitical, economic, and security interests. Moreover, Chinese and Russian state-run enterprises use tools ranging from cyber espionage to weaponizing information in an effort to undermine the efficacy of democracy and, in general, western interests around the world.https://digitalcommons.fiu.edu/jgi_research/1005/thumbnail.jp

    Are China and Russia on the Cyber Offensive in Latin America and the Caribbean? A Review of Their Cyber Capabilities and the Implications for the U.S. and its Partners in the Region

    Get PDF
    “This report explores the current military cyber structures and operations of China and Russia in order to postulate how both countries could conduct cyber operations in Latin America and the Carribean, and their motivations for doing so. We look at key actors in each state to provide an overview of current capabilities, and use the DIME (diplomacy, information, military, economics) framework to assess how they might use cyber and information capabilities in pursuit of national objectives in the region

    The Digital Deciders

    No full text
    Today, the global and open model for the internet is under pressure, and we risk drifting towards an internet that we do not want. Amidst a massive global dialogue about cyber norms we are losing sight of the forest in favor of individual trees. The ultimate prize is not individual norms about what should be attacked and by whom, but instead the norm that the internet should be a place that is global and open to the free flow of content, not narrowly sovereign and closed. The ultimate trajectory of this process will depend just as much, if not more, on domestic developments in a group of undecided states that we coin the Digital Deciders. This report offers a data tool to help analyze these Digital Deciders and provides a background and context for this broad debate.https://digitalcommons.fiu.edu/jgi_research/1007/thumbnail.jp

    A primer on the proliferation of offensive cyber capabilities

    No full text
    Offensive cyber capabilities run the gamut from sophisticated, long-term disruptions of physical infrastructure to malware used to target human rights journalists. As these capabilities continue to proliferate with increasing complexity and to new types of actors, the imperative to slow and counter their spread only strengthens. But to confront this growing menace, practitioners and policy makers must understand the processes and incentives behind it. The issue of cyber capability proliferation has often been presented as attempted export controls on intrusion software, creating a singular emphasis on malware components. This primer reframes the narrative of cyber capability proliferation to be more in line with the life cycle of cyber operations as a whole, presenting five pillars of offensive cyber capability: vulnerability research and exploit development, malware payload generation, technical command and control, operational management, and training and support. The primer describes how governments, criminal groups, industry, and Access-as-a-Service (AaaS) providers work within either self-regulated or semi-regulated markets to proliferate offensive cyber capabilities and suggests that the five pillars give policy makers a more granular framework within which to craft technically feasible counterproliferation policies without harming valuable elements of the cybersecurity industry. These recommended policies are developed in more detail, alongside three case studies of AaaS firms, in our companion report, Countering Cyber Proliferation: Zeroing in on Access as a Service
    corecore