Not long time ago cyber threats were not even on agenda in security, let along national security landscape. Now, the situation is different. Now, everyone recognizes the risks of hyper-connected world: from an individual in front of the computer to a high-level officer, operating a nuclear facility. As new tools are being developed, cyber-security occupies an important niche in decision-making and planning. As more and more people are securing their laptops, tablets, phones; the military started doing that too.
Just six years ago the US Defence Secretary warned about a possible Cyber Pearl Harbour. Cyber Pearl Harbour is a strategic surprise attack which could potentially incapacitate computational and communication capabilities, leading to a devastating impact on the country (Goldman and Arquilla, 2014, p. 13). This notion is usually fuelled by ongoing media reports that countries are in active pursuit of offensive cyber capabilities which could jeopardize any sector, penetrate any system and cause major disruptions. Regardless of the accuracy of these reports, every country understands that these cyber insecurities can be and, probably, will be exploited by an enemy. That is why many states are now allocating enormous amount of resources to develop defensive cyber means along with the offensive capabilities.
The number of cyberattacks is increasing. One can argue about its future potential targets, but it is clear that we should assume that cyberattacks will become only more sophisticated and, possibly, more deadly in the future. That is why vulnerabilities should be addressed, and the nations should be prepared to the cyber challenge.
Along the most well-known cyberattacks happened in Estonia (2007), Syria (impacted air defence systems 2007), Georgia (2008), Iran (Stuxnet 2009-10), The Saudi Arabia (Aramco 2012), Ukraine (2014), U.S. (electoral campaign 2016). Additionally, the world was quite agitated about WannaCry and Petya attacks in 2017. All in all, most of the recent attacks targeted commercial sectors, showing that there might be a constraining norm in regards to military sector and critical infrastructures.
This consequently might indicate that states might be pursuing more sophisticated technologies in order to target more sophisticated systems. It might as well suggest a possibility of on-going cyber arms races between the countries. However, there are clear limitations of cyber warfare, as no physical damage occurred and no people were killed. Even the damage inflicted on critical infrastructures was limited and failed to cause major consequences. However, financial losses as a result of cyberattacks can be rather substantial and might have a great impact on economically weaker states.
Based on the scale of current attacks, we can only assume that the technology will spread and get more sophisticated with the time. As Mazanec has outlined, cyber warfare capabilities will play a role in future military conflicts, as they are being integrated into military and state doctrines (2015, pp. 80-83). However, despite cyber challenges to national security, it does not necessarily reflect that deterrence methods and tactics will be applicable to cyberspace.
This technology is quite cheap, requires less resources and personnel, and therefore allows less economically advanced countries developing cyber. As a result, there is a clear asymmetry with weaker states competing with the world powers. Consequently, the threat is multiplied internationally. So the states are now in an unprecedented situation, because of the high level of uncertainty that cyberspace poses. This compels the states to adapt to the fast changing environment in international relations.
According to the report of McAfee, a global security technology company, 57% believe that cyber arms race is taking place now. The top officials in the West are convinced too. For example, NATO secretary general Stoltenberg said that cyber would become integral to any military conflict. Following this, NATO Defence Ministers have agreed that cyber will be a part of military planning and operations. It is clear that the West is fully aware of cyber developments and eager to use it in its actions.
Similarly, the Chinese Military Strategy of 2015 has also admitted that cyberspace will take a place in strategic competition among all parties. The Indian Army is also not falling behind and strengthening its cyber arsenal. General Rawat has recently said that India is now more concerned about developing these cyber capabilities than fighting on the border. The chain-reaction follows as in the case of the Cold War in pursuing the technologies and keeping up-to-date with the others states.
In this situation a leader faces similar challenges as in proliferation of any other military technology. There are four possible scenarios that make it difficult to calculate probabilities (According to Goldman and Arquilla, 2014):
1) We develop a cyber capability – They develop a cyber capability;
This is a frequent scenario and occurs when both countries have technological capability to develop cyber means.
2) We develop a cyber capability – They don’t develop a cyber capability;
There are certain problems in verifying if a country really lacks a capability to pursue cyber weapons. However, this case gives obvious advantage and leverage to a state that develops cyber capability.
3) We don’t develop a cyber capability – They develop a cyber capability;
From a political and strategic point of view, it puts a state into a disadvantageous position, therefore, making it undesired.
4) We don’t develop a cyber capability – They don’t develop a cyber capability;
It is more desirable; however, no direct experience exists. Usually if there is a possibility that a technology can be developed, it will be developed at least by some state.
Interestingly enough, there is not much concrete information available in regards to these developments, whether it is amount of arsenal, types of cyber capability, or just simple information on the notions. Information which is accessible is usually written by the Western authors (it is particularly covered by US officials/military and academia) or can be found in government’s documents. NATO common strategy, perhaps, contributes towards it. On a broader scale, cyber is treated as a state secret and specific information is classified. There is much information which is not available (for example, development of cyber weapons, its employment, reasons for its employment, legality of the use of cyber weapons etc.). In some countries, there is nothing to find at all.
The good example is cyber capabilities of Russia. There is no available information: no official statements, no official policy, no academic articles published, it goes to the extent that even media is not engaged in these issues. Alexei Arbatov (2018), an internationally recognized scholar on global security, has recently confirmed that even academic debate in Russia does not officially exist, only at the university level or informal. Notwithstanding, the Military Doctrine of the Russian Federation recognizes the fact that military threats and dangers are now shifting towards cyberspace (“informatsionnoe prostranstvo”).
Similarly to Russia, China also maintains secrecy concerning its developments in the military. According to the report of the Institute for Security Technology Studies (2004), available sources insist that Beijing is pursuing cyber warfare programs, but classified nature of specifics aggravates assessments.
This secrecy around cyber resembles the secrecy surrounding nuclear developments. All of this information was classified too, yet the principles of nuclear governance have managed to emerge even in the tight environment of the Cold War. Similar situation arose in regards to the use of drones. All the initial strikes of drones were classified, and only with time the debate started to evolve. At the moment it is quite vigorous.
As for cyber, it will certainly take time to talk freely about cyber capabilities and warfare. It will be different in different countries, but in the end the debate will open up as well as new technologies will come and cyber would have become a history.
Arbatov, A. (2018). Stability in a state of flux. Opinion presented at the 31st ISODARCO Winter Course – The Evolving Nuclear Order: New Technology and Nuclear Risk, 7-14 January 2018, Andalo.
Billo, Ch. and Chang, W. (2004). Cyber Warfare, an Analysis of the Means and Motivations of selected Nation States. Institute for Security Technology Studies, [online] Available at http://www.ists.dartmouth.edu/docs/cyberwarfare.pdf [Accessed on 27.12.2017].
Goldman, E. and Arquilla, J., ed. (2014). Cyber Analogies. Monterey: Progressive Management.
Mazanek, B. (2015). Why International Order is not Inevitable. Strategic Studies Quarterly, 9 (2), pp. 78-98. [online] Available at: http://www.airuniversity.af.mil/Portals/10/SSQ/documents/Volume-09_Issue-2/mazanec.pdf [Accessed on 28.01.2018].
 U.S. Department of Defense (2012). Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City, [online] Available at: http://archive.defense.gov/transcripts/transcript.aspx?transcriptid=5136 [Accessed on 22.01.2018].
 McAfee (2012). Cyber Defense Report. [online] Available at: https://www.mcafee.com/uk/about/news/2012/q1/20120130-02.aspx [Accessed on 22.01.2018].
 Hawser, A. (2017). NATO to Use Cyber Effects in Defensive Operations. Defense Procurement International, [online] Available at: https://www.defenceprocurementinternational.com/features/air/nato-and-cyber-weapons [Accessed on 22.01.2018].
 NATO (2017). NATO Defense Ministers agree to adopt command structure, boost Afghanistan troops levels. [online] Available at: https://www.nato.int/cps/ic/natohq/news_148722.htm?selectedLocale=en [Accessed on 22.01.2018].
 Gurung, Sh. (2018). Army stepping up cyber security. The Economic Times, [online] Available at: https://economictimes.indiatimes.com/news/defence/army-stepping-up-cyber-security/articleshow/62482582.cms [Accessed on 23.01.2018].
 Here it means both offensive and defensive capabilities (Author’s note).
 The Military Doctrine of the Russian Federation (edited in 2014). Moscow: p. 4. [online] Available at: http://www.mid.ru/documents/10180/822714/41d527556bec8deb3530.pdf/d899528d-4f07-4145-b565-1f9ac290906c [Accessed on 23.01.2018].
How Will Roads Change As Logistics Become Automated?
There have been a lot of big developments to be found inside the automated vehicle space over the last few years. With countless car companies throwing their hats into the ring, it’s only a matter of time until cars that don’t need drivers are able to spend more time on the road. Of course, though, personal transport is only one side of this, and the automated driving scene is much more likely to impact logistics in the short-term. But how exactly will this change the way that transport companies operate, and how will the roads you use be impacted by changes like this?
Currently, many truck drivers have to push themselves to their limits to be able to get their work done. Long drives can easily be held up, but important deadlines can’t be missed without throwing off an entire schedule, and this leaves drivers having to miss sleep and drive long distances without breaks. A tacho card will usually be used to monitor this, making sure that drivers don’t break the law. Automated transport promises to solve problems like this, with digital machines never tiring and being able to work for days on end without having to take a break.
Many transport companies have to use the roads at the same time as normal drivers to make sure that they can make their deliveries without pushing drivers too hard. This sort of approach wouldn’t need to be taken with automated vehicles, instead giving transport operators the chance to choose the quietest times to have their machines on the road. Alongside this, route planning can be more dynamic, with plans being changed on the fly to make up for things like traffic issues. Of course, though, as a big part of this, normal drivers may experience some strange behavior from the automated trucks that they see, especially when they are first starting to hit the road.
While it may be something that changes in the future, transport companies are often more interested in systems that use convoys of trucks rather than simply sending trucks out on their own. This involves having a lead truck that is driven by a normal person, with several other trucks that tail safely behind it. This can make it much easier to have trucks follow specific routes without having to rely on GPS systems can lose signal or be disrupted in other ways. Of course, though, as a big part of this, many transport companies simply can’t afford the technology like this, and it could be a few more years until they start to be spotted when you’re out and about.
With all of this in mind, you should have a much better idea of how the automated logistics market is going to change roads over the next few years. The way that you drive will almost certainly change as time goes by, with more and more automated driving options becoming available all the time.
Matica’s CEO Sandro Camilleri speaks about security in digital payments
One thing is for sure: the COVID-19 pandemic accelerated many behaviors and trends that once were holding their pace. A great example can be found in digital payments and online shopping. According to Rakuten Intelligence, from March through mid-April, e-commerce spending in the United States increased more than 30% compared to the same period last year. When it comes to worldwide scores, it reaches the surprising increase of 74%.
Although books and cleaning products led the ranks mapped by Rakuten, specialists argue that digital payments and online shopping are here to stay, as much as it has already been observed in Asian countries. In this sense, securing financial transactions and protecting consumer data became a mandatory issue to be addressed both by companies and the government.
As a leading European company in the processing and printing of cards and identification documents for security systems, Matica Technologies is dedicated to granting safety and technological solutions to businesses dealing with financial transactions online. According to the CEO and founder of Matica, Sandro Camilleri, the advent of digital payments is a revolution similar to that which technology has caused and is currently causing in other areas, such as transports. “It is an inevitable revolution, which citizens will have to get used to, and which must therefore be managed in order not to risk unintended consequences, being the key issue obviously safety,” he argues.
Camilleri stresses that there are two different phases when it comes to digital payment security. A first one is about information and personal data storage, one of the greatest topics of our time and also a potentially enormous market sector. The second, less discussed though equally important, is guaranteeing strength and security for the financial transaction itself — and this is a purely technological issue. “The use of chips that are equipped with incredible memories, high precision lasers and holograms makes it extremely difficult, not to say impossible, for any attacker to clone a card produced by us. Secondly, the transaction must be secure thanks to specific and constantly updated software,” explains Matica’s CEO.
Now, when it comes to privacy, Camilleri states that people must be aware of what is at stake when data is leaked and why such occurrences are so alarming. With more and more appliances being automated and connected to computers and to the internet, such as is the case for cars and home security systems, cyberattacks could lead to consequences that are not only terrible, but tragic.
In such situations, Matica’s CEO believes that only biometric data could spare individuals from having their systems hacked, though this data must be filed with care and used only for strictly necessary purposes. In any case, Camilleri argues that using biometrics is becoming day by day more inevitable with the increasing rhythm of automation, and this is a feature that can already be found in some of Matica’s available systems, such as is the case of the passport series.
Are You Aware Of Your Children’s Online Activity?
There’s a big, wide, scary, often strange world out there, and it’s the task of any individual to grow into an adult and begin to contend with it. However, most responsible parents understand that showing the raw facts of life, or being introduced to bad influences is simply not suitable for a young child. They must learn slowly, with care, and appropriately to the degree we’re able to foster that environment. Parents cater to this by controlling what friends their children make, or what hours they may be allowed to spend time with them.
However, a growing cause for concern is the fact that many parents fail to keep their children safe online. The internet may as well be its own world, and it reflects our reality, both the good and the bad, the trustworthy and the terrible. This means that as a parent, it’s important to stay aware of your child’s online activity. If you can do that, you can better control the content they see, what they’re allowed to access, and the influences they are moved by.
Use Worthwhile Content Filters
It’s important to use the best content filters and parental controls you can. Some offer you access to limit internet time, while others help you block certain websites or content from being seen. With the best cyberbullying safety services, you can also ensure that your children are equipped to handle the unfortunate likelihood of encountering abuse online. The more you can engage in good habits now, and regulate their usage, the less likely they are to come to harm within the wild west that is the online world.
Understand The Trends
Understand the trends that occur and know how to deal with them. For instance, you might block access to certain apps or sites, but your child’s friend’s parents may not have the same philosophy. If you know the trends through paying attention to what they’re saying, you will be able to assess if they’re healthy or not. For instance, TikTok is now seen as a negative influence on many young children due to how poorly they moderate their content, and how limited content filters are in place. When you make decisions to help them stay secure, you are in effect limiting the vulnerable pathways in which they could become less safe.
It’s important to say, but stay alert. If you notice your child is finding it hard to engage with social media, or they follow a risky YouTuber, you are within your right to restrict access or to observe more closely. It’s a tough job, but ultimately you cannot completely banish your child from the internet for the entirety of their childhood. It’s best to help them build healthy habits now and also know how to stay safe online than to pretend it doesn’t exist. To that end, you’ll be making the right choices.
With this advice, we hope you can better stay aware of your children’s online activity, and manage it as appropriately.
How To Reduce Your Shipping Costs As An Online Seller
Ensuring The Best Quality For Your Customers
Where can I find Ray-Ban’s online spare parts?
Protect Your Business, Because It Deserves It
Careers An MBA Can Open Up For Engineers
Nepal Hindu Rashtra: Time to Wrap Up Communism?
How To Offer Further Value To Your Clients
The 8 Best Christmas Movies to Watch with Your Family
Government Changing Syllabus to Include Sikh History in India
4 Ways to Boost Your Home’s Value
Health9 months ago
Questions On Everyone’s Mind During Coronavirus
Travel12 months ago
Dolphin Discovery is the only park with the AZA accreditation in Punta Cana
India9 months ago
5 Ways to Strengthen Sibling Bond
Travel12 months ago
Azul Talavera Hotel: the perfect place for your next holidays in Puebla
Travel10 months ago
6 Things you can do in Tijuana
Travel11 months ago
Ibiza: not only a destination for young people but also a natural paradise with dream beaches, exclusive locations, and luxury villas
Europe12 months ago
Holiday in Italy: choose Florence for a break in the winter
Travel12 months ago
Everything you need to know for your tourist Australian visa