ihs.com Jane's Intelligence Review [Content preview – Subscribe to IHS Jane’s Intelligence Review for full article] Efforts made to improve global cyber-security Multilateral meetings are set to explore how to tackle cyber-security, but international co-operation is far from straightforward. Tim Maurer looks at the potential challenges in finding common ground amid an increase in cyber-attacks in 2014. According to a report published by Germany's Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik: BSI) in December 2014, a cyber-attack against an industrial iron plant had caused "massive" damage, although exact details of the nature of the attack and its timing were not made public by the German authorities. The incident - an example of a trend of cyber-attacks causing physical damage - capped a year of high profile cyber-attacks, demonstrating a worsening security environment. Most famously, in his year-end press conference on 19 December, United States president Barack Obama publicly accused North Korea of responsibility for hacking Sony Pictures Entertainment. The company's computer systems had been compromised and confidential data - including employees' personal information and unreleased films - had appeared in the public domain. Moreover, the hackers allegedly issued a threat to cause physical harm if Sony did not cancel the release of The Interview , a comedy about the assassination of the North Korean leader. The hack, and the US government's subsequent response, elevated cyber-security to an unprecedented level of public attention, even though exact attribution of the attack remains disputed. © Copyright IHS and its affiliated and subsidiary companies, all rights reserved. All trademarks belong to IHS and its affiliated and subsidiary companies, all rights reserved. Article 1 Page 1 of 8 ihs.com The Heartbleed Bug information website is displayed on a mobile phone and laptop. The bug is a vulnerability allowing access to encrypted communications. (PA) 1629140 [Continued in full version…] Cyber-security diplomacy Diplomatic cyber-security efforts can be grouped into three categories: norm translation, norm contestation, and norm emergence. The translation of existing norms into cyberspace is of fundamental importance. This exercise essentially relates to the discussions regarding how to interpret existing international agreements and how they should apply to this new domain of strategic engagement. [Continued in full version…] Mapping global efforts The negotiations relating to these three categories play out across a variety of regional and global forums. The United Nations has been one of the main institutions at which countries have attempted to either contest or affirm existing norms. Diplomats have been discussing cyber-security since the late 1990s, when Russia introduced a draft resolution on the topic in the UN General Assembly's First Committee on Disarmament and International Security. However, the topic lay fairly dormant on the agenda until events such as the DDoS attacks against Estonia in 2007 made it a greater priority, leading to the creation of the 15-member UNGGE. The advantage of this © Copyright IHS and its affiliated and subsidiary companies, all rights reserved. All trademarks belong to IHS and its affiliated and subsidiary companies, all rights reserved. Article 1 Page 2 of 8 ihs.com group is that narrowing the number of participants makes it easier to find consensus language as a stepping stone towards broader norms. [Continued in full version…] Bigger picture The major hurdle to more significant diplomatic achievements is that cyber-security is even more complicated than it might appear at first sight. Some countries, such as China, perceive cyber-security to be not just about security, but also about regime stability. The terminology debate illustrates this complexity: for example, most UN documents tend to avoid the terms 'cyber-security' and 'information security'. Instead, because of the politicisation of the terminology, complicated paraphrases are used that usually refer to the use of information and communications technology. For others, the Chinese and Russian governments' definition and use of 'information security' are disconcerting. Their definition suggests that information undermining a country's social stability could be considered a security threat. This framing has been criticised by other governments and by nongovernmental organisations (NGOs) for potentially breaching human rights such as the freedom of information and freedom of speech, and consequently many governments, including those of Australia, Canada, the US, and European states, have been careful to use the term 'cyber-security' instead of 'information security'. [Continued in full version…] Outlook The various agreements of 2013 demonstrated that international co-operation is possible on cybersecurity. The bilateral agreements that the US concluded with Russia and China, the success of the OSCE at the regional level, and the consensus language agreed under the auspices of the UN were all examples of such a trend. However, the geopolitical landscape became significantly more contentious in 2014, and it is unclear if similar progress can be achieved in 2015. [Continued in full version…] Copyright © IHS Global Limited, 2015 © Copyright IHS and its affiliated and subsidiary companies, all rights reserved. All trademarks belong to IHS and its affiliated and subsidiary companies, all rights reserved. Article 1 Page 3 of 8 ihs.com For the full version and more content: IHS Jane's Military & Security Assessments Intelligence Centre This analysis is taken from IHS Jane’s Military & Security Assessments Intelligence Centre, which delivers comprehensive and reliable country risk and military capabilities information, analysis and daily insight. IHS country risk and military capabilities news and analysis is also available within IHS Jane’s Intelligence Review. To learn more and to subscribe to IHS Jane’s Intelligence Review online, offline or print visit http://magazines.ihs.com/ For advertising solutions contact the IHS Jane’s Advertising team © Copyright IHS and its affiliated and subsidiary companies, all rights reserved. All trademarks belong to IHS and its affiliated and subsidiary companies, all rights reserved. Article 1 Page 4 of 8
© Copyright 2026 Paperzz