Digital World: Threats to Security and the Scope for South-South Cooperation

Authors

  • Cherian Samuel Manohar Parikkar Institute for Defense Studies and Analyses, New Delhi, India.

DOI:

https://doi.org/10.12724/ajss.55.2

Keywords:

Digital threats, Co-operation, Digital divide, South-south co-operation, Capacity building, Cyberspace, Cyber threats, Vulnerabilities, Malware, Norms, Cybercrime, Cybersecurity, UNGGE, Paris Call

Abstract

Technological advances have had a tremendous impact on the development of economy and society in the twenty-first century albeit with several security threats as well which are yet to be regulated. Many factors contribute to digital threats, making countries vulnerable and insecure, ranging from a large number of users, the intrinsic lack of security architecture, and the global nature of cyberspace. Whilst much of the focus is on confidence-building to facilitate international co- operation to facilitate rules-of-the-road, capacity building is equally important, though not receiving adequate attention because of the focus on great power politics. For developing countries, there is a need to ramp up capacities to deal with cyber threats. There is much scope for South-South cooperation in this regard since many developing countries, including India, possess advanced digital capabilities.

Author Biography

Cherian Samuel, Manohar Parikkar Institute for Defense Studies and Analyses, New Delhi, India.

Manohar Parikkar Institute for Defense Studies and Analyses, New Delhi, India.

References

Braw, Elisabeth, and Gary Brown. 2020. “Personalised Deterrence of Cyber Aggression.” RUSI Journal 165 (2): 48–54.

Chappell, Bill (2017, 27 June). “'Petya' Ransomware Hits At Least 65 Countries; Microsoft Traces It to Tax Software.” NPR, National Public Radio, www.npr.org/sections/thetwo-way/2017/ 06/28/534679950/ petya-ransomware-hits-at-least-65-countries-microsoft-traces-it-to-tax- software.

CIO East Africa (2017, 18 May) “ICT CS Joe Mucheru Calls for Information Sharing and Reporting on Cyber-Security Breaches.”, www.cio.co.ke/ news/ict-cs-joe-mucheru-calls-for-information-sharing-and-reporting- on-cyber-security-breaches-2/

Department of Homeland Security (n.d.), National Initiative for Cybersecurity Careers and Studies, “Explore Terms: A Glossary of Common Cybersecurity Terminology” ND. http://niccs.us- cert.gov/glossary

Global Forum on Cyber Expertise, (2017, March 16), Cyber Crime and Cybersecurity Trends in Africa Report.”, p. 20 www.thegfce.com/ documents/publications/2017/03/10/report-cyber-trends-in-africa.

ITU (n.d.), Definition of Cybersecurity, https://www.itu.int/en/ITUT/studygroups/com17/Pages/cybersecurity.aspx

Livemint, (2016, July 8) “Aadhaar Goes Global, Finds Takers in Russia and Africa.”, www.livemint.com/Politics/ UEQ9o8Eo8RiaAa NN My L b EK/Aadhaar-goes-global-finds-takers-in-Russia-and-Africa.html.

Ministry of Electronics and Information Technology (n.d-a), Active MoUs”, Government of India, meity.gov.in/content/active-mous. Ministry of Electronics and Information Technology (n.d-b), “International co-operation, Countrywise status| Ministry of Electronics and Information Technology, Government of India.”, Government of India, meity.gov.in/content/country-wise-status.

Ministry of Electronics and Information Technology (n.d-c), “International ICT Projects, Government of India, meity.gov.in/ content/ international-ict-projects

Ministry of External Affairs (2017) “Civilian Training Programme, Indian Technical &

Economic Cooperation (ITEC) 2016-2017.” The Indian Technical and Economic Cooperation Programme (ITEC), www.itecgoi.in/downloads/2016-2017.pdf

Ministry of External Affairs (n.d.), ITEC Program. Available online at https://www.itecgoi.in/index.php

Minter, Adam. (2018, October 7) How India Could Transform Africa, Bloomberg, www.bloomberg.com/view/articles/2018-10-07/india-s- aadhaar-could-unlock-economic-growth-in-africa.

Mueller, Milton. Internet Governance Project “Threat Analysis of the WCIT Part 4: The ITU and Cybersecurity.”, 20 Nov. 2017, www.internetgovernance.org/2012/06/21/threat-analysis-of-the- wcit-4-cybersecurity/.

Nye, Joseph S (2014, November). The Regime Complex for Managing Global Cyber Activities. Paper, Belfer Center for Science and International Affairs, Harvard Kennedy School, November 2014.

Saul, Jonathan (2017, June 29). “Global Shipping Feels Fallout from Maersk Cyber Attack.” Reuters, Thomson, www.reuters.com/ article/ us-cyber-attack-maersk/global-shipping-feels-fallout-from-maersk- cyber-attack-idUSKBN19K2LE.

Signé, Landry, and Kevin Signé (2018, June 4). “Global Cybercrimes and Weak Cybersecurity Threaten Businesses in Africa.” Brookings, Brookings, www.brookings.edu/blog/africa-in-focus/2018 /05/30/ global-cybercrimes-and-weak-cybersecurity-threaten-businesses-in- africa.

The Economic Times (2015, November 30), “Benefits for Africa as India Expands ITEC Programme.”, economictimes.indiatimes.com/ news/economy/foreign-trade/benefits-for-africa-as-india-expands- itec-programme/articleshow/49982822.cms

The Spamhaus Project (n.d.), The Top 10 Worst Botnet Countries.”, www.spamhaus.org/statistics/botnet-cc/.

United Nations (2010, July 30), "Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security."

United Nations (2005, August 5), Report of the Secretary General, Submitted by the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security https://disarmament-library.un.org/

United Nations (2018a, 22 December), Advancing Responsible State Behaviour in Cyberspace in the Context of International Security. Resolution Adopted by the General Assembly on 22 December 2018, https://undocs.org/en/A/RES/73/266.

United Nations (2018b, 22 December), Developments in the field of information and telecommunications in the context of international security. Resolution Adopted by the General Assembly on 22 December 2018, https://undocs.org/en/A/RES/73/27

Downloads

Published

2020-10-01