Cyberspace & Outer Space Are New Frontiers For National Security

Outer space and cyberspace have something in common, and it is that they are both the new frontiers for national security. This blurs what has been the traditional ideas of defence strategy, borders, and sovereignty. These two areas are critical infrastructure and are essential for a country to be secure and able to defend itself.

However, their double use character means that they can both be used for civilian and military purposes. 

Why Sovereignty Is Important

As a political and legal concept, Sovereignty refers to a country’s authority to control issues in its jurisdiction, such as bypassing and enforcing laws. Historically, geography determined the extent of a country's jurisdiction. However, outer space and cyberspaces don’t have border limitations like territorial spaces do. 

Within Sovereignty is the power to hand over some sovereign rights, like countries agreeing to reduce their actions for international cooperation on national security and human rights. 

Outer space and cyberspace enhance a country’s defence and the capabilities of its national security. However, countries remain vulnerable because of the overdependence on continuous access. While both can bring unity and a shared vision for humanity, they're also a source of discord and tension between countries and can be misused in conducting wars. 

Cyberspace

The world depends so much on the Internet, which has affected efforts to make cybersecurity more effective. There is usually a new threat for every solution, creating vulnerabilities for the country’s national security and defence. While everyone agrees that international laws apply to cyber activities too, there are issues over how. This has led to debates about the cyber activities of the military and what is considered peaceful or acceptable, or the ones that are prohibited and may lead to war. 

However, the difference between permitted cyber operations and those carried out in preparations for disruptive operations. They both involve the unauthorized use of computer networks and systems in another country.

Outer Space

This is another major challenge. The possible weaponization and militarization of outer space is a significant challenge for all countries’ national defence and security. The laws governing outer space prevent celestial bodies from being used for any other peaceful purposes and forbid mass destructive weapons from being placed in outer space. So countries have liabilities and responsibilities set on them by this treaty. So, governments must promote responsible use of outer space and minimise the possibility of starting conflicts. 

There were opinions initially about using outer space peacefully, meaning that it can only be used for non-military activities instead of non-aggressive activities, which are permissible. However, the reality of the situation is that countries have been using outer space to carry out terrestrial military activities, and this will only continue to happen. 

The Gulf War in 1991 is commonly regarded as a space war – the first one. It is evident now that satellite technology has become a big part of the modern-day military strategy for many countries. 

Space Sovereignty

Currently, there are about 80 countries with some level of capability for sovereign space, such as the ability to launch and operate their satellites independently. However, this means that nearly two-thirds of the countries in the world lack any form of national space capabilities. They depend entirely on other countries to access space and space infrastructure. They cannot leverage space technology for their development, and their well-being depends on geopolitical and strategic understandings and networks. 

Even countries like Australia - a vital space participant - have limited sovereign capabilities for earth observations, space launches, GPS, and other crucial activities. It is not economically feasible for the country to depend on other countries entirely in all aspects of space. This is why they developed a twin policy that ensures space access through strategic alliances with other carefully selected spacefaring countries. At the same time, they build their sovereign space capabilities further in these specific areas. The government understands that this is crucial to its national defence and security interests. 

A 2019 report by the IISS ranking the cyber power of certain countries suggested that the national agencies of these countries are going to become more cyber-focused. This report also had substantial evidence to show that cyber capabilities and policies have taken the centre stage of international security. 

Cyberspace dominance has always been a strategic goal for the US since the 1990s. It already has a massive global footprint in the military and civil use of cyberspace. And it’s now being threatened by Russia and China on this front. 

Conclusion

Countries must address the intersection between outer space and cyberspace for their security and defence policies. These domains have participants from both military and civilian acts, and more possibilities are multiplying. Understanding the close intersection between outer space and cybersecurity technology puts the country in the best position for an integrated and effective national defence and security. 

Eliza Sadler is a professional journalist with extensive experience, presently working as a college paper writer.

Image: Unsplash

You Might Also Read:

Satellite Communications Need Protection:

 

« Zero Trust Architecture - No Longer A ‘Nice to Have’
US Intelligence Hackers Available For Hire »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Resec Technologies

Resec Technologies

Resec provides total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method.

Netmarks Indonesia (NMID)

Netmarks Indonesia (NMID)

Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

Gula Tech Adventures

Gula Tech Adventures

Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

B2Bcert

B2Bcert

B2BCERT one of the top companies offering ISO 9001, ISO 14001, ISO 45001, ISO 22000, ISO 27001, ISO 20000,CE Marking, HACCP, and other globally accepted standards and Management solutions.

COGITANDA Dataprotect

COGITANDA Dataprotect

COGITANDA are a group of companies focused on dealing with cyber risks, managing them and insuring them.

Defend-OT

Defend-OT

Defend-OT is a Belgium-based cybersecurity firm specializing in OT environments.

JustunSecure

JustunSecure

JustunSecure is dedicated to promoting information technology and cybersecurity in Africa.