Cyberspace & Outer Space Are New Frontiers For National Security

Outer space and cyberspace have something in common, and it is that they are both the new frontiers for national security. This blurs what has been the traditional ideas of defence strategy, borders, and sovereignty. These two areas are critical infrastructure and are essential for a country to be secure and able to defend itself.

However, their double use character means that they can both be used for civilian and military purposes. 

Why Sovereignty Is Important

As a political and legal concept, Sovereignty refers to a country’s authority to control issues in its jurisdiction, such as bypassing and enforcing laws. Historically, geography determined the extent of a country's jurisdiction. However, outer space and cyberspaces don’t have border limitations like territorial spaces do. 

Within Sovereignty is the power to hand over some sovereign rights, like countries agreeing to reduce their actions for international cooperation on national security and human rights. 

Outer space and cyberspace enhance a country’s defence and the capabilities of its national security. However, countries remain vulnerable because of the overdependence on continuous access. While both can bring unity and a shared vision for humanity, they're also a source of discord and tension between countries and can be misused in conducting wars. 

Cyberspace

The world depends so much on the Internet, which has affected efforts to make cybersecurity more effective. There is usually a new threat for every solution, creating vulnerabilities for the country’s national security and defence. While everyone agrees that international laws apply to cyber activities too, there are issues over how. This has led to debates about the cyber activities of the military and what is considered peaceful or acceptable, or the ones that are prohibited and may lead to war. 

However, the difference between permitted cyber operations and those carried out in preparations for disruptive operations. They both involve the unauthorized use of computer networks and systems in another country.

Outer Space

This is another major challenge. The possible weaponization and militarization of outer space is a significant challenge for all countries’ national defence and security. The laws governing outer space prevent celestial bodies from being used for any other peaceful purposes and forbid mass destructive weapons from being placed in outer space. So countries have liabilities and responsibilities set on them by this treaty. So, governments must promote responsible use of outer space and minimise the possibility of starting conflicts. 

There were opinions initially about using outer space peacefully, meaning that it can only be used for non-military activities instead of non-aggressive activities, which are permissible. However, the reality of the situation is that countries have been using outer space to carry out terrestrial military activities, and this will only continue to happen. 

The Gulf War in 1991 is commonly regarded as a space war – the first one. It is evident now that satellite technology has become a big part of the modern-day military strategy for many countries. 

Space Sovereignty

Currently, there are about 80 countries with some level of capability for sovereign space, such as the ability to launch and operate their satellites independently. However, this means that nearly two-thirds of the countries in the world lack any form of national space capabilities. They depend entirely on other countries to access space and space infrastructure. They cannot leverage space technology for their development, and their well-being depends on geopolitical and strategic understandings and networks. 

Even countries like Australia - a vital space participant - have limited sovereign capabilities for earth observations, space launches, GPS, and other crucial activities. It is not economically feasible for the country to depend on other countries entirely in all aspects of space. This is why they developed a twin policy that ensures space access through strategic alliances with other carefully selected spacefaring countries. At the same time, they build their sovereign space capabilities further in these specific areas. The government understands that this is crucial to its national defence and security interests. 

A 2019 report by the IISS ranking the cyber power of certain countries suggested that the national agencies of these countries are going to become more cyber-focused. This report also had substantial evidence to show that cyber capabilities and policies have taken the centre stage of international security. 

Cyberspace dominance has always been a strategic goal for the US since the 1990s. It already has a massive global footprint in the military and civil use of cyberspace. And it’s now being threatened by Russia and China on this front. 

Conclusion

Countries must address the intersection between outer space and cyberspace for their security and defence policies. These domains have participants from both military and civilian acts, and more possibilities are multiplying. Understanding the close intersection between outer space and cybersecurity technology puts the country in the best position for an integrated and effective national defence and security. 

Eliza Sadler is a professional journalist with extensive experience, presently working as a college paper writer.

Image: Unsplash

You Might Also Read:

Satellite Communications Need Protection:

 

« Zero Trust Architecture - No Longer A ‘Nice to Have’
US Intelligence Hackers Available For Hire »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Airbus Cybersecurity

Airbus Cybersecurity

Airbus CyberSecurity is a European specialist in cyber security. Our mission is to protect governments, military and critical national infrastructure enterprises from cyber threats.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

Cancom

Cancom

CANCOM group is one of the leading providers of IT infrastructure and IT services in Germany and Austria. Solution areas include network security.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Databarracks

Databarracks

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.