Still The International Cyber Super Power

As the world becomes increasingly interconnected, the strength of a nation's cyber power, the ability to influence and operate within the cyber domain, becomes a defining factor in its global standing. And over the last 30 years cyber capabilities have become a formidable new instrument of national power. 

As well as using such capabilities to obtain state secrets from each other, as in traditional espionage, states have also used them for a range of other, more threatening purposes. 

These include bolstering their own economic development by stealing intellectual property; threatening to disrupt the financial institutions, oil industries, nuclear plants, power grids and communications infrastructure of states they regard as adversaries. They have also attempted to interfere in democratic processes; degrading and disrupting military capabilities in wartime; and, in one case, constraining the ability of another state to develop nuclear weapons. 

So far, the US remains the most cyber capable state and it ranks number one as a world “cyber power” leader, according to a Report from Harvard University’s Belfer Center for Science and International Affairs.

Since the mid-1990s its leaders have provided clear political direction for the pursuit of national cyber power: in that time it has invested heavily in developing relevant civilian and military capabilities, gained extensive opera- tional experience and developed the world’s strongest digital-industrial base. This is highlighted by the range of US companies capable of detecting and attributing state cyber attacks and the proven sophistication of the US offensive cyber capability, military or otherwise. 

US cyber strength is also founded on a world-class cyber intelligence capability with global reach and state-of-the-art cryptographic techniques, and is amplified by highly integrated partnerships with other states that are also amongst the most cyber-capable in the world. 

Nevertheless, the ways in which the US wields its cyber power appear politically and legally constrained when compared with its main cyber adversaries, Russia, China, Iran and North Korea.  The US has sought to be a responsible offensive cyber actor, governed by international law and at pains to limit potential collateral damage. 

The US has also sought to manage its degree of dependence on cyberspace, not only for the purpose of national security, but also for economic and political reasons. This challenge is exacerbated by the complexity of its cyber governance and command-and-control structures, where the large number of agencies involved is a potential impediment to the agility of operational decision-making. 

These factors have combined to give the adversaries of the US an edge in the use of unsophisticated cyber techniques that are aimed at subversion but pitched below the legal threshold for an act of aggression that might justify an armed response. 

Doctrinal shifts such as persistent engagement and defend forward are designed to redress this imbalance. 
Nevertheless, the US performs strongly across all categories of the methodology and is alone in Tier One. 
Below the US there is a second tier of seven countries: in alphabetical order they are Australia, Canada, China, France, Israel, Russia and the UK. Each has world-leading strengths in some of the categories in the methodology. 

Compared with the other countries in the second tier, the UK and Israel are particularly strong on cyber security, core cyber intelligence, including crypto-graphic capability, and the development and use of sophisticated offensive cyber capability. 

With clear political direction, both benefit from a whole-of-society approach to cyber security with a strong and growing cyber security industrial base and innovative approaches to increasing their skilled capacity. 
They also possess a vibrant technical-innovation and start-up ecosystem. Israel’s cyber-intelligence strength appears to be heavily focused on its region, where it has no equal. 

The evidence indicates that the UK, on the other hand, has a cyber- intelligence capability with a broader, worldwide reach. The UK also has two of the 51 tech or telecoms companies that appear in the 2020 Fortune Global 500, while Israel has none. 

Both countries lag behind the US, Japan, China and others in their capacity to build future Internet infrastructure; both compensate for a comparative lack of cyber mass through close partnerships with the US, with each other and with other cyber capable nations; and both have conducted offensive cyber operations jointly with the US. 

Today, the US remains the most capable cyber state largely due to significant investments and clear political direction for the pursuit of national cyber power since the mid-1990s. Moreover, the US possesses a world class cyber intelligence capability with global reach and is amplified by integrated partnerships with other highly cyber capable states.

Belfer Center   |   IISS   |   The White House   |   Dr. Saleh AlDaajeh   |    MixMode   |    MeriTalk   | 

Lonergan & Schneider / OUP    |      C4ISRNET   |   US Defence Dept 

Image: Ideogram

You Might Also Read: 

The Impact Of Geopolitical Dynamics On The Evolving Cybersecurity Landscape


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The British Government’s AI Action Plan 
Which Cybersecurity Trends Will Dominate 2025? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

Certes

Certes

Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM).

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

Amyna Systems

Amyna Systems

Amyna has developed an IoT cybersecurity platform that prevents malignant attacks, helping users to protect themselves from cyberattacks.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

Device42

Device42

Device42 is a trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT.