Still The International Cyber Super Power

As the world becomes increasingly interconnected, the strength of a nation's cyber power, the ability to influence and operate within the cyber domain, becomes a defining factor in its global standing. And over the last 30 years cyber capabilities have become a formidable new instrument of national power. 

As well as using such capabilities to obtain state secrets from each other, as in traditional espionage, states have also used them for a range of other, more threatening purposes. 

These include bolstering their own economic development by stealing intellectual property; threatening to disrupt the financial institutions, oil industries, nuclear plants, power grids and communications infrastructure of states they regard as adversaries. They have also attempted to interfere in democratic processes; degrading and disrupting military capabilities in wartime; and, in one case, constraining the ability of another state to develop nuclear weapons. 

So far, the US remains the most cyber capable state and it ranks number one as a world “cyber power” leader, according to a Report from Harvard University’s Belfer Center for Science and International Affairs.

Since the mid-1990s its leaders have provided clear political direction for the pursuit of national cyber power: in that time it has invested heavily in developing relevant civilian and military capabilities, gained extensive opera- tional experience and developed the world’s strongest digital-industrial base. This is highlighted by the range of US companies capable of detecting and attributing state cyber attacks and the proven sophistication of the US offensive cyber capability, military or otherwise. 

US cyber strength is also founded on a world-class cyber intelligence capability with global reach and state-of-the-art cryptographic techniques, and is amplified by highly integrated partnerships with other states that are also amongst the most cyber-capable in the world. 

Nevertheless, the ways in which the US wields its cyber power appear politically and legally constrained when compared with its main cyber adversaries, Russia, China, Iran and North Korea.  The US has sought to be a responsible offensive cyber actor, governed by international law and at pains to limit potential collateral damage. 

The US has also sought to manage its degree of dependence on cyberspace, not only for the purpose of national security, but also for economic and political reasons. This challenge is exacerbated by the complexity of its cyber governance and command-and-control structures, where the large number of agencies involved is a potential impediment to the agility of operational decision-making. 

These factors have combined to give the adversaries of the US an edge in the use of unsophisticated cyber techniques that are aimed at subversion but pitched below the legal threshold for an act of aggression that might justify an armed response. 

Doctrinal shifts such as persistent engagement and defend forward are designed to redress this imbalance. 
Nevertheless, the US performs strongly across all categories of the methodology and is alone in Tier One. 
Below the US there is a second tier of seven countries: in alphabetical order they are Australia, Canada, China, France, Israel, Russia and the UK. Each has world-leading strengths in some of the categories in the methodology. 

Compared with the other countries in the second tier, the UK and Israel are particularly strong on cyber security, core cyber intelligence, including crypto-graphic capability, and the development and use of sophisticated offensive cyber capability. 

With clear political direction, both benefit from a whole-of-society approach to cyber security with a strong and growing cyber security industrial base and innovative approaches to increasing their skilled capacity. 
They also possess a vibrant technical-innovation and start-up ecosystem. Israel’s cyber-intelligence strength appears to be heavily focused on its region, where it has no equal. 

The evidence indicates that the UK, on the other hand, has a cyber- intelligence capability with a broader, worldwide reach. The UK also has two of the 51 tech or telecoms companies that appear in the 2020 Fortune Global 500, while Israel has none. 

Both countries lag behind the US, Japan, China and others in their capacity to build future Internet infrastructure; both compensate for a comparative lack of cyber mass through close partnerships with the US, with each other and with other cyber capable nations; and both have conducted offensive cyber operations jointly with the US. 

Today, the US remains the most capable cyber state largely due to significant investments and clear political direction for the pursuit of national cyber power since the mid-1990s. Moreover, the US possesses a world class cyber intelligence capability with global reach and is amplified by integrated partnerships with other highly cyber capable states.

Belfer Center   |   IISS   |   The White House   |   Dr. Saleh AlDaajeh   |    MixMode   |    MeriTalk   | 

Lonergan & Schneider / OUP    |      C4ISRNET   |   US Defence Dept 

Image: Ideogram

You Might Also Read: 

The Impact Of Geopolitical Dynamics On The Evolving Cybersecurity Landscape


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The British Government’s AI Action Plan 
Which Cybersecurity Trends Will Dominate 2025? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Dell Technologies

Dell Technologies

Dell Technologies Consulting Services enables a highly resilient business amidst the proliferation of cloud-based IT services and constant threats to your most critical information.

SilverSky

SilverSky

SilverSky offers a comprehensive suite of products and services that deliver unprecedented simplicity and expertise for compliance and cybersecurity programs.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

Hydden

Hydden

Hydden gives security teams the ability to create a solid foundation to build a truly next-gen identity security practice by bridging the gaps between siloed teams and technologies.

The Aerospace Corporation

The Aerospace Corporation

The Aerospace Corporation is playing a key role in advancing space cybersecurity through innovative prototypes that can quickly detect and mitigate cyber threats.

403Tech Inc.

403Tech Inc.

403Tech is a Calgary based IT Solutions Provider, specializing in small & medium business.

Maro

Maro

The web is a dark and dangerous place. Step into the light with the first cognitive security platform that makes human risk visible, actionable, and shapeable.