CONTENT PREVIEW
C4iSR: Joint & Common Equipment

Digital diplomacy - Working towards a cyber code of conduct

04 September 2013
A classroom at the Center for Cyberspace Research, where cadets are taught, at the US Air Force Academy, in Colorado Springs, Colorado, on 20 February 2013. The academy trains cadets to prepare for cyber attacks on US military and civilian computer networks that control everything from electrical power grids to the banking system. Source: PA

Key Points

  • Although states have begun to co-operate in countering the threat of cyber crime and terrorism, the development of rules to govern state interaction within cyberspace is still in its infancy.
  • A draft code of conduct proposed by China and Russia in 2011 is the first to set out ground rules for state behaviour in cyberspace.
  • Differing national views on the role of state authority and the control of information make the adoption of the Sino-Russian code unlikely in the short term, although it could form the basis of a more constructive policy dialogue on cyber security.

Since the US government took the unprecedented step in May 2013 of publicly identifying China as the principal perpetrator of alleged state-sponsored cyber attacks directed at US governmental and business interests, there has been increasing recognition of the need to develop new international norms to govern the conduct of states within cyberspace.



(150 of 3161 words)
By posting a comment you confirm that you have read and accept our Posting Rules and our Terms of Use of this site.

RELEVANT PROFILE LISTINGS

  • GSMK CryptoPhone 450

    Type Encryption equipment, cellular telephone, ruggedised Description The CryptoPhone P450 is a secure IP mobile phone with voice and SMS encryption, protected operating system and semi-ruggedised hardware. The contractor says the equipment provides high transmission protocol efficiency, with 4.8

  • GSMK CryptoPhone 500

    Type Encryption equipment, cellular telephone Description The CryptoPhone 500 is a secure IP mobile phone with voice and SMS encryption, protected operating system and baseband firewall. The contractor says the equipment provides high transmission protocol efficiency, with 4.8 kbits/s

  • GSMK CryptoPhone Expedition Case

    Type Encryption equipment, SATCOM Description The CryptoPhone Expedition Case contains the complete equipment inventory required for secure communication in remote operating areas or in locations where communications and energy infrastructure are destroyed. It is interoperable with all GSMK

  • EB Tough VoIP Field Phone™ and EB Tough VoIP Desktop Phone™

    Type Telephone terminal Development The EB Tough VoIP Field Phone™ and Desktop Phone™ have been developed as VoIP phones for tactical communication systems. The Tough VoIP phones integrate with existing and future tactical communications IP infrastructure, both wired and wireless.

  • CMA 2400 active DF antenna

    Type Direction Finding (DF) equipment Description The CMA 2400 is an active DF antenna for mobile and semi-mobile use in the frequency range of 20 to 3,000 MHz. The CMA 2400 is made up of three sub-systems giving configuration options in mobile use. A CMA 2400 system with a weight of 41 kg can,

ADVERTISEMENT

Industry Links

IHS Jane's is not responsible for the content within or linking from Industry Links pages.
ADVERTISEMENT