CONTENT PREVIEW
C4iSR: Joint & Common Equipment

Digital diplomacy - Working towards a cyber code of conduct

04 September 2013
A classroom at the Center for Cyberspace Research, where cadets are taught, at the US Air Force Academy, in Colorado Springs, Colorado, on 20 February 2013. The academy trains cadets to prepare for cyber attacks on US military and civilian computer networks that control everything from electrical power grids to the banking system. Source: PA

Key Points

  • Although states have begun to co-operate in countering the threat of cyber crime and terrorism, the development of rules to govern state interaction within cyberspace is still in its infancy.
  • A draft code of conduct proposed by China and Russia in 2011 is the first to set out ground rules for state behaviour in cyberspace.
  • Differing national views on the role of state authority and the control of information make the adoption of the Sino-Russian code unlikely in the short term, although it could form the basis of a more constructive policy dialogue on cyber security.

Since the US government took the unprecedented step in May 2013 of publicly identifying China as the principal perpetrator of alleged state-sponsored cyber attacks directed at US governmental and business interests, there has been increasing recognition of the need to develop new international norms to govern the conduct of states within cyberspace.



(150 of 3161 words)
By posting a comment you confirm that you have read and accept our Posting Rules and our Terms of Use of this site.

RELEVANT PROFILE LISTINGS

  • Secure Enroute Communications Package - Improved (SECOMP-I)

    Type Integrated communication network component Description The Secure Enroute COMmunications Package - Improved (SECOMP-I) is a communications system designed for use by US Corps/JTF/Army Force Commanders and staff while deploying to a theatre of operations on board aircraft, ships or while

  • Swiss MFA radio system

    Type Radio communications system, HF Description The MFA HF radio system is the Swiss Government's worldwide e-mail delivery system for use by Swiss embassies. According to the contractor the radio messaging system is a robust short wave solution for transmitting encrypted e-mail. It provides

  • GSMK CryptoPhone 450

    Type Encryption equipment, cellular telephone, ruggedised Description The CryptoPhone P450 is a secure IP mobile phone with voice and SMS encryption, protected operating system and semi-ruggedised hardware. The contractor says the equipment provides high transmission protocol efficiency, with 4.8

  • GSMK CryptoPhone 500

    Type Encryption equipment, cellular telephone Description The CryptoPhone 500 is a secure IP mobile phone with voice and SMS encryption, protected operating system and baseband firewall. The contractor says the equipment provides high transmission protocol efficiency, with 4.8 kbits/s

  • GSMK CryptoPhone Expedition Case

    Type Encryption equipment, SATCOM Description The CryptoPhone Expedition Case contains the complete equipment inventory required for secure communication in remote operating areas or in locations where communications and energy infrastructure are destroyed. It is interoperable with all GSMK

ADVERTISEMENT

Industry Links

IHS Jane's is not responsible for the content within or linking from Industry Links pages.
ADVERTISEMENT