Cyberspace & Outer Space Are New Frontiers For National Security

Outer space and cyberspace have something in common, and it is that they are both the new frontiers for national security. This blurs what has been the traditional ideas of defence strategy, borders, and sovereignty. These two areas are critical infrastructure and are essential for a country to be secure and able to defend itself.

However, their double use character means that they can both be used for civilian and military purposes. 

Why Sovereignty Is Important

As a political and legal concept, Sovereignty refers to a country’s authority to control issues in its jurisdiction, such as bypassing and enforcing laws. Historically, geography determined the extent of a country's jurisdiction. However, outer space and cyberspaces don’t have border limitations like territorial spaces do. 

Within Sovereignty is the power to hand over some sovereign rights, like countries agreeing to reduce their actions for international cooperation on national security and human rights. 

Outer space and cyberspace enhance a country’s defence and the capabilities of its national security. However, countries remain vulnerable because of the overdependence on continuous access. While both can bring unity and a shared vision for humanity, they're also a source of discord and tension between countries and can be misused in conducting wars. 

Cyberspace

The world depends so much on the Internet, which has affected efforts to make cybersecurity more effective. There is usually a new threat for every solution, creating vulnerabilities for the country’s national security and defence. While everyone agrees that international laws apply to cyber activities too, there are issues over how. This has led to debates about the cyber activities of the military and what is considered peaceful or acceptable, or the ones that are prohibited and may lead to war. 

However, the difference between permitted cyber operations and those carried out in preparations for disruptive operations. They both involve the unauthorized use of computer networks and systems in another country.

Outer Space

This is another major challenge. The possible weaponization and militarization of outer space is a significant challenge for all countries’ national defence and security. The laws governing outer space prevent celestial bodies from being used for any other peaceful purposes and forbid mass destructive weapons from being placed in outer space. So countries have liabilities and responsibilities set on them by this treaty. So, governments must promote responsible use of outer space and minimise the possibility of starting conflicts. 

There were opinions initially about using outer space peacefully, meaning that it can only be used for non-military activities instead of non-aggressive activities, which are permissible. However, the reality of the situation is that countries have been using outer space to carry out terrestrial military activities, and this will only continue to happen. 

The Gulf War in 1991 is commonly regarded as a space war – the first one. It is evident now that satellite technology has become a big part of the modern-day military strategy for many countries. 

Space Sovereignty

Currently, there are about 80 countries with some level of capability for sovereign space, such as the ability to launch and operate their satellites independently. However, this means that nearly two-thirds of the countries in the world lack any form of national space capabilities. They depend entirely on other countries to access space and space infrastructure. They cannot leverage space technology for their development, and their well-being depends on geopolitical and strategic understandings and networks. 

Even countries like Australia - a vital space participant - have limited sovereign capabilities for earth observations, space launches, GPS, and other crucial activities. It is not economically feasible for the country to depend on other countries entirely in all aspects of space. This is why they developed a twin policy that ensures space access through strategic alliances with other carefully selected spacefaring countries. At the same time, they build their sovereign space capabilities further in these specific areas. The government understands that this is crucial to its national defence and security interests. 

A 2019 report by the IISS ranking the cyber power of certain countries suggested that the national agencies of these countries are going to become more cyber-focused. This report also had substantial evidence to show that cyber capabilities and policies have taken the centre stage of international security. 

Cyberspace dominance has always been a strategic goal for the US since the 1990s. It already has a massive global footprint in the military and civil use of cyberspace. And it’s now being threatened by Russia and China on this front. 

Conclusion

Countries must address the intersection between outer space and cyberspace for their security and defence policies. These domains have participants from both military and civilian acts, and more possibilities are multiplying. Understanding the close intersection between outer space and cybersecurity technology puts the country in the best position for an integrated and effective national defence and security. 

Eliza Sadler is a professional journalist with extensive experience, presently working as a college paper writer.

Image: Unsplash

You Might Also Read:

Satellite Communications Need Protection:

 

« Zero Trust Architecture - No Longer A ‘Nice to Have’
US Intelligence Hackers Available For Hire »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.

Applaudo

Applaudo

Applaudo specializes in helping the world’s most admired brands optimize their IT solutions, reduce delivery costs, and accelerate their digital transformation.