Still The International Cyber Super Power

As the world becomes increasingly interconnected, the strength of a nation's cyber power, the ability to influence and operate within the cyber domain, becomes a defining factor in its global standing. And over the last 30 years cyber capabilities have become a formidable new instrument of national power. 

As well as using such capabilities to obtain state secrets from each other, as in traditional espionage, states have also used them for a range of other, more threatening purposes. 

These include bolstering their own economic development by stealing intellectual property; threatening to disrupt the financial institutions, oil industries, nuclear plants, power grids and communications infrastructure of states they regard as adversaries. They have also attempted to interfere in democratic processes; degrading and disrupting military capabilities in wartime; and, in one case, constraining the ability of another state to develop nuclear weapons. 

So far, the US remains the most cyber capable state and it ranks number one as a world “cyber power” leader, according to a Report from Harvard University’s Belfer Center for Science and International Affairs.

Since the mid-1990s its leaders have provided clear political direction for the pursuit of national cyber power: in that time it has invested heavily in developing relevant civilian and military capabilities, gained extensive opera- tional experience and developed the world’s strongest digital-industrial base. This is highlighted by the range of US companies capable of detecting and attributing state cyber attacks and the proven sophistication of the US offensive cyber capability, military or otherwise. 

US cyber strength is also founded on a world-class cyber intelligence capability with global reach and state-of-the-art cryptographic techniques, and is amplified by highly integrated partnerships with other states that are also amongst the most cyber-capable in the world. 

Nevertheless, the ways in which the US wields its cyber power appear politically and legally constrained when compared with its main cyber adversaries, Russia, China, Iran and North Korea.  The US has sought to be a responsible offensive cyber actor, governed by international law and at pains to limit potential collateral damage. 

The US has also sought to manage its degree of dependence on cyberspace, not only for the purpose of national security, but also for economic and political reasons. This challenge is exacerbated by the complexity of its cyber governance and command-and-control structures, where the large number of agencies involved is a potential impediment to the agility of operational decision-making. 

These factors have combined to give the adversaries of the US an edge in the use of unsophisticated cyber techniques that are aimed at subversion but pitched below the legal threshold for an act of aggression that might justify an armed response. 

Doctrinal shifts such as persistent engagement and defend forward are designed to redress this imbalance. 
Nevertheless, the US performs strongly across all categories of the methodology and is alone in Tier One. 
Below the US there is a second tier of seven countries: in alphabetical order they are Australia, Canada, China, France, Israel, Russia and the UK. Each has world-leading strengths in some of the categories in the methodology. 

Compared with the other countries in the second tier, the UK and Israel are particularly strong on cyber security, core cyber intelligence, including crypto-graphic capability, and the development and use of sophisticated offensive cyber capability. 

With clear political direction, both benefit from a whole-of-society approach to cyber security with a strong and growing cyber security industrial base and innovative approaches to increasing their skilled capacity. 
They also possess a vibrant technical-innovation and start-up ecosystem. Israel’s cyber-intelligence strength appears to be heavily focused on its region, where it has no equal. 

The evidence indicates that the UK, on the other hand, has a cyber- intelligence capability with a broader, worldwide reach. The UK also has two of the 51 tech or telecoms companies that appear in the 2020 Fortune Global 500, while Israel has none. 

Both countries lag behind the US, Japan, China and others in their capacity to build future Internet infrastructure; both compensate for a comparative lack of cyber mass through close partnerships with the US, with each other and with other cyber capable nations; and both have conducted offensive cyber operations jointly with the US. 

Today, the US remains the most capable cyber state largely due to significant investments and clear political direction for the pursuit of national cyber power since the mid-1990s. Moreover, the US possesses a world class cyber intelligence capability with global reach and is amplified by integrated partnerships with other highly cyber capable states.

Belfer Center   |   IISS   |   The White House   |   Dr. Saleh AlDaajeh   |    MixMode   |    MeriTalk   | 

Lonergan & Schneider / OUP    |      C4ISRNET   |   US Defence Dept 

Image: Ideogram

You Might Also Read: 

The Impact Of Geopolitical Dynamics On The Evolving Cybersecurity Landscape


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The British Government’s AI Action Plan 
Which Cybersecurity Trends Will Dominate 2025? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

KFSensor

KFSensor

KFSensor is an advanced 'honeypot' intrusion and insider threat detection system for Windows networks.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

Phosphorus Cybersecurity

Phosphorus Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

Hexagate

Hexagate

Hexagate is at the forefront of blockchain threat prevention and automated risk management, proactively detecting and mitigating threats to smart contracts and onchain assets.