{"id":7934,"date":"2023-11-01T20:10:17","date_gmt":"2023-11-01T19:10:17","guid":{"rendered":"https:\/\/www.deepworldsea.com\/?p=7934"},"modified":"2023-11-01T20:10:17","modified_gmt":"2023-11-01T19:10:17","slug":"how-can-us-use-cyber-in-the-south-china-sea","status":"publish","type":"post","link":"https:\/\/www.deepworldsea.com\/how-can-us-use-cyber-in-the-south-china-sea\/","title":{"rendered":"How Can Us Use Cyber In The South China Sea"},"content":{"rendered":"
\n

Security in the South China Sea, an area through which a massive amount of global trade passes each year, is a matter of increasing concern. With the growing military presence in the area, the potential for conflict is a very real possibility. Cyber is playing an ever growing role in this security environment. Cyber-related actions by any of the claimants to the South China Sea could have profoundly disruptive effects.<\/p>\n

Much of the current discussion of cyber activities more generally focuses on espionage and disruption. But to think about cyber in the South China Sea in broader terms – such as the development of competitive strategies, strategies for managing escalation and de-escalation, counter-escalation strategies and measures for deterring, responding to, and mitigating cyber-attacks – begins to reveal a much more nuanced environment.<\/p>\n

In order to make use of cyber power in the South China Sea, countries need to build their capabilities. This involves hardware and software, but also the development of protocols, procedures and personnel to prevent, detect and respond to cyber incidents. Countries also need to be able to detect and understand potential cyber threats before they happen – something that is not easy given the variety of cyber capabilities available today. Countries need to invest heavily in cyber security, as well as in international collaboration to build trust and capability among all stakeholders. <\/p>\n

The Potential of Cyber in International Relations<\/h2>\n

There is a considerable potential for cyber to be used as a tool for states to influence international relations. For example, even a relatively small cyber incident can be used to demonstrate a state’s cyber-capability, and can be leveraged to gain leverage in the international relations arena. Meanwhile, hacking for espionage purposes has become increasingly common, with some governments using it to gain access to sensitive data in other countries, either for political or economic gain. <\/p>\n