Cyber Security

Cyberspace: Post-Snowden

Just as the world was beginning to understand the various dimensions of cyberspace in general, and internet governance in particular, it received the rude shock of the Snowden revelations about the global surveillance carried out by the United States National Security Agency (NSA) in the name of counterterrorism. All kinds of electronic communications of US citizens and non-citizens alike were monitored. Phone tapping and electronic interception were part of this huge operation to collect a haystack of data in the hope of detecting terrorist links to protect national security.

Cyberspace: The New Strategic Realm in US–China Relations

In June 2013, President Obama met with President Xi Jinping at Sunnylands, California. The meeting was seen as a chance for the two leaders to get to know each other in a relatively informal setting so they could address the growing mistrust between their countries. While maritime disputes, trade tensions and differences over how to contain the North Korean and Iranian nuclear programmes were high on the agenda, cyber security—in particular Chinese cyber espionage—was the defining issue of this unusual summit.

China’s ‘String of pearls’ in Space

A ‘pearl’ could be viewed as a sphere of influence seeded, secured and maintained through the use of economic, geopolitical, diplomatic or military means. The ‘string of pearls’ is about China’s unambiguous maritime strategy that investments in increasing its sea power. This is essentially a multi-pronged strategy that challenges dominant US interests in the Indian Ocean and sends a clear message to India that the Indian Ocean is not India’s ocean by increasing the dependence of the littoral states in the region on China.