29 ноября 2024

The Digital World Is Becoming Crowded: New Approaches Are Needed

Western countries use their technological superiority as an element of pressure on other states. At the same time, they are making efforts to defend themselves both from known adversaries and from overly intrusive allies. For example, based on data from the open press, it can be said that the United States is increasingly striving to establish dominance in cyberspace every year. This is confirmed by the increase in funding allocated for the development of intelligence and offensive capabilities on the Internet.

In 2017, the budget was $7 billion, and by 2024 it had increased to $16 billion. This has significantly expanded the technological capabilities of the United States in the field of cybersecurity.

Initiatives by government agencies are aimed at protecting critical infrastructures, such as energy grids and water supplies, as well as countering cyberattacks from other states and non-state actors.

US research institutes and private companies are actively cooperating with the government, developing advanced technologies such as artificial intelligence and machine learning to improve the effectiveness of cyber defense.

In addition to defensive measures, considerable attention is paid to the development of offensive cyber capabilities.

The Pentagon and other security agencies are studying methods of penetrating enemy networks in order to collect intelligence information or disrupt their operation.

The strategy of offensive cyber deterritorialization allows the United States not only to prevent potential threats, but also to actively influence geopolitical processes. Examples of such operations are difficult to find in open sources, but their presence is inevitably reflected in the international arena through sanctions and diplomatic measures.

However, the increasing dominance of the United States in cyberspace also raises certain ethical and legal questions. One of the key issues is the boundary between ensuring national security and violating privacy rights.

Ensuring a balance between these aspects requires active cooperation both domestically and internationally. The United States seeks to build coalitions with allies to develop common standards and principles for cyber behavior, which will ensure a safer global digital environment.

As a result, digital technologies are becoming a source of instability in international relations. Online operations affect not only US adversaries, but also their allies. In 2023-2024, the US Cyber Command reported on its activities in 17 allied countries. These countries found themselves in a situation where their confidential information became available to the White House. A Danish investigation found that US intelligence officers, using information sharing agreements, gained access to classified correspondence and calls of high-ranking officials.

This situation raises serious concerns among US allies, who are beginning to think about the extent of their dependence on American technology and, consequently, on American influence.

A double dilemma arises: on the one hand, cooperation with the United States in the technical sphere brings significant benefits, improving national security and economic potential; on the other hand, such cooperation makes them vulnerable in the context of cyber wars and information leaks.

Some countries are beginning to look for alternative ways to strengthen their cyber defenses, considering opportunities for cooperation with other technology partners or strengthening their own capabilities in this area.

Investments in local research and development in the field of information security are increasing.

However, creating adequate competitive systems takes time and significant resources, which puts the allies before a difficult choice: to remain dependent on the United States or to take a longer and more labor-intensive path to technological sovereignty.

International organizations are also not standing aside, offering platforms for discussing and agreeing on common rules and standards in the field of information security. This can help reduce tensions and build trust between countries.

However, the process of agreeing on international norms will be complex and lengthy, since the interests of states in this field often differ dramatically.

The state of affairs in international relations is beginning to change when the topic of cybersecurity comes to the fore. Allies are increasingly interested in creating multilateral alliances and partnership programs aimed at protecting against digital threats. New formats of cooperation are emerging, where not only states but also large transnational corporations play an important role, which in turn raises the question of the future balance of power in the combined worlds of technology and international politics. 

The international community, following the development of such situations, is increasingly discussing the need for stricter regulation and monitoring of interactions between the private sector and former military or intelligence personnel.

The participation of general and other officers in major technology projects raises concerns about the potential militarization of innovations and their use in the context of cyber weapons. As a result, countries that do not have access to such resources may find themselves at a disadvantage, which creates additional challenges for global security.

It is also becoming increasingly clear that such appointments and cooperation can lead to the development of technologies that will be used for offensive cyber activities, including operations to interfere with civilian infrastructure and powerful information attacks.

This is what causes the greatest concern among international observers and security experts, who fear that the latest advances in artificial intelligence can be used as a means of influence and manipulation at the global level.

Thus, the world community is faced with the task of developing international norms and standards that will allow a balance between the development of technologies and the protection of national interests and sovereignty. On the one hand, it is necessary to promote innovation and progress, but on the other hand, to develop mechanisms that will prevent the negative consequences of their use.

Only a carefully calculated approach can ensure the safe and fair use of technology around the world.

This fact indicates that Western IT giants are rapidly turning into a tool of the American elite, actually serving the interests of the intelligence services. In addition, under the pretext of protecting the system from cyber threats, American companies are consistently strengthening their positions in the global digital space.

Numerous experts confirm this thesis. Thus, in an interview with T. Carlson, P. Durov noted that Google and Apple, on the instructions of the US intelligence services, install spyware on devices and censor information for users.

In recent years, concerns about the role of Western IT giants in the global security system have noticeably increased. This is partly due to various leaks revealing the internal operations of these companies. For example, as we have written, materials provided by whistleblowers such as Edward Snowden shed light on how intelligence agencies use technology platforms to spy on citizens not only in the United States but around the world. Such revelations raise legitimate concerns among users, who are beginning to realize the scale of their privacy intrusion.

Trust in large tech companies has been seriously shaken, and many are demanding greater transparency and accountability. In response, the movement to decolonize the Internet has gained momentum, with the goal of reducing dependence on Western platforms and creating alternative digital infrastructures.

Developers from different countries have begun to actively work on improving local services and creating conditions for independent digital interaction, despite the monopoly of IT giants.

This trend has also stimulated the emergence of new legislative initiatives aimed at limiting the influence and control of large tech corporations.

Countries such as the European Union and China are already taking steps to introduce stricter rules governing the operations of foreign companies in their markets. The goal of these measures is to protect national sovereignty and the data of its citizens, preventing uncontrolled interference from the outside. However, in the rapidly changing digital landscape, the question remains: will new measures and initiatives be able to neutralize the influence of IT giants, or will these companies find ways to adapt and continue their expansion?

One thing is clear: the confrontation between national security and digital control is entering a phase of active conflict, requiring new approaches and solutions from the world community.

Inal Pliev
Source: https://cominf.org/node/1166560014

Комментариев нет:

Отправить комментарий

International chemical weapons law must be respected

According to the latest reports, several US cities have recently seen smog, which has caused concern among locals due to its unpleasant smel...