Cyber Security Politics 2022
DOI: 10.4324/9781003110224-8
|View full text |Cite
|
Sign up to set email alerts
|

Cyberspace in space

Abstract: This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation.Structured along two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyberspace in conflictual settings, while the second focuses on political responses by state and non-state actors in an environment defined by uncertaint… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 100 publications
0
4
0
Order By: Relevance
“…These vulnerabilities, often stemming from outdated security protocols and the utilization of commercial off-the-shelf technologies, pose significant risks as adversaries may exploit them to disrupt communication channels or manipulate data [23,24]. Notable instances, such as the 2007 cyber intrusion compromising the control systems of a commercial satellite and the 2014 cyber intrusions targeting satellite ground stations, underscore these risks vividly.…”
Section: Convergence Of Cyber and Space Security Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…These vulnerabilities, often stemming from outdated security protocols and the utilization of commercial off-the-shelf technologies, pose significant risks as adversaries may exploit them to disrupt communication channels or manipulate data [23,24]. Notable instances, such as the 2007 cyber intrusion compromising the control systems of a commercial satellite and the 2014 cyber intrusions targeting satellite ground stations, underscore these risks vividly.…”
Section: Convergence Of Cyber and Space Security Threatsmentioning
confidence: 99%
“…Other examples are demonstrated by insurgents intercepting and decoding surveillance video in Iraq in 2009 and hackers seizing control of NASA's Terra earth observing system (EOS) for extended periods in 2008 [26]. These cyber intrusions, attributed to state-sponsored actors, involved the exploitation of vulnerabilities in satellite communication systems and ground control stations, resulting in transient disruptions and the potential for graver consequences had the attacks escalated [23,27].…”
Section: Convergence Of Cyber and Space Security Threatsmentioning
confidence: 99%
“…In the subsequent chapter, Johan Eriksson and Giampiero Giacomello look at the expansion of cyber infrastructure into the atmosphere and beyond through balloons, satellites, and other bodies in space, spearheaded by private actors (Eriksson and Giacomello 2022). By using fragmentation, vulnerability, and uncertainty as central analytical concepts, the chapter focuses on what this technological change means for the threat landscape, governance, as well as power and accountability.…”
Section: Part I: the Changing Socio-technological Environment And Its...mentioning
confidence: 99%
“…However, International Relations (IR) cannot catch up with the real situation and create appropriate theories, despite the present circumstance of cyberattacks being emergent. According to Eriksson and Giacomello, very few attempts have been made to apply IR theory in analyzing this development [16][17][18]. Research that has focused particularly on aspects of the creation of information-age security threats has not been much influenced by theory or is mostly outdated [19][20][21][22].…”
Section: Cyber Threats In International Relations (Ir)mentioning
confidence: 99%