Page 30 - Focus_in_Continuity_a_Monograph
P. 30

25  Focus in Continuity: A Framework for Malaysia's Foreign
               Policy in a Post-Pandemic World - A Monograph
           Geopolitics and Cyber Engagements        interpreted to reach thresholds of force,
                                                    complicating  paradigms  for appropriate
           Technological maturity sets the tone     responses. Leaked personal information of
           for international engagements, where rules   government and military o cials may also
           and norms are at a juncture of develop-  present  risks for  identity theft,  doxing,
           ment. From international platforms, such   fraud or targeted influence campaigns.
           as the United Nations Group of
           Governmental Experts  (UN GGE)  to  UN     As cyber becomes ubiquitous, cyber
           Open-Ended Working Group (UN OEWG),      operations may exploit di erent centres of
           mini-laterals like the QUAD and safety   gravity. State-sponsored disinformation
           standards  determined  on   industrial   campaigns   can  impact   on   public
           platforms, the international community is  sentiment, which could result in paralysis
           determining means and ways to build a    for decision-making  or colour perceptions
                                                                     6
                                                                  7
           safer cyberspace.                        of an incident. Influence over public
                                                    sentiment  may not  be safeguarded  by
            However, the connection between         existing legislation and upholding values,
           technology and geopolitics could cleave   such as freedom of speech and opinion,
           technological development along the lines   may impact on a government’s  ability to
           of values which can di er in areas, such as   balance between national security and
           governance,  transparency  or   data     human rights.
           management. Governments  may prefer
           greater controls over data flows or stricter        Constructing the appropriate response
           governance on private  companies, with   is a diplomatic, strategic and security
           policies  such  as  data  localisation   challenge.  Countries  such  as  Estonia,
           requirements or back-end access for the   France, Germany, the Netherlands and UK
           purpose  of   national  security.  For   use scale and e ect to determine if a
           developing  nations,  data governance    cyberattack is comparable to kinetic
           policies may decide partnerships, allies   attacks, which would activate di erent
           and participation in supply chains as    responses. The US Executive Order 13757
           privacy and transparency policies build  allow for the imposition of sanctions on
           confidence and trust between parties.     individuals and entities determined to be
                                                    responsible for tampering, altering or
              Managing an opaque and asymmetrical   causing   the   misappropriation  of
           cyber environment means dealing with the   information with the purpose or e ect of
           challenge of threats or cyberattacks below   interfering with or undermining election
           the thresholds of force. Threats and cyber   processes or institutions. Such responses
                                                                         8
           operations may also not take familiar    are part and parcel of maintaining a
           forms addressed by states, especially for   nation’s  strategic  environment  and
           interpretations in violation of sovereignty.   autonomy  in  cyber  though  they
           For instance, security firms such as Insikt   correspond with a nation’s capability to
           Group  and FireEye  have reported cyber   investigate  such  operations   and
                            5
                4
           activities in Southeast Asia where the   international mechanisms.
           broad strategic objective  is information
           gathering in the South China Sea or the
           Belt and Road Initiative. Rampant
           information gathering may not be
   25   26   27   28   29   30   31   32   33   34   35