Cyber Security

The West Should Boost Cyber Security Assistance to Its Eastern Partners

It might be a matter of time when more advanced cyber weapons will be used by states. Providing greater support to build-up the civilian and military cyber security/defence capabilities of the Eastern partners is therefore timely and advantageous for the West. Against this background the EU should now come up with a support package for these cyber security aspects that were uncovered by NATO’s package.

Read more

Cyber Space in Estonia: Greater Security, Greater Challenges

For the last five years, Estonia has been implementing its 2008 -2013 Cyber Security Strategy. In light of the fact that the government expects to endorse a replacement document by the end of this year, it is important at this point to assess how Estonia has performed in its efforts to foster cyber security at home and globally.

Read more

Strategy and Tactics of Cyber Conflict

On 12 August, the ICDS hosted a lecture by Professor Robert Axelrod from the University of Michigan entitled “Strategy and Tactics of Cyber Conflict” and a discussion moderated by Tallinn University of Technology Associate Professor Rain Ottis.

Read more

The Tallinn Manual as an international event

The era of cyber conflicts could perhaps compared to the days when America had just been discovered and warships, pirates and buccaneers from various countries sailed into the Caribbean Sea. One of the differences with the 16th century is that one of the vessels trying to bring about order in the ‘cyber-sea’ of today is sailing under the Estonian tricolour flag – blue, black and white.

Read more

Cybersecurity in Estonia: An Interview with Emmet Tuohy

The internet’s virtual world is ever more interconnected with the real world. This is the reason that centers for the study of security also focus their attention on the threats coming from cyberspace. The process of digitizing the processes of the public administration (e-governance) is exposed to possible attacks by internet pirates, while at the same time, sharing sensitive information through the internet could jeopardize the defense of national security. This is the reason that has brought ministries of defense all over Europe to search for particular instruments and strategies aimed at preventing foreseeable attacks to military and intelligence information systems.

Read more