Latin America challenges and opportunities in cyber security in the face of the global context of cyber threats to national security and foreign policy

Authors

Abstract

This research is based on the hypothesis that the Latin American region has serious deficiencies in the development of a national cybersecurity policy and in the construction of skills to face the risks and threats from cyberspace in dimensions that affect national security and foreign policy. In this way, the research has six parts, the first one presents the theoretical approaches of neorealism, constructivism and theory of war, and shows the links between the theories of international relations, national security and cybersecurity. The second section explains the process of securitization of the Internet in the last decade of the 20th century and the first decade of the 21st century. In the third part, the global cyber threat context is presented and its comparison with the situation in Latin America. Then, it analyzes the current state of cyber capabilities in the region, based on measurements as the Global Cybersecurity Index (GCI) and the National Cyber Security Index (NSCI), in order to make a comparative analyzes between Latin America and other regions of the world. The fifth part analyzes at the individual level the efforts of the Latin American countries in developing a national cybersecurity policy and building cyber capabilities based on the reports of the Organization of American States (OAS) and the Inter-American Development Bank (IDB), and it also analyzes with the indicators of the NCSI methodology. Finally, some brief conclusions are presented in which the areas of opportunity and improvement for the Latin American region in the construction of a cybersecurity policy and construction of cyber capabilities are highlighted.

Keywords:

Cybersecurity, National Security, Foreign Policy, Cyber Power

Author Biography

Juan Manuel Aguilar Antonio, Universidad Nacional Autonoma de México

Candidato a Doctor por la Facultad de Ciencias Políticas y Sociales de la Universidad Nacional Autónoma de México (UNAM). Egresado del curso Desarrollo de Políticas Cibernéticas del Centro William J. Perry (2019). Investigador del Colectivo de Análisis de Seguridad con Democracia (CASEDE AC) en México.

References

Aguilar-Antonio, J.M. (2019). Hechos ciberfísicos: una propuesta de análisis para ciberamenazas en las Estrategias Nacionales de Ciberseguridad. URVIO. Revista Latinoamericana de Estudios de Seguridad, (25), pp. 24-40.

Benítez, R. (1986). El pensamiento militar de Clausewitz. Revista Mexicana de Ciencias Políticas y Sociales, 126, pp. 97-123.

CCDCOE Tallin (2020). Strategy and Governance. Cooperative Cyber Defence Centre of Excellence, Recuperado de: https://bit.ly/37I0jrm

Choucri, N.; Madrick, S., y Ferwerda, J. (2013). Institutional Foundations for Cyber Security: Current Responses and New Challenges. MIT. Massachusetts, EUA, 27 pág.

Cybersecurity Ventures (2016). Cybercrime To Cost The World $10.5 Trillion Annually By 2025. Recuperado el 12 de enero de 2020 de: https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/

Deibert, R. & Rohozinski, R. (2010). Beyond Denial: Introducing Next Generation Information Access Controls, en Deibert, R.; Palfrey, J.; Rohozinski, R. & Zittrain, J. (eds.) Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. MIT Press: Cambridge, pp. 3-13.

Digital Attack Map (2021). Recuperado el 12 de enero de 2021de: https://www.digitalattackmap.com/

Edmunds, T. (2014). Complexity, strategy and the national interest. International Affairs 90(3), pp. 525-539

Firdous, M. (2020). Cyber Warfare and Global Power Politics. CISS Insight Journal, 8(1), pp. 71-93.

GCI (2018). Global Cybersecurity Index. International Telecommunication Union. Recuperado el 12 de enero de 2021 de: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf

Gray, C. & Sloan, G. (1999). Geopolitics, Geography and Strategy. Routledge Taylor & Francis Group, Oxfordshire: United Kingdom, 298 pág.

Hackmageddon (2020). Cyber Attacks Statistics. Recuperado el 12 de enero de 2020: https://www.hackmageddon.com/category/security/cyber-attacks-statistics/

Hughes, R. (2010). A treaty for cyberspace. International Affairs, 86(2), pp. 523-541.

Kapersky (2020). Kaspersky Lab registra un alza de 60% en ataques cibernéticos en América Latina. Recuperado el 12 de enero de 2020: https://latam.kaspersky.com/blog/empresas-principal-objetivo-de-ciberataques-en-america-latina/20209/

Kello, L. (2017). The virtual weapon and international order. Reino Unido: Yale University Press, 320 pág.

Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security, 38(2), pp. 7-40.

Klimburg, A. (2012.). National Cyber Security Framework Manual. Tallinn; Estonia: NATO CCD COE Publication.

Kuehl, D.T. (2009). From Cyberspace to Cyberpower: Defining the Problem”, en Kramer, F.; Starr, S.; Wentz, L. Cyberpower and National Security. Washington D.C.: National Defense University Press, pp. 25-42.

Martín, P. (2015). Inseguridad cibernética en América Latina: Líneas de reflexión para la evaluación de riesgos. Instituto Español de Estudios Estratégicos, 8.

Moreno; J.; Albornoz, M., y Maqueo, M. (2020). Ciberseguridad en América Latina. Revista de Administración Pública INAP. Ciberseguridad Nacional; 148 (1): pp.23-46.

NCSI (2019). National Cyber Security Index. E-Governance Academy, Recuperado el 12 de enero de 2021 de: https://ega.ee/wp-content/uploads/2018/05/ncsi_digital_smaller.pdf

Newmeyer, P. (2015). Elements of national cybersecurity strategy for developing nations. National Cybersecurity Institute Journal; 1(3): pp. 9-19.

Nye, J. (2014). The regime complex for managing global cyber activities. Belfer Center for Science and International Affairs, John F. Kennedy School of Government, Harvard University, 32 pág.

Nye, J. (2010). Cyber power. Harvard University, Cambridge MA Belfer Center for Science and International Affairs.

OEA & BID (2020). Reporte Ciberseguridad 2020: riesgos, avances y el camino a seguir en América Latina y el Caribe. 204 pag. Recuperado el 12 enero de 2021 de: https://publications.iadb.org/es/reporte-ciberseguridad-2020-riesgos-avances-y-el-camino-a-seguir-en-america-latina-y-el-caribe

OEA (2018). Estado de la Ciberseguridad en el Sector Bancario en América Latina y el Caribe. 186 pág. Recuperado el 12 de enero de 2021 de: https://www.oas.org/es/sms/cicte/sectorbancariospa.pdf

OEA & BID (2016). Ciberseguridad: ¿Estamos preparados en América Latina y el Caribe? 193 pág. Recuperado el 12 enero de 2021 de: https://publications.iadb.org/es/publicacion/17071/ciberseguridad-estamos-preparados-en-america-latina-y-el-caribe

OEA/Symantec (2014). Tendencias de Seguridad Cibernética en América Latina y el Caribe. 100 págs. Recuperado el 12 de enero de 2021 de: https://www.sites.oas.org/cyber/Es/Paginas/default.aspx

Palfrey, J. (2010). Four Phases of Internet Regulation. Social Research, 77(3): pp. 981-996.

Samaan, J. (2010). Cyber command: The rift in US military cyber-strategy. The RUSI Journal, 155(6): pp. 16-21.

Sheldon, J. (2012). “Deciphering Cyberpower: Strategic Purpose in Peace and War.” Strategic Studies Quarterly, vol. 5, no. 2, 2011, pp. 95–112.

Sicherheitstacho (SF). Overview of Current Cyber Attacks. Deutsche Telekom. Recuperado el 12 de enero de 2021 de: https://www.sicherheitstacho.eu/start/main

Singer, P. y Friedman, A. (2014). Cyber Security and Cyber War. Oxford, Reino Unido: Oxford University Press, 321 págs.

Stanković, N. (2019). The conceptual analysis of identities and interests in the thought of Alexander Wendt. Politeia, 9(18), pp. 37-154.

Starr, S.H. (2009). Toward a preliminary theory of cyberpower, en Kramer, F.; Starr, S. & Wentz, L. Cyberpower and National Security. Washington D.C.: National Defense University Press, pp. 43-88.

Take, I. (2012). Regulating the Internet infrastructure: A comparative appraisal of the legitimacy of ICANN, ITU, and the WSIS. Regulation & Governance, 6(4): pp. 499-523.

Van Creveld, M. (2002). The transformation of war revisited. Small Wars and Insurgencies, 13(2), pp. 3-15.

Van Creveld, M. (1991). The transformation of war: the most radical reinterpretation of armed conflict since Clausewitz. Washington D.C.: Free Press, 254 pág.

Wendt, A. (1994). Collective identity formation and the international state. American Political Science Review, pp. 384-396.

Zittrain, J. & Palfrey, J. (2007). Access denied: the practice and policy of global Internet filtering. United Kingdom: Oxford Internet Institute, 80 pág.