Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure
Executive Order, May 2019 states: November 5, 2019 “...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against...
Main Authors: | , |
---|---|
Format: | Article |
Language: | en_US |
Published: |
© IEEE
2022
|
Online Access: | https://doi.org/10.1109/HST47167.2019.9032933 https://hdl.handle.net/1721.1/141740 |
_version_ | 1826206503775764480 |
---|---|
author | Choucri, Nazli Agarwal, Gaurav |
author_facet | Choucri, Nazli Agarwal, Gaurav |
author_sort | Choucri, Nazli |
collection | MIT |
description | Executive Order, May 2019 states:
November 5, 2019
“...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.” [1]
This paper focuses on the challenges of securing the long chain of global communication infrastructure, presents some illustrative data, and puts forth a multi-method research design for analysis of long-chain systems of information and/or communications technology, infrastructure, services, ownership, providers, and networks -- within a state and outside its jurisdiction – all essential for unimpeded global operations. A proof of concept for data requirements to support end-to-end integrated research is provided, along with highlights of some initial empirical analysis, with China as a case in point. |
first_indexed | 2024-09-23T13:34:01Z |
format | Article |
id | mit-1721.1/141740 |
institution | Massachusetts Institute of Technology |
language | en_US |
last_indexed | 2024-09-23T13:34:01Z |
publishDate | 2022 |
publisher | © IEEE |
record_format | dspace |
spelling | mit-1721.1/1417402022-05-05T15:19:51Z Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure Choucri, Nazli Agarwal, Gaurav Executive Order, May 2019 states: November 5, 2019 “...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.” [1] This paper focuses on the challenges of securing the long chain of global communication infrastructure, presents some illustrative data, and puts forth a multi-method research design for analysis of long-chain systems of information and/or communications technology, infrastructure, services, ownership, providers, and networks -- within a state and outside its jurisdiction – all essential for unimpeded global operations. A proof of concept for data requirements to support end-to-end integrated research is provided, along with highlights of some initial empirical analysis, with China as a case in point. This material is based on work supported by the MIT Political Science Department & U.S. Department of Defense. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the U.S. Department of Defense. 2022-04-07T15:06:53Z 2022-04-07T15:06:53Z 2019-11-05 Article https://doi.org/10.1109/HST47167.2019.9032933 https://hdl.handle.net/1721.1/141740 Choucri, N., & Agarwal, G. (2019). Securing the long-chain of cyber-physical global communication infrastructure. Proceedings of the 2019 IEEE International Symposium on Technologies for Homeland Security (HST), 1–7. en_US Attribution-NonCommercial-NoDerivs 3.0 United States http://creativecommons.org/licenses/by-nc-nd/3.0/us/ application/pdf © IEEE |
spellingShingle | Choucri, Nazli Agarwal, Gaurav Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure |
title | Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure |
title_full | Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure |
title_fullStr | Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure |
title_full_unstemmed | Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure |
title_short | Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure |
title_sort | securing the long chain of cyber physical global communication infrastructure |
url | https://doi.org/10.1109/HST47167.2019.9032933 https://hdl.handle.net/1721.1/141740 |
work_keys_str_mv | AT choucrinazli securingthelongchainofcyberphysicalglobalcommunicationinfrastructure AT agarwalgaurav securingthelongchainofcyberphysicalglobalcommunicationinfrastructure |