Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure

Executive Order, May 2019 states: November 5, 2019 “...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against...

Full description

Bibliographic Details
Main Authors: Choucri, Nazli, Agarwal, Gaurav
Format: Article
Language:en_US
Published: © IEEE 2022
Online Access:https://doi.org/10.1109/HST47167.2019.9032933
https://hdl.handle.net/1721.1/141740
_version_ 1826206503775764480
author Choucri, Nazli
Agarwal, Gaurav
author_facet Choucri, Nazli
Agarwal, Gaurav
author_sort Choucri, Nazli
collection MIT
description Executive Order, May 2019 states: November 5, 2019 “...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.” [1] This paper focuses on the challenges of securing the long chain of global communication infrastructure, presents some illustrative data, and puts forth a multi-method research design for analysis of long-chain systems of information and/or communications technology, infrastructure, services, ownership, providers, and networks -- within a state and outside its jurisdiction – all essential for unimpeded global operations. A proof of concept for data requirements to support end-to-end integrated research is provided, along with highlights of some initial empirical analysis, with China as a case in point.
first_indexed 2024-09-23T13:34:01Z
format Article
id mit-1721.1/141740
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T13:34:01Z
publishDate 2022
publisher © IEEE
record_format dspace
spelling mit-1721.1/1417402022-05-05T15:19:51Z Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure Choucri, Nazli Agarwal, Gaurav Executive Order, May 2019 states: November 5, 2019 “...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.” [1] This paper focuses on the challenges of securing the long chain of global communication infrastructure, presents some illustrative data, and puts forth a multi-method research design for analysis of long-chain systems of information and/or communications technology, infrastructure, services, ownership, providers, and networks -- within a state and outside its jurisdiction – all essential for unimpeded global operations. A proof of concept for data requirements to support end-to-end integrated research is provided, along with highlights of some initial empirical analysis, with China as a case in point. This material is based on work supported by the MIT Political Science Department & U.S. Department of Defense. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the U.S. Department of Defense. 2022-04-07T15:06:53Z 2022-04-07T15:06:53Z 2019-11-05 Article https://doi.org/10.1109/HST47167.2019.9032933 https://hdl.handle.net/1721.1/141740 Choucri, N., & Agarwal, G. (2019). Securing the long-chain of cyber-physical global communication infrastructure. Proceedings of the 2019 IEEE International Symposium on Technologies for Homeland Security (HST), 1–7. en_US Attribution-NonCommercial-NoDerivs 3.0 United States http://creativecommons.org/licenses/by-nc-nd/3.0/us/ application/pdf © IEEE
spellingShingle Choucri, Nazli
Agarwal, Gaurav
Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure
title Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure
title_full Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure
title_fullStr Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure
title_full_unstemmed Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure
title_short Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure
title_sort securing the long chain of cyber physical global communication infrastructure
url https://doi.org/10.1109/HST47167.2019.9032933
https://hdl.handle.net/1721.1/141740
work_keys_str_mv AT choucrinazli securingthelongchainofcyberphysicalglobalcommunicationinfrastructure
AT agarwalgaurav securingthelongchainofcyberphysicalglobalcommunicationinfrastructure