⚠ Threat Level: Critical · Global Edition 2026

Cyberwarfare & Digital
Sovereignty State Hacking · Infrastructure Attacks · Data Sovereignty · Open-Source Geopolitics

The battlefield has no borders, no uniforms, and no rules anyone agrees on. From Stuxnet to Salt Typhoon — the definitive study guide for the world’s most consequential security domain.

EU NIS2 / ENISA Sciences Po Oxford PPE Cambridge HSPS LSE IR ETH Zürich US CISA / CYBERCOM Johns Hopkins SAIS Harvard Kennedy Georgetown Security GRE Pol. Sci. AP Gov’t UPSC CSE/IFS UGC-NET BPSC · MPPSC
© IASNOVA.COM
01 // DEFINITIONS

Cyberwarfare: Definitions & the Legal Grey Zone

© IASNOVA.COM

There is no universally agreed legal definition of “cyberwarfare.” This ambiguity is not accidental — states preserve definitional flexibility to conduct cyber operations below the threshold of acknowledged warfare, denying adversaries clear legal grounds to respond. Understanding this definitional landscape is itself a strategic and exam-critical competency.

🎯 Core Framework — Oxford PPE · Sciences Po · Johns Hopkins SAIS · GRE
Four-tier taxonomy for all cyber operations — use this to structure any essay answer: (1) Cyber espionage — theft of information; legal under international law (states have long spied on each other); (2) Cyber sabotage — disrupting or destroying systems without triggering “armed attack” threshold (Stuxnet grey zone); (3) Cyber coercion — threatening attacks to compel political concessions; (4) Cyberwarfare — attacks causing kinetic-equivalent destruction triggering Article 51 self-defence rights. Most real-world state operations operate in tiers 1–2, where legal frameworks are absent or contested.
CYBER OPERATIONS TAXONOMY — LEGAL THRESHOLD SPECTRUM TIER 1: ESPIONAGE Legal status Permitted under intl. law (no prohibition on spying) Examples • OPM breach (China, 2015) • NSA PRISM programme • SVR US gov’t email theft Response options Diplomatic protest, sanctions, expulsions TIER 2: SABOTAGE Legal status Grey zone — may violate sovereignty; below “armed attack” Examples • Stuxnet (US-Israel, Iran) • Ukraine power grid (Russia) • NotPetya (Russia, 2017) Response options Proportionate countermeasures, targeted sanctions TIER 3: COERCION Legal status Threatens force — may trigger UN Charter Art. 2(4) violations Examples • Ransomware extortion of govts • Pre-invasion cyber escalation • Election interference threats Response options Collective measures; potential Art. 51 anticipatory self-defence TIER 4: WARFARE Legal status “Armed attack” — triggers Art. 51 UN Charter self-defence Threshold Effects equivalent to kinetic attack: death, destruction, critical infrastructure collapse Response options Self-defence (cyber OR kinetic); collective defence (NATO Art. 5) ← LEGAL RESPONSE OPTIONS ESCALATE → ARMED ATTACK THRESHOLD →
Figure 1 — Cyber Operations Taxonomy: Four-Tier Legal Threshold Spectrum | © IASNOVA.COM

Key Legal Instruments & Concepts

Tallinn Manual (2013/2017)

NATO CCDCOE expert study on international law applicable to cyber operations. Non-binding. Tallinn 1.0: cyber warfare. Tallinn 2.0: peacetime operations. Conclusion: existing international law applies — no legal vacuum. Key rule: states bear responsibility for cyber ops they authorise or knowingly allow from their territory.

Attribution Problem

Proving state responsibility for cyberattacks to the standard required for self-defence or countermeasures is politically and technically difficult. Proxies, false flag operations, and obfuscation mean attribution is usually probabilistic, not certain. Most Western governments use “high confidence” attribution — less than legal proof. Russia and China routinely deny all attributions.

Sovereignty Norm

Tallinn 2.0 concluded sovereignty is a binding rule (not merely a principle) of international law — meaning certain cyber operations below the use-of-force threshold still violate sovereignty. But states disagree: the US and UK reject sovereignty as a standalone binding rule in cyber, preferring case-by-case analysis. This disagreement shapes all state cyber policy.

NATO Article 5 & Cyber

NATO declared in 2016 that cyberspace is an operational domain (alongside land, sea, air, and space) and that a cyberattack could trigger Article 5 collective defence. In 2021, allies collectively attributed the SolarWinds attack to Russia — but did not invoke Article 5. The threshold for collective cyber response remains deliberately ambiguous.

© IASNOVA.COM
02 // THREAT ACTORS

APT Groups: The State Hacking Dossier

© IASNOVA.COM

Advanced Persistent Threats (APTs) are sophisticated, state-sponsored or state-directed hacking groups that conduct long-term, targeted cyber intrusions. They are persistent — maintaining access to networks for months or years — and advanced, using zero-day exploits, custom malware, and supply-chain compromises. APT designations are assigned by cybersecurity firms (Mandiant, CrowdStrike, Microsoft) and Western intelligence agencies.

// THREAT INTELLIGENCE BRIEFING — CLASSIFIED: TOP SECRET//SI//NOFORN // DISTRIBUTION: FVEY PARTNERS ONLY SUBJECT: State-sponsored APT group activity — 2026 threat assessment SOURCE: SIGINT, HUMINT, open source, partner reporting NOTE: All attributions are “high confidence” assessments; not legal proof
APT Name / Alias State Sponsor Intelligence Service Primary Mission Signature Operations
APT28 / Fancy Bear / Forest Blizzard 🇷🇺 Russia GRU (Military Intelligence) Unit 26165 Political espionage, election interference, military intelligence DNC hack (2016), WADA anti-doping data leak, macron campaign (France 2017), German Bundestag (2015), NATO systems
APT29 / Cozy Bear / Midnight Blizzard 🇷🇺 Russia SVR (Foreign Intelligence Service) Strategic intelligence gathering; government and think tank infiltration SolarWinds/SUNBURST (2020) — most sophisticated supply chain attack in history; Microsoft email breach (2024); Democratic Party
Sandworm / Voodoo Bear 🇷🇺 Russia GRU Unit 74455 Critical infrastructure destruction; cyberwarfare NotPetya (2017) — $10B+ global damage; Ukraine power grid blackouts (2015, 2016); 2018 Winter Olympics attack
APT41 / Winnti / Wicked Panda 🇨🇳 China MSS (Ministry of State Security) Dual-mission: espionage + financial crime; IP theft Supply chain attacks on software companies; COVID-19 vaccine research theft (2020); video game company breaches for financial gain
Volt Typhoon 🇨🇳 China PLA / MSS Pre-position in US critical infrastructure for crisis disruption Persistent access to US water, power, transport systems (discovered 2023); “living off the land” — uses existing tools to avoid detection; targeting Pacific US military logistics
Salt Typhoon 🇨🇳 China PRC intelligence services Telecom infrastructure penetration; surveillance of US persons AT&T, Verizon, T-Mobile wiretap systems (2024); accessed CALEA wiretap infrastructure; targeted Trump/Harris campaign communications
Lazarus Group / HIDDEN COBRA 🇰🇵 North Korea RGB (Reconnaissance General Bureau) Financial theft for sanctions evasion; espionage; disruption Sony Pictures hack (2014); Bangladesh Bank theft $81M (2016); WannaCry ransomware (2017); ~$3B cryptocurrency theft (2016–2023)
APT33 / Elfin / Refined Kitten 🇮🇷 Iran IRGC (Islamic Revolutionary Guard Corps) Espionage; destructive attacks on regional adversaries; critical infrastructure Shamoon attacks on Saudi Aramco (2012, 35,000 PCs destroyed); aviation and energy sector espionage; Israeli cyber infrastructure targeting
🧠 Mnemonic — Key APT Attribution by Nation
R · C · N · I
Russia: APT28 (GRU/election interference), APT29 (SVR/SolarWinds), Sandworm (GRU/NotPetya destructive) · China: APT41 (dual espionage/crime), Volt Typhoon (infrastructure pre-positioning), Salt Typhoon (telecom wiretap) · North Korea: Lazarus (financial theft, WannaCry, Sony) · Iran: APT33/Elfin (destructive Shamoon, Saudi Aramco)
© IASNOVA.COM
03 // INCIDENT LOG

Major State-Sponsored Cyberattacks: The Definitive Timeline

© IASNOVA.COM
2007 · ESTONIA
First State-Level Cyberattack on a Nation. Russia-linked DDoS attacks paralysed Estonia’s parliament, banks, media, and government websites for three weeks — following Estonia’s removal of a Soviet war memorial. First time a nation experienced coordinated cyber disruption at national scale. Led directly to NATO establishing CCDCOE in Tallinn (2008).
2010 · STUXNET
The First Cyberweapon Causing Physical Destruction. US (NSA/CIA) and Israel (Unit 8200) jointly deployed Stuxnet to destroy ~1,000 Iranian nuclear centrifuges at Natanz by making them spin at damaging speeds while reporting normal operation. Used 4 zero-day exploits — unprecedented sophistication. First confirmed cyberweapon crossing into kinetic sabotage. Delayed Iran’s nuclear programme ~2 years.
2013 · SNOWDEN / PRISM
NSA Mass Surveillance Revealed. Edward Snowden reveals PRISM (NSA accesses data from Google, Apple, Facebook), XKeyscore, and GCHQ-NSA intelligence sharing. Revelation that US tapped Angela Merkel’s personal phone. Triggers EU privacy revolution — directly leads to GDPR (2018) and EU digital sovereignty agenda. European citizens and governments fundamentally lose trust in US tech platforms.
2015–16 · UKRAINE POWER GRID
First Cyberattack to Cause Power Outages. Russia’s Sandworm group uses BlackEnergy malware to cut power to 230,000 Ukrainian civilians (Dec 2015) and to Kyiv (Dec 2016). Demonstrates cyberattacks can cause physical harm to civilian populations — crossing IHL (International Humanitarian Law) thresholds. Template for hybrid warfare: cyber attacks accompany or precede military action.
2016 · DNC HACK / ELECTION INTERFERENCE
Russia Interferes in US Presidential Election. APT28 (GRU) hacks Democratic National Committee and John Podesta emails; WikiLeaks publishes them. APT29 (SVR) also penetrates DNC. IRA (Internet Research Agency) conducts social media influence operations. Mueller investigation confirms Russian interference. No prior state had conducted such a comprehensive influence operation against a Western election — sets precedent for election interference as standard geopolitical tool.
2017 · NOTPETYA
Most Economically Destructive Cyberattack in History. Russia’s Sandworm disguises cyberweapon as ransomware, initially targeting Ukraine. Spreads globally via M.E.Doc Ukrainian accounting software. Damages: Maersk (shipping, $300M); Merck pharmaceutical ($870M); FedEx/TNT ($400M); Mondelez; Reckitt Benckiser. Total: $10B+. US, UK, EU, Australia formally attribute to Russia’s GRU. White House calls it “most destructive and costly cyberattack in history.”
Dec 2020 · SOLARWINDS / SUNBURST
Most Sophisticated Supply Chain Attack. Russia’s APT29 (SVR) compromises SolarWinds Orion IT monitoring software update — used by 18,000 organisations. Attacker gains access to US Treasury, State, Commerce, Homeland Security, parts of Pentagon. Microsoft, FireEye, Intel penetrated. Dwell time: 9+ months before discovery. US formally attributes to SVR. Biden imposes sanctions on Russia. Demonstrates supply chain as primary attack vector for strategic intelligence access.
May 2021 · COLONIAL PIPELINE
Ransomware Shuts Down US Critical Infrastructure. DarkSide (Russia-linked cybercriminal group) encrypts Colonial Pipeline’s business systems, causing the company to shut down its pipeline carrying 45% of US East Coast fuel. Fuel shortages, panic buying, Biden declares national emergency. Colonial pays $4.4M ransom (partly recovered). Demonstrates ransomware as critical infrastructure threat — forces all OECD governments to reclassify ransomware as a national security issue.
Feb 2022 · VIASAT / UKRAINE INVASION
Cyber Precedes Military. Russia wipes ViaSat KA-SAT satellite modems across Ukraine one hour before tanks roll in — knocking out military communications. Collateral impact: 5,800 Enercon wind turbines in Germany lose remote monitoring. Demonstrates cyber operations as combined-arms warfare component. Ukraine’s digital resilience (cloud migration, Starlink backup) surprises analysts — first nation to successfully defend at scale in a cyberwar.
2024 · SALT TYPHOON
China Penetrates US Wiretap Infrastructure. PRC intelligence (Salt Typhoon) penetrates AT&T, Verizon, T-Mobile, and Lumen — accessing CALEA wiretap systems that US law enforcement uses for court-ordered intercepts. Potentially accessed communications of senior US officials and political campaigns. CISA Director calls it “worst telecom hack in US history.” Demonstrates China’s long-term pre-positioning in US communications infrastructure.
© IASNOVA.COM
04 // CRITICAL INFRASTRUCTURE

Critical Infrastructure Attacks: Sectors, Vectors & Consequences

© IASNOVA.COM
$10B+
NotPetya Global Damages (2017)
16
Critical Infrastructure Sectors (US CISA)
71%
Critical Infrastructure Incidents Target OT/ICS
$4.4M
Colonial Pipeline Ransom Paid
9 mo.
SolarWinds Dwell Time Before Discovery
$8T
Estimated Global Cybercrime Cost 2023 (est.)
CRITICAL INFRASTRUCTURE: SECTORS, ATTACK VECTORS & CASE EXAMPLES ⚡ ENERGY (POWER, OIL & GAS, WATER) Vector: SCADA/ICS systems; spear-phishing operators; firmware implants Cases: Ukraine power grid (Sandworm 2015-16); Colonial Pipeline (DarkSide 2021); Oldsmar Florida water treatment (2021 — attacker raised NaOH to lethal levels, caught in time) Impact: Physical harm, civilian casualties, economic disruption, political crisis 📡 TELECOMMUNICATIONS & INTERNET Vector: BGP hijacking; SS7 protocol exploitation; wiretap system access; submarine cable Cases: Salt Typhoon — AT&T/Verizon CALEA wiretap access (China, 2024); VoIP Juniper networks (NSA backdoor, 2015); BGP hijacking of Google/AWS traffic (Russia) Impact: Surveillance of government communications; law enforcement compromise 🏦 FINANCIAL SYSTEMS & BANKING Vector: SWIFT messaging exploitation; destructive malware on bank networks Cases: Bangladesh Bank $81M theft via SWIFT (Lazarus/DPRK, 2016); Cosmos Bank India $13.5M (2018); NYSE-listed companies targeted by APT10; Iran Shamoon against Saudi banks Impact: Sanctions evasion (DPRK); market manipulation; financial system trust erosion 🏛️ GOVERNMENT & DEFENCE NETWORKS Vector: Supply chain (SolarWinds); VPN vulnerabilities; spear-phishing senior officials Cases: SolarWinds — US Treasury/State/DHS (APT29, 2020); OPM — 21M security clearances stolen (APT10/China, 2015); Bundestag hack (APT28/Russia, 2015) Impact: Intelligence windfall; covert agent exposure; policy advantage 🏥 HEALTHCARE & BIOMEDICAL Vector: Ransomware on hospital networks; COVID vaccine research theft; medical device exploits Cases: WannaCry — UK NHS paralysed (Lazarus/DPRK, 2017); COVID vaccine research theft (Russia/China, 2020); Change Healthcare ransomware ($22M ransom, 2024) Impact: Patient deaths (confirmed in Germany); IP theft; pandemic response compromised 🗳️ ELECTIONS & DEMOCRATIC INFRASTRUCTURE Vector: Voter registration databases; social media manipulation; candidate email hacks Cases: US 2016 — DNC/Podesta (APT28/Russia); Macron 2017 — document dump (APT28); Germany 2017 Bundestag data; France 2022 municipal election interference (Russia) Impact: Electoral outcome influence; democratic legitimacy erosion; polarisation © IASNOVA.COM — Critical Infrastructure Sectors: Attack Vectors & Case Examples
Figure 2 — Critical Infrastructure: Sectors, Vectors & Notable Attack Cases | © IASNOVA.COM
⚠️ Volt Typhoon — The Pre-Positioning Doctrine (Critical for 2026 Exams)
Volt Typhoon (discovered 2023, active since ~2021) represents a new and alarming Chinese cyber doctrine: not espionage, not financial theft — pure pre-positioning. China has embedded persistent access into US water utilities, power grids, oil pipelines, and transportation networks — not to activate now, but to be able to disrupt US logistics and civilian systems in the event of a Taiwan crisis. CISA Director Jen Easterly called it “the defining threat of our generation.” It is the cyber equivalent of placing land mines in an adversary’s territory during peacetime.
© IASNOVA.COM
05 // RANSOMWARE

Ransomware as Geopolitical Weapon

© IASNOVA.COM

Ransomware has evolved from criminal extortion into a geopolitical instrument. State-tolerant ransomware groups operate from Russia and North Korea with implicit or explicit state approval — conducting attacks that weaken adversaries while maintaining plausible deniability. The key strategic insight: ransomware-as-a-service (RaaS) allows states to weaponise criminal infrastructure without formal attribution.

GroupState ConnectionMajor AttackRansom / DamageGeopolitical Dimension
DarkSide → BlackMatter Russia-tolerated (RaaS) Colonial Pipeline (May 2021) $4.4M paid; $4.5B US fuel supply disrupted Russia did not extradite operators despite US requests; group “disbanded” after White House pressure but reformed as BlackMatter
REvil / Sodinokibi Russia-tolerated; possible FSB links Kaseya VSA (July 2021) — 1,500 businesses; JBS Foods ($11M ransom) $11M (JBS); Kaseya ~$70M demanded Russia arrested 14 REvil members Jan 2022 (right before Ukraine invasion — possible bargaining chip); released post-invasion
Cl0p Russia-linked, financially motivated MOVEit file transfer (May-June 2023) — 2,700+ organisations including US federal agencies, BBC, BA, Shell ~$100M+ extorted; reputational damage to hundreds of governments UK, Germany, Canada, US all affected. Demonstrates supply-chain ransomware as mass-compromise tool without targeted hacking.
Lazarus Group North Korea (state-directed) WannaCry (May 2017) — 200,000+ victims, 150 countries; NHS UK paralysed ~$4B total cryptocurrency theft (2016–2024) Ransomware for state revenue — DPRK uses cryptocurrency theft to fund nuclear/missile programme; directly sanctions-evading. UN Panel estimates $3B stolen 2016–2023.
ALPHV / BlackCat Russia-linked criminal RaaS Change Healthcare (Feb 2024) — largest US healthcare breach; MGM Resorts; Reddit $22M paid; $1.5B+ losses to US healthcare system FBI disrupted ALPHV in Dec 2023 (seized servers); group relaunched immediately. Demonstrates limits of law enforcement against state-tolerant groups.
💡 Policy Innovation — US Ransomware Counter-Strategy
Biden’s ransomware response strategy (2021–24) established several precedents: (1) Counter Ransomware Initiative (CRI) — 50-nation coalition sharing intelligence and refusing to pay ransoms as government entities; (2) Cryptocurrency tracing — DoJ recovered $2.3M of Colonial Pipeline ransom via blockchain analysis; (3) Offensive cyber operations against ransomware infrastructure (FBI seized REvil servers, ALPHV servers); (4) Sanctions on cryptocurrency exchanges used for ransomware payments (Suex, Chatex). The US has moved from viewing ransomware as a law enforcement issue to a national security one requiring military-grade responses.
© IASNOVA.COM
06 // ADVERSARY DOCTRINE

China & Russia: Cyber Doctrine Compared

© IASNOVA.COM
RUSSIA vs CHINA — CYBER DOCTRINE COMPARISON 🇷🇺 RUSSIA — CHAOS & DISRUPTION DOCTRINE Strategic Philosophy “Information warfare” (informatsionnaya voyna) — cyber is one component of broader influence/disruption strategy. Goal: erode Western cohesion, democratic institutions, and alliance trust. Preferred Tactics • Destructive malware (NotPetya, BlackEnergy) — cause maximum chaos • Election interference (hack-and-leak: DNC, Macron, Bundestag) • Disinformation amplification via social media (IRA “troll factory”) • Critical infrastructure pre-positioning (Ukraine power grid model) • Criminal proxy tolerance (DarkSide, REvil) for plausible deniability Organisational Structure GRU Units 26165 (APT28) and 74455 (Sandworm) — military cyber SVR (APT29) — intelligence cyber; FSB — domestic and some foreign Assessment Russia: most aggressive and reckless; accepts collateral damage (NotPetya hit Russian companies too). Prioritises disruption over precision. Ukraine war: cyber underperformed — Ukrainian resilience and cloud migration limited Russian cyberwar effectiveness. Key insight: Russia uses cyber as a complement to kinetic force, not a substitute 🇨🇳 CHINA — PATIENT ACCUMULATION DOCTRINE Strategic Philosophy “Informatised warfare” — cyber for intelligence advantage and strategic pre-positioning. Driven by the “Thousand Talents” and technology acquisition strategy. Focused on long-term advantage rather than immediate disruption. “Winning without fighting.” Preferred Tactics • Long-duration espionage (IP theft, trade secrets, R&D data) • Personnel data collection (OPM — map US intelligence network) • Infrastructure pre-positioning (Volt Typhoon — activate in crisis) • Telecom wiretap access (Salt Typhoon — monitor US govt comms) • “Living off the land” — use legitimate tools to evade detection Organisational Structure PLA Strategic Support Force (PLASSF) — cyber, space, EW unified MSS (Ministry of State Security) — civilian intelligence; contracts private hackers (APT41 dual-mission model) Assessment China: most sophisticated and voluminous; plays long game. Scale of IP theft — US estimates $600B/year — is the greatest wealth transfer in history. Taiwan crisis would activate Volt Typhoon. Key insight: China uses cyber for strategic accumulation and crisis preparation, not daily disruption © IASNOVA.COM — Russia vs China Cyber Doctrine Comparison
Figure 3 — Russia vs China: Cyber Doctrine Comparative Analysis | © IASNOVA.COM
© IASNOVA.COM
07 // EU STRATEGY

EU Digital Sovereignty: From GDPR to the Cyber Solidarity Act

© IASNOVA.COM
“Europe needs to be able to act autonomously and based on its own values in the digital age. Digital sovereignty does not mean isolation — it means Europe’s right to make its own choices.” — Ursula von der Leyen, President of the European Commission · State of the Union Address, 2020
EU DIGITAL SOVEREIGNTY POLICY STACK — LAYER BY LAYER FOUNDATION REGULATION SECURITY GDPR (2018) General Data Protection Regulation • Extra-territorial scope (Brussels Effect) • Fines: up to 4% global turnover or €20M Status: Global gold standard for privacy DSA + DMA (2022-23) Digital Services Act + Digital Markets Act • DSA: Platform content moderation obligations • DMA: Gatekeeper rules (Big Tech interoperability) Status: First real regulation of US platforms EU AI ACT (2024) First binding AI regulation globally • Risk pyramid: Unacceptable/High/Limited/Minimal • GPAI (frontier models) obligations from 2025 Status: “Brussels Effect” on AI governance global NIS2 DIRECTIVE (2022) Network & Information Security 2 • 18 sectors; ~160,000 entities • 24hr initial / 72hr full incident reporting • CEO personal liability for cyber failures Oct 2024 transposition deadline CYBER SOLIDARITY ACT (2024) EU’s mutual aid for major cyber incidents • European Cyber Shield (SOC network) • Emergency cyber reserve (private sector) • Cross-border incident response coordination €1.1B budget; ENISA strengthened EU CHIPS ACT + DATA ACTS Hardware sovereignty + data governance • Chips Act: €43B; 20% global chip share by 2030 • Data Act (2023): Data access rights framework • Data Governance Act: Data intermediaries GAIA-X: European cloud infrastructure vision ENISA EU Agency for Cybersecurity • Annual Threat Landscape report • EU Cybersecurity Certification Framework • Technical support to member states HQ: Heraklion + Athens, Greece CyCLONe + CSIRT NETWORK EU crisis coordination structures • CyCLONe: Cyber Crisis Liaison Network • Links national CERTs/CSIRTs • Cross-border incident management Activated for major EU-wide incidents EU CYBER DIPLOMACY TOOLBOX Attribution & sanctions framework • First EU cyber sanctions (2020): Russia, China, DPRK, NK • Coordinated EU attributions with NATO/Five Eyes • Diplomatic response to state-sponsored attacks Unique: EU can sanction cyber actors independently © IASNOVA.COM — EU Digital Sovereignty Policy Stack
Figure 4 — EU Digital Sovereignty: The Complete Policy Stack | © IASNOVA.COM
🎯 European Policy Audience — Key Concept: “Brussels Effect”
The Brussels Effect (Anu Bradford, Columbia Law School) describes the EU’s unique ability to unilaterally regulate global markets. GDPR became the de facto global privacy standard because every multinational prefers one global compliance standard over multiple national ones — and EU market access requires GDPR compliance. The EU is now applying this model to AI (AI Act), digital markets (DMA), and cybersecurity (NIS2). The Brussels Effect means the EU, despite having no dominant tech companies of its own, effectively sets global technology governance norms.
© IASNOVA.COM
08 // US ARCHITECTURE

US Cyber Architecture: CISA, CYBERCOM & the Five Eyes

© IASNOVA.COM
OrganisationMissionKey Authorities / ToolsRecent Highlights
CISA
Cybersecurity & Infrastructure Security Agency
Defend civilian federal networks; protect critical infrastructure; coordinate national cyber defence Binding Operational Directives (BODs) for federal agencies; Shields Up warnings; free cybersecurity services to critical infrastructure Led SolarWinds federal response (2020); managed Colonial Pipeline response (2021); issued 2024 Salt Typhoon warning to telecoms; Joint Cyber Defense Collaborative (JCDC) with private sector
US Cyber Command
USCYBERCOM (Fort Meade)
Military cyber operations: defend DOD networks; conduct offensive cyber operations; deter adversaries “Defend forward” doctrine — operations in adversary networks before attacks; cyber mission forces (133 teams); USCYBERCOM-NSA dual-hatted commander “Hunt forward” operations in Ukraine (pre-2022 war); disrupted REvil ransomware infrastructure (2021); operations against ISIS propaganda networks; support to NATO allies
NSA
National Security Agency
SIGINT collection; cryptology; cryptographic standards; defensive cybersecurity advisory Global signals intelligence collection; PRISM (discontinued after Snowden); CSS (Central Security Service); publicly releases CVE advisories Post-Snowden reforms; releases annual Top Exploited Vulnerabilities (with CISA/FBI/GCHQ); Cybersecurity Directorate advises critical infrastructure; works with GCHQ/Five Eyes on attribution
FBI Cyber Division Criminal cyber investigation; ransomware disruption; liaison with private sector victims Grand jury subpoenas; international law enforcement coordination; cryptocurrency tracing; LockBit/REvil/ALPHV infrastructure seizures Recovered $2.3M Colonial Pipeline ransom (2021); seized REvil servers (2021); ALPHV/BlackCat disruption (Dec 2023); indictments of Russian/Chinese/Iranian/DPRK hackers
Five Eyes (FVEY) SIGINT-sharing alliance: US, UK (GCHQ), Canada (CSE), Australia (ASD), New Zealand (GCSB) Shared signals intelligence; joint cyber threat attribution; combined advisories; intelligence fusion centres Joint attribution of SolarWinds (all 5), Volt Typhoon, Salt Typhoon; annual “Top Exploited Vulnerabilities” joint advisory; expanding to include Japan, South Korea, India in advisory work
✅ “Defend Forward” Doctrine — Key US Policy Innovation
Established in US Cyber Command’s 2018 vision and codified in the 2018 DoD Cyber Strategy, “Defend Forward” means actively operating in adversary networks to observe, counter, and disrupt malicious cyber activity before it reaches US systems. Rather than waiting passively for attacks, CYBERCOM deploys “hunt forward” teams to partner nations’ networks (Lithuania, Ukraine, Montenegro, Croatia, Estonia, others) to find malware and share intelligence. Ukraine’s cybersecurity resilience in 2022 was partly attributed to NSA/CYBERCOM pre-war “hunt forward” operations that identified Russian implants and tactics.
© IASNOVA.COM
09 // OPEN SOURCE

Open-Source as Geopolitical Infrastructure

© IASNOVA.COM

Open-source software (OSS) underpins virtually all modern digital infrastructure — yet it is largely maintained by unpaid volunteers with minimal security review. This creates a paradox: the world’s most critical digital infrastructure is simultaneously its most democratic and its most fragile. Geopolitical actors have recognised this fragility as an attack surface.

The XZ Utils Backdoor (2024)

A software engineer operating under a false identity (“Jia Tan”) spent two years contributing to the XZ Utils compression library — building trust in the open-source community. In March 2024, he introduced a backdoor in versions 5.6.0–5.6.1 that would have allowed remote code execution on millions of Linux servers globally. Discovered by a Microsoft engineer almost by accident. Widely attributed to a state intelligence operation. Represents the most sophisticated known open-source supply chain attack.

Log4Shell (CVE-2021-44228)

A critical vulnerability in Log4j — a ubiquitous Java logging library used by millions of applications — was discovered December 2021. The Apache Foundation library is maintained by volunteers. The vulnerability allowed remote code execution on virtually any system using Log4j. NSA, CISA, and cybersecurity agencies called it one of the most serious vulnerabilities ever discovered. Patch deployment took months across global infrastructure.

Open-Source as Soft Power

The US dominates global open-source infrastructure: GitHub (Microsoft), npm (JavaScript packages), PyPI (Python), Linux Foundation contributors. A US export control or sanctions regime that restricted access to US-hosted open-source repositories would be catastrophic for global development — giving the US economic leverage it rarely exercises but holds in reserve. China is actively building domestic alternatives (Gitee) to reduce this dependency.

Sovereign Technology Funds

Germany’s Sovereign Tech Fund (€54M, 2022) invests in critical open-source infrastructure maintenance. France’s ANSSI mandates open-source for some government applications. The EU’s “Public Money, Public Code” principle — software funded by public money should be open-source. These are early-stage attempts to treat open-source as public infrastructure requiring public investment, not private charity.

OSS & Export Controls

The US Export Administration Regulations (EAR) have historically exempted publicly available open-source from export controls. But as quantum computing, AI, and cryptographic open-source tools become dual-use, this exemption is under pressure. The Commerce Department’s proposed controls on AI model weights (2025) would for the first time apply export controls to open-source AI — a precedent with enormous implications for global software development.

Russia/China Open-Source Strategy

Russia’s 2022 tech sovereignty push mandated government software transition to domestic/open-source alternatives after Western sanctions cut off Microsoft, Oracle, and SAP licences. China’s “xinchuang” (信创) policy requires government use of domestically developed alternatives — driving development of Kylin OS, domestic databases, and RISC-V processors. Both represent forced decoupling from Western tech ecosystems.

📡 Strategic Insight — The Open Source Paradox
The open-source stack is both the world’s greatest public good and its greatest shared vulnerability. Apache Log4j is used by Amazon, Apple, Microsoft, Twitter, and millions of others — yet its security is maintained by unpaid contributors. This is not a bug in the open-source model; it is a structural condition. State actors exploit this: inserting malicious contributors (XZ Utils), exploiting unpatched vulnerabilities (Log4Shell), and building the capability to compromise entire software ecosystems through a single compromised package. The 2024 US government “Secure by Design” initiative and EU’s Cyber Resilience Act (mandatory security requirements for connected devices including software) are the first serious policy responses to this systemic risk.
© IASNOVA.COM
10 // GOVERNANCE

International Cyber Governance: Frameworks & Failures

© IASNOVA.COM
FrameworkTypeScope & MembersKey ProvisionsStatus & Significance
Budapest Convention (2001) Binding Treaty Council of Europe; 68 states parties incl. US, Japan, EU members — NOT Russia, China, India, Brazil Criminalise hacking, data interference, CSAM online; cross-border law enforcement MLA; 24/7 network Only binding international cybercrime treaty. Stalled universalisation — Russia/China reject it as Western. Most effective for law enforcement cooperation among signatories.
UN GGE / OEWG Diplomatic Process UN Group of Governmental Experts (25 states); Open-Ended Working Group (all UN members) GGE reports (2013, 2015, 2021): existing international law applies to cyberspace; voluntary norms for responsible state behaviour 2021 GGE: consensus on 11 voluntary norms. OEWG: Russia/China use to dilute Western positions. Fundamental disagreement on whether sovereignty is a binding rule persists.
Paris Call (2018) Multistakeholder Initiative France-initiated; 80+ states, 700+ private sector, 400+ civil society — US joined 2021 (Trump refused) Nine principles including: no election interference; protect civil internet; no hacking of healthcare; no offensive cyber against civilians First major multistakeholder cyber governance initiative. Non-binding. Significant that US (under Biden) joined. Demonstrates EU/France as norm entrepreneurs. China and Russia declined.
Tallinn Manual (2013/2017) Expert Commentary NATO CCDCOE; international law experts; non-binding Existing international law applies to cyber ops; sovereignty is a binding rule; attribution standards; IHL applies to cyber warfare Most authoritative academic cyber law reference. Cited globally. Contested: US/UK reject sovereignty as a standalone rule. A Tallinn 3.0 process is underway.
UN Cybercrime Treaty (2024) Binding Treaty (Proposed) Russia-initiated 2019; all UN members in negotiations; adopted by UN GA August 2024 Criminalises cybercrime; cross-border evidence sharing; broad scope that critics say enables authoritarian surveillance of political opposition Deeply controversial. Western states, civil society, tech industry say it lacks human rights safeguards and could be used to criminalise journalism and activism. China and Russia support as alternative to Budapest. Must be ratified by states.
Counter Ransomware Initiative (CRI) Plurilateral Coalition US-led; 50+ nations; G7 members, India, Japan, Australia, EU Intelligence sharing on ransomware groups; joint disruption operations; no ransom payment as policy for governments; cryptocurrency tracing Most operationally effective current cyber governance mechanism. Excludes Russia, China. India’s membership is significant — signals alignment with Western cyber norms despite strategic autonomy in other domains.
⚠️ The Fundamental Governance Gap — No “Geneva Convention” for Cyberspace
The most consequential gap in international cyber governance: there is no binding agreement on what types of cyberattacks are prohibited, what constitutes a “use of force,” what countermeasures are lawful, or how to verify compliance. Unlike nuclear weapons (NPT), chemical weapons (CWC), or biological weapons (BWC), cyberweapons have no arms control treaty. Attempts to create one have failed because: (1) Attribution is disputed; (2) All major powers want to preserve offensive cyber capabilities; (3) Verification is technically impossible; (4) Russia and China prefer opacity. The Tallinn Manual provides academic analysis of what existing law says — but states rarely commit publicly to its conclusions.
© IASNOVA.COM
11 // DATA SOVEREIGNTY

Data Sovereignty: GDPR, Localisation & the Splinternet

© IASNOVA.COM

Data sovereignty — the principle that data generated in a country is subject to that country’s laws — has become a central fault line in international relations. Three incompatible models are competing to define the global data order: the US model (free data flows across borders, market-driven); the EU model (regulated flows with rights protections, adequacy decisions); and the China/Russia model (data localisation, state access, internet sovereignty).

🇺🇸 US Model: Open Flows

Data should flow freely across borders, subject to market self-regulation and sector-specific rules (HIPAA for health, FERPA for education, COPPA for children). No general federal privacy law (multiple Senate bills failed). US Cloud Act (2018) allows US law enforcement to demand data from US companies anywhere globally — creating tension with GDPR. Favours US tech giants’ data collection models.

🇪🇺 EU Model: Regulated Flows

GDPR restricts transfers to third countries without “adequate protection.” EU has adequacy decisions with 14 countries. US-EU: three frameworks negotiated (Safe Harbour, Privacy Shield, Data Privacy Framework — DPF 2023, challenged by Max Schrems). GDPR’s extraterritoriality means any global company handling EU citizen data must comply worldwide. EU proposes itself as the global regulatory model.

🇨🇳 China Model: Localisation + State Access

China’s Cybersecurity Law (2017), Data Security Law (2021), and PIPL (Personal Information Protection Law, 2021) require critical data to be stored in China and give government broad access rights. China bans most foreign cloud services domestically. Companies operating in China must hand over data to government on request — creating impossible choices for multinationals (comply and breach GDPR; refuse and lose China access).

🇷🇺 Russia: Sovereignnet

Russia passed “Sovereign Internet” law (RuNet, 2019) requiring all Russian internet traffic to route through state-controlled infrastructure — enabling a full internet cutoff. Data localisation law (2014, Roskomnadzor enforcement) requires Russian user data stored in Russia. Russia blocked Instagram, Facebook, Twitter post-Ukraine invasion. RuNet is the prototype for authoritarian digital sovereignty — sovereign from the West, surveilled domestically.

The Splinternet Risk

The “splinternet” — fragmentation of the global internet into national or bloc-based systems — is advancing. China’s Great Firewall, Russia’s RuNet, EU’s data localisation requirements, and US app bans (TikTok) are all fragmenting the previously unified global internet. The ITU (dominated by authoritarian states) and ICANN/multistakeholder model are competing governance visions. A fully fragmented internet would represent the end of the open internet as a geopolitical concept.

India’s DPDP Act (2023)

India’s Digital Personal Data Protection Act (2023) draws from both GDPR (rights framework, consent requirements) and Chinese/Russian models (broad government exemptions, data localisation powers). The government retains broad exemption powers for “national security.” India is a swing state in the data sovereignty debate — its regulatory choices will shape standards for the Global South. India notably declined to join the Budapest Convention.

© IASNOVA.COM
12 // FAQs

Frequently Asked Questions

© IASNOVA.COM
What is cyberwarfare and how does international law apply to it?
Cyberwarfare uses digital operations to damage, disrupt, or destroy adversary systems. International law applies but is contested: the Tallinn Manual (non-binding NATO CCDCOE expert study) concludes existing law governs cyber operations. The threshold debate: does a cyberattack constitute an “armed attack” under UN Charter Article 51? Most states agree attacks causing kinetic-equivalent effects (death, physical destruction, infrastructure collapse) can qualify — but no state has ever formally invoked Article 51 in response to a cyberattack. Attribution remains the central legal and political obstacle.
What was SolarWinds and why is it considered the most significant cyberattack in history?
SolarWinds/SUNBURST (December 2020) was a supply chain attack by Russia’s SVR (APT29) that compromised SolarWinds Orion — IT monitoring software used by 18,000 organisations. By inserting malicious code into a legitimate software update, the attackers gained access to US Treasury, State, Commerce, Homeland Security, parts of the Pentagon, Microsoft, FireEye, and Intel. Dwell time was 9+ months before discovery. It is considered the most significant attack because: it compromised the software supply chain itself (not just a target’s network); it penetrated the highest levels of US government; and it demonstrated that no defence perimeter is secure when attackers can compromise trusted software vendors.
What is the EU NIS2 Directive and who does it apply to?
NIS2 (adopted 2022, transposition deadline October 2024) expands the EU’s cybersecurity regulatory framework from NIS1’s narrow scope to 18 sectors covering ~160,000 entities across the EU. Essential Entities (energy, transport, banking, digital infrastructure, healthcare) face stricter requirements than Important Entities (postal services, waste management, food production, manufacturing). Key requirements: mandatory security measures including supply chain security, vulnerability disclosure, encryption, and MFA; incident reporting (24-hour initial, 72-hour detailed); personal liability for senior management; fines up to €10M or 2% global turnover for Essential Entities. It is the most comprehensive mandatory cybersecurity regulation anywhere in the world.
What is “Defend Forward” and why is it controversial?
Defend Forward is the US Cyber Command doctrine of operating in adversary networks before attacks reach the US — disrupting malicious activity at its source. It moves from reactive to proactive cyber defence. Examples: deploying “hunt forward” teams to partner nations to find Russian malware before it’s activated; disrupting ransomware infrastructure servers before attacks are launched. Controversy: it means the US is routinely operating in Russian, Chinese, Iranian, and North Korean networks during peacetime — an activity those states would consider a casus belli if conducted by them against the US. The doctrine blurs the line between peacetime intelligence collection and cyber operations.
What is the XZ Utils backdoor and why does it matter for geopolitics?
In March 2024, a Microsoft engineer discovered that “Jia Tan” — a software contributor who had spent two years building trust in the open-source XZ Utils project — had inserted a sophisticated backdoor in versions 5.6.0 and 5.6.1. The backdoor would have allowed remote code execution on millions of Linux servers globally. Western intelligence agencies and researchers broadly attribute the operation to a state intelligence service. The incident demonstrates: (1) open-source supply chains are major state intelligence targets; (2) state actors are willing to invest years in social engineering of developer communities; (3) global critical infrastructure depends on volunteer-maintained code. It was detected only by chance, weeks before mass deployment.
What is digital sovereignty and why is it dividing the world?
Digital sovereignty is a state’s ability to control its digital infrastructure, data, and technology ecosystem without foreign dependency or coercive influence. Three incompatible models compete globally: The US model (open data flows, market-driven, extraterritorial law enforcement via CLOUD Act); the EU model (regulated flows with GDPR rights, adequacy decisions, data protection as a fundamental right); and the China-Russia model (data localisation, state access to all data, internet sovereignty as state control). These models are incompatible — a company cannot simultaneously comply with GDPR’s data protection requirements and China’s law requiring data hand-over to the state. This creates a forced choice between markets that is driving the “splinternet” fragmentation of the global internet.
13 // PRACTICE

Practice Questions by Audience & Exam Type

© IASNOVA.COM
// PRACTICE QUESTIONS — CYBERWARFARE & DIGITAL SOVEREIGNTY
Q1EU POLICY / SCIENCES PO / ETH ZÜRICH
Critically assess the EU’s digital sovereignty strategy. Does the combination of GDPR, NIS2, the Cyber Solidarity Act, and the Chips Act constitute a coherent strategic approach, or a fragmented regulatory response to US and Chinese technological dominance?
Framework: Coherence argument — all instruments target the same goal (reduce US/CN dependency); Brussels Effect makes EU norms global. Fragmentation argument — no overarching EU tech champion; GAIA-X failed to materialise; Chips Act 20% target unrealistic; NIS2 transposition uneven. Key tension: regulatory sovereignty without technological sovereignty (no EU equivalent of TSMC, Google, AWS). Conclusion: strategically coherent in vision but structurally weak in execution.
Q2US POLICY / JOHNS HOPKINS SAIS / HARVARD KENNEDY
Is “Defend Forward” a sustainable doctrine for US cyber deterrence? Evaluate its strategic logic, operational record, and legal controversies against the backdrop of the Volt Typhoon and Salt Typhoon incidents.
For: Ukraine pre-war hunt forward worked; disrupted REvil; proactive deterrence more effective than passive defence; China’s Volt Typhoon shows adversaries have been “defending forward” in US networks for years. Against: legal ambiguity under international law; escalation risk if adversary misinterprets intelligence operation as attack preparation; no public evidence it deterred China’s telecom penetrations. Conclusion: necessary but insufficient without complementary defensive measures; China-US cyber stability agreements impossible without attribution frameworks.
Q3GRE POLITICAL SCIENCE / OXFORD PPE
Why has the international community failed to establish a binding “Geneva Convention” for cyberspace? What are the prospects for meaningful cyber arms control?
Reasons for failure: no verification mechanism possible (unlike nuclear test ban); all major powers want to preserve offensive capabilities; attribution disputes prevent accountability; Russia/China use UN process to dilute norms (OEWG); Budapest Convention not universal. Prospects: narrow sectoral agreements possible (e.g. no cyberattacks on hospitals — Paris Call principle); CRI shows plurilateral cooperation can work; US-China communications channels restored 2023 post-SF summit. Key insight: bilateral confidence-building measures (US-China cyber hotline) more realistic than multilateral treaty.
Q4UPSC MAINS GS-II / GS-III
“The weaponisation of ransomware by state-sponsored actors represents the most operationally effective and legally ambiguous instrument of modern hybrid warfare.” Discuss with reference to specific cases. (250 words)
Cases: Colonial Pipeline (DarkSide — Russia-tolerated; national emergency declared); WannaCry (Lazarus/DPRK — state-directed for revenue + disruption); NotPetya (Sandworm — disguised as ransomware, actually destructive cyberweapon). Legal ambiguity: criminal vs state-sponsored line deliberately blurred; plausible deniability (“private group”); LOAC doesn’t clearly apply to below-threshold attacks. Hybrid warfare dimension: weakens adversary economy, tests response, normalises cyber disruption below armed attack threshold. Counter: CRI coalition; cryptocurrency tracing; offensive disruption of infrastructure.
Q5AP GOVERNMENT / AP COMPUTER SCIENCE PRINCIPLES
Explain the concept of “supply chain attacks” using SolarWinds and XZ Utils as examples. Why are they considered more dangerous than traditional cyberattacks?
Supply chain attack: compromise a trusted vendor/tool to reach many targets through one breach. SolarWinds: compromised IT management software — affected 18,000 orgs including US government. XZ Utils: two-year social engineering of open-source project for backdoor insertion in Linux servers. Why more dangerous: legitimate software update mechanism used as delivery vector; no abnormal behaviour to detect; compromises entire ecosystem not single target; dwell time of months before discovery; trust in software supply chain is foundational assumption of all digital systems. Counter: software bill of materials (SBOM) requirements; code signing; zero trust architecture.
Q6LSE IR / CAMBRIDGE HSPS / GEORGETOWN
Compare and contrast China’s “Volt Typhoon” pre-positioning strategy and Russia’s NotPetya attack as expressions of distinct cyber strategic cultures. What do these differences imply for deterrence and attribution policy?
Volt Typhoon: patient, invisible, purpose-specific (Taiwan crisis activation), “living off the land,” multi-year persistence, precision targeting — reflects China’s Sun Tzu “win without fighting” culture. NotPetya: destructive, maximalist, accepts collateral damage, immediate effect, reckless — reflects Russia’s tolerance for kinetic-adjacent cyber force. Deterrence implications: China’s strategy is deterrence-resistant (hard to threaten consequences for pre-positioned access that has not activated); Russia’s is more deterrable but less predictable. Attribution: China deliberately complicates attribution; Russia accepts attribution knowing consequences remain limited. Policy: different responses needed — China requires infrastructure hardening + Taiwan crisis cyber protocols; Russia requires red lines on destructive attacks.
Q7BPSC / MPPSC / UGC-NET
What is the EU’s NIS2 Directive? How does it differ from NIS1 and what are its implications for global cybersecurity governance? (150 words)
NIS2 (2022): expands NIS1’s scope from 7 to 18 sectors; covers ~160,000 entities (vs few hundred under NIS1); mandatory 24-hour incident reporting; CEO personal liability; €10M or 2% turnover fines; supply chain security requirements. Key additions vs NIS1: harmonised penalties across EU (NIS1 had varied national penalties); mandatory minimum security measures; executive personal liability; cross-border coordination via CyCLONe. Global implications: Brussels Effect — companies operating in EU must comply globally, effectively spreading EU cybersecurity standards worldwide; sets template for similar regulations in UK (NIS2-equivalent), Australia, Canada; demonstrates binding regulation is more effective than voluntary frameworks. Transposition deadline: October 2024; member state compliance is uneven.

Master Mind Map — Cyberwarfare & Digital Sovereignty

CYBERWARFARE & DIGITAL SOVEREIGNTY // GLOBAL GUIDE DEFINITIONS/LAW • 4-tier taxonomy • Tallinn Manual • Attribution problem APT GROUPS • APT28/29 (Russia GRU/SVR) • Volt/Salt Typhoon (China) • Lazarus (DPRK) MAJOR ATTACKS • Stuxnet (2010) • NotPetya (2017, $10B) • SolarWinds (2020) RANSOMWARE • Colonial Pipeline • WannaCry (DPRK) • REvil / DarkSide EU STRATEGY • NIS2 / ENISA • Cyber Solidarity Act • Brussels Effect GOVERNANCE • Budapest / Paris Call • Tallinn Manual / CRI DATA SOVEREIGNTY • GDPR / EU model • China localisation • Splinternet risk OPEN SOURCE • XZ Utils backdoor • Log4Shell • Sovereign Tech Fund © IASNOVA.COM — Cyberwarfare & Digital Sovereignty: Master Mind Map
Figure 5 — Cyberwarfare & Digital Sovereignty: Master Mind Map | © IASNOVA.COM
© IASNOVA.COM
IASNOVA.COM

This guide is curated for European technology policy professionals, US defence and security community, Oxford PPE, Cambridge HSPS, Sciences Po, LSE International Relations, ETH Zürich, Johns Hopkins SAIS, Harvard Kennedy School, Georgetown Security Studies, GRE Political Science, AP Government, AP Computer Science Principles, UPSC CSE/IFS, UGC-NET, and all international relations programmes with a cybersecurity and digital policy dimension.

Share this post:

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.