What can cybersecurity leaders expect from global geopolitical players including the USA, Russia, China, and Iran in 2024 and beyond? Security leaders are bracing for specific risks considered based on their probability and potential impact, including disruptive attacks, ransomware campaigns, intellectual property theft, and attempts to interfere with elections. However, the impacts of cybersecurity risk are not only evident from analysing real cyber attacks, but also from the policies and actions of major countries.
Halfway through 2024, now is a good time to take stock of the geo-political policy landscape from around the world that stem from perceived threats to national security. Many of the policy events mentioned in this article have some relationship to privacy, including protecting the privacy of citizens from the influence of foreign governments but also governments banning technologies that would give citizens the ability to maintain their privacy from government oversight.
Let's delve into the top geopolitical cybersecurity policy changes in 2024:
In 2024, the U.S. government took significant steps toward banning TikTok due to concerns over data privacy and national security. After years of discussions and initial attempts by former President Donald Trump to ban the app, Congress has passed legislation that could lead to an outright ban unless TikTok's Chinese parent company, ByteDance, sells its U.S. operations within one year. The app has already been banned on devices belonging to US government employees.
This move mirrors actions taken by other countries; notably, India banned TikTok in 2020 over similar data security concerns. The ban, when implemented, would primarily affect app stores that distribute TikTok, making it unavailable for download and updates in the U.S.
The U.S. government crackdown on Russian cybersecurity firm Kaspersky resulted in banning the sale of its software in the US. This decision follows accusations of Kaspersky's ties to Russian intelligence, which have circulated since at least 2017. Because of the sensitive nature of cybersecurity tools, the potential risks include accessing sensitive information belonging to American companies and individuals. Kaspersky is estimated to comprise about 20% of the anti-virus market-share.
Consequently, Kaspersky announced it would shut down its U.S. operations and lay off its staff in the region. This action aligns with previous restrictions imposed during both the Trump and Biden administrations, reflecting ongoing concerns about the involvement of Russian companies in cybersecurity threats amid heightened geopolitical tensions.
According to Bilyana Lilly in her book Russian Information Warfare, Russia's strategic objectives can be summarized into two main categories: Firstly, to undermine the technology and digital infrastructure of its opponents and secondly, to pursue psychological influence to weaken adversaries. However, in 2024, Russia has also demonstrated the strategic need to increasingly surveil its own citizens.
Russia has officially banned VPNs and similar technologies that allow users to anonymously access websites. Following a request from Roskomnadzor, the Russian communications regulator, Apple removed 25 VPN apps from its App Store. This move is part of a broader trend of tightening internet controls under President Vladimir Putin, including extensive monitoring and storage requirements for data and increased censorship and crackdowns on dissent.
Authoritarian regimes like China and North Korea have also used bans on VPNs to control information flow and prevent access to international news sites, social media, and platforms that could facilitate anti-government sentiments. China requires VPN services to obtain government approval, which essentially forces them to comply with stringent censorship laws.
Turkey recently lifted its ban on Instagram after imposing it on August 2nd due to content disputes. The Turkish Information and Communication Technologies Authority (ICTA) initially blocked Instagram without disclosing specific reasons. However, it was later revealed that the ban was in response to Instagram removing posts from Turkish users that expressed condolences for Hamas leader Ismail Haniyeh's death.
The Turkish government criticized Instagram for censoring these messages, citing them as a reason for the block. Turkey has a history of imposing restrictions on social media platforms, such as the previous ban on Wikipedia from 2017 to 2020 due to content disagreements.
The government of Pakistan, under the directive of the Interior Ministry, shut down all internet services across the country in response to protests following the arrest of former Prime Minister Imran Khan.
The shutdown aimed to control the spread of information and curb the mobilization of Khan's supporters, who were using social media and messaging apps like WhatsApp to organize and disseminate real-time updates about the protests. Since the internet in Pakistan was restored, some social media sites still report being throttled. This action reflects a broader trend in authoritarian regimes to suppress dissent and manage public perception during political crises.
In 2024, geopolitical tensions have significantly shaped cybersecurity policies globally. Major actions include the U.S. moving to ban TikTok and Kaspersky, Russia outlawing VPNs, and Turkey temporarily banning Instagram, all citing national security concerns.
These measures reflect a broader need to control the digital landscape due to the increased risk it poses, potentially impacting everything from individual privacy to international diplomacy. As nations navigate these complex issues, the balance between security and freedom remains a critical challenge in 2024.
Share your details, and a member of our team will be in touch soon.
Our Penetration Security Testing methodology is derived from the SANS Pentest Methodology, the MITRE ATT&CK framework, and the NIST SP800-115 to uncover security gaps.
Download MethodologyDownload our buyer’s guide to learn everything you need to know to successfully plan, scope and execute your penetration testing projects.
Download GuideDecember 10 - Blog
Hardware token protocols: what are they, and what role do they play in your organization's cybersecurity? In today's article, our ethical hackers outline the most common hardware token protocols.
October 24 - Blog
Packetlabs is thrilled to have been a part of SecTor 2024. Learn more about our top takeaway's from this year's Black Hat event.
September 27 - Blog
InfoStealer malware plays a key role in many cyber attacks, enabling extortion and lateral movement via stolen credentials. Learn the fundamentals about InfoStealers in this article.
© 2024 Packetlabs. All rights reserved.