This essay focuses on the digital world generated through computer networks. As the world becomes more dependent on technology and the digital world, the threat
: this is the digital world generated through computer networks. This global common is under threat by state and non-state actors. Their targets include military, financial, or infrastructure. As the world becomes more dependent on technology and the digital world, the threat to these objectives becomes more critical. Attacks to this domain may be generated from states such as India, North Korea, Russia, or China. Non-sate actors such as anonymous or terrorist organizations can also represent a threat. Although not included in the above commons, the possibility of a hybrid attack is real.
a country may be the target of a cyber attack and threaten the global common of air, maritime, or space. Although there is not a unanimous consensus on whether or not cyber attacks constitute an act of war, it is important to recognize that the threat is real and that state and non-state actors are capable and willing to use cyber as a weapon. Complexities of a global environment: Interdependence as a solution? According to Former U.S. Secretary of State Hillary Clinton “We are shifting from mostly direct exercise and application of power to a more sophisticated and difficult mix of indirect power and influence” (Scott, 2012, Pg 6). With the end of the Cold War, international conflict became a more complex conflict.
the conflict in areas such as space was limit to the United States and the Soviet Union. After the Cold War other state actors became participants of space common. As stated by Sec Clinton, the exercise and application of power is more difficult and complex. Despite the new conditions of the global environment, a new opportunity may arise from this complex environment. Given the complexity of the challenges and threats, a need to operate under joint operations may represent a crucial opportunity. For this reason