Are we Ready for Future Cyber Wars?


Do cyber wars pose threats to national or global security? What is the impact of the privatization of intelligence in cyber sector? How can cyber wars ruin people’s daily lives? Is it really possible to attribute cybercrimes to their rightful perpetrators? Will information warfare be bloodless or do virtual acts have the potential to shed real blood?...

Do cyber wars pose threats to national or global security? What is the impact of the privatization of intelligence in cyber sector? How can cyber wars ruin people’s daily lives? Is it really possible to attribute cybercrimes to their rightful perpetrators? Will information warfare be bloodless or do virtual acts have the potential to shed real blood? Do state or non-state actors have the upper hand? When and how should states respond to cyberattacks? Are active or passive defense position the best option? Does any international legal framework yet exist to define when cyber-counter attacks are permitted or justified? There is a long list of questions to answer in order to understand the future cyber environment which contains many unknowns and complex security challenges. Despite recognizing the cyber environment as a “grey area“, many countries and institutions have already started to search for ways to strengthen their cyber capabilities in order to deter adversaries in cyberspace or through cyberspace.

From this perspective, the current and future cyber ecosystem needs to be discussed under two main headings: “technical/technological“ and “legal and institutional“ dimension. Yet each of these headings reveal the ‘awareness’ and ‘readiness’ levels of the countries.

Technical and Technological Dimension

The cyber environment is a global space where any type of information system (e.g., computers and telephones) and their communication channelsmeet together in order to process, send, and store data. Thus, the cyber environment contains “human“, “technology“, “virtual“, and “physical“ components. Today, the sphere where “society“ and “technology“ intersect has emerged as a “cyber life zone,“ and implies not only the dimension and impact of the threat, but also points out the difficulty of taking real-time preventive and actionable precautions in terms of chain reactions and increasing speed.

Currently there are more than 4.208 billion internet users in the world.2 Meanwhile the Internet of Things (IoT) is growing faster than anyone expected; from 2 billion objects in 2006 to a projected 200 billion by 2020 (which amounts to around 26 smart objects for every human being on Earth). The world is getting much smarter; business/manufacturing, healthcare, retail, security and transportation are all using billions of smart devices. By 2025, the total global worth of IoT technology is estimated to be as much as USD 6.2 trillion, most of which is from devices used in healthcare and manufacturing.3

At the same time, people are becoming increasingly dependent on smart technology and interconnected networks beyond mobile phones: we live and work in smart homes and offices. Despite the rapid proliferation of smart devices, people remain largely unaware of the risks that might occur in their connectable home devices. TV’s, cameras, thermostats, heaters and air conditioners, bike locks and trackers, door locks, energy and lighting systems, or alarms may all serve as vulnerable hubs for hackers to gain unauthorized access to your IoT ecosystem at home.

The cyber landscape contains both advantages and disadvantages. In this respect, autonomous and robotic technologies which employ artificial intelligence reflect the discourse on cybersecurity. For example, autonomous vehicles which are still being developed by various companies such as Tesla, Uber, Waymo, LeTV, Great Wall Motors, Baidu, and Uisee Technology will be capable of performing driving tasks without humans or with limited human assistance.4 Tesla added radar to all its vehicles in October 2014 as part ofits autopilot hardware suite and is still working on enhancing the capabilities (e.g., location accuracy) of its fully self-driving suite.5 As stated in the latest research by Counterpoint’s IoT tracking service, the global market for connected cars is expected to grow by 270 percent by 2022 with more than 125 million connected passenger cars with embedded connectivity to be shipped during 2018-2022.6

Merve SEREN, From the book "Security of the Future"

“Security of the Future“ e-kitabı için Tıklayınız

Security of the Future“ Kitabı için Tıklayınız
This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.


Continents ( 5 Fields )
 Contents ( 411 ) Actiivities ( 173 )
Africa 66 136
Asia 75 211
Europe 13 29
Latin America & Carribean 12 30
North America 7 5
Regions ( 4 Fields )
 Contents ( 167 ) Actiivities ( 45 )
Balkans 22 92
Middle East 19 56
Black Sea and Caucasus 2 15
Mediterranean 2 4
Identity Fields ( 2 Fields )
 Contents ( 172 ) Actiivities ( 66 )
Islamic World 51 143
Turkish World 15 29
Turkey ( 1 Fields )
 Contents ( 205 ) Actiivities ( 54 )
Turkey 54 205

Last Added

Âlimin yerini entelektüel, dini bilginin yerini bilimsel bilgi ve dini hakikatin yerini pozitivist gerçekliğin aldığı günümüzde, Müslümanların, Batı Metodolojisinin dışında Batıyı dışlamayan ama kavramsal açıdan oryantalist bir yaklaşımı da reddeden bir söylem geliştirmesi gerekmektedir. Müslümanlar...;

Border security ensures sustainable development of a state. Pakistan has the longest border with Afghanistan known as “Durand Line.“ The borderland is rugged, mountainous and porous unable to control the transition of people across the frontier. Both countries are having a history of strained relati...;

NATO’s ability to accord and shape security environment can be considered in four folds of which all are mutually integrated: Alliance’s solidarity, coherent common vision, consolidated security architecture and the capacity for rational prioritisation, and effective operational conduct. ;

Ladies and gentlemen it is nice to see you. Unfortunately, Covid 19 prevents us from getting together in real. Fortunately, we have the high communications technology at our disposal to continue to do business as usual.;

Istanbul Security Conference, which took place for the first time in Turkey in 2015, was held by TASAM’s National Defence and Security Institute on 05-06 November 2020, under the main theme “Security Institutions of the Future and Strategic Transformation After Covid-19; Army, Police, Gendarmerie, I...;

Rapor; Çin ile Türkiye arasındaki ticaretin Türkiye’nin diğer ülkelere olan ihracatına ve ticaretine - verilere dayalı - etkisi, iki ülke arasındaki kültürel/finansal/ticari işbirlikleri ve ilişkilerin Kovid-19 sonrası “Kuşak ve Yol İnisiyatifi“ altında ne yönde şekillenebileceğinin farklı alternati...;

The report has aimed at examining the impact, based on data, of the trade between China and Turkey on the Turkey’s export to and trade with other countries,;

Bu çalışma çerçevesinde, enerji güvenliği bağlamında enerji arz güvenliği ve enerji talep güvenliği ele alınmakta ve ekonomiye etkileriyle birlikte ülke güvenliklerinin etkilemesi incelenmektedir. Burada şunu da belirtmek yerinde olacaktır ki; enerji kaynağı bölgeler kadar enerji geçiş bölgeleri de ...;

Turkey - China Impact Analysis Comparative Research Project and Workshop l 1st Phase

  • 02 Jul 2020 - 02 Jul 2020
  • Online Zoom Webinarı - 14:30
  • Istanbul - Turkey

3rd Turkey - Africa Defence Security and Aerospace Forum

  • 05 Nov 2020 - 06 Nov 2020
  • Interactive Stage -
  • Istanbul - Turkey

4TH Turkey - Gulf Defence and Security Forum

  • 05 Nov 2020 - 06 Nov 2020
  • Interactive Stage -
  • Istanbul - Turkey

'New World Regulation After Covid-19' Workshop

  • 05 Nov 2020 - 05 Nov 2020
  • Interactive Stage -
  • Istanbul - Turkey

İngiltere’nin II. Dünya Savaşı sonrasında Hint Altkıtası’ndan çekilmek zorunda kalması sonucunda, 1947 yılında, din temelli ayrışma zemininde kurulan Hindistan ve Pakistan, İngiltere’nin bu coğrafyadaki iki asırlık idaresinin bütün mirasını paylaştığı gibi bıraktığı sorunlu alanları da üstlenmek dur...

Gündem 2063, Afrika'yı geleceğin küresel güç merkezine dönüştürecek yol haritası ve eylem planıdır. Kıtanın elli yıllık süreci kapsayan hedeflerine ulaşma niyetinin somut göstergesidir.

Geçmişte büyük imparatorluklar kuran Çin ve Hindistan, 20. asırda boyunduruktan kurtularak bağımsızlıklarına kavuşmuş ve ulus inşa sorunlarını aştıkça geçmişteki altın çağ imgelerinin cazibesine kapılmıştır.

Türkiye ile Avrupa Birliği (AB) ilişkilerinin bugünü ve geleceğinin ele alındığı Avrupa Birliği Sempozyumu, Türk Asya Stratejik Araştırmalar Merkezi (TASAM) ile Türk Avrupa Bilimsel ve Eğitimsel Araştırmalar Vakfı (TAVAK) işbirliğinde 02 Şubat 2018’de İstanbul Taksim Hill Otel’de gerçekleştirildi.

Soğuk savaşın ardından, “yeni dünya düzeni“ olarak adlandırılan dönem, hegomonik bir güç olarak beliren ABD’nin “büyük vaadi“ ile başladı: “Demokrasiyi dünyada yaygınlaştırmak“. Bu “büyük“ vaad, yoksulluk, adaletsizlik ve şiddet dolu bir dünyayı kurmak biçiminde gerçekleşti ve iki “siyasi/askeri“ ar...

1 - İKT Üyesi Ülkeler Düşünce Kuruluşları Forumu 28 - 30 Ocak 2010 tarihleri arasında İstanbul’da yapıcı ve samimi bir ortam içinde cereyan etmiştir.

Türk Asya Stratejik Araştırmalar Merkezi (TASAM) bünyesinde yaptığımız bilimsel çalışmalar ile Dünya ve Türkiye’deki gelişmeleri kavrama ve analiz etmeye yönelik çabalarımızın ortaya koyduğu açık bir gerçek var: Aktörleri, kuralları, vizyonu eskisinden çok farklı olan yeni bir uluslararası sistem il...

Öncelikle, başta TASAM (Türkasya Stratejik Araştırmalar Merkezi) ve yöneticileri olmak üzere, bu gezinin gerçekleşmesi için emek ve kaynak harcamış olan tüm tüzel kuruluşlara ve özel insanlara teşekkürle başlamalıyım.