Total Pageviews

Saturday, June 7, 2025

A lire: "Confronting Russia's Cyber Power: Reassessing assumptions, sizing up the threat, and building a proactive response"

Justin Sherman, Confronting Russia's Cyber Power: Reassessing assumptions, sizing up the threat, and building a proactive response, Atlantic Council, May 2025, 22 pages. 

Le document explore la puissance cyber de la Russie et les réponses stratégiques que l'Occident devrait adopter. 

Selon ce rapport, on a pu observer que la Russie avait été en peine, dès le début des hostilités en 2022, de coordonner ses activités cyber avec les opérations sur le terrain. Il n'y a pas eu de cyberattaques massives et destructrices. Les défenses cyber ukrainiennes et de l'OTAN ont pu contrer l'essentiel des cyberattaques russes. Il semblerait que les observateurs occidentaux aient surestimé, avant le conflit, les capacités cyber de la Russie. Néanmoins la Russie reste une cybermenace sérieuse. 

A lire: "Securing the space-based assets of NATO members from cyberattacks"

Julia Cournoyer, Securing the space-based assets of NATO members from cyberattacks, A framework to strengthencybersecurity in outer space. Chatam House, May 2025, 35 pages. 

"This paper examines the vulnerabilities of the space-based systems of NATO’s key members to cyberattacks, outlining a structured framework for enhancing their security".

A lire: "China’s Lessons from the Russia-Ukraine War". Rapport de la RAND Corporation

Howard WangBrett Zakheim, "China’s Lessons from the Russia-Ukraine War. Perceived New Strategic Opportunities and an Emerging Model of Hybrid Warfare". Rapport de la RAND Corporation. 22 mai 2025, 89 pages. 

Le rapport examine les leçons que les dirigeants politiques et militaires chinois ont tirées de la guerre entre la Russie et l'Ukraine. L'objectif est de comprendre comment ces leçons influencent les politiques futures de la Chine, en particulier dans le contexte de la compétition ou du conflit potentiel avec les États-Unis.

A la lumière des constats de la guerre menée par la Russie, la Chine réfléchit à une redéfinition de la guerre hybride qui pourrait inclure davantage de moyens de combat plus conventionnels; elle envisage également la modernisation des armées dans la perspective d'engagements militaires longs (guerres de longue durée et non plus guerre éclair).

Thursday, June 5, 2025

Diplôme sur le Renseignement et les Menaces globales (DiReM)


Science Po Saint-Germain-en-Laye ouvre les candidatures au Diplôme sur le Renseignement et les Menaces globales (DiReM). Date limite de dépôt des candidatures: 30 juin 2025. Rentrée: octobre 2025. 

Lien: https://www.sciencespo-saintgermainenlaye.fr/formations/diplome-sur-le-renseignement-et-les-menaces-globales-direm/

Diplôme d’Analyste en Gouvernance et SEcurité du Numérique (DAGSEN)

Ouverture du nouveau diplôme proposé par Science Po Saint-Germain-en-Laye, le DAGSEN: Diplôme d'Analyste en Gouvernance et Sécurité du Numérique. 

Inscriptions ouvertes. Rentrée: 1er octobre 2025. 

Lien: https://www.sciencespo-saintgermainenlaye.fr/formations/diplome-danalyste-en-gouvernance-et-securite-du-numerique-dagsen/ 

Tuesday, June 3, 2025

A lire: "A tertiary review on quantum cryptography"

A lire: Luiz Filipe Anderson de Sousa Moura, Carlos Becker Westphall, A tertiary review on quantum cryptography, Federal University of Santa Catarina, Brazil, June 4, 2025, https://www.arxiv.org/pdf/2506.02028 

Abstract: Quantum computers impose an immense threat to system security. As a countermeasure, new cryptographic classes have been created to prevent these attacks. Technologies such as post-quantum cryptography and quantum cryptography. Quantum cryptography uses the principle of quantum physics to produce theoretically unbreakable security. This tertiary review selected 51 secondary studies from the Scopus database and presented bibliometric analysis, a list of the main techniques used in the field, and existing open challenges and future directions in quantum cryptography research. The results showed a prevalence of QKD over other techniques among the selected papers and stated that the field still faces many problems related to implementation cost, error correction, decoherence, key rates, communication distance, and quantum hacking. 

Tim Nicholas Rühlig, “The “Huawei Saga” in Europe Revisited: German Lessons for the Rollout of 6G”

Tim Nicholas Rühlig, “The “Huawei Saga” in Europe Revisited: German Lessons forthe Rollout of 6G”, Notes du Cerfa, No. 187, Ifri, June 2025.

Abstract: "This paper examines the evolving debate over Chinese telecommunications vendor Huawei’s role in Europe’s 5G infrastructure, focusing on Germany as a critical case study. While the European Union (EU) attempted to coordinate a collective response through its 5G Toolbox, member states diverged significantly in balancing political, economic, and technological considerations. Germany, despite its economic ties to China and status as Europe’s largest telecom market, only reached a tentative agreement in July 2024—one that appears largely symbolic. The paper argues that Germany’s compromise reflects persistent institutional divisions and a reluctance to decisively reduce reliance on Chinese technology, even in the face of geopolitical and security concerns. The analysis suggests that with 6G on the horizon, Europe must learn from its fragmented 5G response. A future 6G strategy should prioritize network diversity, enhanced encryption, and reduced dependency on high-risk suppliers to preserve European sovereignty and digital resilience. The paper concludes by urging a more unified and binding EU framework for managing the rollout of nextgeneration wireless infrastructure."