The financial crisis that erupted in 2007 highlighted how important trust is for the global system and how fragile it can be. The 2016 Bangladesh central bank cyber incident exposed a new threat to financial stability and the unprecedented scale of the risk that malicious cyber actors pose to financial institutions. Beyond theft, using cyber operations to manipulate the integrity of data, in particular, poses a distinct and greater set of systemic risks than other forms of financial coercion. The complex and interdependent character of the financial system and its transcendence of physical and national boundaries mean that manipulating the integrity of financial institutions' data can, intentionally and/or unintentionally, threaten financial stability and the stability of the international system. Importantly, unlike the 2007-2008 global crisis, this risk exists independent of the underlying economic fundamentals and will only increase as more and more governments make cashless economies an explicit goal. The G20 finance ministers and central bank governors should be commended for urging improvements in the resilience of the global financial system in their March 2017 communique. In a next step, the G20 member states could commit their countries explicitly to refrain from using offensive cybertools to corrupt the integrity of data in the financial system and to cooperate when such attacks do occur.
[1]
B. Steele.
For More Information
,
2000,
Journal of the National Cancer Institute.
[2]
Roger M. Needham,et al.
Denial of service
,
1993,
CCS '93.
[3]
Deborah Johnson,et al.
Wired
,
2011,
AAP News.
[4]
Oona A. Hathaway,et al.
The Law of Cyber-Attack
,
2012
.
[5]
Daniel R. Coats.
Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community
,
2018
.
[6]
Sophia V. Georgieva,et al.
TRANSITIONAL POLICIES TO ASSIST THE POOR WHILE PHASING OUT INEFFICIENT FOSSIL FUEL SUBSIDIES THAT ENCOURAGE WASTEFUL CONSUMPTION Contribution by the World Bank to G20 Finance Ministers and Central Bank Governors
,
2014
.
[7]
Lauren Schumacher.
Foundation for Defense of Democracies
,
2013
.
[8]
G. DeFriese,et al.
The New York Times
,
2020,
Publishing for Libraries.
[9]
THE CARNEGIE ENDOWMENT FOR INTERNATIONAL PEACE
,
1924
.
[10]
Sameh Aboul Enein,et al.
Report of the group of governmental experts on developments in the field of information and telecommunications in the context of international security
,
2016
.
[11]
Emilio Iasiello.
Cyber attack: A dull tool to shape foreign policy
,
2013,
2013 5th International Conference on Cyber Conflict (CYCON 2013).