Cybersecurity and Digital Change in PNG: Two Case Studies, One Strategic Reality

 By Bernard Yegiora

This week’s student-led seminar marked a transition in the course. Having moved from conceptual discussions of security and the China threat, the focus now shifts to cybersecurity as a second major case study. What emerged from the discussion is a clear analytical distinction: two different but interconnected cases—PNG and China—operating within the same strategic digital environment.

The seven questions guiding the seminar were not random. They were systematically derived from two core readings:

Taken together, these questions reveal a broader argument: cyberspace is now a domain where development, security, and geopolitics intersect.

Case One: PNG – Cybersecurity as a Development-Security Nexus

The first, third, fifth, and sixth questions draw directly from and focus on PNG. The central issue is straightforward: how does a developing state manage digital transformation in a competitive geopolitical environment?

ICT Infrastructure as National Security (Question 1)

The starting point is the recognition that ICT infrastructure is no longer a neutral development tool. As highlighted in the reading, PNG must “weather geopolitical tensions” while building capital-intensive systems.

This transforms ICT into a national security issue in three ways:

  • Critical dependency: reliance on foreign-built infrastructure
  • Strategic exposure: vulnerability to external influence and surveillance
  • Economic risk: debt burdens linked to infrastructure financing

If ICT projects are driven more by external competition than national priorities, PNG risks losing strategic control over its digital future.

Submarine Cables and Strategic Competition (Questions 3 and 5)

The repeated focus on submarine cable systems is deliberate. These are not just communication tools—they are strategic assets.

PNG is connected to:

  • The China-linked Kumul Submarine Cable
  • The Australia-funded Coral Sea Cable

Both are framed within a broader “battle for influence.” This places PNG in a position where infrastructure choices carry geopolitical implications.

The screenshot shows a student-led seminar slide examining how Papua New Guinea navigates digital transformation amid great power competition, with a focus on submarine cable infrastructure, sovereignty, and cybersecurity risks in a contested strategic environment.

The policy challenge is balancing:

  • Connectivity benefits (speed, cost, access)
  • Sovereignty concerns (control, data security, long-term dependency)

The seminar identified key safeguards:

  • Data sovereignty provisions
  • Transparent procurement processes
  • Diversification of partners
  • Debt sustainability
  • Strong regulatory oversight

The implication is clear: infrastructure decisions are strategic decisions.

Governance as a Security Variable (Question 6)

Perhaps the most underappreciated issue is governance. The reading highlights institutional ambiguity between DICT and NICTA, creating inefficiencies and confusion.

This is not simply an administrative problem—it is a security vulnerability.

Weak governance leads to:

  • Policy inconsistency
  • Regulatory gaps
  • Increased corruption risk
  • Exposure to political capture

In strategic terms, internal weakness amplifies external risk.

Reform priorities include:

  • Clear institutional mandates
  • Stronger ICT legislation
  • Centralised coordination
  • Enhanced accountability mechanisms

Without governance reform, PNG cannot effectively manage either development or security in the digital domain.

Case Two: China – Cyber Power and Strategic Contradictions

The second, fourth, and seventh questions draw from and shift the focus to China. Unlike PNG, China is not a developing digital actor—it is a major cyber power shaping the global system.

Cyber Espionage as Strategic Advantage (Question 2)

China’s cyber strategy demonstrates how states can leverage cyberspace for competitive advantage.

Key benefits include:

  • Low-cost intelligence acquisition
  • Acceleration of technological development
  • Enhanced strategic awareness

Cyber espionage allows China to bypass traditional development constraints and integrate into the global technological system more rapidly.

However, this strategy has consequences.

It has contributed to:

  • Perceptions of China as a systemic cyber threat
  • Increased distrust among Western states
  • Heightened geopolitical tensions

Thus, while cyber espionage provides short-term advantages, it generates long-term strategic friction.

Limits of Espionage-Driven Innovation (Question 4)

The seminar critically examined whether cyber espionage can sustain long-term innovation.

The reading suggests clear limitations:

  • Espionage supports technological catch-up, not leadership
  • Over-reliance weakens domestic innovation capacity
  • It creates institutional dependency on external knowledge

This exposes a structural vulnerability in China’s innovation system:

  • Reduced incentives for original research
  • Fragile technological ecosystems
  • Persistent trust deficits internationally

The broader lesson is that information acquisition is not a substitute for innovation capability.

US–China Cyber Rivalry and the Problem of Cooperation (Question 7)

The final question moves beyond national analysis to the global level.

The United States and China are locked in a cycle of:

  • Mutual accusations
  • Strategic distrust
  • Competing narratives of cyber aggression

As outlined in the reading, both states view themselves as victims while accusing the other of offensive behavior. This creates a classic security dilemma in cyberspace.

Despite this, the seminar identified potential pathways for cooperation:

  • Confidence-building measures
  • Bilateral communication channels
  • Agreed norms of responsible behavior
  • Multilateral cybersecurity frameworks

However, cooperation remains constrained by:

  • Strategic competition
  • Power asymmetries
  • Lack of trust

Integrating the Two Cases: One Strategic Environment

Although PNG and China represent very different cases, they are operating within the same system.

  • China shapes the digital environment through power and capability
  • PNG navigates that environment with constraints and vulnerabilities

This creates a structural relationship:

  • Major powers compete
  • Smaller states manage the consequences

For PNG, this means:

  • Cybersecurity is not optional
  • Strategic awareness is essential
  • Policy decisions must anticipate external pressures

Conclusion: From Development to Strategy

The seminar demonstrates a critical shift in thinking. Cybersecurity is no longer a technical issue, nor is it confined to major powers. It is a strategic domain that affects all states, regardless of size.

The seven questions, grounded in the two readings, reveal three core insights:

  1. Infrastructure is strategic
    Digital systems shape national security outcomes
  2. Power matters in cyberspace
    States like China can leverage cyber capabilities for advantage
  3. Governance determines resilience
    Weak institutions create vulnerabilities regardless of external conditions

For PNG, the challenge is clear: to pursue digital development while maintaining strategic autonomy in an increasingly contested environment.

Watch the Seminar Discussion

🎥 Cybersecurity and Digital Change in PNG Seminar

Comments

Popular posts from this blog

Commercial liberalism and the six norms

Allison's rational actor model

FPA: Organizational Process Model