From Connectivity to Vulnerability: Why Cyber Security Is Now a National Security Priority for PNG
- Get link
- X
- Other Apps
By Bernard Yegiora
PNG is entering a decisive phase in its digital transformation. Increased internet penetration, mobile connectivity, and digital service delivery are accelerating economic and social participation. However, this expansion is simultaneously widening the national attack surface. The central argument of Seminar 6—drawing explicitly on the work of Ige and Watson—is clear: cyber security in PNG has moved beyond an ICT management issue and now sits firmly within the national security domain.
For those who want to engage directly with the seminar discussion, you can watch the full session here: Seminar 6 Video on YouTube
1. Cybercrime as a National Security ThreatBuilding on empirical observations by Ige on cybercrime trends in PNG, the sharp increase in cybercrime victimisation between 2016 and 2021 is not incidental—it reflects structural exposure. Ige’s analysis demonstrates that as internet penetration grows incrementally, cybercrime scales proportionately.
This transforms cybercrime into a national security issue because it undermines economic systems, weakens institutional credibility, and exposes citizens to persistent harm. High-risk sectors include banking and financial services, telecommunications, government databases, and digitally active SMEs. The implication is strategic: the state’s capacity to guarantee security is now contested in cyberspace.
2. Cybersecurity and the Boe Declaration
Watson situates cybersecurity within the broader framework of the Boe Declaration on Regional Security, which redefines Pacific security to include non-traditional threats. This represents a doctrinal shift from state-centric defence to comprehensive security.
Watson argues that Pacific Island countries must prioritise cybersecurity through institutional strengthening, regional cooperation, and capacity development. This aligns cybersecurity with collective regional security objectives—where resilience is built through shared frameworks rather than isolated national policies.
3. Legal Frameworks: Adequate or Obsolete?
Ige’s critique of “analog-era laws” is particularly relevant to PNG’s Cybercrime Code Act 2016. While the Act criminalises offences such as hacking, identity theft, and cyber extortion, Ige argues that legal provisions alone are insufficient without enforcement capability.
The operational gap—limited digital forensic capacity, lack of specialised personnel, and weak inter-agency coordination—undermines deterrence. This creates a governance deficit where the law exists formally but lacks practical enforcement, thereby eroding public trust in state institutions.
4. Content-Based Offences and Social Stability
Ige’s findings indicate that most cybercrime cases in PNG are content-related offences—including defamation, harassment, and online threats. This diverges from global patterns where financial cybercrime dominates.
From a theoretical standpoint, this aligns with human security frameworks (as developed by scholars such as UNDP 1994 and later expanded by Buzan, Wæver, and de Wilde in their securitisation theory). These offences directly affect individual safety, dignity, and societal cohesion. In PNG’s context—where social fragmentation can quickly escalate—misinformation and online hostility pose real risks to political stability and community relations.
5. Adapting Security Strategies to Digital Realities
Watson identifies urbanisation and cyber threats as converging drivers of insecurity in the Pacific. This reinforces broader security scholarship that emphasises the changing nature of threats in developing states.
PNG’s national and regional strategies must therefore integrate cyber risk into mainstream security planning. This includes embedding cybersecurity into infrastructure development, enhancing digital literacy, and aligning national strategies with regional frameworks. Traditional security paradigms—focused on territorial defence—are no longer sufficient in a digitally interconnected environment.
6. The Coordination Imperative
Ige strongly advocates for a coordinated national cybersecurity architecture, aligning institutions such as PNGCERT, the National Cyber Security Centre, and the RPNGC Cybercrime Unit.
This reflects a broader governance principle in security studies: fragmentation undermines effectiveness. Institutional barriers—capacity constraints, overlapping mandates, funding limitations, and inconsistent political will—create systemic inefficiencies. Without a unified approach, PNG’s cyber defence posture remains reactive rather than strategic.
7. Feasibility of Advanced Cyber Policing Models
Ige proposes forward-leaning mechanisms such as cyberspace policing and a PNG Cyberspace Asset Recovery Team, drawing on international models like the FBI’s IC3 and Australia’s cyber frameworks.
However, feasibility must be assessed within PNG’s resource constraints. The strategic pathway is not replication but adaptation. PNG should prioritise partnerships—with Australia, regional organisations, financial institutions, and telecommunications providers. This reflects insights from global cybersecurity governance literature, which emphasises public-private partnerships as critical to disrupting cybercrime networks and enabling asset recovery.
Strategic Takeaway
The synthesis of Ige’s empirical work and Watson’s regional security analysis leads to a clear conclusion: cyber security must be elevated to the highest levels of national policy—specifically the National Security Council and National Executive Council.
Cyber threats in PNG are no longer peripheral. They intersect with governance, economic stability, and social cohesion. As the country deepens its digital transformation, the policy imperative is to transition from fragmented, reactive measures to a coordinated, strategic, and forward-looking national cybersecurity framework.
The risk is not theoretical. Without decisive action, PNG will face structural vulnerabilities that compromise both state authority and societal resilience in the digital age.

Comments
Post a Comment