By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Effective cyber sanctions require a joined-up approach, says Rusi | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Effective cyber sanctions require a joined-up approach, says Rusi | Computer Weekly
News

Effective cyber sanctions require a joined-up approach, says Rusi | Computer Weekly

News Room
Last updated: 2025/10/29 at 5:04 AM
News Room Published 29 October 2025
Share
SHARE

Over the past few years, the UK, US and other Western states have become comfortable calling out the actions of and applying sanctions to both financially motivated or nation-state threat actors, but according to a report from the Royal United Services Institute (Rusi), the practical impact of the practice is highly uneven.

In the study, Rusi cyber sanctions taskforce: Countering state-backed cyber threats, Rusi research fellow Gonzalo Saiz said that cyber sanctions were not a universal panacea.

“Sanctions will not deter all malicious cyber activity,” he said. “What they can do is complicate operations, raise costs, disrupt enabling infrastructure and signal collective resolve.”

Saiz explained that sanctions can deter adversaries by imposing friction, restricting access to various resources – both financial and technical – and making threat actor networks publicly toxic, such as the UK’s National Crime Agency (NCA) did to LockBit with some success.

However, he warned, cyber sanctions do not deter every threat actor and their practical impact varies wildly. Such measures tend to be most effective when they form part of a wider diplomatic, intelligence or law enforcement-led campaign, rather than just a standalone measure, said Saiz.

The report has its basis in a recent meeting convened by Rusi’s Centre for Finance and Security and its Cyber and Tech team, which brought together sanctions experts, cyber researchers, and current and former government officials from the UK, US and European Union (EU).

Multilateral approach is key

At the meeting, UK officials advocated for a multilateral approach to cyber sanctions, saying that the effectiveness of such measures depends on working alongside partners, such as the US, to lean on additional reach and enforcement capacity.

The UK’s current policy is to position itself as a reliable partner willing to move quickly and in coordination to have maximum effect. Its cyber officials also try to make attributions and call-outs more impactful by being more detailed and including guidance for users to help understand the context of the alert, and take mitigating steps where appropriate.

British officials emphasised that this approach served not only to punish or restrict individuals – which they conceded was tough because the majority of threat actors have no assets in or travel plans to the UK – but shape a wider narrative that can potentially shape threat actor decisions, and those made by third parties, such as crypto exchanges or bulletproof hosting services.

The UK participants did, however, say that because the evidentiary threshold required by the Crown Prosecution Service (CPS) is so high, and arrests of individuals located in and or protected by often hostile states are unlikely, Britain’s ability to use criminal proceedings as a complement to sanctions is limited.

This is in contrast to the US, which has the systemic weight to issue indictments and even, sometimes, to extradite threat actors and bring them to justice.

Indeed, the US has developed the most extensive and sustained practice of cyber sanctions to date, with much of its sanctions framework rooted in an Obama-era executive order that can be, and has been, used against a wide spectrum of targets.

The US approach is characterised by issuing criminal indictments of, and naming and shaming, individuals rather than cyber gangs or espionage units. This is done on the basis that while groups can dissolve or rebrand themselves, individual identities are far more persistent and can be tracked. In particular, the designation of specific officers working for Russian and Chinese intelligence agencies has built a foundation for future actions, and increased the operational and reputational risks involved for them.

Like the British, the Americans have tended to operate on the principle that cyber sanctions work best when used as part of an integrated campaign incorporating public technical advisories and other measures such as diplomatic démarches.

The EU’s cyber sanctions regime, meanwhile, dates back to 2019, and like the UK approach, incorporates asset freezes and travel bans as a core mechanism. It is designed to be somewhat horizontal to enable the EU to act against both cyber criminals and cyber spies alike.

However, in practice, it has been used cautiously, in part because EU sanctions policymaking requires unanimous buy-in from 27 countries. This means that while some member states, such as Estonia, Germany and the Netherlands, do proactively push for action, others – most notably, Hungary – are obstructive, particularly on Russian issues.

EU representatives said the bloc tended to use cyber attributions and sanctions as a signalling tool rather than a disruptive mechanism, building narratives and providing a channel for member states to express their feelings without individually taking on political risk as the UK and US do.

Rusi’s report said that without a larger body of designations and more systematic and transparent enforcement, the EU’s impact on adversary behaviour will remain limited.

Recommendations

Summing up the discussions, the report makes four key recommendations going forward.

Rusi said governments needed to be more specific on their explicit goals to enable more precise targeting and clearer assessments of outcomes, adopt more cross-domain strategies, focus on the enablers of cyber threat activity in addition to the perpetrators, and improve transparency and data on the impact of sanctions.

“Cyber sanctions are an essential but imperfect component of modern deterrence,” wrote Saiz. “While they rarely stop operations outright, they can impose costs that make malicious activity riskier and less profitable.

“The research emphasises that effectiveness depends on coordination, attribution and clarity of purpose. The US experience shows the value of sequencing sanctions with other instruments to deliver cumulative impact; the EU’s experience highlights the need for transparency and data; and the UK’s approach demonstrates the importance of partnership and narrative shaping.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Samsung Health now lets you see a doctor without getting out of your bed
Next Article The Stuff Gadget Awards 2024: our phones of the year | Stuff
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Cute or terrifying? The new Neo robot housekeeper could be yours for £15,000
News
The BBK Foundation offers 500 million for Ayesa’s technology area, which includes Ibermática
Mobile
AMD XDNA Linux Driver Preps For New Ryzen AI “NPU3A” Revision
Computing
AWS Culls Portfolio: Over 20 Services Shift to Maintenance or Sunset
News

You Might also Like

News

Cute or terrifying? The new Neo robot housekeeper could be yours for £15,000

6 Min Read
News

AWS Culls Portfolio: Over 20 Services Shift to Maintenance or Sunset

4 Min Read
News

Want to Take a Picture Without Touching Your iPhone? Here's How

5 Min Read
News

Flipkart’s Super.money teams up with Kotak811 to make India’s free UPI payments pay | News

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?