Connexion
  • Mon espace
RDN Association loi 1904, fondée en 1939 RDN Le débat stratégique depuis 1939
  • Panier - 0 article
  • La Revue
  • e-RDN
    • Tribune
    • e-Recensions
    • Cahiers de la RDN
    • Débats stratégiques
    • Florilège historique
    • Repères
    • Brèves
  • Boutique
    • Abonnements
    • Crédits articles
    • Points de vente
    • Conditions générales de vente
  • Bibliothèque
    • Recherche
    • Auteurs
    • Anciens numéros
  • La RDN
    • Présentation
    • Comité d'études
    • L'équipe
    • Contact
    • Lettre d'infos
    • Agenda
  • Liens utiles
  • Mon espace
  • Connexion
  • Connexion

    Email :

    Mot de passe :

  • La Revue
  • e-RDN
    • Tribune
    • e-Recensions
    • Cahiers de la RDN
    • Débats stratégiques
    • Florilège historique
    • Repères
    • Brèves
  • Boutique
    • Abonnements
    • Crédits articles
    • Points de vente
    • Conditions générales de vente
  • Bibliothèque
    • Recherche
    • Auteurs
    • Anciens numéros
  • La RDN
    • Présentation
    • Comité d'études
    • L'équipe
    • Contact
    • Lettre d'infos
    • Agenda
  • Liens utiles
  • Accueil
  • e-RDN
  • Revue n° 883 October 2025
  • When the Floodgates Open in Overseas Territories: Lessons from Cyberattacks on the Caribbean

When the Floodgates Open in Overseas Territories: Lessons from Cyberattacks on the Caribbean

Kristel M. De Nobrega, Anne-Françoise Rutkowski, Paul C. Fenema (van), "When the Floodgates Open in Overseas Territories: Lessons from Cyberattacks on the Caribbean " Revue n° 883 October 2025

The West Indies are composed of island states in the Caribbean Sea, their small size rendering them sensitive to cyber-attacks from a wide range of sources. There is a need to increase international cooperation between the Caribbean islands whilst not forgetting the significant role played by former colonial powers. Such sensitivities are exploited in order to destabilise and must therefore be countered.

Incidents of hybrid attacks have spiked across the EU since Russia invaded Ukraine, with at least 100 being recorded in 2024 alone.(1) In March 2024, several French ministries have been victims of DDoS cyberattacks of increasing intensity. The responsibility has been claimed by Anonymous Sudan, pro-Kremlin hackers.(2) In April–May 2024, the University of French Guiana was targeted by ransomware attacks. Local authorities suspected that the infiltration was carried out for the purpose of Russian propaganda.(3) During the summer of 2025, multiple territories in the Dutch Caribbean, specifically Aruba, Curaçao, and Sint Maarten(4) experienced waves of cyberattack within days of each other.(5) On July 23rd, the Joint Court of Justice, serving the Dutch Caribbean, suffered a cyberattack disrupting email systems. On July 24, Curaçao’s Tax Office was attacked leading to days of service outages impacting the Dutch Tax and Customs Administration. On August 5th, the Aruban Parliament launched a phishing prevention campaign prompting public warnings not to open suspicious email, after one of its official email accounts was compromised. Targeting such territories offers offenders multidimensional gains, from exploiting local tensions to causing direct repercussions on the parent state. While these incidents in the Dutch Caribbean attracted little coverage in the media, the perpetrators of these attacks remain the usual suspects. Often, isolated “random” and “non-critical” actions targeting small states turn out to be part of more intricate cyber-operations. Even seemingly minor cyberattacks can trigger cascading effects across interdependent Critical Infrastructures (CIs) disrupting entire supply networks in small ecosystems with severe consequences.

This article argues that small states, particularly overseas territories, are especially attractive soft targets for cyber offenders. It presents preliminary findings from an embedded case study conducted within Aruba. Aruba, a former Dutch colony and autonomous member of the Kingdom of the Netherlands, sits at a strategic crossroads near South America and hosts a U.S. Forward Operating Location. These geopolitical ties, combined with its colonial legacy and limited human and technological resources (brain drain, lack of specialized units, budget limitation) heighten its exposure to cyber threats in times of global tension. The study highlights challenges of fragmentation and scarce capacity, and explores strategies to strengthen cross-sector collaboration and build cohesive defensive networks through Unity of Effort (UoE). Data was collected from letters of intent on cyber CI protection, institutional documents, recovery and continuity plans, also from confidential conversations, interviews (four principles of UoE) with members of operational-level cybersecurity institutions, CEOs and CISOs.

Literature Overview

Security issues have been reported throughout history as a greater threat for smaller than for larger states (Sutton and Payne, 1993). Their economic dependence, geopolitical importance, and the often fragile state of their digital infrastructure make them more vulnerable to cyberattacks. Small-states studies span three main traditions of research approach: the legal one focus on neutrality; the political one focus on dominance and submission; and the rational choice approach focus on military security (Knudsen, 1996). From the two first approaches, smaller states are often left isolated during a cyberattack and seek cooperation with “dominant” institutions and international rules to secure their safety (Bartmann, 2002). Small states will choose peace over war, aiming to remain neutral as market trade is essential to their survival. This historical rational choice is common fact to most small-states and it relates to the key concept of deterrence (Bjøl, 1968). Three strategic preconditions must be present for effective deterrence: a real capability must exist to effectuate actions toward an adversary; the threat must be credible; and one must be able to communicate effectively (Kristiansen and Hoem, 2022). Small and isolated states struggle with all three. Human and technical resources, policies and legal frameworks, as well as strategies are painfully lacking (Ang, 2022). Indeed, small states often possess fewer capacities to devote to security, hence affecting their capabilities to rapidly defend and credibly threaten attackers. Moreover, small states usually are reluctant to attribute the attacks. The cyber forensic capability to gather enough evidences to substantiate geopolitical sensitive attribution is often lacking. As a result, they face dual-resource constraints. On one hand, small states lack resources to reach a sufficient level of security maturity. On the other hand, they must entertain several lines of operations to achieve more robust deterrence in cyberspace. Consequently, opportunistic offenders perceived them as soft targets. In such context, it is crucial to understand and enact network level crisis response integration to mitigate ripple effects of cyberattacks.

Il reste 72 % de l'article à lire

L'article a bien été ajouté au panier.

Mon panierContinuer mes achats

Partagez...

  • Accéder au sommaire du numéro

Avril 2026
n° 889

Des armées innovantes

Je participe au débat stratégique


À vos claviers,
réagissez au dossier du mois

 

Actualités

08-04-2026

Adaptation capacitaire : nouvelle capacité de lutte anti-drone par le drone Reaper de l’AAE

08-04-2026

La DGA commande la 5e FDI à Naval Group

01-04-2026

Un SNA met en œuvre un drone depuis son dry deck shelter

18-03-2026

Vient de paraître : Les armées françaises, Jérôme Pellistrandi dans la collection « Que Sais-je »

Adhérez au CEDN

et bénéficiez d'un statut privilégié et d'avantages exclusifs (invitations...)

Anciens numéros

Accéder aux sommaires des revues de 1939 à aujourd’hui

Agenda

Colloques, manifestations, expositions...

Liens utiles

Institutions, ministères, médias...

Lettre d'infos

Boutique

  • Abonnements
  • Crédits articles
  • Points de vente
  • CGV
  • Politique de confidentialité / Mentions légales

e-RDN

  • Tribune
  • e-Recensions
  • Cahiers de la RDN
  • Florilège historique
  • Repères

Informations

La Revue Défense Nationale est éditée par le Comité d’études de défense nationale (association loi de 1901)

Directeur de la publication : Luc de Rancourt

Adresse géographique : École militaire,
1 place Joffre, Paris VII

Nous contacter

Tél. : 01 44 42 31 90

Email : contact@defnat.com

Adresse : BP 8607, 75325 Paris cedex 07

Publicité : 01 44 42 31 91

Copyright © Bialec Tous droits réservés.