http://news.techworld.com/security/3...-cyberwarfare/A cybersecurity think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply.
The manual comes from experts working with the Cooperative Cyber Defense Center of Excellence (CCDCOE), an institute based in Tallinn, Estonia, founded in 2008 that assists NATO with technical and legal issues associated with cyberwarfare-related issues.
The centre's 215-page study, the 'Tallinn Manual on the International Law Applicable to Cyber Warfare', is intended as a reference for legal advisers for government agencies. It examines existing international law that allows countries to legally use force against other nations, as well as laws governing the conduct of armed conflict.
A scrimmage in a Border Station
A canter down some dark defile
Two thousand pounds of education
Drops to a ten-rupee jezail
http://i.imgur.com/IPT1uLH.jpg
Given the recent manifesto by VADM's Card and Rogers in USNI Proceedings
("The Navy's Newest Warfighting Imperative") regarding the criticality of
cyberspace to the Navy's future, done in breathless metaphors to military
operations in the "other" domains, Dr. Libicki offers an important
"minority report" questioning the appropriateness of those metaphors, and
the overall philosophy behind our emerging doctrine for using cyberspace
(and information more generally) to relative advantage.
I think it unfortunate that this important essay languishes in a somewhat
obscure Law Journal, at least from the point of view of the military
audience that it could benefit. I think we are in danger of going down the
primrose path of wishful thinking we did with JV2010 in painting the
picture the good VADM's Proceedings article does about how to realize the
benefits and mitigate the risks associated with cyberspace, in terms of how
we deal with physical domains. The deja vu associated with the siren song
of "information dominance" harkens back to how the "fog of war" was going to
be lifted in JV2010 if only we interconnected everything and Metcalf's law
paid us the bonanza. Dr. Libicki makes a strong argument that leveraging
cyberspace may best be done on its own terms, and not through treating it
as another peg to be mashed into an ill-fitting doctrinal "domain" hole.
http://moritzlaw.osu.edu/students/gr.../4.Libicki.pdf
Hat tip to my colleague Bob Manke for bringing this to my attention.
"All models are wrong, but some are useful"
-George E.P. Box
http://www.guardian.co.uk/technology...ing?CMP=twt_gu
This is what Unit 61398 really represents: not just the ambitions of a stirring China, but the growing to maturity of a new ecosystem of warfare, espionage, activism and criminality. Last week a retired CIA director, Michael Hayden, compared it to the dawning of the atomic age at Hiroshima, saying: "This has the whiff of August 1945."
http://www.theatlantic.com/technolog...ors_picks=true
Will 'Digital Ethnic Cleansing' Be Part of the Internet's Future?
Eric Schmidt, Jared Cohen, and Steve Clemons discuss the political limitations of the Internet.
And they might ultimately engage, Cohen continued, in a kind of "digital ethnic cleansing." Traditional legal and political checks on mass criminality have been developed within and for the physical world, he noted; in the digital, however, those checks are less developed. The web is simply too new. And you could imagine autocratic regimes or other communities taking advantage of that, creating a scenario in which one group finds a way to, for example, filter another group's content from the web. Or to shut down -- or severely slow down -- their Internet access. Or to infiltrate them with malware and/or orchestrate elaborate denial-of-service (DDoS) attacks. One group, in other words, could essentially annihilate the digital existence of another.Their new book looks promising.When people in the virtual community begin to misbehave, committing crimes that wouldn't be legal in the physical space, we currently have very few mechanisms for correction. As that reality plays out on the geopolitical stage, he said, you could have "this bizarre situation" in which, say, the U.S. and China have a generally good relationship in the physical world: cash flow, open communications, travel between the two countries, etc. And yet behind the scenes -- in the digital world -- those countries could be, effectively, waging war on each other through their digital infrastructure.
"The New Digital Age: Reshaping the Future of People, Nations and Business"
http://www.amazon.com/The-New-Digita.../dp/0307957136
Much of it is focused on the future of States, Terrorism, War, etc., and they don't paint a rosy picture.
Evgeny Morozov has become notorious for his takedowns of technology pundits and giants - he is the intellectual equivalent of a Mongol horde unleashed upon Silicon Valley. He gave no quarter Schmidt and Cohen in his review The New Digital Age:
Future Shlock - Meet the two-world hypothesis and its havoc, by Evgeny Morozov. New Republic, 27 May 2013.
The whole review is just brutal.Schmidt and Cohen are at their most shallow in their discussion of the radicalization of youth (which was Cohen’s bailiwick at the State Department before he discovered the glorified world of futurology). “Reaching disaffected youth through their mobile phones is the best possible goal we can have,” they announce, in the arrogant voice of technocrats, of corporate moguls who conflate the interests of their business with the interests of the world. Mobile phones! And who is “we”? Google? The United States?
The counter-radicalization strategy that Schmidt and Cohen proceed to articulate reads like a parody from The Onion. Apparently, the proper way to tame all those Yemeni kids angry about the drone strikes is to distract them with—ready?—cute cats on YouTube and Angry Birds on their phones. “The most potent antiradicalization strategy will focus on the new virtual space, providing young people with content-rich alternatives and distractions that keep them from pursuing extremism as a last resort,” write Cohen and Schmidt. For—since the technology industry
" produces video games, social networks, and mobile phones—it has perhaps the best understanding of how to distract young people of any sector, and kids are the very demographic being recruited by terror groups. The companies may not understand the nuances of radicalization or the differences between specific populations in key theaters like Yemen, Iraq, and Somalia, but they do understand young people and the toys they like to play with. Only when we have their attention can we hope to win their hearts and minds."
Note the substitution of terms here: “we” are no longer interested in creating a “sea of newly informed listeners” and providing the Yemeni kids with “facts.” Instead, “we” are trying to distract them with the kinds of trivia that Silicon Valley knows how to produce all too well. Unfortunately, Cohen and Schmidt do not discuss the story of Josh Begley, the NYU student who last year built an app that tracked American drone strikes and submitted it to Apple—only to see his app rejected. This little anecdote says more about the role of Silicon Valley in American foreign policy than all the futurology between the covers of this ridiculous book.
When someone writes a sentence that begins “if the causes of radicalization are similar everywhere,” you know that their understanding of politics is at best rudimentary. Do Cohen and Schmidt really believe that all these young people are alienated because they are simply misinformed? That their grievances can be cured with statistics? That “we” can just change this by finding the digital equivalent of “dropping propaganda flyers from an airplane”? That if we can just get those young people to talk to each other, they will figure it all out? “Outsiders don’t have to develop the content; they just need to create the space,” Schmidt and Cohen smugly remark. “Wire up the city, give people basic tools and they’ll do most of the work themselves.” Now it’s clear: the voice of the “we” is actually the voice of venture capital.
“[S]omething in his tone now reminded her of his explanations of asymmetric warfare, a topic in which he had a keen and abiding interest. She remembered him telling her how terrorism was almost exclusively about branding, but only slightly less so about the psychology of lotteries…” - Zero History, William Gibson
http://www.npr.org/2014/01/14/262387...s-cyberthreatsEven if cybersecurity isn't a subject you think about a lot, the data breach of credit card information from and customers has probably increased your level of cyber-anxiety.
In Cybersecurity And Cyberwar: What Everyone Needs to Know, P.W. Singer looks at cybersecurity issues faced by the military, government, businesses and individuals, and what happens when you try to balance security with freedom of speech and the ideals of an open Internet.
A scrimmage in a Border Station
A canter down some dark defile
Two thousand pounds of education
Drops to a ten-rupee jezail
http://i.imgur.com/IPT1uLH.jpg
Michael N. Schmitt from the U.S. Naval War College does a lot of great work on cyber.
timothyrayner.com
Bookmarks