24,184 research outputs found

    The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law

    Get PDF
    This paper scrutinizes and highlights imminent need to regulate cyber terrorism pheromone in line with principle of international law. In so doing, this paper intends to ascertain legal basis to regulate cyber terrorism at international level. It explains the normative conduct by drawing on adjustments of certain member states of European Union as well as from none-European member states. Particular attention will be given as to how Kosovo has addressed cyber terrorism within its legal framework of criminal acts. The paper also addresses practical consequences of cyber terrorism in context of cyber attacks events in attempt to establish legal basis for its prevention and punishment of cyber criminals wherever it happens. The author articulates its arguments by examining the presumed threats as a result of cyber terrorism activities, as well as based on well-known cyber terrorist behaviors and constant literature that insinuate that cyber attacks are imminent threats. Lastly, as there is neither a particular treaty nor State practices, the author considers of utmost importance to spell out different views and statistics alluding that the need to regulate cyber terrorism in line with principle of international criminal law is a necessity

    Counter Cyber Terrorism Governance In Indonesia

    Get PDF
    Information and communication technology has a significant impact on various aspects. Its developments affect daily life, and also give a new color to the political-security dynamics, especially in Indonesia. This depends on the purpose of using information and communication technology, which if not regulated, will become a double-edged sword. The typology of threats is also increasingly varied and transforming, including in the context of security threats in the form of terrorism which involves many dimensions ranging from religion-based terrorism to cyber-based terrorism. The state's response to cyber terrorism as a new security threat phenomenon is examined in this paper in a balanced way using an inward-looking and outward-looking perspective. By using qualitative research methods and descriptive research types, the existing data related to what has been done by Indonesia are interpreted into the form of a governance conception in the context of countering cyber terrorism. Indonesia has identified domestic conditions to be able to optimize its resources. At the same time, Indonesia is also trying to improve its capabilities by conducting international cooperation. So that the governance of countering cyber terrorism in Indonesia still leaves several problems that need to be resolved, such as institutional barriers including organizational culture which is the key to coordination between institutions related to countering cyber terrorism in Indonesia

    Cybersecurity: mapping the ethical terrain

    Get PDF
    This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others. Foreword Governments and society are increasingly reliant on cyber systems. Yet the more reliant we are upon cyber systems, the more vulnerable we are to serious harm should these systems be attacked or used in an attack. This problem of reliance and vulnerability is driving a concern with securing cyberspace. For example, a ‘cybersecurity’ team now forms part of the US Secret Service. Its job is to respond to cyber-attacks in specific environments such as elevators in a building that hosts politically vulnerable individuals, for example, state representatives. Cybersecurity aims to protect cyberinfrastructure from cyber-attacks; the concerning aspect of the threat from cyber-attack is the potential for serious harm that damage to cyber-infrastructure presents to resources and people. These types of threats to cybersecurity might simply target information and communication systems: a distributed denial of service (DDoS) attack on a government website does not harm a website in any direct way, but prevents its normal use by stifling the ability of users to connect to the site. Alternatively, cyber-attacks might disrupt physical devices or resources, such as the Stuxnet virus, which caused the malfunction and destruction of Iranian nuclear centrifuges. Cyber-attacks might also enhance activities that are enabled through cyberspace, such as the use of online media by extremists to recruit members and promote radicalisation. Cyber-attacks are diverse: as a result, cybersecurity requires a comparable diversity of approaches. Cyber-attacks can have powerful impacts on people’s lives, and so—in liberal democratic societies at least—governments have a duty to ensure cybersecurity in order to protect the inhabitants within their own jurisdiction and, arguably, the people of other nations. But, as recent events following the revelations of Edward Snowden have demonstrated, there is a risk that the governmental pursuit of cybersecurity might overstep the mark and subvert fundamental privacy rights. Popular comment on these episodes advocates transparency of government processes, yet given that cybersecurity risks represent major challenges to national security, it is unlikely that simple transparency will suffice. Managing the risks of cybersecurity involves trade-offs: between security and privacy; individual rights and the good of a society; and types of burdens placed on particular groups in order to protect others. These trade-offs are often ethical trade-offs, involving questions of how we act, what values we should aim to promote, and what means of anticipating and responding to the risks are reasonably—and publicly—justifiable. This Occasional Paper (prepared for the National Security College) provides a brief conceptual analysis of cybersecurity, demonstrates the relevance of ethics to cybersecurity and outlines various ways in which to approach ethical decision-making when responding to cyber-attacks

    Perspectives for Cyber Strategists on Law for Cyberwar

    Get PDF
    The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber events in ways that can confuse decision makers and strategists alike. The WikiLeaks phenomenon is but the latest in a series of recent cyber-related incidents––ranging from cyber crises in Estonia and Georgia to reports of the Stuxnet cyberworm allegedly infecting Iranian computers––that have contributed to a growing perception that “cyberwar” is inevitable, if not already underway. All of this generates a range of legal questions, with popular wisdom being that the law is inadequate or lacking entirely. Lt Gen Keith B. Alexander, the first commander of US Cyber Command, told Congress at his April 2010 confirmation hearings that there was a “mismatch between our technical capabilities to conduct operations and the governing laws and policies.” Likewise, Jeffrey Addicott, a highly respected cyber-law authority, asserts that “international laws associated with the use of force are woefully inadequate in terms of addressing the threat of cyberwarfare.” This article takes a somewhat different tact concerning the ability of the law of armed conflict (LOAC) to address cyber issues. Specifically, it argues that while there is certainly room for improvement in some areas, the basic tenets of LOAC are sufficient to address the most important issues of cyberwar. Among other things, this article contends that very often the real difficulty with respect to the law and cyberwar is not any lack of “law,” per se, but rather in the complexities that arise in determining the necessary facts which must be applied to the law to render legal judgments

    Meeting the Challenge of Cyberterrorism: Defining the Military Role in a Democracy

    Get PDF
    Denna forskningskonsumtion strÀvar efter att utifrÄn tvÄ frÄgestÀllningar undersöka dels var det deliberativa samtalets möjligheter och begrÀnsningar ligger, dels undersöka hur det deliberativa samtalet pÄverkar lÀrarrollen i klassrummet. Detta sker genom en systematisk litteraturstudie som behandlar ett urval av relevanta svenska författare och Àven ett par internationella engelsksprÄkiga författare. Det deliberativa samtalet Àr en kommunikativ metod dÀr samförstÄelse, konsensus och demokrati stÄr i fokus. Tomas Englund, en av de mest uppmÀrksammade föresprÄkare av metoden beskriver det deliberativa samtalet med en rad punkter. Dessa punkter beskriver samtalet som att det ska ge olika argument utrymme, samtalet ska vara tolerant, samtalet ska ha inslag av kollektiv viljebildning, traditionella uppfattningar ska ifrÄgastÀllas och samtalet ska helst utesluta lÀrarledning. Det deliberativa samtalet har av bl.a. Skolverket lyfts fram som en  metod som ska gynna vÀrdegrundsarbetet i skolan. Runt millenieskiftet hade det deliberativa samtalet samt vÀrdegrundsarbetet fÄtt en allt mer central del i skolan dÀr Tomas Englund var en av de mest framtrÀdande föresprÄkarna av metoden. Ytterligare styrkor i samtalet kunde Àven förstÄs som dess potential i att kunna implementeras i andra kommunikativa situationer inom flertalet Àmnen. Trots att föresprÄkarna av det deliberativa samtalet kan lyfta mÄnga styrkor hos metoden finns fortfarande flera invÀndningar. De frÀmsta styrkorna som lyfts ur det deliberativa samtalet Àr vÀrdegrundsarbetet och samtalets tillÀmpningsbarhet, men de mer kritiska författarna vill gÀrna uppmÀrksamma hur det tÀmligen strukturerade samtalet kan pÄverka klassrummet och dess dynamik mellan lÀrare och elever. Hur ska exempelvis lÀraren förena sin position som betygsÀttande maktfigur med att hÄlla samtalet sÄ öppet och tolererande som möjligt, oavsett Äsikter som tas upp? Hur ska retoriska fÀrdigheter hos eleverna behandlas nÀr samtalet ska vara öppet och inkluderande? Forskningskonsumtionen lyfter Àven hur sociala och kulturella faktorer spelar in pÄ elevers förmÄga att deltaga i samtalet och lyfter genom författarna fram en diskussion om samtalets lÀmplighet i klassrummet, frÀmst genom dess deltagare som utgÄngspunkt. Slutsatsen hÀrleds till att lÀmpligheten hos det deliberativa samtalet i klassrummet kan kondenseras ned till frÄgan om förutsÀttningarna i klassrummet. Det deliberativa samtalet Àr ingen universallösning för vÀrdegrundsarbete, men har samtidigt en rad andra styrkor som Àr vÀrda att lyfta fram. Författarna saknar Àven en enhÀllig lösning över vilken roll lÀraren ska ha i samtalet och saknar Àven en riktig diskussion om hur det deliberativa samtalet ska behandla konflikter nÀr samtalet drivs till sin spets

    Sovereignty in cyberspace: lex lata vel non?

    Get PDF
    Globalization has not conquered sovereignty. Instead, the notion of sovereignty occupies center stage in discussions concerning the normative architecture of cyberspace. On the diplomatic level, the term is generally cast in its broadest sense, one that signifies freedom from external control and influence. For instance, when western States raise the issue of human rights in cyberspace, those occupying the opposite side of the negotiating table fall back on sovereignty-based arguments. Mention of sovereignty in consensus documents is consequently often the price that liberal democracies pay for recognition of their policy priorities, such as individual freedoms and the availability of self-help measures in response to hostile cyber operations Unfettered by the constraints of political agendas and negotiating tactics, the international law academy has tended to approach the notion from a normatively analytical perspective. For legal scholars, the question of how the principle of sovereignty, as well as its derivate rules, govern cyber activities by and against States has become a dominant topic on the research agenda. This article assesses a recent controversy over whether sovereignty is a primary rule of international law, sets forth the authors’ views on sovereignty violations in cyberspace, and highlights several resultant policy issues

    CYBERTERRORYZM ,,KONIEM TROJAƃSKIM” W DOBIE GLOBALIZACJI

    Get PDF
    The aim of the article is the general characterization of cyberterrorism as a new and constantly evolving form of terrorism. The phenomenon was described in the context of globalization processes and the main definitions of terrorism were cited, followed by the specific factors determining cyberterrorism. The article was based on an analysis of source documents – legislation on terrorismprevention and cyberspace protection. Definitions review was performed. The results of earlier research related to the topic of work are quoted.It has been assessed that in the future the threat of cyber-attacks will be a challenge for states and international organizations. The development of modern technologies and the creation of computerized societies is a factor that provides new areas of action for terrorists. Potential targets of attacks are varied and difficult to protect. Preventive actions should be characterized by a comprehensive approach to the problem and systemic, long-term action in the international sphere.The aim of the article is the general characterization of cyberterrorism as a new and constantly evolving form of terrorism. The phenomenon was described in the context of globalization processes and the main definitions of terrorism were cited, followed by the specific factors determining cyberterrorism. The article was based on an analysis of source documents – legislation on terrorism prevention and cyberspace protection. Definitions review was performed. The results of earlier research related to the topic of work are quoted. It has been assessed that in the future the threat of cyber-attacks will be a challenge for states and international organizations. The development of modern technologies and the creation of computerized societies is a factor that provides new areas of action for terrorists. Potential targets of attacks are varied and difficult to protect. Preventive actions should be characterized by a comprehensive approach to the problem and systemic, long-term action in the international sphere

    The Trickle-Down War

    Get PDF
    The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and more technologically sophisticated armies. The complexity and expense of maintaining more professionalized standing armies made it increasingly difficult for non-state groups to compete with states, giving centralized states a war-making advantage and enabling them to increasingly monopolize the means of large-scale violence. But the need to recruit, train and sustain ever-larger and more sophisticated armies also put pressure on these states to provide basic services, improving nutrition, education, and so on. Ultimately, we arrive at the late 20th century European welfare state, with its particular trade-offs between the state and its subjects
    • 

    corecore