275 research outputs found

    Preventing State-Led Cyberattacks Using the Bright Internet and Internet Peace Principles

    Get PDF
    The Internet has engendered serious cybersecurity problems due to its anonymity, transnationality, and technical shortcomings. This paper addresses state-led cyberattacks (SLCAs) as a particular source of threats. Recently, the concept of the Bright Internet was proposed as a means of shifting the cybersecurity paradigm from self-defensive protection to the preventive identification of malevolent origins through adopting five cohesive principles. To design a preventive solution against SLCAs, we distinguish the nature of SLCAs from that of private-led cyberattacks (PLCAs). We then analyze what can and cannot be prevented according to the principles of the Bright Internet. For this research, we collected seven typical SLCA cases and selected three illustrative PLCA cases with eleven factors. Our analysis demonstrated that Bright Internet principles alone are insufficient for preventing threats from the cyberterror of noncompliant countries. Thus, we propose a complementary measure referred to here as the Internet Peace Principles, which define that the Internet should be used only for peaceful purposes in accordance with international laws and norms. We derive these principles using an approach that combines the extension of physical conventions to cyberspace, the expansion of international cybersecurity conventions to global member countries, and analogical international norms. Based on this framework, we adopt the Charter of the United Nations, the Responsibility of States for Internationally Wrongful Acts, Recommendations by the United Nations Group of Governmental Experts, the Tallinn Manual, and Treaty of the Non-Proliferation of Nuclear Weapons, and others as reference norms that we use to derive the consistent international order embodied by the Internet Peace Principles

    Design and Validation of the Bright Internet

    Get PDF
    Bright Internet research was launched as a core project of the AIS Bright ICT Initiative, which aims to build an ICT-enabled Bright Society. To facilitate research on the Bright Internet, we explicitly define the goals and principles of the Bright Internet, and review the evolution of its principles. The three goals of the Bright Internet are: the realization of preventive security, the provision of the freedom of anonymous expression for innocent netizens, and protection from the risk of privacy infringement that may be caused by preventive security schemes. We respecify design principles to fulfill these seemingly conflicting goals: origin responsibility, deliverer responsibility, identifiable anonymity, global collaboration, and privacy protection. Research for the Bright Internet is characterized by two perspectives: first, the Bright Internet adopts a preventive security paradigm in contrast to the current self-centric defensive protective security paradigm. Second, the target of research is the development and deployment of the Bright Internet on a global scale, which requires the design of technologies and protocols, policies and legislation, and international collaboration and global governance. This research contrasts with behavioral research on individuals and organizations in terms of the protective security paradigm. This paper proposes validation research concerning the principles of the Bright Internet using prevention motivation theory and analogical social norm theory, and demonstrates the need for a holistic and prescriptive design for a global scale information infrastructure, encompassing the constructs of technologies, policies and global collaborations. An important design issue concerns the business model design, which is capable of promoting the propagation of the Bright Internet platform through applications such as Bright Cloud Extended Networks and Bright E-mail platforms. Our research creates opportunities for prescriptive experimental research, and the various design and behavioral studies of the Bright Internet open new horizons toward our common goal of a bright future

    EXPLORATIVE STUDY ON THE CYBER-ATTACK SOURCE TRACEBACK TECHNOLOGIES FOR BRIGHT INTERNET

    Get PDF
    In order to cope with the various types of cyber-attacks in the Internet, several methods of tracking the source of attack have been developed. However, until recently, most of them are defensive security methods rather than preventive one. In order to settle the Bright Internet, which is still in its early stage, it is necessary to establish a technical source tracking method. For this, a standard and evaluation criteria are needed to determine which technology would be appropriate for the Bright Internet requirements. In this paper, we classify cyber-attack source traceback technologies and derive some criteria for the evaluation of the technologies for the Bright Internet. Using the criteria, we can evaluate existing traceback technologies from the perspective of the Bright Internet. In this article, we try to evaluate SAVA, PPM, iTrace, Controlled flooding, Input Debugging, Central Track, IPSec, SPIE(Hash-based), and Marking+Logging methods. Based on this research, future research will require in-depth verification of traceback technologies that reflects all the principles of the Bright Internet in practice

    Is the Repeal of Net Neutrality a Necessary Evil? An Empirical Analysis of Net Neutrality and Cybercrime

    Get PDF
    While net neutrality guarantees equal access to the Internet and online content, it serves as a limiting factor in identifying and tracking criminal activities in cyberspace by ensuring that data packet is transmitted with equal priority, irrespective of its source and content. Exploiting a natural experiment in which net neutrality policies were officially repealed in 2018 in the United States, this study examines the impact of net neutrality on the occurrence of cybercrime. Our findings suggest that the repeal of net neutrality is negatively associated with the occurrence of malicious code and content in an attempt to compromise computer systems (e.g., malware and ransomware). In contrast, we do not find any significant relationship with cybercrime victimization, and cybercrime that may subsequently occur in compromised systems (e.g., data breaches and denial-of-service attacks). This study provides novel insights into the role of net neutrality and open Internet toward the preventive cybersecurity paradigm

    Cyberterrorism within the Broader International Counter-Terrorism Framework

    Get PDF
    Terrorism has caused a tremendous amount of direct and indirect human suffering on a global scale in the 20th and 21st centuries. As a response, a vast collection of international and domestic regulation to combat this fundamental threat has emerged during the last few decades. However, the advent of the internet and the rapid wave of technological advancement that has resulted from it have created a new type of terrorist threat, that of cyberterrorism. The central aim of this thesis is to compare the global counter-terrorism framework applicable to conventional terrorism with that applied specifically to cyberterrorism and to analyze their potential similarities and discrepancies in a larger context. This comparison is performed through an analysis of the central sources of international counter-terrorism regulation such as the U.N. “sectoral treaties” on terrorism, the (negotiated) U.N. Draft Comprehensive Convention on Terrorism and customary international law. This thesis seeks to also highlight some of the inherent biases of international law and how they are reflected in the global counter-terrorism framework. This thesis presents a generally critical view of the prevailing counter-terrorism framework based on a combination of constructivist and hermeneutic ideas, including deconstruction, post-structuralism and social constructionism. In addition to legal dogmatism, the methods of phenomenography and phenomenology are also used in the thesis’ analysis of the subjects, norms and legislative theories of counter-terrorism and cyberterrorism regulation. Based on the analysis of this thesis, the main weaknesses of the current international framework are the lack of a general definition of terrorism in both treaty and customary law and the politically sensitive issue of whether to include in the normative instruments the exceptions for state terrorism and for the right of freedom movements to resist foreign occupation under their right of self-determination. These issues, in addition to the specific problem regarding attribution in cyberspace, are also the central weak points of cyberterrorism regulation. Several elements of the current response to terrorism are also guided by domestic and global politics, islamophobia and neo-colonialism. This thesis concludes that, despite its flaws, the most effective and justified solution to the aforementioned issues would be to either finally conclude the U.N. Draft Comprehensive Convention on Terrorism or to draft new “sectoral” international treaties that are specifically targeted at cyberterrorist threats.Terrorismi on aiheuttanut suunnattoman määrän suoraa ja epäsuoraa kärsimystä maailmanlaajuisesti 1900- ja 2000-luvuilla. Tämän seurauksena viime vuosikymmeninä on säädetty laaja kokoelma kansallisia ja kansainvälisiä säädöksiä terrorismin uhan torjumiseksi. Internetin yleistyminen ja sitä seurannut räjähdysmäinen teknologinen kehitys on kuitenkin luonut uudentyyppisen terrorismiuhan, kyberterrorismin. Tämän tutkielman tavoitteena on verrata tavanomaiseen terrorismiin ja kyberterrorismiin sovellettavia kansainvälisiä säädöskehikkoja keskenään ja analysoida niiden potentiaalisia yhtäläisyyksiä ja eroja laajemmassa kontekstissa. Tämä vertailu toteutetaan analysoimalla keskeistä kansainvälistä terrorismilainsäädäntöä kuten Y.K.:n ”sektoraalisia” terrorismisopimuksia, luonnosta Y.K.:n kokonaisvaltaiseksi terrorismisopimukseksi sekä kansainvälistä tapaoikeutta. Tutkielma pyrkii myös korostamaan eräitä kansainvälisen oikeuden rakenteellisia, haitallisia ennakkoasenteita ja sitä miten ne heijastuvat kansainväliseen terrorisminvastaiseen sääntelyyn. Tutkielma esittää yleisesti kriittisen näkemyksen voimassaolevasta kansainvälisestä terrorismisääntelykehikosta pohjautuen konstruktivistisiin ja hermeneuttisiin ideoihin kuten dekonstruktioon, post-strukturalismiin ja sosiaalisen konstruktionismiin. Lainopin lisäksi tutkielmassa hyödynnetään fenomenografiaa ja fenomenologiaa analysoitaessa terrorismin- ja kyberterrorisminvastaisen sääntelyn subjekteja, säännöksiä ja oikeudellisia teorioita. Tutkielman analyysiin perustuen, nykyisen kansainvälisen sääntelykehikon keskeisimmät heikkoudet ovat terrorismin yleisen määritelmän puuttuminen sekä kansainvälisissä sopimuksissa että tapaoikeudessa ja poliittinen ongelma siitä, pitäisikö oikeudellisiin instrumentteihin sisällyttää poikkeukset valtionterrorismille sekä vapautusliikkeiden oikeudelle vastustaa vieraan vallan miehitystä itsemääräämisoikeutensa perusteella. Nämä ongelmat, yhdessä kyberavaruuden aiheuttaman erillisen syyksilukemisen problematiikan, kanssa ovat myös kyberterrorismisääntelyn heikoimmat kohdat. Useat elementit nykyisestä terrorisminvastaisesta sääntelystä ovat myös kansallisen ja kansainvälisen politiikan, islamofobian sekä uuskolonialismin ohjaamia. Tämä tutkielma päätyy siihen johtopäätökseen, että, siihen liittyvistä puutteista huolimatta, tehokkain ja oikeudenmukaisin keino edellä kuvattujen ongelmien ratkaisemiseen olisi joko lopulta hyväksyä Y.K.:n kansainvälinen kokonaisvaltainen terrorismisopimus tai säätää uusia, erityisesti kyberterrorismiuhkien torjuntaan kohdistettavia ”sektoraalisia” sopimuksia

    Business Warfare

    Get PDF
    Businesses are under attack. State and non-state adversaries are assaulting companies using drones, mercenaries, cyberweapons, sanctions, and restrictions. Instead of military installations and government institutions, private firms are often the preferred targets in this mode of warfare. Instead of soldiers and squadrons with bullets and bombs, the weapons of choice are frequently economic hostilities and cyberattacks. This is the new war on business. This Article offers an original examination of contemporary business warfare, its growing importance to national and corporate affairs, and the need for better pragmatic approaches to understanding and addressing its rising threat to our economic stability, national security, and social welfare. It begins by providing an overview of the business theater of war, investigating the combatants, targets, and weapons. Next, this Article analyzes recent episodes of business warfare involving the United States, Russia, Iran, Saudi Arabia, and China to ground the theoretical discussion in the real world. These case studies illustrate the complex matrix of considerations posed by business warfare. The Article then contends with the fundamental legal and practical tensions of economic impact, business hostilities, cyberattacks, and non-state actors that emanate from business warfare. Finally, moving from problems to solutions, this Article proposes three workable initiatives to better protect firms and nations against the risks of business warfare. Specifically, it argues for robust business war games, smart cybersecurity guidance and incentives, as well as greater supply chain and market diversification. Ultimately, this Article aspires to provide a practical blueprint for government and corporate leaders to reflect, plan, and act with more urgency about the consequential realities of business warfare

    Cyber defensive capacity and capability::A perspective from the financial sector of a small state

    Get PDF
    This thesis explores ways in which the financial sectors of small states are able todefend themselves against ever-growing cyber threats, as well as ways these states can improve their cyber defense capability in order to withstand current andfuture attacks. To date, the context of small states in general is understudied. This study presents the challenges faced by financial sectors in small states with regard to withstanding cyberattacks. This study applies a mixed method approach through the use of various surveys, brainstorming sessions with financial sector focus groups, interviews with critical infrastructure stakeholders, a literature review, a comparative analysis of secondary data and a theoretical narrative review. The findings suggest that, for the Aruban financial sector, compliance is important, as with minimal drivers, precautionary behavior is significant. Countermeasures of formal, informal, and technical controls need to be in place. This study indicates the view that defending a small state such as Aruba is challenging, yet enough economic indicators indicate it not being outside the realm of possibility. On a theoretical level, this thesis proposes a conceptual “whole-of-cyber” model inspired by military science and the VSM (Viable Systems Model). The concept of fighting power components and governance S4 function form cyber defensive capacity’s shield and capability. The “whole-of-cyber” approach may be a good way to compensate for the lack of resources of small states. Collaboration may be an only out, as the fastest-growing need will be for advanced IT skillsets

    Governing Cyberspace: Behavior, Power and Diplomacy

    Get PDF
    Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and interdisciplinary, but much of the literature has been organized according to discipline. Seeking to cross disciplinary boundaries, this timely book brings together researchers in fields ranging from international law, international relations, and political science to business studies and philosophy to explore the theme of responsible state behavior in cyberspace. . Divided into three parts, Governing Cyberspace first looks at current debates in and about international law and diplomacy in cyberspace. How does international law regulate state behaviour and what are its limits? How do cyber superpowers like China and Russia shape their foreign policy in relation to cyberspace? The second focuses on power and governance. What is the role for international organisations like NATO or for substate actors like intelligence agencies? How do they adapt to the realities of cyberspace and digital conflict? How does the classic balance of power play out in cyberspace and how do different states position themselves? The third part takes a critical look at multistakeholder and corporate diplomacy. How do global tech companies shape their role as norm entrepreneurs in cyberspace, and how do their cyber diplomatic efforts relate to their corporate identity
    • …
    corecore