The Quest for Cyber Confidence

Total Page:16

File Type:pdf, Size:1020Kb

The Quest for Cyber Confidence Contact Information: International Telecommunication Union Place des Nations - 1211 Geneva 20 Switzerland E-mail: [email protected] Website: www.itu.int/cybersecurity 4 ember 201 November 2014 November Nov | CE THE QUEST FOR ISBN 978-92-61-15301-4 NFIDEN CO CONFIDENCE CYBER CONFIDENCE 9 7 8 9 2 6 1 1 5 3 0 1 4 Price: 79 CHF Printed in Switzerland Geneva, November 2014 4 Photo credits: Shutterstock 11/2014 THE QUEST FOR CYBER FOR CYBER FOR CYBER THE QUEST QUEST Couv_cyber-confidence_371690_Ed.indd 2 13/11/2014 14:22:42 International Telecommunication Union THE QUEST FOR CYBER CONFIDENCE By Dr Hamadoun I. Touré Secretary-General of the International Telecommunication Union and the Permanent Monitoring Panel on Information Security World Federation of Scientists NOVEMBER 2014 Legal notice Authors individually retain copyright to their work. Third-party sources are quoted as appropriate. The International Telecommunication Union (ITU) is not responsible for the content of external sources including external websites referenced in this publication. Neither ITU nor any person acting on its behalf is responsible for the use that might be made of the information contained in this publication. Disclaimer The chapters in this publication represent the views of the individual authors, which are not endorsed by or intended to represent the views of any organization they may be employed by or affiliated with. Mention of and references to specific countries, companies, products, initiatives or guidelines do not in any way imply that they are endorsed or recommended by ITU, the authors, or any other organization that the authors are affiliated with, in preference to others of a similar nature that are not mentioned. Acknowledgements The ITU Secretary-General and the World Federation of Scientists would like to thank Henning Wegener, and all the authors who have made it possible to put together their views on this emerging global concern. The Secretary-General expresses gratitude to Prof. Antonino Zichichi, President of WFS. His sincere thanks go to Marco Obiso who led and coordinated this publication and the ITU Cybersecurity team, particularly Alex Gamero Garrido, Aliya Abdul Razack, Despoina Sareidaki, Anthony Drummond, Preetam Maloor and Rosheen Awotar- Mauree as well as many others in ITU and WFS without whose contribution this publication would not have been possible. If you have any comments, please contact the Cybersecurity team, International Telecommunication Union, at [email protected]. Copyright to Collective Work © 2014, International Telecommunication Union & World Federation of Scientists All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. The Quest for Cyber Confidence TABLE OF CONTENTS Page Preface by ITU Secretary-General Dr Hamadoun I. Touré .................................... 1 Preface by World Federation of Scientists President Professor Antonino Zichichi....................................................................................................... 2 Introduction: The Crisis of Cyber Confidence (by Henning Wegener) .................. 3 Chapter I: Cyber Norms ......................................................................................... 9 Introduction .............................................................................................. 9 1.1 The role of CBMs in a renewed vision of international cybersecurity: prospects for a global response and an international treaty (by Solange Ghernaouti) ........................... 10 1.2 UN and Member States’ Approach to Internet Norms, Rules and Principles: Evaluation of the Report of the UN Group of Governmental Experts (by Henning Wegener) .......................... 22 1.3 Does International Law Apply to Cyberspace? (by Gábor Iklódy) .. 31 1.4 United Nations Vision on Cybersecurity (by Hamadoun I. Touré)......................................................................................... 42 Chapter II: Cyber Resilience ................................................................................... 51 Introduction .............................................................................................. 51 2.1 Foundations of Cyber Resilience (by Axel Lehmann) ..................... 53 2.2 Heightening the Resilience of Cloud Computing and Big Data Systems (by Vladimir Britkov) .................................................... 62 2.3 Towards Resilient Cyber Control Systems (by Stefan Lüders) ........ 66 2.4 Cyber Resilience from the Private Sector Perspective (by Danil Kerimi) ........................................................................................ 70 2.5 The Cybersecurity Continuum to Enhance Cyber Resilience (by Solange Ghernaouti) .................................................................. 76 Chapter III: Cyber Freedom ................................................................................... 83 Introduction .............................................................................................. 83 iii The Quest for Cyber Confidence Page 3.1 Cyber Freedom: Progress and Challenges (by Mona Al-Achkar) .... 85 3.2 Legal, Policy & Regulatory Frameworks for Internet Freedom & Big Data (by Pavan Duggal) ........................................................ 101 3.3 A Global Perspective of State Surveillance in Cyberspace (by Howard Schmidt) ....................................................................... 115 3.4 The Extent of State Surveillance in Cyberspace: A European Union Perspective (by Henning Wegener) ................................ 119 3.5 The Limits to Cyber Freedom: A Search for Criteria (by William A. Barletta) ................................................................................. 128 Table of Abbreviations........................................................................................... 141 iv The Quest for Cyber Confidence About the International Telecommunication Union The International Telecommunication Union (ITU) is the leading United Nations agency for information and communication technology issues, and the global focal point for governments and the private sector in developing networks and services. A fundamental role of ITU following the World Summit on the Information Society (WSIS) and the 2006 ITU Plenipotentiary Conference is to build confidence and security in the use of information and communication technologies (ICTs). Heads of States and government and other global leaders participating in WSIS, as well as ITU Member States, entrusted ITU to take concrete steps towards curbing the threats and insecurities related to the information society. To fulfill this mandate, ITU Secretary-General Dr Hamadoun I. Touré launched the Global Cybersecurity Agenda (GCA) as a framework for international multi-stakeholder cooperation in cybersecurity aimed at building synergies with current and future initiatives and partners. It focuses on the following five work areas: Legal measures, Technical and Procedural Measures, Organizational Structures, Capacity Building and International Cooperation. Some key initiatives to assist Members States in building capacity in Cybersecurity under the umbrella of the GCA and with the support of global partners include: The National CIRT programme (Computer Incident Response Team) Programme whereby National CIRT Assessments, National CIRT implementations and regional cyber drills are conducted following request from Member States. The establishment of Regional Cybersecurity Centres with the aim to serve as catalysts for enhancing regional cooperation, coordination and collaboration to address escalating cyber threats. “Enhancing Cybersecurity in Least Developed Countries” project through which ITU assists the LDCs to enhance their capabilities, capacity, readiness, skills and knowledge in the area of cybersecurity. The Global Cybersecurity Index (GCI), a measure of each nation state’s level of cybersecurity development. The GCI aims at providing the right motivation to countries to intensify their efforts in cybersecurity. The ultimate goal is to help foster a global culture of cybersecurity and its integration at the core of information and communication technologies. v The Quest for Cyber Confidence About the World Federation of Scientist The World Federation of Scientists (WFS) was founded in Erice, Sicily, in 1973, by a group of eminent scientists led by Isidor Isaac Rabi and Antonino Zichichi. Since then, many other scientists have affiliated themselves with the Federation, among them T. D. Lee, Laura Fermi, Eugene Wigner, Paul Dirac and Piotr Kapitza. The WFS is a free association, which has grown to include more than 10,000 scientists drawn from 110 countries. All members share the same aims and ideals and contribute voluntarily to uphold the Federation’s Principles. The Federation promotes international collaboration in science and technology between scientists and researchers from all parts of the world – North, South, East and West. The Federation and its members strive towards an ideal of free exchange of information, where scientific discoveries and advances are no longer restricted to a select few. The aim is to share this knowledge among the people of all nations, so that everyone may experience the benefits of the progress of science. The creation of the World Federation of Scientists was made possible by the existence, in Erice, of a centre for scientific culture named after the physicist Ettore Majorana, the Ettore
Recommended publications
  • Cost of a Cyber Incident)
    CO ST OF A CYBER INCIDENT: S YSTEMATIC REVIEW AND C ROSS-VALIDATION OCTOBER 26, 2020 1 Acknowledgements We are grateful to Dr. Allan Friedman, Dr. Lawrence Gordon, Jay Jacobs, Dr. Sasha Romanosky, Matthew Shabat, Kelly Shortridge, Steven Surdu, David Tobar, Brett Tucker and Sounil Yu for the review comments and helpful feedback on the earlier draft of the report. The authors would like to thank CISA staff for support and advice on this project. 2 Table of Contents 1. Objectives .................................................................................................................................................................... 7 2. Results in Brief .......................................................................................................................................................... 8 3. Analysis ...................................................................................................................................................................... 16 3.1. Per-Incident Cost and Loss Estimates .............................................................................................. 18 3.1.1. Cross-Validation: Primary Loss Data for Large and Small Incidents .................................. 20 3.1.2. Reconciliation of Per-Incident Cost Studies .................................................................................. 26 3.1.3. Per-Record Estimates ............................................................................................................................. 29 3.2. Aggregate
    [Show full text]
  • Download Thesis
    This electronic thesis or dissertation has been downloaded from the King’s Research Portal at https://kclpure.kcl.ac.uk/portal/ Cyber security and the politics of time Stevens, Timothy Charles Awarding institution: King's College London The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without proper acknowledgement. END USER LICENCE AGREEMENT Unless another licence is stated on the immediately following page this work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International licence. https://creativecommons.org/licenses/by-nc-nd/4.0/ You are free to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work). Non Commercial: You may not use this work for commercial purposes. No Derivative Works - You may not alter, transform, or build upon this work. Any of these conditions can be waived if you receive permission from the author. Your fair dealings and other rights are in no way affected by the above. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 25. Sep. 2021 1 ] Cyber Security and the Politics of Time Timothy Charles Stevens Thesis submitted in accordance with the requirements for the degree of Doctor of Philosophy King’s College London Department of War Studies November 2013 2 Abstract Time is an under-represented topic in security studies and International Relations (IR).
    [Show full text]
  • Cyber Benefits and Risks: Quantitatively Understanding and Forecasting the Balance
    Cyber Benefits and Risks: Quantitatively Understanding and Forecasting the Balance Extended Project Report from the Frederick S. Pardee Center for International Futures Josef Korbel School of International Studies University of Denver www.pardee.du.edu September 2015 Barry B. Hughes, David Bohl, Mohammod Irfan, Eli Margolese-Malin, and José Solórzano In project collaboration with and the Table of Contents Executive Summary 4 Conceptualizing Benefits and Costs 4 Using the IFs System for Analysis 4 Background Research Foundations 5 Forecasts and Findings 9 Conclusion 11 A Final Note on Study Contributions 12 1. Introduction: Understanding and Anticipating Change in the Benefits and Costs of Cyber Technology 13 2. ICT and Cyber Development Indices 18 Indices Replicated in the IFs Forecasting System 18 ICT Development Index 18 Global Cybersecurity Index 19 Additional Indices of Importance in Cyber Security Analyses 21 Digitization Index 21 Digital Economy Ranking Index 21 Networked Readiness Index 22 3. Benefits 23 Competing Schools of Thought on Economic Benefits 23 Pessimism Versus optimism concerning ICT’s economic production impacts 23 ICT as a general-purpose technology 25 ICT’s Economic Impact: The Production Side 26 ICT as a growth sector in the economy 26 ICT investment and capital services 29 ICT and multifactor productivity 32 Comparing the Productivity Impacts of GPTs: Steam, Electricity, ICT 33 Variation in ICT Impact across Time/Pervasiveness and Countries 36 Drivers of variation in ICT impact: ICT (especially broadband) pervasiveness 36 Drivers of variable ICT impact: Beyond PCs and broadband 39 Drivers of variable ICT impact: Country development level 41 Consumer Surplus 42 Consumer surplus forecasts 46 Summary of Knowledge Concerning Cyber Risk Benefits: Modeling Implications 47 4.
    [Show full text]
  • Deutsche Nationalbibliografie
    Deutsche Nationalbibliografie Reihe T Musiktonträgerverzeichnis Monatliches Verzeichnis Jahrgang: 2015 T 05 Stand: 20. Mai 2015 Deutsche Nationalbibliothek (Leipzig, Frankfurt am Main) 2015 ISSN 1613-8945 urn:nbn:de:101-ReiheT05_2015-7 2 Hinweise Die Deutsche Nationalbibliografie erfasst eingesandte Pflichtexemplare in Deutschland veröffentlichter Medienwerke, aber auch im Ausland veröffentlichte deutschsprachige Medienwerke, Übersetzungen deutschsprachiger Medienwerke in andere Sprachen und fremdsprachige Medienwerke über Deutschland im Original. Grundlage für die Anzeige ist das Gesetz über die Deutsche Nationalbibliothek (DNBG) vom 22. Juni 2006 (BGBl. I, S. 1338). Monografien und Periodika (Zeitschriften, zeitschriftenartige Reihen und Loseblattausgaben) werden in ihren unterschiedlichen Erscheinungsformen (z.B. Papierausgabe, Mikroform, Diaserie, AV-Medium, elektronische Offline-Publikationen, Arbeitstransparentsammlung oder Tonträger) angezeigt. Alle verzeichneten Titel enthalten einen Link zur Anzeige im Portalkatalog der Deutschen Nationalbibliothek und alle vorhandenen URLs z.B. von Inhaltsverzeichnissen sind als Link hinterlegt. Die Titelanzeigen der Musiktonträger in Reihe T sind, wie sche Katalogisierung von Ausgaben musikalischer Wer- auf der Sachgruppenübersicht angegeben, entsprechend ke (RAK-Musik)“ unter Einbeziehung der „International der Dewey-Dezimalklassifikation (DDC) gegliedert, wo- Standard Bibliographic Description for Printed Music – bei tiefere Ebenen mit bis zu sechs Stellen berücksichtigt ISBD (PM)“ zugrunde.
    [Show full text]
  • Study (Abridged Version) the FUTURE of VALUES HELD by PEOPLE in OUR COUNTRY a Summary of Key Findings and Scenarios
    Study (abridged version) THE FUTURE OF VALUES HELD BY PEOPLE IN OUR COUNTRY A summary of key findings and scenarios Study (abridged version) THE FUTURE OF VALUES HELD BY PEOPLE IN OUR COUNTRY A summary of key findings and scenarios Principal investigators: Cordula Klaus Dr Christian Grünwald Michael Astor Authors: Anna Hornik Dr Georg Klose Dr Thomas Stehnken Florian Spalthoff Holger Glockner Dr Christian Grünwald Daniel Bonin Julian Sachs August 2020 This publication was developed as part of the Zukunfts- büro des Foresight-Prozesses (Foresight III) service contract awarded to Prognos AG and Z_punkt GmbH on behalf of the German Federal Ministry of Education and Research (BMBF), Strategic Foresight; Participation and Citizen Science unit. The authors are responsible for the content of this publication. The German Federal Ministry of Education and Research (BMBF) accepts no liability for the factual correctness, accuracy or completeness of the information provided. The views and opinions expressed in this publication are not necessarily those of the German Federal Ministry of Education and Research (BMBF). 3 Table of contents Summary of key findings ..............................................................................................................................................4 1 Introduction ..............................................................................................................................................................6 2 Summary of key findings: today’s life goals and the hopes and fears for the
    [Show full text]
  • Global Risks 2014 Ninth Edition Global Risks 2014, Ninth Edition Is Published by the World Economic Forum
    Insight Report Global Risks 2014 Ninth Edition Global Risks 2014, Ninth Edition is published by the World Economic Forum. The information in this report, or on which this report is based, has been obtained from sources that the authors believe to be reliable and accurate. However, it has not been independently verified and no representation or warranty, express or implied, is made as to the accuracy or completeness of any information obtained from third parties. In addition, the statements in this report may provide current expectations of future events based on certain assumptions and may include statements that do not directly relate to a historical or current fact. These statements involve known and unknown risks, uncertainties and other factors which are not exhaustive. The companies contributing to this report operate in a constantly changing environment and new risks emerge continually. Readers are cautioned not to place undue reliance on these statements. The companies contributing to this report undertake no obligation to publicly revise or update any statements, whether as a result of new information, future events or otherwise, and they shall in no event be liable for any loss or damage arising from the use of the information in this report. World Economic Forum Geneva Copyright © 2014 By the World Economic Forum All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior permission of the World Economic Forum. ISBN-13: 92-95044-60-6 ISBN-10: 978-92-95044-60-9 REF: 090114 This report and an interactive data platform are available at www.weforum.org/risks.
    [Show full text]
  • Ten Key Questions on Cyber Risk and Cyber Risk Insurance the GENEVA ASSOCIATION
    Ten Key Questions on Cyber Risk and Cyber Risk Insurance THE GENEVA ASSOCIATION November 2016 The Geneva Association The Geneva Association is the leading international insurance think tank for strategically important insurance and risk management issues. The Geneva Association identifies fundamental trends and strategic issues where insurance plays a substantial role or which influence the insurance sector. Through the development of research programmes, regular publications and the organisation of international meetings, The Geneva Association serves as a catalyst for progress in the understanding of risk and insurance matters and acts as an information creator and disseminator. It is the leading voice of the largest insurance groups worldwide in the dialogue with international institutions. In parallel, it advances— in economic and cultural terms—the development and application of risk management and the understanding of uncertainty in the modern economy. The Geneva Association membership comprises a statutory maximum of 90 chief executive of officers (CEOs) from the world’s top insurance and reinsurance companies. It organises international expert networks and manages discussion platforms for senior insurance executives and specialists as well as policymakers, regulators and multilateral organisations. Established in 1973, The Geneva Association, officially the ‘International Association for the Study of Insurance Economics’, is based in Zurich, Switzerland and is a non-profit organisation funded by its Members. 2 www.genevaassociation.org
    [Show full text]
  • European Cyber Security Perspectives 2019 | 1 Preface
    European 2019Cyber Security Perspectives European Cyber Security Perspectives 2019 | 1 Preface Dear reader, 2018 is a difficult year to summarize for Infosec. After the initial flurry of activity around Spectre and Meltdown in the beginning of January, we ended the year with global supply chain concerns brought about by the Super Micro story. Throughout the year we saw the geopolitical dilemmas of 2018 manifest in cyber security issues. Technology giants like Facebook and Google had a security reckoning. However in pure scariness the medical data breaches of MyHeritage (DNA) and MyFitnessPal (health) rank higher. The Starwood Marriot Hotel breach made every travelling executive nervous for the rest of the year, but probably not as nervous as the incident of CEO Fraud at Pathé. In an effort to alleviate some of that impact we are proud to publish the 6th European Cyber Security Perspectives (ECSP) report. The 2019 issue is filled with great articles from our partners ranging from government, universities and private companies. Special thanks goes out to all the partners who have submitted an article for the 6th edition of the ECSP. Also huge hugs to first time authors from de Piratenpartij, de Volksbank, Leiden University, University of Illinois, Hack in the Box and QuSoft. If IoT was the buzzword in 2017 then Artificial Intelligence (AI) was most definitely in 2018. AI and security seem to be intertwined and that is why you will find several articles about AI in this issue. This year the organization of Hack in the Box created a challenge which you can find at the bottom of the centerfold.
    [Show full text]
  • (HLEG) Global Strategic Report
    © ITU 2008 International Telecommunication Union Place des Nations, 1211 Geneva, Switzerland. First printing 2008 Legal Notice The information contained in this publication has been contributed by members of the High-Level Experts Group (HLEG) on the basis of information that is publicly available. Neither ITU nor any person acting on its behalf is responsible for any use that might be made of the information contained in this Report. ITU is not responsible for the content or the external websites referred to in this Report. The views expressed in this publication are those of the authors only and do not reflect in any way the official views of ITU or its membership or engage the ITU in any way. Denominations and classifications employed in this publication do not imply any opinion on the part of the ITU concerning the legal or other status of any territory or any endorsement or acceptance of any boundary. No part of this publication may be reproduced, except as authorized by written permission and provided that the source is acknowledged. Persons interested in quoting this publica- tion should first seek permission from: [email protected]. Acknowledgements Introduction Contributing authors: GCA Secretariat and all work area leaders. Chapter 1: Strategic Report WA1 Main author & editor: Stein Schjolberg, Chief Judge, Moss District Court, Norway. Contributing authors: Dr. Marco Gercke, Senior Researcher University of Cologne, Germany: Section 1.6 (except 1.6.1.6. and 1.6.3.3.), Section 1.7 (except 1.7.8.), Section 1.10 (except 1.10.2) and co-author of Section 1.1.
    [Show full text]
  • Final List of Participants
    Final list of participants 1) States and European Community 2) Entities and intergovernmental organizations having received a Standing invitation from the United Nations General Assembly 3) United Nations Secretariat and Organs 4) United Nations Specialized Agencies 5) Associate Members of Regional Commissions 6) Other invited intergovernmental organizations 7) Non governmental organizations (NGOs) and civil society organizations 8) Business Sector Entities 1) STATES AND EUROPEAN COMMUNITY Afghanistan Representatives: H.E. Mr Mohammad M. STANEKZAI, Ministre des Communications, Afghanistan, [email protected] H.E. Mr Shamsuzzakir KAZEMI, Ambassadeur, Representant permanent, Mission permanente de l'Afghanistan, [email protected] Mr Abdelouaheb LAKHAL, Representative, Delegation of Afghanistan Mr Fawad Ahmad MUSLIM, Directeur de la technologie, Ministère des affaires étrangères, [email protected] Mr Mohammad H. PAYMAN, Président, Département de la planification, Ministère des communications, [email protected] Mr Ghulam Seddiq RASULI, Deuxième secrétaire, Mission permanente de l'Afghanistan, [email protected] Albania Representatives: Mr Vladimir THANATI, Ambassador, Permanent Mission of Albania, [email protected] Ms Pranvera GOXHI, First Secretary, Permanent Mission of Albania, [email protected] Mr Lulzim ISA, Driver, Mission Permanente d'Albanie, [email protected] Algeria Representatives: H.E. Mr Amar TOU, Ministre, Ministère de la poste et des technologies
    [Show full text]
  • Download Journal
    THE CAPCO INSTITUTE JOURNAL OF FINANCIAL TRANSFORMATION 20YEAR ANNIVERSARY OPERATIONAL RESILIENCE #53 MAY 2021 1 / THE CAPCO INSTITUTE JOURNAL OF FINANCIAL TRANSFORMATION RECIPIENT OF THE APEX AWARD FOR PUBLICATION EXCELLENCE Editor Shahin Shojai, Global Head, Capco Institute Advisory Board Michael Ethelston, Partner, Capco Michael Pugliese, Partner, Capco Bodo Schaefer, Partner, Capco Editorial Board Franklin Allen, Professor of Finance and Economics and Executive Director of the Brevan Howard Centre, Imperial College London and Professor Emeritus of Finance and Economics, the Wharton School, University of Pennsylvania Philippe d’Arvisenet, Advisor and former Group Chief Economist, BNP Paribas Rudi Bogni, former Chief Executive Officer, UBS Private Banking Bruno Bonati, Former Chairman of the Non-Executive Board, Zuger Kantonalbank, and President, Landis & Gyr Foundation Dan Breznitz, Munk Chair of Innovation Studies, University of Toronto Urs Birchler, Professor Emeritus of Banking, University of Zurich Géry Daeninck, former CEO, Robeco Jean Dermine, Professor of Banking and Finance, INSEAD Douglas W. Diamond, Merton H. Miller Distinguished Service Professor of Finance, University of Chicago Elroy Dimson, Emeritus Professor of Finance, London Business School Nicholas Economides, Professor of Economics, New York University Michael Enthoven, Chairman, NL Financial Investments José Luis Escrivá, President, The Independent Authority for Fiscal Responsibility (AIReF), Spain George Feiger, Pro-Vice-Chancellor and Executive Dean, Aston Business School Gregorio de Felice, Head of Research and Chief Economist, Intesa Sanpaolo Allen Ferrell, Greenfield Professor of Securities Law, Harvard Law School Peter Gomber, Full Professor, Chair of e-Finance, Goethe University Frankfurt Wilfried Hauck, Managing Director, Statera Financial Management GmbH Pierre Hillion, The de Picciotto Professor of Alternative Investments, INSEAD Andrei A.
    [Show full text]
  • Imagining the Energy Cybergeddon
    1 Imagining the energy cybergeddon Digitalization and security epistemics in the energy system Lars Gjesvik Master Thesis in Political Science, Department of Political Science UNIVERSITY OF OSLO Spring, 23.05.2018 2 Imagining the energy cybergeddon Digitalization and security epistemics in the energy system 3 © Lars Gjesvik 2018 Imagining the energy cybergeddon Lars Gjesvik http://www.duo.uio.no/ Print: Reprosentralen, Universitetet i Oslo Word count: 37 587 4 Abstract In this thesis, I examine how the process of digitalization in the energy system is leading to changing understandings of its security. More precisely I track how discourses place themselves into different epistemic logics of security when debating digital incidents versus non-digital ones. I draw on the work of several critical security studies scholars, most notably Claudia Aradau (2014) and her work on security epistemics and the rise of resilience-thinking in modern societies. The creation of problems, through expressing concerns, assessing impacts, and promoting solutions, creates an overarching narrative that frames how we understand security events and dangers. Analyzing a broad collection of texts, I examine how expert discourse make sense of security concerns, impacts and solutions, centered around four main cases. These cases are the Baumgarten explosion in 2017, the Industroyer malware taking down the Ukrainian power grid in 2017, as well as a broader reading of security concerns pertaining to digital technologies and non-digital risks. The analysis highlights how digital security concerns are in part understood as radically uncertain, being unable to be understood both in terms of occurrence and impact, which implies certain security practices of preemption and societal resilience.
    [Show full text]