Can Lessons from the Nuclear Experience Provide Answers in Cyberspace?

Total Page:16

File Type:pdf, Size:1020Kb

Can Lessons from the Nuclear Experience Provide Answers in Cyberspace? CYBER WEAPONS AND NUCLEAR OPTIONS: CAN LESSONS FROM THE NUCLEAR EXPERIENCE PROVIDE ANSWERS IN CYBERSPACE? GEORGETOWN UNIVERSITY A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF HONORS IN SCIENCE, TECHNOLOGY, & INTERNATIONAL AFFAIRS, EDMUND A. WALSH SCHOOL OF FOREIGN SERVICE, GEORGETOWN UNIVERSITY, SPRING 2013. JAYANT GANDHI – CLASS OF 2013 THESIS ADVISOR: PROFESSOR MATTHEW KROENIG 1 2 ABSTRACT Cyber security is one of the latest hot button issues to affect the national security of states across the world. The new technology has yet to be readily placed in any established military doctrine, but there has been a clear preference of how strategists and policy makers desire to treat cyber weapons. Nuclear weapons, and more specifically nuclear deterrence, represent one of the greatest policy issues of the 20 th century with regards to international security. The success of deterrence in preventing not only the use of nuclear weapons, but also the outbreak of war between the major nuclear powers is seen as a major triumph. Modern policy makers look at this success and seek to emulate it in the cyber realm. This has caused the necessary comparison of cyber weapons to nuclear weapons to be made over and over. Arguments have been made on both sides as to whether or not cyber deterrence is possible, but little time has been spent looking at the basis of this discussion: are cyber and nuclear technologies comparable? This paper goes through the early histories of each technology and explores their technical characteristics in order to fully understand the foundations of this analogy. From that analysis of the comparison a coherent portrait of what cyber deterrence really means begins to appear. Cyber and nuclear weapons share more similarities than one would expect; some are expected and some are surprising. Their differences, while fewer in number, are not trivial and this paper seeks to highlight the importance of understanding these differences when utilizing an analytical tool like analogy. Historical analogies can be dangerous traps that tempt policy makers into incorrect judgments. Analysis of the analogy itself is the only way to be sure that logic being used in this discussion of cyber deterrence is sound. In the end, this paper concludes that the analogy is a useful one and that there is a possibility for cyber deterrence, even if it may prove difficult. 3 TABLE OF CONTENTS 1. Introduction ..................................................................................................................................................p. 5 2. Historical Analogies: Useful Tool or Dangerous Trap?.............................................................................p. 15 3. A Brief History of Nuclear Diplomacy and Strategy ................................................................................p. 21 4. A Brief History of Cyber Diplomacy and Strategy ...................................................................................p. 45 5. The Similarities of Cyber and Nuclear ......................................................................................................p. 67 6. The Differences of Cyber and Nuclear ......................................................................................................p. 86 7. Cyber Deterrence? .....................................................................................................................................p. 93 8. Conclusions ..............................................................................................................................................p. 111 9. Appendix A: Cyber Timeline ..................................................................................................................p. 115 10. Appendix B: Glossary of Terms ..............................................................................................................p. 119 11. Works Cited .............................................................................................................................................p. 122 4 INTRODUCTION For a successful technology, reality must take precedence over public relations, for Nature cannot be fooled. -Richard Feynman The above quote from renowned physicist Richard Feynman very aptly explains the relationship between technology and the way we think about it. Nowhere does this aphorism ring truer than in the realm of cyber technology and thought. The current thought on cyber strategy attempts to draw many parallels between it and nuclear strategy at the advent of nuclear weapons. But we cannot let public thought take precedence over reality. It took a long time for cyber security to be taken as a serious threat to national security in the United States. 1 This was not caused by lack of knowledge of the threat, but because it was not perceived to be a pressing issue. There were many who pointed out the impending cyber threat, but the lack of any major cyber-attack created a “boy-who-cried-wolf” effect, creating a sense of distance and false security. But as Richard Clarke and Robert Knake point out in their book Cyber War: the Next Threat to National Security and What to Do About It , this does not invalidate the realities: Sometimes the boy who cries wolf can see the wolf coming from a lot farther away than everyone else. The Joint Security Commission of 1994, the Marsh Commission of 1997, the Center for Strategic and International Studies (CSIS) commission of 2008, the National Academy of Science commission of 2009, and many more in between have all spoken of a major cyber security or cyber war risk. They have been criticized by many as Cassandras, the type of people who are always predicting disaster... It is worth remembering that, despite the bad rap she gets, Cassandra was not wrong about her predictions; she was simply cursed by Apollo never to be believed. 2 1 I will take this time to issue the disclaimer that the author of this paper (myself) is an American writing at an American University and therefore the contents of this paper will be somewhat skewed towards the American story due to more information being readily available. I have done my best to cover all the relevant sides, but I feel it is important the reader is aware of this. 2 Richard Clarke & Robert Knake, Cyber War: the Next Threat to National Security and What to Do About It, HarperCollins 2010, p.135-6 5 Now cyber security has become a major talking point of heads of state and those in charge of national defense across the globe. The US cyber doctrine since 2003 has stated that “the Nation will seek to prevent, deter , and significantly reduce cyber-attacks by ensuring the identification of actual or attempted perpetrators followed by an appropriate government response ”. 3 Strategists are eager to place cyber within the preexisting strategy of deterrence developed during the Cold War. It is not an unreasonable goal to try and figure out if a cyber deterrence strategy can be developed. The avoidance of war is always preferable to the fighting of it. But will a strategy that was thought up of and tailored to a specific technology translate to a new one so easily? There has been a lot of debate back and forth about whether or not cyber deterrence is feasible, but the majority of the discussion has taken a retroactive approach: taking the ideas of nuclear strategy and attempting to adapt them to cyber. This paper seeks to reverse that thinking a look first at what were the exact characteristics of nuclear technology that allowed the formulation of those specific strategies and then figuring out what lessons (if any) can be taken and adapted to cyber. It is only by comparing the two technologies for what they are (their realities) that we can begin to understand the correct strategy to using them (their nature). A side by side comparison will reveal that, indeed, cyber technologies and nuclear technologies share a lot of similarities (their speed, their targets, their capability for destruction), which give hope towards an adaptation of nuclear strategy. But there are also several key differences that will influence a successful strategy. 3 The United State Government, National Strategy to Secure Cyberspace , 2003, http://www.whitehouse.gove/pcipb 6 Cyber deterrence is possible, but it is constrained in its effectiveness and comes at a cost. Whether or not it should be the dominant strategy over other options is beyond the scope of this paper. The goal of this paper is to evaluate the relatively unsupported comparison of two important technologies in order to maximize our learning from the past. THE GROUND RULES Before we continue it is important to establish a unified framework with which to tackle the analysis. The key concept at the center of the debate is the idea of cyber war. In this paper I use the definition of cyber war given by Richard Clarke (a former adviser to the US President on Terrorism and Cyber Security). Cyber war is “actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption”. 4 This immediately eliminates cybercrime and cyber-terrorism as concerns as we formulate our strategy. Occasionally these two topics will be brought up (as they are relevant and important issues), but it will always be in an ancillary capacity and often used to emphasize the difference of cyber war itself from these concepts. Nuclear deterrence strategy was not developed to deter attacks from criminal organizations or terrorist
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Matthew Henry Kroenig, Georgetown University
    “The Iran Deal and North Korea” Matthew Henry Kroenig, Georgetown University Friday, February 15, 2019, 6:30 pm - 8:00 pm Elliott School of International Affairs, Lindner Family Commons, The George Washington University 1957 E St. NW, Washington, DC 20052 ◊ Event Topics 1) Problems with the Joint Comprehensive Plan of Action (JCPOA) 2) Domestic and foreign backlash on the JCPOA 3) Similarities & differences of the two rogue nations (Iran & North Korea) 4) Possibility of setting a bad precedent with North Korea Speaker: Matthre Henry Kroenig, Georgetown University Matthew Kroenig is an Associate Professor in the Department of Government and the Edmund A. Walsh School of Foreign Service at Georgetown University and Deputy Director for Strategy in the Scowcroft Center for Strategy and Security at the Atlantic Council. His work has covered a wide range of topics in international relations and national security. Dr. Kroenig is the author or editor of six books, including The Logic of American Nuclear Strategy (Oxford University Press, forthcoming). His articles have appeared in many publications, including: American Political Science Review, Foreign Affairs, Foreign Policy, International Organization, The Wall Street Journal, and The Washington Post. He has served in several positions in the U.S. Department of Defense and the intelligence community and regularly consults with a wide range of U.S. government entities. He has previously worked as a research fellow at the Council on Foreign Relations, Harvard University, and Stanford University. Dr. Kroenig provides regular commentary for major media outlets, including PBS Newshour, Fareed Zakaria GPS, BBC, CNN, Fox News, NPR, and C- SPAN.
    [Show full text]
  • THE WARSAW PACT, NATO, the USSR, POLAND, the GDR and DENMARK Christensen C.S
    ISSN 2308-8079. Studia Humanitatis. 2020. № 3. www.st-hum.ru УДК 359:327[54:5] THE MARITIME OFFENSIVE STRATEGY IN THE BALTIC SEA AREA DURING THE COLD WAR (1960-1990): THE WARSAW PACT, NATO, THE USSR, POLAND, THE GDR AND DENMARK Christensen C.S. From the beginning of 1960s, an occupation of Denmark was a theme in the Warsaw Pact military exercises and manoeuvres in the so-called Cold War. This is connected to a struggle for a maritime offensive strategy, as well inside the USSR as internal among Soviet allies with the aim of securing the fleets of the Warsaw Pact access to the North Sea and the Atlantic in case of war with NATO members. In the GDR and Poland these plans were very important in the national military strategies. However, the Soviet navy also played an important role in abovementioned maritime strategy. But was it really so great in different occupation plans of Denmark? Or was it first and foremost a local strategy of the Warsaw Pact countries in the western part of the Baltic Sea area? The article provides answers to these questions. There is also given a description of the strategic importance of Denmark in the Baltic Sea, and its influence on the Danish foreign politics in decades. Keywords: Cold War, GDR, BRD, Poland, Denmark, military manoeuvers, Warsaw Pact, Baltic Sea, USSR, NATO, maritime strategy, Berlin Wall, Vyacheslav Molotov, Sergey Gorshkov, Andrei Grechko, Vasily Sokolovsky. МОРСКАЯ НАСТУПАТЕЛЬНАЯ СТРАТЕГИЯ В РЕГИОНЕ БАЛТИЙСКОГО МОРЯ В ПЕРИОД ХОЛОДНОЙ ВОЙНЫ (1960-1990 ГГ.): ВАРШАВСКИЙ ДОГОВОР, НАТО, СССР, ПОЛЬША, ГДР И ДАНИЯ Кристенсен К.С.
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]
  • Scott D. Sagan
    SCOTT D. SAGAN CURRICULUM VITAE February 2021 OFFICE ADDRESS: CISAC Encina Hall Room E217 616 Serra Street Stanford University Stanford, CA 94305-6165 (650) 725-2715 [email protected] CURRENT POSITIONS Caroline S.G. Munro Professor, Department of Political Science, Stanford University. Mimi and Peter Haas University Fellow in Undergraduate Education, Stanford University. Senior Fellow, Center for International Security and Cooperation, Freeman Spogli Institute for International Studies, Stanford University. EMPLOYMENT HISTORY Professor, Department of Political Science, Stanford University, 2001 – Present. Co-director, Center for International Security and Cooperation (CISAC), Stanford University, 1998-2011. Associate Professor, Department of Political Science, Stanford University, 1995-2001. Vice-Chairman, Department of Political Science, 1996-1999. Chairman, International Relations Program, Stanford University, 1995-1997. Assistant Professor, Department of Political Science, Stanford University, 1987-1995. Lecturer, Department of Government, Harvard University, 1986-1987. Consultant, Strategic Nuclear Policy Branch, Nuclear and Chemical Division, Organization of the Joint Chiefs of Staff, 1985-1986. 1 Research Fellow, The Center for International Affairs, Harvard University, 1985-1986. Council on Foreign Relations International Affairs Fellow, Special Assistant to the Director and Staff Officer, Nuclear/Chemical Division, Organization of the Joint Chiefs of Staff, 1984-1985. Postdoctoral Fellow, The Avoiding Nuclear War Project, Center for Science and International Affairs, Harvard University, 1983-84. EDUCATION Harvard University, Ph.D. (Political Science) 1983. Thesis: “Deterrence and Decision: An Historical Critique of Modern Deterrence Theory.” Winner of the American Political Science Association's 1983 Helen Dwight Reid Award for the best doctoral dissertation in international relations, law and politics. Oberlin College, B.A. with High Honors (Government) 1977.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Download Thesis
    This electronic thesis or dissertation has been downloaded from the King’s Research Portal at https://kclpure.kcl.ac.uk/portal/ Cyber security and the politics of time Stevens, Timothy Charles Awarding institution: King's College London The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without proper acknowledgement. END USER LICENCE AGREEMENT Unless another licence is stated on the immediately following page this work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International licence. https://creativecommons.org/licenses/by-nc-nd/4.0/ You are free to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work). Non Commercial: You may not use this work for commercial purposes. No Derivative Works - You may not alter, transform, or build upon this work. Any of these conditions can be waived if you receive permission from the author. Your fair dealings and other rights are in no way affected by the above. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 25. Sep. 2021 1 ] Cyber Security and the Politics of Time Timothy Charles Stevens Thesis submitted in accordance with the requirements for the degree of Doctor of Philosophy King’s College London Department of War Studies November 2013 2 Abstract Time is an under-represented topic in security studies and International Relations (IR).
    [Show full text]
  • Bajo El Signo Del Escorpión
    Por Juri Lina Bajo el Signo del Escorpión pg. 1 de 360 - 27 de septiembre de 2008 Por Juri Lina pg. 2 de 360 - 27 de septiembre de 2008 Por Juri Lina PRESENTACION Juri Lina's Book "Under the Sign of the Scorpion" is a tremendously important book, self-published in the English language in Sweden by the courageous author. Jüri Lina, has been banned through out the U.S.A. and Canada. Publishers and bookstores alike are so frightened by the subject matter they shrink away and hide. But now, braving government disapproval and persecution by groups that do not want the documented information in Under the Sign of the Scorpion to see the light of day, Texe Marrs and Power of Prophecy are pleased to offer Mr. Lina's outstanding book. Lina's book reveals what the secret societies and the authorities are desperate to keep hidden—how Jewish Illuminati revolutionaries in the United States, Britain, and Germany—including Marx, Lenin, Trotsky, and Stalin—conspired to overthrow the Czar of Russia. It details also how these monsters succeeded in bringing the bloody reign of Illuministic Communism to the Soviet Empire and to half the world's population. Under the Sign of the Scorpion reveals the whole, sinister, previously untold story of how a tiny band of Masonic Jewish thugs inspired by Satan, funded by Illuminati bigwigs, and emboldened by their Talmudic hatred were able to starve, bludgeon, imprison and massacre over 30 million human victims with millions more suffering in Soviet Gulag concentration camps. Fuhrer Adolf Hitler got his idea for Nazi concentration camps from these same Bolshevik Communist butchers.
    [Show full text]
  • Infosec Year in Review -- 1999
    InfoSec Year In Review -- 1999 M. E. Kabay, PhD, CISSP. Security Leader, INFOSEC Group, AtomicTangerine Inc. Category 11 Breaches of confidentiality Date 1999-01-29 Keyword data leakage privacy confidentiality control Web Source, Vol, No. RISKS 20 18 The Canadian consumer-tracking service Air Miles inadvertently left 50,000 records of applicants for its loyalty program publicly accessible on their Web site for an undetermined length of time. The Web site was offline as of 21 January until the problem was fixed. Date 1999-02-03 Keyword data leakage Web script QA vulnerability confidentiality Source, Vol, No. WIRED via PointCast An error in the configuration or programming of the F. A. O. Schwarz Web site resulted paradoxically in weakening the security of transactions deliberately completed by FAX instead of through SSL. Customers who declined to send their credit-card numbers via SSL ended up having their personal details — address and so forth — stored in a Web page that could be accessed by anyone entering a URL with an appropriate (even if randomly chosen) numerical component. Date 1999-02-10 Keyword e-commerce credit card personal information password privacy Source, Vol, No. RISKS 20 20 Prof. Ross Anderson of Cambridge University analyzed requirements on the AMAZON.COM online bookstore for credit card number, password, and personal details such as phone number. He identified several risks: (1) merchant retention of credit card numbers poses a far higher risk of capture than of capture in transit; (2) adding a password increases the likelihood of compromise because so many naïve users choose bad passwords and then write them down; (3) even the British site for Amazon contravenes European rules on protecting consumer privacy; (3) such practices make it easier for banks to reject their clients' claims of fraudulent use of their credit-card numbers.
    [Show full text]
  • The Iron Curtain As an Aspect of the Sovietisation of Eastern Europe in 1949–1953
    Studia z Dziejów Rosji i Europy Środkowo-Wschodniej ■ LII-SI(1) Paweł Bielicki Institute of Political Sciences, Kazimierz Wielki University The Iron Curtain as an Aspect of the Sovietisation of Eastern Europe in 1949–1953 Zarys treści: Sowietyzacja była kluczowym etapem prowadzącym do utrwalenia „żelaznej kur- tyny” na terenie Europy Wschodniej i pełnego podporządkowania krajów wschodnioeuro- pejskich Związkowi Radzieckiemu. W artykule omawiam rożne aspekty sowietyzacji, m.in. wymiar ustrojowy, gospodarczy oraz wojskowy. W ostatniej z wyżej wymienionych dziedzin pozwoliłem sobie na wyartykułowanie przyczyn, które sprawiły, że władze sowieckie pod- jęły decyzję o przeprowadzeniu przyspieszonej sowietyzacji w dziedzinie militarnej na terenie Europy Wschodniej. Ważnym elementem niniejszego artykułu jest też kwestia prześladowa- nia Kościoła w państwach zdominowanych przez ZSRR. W podsumowaniu nakreślam konse- kwencje omawianych w artykule wydarzeń dla współczesnej rzeczywistości politycznej krajów postkomunistycznych w wymiarze politycznym, gospodarczym oraz społecznym. Outline of content: Sovietisation was the key stage leading to the strengthening of the Iron Curtain sealing off Eastern Europe and to the total subjugation of Eastern European countries to the Soviet Union. In the article, the author discusses various aspects of Sovietisation, emphasising its political, economic and military aspects, including the reasons underlying the decision taken by the Soviet leaders to step up the pace of Sovietisation in the military field in Eastern Europe. An important part of the present study is also the question of the persecution of the Church in the states dominated by the USSR. In the conclusions, the author discusses the consequences of the described developments for the contemporary political situation of the post-communist countries in their political, economic and social aspects.
    [Show full text]