Information Technology for Peace and Security Christian Reuter Editor

Total Page:16

File Type:pdf, Size:1020Kb

Information Technology for Peace and Security Christian Reuter Editor Information Technology for Peace and Security Christian Reuter Editor Information Technology for Peace and Security IT Applications and Infrastructures in Conflicts, Crises, War, and Peace Editor Christian Reuter Science and Technology for Peace and Security (PEASEC) Department of Computer Science Technische Universität Darmstadt Darmstadt, Germany ISBN 978-3-658-25651-7 ISBN 978-3-658-25652-4 (eBook) https://doi.org/10.1007/978-3-658-25652-4 Library of Congress Control Number: 2019936168 Springer Vieweg © Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature 2019 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer Vieweg imprint is published by the registered company Springer Fachmedien Wiesbaden GmbH part of Springer Nature The registered company address is: Abraham-Lincoln-Str. 46, 65189 Wiesbaden, Germany Foreword Johannes Buchmann Professor of Computer Science and Mathematics Technische Universität Darmstadt My generation was lucky. For over seventy years there has been peace in Germany. In other parts of the world, wars remain reality. Technological advances, especially in com- puter science, help to make weapons more brutal and effective and wars more terrible. Peace remains one of the great challenges of humanity. The authors of this book take this challenge seriously. They have established a new research direction: information technol- ogy for peace and security, exploring the dangers of misuse of information technology. Examples are the destruction of the IT backbone of energy, transport and communication infrastructures by hackers, as well as threats to political and social peace posed by fake news and social bots. At the same time, they are making suggestions on how information technology can stabilise peace, for example through efficient disarmament control. This is so far unique: high technology serves peace. TU Darmstadt has acknowledged the enormous importance of such research and has hired Christian Reuter on Germany's first professorship in the field of Information Technology for Peace and Security (“Science and Technology for Peace and Security”). In a very short time he brought this new topic to life at TU Darmstadt and initiated this textbook as a logical next step. He and his colleagues make the topic and their research results accessible to students and at the same time provide an introduction for interested scientists, IT devel- opers and policy advisors. This book is very important because their work can only be fully effective if it is received and carried forward by many. I wish Christian Reuter and all the authors of this book that their effort falls on fertile ground, has great impact, and contributes to the further devel- opment of the research area and to peace in the world. Darmstadt Johannes Buchmann Editor’s Preface Christian Reuter Professor of Science and Technology for Peace and Security (PEASEC) Technische Universität Darmstadt Information technology (IT) is becoming more and more important in many facets of our daily life. Not only so in ordinary situations, but also in critical ones. This includes an increased importance in contexts of peace and security. Besides classical cyber security issues, other challenges concerning information warfare, cyber espionage and defence, cyber arms control, dual-use, or the role of social media in conflicts are of high importance. However, these aspects are not yet as established both in research and education. There are not as many textbooks on the interception of computer science on the one side and peace and security research on the other side compared to other, more common areas of research. However, this could change, especially considering the importance of the field. After joining Technische Universität Darmstadt and founding the group Science and Tech- nology for Peace and Security (PEASEC), embedded in both CYSEC (profile area Cyber Security) and IANUS (interdisciplinary research group Science Technology Peace), we felt the mission to address this gap. Based on the experiences from our edited textbook on “Safety-Critical Human-Computer-Interaction: Interactive Technologies and Social Me- dia in Crisis- and Security Management” (2018, Springer Vieweg, 645p., currently avail- able in German only), the idea for a complementary textbook was born: I drafted a content, asked potential authors, received very positive feedback and the willingness to contribute and finally am very honoured to edit the first edition of this textbook. Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This text- book addresses the significance, potentials and challenges of IT for peace and security. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms control, cyber at- tribution and infrastructures as well as culture and interaction before an outlook is given. viii Editor’s Preface The book is written for readers who are interested in this interdisciplinary topic, especially from computer science and IT security as well as peace and conflict research but also in general from engineering and natural sciences on the one side and humanities and social sciences on the other. This work was supported by the German Federal Ministry of Education and Research (BMBF) as well as by the Hessen State Ministry for Higher Education, Research and the Arts (HMWK) within CRISP and by the German Research Foundation (DFG) within the Collaborative Research Centres 1119 CROSSING and 1053 MAKI. Many authors contributed to this textbook – and I would like to thank them a lot. I would also like to thank all people (authors, assistants, students) who worked in the background, i.e. found and corrected mistakes and reviewed book chapters (I am still grateful for further hints and suggestions for improvement; the aim is to implement these in future editions). I especially would like to thank my whole PEASEC team for their dedication, not only in the context of this book. Particularly I thank my family for their patience and support. On behalf of all authors: We wish the readers a pleasant and insightful read; we hope to contribute a little to peace and security. Darmstadt Christian Reuter Table of Contents Fore'\'Ord (Johannes Buchmann) ...................................................................................... v Editor's Preface (Christian Reuter) ............................................................................... vii Table of Contents ............................................................................................................ix The Editor ..................................................................................................................... xiii Tbe Autbors .................................................................................................................... xv Part I: lntroduction and Fundamentals ......................................................................... l Information Technology for Peace and Security - Introduction and Overview (Christian Reuter) ....................................................................................................... 3 2 TT in Peace, Contlict, and Security Research (Christian Reuter • Larissa Aidehoff • Thea Riebe • Mare-Andre Kauthold) .......... II 3 Natural-Science/Technical Peace Research (Jürgen Altmann) ...................................................................................................... 39 Part TI: Cyber Conflicts and War ................................................................................. 61 4 Information Warfare - From Doctrine to Permanent Conflict (Tn go Ruhmann • Ute Bemhardt) .............................................................................. 63 5 Cyber Espionage and Cyber Defence (Donunik Herrmann) ................................................................................................ 83 6 Darknets as Tools for Cyber Warfare (Kai Denker • Marcel Schäfer • Martin Steinebach) ............................................... 107 x Table of Contents Part ill: Cyber Peace ..................................................................................................
Recommended publications
  • Practical Forward Secure Signatures Using Minimal Security Assumptions
    Practical Forward Secure Signatures using Minimal Security Assumptions Vom Fachbereich Informatik der Technischen Universit¨atDarmstadt genehmigte Dissertation zur Erlangung des Grades Doktor rerum naturalium (Dr. rer. nat.) von Dipl.-Inform. Andreas H¨ulsing geboren in Karlsruhe. Referenten: Prof. Dr. Johannes Buchmann Prof. Dr. Tanja Lange Tag der Einreichung: 07. August 2013 Tag der m¨undlichen Pr¨ufung: 23. September 2013 Hochschulkennziffer: D 17 Darmstadt 2013 List of Publications [1] Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas H¨ulsing,and Markus R¨uckert. On the security of the Winternitz one-time signature scheme. In A. Ni- taj and D. Pointcheval, editors, Africacrypt 2011, volume 6737 of Lecture Notes in Computer Science, pages 363{378. Springer Berlin / Heidelberg, 2011. Cited on page 17. [2] Johannes Buchmann, Erik Dahmen, and Andreas H¨ulsing.XMSS - a practical forward secure signature scheme based on minimal security assumptions. In Bo- Yin Yang, editor, Post-Quantum Cryptography, volume 7071 of Lecture Notes in Computer Science, pages 117{129. Springer Berlin / Heidelberg, 2011. Cited on pages 41, 73, and 81. [3] Andreas H¨ulsing,Albrecht Petzoldt, Michael Schneider, and Sidi Mohamed El Yousfi Alaoui. Postquantum Signaturverfahren Heute. In Ulrich Waldmann, editor, 22. SIT-Smartcard Workshop 2012, IHK Darmstadt, Feb 2012. Fraun- hofer Verlag Stuttgart. [4] Andreas H¨ulsing,Christoph Busold, and Johannes Buchmann. Forward secure signatures on smart cards. In Lars R. Knudsen and Huapeng Wu, editors, Se- lected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, pages 66{80. Springer Berlin Heidelberg, 2013. Cited on pages 63, 73, and 81. [5] Johannes Braun, Andreas H¨ulsing,Alex Wiesmaier, Martin A.G.
    [Show full text]
  • Post-Quantum Cryptography Daniel J
    Post-Quantum Cryptography Daniel J. Bernstein · Johannes Buchmann Erik Dahmen Editors Post-Quantum Cryptography ABC Editors Daniel J. Bernstein Johannes Buchmann Department of Computer Science Erik Dahmen University of Illinois, Chicago Technische Universität Darmstadt 851 S. Morgan St. Department of Computer Science Chicago IL 60607-7053 Hochschulstr. 10 USA 64289 Darmstadt [email protected] Germany [email protected] [email protected] ISBN: 978-3-540-88701-0 e-ISBN: 978-3-540-88702-7 Library of Congress Control Number: 2008937466 Mathematics Subject Classification Numbers (2000): 94A60 c 2009 Springer-Verlag Berlin Heidelberg This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover design: WMX Design GmbH, Heidelberg Printed on acid-free paper springer.com Preface The first International Workshop on Post-Quantum Cryptography took place at the Katholieke Universiteit Leuven in 2006.
    [Show full text]
  • Editors' Biographies
    Digital Enlightenment Yearbook 2013 295 M. Hildebrandt et al. (Eds.) IOS Press, 2013 © 2013 The authors. doi:10.3233/978-1-61499-295-0-295 Editors’ Biographies Mireille Hildebrandt Mireille Hildebrandt is one of the Founding Members of the Digital Enlightenment Fo- rum. She holds the Chair of Smart Environments, Data Protection and the Rule of Law at the institute of Computing and Information Sciences (iCIS) at Radboud University Nijmegen; she is an Associate Professor of Jurisprudence at the Erasmus School of Law, Rotterdam and a senior researcher at the centre for Law Science Technology & Society at Vrije Universiteit Brussel. The focus of her research is the nexus of philoso- phy of law and of technology, investigating the implications of smart environments for democracy and the Rule of Law. She co-edited Profiling the European Citizen. Cross- Disciplinary Perspectives (2008) with Serge Gutwirth; Law, Human Agency and Auto- nomic Computing (2011) with Antoinette Rouvroy; Privacy and Due Process after the Computational Turn (2013) with Katja de Vries; and Human Law and Computer Law (2013) with Jeanne Gaakeer. Her roots reside in cultural anthropology, law, and the philosophy and history of criminal law. Kieron O’Hara Kieron O’Hara is a senior research fellow in electronics and computer science at the University of Southampton. His research interests are the philosophy and politics of technology, in particular the World Wide Web and the Semantic Web. He writes on privacy, trust and memory, and has a particular interest in transparency and open data. As a political philosopher, he has also written extensively on the philosophy of conser- vatism, and is a research fellow at the Centre for Policy Studies.
    [Show full text]
  • Hash-Based Signatures: an Outline for a New Standard
    Hash-based Signatures: An Outline for a New Standard Andreas Hülsing∗, Stefan-Lukas Gazdag†, Denis Butin‡ and Johannes Buchmann‡ ∗Department of Mathematics and Computer Science Technische Universiteit Eindhoven P.O. Box 513, 5600 MB Eindhoven, The Netherlands [email protected] †genua mbh Domagkstrasse 7, 85551 Kirchheim bei Muenchen, Germany [email protected] †TU Darmstadt Hochschulstrasse 10, 64289 Darmstadt, Germany {dbutin,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Hash-based signatures are quantum- and runtimes, present security reductions, present safe and well understood. This paper presents an implementations, and finally lower the security as- outline for a new standard extending the recent sumptions on the used hash function, i.e. provide Internet-Draft by McGrew & Curcio. The goals of this new standard are twofold: collision resilience. • To extend the existing draft to include XMSS Recently, McGrew and Curcio published an and its multi-tree version; Internet-Draft [19] for a hash-based signature scheme. • To prepare for possible extensions to cover stateless schemes. Their draft essentially covers the scheme proposed by Merkle at the end of the 1970s. The advantage Keywords: Hash-based signatures, Standard- of this scheme over newer ones is that Merkle was ization, Merkle trees, XMSS. granted a patent on this basic scheme that already expired. Hence, there cannot be any IPR claims for I. Introduction this scheme. However, to the best of our knowledge, there are no active or pending patents on XMSS and Hash-based signatures recently gained a lot of its variants. On the downside, the scheme in [19] has attention as a potential replacement for today’s large signatures, relatively slow runtimes compared to signature schemes when large-scale quantum com- other alternatives (especially for key generation), an puters are built.
    [Show full text]
  • Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption
    Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption Vom Fachbereich Informatik der Technischen Universit¨atDarmstadt genehmigte Dissertation zur Erlangung des Grades Doktor rerum naturalium (Dr. rer. nat.) von Dipl.-Math. Florian G¨opfert geboren in W¨urzburg. Referenten: Prof. Dr. Johannes Buchmann Prof. Dr. Jintai Ding Tag der Einreichung: 11.08.2016 Tag der m¨undlichen Pr¨ufung: 22.09.2016 Hochschulkennziffer: D 17 Darmstadt 2016 August 11, 2016 Abstract Since its proposal by Regev in 2005 [Reg05], the Learning With Errors (LWE) problem was used as the underlying problem for a great variety of schemes. Its applications are many-fold, reaching from basic and highly practical primitives like key exchange [ADPS16], public-key encryption [LP11, LPR10], and signature schemes [ABBD15, DDLL13] to very advanced solutions like fully homomorphic encryption [BV14, BGV11], group signatures [LLLS13], and identity based encryp- tion [ABV+11]. One of the underlying reasons for this fertility is the flexibility with that LWE can be instantiated. Unfortunately, this comes at a cost: It makes selecting parameters for cryptographic applications complicated. When selecting parameters for a new LWE-based primitive, a researcher has to take the influence of several parameters on the efficiency of the scheme and the runtime of a variety of attacks into consideration. In fact, the missing trust in the concrete hardness of LWE is one of the main problems to overcome to bring LWE-based schemes to practice. This thesis aims at closing the gap between the theoretical knowledge of the hardness of LWE, and the concrete problem of selecting parameters for an LWE- based scheme.
    [Show full text]
  • Progress Report 2018
    Progress Report 2018 18 Academic Affairs The new biomedical engineering degree course is very popular. TU Darmstadt has attracted Goethe University Frankfurt as a partner. 4 Summary by Executive Board 14 Academic Affairs 17 Tricky tasks 18 Run on biomedical engineering degree course 20 Demanding from the very start 22 Comprehensive protection 23 Settling in quickly 24 Generous opening hours 25 Courses offered by TU Darmstadt 26 Facts and figures 30 Research 33 Top positions in German Research Foundation ranking 34 Major projects with a promising future 35 Machine learning for agriculture 36 From human to artificial intelligence 38 Recipe against the power of quantum computers 39 Pros and cons from noise 40 Health data under lock and key 41 Faster DNA synthesis 42 The insect perfume trick 43 Innovations for waterways and buildings 44 Overcoming subject boundaries 46 Top-Level Research 43 Research Environmental engineers design special lifts 50 Why I study here to make waterways passable for fish throughout. 60 Cooperation and transfer 63 50 years of partnership with Lyon 64 Energy-efficient ETA factory 65 Side by side with SMEs 66 From the laboratory into practice 68 Ground mission in the lecture hall 69 Clean water 70 The mobility of the future 71 3D scanner for insects 72 New tools 73 Awakening inquiring minds with Merck 77 Life on campus Open laboratories and exciting 74 Life on campus research were to be discovered 77 Thousands were wide awake at the “hellwach!” (“wide awake!”) 78 Urban quality science day of TU Darmstadt. 80 Climate-friendly
    [Show full text]
  • Acatech STUDIE September 2012 Titel
    > Internet Privacy Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis Johannes Buchmann (Hrsg.) acatech STUDIE September 2012 Titel Herausgeber: Prof. Dr. Dr. h.c. Johannes Buchmann Technische Universität Darmstadt, Fachbereich Informatik Hochschulstraße 10 64289 Darmstadt E-Mail: [email protected] Reihenherausgeber: acatech – Deutsche Akademie der Technikwissenschaften, 2012 Geschäftsstelle Hauptstadtbüro Brüssel-Büro Residenz München Unter den Linden 14 Rue du Commerce / Handelsstraat 31 Hofgartenstraße 2 10117 Berlin 1000 Brüssel 80539 München Belgien T +49 (0) 89 / 5 20 30 90 T +49 (0) 30 / 2 06 30 96 10 T + 32 (0) 2 / 5 04 60 60 F +49 (0) 89 / 5 20 30 99 F +49 (0) 30 / 2 06 30 96 11 F + 32 (0) 2 / 5 04 60 69 E-Mail: [email protected] Internet: www.acatech.de Koordination: Dr. Karin-Irene Eiermann Redaktion: Linda Tönskötter, Dr. Grit Zacharias Layout-Konzeption: acatech Konvertierung und Satz: Fraunhofer-Institut für Intelligente Analyse- und Informationssysteme IAIS, Sankt Augustin Die Originalfassung der Publikation ist verfügbar auf www.springer.com KolumnentitelInhalt > INHALT VORWORT 9 PREFACE 11 PROjekt 13 1 UN/FAIRE INFORMatiONspraktikeN: INTERNET PrivaCY aus sOZIALWisseNSCHAFTLICHER Perspektive 15 Zusammenfassung 15 Abstract 15 1.1 Einführung 16 1.2 Privatheit als Thema der Sozialwissenschaften 17 1.2.1 Charakteristika sozialwissenschaft licher Privatheitstheorien 18 1.2.2 Zusammenfassung und Folgerungen 27 1.3 Internet Privacy: Privatheit soziotechnisch 28 1.4 Entwurf der Forschungsheuristik
    [Show full text]