Hacking the Planet, the Dalai Lama, and You: Managing Technical Vulnerabilities in the Internet Through Polycentric Governance

Total Page:16

File Type:pdf, Size:1020Kb

Hacking the Planet, the Dalai Lama, and You: Managing Technical Vulnerabilities in the Internet Through Polycentric Governance Fordham Intellectual Property, Media and Entertainment Law Journal Volume 24 Volume XXIV Number 2 Volume XXIV Book 2 Article 2 2014 Hacking the Planet, the Dalai Lama, and You: Managing Technical Vulnerabilities in the Internet Through Polycentric Governance Amanda Craig Indiana University Maurer School of Law, [email protected] Scott Shackelford Indiana University - Kelley School of Business - Department of Business Law ; Stanford Law School ; Hoover Institution, Stanford University, [email protected] Follow this and additional works at: https://ir.lawnet.fordham.edu/iplj Part of the Intellectual Property Law Commons Recommended Citation Amanda Craig and Scott Shackelford, Hacking the Planet, the Dalai Lama, and You: Managing Technical Vulnerabilities in the Internet Through Polycentric Governance, 24 Fordham Intell. Prop. Media & Ent. L.J. 381 (2015). Available at: https://ir.lawnet.fordham.edu/iplj/vol24/iss2/2 This Article is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Intellectual Property, Media and Entertainment Law Journal by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. Hacking the Planet, the Dalai Lama, and You: Managing Technical Vulnerabilities in the Internet Through Polycentric Governance Cover Page Footnote This Article is based on Chapter 3 in SCOTT J. SHACKELFORD, MANAGING CYBER ATTACKS IN INTERNATIONAL LAW, BUSINESS AND RELATIONS: IN SEARCH OF CYBER PEACE (2014). The authors wish to thank Cambridge University Press for granting them permissiong to adapt this material and Brenton Martell for his invaluable research support. This Article is dedicated to Jim and Teresa Craig. This article is available in Fordham Intellectual Property, Media and Entertainment Law Journal: https://ir.lawnet.fordham.edu/iplj/vol24/iss2/2 Hacking the Planet, the Dalai Lama, and You: Managing Technical Vulnerabilities in the Internet Through Polycentric Governance Amanda N. Craig* & Scott J. Shackelford† INTRODUCTION .............................................................................. 383 I. AN INTRODUCTION TO REGULATING CYBERSPACE THROUGH POLYCENTRIC GOVERNANCE ....................... 389 II. MITIGATING VULNERABILITIES IN NETWORK ARCHITECTURE AND CODE TO ENHANCE CYBERSECURITY FROM THE BOTTOM UP ....................... 392 A. Securing the Internet’s Physical Infrastructure ...... 392 B. Managing Vulnerabilities in the Logical Infrastructure .......................................................... 395 1. TCP/IP .............................................................. 395 2. DNS .................................................................. 397 3. BGP .................................................................. 399 C. Protocol Fixes ......................................................... 401 1. IPsec ................................................................. 402 2. DNSSEC ........................................................... 405 3. Fixing TCP and BGP ........................................ 407 D. Debugging and Regulating Through Code ............. 409 * J.D. candidate, Indiana University Maurer School of Law; MsC Forced Migration and Refugee Studies, University of Oxford; BS Journalism, Northwestern University. † Assistant Professor of Business Law and Ethics, Indiana University, Senior Fellow, Center for Applied Cybersecurity Research; Distinguished Visiting Fellow, University of Notre Dame. This Article is based on Chapter 3 in SCOTT J. SHACKELFORD, MANAGING CYBER ATTACKS IN INTERNATIONAL LAW, BUSINESS AND RELATIONS: IN SEARCH OF CYBER PEACE (2014). The authors wish to thank Cambridge University Press for granting them permissiong to adapt this material and Brenton Martell for his invaluable research support. This Article is dedicated to Jim and Teresa Craig. 381 382 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. [Vol. 24:381 E. The Threat of Social Engineering to the Content Layer ....................................................................... 413 F. Summary .................................................................. 416 III. UNDERSTANDING THE CYBER THREAT ECOSYSTEM WITHIN A POLYCENTRIC FRAMEWORK ......................... 417 A. From the Foothills of the Himalayas to the Frontiers of Cyberspace: Introducing the Cyber Threat Ecosystem .................................................... 417 B. Toward a Polycentric Approach to Mitigating Technical Vulnerabilities ........................................ 423 This Article analyzes key vulnerabilities in the Internet’s infrastructure, protocols, and code, and how they may be better managed through interventions at multiple levels. In particular, this Article examines the concept of polycentric governance and its applicability to technical vulnerabilities in the Internet. This theory has been championed by proponents such as Nobel Laureate Elinor Ostrom and promotes self-organization and networking regulations at multiple levels to address an array of global issues, from urban crime, to climate change and cyber attacks. However, there has not yet been a consideration of the applicability of this framework to technical Internet vulnerabilities explicitly, which is a conversation this Article seeks to jumpstart. ‘The Internet was designed without any contemplation of national boundaries. The actual traffic in the Net is totally unbounded with respect to geography.’ Vint[on] Cerf, who uttered those words, should know; he helped design the computer protocols that made the Internet possible. And yet the ‘father of the Internet’ is only partially right. Yes, the Internet he designed did not contemplate national boundaries. But no . the Internet is not ‘unbound with respect to geography.’ Cerf’s central mistake, a mistake typically made about the Internet, is to believe that there was something 2014] HACKING THE PLANET, THE DALAI LAMA, AND YOU 383 necessary or unchangeable about the Net’s original architecture. – Harvard Professor Jack Goldsmith and Columbia Professor Tim Wu1 The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead- lined room with armed guards—and even then I have my doubts. 2 – Purdue Professor Gene Spafford INTRODUCTION Dr. Charlie Miller says that he can crash the Internet and take control of some of the most protected computer systems in the world.3 Miller, now a cybersecurity analyst at Twitter,4 was the first person to break into Apple’s iPhone; he discovered a software flaw that would have allowed him to take control of every iPhone on the planet.5 He has won the prestigious Black Hat cybersecurity competition, among numerous other awards, and worked for the NSA for five years.6 In 2010, while presenting at a NATO Committee of Excellence conference on cyber conflict in Tallinn, Estonia, Miller conducted a thought experiment—if he was forced 1 JACK GOLDSMITH & TIM WU, WHO CONTROLS THE INTERNET?: ILLUSIONS OF A BORDERLESS WORLD 58 (2006). 2 QUOTABLE SPAF, http://spaf.cerias.purdue.edu/quotes.html (last visited Jan. 14, 2014) (citing A. K. Dewdney, Computer Recreations: Of Worms, Viruses and Core War, 260 SCI. AM., Mar. 1989, at 110, 110). 3 See Charlie Miller, Presentation at the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) Conference, in Tallinn, Est. (June 17, 2010), available at http://ccdcoe.org/conference2010/materials/app.html. 4 See Andy Greenberg, Twitter Hires Elite Apple Hacker Charlie Miller to Beef up Its Security Team, FORBES (Sept. 14, 2012, 10:05 AM), http://www.forbes.com/sites/ andygreenberg/2012/09/14/twitter-snags-elite-apple-hacker-charlie-miller-to-beef-up-its- security-team. 5 See Andy Greenberg, How to Hijack ‘Every iPhone in the World’, FORBES (July 28, 2009, 5:40 PM), http:www.forbes.com20090728hackers-iphone-apple-technology- security-hackers.html. 6 See Kelly J. Higgins, Apple ‘Ban’ Gives Miller Time to Hack Other Things, DARK READING (July 10, 2012), http://www.darkreading.com/end-user/apple-ban-gives-miller- time-to-hack-othe/240003490. 384 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. [Vol. 24:381 to, how would he go about crashing the Internet and taking control of protected systems?7 In the scenario that he imagined, former North Korean leader Kim Jong-Il had kidnapped and induced him to “hack the planet”—to control as many protected systems and Internet hosts as possible so as to dominate cyberspace. Miller then catalogued all of the steps that would be required to meet this audacious goal. He would need people—roughly 600 working throughout the world, and a way to communicate with them.8 The trick would be identifying them—a task made easier if Miller or another expert in the field was a willing co-conspirator with a North Korean intelligence agency like the Cabinet General Intelligence Bureau.9 Assuming that he could gather the necessary talent, Table 3.1 describes how Miller would divide tasks among his “army.” Table 3.1: Charlie Miller’s Hypothetical Cyber Army10 Job Title Brief Job Approximate Total Cost Description Number of (in millions) Hackers Required Vulnerability Find bugs in 20 $2.9 analyst code: need to be world- class programmers Exploit Research and 70 $7.3 developers exploit vulnerabilities across a range of platforms 7 See Miller, supra note 3. 8 See id. 9 See North Korean Intelligence Agencies, FAS, https://www.fas.org/irp/world/dprk/ index.html (last visited June 12, 2013). 10 See Miller,
Recommended publications
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Cyber Dissuasion
    N° 03/2012 recherches & documents mars 2012 Cyber Dissuasion Bruno gruselle Maître de recherche à la Fondation pour la Recherche Stratégique Bruno tertrais Maître de recherche à la Fondation pour la Recherche Stratégique alain esterle Chercheur associé à la Fondation pour la Recherche Stratégique w w w . frstrategie . o r g CYBER DISSUASION RECHERCHES & DOCUMENTS N ° 03/2012 Édité et diffusé par la Fondation pour la Recherche Stratégique 4 bis rue des Pâtures – 75016 PARIS ISSN : 1966-5156 ISBN : 978-2-911101-68-7 EAN : 9782911101687 WWW.FRSTRATEGIE.ORG 4 B I S RUE DES P ÂTURES 75 016 P ARIS TÉL. 01 43 13 77 77 FAX 0 1 43 13 77 78 SIRET 394 095 533 00045 TVA FR74 394 095 533 CODE APE 7220Z FONDATION RECONNUE D'UTILITÉ PUBLIQUE – DÉCRET DU 26 FÉVRIER 1993 SOMMAIRE INTRODUCTION ....................................................................................................................... 5 LES VULNERABILITES DE L’ESPACE NUMERIQUE ET LES RISQUES ASSOCIES SONT DEJA IMPORTANTS ET DEVRAIENT S ’AGGRAVER A L ’HORIZON 2020 ................................................... 9 Il est nécessaire d’établir le degré de gravité des risques numériques, les vulnérabilités exploitables et les perspectives de leur développement ................. 9 Les menaces pesant sur l’espace numérique ont d’ores et déjà des conséquences de sécurité importantes ...........................................................10 Les acteurs malveillants de l’espace numérique sont nombreux et leurs motivations appartiennent à des ensembles diversifiés ........................................14
    [Show full text]
  • The Question of State Sponsored Cyber Terrorism and Espionage Student Officer
    st th The Hague International Model United Nations Qatar 2020 | 21 ​ – 24 ​ of January 2020 ​ ​ ​ ​ ​ Forum: The Security Council Issue: The Question of State sponsored cyber terrorism and espionage Student Officer: Sebastian Santoni Position: President Introduction On the 27th of April 2007, Estonia experienced the first of a series of cyber attacks which would go on to shape laws, policies, and attitudes within and outside its borders. The country was bombarded by thousands of independent actors, resulting in the complete loss of most internet services for three weeks. The Estonian parliament, banks and media were all targeted in the midst of political disagreements with Russia. Although not the first incident of cyber terrorism, this was definitely one of the most destructive, managing to make an entire country go offline. In response, the world’s first ever regulations concerning actions in cyberspace were drafted, hoping to prevent such incidents from occurring in the future. However, incidents of cyber terrorism and espionage continued and remain a major threat to international security. Not only can they create mistrust and paranoia between nations, but also paralyse the organizations and resources core to their economic, social and political stability. This is especially true when such acts are initiated by countries and their related bodies, placing the world’s most sophisticated technology in the wrong hands. As members of the United Nations, it is the responsibility of countries to use their resources, voices and cooperation to strengthen international cyber security and work towards a world where state-sponsored cyber terrorism and espionage are void. Organizations such as the Kaspersky Lab and the Cooperative Cyber Defence Center of Excellence have made strides toward combating the issue, although they are restricted by an acute lack of relevant treaties and laws.
    [Show full text]
  • Purveying Fake News
    1 GOVERNANCE IN AN EMERGING NEW WORLD Convened by George P. Shultz with James Cunningham, David Fedor, and James Timbie Table of Contents FALL SERIES, ISSUE 318 Introduction ..........................................................................................................................................................................5 What Is to Be Done? Safeguarding Democratic Governance in the Age of Network Platforms Niall Ferguson ................................................................................................................................................................................................8 Protecting Democracy in an Era of Cyber Information War Joseph S. Nye ..............................................................................................................................................................................................37 Observations from the Roundtable ................................................................................................................................. 47 GOVERNANCE IN AN EMERGING NEW WORLD The Information Challenge to Democracy A Letter from the Conveners Sharp changes are afoot throughout the globe. Demographics are shifting, technology is advancing at unprecedented rates, and these changes are being felt everywhere. How should we develop strategies to deal with this emerging new world? We can begin by understanding it. First, there is the changing composition of the world population, which will have a profound impact on societies. Developed
    [Show full text]
  • Big Data in Organizations and the Role of Human Resource Management: a Complex Systems Theory- Based Conceptualization
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Scholz, Tobias M. Book — Published Version Big data in organizations and the role of human resource management: A complex systems theory- based conceptualization Personalmanagement und Organisation, No. 5 Provided in Cooperation with: Peter Lang International Academic Publishers Suggested Citation: Scholz, Tobias M. (2017) : Big data in organizations and the role of human resource management: A complex systems theory-based conceptualization, Personalmanagement und Organisation, No. 5, ISBN 978-3-631-71905-3, Peter Lang International Academic Publishers, Frankfurt a. M., http://dx.doi.org/10.3726/b10907 This Version is available at: http://hdl.handle.net/10419/182489 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence.
    [Show full text]
  • Pandaemonium Architecture Spring 2021
    Pandaemonium Architecture - Generative Algorithms, Machine Learning, Modeling and Simulation, ARGs, and Social Engineering for Artists Scott Benzel Spring 2021 Tuesdays 4-6:50 '...rituals of reversal..."rewire" the crucial connections in the social structure by providing symbolic statements of traditional social imperatives and basic categories of...world view.' Evon Z. Vogt, Rituals of Reversal as a Means of Rewiring Social Structure Pandaemonium Architecture was introduced at the 1958 Mechanisation of Thought Processes symposium as an early pattern recognition model. Named for the demon-inhabited city in Milton's Paradise Lost, the Pandaemonium Architecture assemblage employs 'demons' -bits of information or code- that 'scream' in order to ascend a hierarchy of algorithmic hurdles. The metaphorical implications were not lost on the early innovators of AI. Evon Vogt's Rituals of Reversal as a Means of Rewiring Social Structure examines the annual Highland Maya Zinacanteco rituals invoking the reversal of social, gender, and even species roles as a means of 'rewiring' the social structure of the community. Contemporary social structures are being radically 'rewired' with ever-increasing speed by largely invisible machine-learning algorithms and predictive processes. Netflix's, Amazon's, and Facebook's algorithms are the best-known examples of an increasingly pervasive methodology quietly remaking society. This course posits that artists employing machine learning, generative algorithms, predictive models and other technics can make art –employing these tools of what Deleuze labelled ‘The Societies of Control’- that is evocative, powerful, critical, and perhaps socially transformative. To this end the course examines the history, development and sociopolitics of Machine Learning and AI, including precomputational wargaming, cybernetics, game theory, neocybernetics, the so-called Californian Ideology, The Silicon Ideology, et al.
    [Show full text]
  • National Science Foundation Cri Workshop
    NATIONAL SCIENCE FOUNDATION Division of Computer and Network Systems CISE Computing Research Infrastructure CRI WORKSHOP SNOWBIRD UTAH JUNE 23-25, 2006 NATIONAL SCIENCE FOUNDATION Division of Computer and Network Systems CISE Computing Research Infrastructure CRI-WORKSHOP PROGRAM ORGANIZATION LOGISTICS Rita Rodriguez, CISE, NSF Dana Neill Steve Mahaney, CISE, NSF Computing Research Association Malek Adjouadi, FIU INVITED SPEAKERS Peter Freeman, Assistant Director CISE, NSF Deborah Crawford, Deputy Assistant Director, CISE, NSF PANELS CISE and the Global Implications: Larry Peterson, Princeton; David Novick, UTEP; Patrick Crowley, Washington U. St. Louis; Ram Dantu, U. of North Texas; Debby Cheng, Michigan State U.; and Bryant York, Portland State U. The GENI Program Guru Parulkar, GENI Program Director, CISE, NSF The Industry/University Cooperative Research Centers (I/UCRCs) Alex Schwarzkopf, Program Director, NSF, Division of Eng Education & Centers Sayfe Kiaei, Arizona State University, Director of Connection One and WINTech. ORGANIZATION OF PROCEEDINGS PHOTOS ON THE COVER PAGE Malek Adjouadi with thanks to the FIU-CATE Courtesy of the Cliff Lodge students Magno Guillen and Javier Delgado. Snowbird Ski & Summer Resort WITH THANKS To all of the investigators, presenters and participants of this NSF Workshop. SNOWBIRD UTAH JUNE 23-25, 2006 . NATIONAL SCIENCE FOUNDATION Division of Computer and Network Systems CISE Computing Research Infrastructure WORKSHOP - AGENDA Friday: June 23 Registration: 4:00 PM – 6:00PM Reception: 6:00 PM Dinner: 7:00 PM Saturday: June 24 7:30 - 8:00 Breakfast 8:00 - 8:20 Welcome Steve Mahaney, CISE/CNS Program Director, NSF Rita Rodriguez, CISE/CNS Program Director, NSF Malek Adjouadi, Florida International University 8:20 – 10:20 Session I: First-Year Awards Sabharwal, Ashutosh Rice University Shieber, Stuart Harvard University Callan, Jamie Carnegie Mellon University Manikopoulos, Constantine Foundation @ NJIT Chandra, Namas Florida A&M University Raju, G.V.S.
    [Show full text]
  • BENCHMARKING CYBER OPS 2018 an Initiative by Onnet for OOAT
    BENCHMARKING CYBER OPS 2018 An initiative by OnNet for OOAT //UNCLASSIFIED FOREIGN GOVERNMENT CYBER UNITS EXAMPLES • ISRAEL = UNIT8200 • US = U.S. CYBERCOM, NSATAO, DHS NCCIC • ISRAEL/US = “EQUATION GROUP” Name give by Kaspersky • UK = GHCQ-JTRIG, NCSC, MYNOC • SA = COMSEC • Australia = ASD • CANADA = CSEC • CHINA = PLA61398 • NKOREA = LAZARUSGROUP • RUSSIA = GRU6thDIR-FSO, GTsST • IRAN = INCA • DUTCH = JSCU AFRICA • Only cyber warfare unit known is under South African Government • Owned under National Intelligence Agency NIA • Formerly Electronic Communications Security ELS • Interagency with OIC, Office of Interception Centre EXAMPLES OF KNOWN NATION STATE CYBER WARFARE EVENTS • Estonia cyber attack by Russia • Crimea cyber attack by Russia • Operation Olympic games by TAO and Unit8200 (EquationGroup) against IRAN • Operation Nitro Zeus By TAO against IRAN by US • Operation Socialite by JTRIG/MYNOC, done by UK • Operation Rolling Thunder by JTRIG, operations by UK • Ethiopian use of HackingTeam software RCS to spy on ESAT journalists and Activists • Operation Aurora by Unit61398, operations in China • Operation Disttrack by ICA, Operations in Tehran to respond to US • Operation Turla Uroburos by Russian GRU6th Directorate in Russia • Operation DarkHotel Unit61398, from Israel EXAMPLES OF KNOWN NATION STATE CYBER WARFARE EVENTS • Sony pictures attack by LazarusGroup responding to a movie potraying Nkorea Leader • Red October – Unknown Nation State actor • Operation Ghostnet by Unit61398 from China • Operation NewsCaster by INCA in Tehran
    [Show full text]
  • Cyber Dissuasion
    N° 03/2012 recherches & documents mars 2012 Cyber Dissuasion Bruno gruselle Maître de recherche à la Fondation pour la Recherche Stratégique Bruno tertrais Maître de recherche à la Fondation pour la Recherche Stratégique alain esterle Chercheur associé à la Fondation pour la Recherche Stratégique w w w . frstrategie . o r g CYBER DISSUASION RECHERCHES & DOCUMENTS N ° 03/2012 Édité et diffusé par la Fondation pour la Recherche Stratégique 4 bis rue des Pâtures – 75016 PARIS ISSN : 1966-5156 ISBN : 978-2-911101-68-7 EAN : 9782911101687 WWW.FRSTRATEGIE.ORG 4 B I S RUE DES P ÂTURES 75 016 P ARIS TÉL. 01 43 13 77 77 FAX 0 1 43 13 77 78 SIRET 394 095 533 00045 TVA FR74 394 095 533 CODE APE 7220Z FONDATION RECONNUE D'UTILITÉ PUBLIQUE – DÉCRET DU 26 FÉVRIER 1993 SOMMAIRE INTRODUCTION ....................................................................................................................... 5 LES VULNERABILITES DE L’ESPACE NUMERIQUE ET LES RISQUES ASSOCIES SONT DEJA IMPORTANTS ET DEVRAIENT S ’AGGRAVER A L ’HORIZON 2020 ................................................... 9 Il est nécessaire d’établir le degré de gravité des risques numériques, les vulnérabilités exploitables et les perspectives de leur développement ................. 9 Les menaces pesant sur l’espace numérique ont d’ores et déjà des conséquences de sécurité importantes ...........................................................10 Les acteurs malveillants de l’espace numérique sont nombreux et leurs motivations appartiennent à des ensembles diversifiés ........................................14
    [Show full text]
  • Nuevo Escenario De Confrontación, El
    CENTRO SUPERIOR DE ESTUDIOS DE LA DEFENSA NACIONAL MONOGRAFÍAS del 126 CESEDEN EL CIBERESPACIO. NUEVO ESCENARIO DE CONFRONTACIÓN Febrero, 2012 CATÁLOGO GENERAL DE PUBLICACIONES OFICIALES http://publicacionesoficiales.boe.es/ Edita: MINISTERIO SECRETARÍA DE DEFENSA GENERAL TÉCNICA NIPO: 083-12-024-7 (edición en papel) NIPO: 083-12-025-2 (edición en línea) NIPO: 083-12-023-1 (libro-e) ISBN papel: 978-84-9781-723-3 ISBN libro-e : 978-84-9781-724-0 Depósito Legal: M-12287-2012 Imprime: Imprenta del Ministerio de Defensa Tirada: 500 ejemplares Fecha de edición: marzo, 2012 En esta edición se ha utilizado papel libre de cloro obtenido a partir de bosques gestionados de forma sostenible certificada. Las opiniones emitidas en esta publicación son de exclusiva responsabilidad de los autores de la misma. EL CIBERESPACIO. NUEVO ESCENARIO DE CONFRONTACIÓN SUMARIO Página INTRODUCCIÓN .............................................................................. 9 Por José Ramón Casar Corredera Capítulo primero LA CIBERSEGURIDAD Y LA CIBERDEFENSA ................................ 35 Por Luis Feliu Ortega Capítulo segundo ESTRATEGIAS INTERNACIONALES PARA EL CIBERESPACIO ..... 71 Por Carlos Enríquez González Capítulo tercero LA EVALUACIÓN DEL CONFLICTO HACIA UN NUEVO ESCENA- RIO BÉLICO ................................................................................. 117 Por Javier López de Turiso y Sánchez Capítulo cuarto EL CIBERESPACIO COMO ESCENARIO DEL CONFLICTO. IDEN- TIFICACIÓN DE LAS AMENAZAS ................................................ 167
    [Show full text]
  • Political Warfare: Russia, the West, and the Coming Age of Global Digital Competition
    THE NEW GEOPOLITICS MARCH 2018 EUROPE THE FUTURE OF POLITICAL WARFARE: RUSSIA, THE WEST, AND THE COMING AGE OF GLOBAL DIGITAL COMPETITION ALINA POLYAKOVA SPENCER P. BOYER BROOKINGS – ROBERT BOSCH FOUNDATION TRANSATLANTIC INITIATIVE THE FUTURE OF POLITICAL WARFARE: RUSSIA, THE WEST, AND THE COMING AGE OF GLOBAL DIGITAL COMPETITION ALINA POLYAKOVA SPENCER P. BOYER EXECUTIVE SUMMARY The Kremlin’s political warfare against democratic countries has evolved from overt to covert influence activities. But while Russia has pioneered the toolkit of asymmetric measures for the 21st century, including cyberattacks and disinformation campaigns, these tools are already yesterday’s game. Technological advances in artificial intelligence (AI), automation, and machine learning, combined with the growing availability of big data, have set the stage for a new era of sophisticated, inexpensive, and highly impactful political warfare. In the very near term, it will become more difficult, if not impossible, to distinguish between real and falsified audio, video, or online personalities. Malicious actors will use these technologies to target Western societies more rapidly and efficiently. As authoritarian states such as Russia and China invest resources in new technologies, the global competition for the next great leap in political warfare will intensify. As the battle for the future shifts to the digital domain, policymakers will face increasingly complex threats against democracies. The window to mount an effective “whole-of- society” response to emerging asymmetric threats is quickly narrowing. This paper outlines the current state of play in political warfare, identifies emerging threats, and proposes potential policy responses. It argues for greater information sharing mechanisms between trans-Atlantic governments and the private sector, greater information security and transparency, and greater investments in research and development on AI and computational propaganda.
    [Show full text]
  • Anti-Wikileaks Troll Questionwiki – Allmytweets
    QuestionWiki loaded 1787 tweets Hide Replies Hide Retweets Change User • Ecuador warns WikiLeaks founder Julian Assange over support for Catalonian independence | #QuestionWikileaks https://t.co/rzlmORATnO Nov 23, 2017 • RT @subverzo: Julian Assange should recuse himself. His extensive contacts colluding with Donny Junior & the Trump Campaign has caused him… Nov 22, 2017 • RT @BarrettBrown_: Trump Administration: Powered by Wikileaks https://t.co/aDTaACfwl1 Nov 22, 2017 • He’s a Member of Congress. The Kremlin Likes Him So Much It Gave Him a Code Name | #QuestionWikileaks https://t.co/36TtrxiQkh Nov 21, 2017 • #QuestionWikileaks https://t.co/Qbz4bkfcTB Nov 21, 2017 • RT @NatSecGeek: You really wanna go there? Let's go there. 1. After the Hollywood Access tape leaked, WikiLeaks offered to help the Trumps… Nov 21, 2017 • https://t.co/48Dkph0Jup Nov 21, 2017 • ♂ https://t.co/54d5Rwmkd1 Nov 21, 2017 • Here’s how Kushner newspaper New York Observer gave WikiLeaks and Assange an anti-Clinton ‘platform’ |… https://t.co/UKzWMyN8TX Nov 21, 2017 • @Kaidinn @laurilove You do know we follow each other? ... Tagging him isn't a stretch here ♂ Nov 20, 2017 • @Kaidinn @laurilove Assange is a rat on a sinking ship. @laurilove is an amazing person with a great mind and even… https://t.co/XumABptPd0 Nov 20, 2017 • @Kaidinn I get that. But wishing @laurilove go to prison has "bad person" written all over it. Nov 20, 2017 • @Kaidinn Sure, blame the Question Wiki guy ♂ Nov 20, 2017 • @JonePierantonio @IntelGroupNews Maybe Julian should play the lotto, because
    [Show full text]