2012 4Th International Conference on Cyber Conflict (Cycon 2012)

Total Page:16

File Type:pdf, Size:1020Kb

2012 4Th International Conference on Cyber Conflict (Cycon 2012) 2012 4th International Conference on Cyber Confl ict PROCEEDINGS C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 5-8 JUNE, 2012 TALLINN, ESTONIA 2012 4TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2012) Copyright © 2012 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1226N-PRT ISBN 13 (print): 978-9949-9040-8-2 ISBN 13 (pdf): 978-9949-9040-9-9 ISBN 13 (epub): 978-9949-9211-0-2 COPYRIGHT AND REPRINT PERMISSIONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profi t or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2012 4th International Conference on Cyber Confl ict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications PRINTED COPIES OF THIS PUBLICATION ARE AVAILABLE FROM: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily refl ect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government. NATO CCD COE may not be held responsible for any loss or harm arising from the use of information contained in this book and is not responsible for the content of the external sources, including external websites referenced in this publication. 4TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT SPONSORS The NATO CCD COE and the conference organisers want to thank the following sponsors for their support of this year’s conference: ABOUT THE NATO CCD COE The NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) is an international military organisation accredited in 2008 by NATO’s North Atlantic Council as a “Centre of Excellence”. Located in Tallinn, Estonia, the Centre is currently supported by Estonia, Germany, Hungary, Italy, Latvia, Lithuania, the Netherlands, Poland, Slovakia, Spain, and the USA as Sponsoring Nations. The Centre is not part of NATO’s command or force structure, nor is it funded by NATO. However, it is part of a wider framework supporting NATO Command Arrangements. The NATO CCD COE’s mission is to enhance capability, cooperation and information- sharing between NATO, NATO member States and NATO’s partner countries in the area of cyber defence by virtue of research, education and consultation. The Centre has taken a NATO-orientated, interdisciplinary approach to its key activities, including academic research on selected topics relevant to the cyber domain from legal, policy, strategic, doctrinal and/or technical perspectives, providing education and training, organising conferences, workshops and cyber defence exercises and offering consultations upon request. For more information on the NATO CCD COE, please visit the Centre’s website at http://www.ccdcoe.org. For information on Centres of Excellence, visit NATO’s website “Centres of Excellence” at http://www.nato.int/cps/en/natolive/topics_68372.htm. FOREWORD Protecting critical information assets, enabling safe communications, and conducting effective military operations in cyberspace have become critical national security priorities for many nations. They are priorities driven not only by dramatic advances in cyber attack tools and technology, but also by the dangerous reality that such capabilities are in the hands of governments, criminal organizations, terrorist groups, and individual hackers. Once isolated and relatively ineffective, cyber attacks today are highly effective and well-coordinated operations that often consist of sequenced tit-for-tat attacks and counter-attacks. Such attacks have the theoretical potential to paralize national economies, cripple governmental functions, and endanger the physical well-being of populations. The inevitable result of these developments could well be local or even global cyber confl agrations, with consequences rising to the level of those occurring during traditional physical military confrontations. Academic institutions, industrial fora, and governmental organizations have been conducting research, performing case studies, and modeling cyber operations for a number of years. In this active cyber security “ecosystem”, the International Conference on Cyber Confl ict (CyCon) conducted annually in Tallinn by the NATO Cooperative Cyber Defence Centre of Excellence has emerged as especially infl uential, for they offer a unique perspective. This distinctiveness is marked by an innovative synergistic approach to the conceptual framework, architectures, processes and systems of cyber security and confl ict. It holistically examines strategic and policy matters, social and economic concerns, law, computer science and Information technologies, military doctrine, and human behavioral modeling with respect to cyber space. No less important is the open and interactive forum it offers to world-class researchers, legal/ policy/military experts, and IT practitioners. The Proceedings of CyCon 2012, conducted with the technical support of the IEEE Communications Society, are collected in this volume. The twenty-nine papers were selected by the conference Programme Committee following a rigorous peer review process conducted by distinguished experts. The works are sprinkled across the legal, policy, strategic, and technical spectra of cyber confl ict; they include sophisticated analyses of topics like offensive and defensive cyber activities, the concept of the cyber space, its legal and technical boundaries, and the fundamental notions of cyber attacks, cyber attackers, cyber confl ict, and cyber warfare. We hope readers will agree that they comprise erudite and useful examinations of the key questions with which scholars and practitioners continue to struggle. This volume is arranged into six chapters. The fi rst, Cyberspace – The Role of States in the Global Structure, includes articles that consider the role of governments in cyber space policy- making. The second chapter, Cyber Policy & Strategic Options builds on the fi rst with papers that turn to the policies and strategies that States are adopting on such matters as cyber space protection, militarization of the cyber space and cyber warfare. Articles in the third chapter, Cyber Confl ict – Theory & Principles, examine theoretical issues and the historical and operational context in which they are at play. The fourth chapter, Cyber Confl ict – Actors, is a collection of papers that identifi es the various human and software actors involved in cyber ii confl ict and examines their roles and objectives, as well as the ramifi cations of their activities. Chapter Five, “Cyber-Attacks” – Trends, Methods & Legal Classifi cation, deals with the activities of those cyber actors. It includes articles on computer network attack, methods of commanding and controlling cyber attacks, and cyber attacks in the context of international law. The volume concludes with a chapter, Cyber Defence – Methods & Tools, providing a series of technical pieces on cyber security information sensing, decision support and tools supporting the tasks of cyber defense. We would like to thank the distinguished members of the CyCon 2012 Programme Committee for their tireless work in identifying papers for presentation at the conference and publication in this book. Most importantly, though, we are delighted to congratulate this volume’s editors – Dr Katharina Ziolkowski, CPT Christian Czosseck, and Dr Rain Ottis of the NATO Cooperative Cyber Defence Centre of Excellence. Without their technical expertise, professional attitude, personal dedication, and boundless enthusiasm this impressive work would not have been possible. The CyCon 2012 Programme Committee Co-Chairs Dr Gabriel Jakobson Chief Scientist, Altusys Corp Brookline, MA Professor Michael N. Schmitt United States Naval War College Newport, Rhode Island iii TABLE OF CONTENTS Introduction 1 Chapter 1: Cyberspace – The Role of States in the Global Structure 5 Legal Implications of Territorial Sovereignty in Cyberspace 7 Wolff Heintschel von Heinegg When “Not My Problem” Isn’t Enough: Political Neutrality and 21 National Responsibility in Cyber Confl ict Jason Healey Neutrality in Cyberspace 35 Wolff Heintschel von Heinegg Impact of Cyberspace on Human Rights and Democracy 49 Vittorio Fanchiotti / Jean Paul Pierini Chapter 2: Cyber Policy & Strategic Options 61 Russia’s Public Stance on Cyber/Information Warfare 63 Keir Giles French Cyberdefense Policy 77 Patrice Tromparent A Treaty for Governing Cyber-Weapons: 91 Potential Benefi ts and Practical Limitations Louise Arimatsu Internet as a Critical Infrastructure – A Framework for the Measurement 111 of Maturity and Awareness in the Cyber Sphere Assaf Y. Keren, Keren Elazari The Signifi cance of Attribution to Cyberspace Coercion: A Political Perspective 125 Forrest Hare The Militarisation of Cyberspace: Why Less May Be Better 141 Myriam Dunn Cavelty iv Chapter 3: Cyber Confl ict – Theory & Principles 155 Beyond Domains, Beyond Commons: 157 The Context and Theory of Confl ict in Cyberspace Jeffrey L. Caton Applying
Recommended publications
  • Romanian Political Science Review Vol. XXI, No. 1 2021
    Romanian Political Science Review vol. XXI, no. 1 2021 The end of the Cold War, and the extinction of communism both as an ideology and a practice of government, not only have made possible an unparalleled experiment in building a democratic order in Central and Eastern Europe, but have opened up a most extraordinary intellectual opportunity: to understand, compare and eventually appraise what had previously been neither understandable nor comparable. Studia Politica. Romanian Political Science Review was established in the realization that the problems and concerns of both new and old democracies are beginning to converge. The journal fosters the work of the first generations of Romanian political scientists permeated by a sense of critical engagement with European and American intellectual and political traditions that inspired and explained the modern notions of democracy, pluralism, political liberty, individual freedom, and civil rights. Believing that ideas do matter, the Editors share a common commitment as intellectuals and scholars to try to shed light on the major political problems facing Romania, a country that has recently undergone unprecedented political and social changes. They think of Studia Politica. Romanian Political Science Review as a challenge and a mandate to be involved in scholarly issues of fundamental importance, related not only to the democratization of Romanian polity and politics, to the “great transformation” that is taking place in Central and Eastern Europe, but also to the make-over of the assumptions and prospects of their discipline. They hope to be joined in by those scholars in other countries who feel that the demise of communism calls for a new political science able to reassess the very foundations of democratic ideals and procedures.
    [Show full text]
  • The Syntheist Movement and Creating God in the Internet Age
    1 I Sing the Body Electric: The Syntheist Movement and Creating God in the Internet Age Melodi H. Dincer Senior Thesis Brown University Department of Religious Studies Adviser: Paul Nahme Second Reader: Daniel Vaca Providence, Rhode Island April 15, 20 2 Table of Contents Acknowledgments. 3 Introduction: Making the Internet Holy. .4 Chapter (1) A Technophilic Genealogy: Piracy and Syntheism as Cybernetic Offspring. .12 Chapter (2) The Atheist Theology of Syntheism . 49 Chapter (3) Enacted Syntheisms: An Ethics of Active Virtuality and Virtual Activity. 96 (In)Conclusions. 138 Works Cited. 144 3 Acknowledgments I would briefly like to thank anyone who has had a hand—actually, even the slightest brush of a finger in making this project materialize outside of the confines of my own brain matter. I would first like to thank Kerri Heffernan and my Royce Fellowship cohort for supporting my initial research on the Church of Kopimism. My time in Berlin and Stockholm on behalf of the Royce made an indelible mark on my entire academic career thus far, without which this thesis would definitely not be as out-of-the-box as it is proud to be. I would also like to thank a few professors in the Religious Studies department who, whether they were aware of it or not, encouraged my confidence in this area of study and shaped how I approached the religious communities this project concerns. Specifically, thank you to Prof. Denzey-Lewis, who taught my first religious studies course at Brown and graciously sponsored my Royce research amidst her own travels. Also, infinite thanks and blessings to Fannie Bialek, who so deftly modeled all that is good in this discipline, and all that is most noble in the often confusing, frustrating, and stressful task of teaching “hard” topics.
    [Show full text]
  • May 2014 ICANN Report
    A Blueprint Subsidiarity Inclusive Accountable & Adjudicatory Crowdsource Decisionmaking Crowdsource Oversight and Develop Standards to Measure Success Move to Global Engagement Establish “Citizen” Juries Use Rotating Term Limits Decentralize Accountability Innovative Voting Techniques Use Participatory Budgeting Innovate the ICANN Public Forum LEGITIMATE EFFECTIVE EVOLVING Experimental Smart Be Experimental Use Expert Networks Transparent Learning Embrace Open Data Generate New Insights and Evidence and Open Contracting Embrace Evidence Agile & Innovative Encourage Games Enable Collaborative Drafting Cost-effective Draft May 2014 ICANN report To: Fadi Chehadé From: The ICANN Strategy Panel on Multistakeholder Innovation (Alison Gillwald, Joi Ito, Karim Lakhani, Guo Liang, Geoff Mulgan, Bitange Ndemo and Beth Simone Noveck) RE: Final Draft MSI Panel Recommendations Date: May, 2014 Enclosed please find the Final Draft Recommendations submitted on behalf of the ICANN Strategy Panel on Multistakeholder Innovation, with support from The Governance Lab @ NYU. The framework for these recom- mendations is described by a Blueprint proposing the creation of new channels for international engagement and consensus-driven policymaking to enable meaningful ways to test new institutional arrangements at ICANN. Proposal summaries can be found on pages 7-11 of this report. In crafting our proposals, there was, of course, no “approved” textbook answer, certainly no textbook suited to the realities of the 21st century. So we started from what we know from experience. To be effective, the actions of an organization like ICANN, in accordance with its public interest mission, must be – and must be perceived to be – legitimate. We now know that a contract with the agencies that originally funded and created the Net will no longer unquestionably provide such legitimacy.
    [Show full text]
  • Revisiting the Purpose of the Copyright Monopoly: Science and the Useful Arts
    Revisiting The Purpose Of The Copyright Monopoly: Science And The Useful Arts Rick Falkvinge December 2, 2012 If there’s one thing that needs constant reminding, it’s the explicit purpose of the copyright monopoly. Its purpose is to promote the progress of human knowledge. Nothing less. Nothing more. While the copyright monopoly has many different origins that have come together under this umbrella of hodgepodge different monopolies, few copyright monopoly laws are as clear on its purpose as the one in the United States of America. In its Constitution, we read the following: [Congress has the power] to promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries. This passage is notable for a number of different things. We begin by noting it says that Congress has the power, and not the obligation, to create this monopoly. Thus, the US Congress could abolish the monopoly tomorrow if there was political will. Those who claim that the copyright monopoly is “constitutionally guaranteed” are simply wrong. One hundred percent, 180 degrees wrong. Second, we should make careful note of its language. This passage enables the US Congress to make two kinds of monopolies: copyright monopolies and patent monopolies, respectively. Science and the useful arts. The “science” part refers to the copyright monopoly, and the “useful arts” has nothing to do with creative works – it is “arts” in the same sense as “artisan”, that is, craftsmanship. So let’s start looking at what is not in this passage.
    [Show full text]
  • World Policy Journal
    World Policy Journal http://wpj.sagepub.com/ The Big Question: What should governments keep secret? George O. Liber, Dieter Dettke, Frank Vogl, Maximilian C. Forte, Rick Falkvinge, Nada Alwadi, Chong Ja Ian and Adil Najam World Policy Journal 2013 30: 3 DOI: 10.1177/0740277513506373 The online version of this article can be found at: http://wpj.sagepub.com/content/30/3/3 Published by: http://www.sagepublications.com On behalf of: World Policy Institute Additional services and information for World Policy Journal can be found at: Email Alerts: http://wpj.sagepub.com/cgi/alerts Subscriptions: http://wpj.sagepub.com/subscriptions Reprints: http://www.sagepub.com/journalsReprints.nav Permissions: http://www.sagepub.com/journalsPermissions.nav >> Version of Record - Sep 23, 2013 What is This? Downloaded from wpj.sagepub.com at COLUMBIA UNIV on December 2, 2014 THE BIG QUESTION THE BIG QUESTION Secrecy WHAT SHOULD GOVERNMENTS KEEP SECRET? FEATURING ith secrecy a daily preoccu- GEORGE O. LIBER pation of governments who DIETER DETTKE Wroutinely weigh security FRANK VOGL concerns over disclosure of covert opera- MAXIMILIAN C. FORTE tions, the balance of these two priorities RICK FALKVINGE becomes an ever more pressing national NADA ALWADI debate. We asked our panel of global ex- CHONG JA IAN perts what, if anything, they believe gov- ADIL NAJAM ernments should or must keep secret. LOTUS CARROLL FALL 2013 3 Downloaded from wpj.sagepub.com at COLUMBIA UNIV on December 2, 2014 THE BIG QUESTION LIVING IN A SECRET WORLD more public information on terrorists and GEORGE O. LIBER terrorist organizations might be useful in All governments engage in furtive behavior the battle for the hearts and minds.
    [Show full text]
  • Copyright Culture and Pirate Politics
    Copyright Culture and Pirate Politics Martin Fredriksson Linköping University Post Print N.B.: When citing this work, cite the original article. This is an electronic version of an article published in: Martin Fredriksson, Copyright Culture and Pirate Politics, 2014, Cultural Studies, (28), 5-6, 1022-1047. Cultural Studies is available online at informaworldTM: http://dx.doi.org/10.1080/09502386.2014.886483 Copyright: Taylor & Francis (Routledge): SSH Titles http://www.routledge.com/ Postprint available at: Linköping University Electronic Press http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-105269 Copyright Culture and Pirate Politics Martin Fredriksson Linköping University Sweden martin.fredriksson@liu +1 857 207 7112 / +46 732039092 Abstract This article approaches the recent debates about copyright and piracy from a cultural and historical perspective, discussing how of the problems surrounding intellectual property rights reflect cultural conflicts that are central to cultural studies. It sets out with a study of how international copyright norms developed in nineteenth-century Europe and were implemented in two different national contexts: Sweden and USA. This historical background shows how copyright has been embedded in the cultural history of Europe and intertwined with the idea of an evolving Western civilization. The examples from the past are thus used to highlight the underlying cultural implications that affect the contemporary discussions. Particular interest is paid to how the historical association between the spread of copyright and the development of civilization has affected the understanding of Asian piracy and Western file sharing today, and how a multitude of social movements both in the West and the third world simultaneously challenge the cultural legitimacy of the current system of intellectual property rights.
    [Show full text]
  • Report of the National Security Agency Texas Cryptologic Center
    UNCLASSIFIED/fFOR OFFIOb9tL UOE ONLY UNCLASSIFIED/JFOR OFFIGIAL UOE OPJL¥ UNCLASS.IFIED//FOR OFFICIAL USE OPJLY INSPECTOR GENERAL DEPARTMENT OF DEFENSE 400 ARMY NAVY DRIVE ARLINGTON, VIRGINIA 22202-2884 December 3, 2010 MEMORANDUM FOR COMMANDER, UNITED STATES PACIFIC COMMAND DIRECTOR, NAT.fONAL SECURJTY AGENCY/CHIEF CENTRAL SECURITYSERVICE COMMANDER, UNITED STATES ARMY CORP OF ENGINEERS SUBJECT: (U//fOUO) Report ofthe National Security Agency Texas Cryptologic Center Construction Project (Report No. I I -fNTEL-02). (U//fi'8H8) Background: This review was conducted as part of our audit of the National Security Agency (NSA) Cryptologic Center construction projects. This report focuses on the National Security Agency Texas (NSAT) construction project. We issued a report on the NSA Georgia Cryptologic Center military construction (MILCON) project on August 6, 2010. We do not intend to review the military construction ofthe NSA Hawaii Cryptologic Center due to competing resource requirements. We found no· significant issues with the NSA Georgia or Texas and the Hawaji MILCON is complete. (U/foFOUO) The existing NSAT building is located at the Medina Training. Annex of Lackland Air Force Base (AFB) in Northwest San Antonio, Texas. NSAT conducts Signals Intelligence and Computer Network Operations worldwide, in support of National and tactical decision-makers and customers/partners. NSAT applies geographic and functional expertise in exploiting targets operating in the Western Hemisphere and those posing a threat to Homeland Security. (UhTOUO' On January 31, 2005, Acting USD (AT&L) -.vrote to the Deputy Secretary of Defense stating that the United States Anny Corps ofEngineers (USACE), on behalfof NSA, proposed relocating from Lackland AFB to a commercial-leased facility in San Antonio, Texas.
    [Show full text]
  • What Are Critical Questions?
    University of Windsor Scholarship at UWindsor OSSA Conference Archive OSSA 10 May 22nd, 9:00 AM - May 25th, 5:00 PM Preciseness is a virtue: What are critical questions? Michael J. Hoppmann Northeastern University, Department of Communication Studies Follow this and additional works at: https://scholar.uwindsor.ca/ossaarchive Part of the Philosophy Commons Hoppmann, Michael J., "Preciseness is a virtue: What are critical questions?" (2013). OSSA Conference Archive. 74. https://scholar.uwindsor.ca/ossaarchive/OSSA10/papersandcommentaries/74 This Paper is brought to you for free and open access by the Conferences and Conference Proceedings at Scholarship at UWindsor. It has been accepted for inclusion in OSSA Conference Archive by an authorized conference organizer of Scholarship at UWindsor. For more information, please contact [email protected]. Preciseness is a virtue: What are critical questions? MICHAEL J. HOPPMANN Department of Communication Studies Northeastern University 360 Huntington Avenue, Lake 204 USA [email protected] ABSTRACT: The paper compares the uses of “critical question” in recent publications on the topic, contrasting explicit definitions where they exist and reconstructing implicit definitions where possible, and suggests a taxonomy of different “critical questions” as they are used in argumentative evaluation and criticism. In distinguishing different meanings of “critical question” horizontally between authors and vertically within the analysis, it strives to make a contribution to the ongoing work on the systematization of argumentative criticism. KEYWORDS: argumentative criticism, critical questions, enstasis, objections, undercutters 1. INTRODUCTION Besides fostering our understanding of human reasoning, one of the most important tasks of modern argumentation studies is to provide the theoretical background for applied argumentative criticism, that particular kind of rhetorical criticism that is concerned with assessing the reasonableness of a real life persuasive effort.
    [Show full text]
  • The Pirate Party and the Politics of Communication
    International Journal of Communication 9(2015), 909–924 1932–8036/20150005 The Pirate Party and the Politics of Communication MARTIN FREDRIKSSON Linköping University, Sweden1 This article draws on a series of interviews with members of the Pirate Party, a political party focusing on copyright and information politics, in different countries. It discusses the interviewees’ visions of democracy and technology and explains that copyright is seen as not only an obstacle to the free consumption of music and movies but a threat to the freedom of speech, the right to privacy, and a thriving public sphere. The first part of this article briefly sketches how the Pirate Party’s commitment to the democratic potential of new communication technologies can be interpreted as a defense of a digitally expanded lifeworld against the attempts at colonization by market forces and state bureaucracies. The second part problematizes this assumption by discussing the interactions between the Pirate movement and the tech industry in relation to recent theories on the connection between political agency and social media. Keywords: piracy, Pirate Party, copyright, social movement Introduction In the wake of the Arab Spring, much hope was invested in social media as a means to mobilize popular resistance. New technologies for decentralized popular communication, such as Twitter and Facebook, were celebrated as tools in the struggle against authoritarian regimes. Later in 2011, the U.S. Congress experienced the impact of digital mobilization when the proposed bills of the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA) were withdrawn due to massive protests. Digital rights activists were alarmed by what was perceived as limitations of free speech, and tech Martin Fredriksson: [email protected] Date submitted: 2015–02–03 1 I would like to thank Professor William Uricchio for inviting me to the Comparative Media Studies Program at MIT to conduct a pilot study in 2011 and 2012.
    [Show full text]
  • New York State Cybersecurity and Homeland Security Industry Study
    New York State Cybersecurity and Homeland Security Industry Study Confidential Prepared For: New York State Economic Development Council Attention: Ryan Silva Executive Director July 2019 k2intelligence.com New York · London · Madrid · Geneva · Los Angeles Restricted Use Warning This report was prepared by K2 Intelligence at the request of the client to whom it is furnished ("Client"). The Client acknowledges and agrees that this report and information received from K2 Intelligence (collectively, the "Report"), is being provided solely with respect to the Services defined in, and subject to the Client's compliance with, the terms and conditions of the Professional Services Agreement ("PSA") and is intended for the Client's use consistent with the terms of the PSA; provided that nothing in this Report shall be considered legal, business, regulatory, investment, financial, insurance or accounting advice, opinions, endorsements, recommendations or the like. Any other use and any reliance upon or communication, disclosure, publication, or reproduction of the Report in any portion thereof without the prior written consent of K2 Intelligence is strictly forbidden. The Report may rely upon third party and public information that has not been verified for accuracy, completeness, or otherwise by K2 Intelligence. As set forth in the PSA, the Client agrees to indemnify and hold harmless K2 Intelligence against any damages and liabilities resulting from unauthorized use of the Report, or the Client's or any third party's reliance thereon. K2 Intelligence assumes no obligation to inform the Client of any facts, circumstances, events, or changes that may hereafter be brought to its attention regardless of whether or not they may alter, affect or modify the information contained in the Report.
    [Show full text]
  • Surveillance and Privacy in the Snowden Era
    MEDIANZ VOL 14 NO 2 • 2014 DOI: http://dx.doi.org/10.11157/medianz-vol14iss2id119 - KEYNOTE - Surveillance and Privacy in the Snowden Era Nicky Hager1 Introduction The purpose of this paper is to give an overview of issues of mass surveillance, the subject that Edward Snowden has so spectacularly brought to world attention. Many readers will have been following the revelations closely, but general public understanding seems fairly confused and imprecise. Indeed, popular understanding of the Snowden revelations amounts to something like: ‘Everyone is being spied on all the time’, while the typical talk back radio host reply is: ‘I don't care if someone spies on me. If you've done nothing wrong, you've got nothing to hide’. There is also a perception that ‘It's always gone on’ and ‘everyone does it anyway’. All of these positions are wrong. I believe the more accurately we understand the issues of surveillance and privacy, the more clearly we can see where the harm is, what needs to change and how to effect this change. I will be discussing the history of electronic surveillance, the origins and growth of mass surveillance systems, what the Snowden leaks have revealed and their impact on the Internet and privacy. Finally I will discuss what we can do about it. Lessons from the history of electronic surveillance The Anglo-American spying system dates from WWII and was then put on a permanent footing in the late 1940s as part of the Cold War. A system of radio eavesdropping stations was dotted around the world as part of the intelligence war between the superpowers.
    [Show full text]
  • Discussion Paper "Network Parties"
    DISCUSSION PAPER August 2018 Katarzyna Anna Klimowicz Network parties A new model to democratise and digitise party politics? “Progress is the realisation of Utopias.” - Oscar Wilde (1854 - 1900) The following Discussion Paper presents an analysis and attempts to evaluate a new phenom- enon on the political scene in Europe – network parties. These political movements distinguish themselves from more traditional and established parties and have managed to shake up party politics in European countries such as Spain, Italy or Poland. This Discussion Paper identifies common features of network parties by looking at best practices and characteristics, especially in the organisational structure and political programmes. SUMMARY After a short description of the general context in which network parties arise, this Discussion Paper will list the most characteristic features of network parties in comparison with traditional, established parties (based on e.g. a “cartel-party” model1). Secondly, a broad definition of a network party will be given, and concrete case-studies from Spain, Poland and Iceland will be presented. Finally, the various prospects and challenges related to network parties and their innovative style of doing politics will be analysed. The article concludes that there is a deep need to establish an ethical code for the new hybrid ways of doing politics (online and offline) and ends with certain recommendations for network parties’ founders and members, which might limit the potential distortions and abuses related to certain new trends and developments. 1. The term “cartel party” was introduced by Richard Katz and Peter Mair in 1995. It is a term that defines parties with close relation to the state as well as with strong clientelist, coercive, or market linkage.
    [Show full text]