International Cyber Norms: Legal, Policy & Industry Perspectives

Total Page:16

File Type:pdf, Size:1020Kb

International Cyber Norms: Legal, Policy & Industry Perspectives International Cyber Norms Legal, Policy & Industry Perspectives Anna-Maria Osula and Henry Rõigas (Eds.) This publication may be cited as: [Article author(s)], [full article title], International Cyber Norms: Legal, Policy & Industry Perspectives, Anna-Maria Osula and Henry Rõigas (Eds.), NATO CCD COE Publications, Tallinn 2016 © 2016 by NATO Cooperative Cyber Defence Centre of Excellence. All rights reserved. No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non- profit or non-commercial purposes, providing that copies bear a full citation. NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org LEGAL NOTICE This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE). It does not necessarily reflect the policy or the opinion of the NATO CCD COE or NATO. The NATO CCD COE may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Print: EVG Print Cover design & content layout: Villu Koskaru ISBN 978-9949-9544-6-9 (print) ISBN 978-9949-9544-7-6 (pdf) NATO Cooperative Cyber Defence Centre of Excellence The Tallinn-based NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) is a NATO-accredited knowledge hub, think-tank and training facil- ity. The international military organisation focuses on interdisciplinary applied research and development, as well as consultations, trainings and exercises in the field of cyber security. The Centre’s mission is to enhance capability, cooperation and information sharing between NATO, Allies and partners in cyber defence. Membership of NATO CCD COE is open to all Allies. The Czech Republic, Estonia, France, Germany, Greece, Hungary, Italy, Latvia, Lithuania, the Netherlands, Poland, Slovakia, Spain, Turkey, the United Kingdom and the United States have signed on as sponsoring nations. Austria and Finland have joined the Centre as contributing participants. The Centre is funded and staffed by these member nations. Foreword All our lauded technological progress – our very civilization – is like the axe in the hand of the pathological criminal. – Albert Einstein Einstein’s pessimistic notion is as relevant today as a century ago. The very opportu- nities that are created by information and communication technologies also bring vulnerabilities with them. Everything that is good and everything that is bad in human nature have their manifestations in cyberspace. The ultra-rapid advance- ment of technology has challenged and outpaced the development of the norma- tive frameworks that should limit malicious activities – be it crime, hacktivism or state-sponsored activities. This book looks at these normative frameworks and focuses on the interaction between the different types of norms that regulate state behaviour in cyberspace. International developments regarding cyber norms have been addressed by mul- tiple international actors. NATO has taken a clear line on the issue: the Alliance expressed its position in the Wales Summit Declaration (2014), stating that existing international law applies to cyberspace. The declaration also affirmed that cyber defence is part of NATO’s core task of collective defence and emphasised that a cyber attack can lead to the invocation of Article 5. Indeed, in the context of this book, Article 5 can be seen as the most relevant norm for the Alliance. On the global level, key players have agreed on the applicability of international law and have pro- moted accompanying cyber ‘norms of behaviour’. First steps have been taken, but we are far from having a common understanding among states. Thus, academics and other non-state actors have de facto led the way on the subject of cyber norms. The NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) has been addressing the subject of ‘cyber norms’ since its establishment in 2008. The Centre has focussed on the question of how existing international legal norms apply to cyberspace by hosting and facilitating the Tallinn Manual process. More specifically, the firstTallinn Manual on the International Law Applicable to Cyber Foreword 7 Warfare (2013) paid particular attention to cyber operations that qualify legally as ‘use of force’ or ‘armed attack’ or that take place during an armed conflict. However, since the most frequent cyber incidents do not rise to these levels, the Centre is currently finalising a follow-on projectTallinn 2.0, which will be published at the end of 2016. While the Tallinn Manual process looks at the existing international law, the Centre has also taken on the task of understanding how different stakeholders con- ceptualise and further develop the broadly definable ‘cyber norms’. This book is a result of a three-year project, during which the Centre has brought together govern- ment officials, political scientists, lawyers and industry representatives for discus- sions, with the aim of mapping and understanding their views on the issue. These workshops have clearly presented that different disciplines define and apply the term ‘cyber norm’ in various and often confusing ways. Therefore, the objective of this book is to explain, analyse and discuss these diverse approaches to cyber norms by gathering different practical and theoretical viewpoints from distinguished legal experts, political scientists, government officials and private sector representatives. It is my hope that our work – both the Tallinn Manual process and the ‘cyber norms’ project – will support the efforts to agree on common norms in the cyber domain. I would like to thank the book’s editors, authors, peer-reviewers and sup- port staff for their excellent contributions to the project throughout the years. Sven Sakkov Director, NATO Cooperative Cyber Defence Centre of Excellence 8 International Cyber Norms: Legal, Policy & Industry Perspectives Contents Foreword. 7 Contents . 9 1 Introduction . .11 Anna-Maria Osula and Henry Rõigas 2 The Nature of International Law Cyber Norms. 23 Michael N. Schmitt and Liis Vihul 3 Cyber Law Development and the United States Law of War Manual. 49 Sean Watts 4 The International Legal Regulation of State-Sponsored Cyber Espionage. 65 Russell Buchan 5 Beyond ‘Quasi-Norms’: The Challenges and Potential of Engaging with Norms in Cyberspace. 87 Toni Erskine and Madeline Carr 6 United Nations Group of Governmental Experts: The Estonian Perspective. 111 Marina Kaljurand 7 Confidence-Building Measures in Cyberspace: Current Debates and Trends . 129. Patryk Pawlak Contents 9 8 Outer Space and Cyberspace: A Tale of Two Security Realms. 155 Paul Meyer 9 International Legal Norms in Cyberspace: Evolution of China’s National Security Motivations. 171 Greg Austin 10 Technological Integrity and the Role of Industry in Emerging Cyber Norms . .203 . Ilias Chantzos and Shireen Alam 11 Key Concepts in Cyber Security: Towards a Common Policy and Technology Context for Cyber Security Norms . 221 Claire Vishik, Mihoko Matsubara, Audrey Plonk Appendix 1 – Cyber Security Norms Proposed by Microsoft. .243 Biographies . 249 10 International Cyber Norms: Legal, Policy & Industry Perspectives International Cyber Norms: Permission to make digital or hard copies of this publication for internal Legal, Policy & Industry Perspectives, use within NATO and for personal or educational use when for non-profit or non-commercial purposes is granted providing that copies bear this Anna-Maria Osula and Henry Rõigas (Eds.), notice and a full citation on the first page. Any other reproduction or NATO CCD COE Publications, Tallinn 2016 transmission requires prior written permission by NATO CCD COE. CHAPTER 1 Introduction Anna-Maria Osula and Henry Rõigas 1. International Norms Limiting State Activities in Cyberspace Cyberspace has created both great opportunities for, and serious threats to, states and non-state actors. This has led to a common understanding that behaviour per- taining to the use of information and communication technologies (ICTs) has to be limited in order to prevent conflicts that endanger international peace and security. Although these concerns also apply to other subjects, the focus of the current dis- cussions in the context of international security remains primarily on restraining the activities of states as the most capable actors. Recent cyber security related discussions in international forums indicate ‘cyber norms’ or cyber ‘norms of behaviour’ as the most suitable vehicles for guiding states’ behaviour in cyberspace. The main goals for agreeing on norms are believed to include increased predictability, trust and stability in the use of ICTs, hopefully steering states clear of possible conflict due to misunderstandings. Additionally, norms are seen as guiding principles for shaping domestic and foreign policy as well as a basis for forging international partnerships. However, despite being frequently addressed by policy-makers, academia, non- profit
Recommended publications
  • Power Seeking and Backlash Against Female Politicians
    Article Personality and Social Psychology Bulletin The Price of Power: Power Seeking and 36(7) 923 –936 © 2010 by the Society for Personality and Social Psychology, Inc Backlash Against Female Politicians Reprints and permission: sagepub.com/journalsPermissions.nav DOI: 10.1177/0146167210371949 http://pspb.sagepub.com Tyler G. Okimoto1 and Victoria L. Brescoll1 Abstract Two experimental studies examined the effect of power-seeking intentions on backlash toward women in political office. It was hypothesized that a female politician’s career progress may be hindered by the belief that she seeks power, as this desire may violate prescribed communal expectations for women and thereby elicit interpersonal penalties. Results suggested that voting preferences for female candidates were negatively influenced by her power-seeking intentions (actual or perceived) but that preferences for male candidates were unaffected by power-seeking intentions. These differential reactions were partly explained by the perceived lack of communality implied by women’s power-seeking intentions, resulting in lower perceived competence and feelings of moral outrage. The presence of moral-emotional reactions suggests that backlash arises from the violation of communal prescriptions rather than normative deviations more generally. These findings illuminate one potential source of gender bias in politics. Keywords gender stereotypes, backlash, power, politics, intention, moral outrage Received June 5, 2009; revision accepted December 2, 2009 Many voters see Senator Hillary Rodham Clinton as coldly politicians and that these penalties may be reflected in voting ambitious, a perception that could ultimately doom her presi- preferences. dential campaign. Peter Nicholas, Los Angeles Times, 2007 Power-Relevant Stereotypes Power seeking may be incongruent with traditional female In 1916, Jeannette Rankin was elected to the Montana seat in gender stereotypes but not male gender stereotypes for a the U.S.
    [Show full text]
  • Marina Kaljurand Ambassador Chief Negotiator and Undersecretary CFO of Swedbank and Moved to Stockholm
    Energy 2/2009 on legalities Marina Kaljurand Ambassador Chief Negotiator and Undersecretary CFO of Swedbank and moved to Stockholm. In Estonian papers he became a hero, when he got his new top job in Sweden. In Aftonbladet he was recently pictured under the title: The face of the finance crises doesn’t smile! Now, Estonians are not famous for smiling, but I guess that Erkki Raasuke also had no real reasons to smile, especially when later reading the article. I must say that I feel sorry for many Estonians. We must however understand that the ones who criticize are usually our friends, who care about you and want you to improve. What are then the usual reactions to criticism here on the street? I have always met two reactions here. First is; Go home if you do not Dear reader, like it here! Second one; You must be working for KGB! Is it OK to criticize Estonia? These reactions are quite primitive, even if they are understandable to some extent. However I would recommend I have soon lived ten years in Estonia and I have all the time people to take a more mature approach. There is the old saying been wondering if it is ok to criticize Estonia, Estonians and from Jeppe på berget [edit: Jeppe on the mountain, a comedy all what is taking place here or should we foreigners keep our written by Ludvig Holberg, a Norwegian-Danish author]; We mouth shut and only come out on the BBN chat site with our all know that Jeppe is drinking, but no one knows why Jeppe opinions? is drinking! This applies also here.
    [Show full text]
  • Cyber Stability C O N F E R E N
    C Y B E R S T A B I L I T Y C O N F E R E N C E E X P L O R I N G T H E F U T U R E O F I N S T I T U T I O N A L D I A L O G U E 2 8 S E P T E M B E R 2 0 2 0 F O R M A L O P E N I N G O F C S 2 0 9 : 0 0 T H E U R G E N C Y O F D I A L O G U E 9 : 0 0 Moderated Discussion ICT-related incidents involving States both before and during the Covid-19 pandemic have added to the urgency of calls to establish institutional dialogue within the United Nations and strengthen dialogue at regional and sub-regional levels. At the same time, however, the global backdrop to these calls has grown difficult: a shifting international security and normative environment in which dialogue between States, the major powers in particular, is stalling; growing discontent with - or disregard for - multilateralism, with actors, frameworks and interconnections more complex and divides – digital or otherwise - between States more evident. The speakers will explore the opportunities and challenges of establishing dialogue among States and between States and other actors in the current environment; the feasibility of facilitating or establishing dialogue between States; the involvement of actors other than States in dialogue; and the international security implications if dialogue between relevant actors is not feasible or if dialogue breaks down.
    [Show full text]
  • Cancel Culture: Posthuman Hauntologies in Digital Rhetoric and the Latent Values of Virtual Community Networks
    CANCEL CULTURE: POSTHUMAN HAUNTOLOGIES IN DIGITAL RHETORIC AND THE LATENT VALUES OF VIRTUAL COMMUNITY NETWORKS By Austin Michael Hooks Heather Palmer Rik Hunter Associate Professor of English Associate Professor of English (Chair) (Committee Member) Matthew Guy Associate Professor of English (Committee Member) CANCEL CULTURE: POSTHUMAN HAUNTOLOGIES IN DIGITAL RHETORIC AND THE LATENT VALUES OF VIRTUAL COMMUNITY NETWORKS By Austin Michael Hooks A Thesis Submitted to the Faculty of the University of Tennessee at Chattanooga in Partial Fulfillment of the Requirements of the Degree of Master of English The University of Tennessee at Chattanooga Chattanooga, Tennessee August 2020 ii Copyright © 2020 By Austin Michael Hooks All Rights Reserved iii ABSTRACT This study explores how modern epideictic practices enact latent community values by analyzing modern call-out culture, a form of public shaming that aims to hold individuals responsible for perceived politically incorrect behavior via social media, and cancel culture, a boycott of such behavior and a variant of call-out culture. As a result, this thesis is mainly concerned with the capacity of words, iterated within the archive of social media, to haunt us— both culturally and informatically. Through hauntology, this study hopes to understand a modern discourse community that is bound by an epideictic framework that specializes in the deconstruction of the individual’s ethos via the constant demonization and incitement of past, current, and possible social media expressions. The primary goal of this study is to understand how these practices function within a capitalistic framework and mirror the performativity of capital by reducing affective human interactions to that of a transaction.
    [Show full text]
  • Getting to Yes with China in Cyberspace
    Getting to Yes with China in Cyberspace Scott Warren Harold, Martin C. Libicki, Astrid Stuth Cevallos C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/rr1335 Library of Congress Cataloging-in-Publication Data ISBN: 978-0-8330-9249-6 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark Cover Image: US President Barack Obama (R) checks hands with Chinese president Xi Jinping after a press conference in the Rose Garden of the White House September 25, 2015 in Washington, DC. President Obama is welcoming President Jinping during a state arrival ceremony. Photo by Olivier Douliery/ABACA (Sipa via AP Images). Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors.
    [Show full text]
  • Internet Trends 2015 – Code Conference
    INTERNET TRENDS 2015 – CODE CONFERENCE Mary Meeker May 27, 2015 kpcb.com/InternetTrends Outline 1) Internet – Two-Thirds of a Generation In... 2) Key Internet Trends 3) Re-Imagining Continues... 4) America’s Evolving Work Environment... 5) Big Internet Markets = China / India 6) Public / Private Company Data 7) One More Thing... 8) Ran Outta Time Thoughts / Appendix 2 INTERNET TRENDS – TWO-THIRDS OF A GENERATION IN... TWO-THIRDS OF NEXT GENERATION OUT... Internet Users – 1995 2014... <1% to 39% Population Penetration Globally 1995 2014 35MM+ Internet Users 2.8B Internet Users 0.6% Population Penetration 39% Population Penetration 10% 21% 5% 22% 23% 12% 61% 0% 19% 28% USA China Asia (ex. China) Europe Rest of World Source: Euromonitor, ITU, US Census. 4 Mobile Phone Users – 1995 2014... 1% to 73% Population Penetration Globally 1995 2014 80MM+ Mobile Phone Users 5.2B Mobile Phone Users 1% Population Penetration 73% Population Penetration 40% 60% Smartphone Feature Phone Source: Informa, World Cellular Information Service (WCIS). Assumes in 1995, one mobile phone subscription per unique user (no duplication). Note: In 2014, user base per KPCB estimates based on Morgan Stanley Research and ITU data. Smartphone users & mobile phone users represent unique individuals owning mobile devices; mobile 5 subscribers based on number of connections & may therefore overstate number of mobile users. Public Internet Company Market Capitalizations – 1995 2015... Top 15 Companies by Market Capitalization = 1995 @ $17 Billion 2015 @ $2.4 Trillion Global
    [Show full text]
  • The Evolution of Feminist and Institutional Activism Against Sexual Violence
    Bethany Gen In the Shadow of the Carceral State: The Evolution of Feminist and Institutional Activism Against Sexual Violence Bethany Gen Honors Thesis in Politics Advisor: David Forrest Readers: Kristina Mani and Cortney Smith Oberlin College Spring 2021 Gen 2 “It is not possible to accurately assess the risks of engaging with the state on a specific issue like violence against women without fully appreciating the larger processes that created this particular state and the particular social movements swirling around it. In short, the state and social movements need to be institutionally and historically demystified. Failure to do so means that feminists and others will misjudge what the costs of engaging with the state are for women in particular, and for society more broadly, in the shadow of the carceral state.” Marie Gottschalk, The Prison and the Gallows: The Politics of Mass Incarceration in America, p. 164 ~ Acknowledgements A huge thank you to my advisor, David Forrest, whose interest, support, and feedback was invaluable. Thank you to my readers, Kristina Mani and Cortney Smith, for their time and commitment. Thank you to Xander Kott for countless weekly meetings, as well as to the other members of the Politics Honors seminar, Hannah Scholl, Gideon Leek, Cameron Avery, Marah Ajilat, for your thoughtful feedback and camaraderie. Thank you to Michael Parkin for leading the seminar and providing helpful feedback and practical advice. Thank you to my roommates, Sarah Edwards, Zoe Guiney, and Lucy Fredell, for being the best people to be quarantined with amidst a global pandemic. Thank you to Leo Ross for providing the initial inspiration and encouragement for me to begin this journey, almost two years ago.
    [Show full text]
  • Pirates of the Isps: Tactics for Turning Online Crooks Into International Pariahs
    21st CENTURY DEFENSE INITIATIVE CyBER SECuRITy #1 July 2011 Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman 1775 Massachusetts Ave., NW Washington, D.C. 20036 brookings.edu Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman CyberSeCurity #1 July 2011 21st CENTURY DEFENSE INITIATIVE Acknowledgements every research paper is a group effort, no mat- My Wired.com colleagues—ryan Singel, kevin ter what it says on the byline. this project relied Poulsen, kim Zetter and David kravets—cover more on outside assistance than most. brookings the cybersecurity beat better than anyone. this Senior fellows Peter Singer and ken lieberthal paper would have been impossible without them, were the ones who convinced me to explore the and without brian krebs, master investigator of broad topic of cybersecurity. the panel they as- the online underworld. sembled gave me new insight with every meeting; my colleague allan friedman was an especially bill Woodcock, rick Wesson, Jeff Cooper, tyler invaluable tutor and remarkably generous with Moore, audrey Plonk, Jim lewis, Dmitri alpero- his time. heather Messera and robert o’brien vitch, Paul Nicholas, Jessica herrera-flannigan, provided important research and logistical sup- Jart armin, richard bejtlich, Steve Schleien, Jona- port. My research assistant, adam rawnsley, was than Zittrain and many, many others steered me tireless in his exploration of the minutiae of ev- away from my worst ideas and towards those few erything from tort law to pirate havens. not-so-bad ones. for that, i am deeply in their debt. brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact.
    [Show full text]
  • Ashley Deeks*
    ARTICLE An International Legal Framework for Surveillance ASHLEY DEEKS* Edward Snowden’s leaks laid bare the scope and breadth of the electronic surveillance that the U.S. National Security Agency and its foreign counterparts conduct. Suddenly, foreign surveillance is understood as personal and pervasive, capturing the communications not only of foreign leaders but also of private citizens. Yet to the chagrin of many state leaders, academics, and foreign citizens, international law has had little to say about foreign surveillance. Until recently, no court, treaty body, or government had suggested that international law, including basic privacy protections in human rights treaties, applied to purely foreign intelligence collection. This is now changing: Several UN bodies, judicial tribunals, U.S. corporations, and individuals subject to foreign surveillance are pressuring states to bring that surveillance under tighter legal control. This Article tackles three key, interrelated puzzles associated with this sudden transformation. First, it explores why international law has had so little to say about how, when, and where governments may spy on other states’ nationals. Second, it draws on international relations theory to argue that the development of new international norms regarding surveillance is both likely and essential. Third, it identifies six process-driven norms that states can and should adopt to ensure meaningful privacy restrictions on international surveillance without unduly harming their legitimate national security interests. These norms, which include limits on the use of collected data, periodic reviews of surveillance authorizations, and active oversight by neutral bodies, will increase the transparency, accountability, and legitimacy of foreign surveillance. This procedural approach challenges the limited emerging scholarship on surveillance, which urges states to apply existing — but vague and contested — substantive human rights norms to complicated, clandestine practices.
    [Show full text]
  • Henry Jenkins Convergence Culture Where Old and New Media
    Henry Jenkins Convergence Culture Where Old and New Media Collide n New York University Press • NewYork and London Skenovano pro studijni ucely NEW YORK UNIVERSITY PRESS New York and London www.nyupress. org © 2006 by New York University All rights reserved Library of Congress Cataloging-in-Publication Data Jenkins, Henry, 1958- Convergence culture : where old and new media collide / Henry Jenkins, p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8147-4281-5 (cloth : alk. paper) ISBN-10: 0-8147-4281-5 (cloth : alk. paper) 1. Mass media and culture—United States. 2. Popular culture—United States. I. Title. P94.65.U6J46 2006 302.230973—dc22 2006007358 New York University Press books are printed on acid-free paper, and their binding materials are chosen for strength and durability. Manufactured in the United States of America c 15 14 13 12 11 p 10 987654321 Skenovano pro studijni ucely Contents Acknowledgments vii Introduction: "Worship at the Altar of Convergence": A New Paradigm for Understanding Media Change 1 1 Spoiling Survivor: The Anatomy of a Knowledge Community 25 2 Buying into American Idol: How We are Being Sold on Reality TV 59 3 Searching for the Origami Unicorn: The Matrix and Transmedia Storytelling 93 4 Quentin Tarantino's Star Wars? Grassroots Creativity Meets the Media Industry 131 5 Why Heather Can Write: Media Literacy and the Harry Potter Wars 169 6 Photoshop for Democracy: The New Relationship between Politics and Popular Culture 206 Conclusion: Democratizing Television? The Politics of Participation 240 Notes 261 Glossary 279 Index 295 About the Author 308 V Skenovano pro studijni ucely Acknowledgments Writing this book has been an epic journey, helped along by many hands.
    [Show full text]
  • Cyber Law and Espionage Law As Communicating Vessels
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
    [Show full text]
  • Capital & Regional Plc Annual Report 2000 Creating Places That Live
    Capital & Regional plc Capital & Regional plc 10 Lower Grosvenor Place, London SW1W 0EN T: 020 7932 8000 F: 020 7802 5600 www.capreg.com Annual Report 2000 Capital & Regional plc Annual Report 2000 Creating places that live Our retail and leis expertise is focus Centres, Retail Pa Capital & Regional is a specialist property company, owning and developing some of the most exciting and distinctive retail and leisure properties throughout the UK. The current portfolio value is over £800m of which 90% is retail and leisure, totalling over seven million sq ft. Capital & Regional’s objective is to use its in-house expertise to create value for tenants and shareholders through the innovative and dynamic management of property assets. Contents 39 Auditors’ Report 01 Highlights 40 Consolidated Profit and Loss Account 02 Chairman and Chief Executive’s Review 41 Note of Historical Cost Profits and Losses 06 Operating Review 41 Statement of Total Recognised Gains and Losses 08 Shopping Centres 41 Reconciliation of Movements in 14 Retail Parks Shareholders’ Funds 20 Xscape 42 Consolidated Balance Sheet 26 Principal Properties 43 Consolidated Cash Flow Statement 28 Board of Directors 44 Company Balance Sheet 30 Financial Review 45 Notes to the Financial Statements 34 Five Year Record 58 Directors’ Report 35 Report on Directors’ Remuneration 60 Notice of the Annual General Meeting 67 and Interests 67 Advisers and Corporate Information 38 Corporate Governance Statement 68 2001 Financial Calendar 01 Capital & Regional plc ure property ed on Shopping rks and Xscape Highlights Pre-tax profit up 5% to £13.4m (1999: £12.8m) Net rental income up 25% to £57m (1999: £45.5m) Earnings per share increased by 10% to 13.4p (1999: 12.2p) Fully diluted net assets per share decreased by 4% to 360p (1999: 376p) Dividends per share up 10% to 5.5p (1999: 5.0p) Disposals to date of £246m – £62m of trading and investment assets during year.
    [Show full text]