Handling Cyber Incidents & Cyber Crises: Terminology, Perspective and Attribution

The NASA Supercomputer “Discover”. Image: NASA Goddard Space Flight/Flickr

Cyber incidents are a bit like a bar brawl – you might have a pretty good idea who started it, but you will never be absolutely sure”.

When it comes to managing contemporary cyber incidents and crises, the above statement couldn’t be more accurate. National cybersecurity strategies and international regimes are not only becoming increasingly common, they’re also proving difficult to implement and enforce. In this respect, some of the most pressing concerns are associated with key cybersecurity aspects like ‘terminology’, ‘perspective’ and ‘attribution’. » More

‘Cybersecurity’ and Why Definitions Are Risky

Computer screen. Image: hackNY.org/Flickr

On November 7, the Swiss Chairmanship of the Organization for Security and Co-operation in Europe (OSCE) held a conference in Vienna  on confidence-building measures for cybersecurity. The event built on several positive international developments last year, including a bilateral agreement between the U.S. and Russia and the member states of the OSCE to adopt “an initial set of OSCE Confidence-Building Measures (CBMs) to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies.” Last week’s conference sought to promote the implementation of the latter and further negotiations. This includes a recent study commissioned by the Swiss Government, and available at the Global Cyber Definitions Database, which offers a compilation of existing cybersecurity-related terms in order to shed light on these differences. » More

Comments Off

We Need to Fix the Way We Talk about National Intelligence

CIA memorial wall. Image: Wikimedia

This article was originally published by The Conversation on 10 October 2014.

In the last few years, the list of sensitive government information made public as a result of unauthorised disclosures has increased exponentially. But who really benefits from these leaks?

While they are media catnip and provide useful information to hostile individuals and organisations, they only occasionally contribute to the public debate on intelligence and truly advance the cause of democracy.

A scoop on the secret world of espionage is a guaranteed journalistic coup. And with good reason; at the simplest level, news exposures of intelligence service activities inform the public and contribute to a self-evidently important public debate on the role of intelligence in modern democracies. » More

Comments Off

Emerging Technologies: Security and Regulatory Concerns

Image: jurvetson/Wikimedia

Scientific research is no stranger to the battlefield. Technological breakthroughs have often started off in military research labs or prompted by military funding. The trend caught momentum during the Cold War when the superpowers on both sides of the Iron Curtain delegated researchers and huge budgets to the development of technologies of war, space and ocean exploration. » More

Comments Off

Is Terrorism an Effective Tool for Obtaining Territorial Concessions?

Image: Menendj/Wikimedia

This article was originally published by SIPRI on 7 July 2014. This blog post is published as part of a collaborative partnership between SIPRI and Economists for Peace and Security (EPS).

Terrorism is an important but complex issue that affects many countries. While we have a good understanding of the determinants behind terror campaigns, very little attention has been paid to the question of whether terrorism is an effective strategy for coercing the targeted country to grant political and territorial concessions. The lack of research is surprising, given that the answer to this question is critical to understanding why terror exists at all, and why it appears to be increasing in many parts of the world. » More

Comments Off
Page 1 of 7