The CSS Blog Network

The UN GGE is Dead: Time to Fall Forward

Image courtesy of lost placees/Flickr. (CC BY 2.0)

This article was originally published by the European Council on Foreign Relations (ECFR).

The top down UN GGE process appears dead in the water. International norms and laws for responding to cyber attacks must now be built from the bottom up.

Rules must be binding, violations must be punished, and words must mean something. The UN GGE failed on all three accounts.

In 2004, the United Nations established a Group of Governmental Experts with the aim of strengthening the security of global information and telecommunications systems (UN GGE). To date the UN GGE has held five sessions, which are widely credited for successfully outlining the global cybersecurity agenda and introducing the applicability of international law to state behaviour in cyberspace.

However, during the UN GGE’s fifth session in June 2017, fundamental disagreements emerged between the Group’s 25 members, particularly on the right to self-defence and the applicability of international humanitarian law to cyber conflicts. In the end, the fifth and possibly last session concluded without the release of a consensus report. With no plans to pick up the pieces, the question now is, where do we go from here?

» More

Clickbait: Fake News and the Role of the State

Courtesy of Pedro Ribeiro Simões/Flickr. (CC BY 2.0)

This article was originally published by the S. Rajaratnam School of International Studies (RSIS) on 9 February 2017.

Synopsis

States all around the world are seeking to restrict the proliferation of ‘fake news’ to insulate their populations against messages that may destabilise their societies. But is the state the best entity to combat fake news?

Commentary

IN 2016, several populist politicians around the world gained power by drawing on the emotion and biases of their supporters. Many of these followers appear to have been swayed by fake news, not verifying the ‘facts’ that their leaders provide them. More worrying, the leaders themselves seem not to care about the veracity of what they are spreading. Fake news can present as websites that deliberately publish hoaxes, propaganda, and disinformation purporting to be real news, and often using social media to drive web traffic and amplify their effect.

Some commentators fear that this is leading to a new normal where extremely biased views become the mainstream, thanks to fake news. These extreme views can cause divisions in society, foment unrest, and in some cases, lay the foundations for violence, such as the fake news that a pizza restaurant was operating a child abuse ring.

» More

Deep Web. The “Dark” Side of IS

Black hole

Courtesy Rookuzz…/Flickr

This article was originally published by the S. Rajaratnam School of International Studies (RSIS) on 7 November 2016.

Synopsis

The so-called Islamic State (IS) is the most innovative terrorist group the world has seen. In the backdrop of its loss on the ground, IS is expanding its cyber capabilities to conduct more cyber-attacks and hacking. This and its migration into the ‘darknet’ will make IS more dangerous than before.

Commentary

TERRORIST AND non-state actors have used different modes and mediums to spread their message and communicate with their comrades. The dawn of the Internet has also provided such groups with unparalleled opportunities to establish communications and operational links that were not possible before. Starting from websites, terrorist groups moved to more interactive mediums like chatrooms and forums. It was social media platforms, such as Facebook and Twitter that truly revolutionised how militants, terrorists and non-state actors communicated with each other, recruited sympathisers and supporters and disseminated their propaganda.

» More

Whodunnit? Russia and Coercion through Cyberspace

Blue Circuit

Courtesy of Yusuke Umezawa / Flickr

This article was originally published by War on the Rocks on 19 October 2016.

Late in May 2014, a group calling itself CyberBerkut leaked a map of the Ukrainian Dnipropetrovsk Oblast administration’s IT resources, information on the Central Election Commission of Ukraine’s servers, and the correspondence of its staff. In the following days, which included the country’s presidential election, CyberBerkut claimed they had again compromised the election commission’s servers, leaked more confidential information, conducted a distributed denial of service (DDoS) attack the commission’s website (which instructed potential voters how and where to vote), and blocked the phones of election organizers. The group also released documents implying that the recently appointed governor of the Dnipropetrovsk Oblast, Igor Kolomoisky, was complicit in pro-European Ukrainian plans to promote the “correct” candidate for president of Ukraine.

Despite the best effort of the Russian group behind CyberBerkut, the center-right, pro-European Petro Poroshenko won the Ukrainian presidency. But CyberBerkut wasn’t finished. Almost exactly five months later, the group used similar tactics in the days preceding the Ukrainian parliamentary elections. The results were largely the same: Pro-European candidates won the majority of seats. An uninitiated observer might be keen to discard these events as failed electioneering. After all, Moscow did not succeed in getting its men elected. But to label the operation a failure is to assume that the primary goal was to get pro-Russia officials elected. Over the course of the past four months, we have seen similar operations unfold in the United States, and — as was the case in Ukraine — there are reasons to believe that swaying the election is not the primary objective. Just as in the case of the CyberBerkut incidents, among the key observers of these operations in the United States have been cyber-security firms like FireEye. The manager of their information operations analysis team recently shared some of their findings with me, which informs the analysis below.

» More

Internet Shutdowns During Political Unrest Are Becoming Normal – And It Should Worry Us

5280585822_ed883a633a_b

Courtesy Michael Coghlan / Flickr

This article was originally published by the Political Violence at a Glance on 16 September 2016.

Last night, for the eleventh night in a row, Internet access was shut down in Gabon. Starting again at 7pm, network accessibility almost came to a halt. These “Internet curfews” come in the aftermath of highly contested and controversial national elections. Just over a week ago, Gabon’s incumbent president, Ali Bongo, declared himself winner of the elections by a narrow margin with 49.8 percent of all votes. His opponent, Jean Ping, who allegedly lost with 48.2 percent of votes has demanded a recount, and the international community has backed him up. Amidst the uncertainty surrounding the election results, protesters took to the streets and set fire to a parliamentary house, while the opposition reported attacks against their premises by incumbent forces. Throughout the post-election tensions, the government has resorted to extreme digital censorship. Prior to the nightly Internet curfews, connections were cut for more than five days across the country while protesters took to the streets across Libreville, and according to Reuters, thousands were arrested under the charges of rioting.

» More

Page 1 of 11