Brazil Doubles Down on Cyber Security

Brazilian flag. Image: bea_marques/Pixabay.

This article was originally published by OpenDemocracy on 20 November, 2014.

Brazil has embraced the digital age with more gusto than most countries. It is one of the top users of social media and recently signed-off on a bill of rights for the Internet, the marco civil. The country is also a leader in the development of online banking with more than 43% of web users engaging such services, and can be proud of a thriving software industry, including some world beating companies.

But as computer users around the world are beginning to grasp, the spread of the digital world has its downsides. Alongside all the great things the Internet offers, not least new forms of political and economic empowerment, it brings some very serious threats.

Handling Cyber Incidents & Cyber Crises: Terminology, Perspective and Attribution

The NASA Supercomputer “Discover”. Image: NASA Goddard Space Flight/Flickr

Cyber incidents are a bit like a bar brawl – you might have a pretty good idea who started it, but you will never be absolutely sure”.

When it comes to managing contemporary cyber incidents and crises, the above statement couldn’t be more accurate. National cybersecurity strategies and international regimes are not only becoming increasingly common, they’re also proving difficult to implement and enforce. In this respect, some of the most pressing concerns are associated with key cybersecurity aspects like ‘terminology’, ‘perspective’ and ‘attribution’.

‘Cybersecurity’ and Why Definitions Are Risky

Computer screen. Image: hackNY.org/Flickr

On November 7, the Swiss Chairmanship of the Organization for Security and Co-operation in Europe (OSCE) held a conference in Vienna  on confidence-building measures for cybersecurity. The event built on several positive international developments last year, including a bilateral agreement between the U.S. and Russia and the member states of the OSCE to adopt “an initial set of OSCE Confidence-Building Measures (CBMs) to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies.” Last week’s conference sought to promote the implementation of the latter and further negotiations. This includes a recent study commissioned by the Swiss Government, and available at the Global Cyber Definitions Database, which offers a compilation of existing cybersecurity-related terms in order to shed light on these differences.

Emerging Technologies: Security and Regulatory Concerns

Image: jurvetson/Wikimedia

Scientific research is no stranger to the battlefield. Technological breakthroughs have often started off in military research labs or prompted by military funding. The trend caught momentum during the Cold War when the superpowers on both sides of the Iron Curtain delegated researchers and huge budgets to the development of technologies of war, space and ocean exploration.

Prepare Yourself for Security Jam 2014!

2014 Security Jam

The ISN is proud to be a partner of Security Jam 2014, a global online brainstorming session which the Security and Defense Agenda (SDA) will co-host with IBM from 14-16 October 2014. Over the course of 54 hours and across 6 discussion forums, thousands of experts will discuss and then propose concrete solutions to a variety of security-related problems. Subsequent to the online session, the Jam’s top 10 recommendations will then serve as the foundation of a report that will be presented to the new leaders of NATO and the EU, and distributed to thousands of policymakers and decision-makers worldwide.

Since anyone can participate in Security Jam, we welcome you to register for free and share your ideas on key security and defense issues with leading experts. And in order to help you prepare for the discussion, we’ve put together a special dossier collection, which features background materials that relate directly to each of the six Security Jam forums. (You can, by the way, also create your own specifically tailored multimedia collection using the over 80,000 items currently available in the ISN Digital Library. To find out more click here.)

1) The New Global Balance

The first Security Jam forum will feature a broad discussion on the future of the global order and international security. Some of the questions that will be discussed include the following: What does the US pivot towards Asia and declining Western influence mean for emerging powers such as Russia, China, India or Turkey, especially in economic, diplomatic, and security terms? How will the massive discrepancies in worldwide defense spending impact the “new global balance”? Which challenges and new threats should strategic planners take into account and what military and civilian capabilities are required to counter these threats?

2) The EU as a Global Security Broker

The second forum will focus on the role of the European Union as a global security actor and provider. More specifically, the Jamparticipants will discuss a) how the EU can and should enhance its global status and credibility, b) whether EU members states can agree on a common security and foreign policy vision, and c) what lessons should be drawn from previous and current EU efforts to promote security and development.

3) NATO’s Role 2025

As the ISAF mission in Afghanistan continues to wind down, what will the future of transatlantic security cooperation look like? Can and should NATO remain a military-centered alliance? Will other countries join NATO in light of renewed tensions with Russia? How should NATO and the EU cooperate in the future? Answering these questions and others will be the focus of the third Security Jam forum.

4) Cybersecurity and Cyberdefense

The fourth forum will explore future cyber threats and the ways to counter them. Some of the questions that will be discussed include the following: How can governments, international organizations and private companies enhance their technical and strategic cyber defense capabilities? Should NATO and the EU take an offensive approach towards cyber security? How does cyber security affect privacy and data protection? Can international rules in this domain be established and enforced?

5) Case-Study – Ukraine and Russia

Given the troubled relations Western states are currently experiencing with Russia, how should NATO, the OSCE, the European Union and the United States engage with Moscow, specifically in order to avoid further tensions and possible conflict? Could the recent crisis have been foreseen and avoided? How are domestic politics continuing to influence Russia’s behavior? These questions and many more will be up for discussion during the fifth Security Jam forum.

6) Case-Study – Syria

Finally, the sixth Jamforum will focus on the complex internal conflict in Syria and its impact on global security. At a minimum, how should regional and global powers deal with the threat posed by the Islamic State in Iraq and Syria (ISIS)? How can the humanitarian consequences of the conflict be alleviated? What are the spill-over effects for the region? How can European countries prepare for the return of Jihadist foreign fighters? Ect.

In closing, we hope the above materials are of interest and helpful to you and that they will spur you to participate in Security Jam 2014. It is a golden opportunity for you to participate in an important dialogue and have your voice heard.