01.12.2012 Views

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A N<strong>on</strong>-Militarised Approach to Cyber-Security<br />

Andrew Adams 1 , Pauline Reich 2 and Stuart Weinstein 3<br />

1 Meiji University, Tokyo, Japan<br />

2 Waseda University, Tokyo, Japan<br />

3 University <str<strong>on</strong>g>of</str<strong>on</strong>g> Hertfordshire, Hatfield, UK<br />

Abstract: In 2011 cyberspace came under highly visible military threat. This<br />

threat was not cyber-attack by governments or terrorists, but <str<strong>on</strong>g>the</str<strong>on</strong>g> threat <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

a militaristic approach to cyber-security. The US and UK military establishments<br />

(am<strong>on</strong>g o<str<strong>on</strong>g>the</str<strong>on</strong>g>rs) made str<strong>on</strong>g arguments about <str<strong>on</strong>g>the</str<strong>on</strong>g> need to expand<br />

<str<strong>on</strong>g>the</str<strong>on</strong>g>ir <strong>on</strong>line presence from use <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> Internet for <str<strong>on</strong>g>the</str<strong>on</strong>g>ir own informati<strong>on</strong><br />

transmissi<strong>on</strong> and into cyber-attack capabilities. Resp<strong>on</strong>ding to claims <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g><br />

Russian and Chinese governments sp<strong>on</strong>soring cracking attacks against Est<strong>on</strong>ia,<br />

Georgia and Google, cyberspace in 2011 became <str<strong>on</strong>g>the</str<strong>on</strong>g> fifth arena <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

warfare (land, (under)sea, air, space and now cyberspace). Although development<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> basic c<strong>on</strong>cept and protocols <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> Internet was funded<br />

by DARPA, a military research agency, <str<strong>on</strong>g>the</str<strong>on</strong>g> military and civilian uses <str<strong>on</strong>g>of</str<strong>on</strong>g> Internet<br />

systems rapidly diverged in <str<strong>on</strong>g>the</str<strong>on</strong>g> early days. This separati<strong>on</strong> allowed<br />

<str<strong>on</strong>g>the</str<strong>on</strong>g> development <str<strong>on</strong>g>of</str<strong>on</strong>g> a free, generative and borderless Internet whose base<br />

flexibility and civilian orientati<strong>on</strong> made it <strong>on</strong>e <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> core technologies <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

modern life by 2011. Just as it has become an essential platform for legitimate<br />

activity, illegitimate activity has also flourished <strong>on</strong>line. The very automati<strong>on</strong><br />

which makes computers and <str<strong>on</strong>g>the</str<strong>on</strong>g> Internet so valuable can also be<br />

utilised for negative purposes such as Denial <str<strong>on</strong>g>of</str<strong>on</strong>g> Service Attacks, malware<br />

distributi<strong>on</strong> and fraud. There are claims that some governments are sp<strong>on</strong>soring<br />

attacks and cyber-espi<strong>on</strong>age against <str<strong>on</strong>g>the</str<strong>on</strong>g>ir enemies (o<str<strong>on</strong>g>the</str<strong>on</strong>g>r states or<br />

large corporati<strong>on</strong>s), and claims about <str<strong>on</strong>g>the</str<strong>on</strong>g> rise and dangers <str<strong>on</strong>g>of</str<strong>on</strong>g> cyberterrorism.<br />

Military forces, faced with a diminishing role in preparati<strong>on</strong>s for<br />

large scale physical c<strong>on</strong>flicts, have begun claiming that civilian cyberspace<br />

needs to be (re-)militarised and that <str<strong>on</strong>g>the</str<strong>on</strong>g> armed forces should be given<br />

both <str<strong>on</strong>g>the</str<strong>on</strong>g> technical tools and <str<strong>on</strong>g>the</str<strong>on</strong>g> legal rights to c<strong>on</strong>duct not just cyberdefence<br />

activities, but <str<strong>on</strong>g>of</str<strong>on</strong>g>fensive cyber-attacks. In this paper we argue from<br />

both philosophical and practical standpoints that a pacifist approach to<br />

cyber-security is more appropriate. Based <strong>on</strong> <str<strong>on</strong>g>the</str<strong>on</strong>g> c<strong>on</strong>stituti<strong>on</strong>al pacifism <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

Germany and Japan, we argue that investment in cyber-defence would be<br />

better targetted at improving <str<strong>on</strong>g>the</str<strong>on</strong>g> physical and electr<strong>on</strong>ic infrastructure <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

<str<strong>on</strong>g>the</str<strong>on</strong>g> Internet in general (for example, by funding <str<strong>on</strong>g>the</str<strong>on</strong>g> free distributi<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!