scholarly journals Private active cyber defense and (international) cyber security—pushing the line?

2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Dennis Broeders

Abstract Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the more provocative flag of ‘hack back’, in the American debate about cyber security. This article looks at the theory and practice of private cyber security provision and analyses in more detail a number of recent reports and publications on ACD by Washington DC based commissions and think tanks. Many of these propose legalizing forms of active cyber defence, in which private cyber security companies would be allowed to operate beyond their own, or their clients’ networks, and push beyond American law as it currently stands. Generally, public-private governance solutions for security problems have to manage a balance between (i) questions of capacity and assigning responsibilities, (ii) the political legitimacy of public–private security solutions and (iii) the mitigation of their external effects. The case of private active cyber defence reveals a strong emphasis on addressing the domestic security (and political) problem, while failing to convincingly address the international security problems. The proposals aim to create a legitimate market for active cyber defence, anchored to the state through regulation and certification as a way to balance capacity, responsibilities and domestic political legitimacy. A major problem is that even though these reports anticipate international repercussions and political pushback, against what is likely be received internationally as an escalatory and provocative policy, they offer little to mitigate it.

2018 ◽  
pp. 1352-1361
Author(s):  
Brian Leonard ◽  
Maurice Dawson

Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so distant past, cyber security has become a forefront subject in the battle against global terrorism. Furthermore, this chapter will examine how mobile devices are not like the devices of the past as the computing power is on par with that of some desktops and the fact that these devices have the ability to execute malicious applications. In addition, this chapter will discuss the reality, significance, legal and practical affects of the fact that suspicious programs are being executed offensively and security based attacks can be performed as well with the use of programs such as Kali Linux running on Android.


AI Magazine ◽  
2019 ◽  
Vol 40 (1) ◽  
pp. 49-62 ◽  
Author(s):  
Sunny Fugate ◽  
Kimberly Ferguson-Walter

Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defender must detect all possible threats at all times from all attackers and defend all systems against all possible exploitation. In contrast, an attacker needs only to find a single path to the defender’s critical information. In this article, we discuss how this asymmetry can be rebalanced using cyber deception to change the attacker’s perception of the network environment, and lead attackers to false beliefs about which systems contain critical information or are critical to a defender’s computing infrastructure. We introduce game theory concepts and models to represent and reason over the use of cyber deception by the defender and the effect it has on attacker perception. Finally, we discuss techniques for combining artificial intelligence algorithms with game theory models to estimate hidden states of the attacker using feedback through payoffs to learn how best to defend the system using cyber deception. It is our opinion that adaptive cyber deception is a necessary component of future information systems and networks. The techniques we present can simultaneously decrease the risks and impacts suffered by defenders and dramatically increase the costs and risks of detection for attackers. Such techniques are likely to play a pivotal role in defending national and international security concerns.


2018 ◽  
Vol 32 (32) ◽  
pp. 273-292
Author(s):  
Stanisław Zarobny

The author of the article attempted to examine the main conditions and characteristics of the French strategic culture, a country with huge arms traditions and the high social authority of the armed forces in society. All this means that France has made a huge contribution to the development of theory and practice in the field of military art and strategy, as well as in shaping the order of international security. The main strategic documents of France and its activity in the international arena confirm the traditional line of French security policy and strategic culture. It is a political culture of a superpower conscious of its great past which still radiates into current and global relations of France.


2015 ◽  
Vol 26 (2-4) ◽  
pp. 193-205 ◽  
Author(s):  
Sico van der Meer

Cyber aggression is an increasing threat to international security and stability. While national policies intended to deter cyber aggression may offer some solution in the short term, their effects in the long term are doubtful. National cyber-deterrence policies entail the risk of an on-going cyber arms race and a cycle of escalation between potential cyber opponents. Diplomacy may offer fewer results in the short term, but it is more promising in the long term. Confidence-building measures and international norms and values may not be easy to reach, but in the end they could be more effective (and cheaper) than a single focus on national cyber-deterrence strategies. In the long term, cooperation between states to establish confidence and commonly accepted norms of behaviour in cyber space are the most promising ways available to achieve enduring cyber security and stability. Enhancing interstate co-operation, transparency and predictability of behaviour in cyberspace will reduce the risks of misperception, escalation and conflict.


2022 ◽  
Vol 17 ◽  
pp. 1274-1283
Author(s):  
Harri Ruoslahti ◽  
Bríd Davis

Solutions on both consumer and state levels have become increasingly vulnerable to sophisticated cyberattacks by e.g. malware, phishing, machine learning and artificial intelligence. As the adoption and integration of information technologies are increasing and solutions are developing, the need to invest in cyber-security is at an all-time high. Investment in cybersecurity is a chief priority within the European Union, and project ECHO is a one initiative that put emphasis on devising, elaborating, implementing and enhancing a series of technological solutions (assets) to counteract cyber-attacks. The research problem of this study is what societal impacts do the ECHO assets have as product, as knowledge use, and as benefits to society. The literature review includes theory and practice from academic papers, EU innovation project and professional reports, and some ECHO project workflows. Relevant academic theoretical approaches that provide a basis for this task are: e-skills and training, Organisational Learning (OL), Societal Impact (SI), Societal Impact Assessment (SIA). This is a qualitative pilot study that evaluates the usefulness of employing a Product/ Knowledge/ Benefit Societal Impact framework to assessment of societal impacts. Data collection involved qualitative participatory observation of a co-creative expert hackathon workshop. This pilot study shows that the methodology path, where societal impact of ICT and AI solutions (e.g. the ECHO assets) are examined as these three elements (product, knowledge use, societal benefit). This pilot study serves as a step to validate this path and design and select practical, rigorous and relevant quantitative methodology to further the understanding of both societal impact assessment of cyber, e-, and AI-based solutions and services. To incorporate societal impacts with cyber and e-skills this study recommends developing and refining actual key performance indicators (KPI) to provide a basis for rigorous and relevant qualitative and quantitative questionnaire based inquiry of cyber, e-, and AI-based solutions and services.


2021 ◽  
Vol 5 (1) ◽  
pp. 001-006
Author(s):  
Bell Reston N ◽  
Candilis Phillip J ◽  
Johnson Nicole R

This study provides an update to a previous study exploring time to restoration of adjudicative competence within an Outpatient Competence Restoration Program (OCRP). Authors examined the probability of restoration for individuals referred for outpatient competence restoration in the U.S. capital, and revisited the requirements of American Law, taking a closer look at how programmatic changes improve restoration and encourage adherence. Competence to stand trial remains a critical screening function of the judicial system to ensure that defendants have a basic understanding of courtroom procedures. Competency restoration is therefore an attempt to protect both the integrity of the system and the rights of defendants. Aggregate data from the OCRP’s previous four years of competence restoration efforts were reviewed for demographic characteristics, restoration rates, and time to restoration. Poisson regression modeling identified probability differences in restoration between sequential restoration periods. Since our initial analysis, the DC OCRP has been successful in restoring 97 of 345 participants (28.1%), with referral rates increasing from year to year. 39.2% are now restored after the 3rd round of competency restoration. Poisson regression modeling of individuals attaining competence during six successive restoration periods showed that differences for the first five rounds of restoration were not statistically significant (p = 0.418). In the 6th round, however, the difference in percentage of restored participants was statistically significant compared to previous rounds (irr = 0.32; p = 0.0001). We discuss the policy implications, especially those that suggest that the DC OCRP has improved its ability to restore competence beyond the 1st round of restoration.


Sign in / Sign up

Export Citation Format

Share Document