Link[1] Why a cybersecurity treaty is a pipe dream
Author: Adam Segal, Matthew Waxman Cited by: David Price 5:59 PM 1 November 2011 GMT
Citerank: (12) 121697Blogs, Articles, ReportsSuggest / cite other blogs, articles, reports about the conference that you would like to see included in the map here.609FDDBE, 123204Bleak prospects for a global, comprehensive cybersecurity treaty959C6EF, 123212Different interests will pull the parties apartDifferent interests among powerful states – stemming from different strategic priorities, internal politics, public-private relationships and vulnerabilities – will continue to pull them apart on how cyberspace should be used, regulated, and secured.1198CE71, 123215Should the laws of war and self-defence apply to cyber attacksShould the international laws of war and self-defence apply to cyber attacks?8FFB597, 123216Do states have a right to block information from citizens?8FFB597, 123217What roles (if any) should private actors play in Internet governance?What roles (if any) should private actors in Internet governance?8FFB597, 123220Defining cybersecurity8FFB597, 123221Protection of computer networks from damage and theftThe United States, United Kingdom and their like-minded allies emphasize the protection of computer networks from damage and theft when defining cybersecurity.959C6EF, 123222Information securityRussia, China and their partners emphasize information security when defining cybersecurity, which to them means controlling content and communication or social networking tools that may threaten regime stability.959C6EF, 123231Joint policy declarations with allies959C6EF, 123233Focus dialogue on focus confidence-building measures959C6EF, 123234Cultivate technical partnerships with developing states959C6EF URL:
|
Excerpt / Summary The United States should accept that it will be operating in some legal gray zones. The United States and some allies believe that they may have the right to respond militarily in self-defense under the laws of war to sufficiently severe cyber-attacks, whereas other powerful states want to legally separate cyber-security from traditional security concerns. Meanwhile, the distinctions in cyber-space between espionage (traditionally tolerated under international law) and offensive “attacks” are muddied. Planners need to think about how they will defend their actions diplomatically, especially when facts may be hard to prove or disclose. |