CitationsAdd new citationList by: CiterankMap Link[2] LondonCyber: on the ways to counter treats posed to cybersecurity
Author: Alexander Yakovenko - Ambassador of the Russian Federation to the UK Cited by: David Price 8:59 PM 27 October 2011 GMT
Citerank: (8) 121541Cyber crimeHow can cyber crime be prevented and pursued more effectively?8FFB597, 121770Use of IT for politico-military goalsThe use of information and telecommunication technologies for politico-military goals presents a threat to international security.959C6EF, 121774Mutual notification of attacksSharing information about attempts of cyberattacks on infrastructures of critical units.959C6EF, 121775Sharing information on best practices959C6EF, 121776Joint pursuit of criminalsStates need to co-operate in the joint pursuit of the perpetrators of cyberspace-based criminal activities.959C6EF, 121815Prohibitions may vary across culturesThe forms of expression that should be prohibited or limited may vary across different cultures.8FFB597, 121818Use of IT for terrorist goalsThe use of information and telecommunication technologies for terrorist goals presents a threat to international security.959C6EF, 121819Use of IT for criminal activityThe use of information and telecommunication technologies for criminal activity presents a threat to international security.959C6EF URL: | Excerpt / Summary The London conference is a good opportunity to discuss emerging opportunities in cooperation in the domain of information security. Firstly, this is prevention of hostile use of information and telecommunication technologies for politico-military or terrorist goals. Countering cybercrime, establishment of conditions for further intensive development of cross-border information cooperation, as well as ensuring free dissemination of information in the global cyberspace.
The global peace and security are mainly endangered by the so-called hostile use of information and communication technologies, the politico-military aspect of which must be considered first of all. It is remarkable that technology has gradually become a fundamentally new and potent instrument of destruction. It can affect governmental structures and military administration, industrial and economic entities, as well as social infrastructure. An extremely dangerous means of waging “power” war is emerging, and it may be potentially used as a part of intergovernmental confrontation or even become its main tool.
In its essence, this is a weapon, the destructive effect of which will be growing as it is being developed. Eventually this may lead to an omnipresent hidden use of such “weapon” with all the negative consequences involved.
It is significant that the agents using information and telecommunication technology for hostile purposes, their status (official or private) and liability for damage are impossible to identify. Accordingly, we may state that there have emerged hazards that will become ever more serious in future.
Secondly, given the extending information exchange, the openness of the Internet, the complicacy of social networks, the cyberspace is becoming ever more attractive for terrorist groups and persons involved in terrorist activities.
They often use information and telecommunication technology for criminal ends such as attracting new partisans, destruction of information resources, leading to breach of public order, controlling or blocking information transmitting channels, using the Internet or other information nets for terrorist propaganda, creating an atmosphere of fear and seeding panic in society, to name a few. It is only by concerted effort that we can counter the growing terrorist threat in the cyberspace. |
|