SlideShare une entreprise Scribd logo
1  sur  18
Application of principles of international law to
computer network operations management
Adriana Dvoršak
1st international academic conference
on intelligence and security
Contemporary Intelligence Support Systems. 
1. Security of IP (concern of the IETF).
2. Security of networks (focus on CERT).
3. Security of business.
4. The individual's human rights (privacy)
5. National security (state sovereignty, national
interests, cyber warfare).
(Doria, 2007)
Providing security to individuals, business, state.
Concepts of cyber security
and law of armed conflict:
1. military necessity,
2. distinction,
3. proportionality,
4. perfidy,
5. neutrality, and
6. unnecessary suffering.
Principles of international law
(Kanuck, 2007)
CNO in operation Allied force
CNE - NATO, Serbia
CNA – NATO
CND – US (?)
Propaganda - Serbia
Military deception - Serbia
Learning points for NATO
Vulnerabilities
National decision making processes
State practice from the region
Offensive doctrine
Military foreign policy options are expanded
Small states with offensive foreign policy
Can Slovenia advocate cyber offensive?
Article 124 of Constitution: In the provision of security the state
proceeds principally from a policy of peace, and an ethic of
peace and non-aggression.
Legal conditions for CNA
Right for self-defense
Part of general and information warfare
Request from UNSC
Coalitions of the willing supported by UN Resolution
Cyber offensive
CNA CND
TARGET
IW AREAS
TACTICS
TACTICS
WEAPONS ATTRIBUTES
CONSEQUENCES
REACTIONS
perceptions,actions
RECOVERY
DECISION
CONTEXT
CONSIDERATIONS FOR
IW PLANNING
1 Legal,political,social
2 Skil levels, technical
3 Financial
reevaluation
CNO lifecycle model
Adapted from van Niekerk, 2011
The self-defence rule:
Everyone has the right to self-defence.
The cooperation rule:
The fact that a CNA has been conducted via information systems located in
a state’s territory creates a duty to cooperate with the victim state.
The access to information rule:
The public has a right to be informed about threats to their life, security
and well-being.
The mandate rule:
An organisation’s capacity to act (and regulate) derives from its mandate.
The data protection rule:
Information relating to an identified or identifiable natural person is
regarded as personal data.
(Tikk, 2011)
NATO 10 rules
The territoriality rule:
Information infrastructure located within a state’s territory is
subject to that state’s territorial sovereignty.
The responsibility rule:
Fact that CNA was launched from inf.system located in a state’s
territory is evidence that the act is attributable to that state.
The duty of care rule:
Everyone has the responsibility to implement a reasonable level
of security in their information infrastructure.
The early warning rule:
There is an obligation to notify potential victims about known,
upcoming cyber attacks.
The criminality rule:
Every nation has the responsibility to include the most common
cyber offences in its substantive criminal law.
NATO 10 rules
Member States required to have:
• national network and information security (NIS)
strategy;
• NIS cooperation plan;
• NIS competent national authority:
– technical expertise,
– international liasion,
– security breach reporting,
– CERT functions.
• Computer Emergency Response Team (CERT).
EU Directive on common level of NIS
Obligatory breach notification to the competent authority,
it determines which notification is in the public interest
(security intelligence?).
Competent authority requires market operators and public
administrations to:
– provide information needed to assess the security of their NIS;
– undergo a security audit and make the results available to the
competent authority;
– issues binding instructions to market operators and public
administrations.
(Articles 14 and 15)
EU Directive – competent authority
Difference Proposal for a Directive on network and info
security vs Cyber Security Strategy
Cyberdefence policy and capabilities related to Common
Security and Defence Policy (CSDP)
Aims:
– To concentrate on cyberdefence capability on detection,
response and recovery from sophisticated cyber threats;
– synergies between civilian and military approaches.
Cyber Security Strategy and CSDP
High Representative, MS, EDA will assess capability
development:
doctrine, leadership, organisation, personnel, training, technology,
infrastructure, logistics and interoperability.
Develop EU cyberdefence policy:
missions and operations, dynamic risk management, improved
threat analysis, information sharing, training and exercise for
militaries in the EU and multinational context.
Promote dialogue and coordination
– civilian and military actors in the EU,
– international partners, NATO, international organisations.
High Representative activities
National cyber security and cyber defense strategy.
Analysis of external environment
Pressure - normative dimension (EU Directive obligations, NATO
minimum requirements);
Threats.
Internal environment
Changes to legal framework (information society, criminal code,
privacy).
Stakeholders (military, police, academia, civil society,
business).
Synergies between national cyber incident capabilities, CERT,
and competent authority (EU Directive on network and info
security)
Way ahead for Slovenia
Centre vs. Periphery
Global North - Global South relations
Balkanization of CNE
1981 UNGA Declaration on Non-intervention: “the right of states
and peoples to have free access to information and to develop
fully, without interference, their system of information and
mass media, and to use their information media in order to
promote their political, social, economic, and cultural
interests and aspirations.”
Certain CNE amount to an unlawful intervention, e.g. cyber
propaganda activities aimed at fomenting civil upraising in a
target state, interference with elections.
Non-intervention
National assesement
Synergies between national needs and international
requirements
EU Directive
NATO requirements
New institutions
Conclusions
Appendix
Constitution of International Telecommunications Union (1992).
Doria, A. (2007). What do the Words »Internet Security« Mean? In Kleinwoechter (Ed.), The Power of
Ideas: Internet Governance in a Global Multi-Stakeholder Environment. Berlin
Kanuck, S. (2009). Sovereign Discourse on Cyber Conflict under International Law. Texas Law Review,
88.
van Niekerk, B., & Maharaj, M. S. (2011). The Information Warfare Life Cycle Model. SA Journal of
Information Management, Vol 13, No1
European Commission. (2013a). Cyber Security Strategy of the European Union: An Open, Safe and
Secure Cyberspace. Retrieved from http://ec.europa.eu/digital-agenda/en/news/eu-cybersecurity-
plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security.
European Commission. (2013b). Proposal for a Directive of the European Parliament and of the Council
concerning measures to ensure a high common level of network and information security across the
Union. (COM(2013) 48). Retrieved from http://ec.europa.eu/digital-agenda/en/news/eu-
cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security.
Tikk, E. (2011). Ten Rules for Cyber Security. Survival: Global Politics and Strategy, 53(3).
Application of principles of international law to computer networks operations management

Contenu connexe

Tendances

2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile LawJacqueline Fick
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Yury Chemerkin
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Glorisosegughana
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberIGF Indonesia
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacyblogzilla
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheetbueno buono good
 
National Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of AmericaNational Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of AmericaNeil McDonnell
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceGareth Niblett
 
ID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionIGF Indonesia
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessmentblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
How Estonia is helping to shape cyber resilience
How Estonia is helping to shape cyber resilienceHow Estonia is helping to shape cyber resilience
How Estonia is helping to shape cyber resiliencermdesilva
 

Tendances (20)

2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
 
National Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of AmericaNational Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of America
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber Defence
 
ID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship Transition
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
Digitisation, democracy and the regulation of personal data use for political...
Digitisation, democracy and the regulation of personal data use for political...Digitisation, democracy and the regulation of personal data use for political...
Digitisation, democracy and the regulation of personal data use for political...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
How Estonia is helping to shape cyber resilience
How Estonia is helping to shape cyber resilienceHow Estonia is helping to shape cyber resilience
How Estonia is helping to shape cyber resilience
 

En vedette

The Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse ActThe Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse ActShawn Tuma
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacych samaram
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The LawSaimaRafiq
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Sources of international law
Sources of international lawSources of international law
Sources of international lawShree Silwal
 
288 33 powerpoint-slides_chapter-8-political-legal-environment
288 33 powerpoint-slides_chapter-8-political-legal-environment288 33 powerpoint-slides_chapter-8-political-legal-environment
288 33 powerpoint-slides_chapter-8-political-legal-environmentKAMALIYA PANKAJ
 

En vedette (8)

Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
The Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse ActThe Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse Act
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Sql Server 2012
Sql Server 2012Sql Server 2012
Sql Server 2012
 
Sources of international law
Sources of international lawSources of international law
Sources of international law
 
288 33 powerpoint-slides_chapter-8-political-legal-environment
288 33 powerpoint-slides_chapter-8-political-legal-environment288 33 powerpoint-slides_chapter-8-political-legal-environment
288 33 powerpoint-slides_chapter-8-political-legal-environment
 

Similaire à Application of principles of international law to computer networks operations management

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Anna Gomez
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaYudhistira Nugraha
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 

Similaire à Application of principles of international law to computer networks operations management (20)

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Russia and cybercrime
Russia and cybercrimeRussia and cybercrime
Russia and cybercrime
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cyber
CyberCyber
Cyber
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Application of principles of international law to computer networks operations management

  • 1. Application of principles of international law to computer network operations management Adriana Dvoršak 1st international academic conference on intelligence and security Contemporary Intelligence Support Systems. 
  • 2. 1. Security of IP (concern of the IETF). 2. Security of networks (focus on CERT). 3. Security of business. 4. The individual's human rights (privacy) 5. National security (state sovereignty, national interests, cyber warfare). (Doria, 2007) Providing security to individuals, business, state. Concepts of cyber security
  • 3. and law of armed conflict: 1. military necessity, 2. distinction, 3. proportionality, 4. perfidy, 5. neutrality, and 6. unnecessary suffering. Principles of international law
  • 5. CNO in operation Allied force CNE - NATO, Serbia CNA – NATO CND – US (?) Propaganda - Serbia Military deception - Serbia Learning points for NATO Vulnerabilities National decision making processes State practice from the region
  • 6. Offensive doctrine Military foreign policy options are expanded Small states with offensive foreign policy Can Slovenia advocate cyber offensive? Article 124 of Constitution: In the provision of security the state proceeds principally from a policy of peace, and an ethic of peace and non-aggression. Legal conditions for CNA Right for self-defense Part of general and information warfare Request from UNSC Coalitions of the willing supported by UN Resolution Cyber offensive
  • 7. CNA CND TARGET IW AREAS TACTICS TACTICS WEAPONS ATTRIBUTES CONSEQUENCES REACTIONS perceptions,actions RECOVERY DECISION CONTEXT CONSIDERATIONS FOR IW PLANNING 1 Legal,political,social 2 Skil levels, technical 3 Financial reevaluation CNO lifecycle model Adapted from van Niekerk, 2011
  • 8. The self-defence rule: Everyone has the right to self-defence. The cooperation rule: The fact that a CNA has been conducted via information systems located in a state’s territory creates a duty to cooperate with the victim state. The access to information rule: The public has a right to be informed about threats to their life, security and well-being. The mandate rule: An organisation’s capacity to act (and regulate) derives from its mandate. The data protection rule: Information relating to an identified or identifiable natural person is regarded as personal data. (Tikk, 2011) NATO 10 rules
  • 9. The territoriality rule: Information infrastructure located within a state’s territory is subject to that state’s territorial sovereignty. The responsibility rule: Fact that CNA was launched from inf.system located in a state’s territory is evidence that the act is attributable to that state. The duty of care rule: Everyone has the responsibility to implement a reasonable level of security in their information infrastructure. The early warning rule: There is an obligation to notify potential victims about known, upcoming cyber attacks. The criminality rule: Every nation has the responsibility to include the most common cyber offences in its substantive criminal law. NATO 10 rules
  • 10. Member States required to have: • national network and information security (NIS) strategy; • NIS cooperation plan; • NIS competent national authority: – technical expertise, – international liasion, – security breach reporting, – CERT functions. • Computer Emergency Response Team (CERT). EU Directive on common level of NIS
  • 11. Obligatory breach notification to the competent authority, it determines which notification is in the public interest (security intelligence?). Competent authority requires market operators and public administrations to: – provide information needed to assess the security of their NIS; – undergo a security audit and make the results available to the competent authority; – issues binding instructions to market operators and public administrations. (Articles 14 and 15) EU Directive – competent authority
  • 12. Difference Proposal for a Directive on network and info security vs Cyber Security Strategy Cyberdefence policy and capabilities related to Common Security and Defence Policy (CSDP) Aims: – To concentrate on cyberdefence capability on detection, response and recovery from sophisticated cyber threats; – synergies between civilian and military approaches. Cyber Security Strategy and CSDP
  • 13. High Representative, MS, EDA will assess capability development: doctrine, leadership, organisation, personnel, training, technology, infrastructure, logistics and interoperability. Develop EU cyberdefence policy: missions and operations, dynamic risk management, improved threat analysis, information sharing, training and exercise for militaries in the EU and multinational context. Promote dialogue and coordination – civilian and military actors in the EU, – international partners, NATO, international organisations. High Representative activities
  • 14. National cyber security and cyber defense strategy. Analysis of external environment Pressure - normative dimension (EU Directive obligations, NATO minimum requirements); Threats. Internal environment Changes to legal framework (information society, criminal code, privacy). Stakeholders (military, police, academia, civil society, business). Synergies between national cyber incident capabilities, CERT, and competent authority (EU Directive on network and info security) Way ahead for Slovenia
  • 15. Centre vs. Periphery Global North - Global South relations Balkanization of CNE 1981 UNGA Declaration on Non-intervention: “the right of states and peoples to have free access to information and to develop fully, without interference, their system of information and mass media, and to use their information media in order to promote their political, social, economic, and cultural interests and aspirations.” Certain CNE amount to an unlawful intervention, e.g. cyber propaganda activities aimed at fomenting civil upraising in a target state, interference with elections. Non-intervention
  • 16. National assesement Synergies between national needs and international requirements EU Directive NATO requirements New institutions Conclusions
  • 17. Appendix Constitution of International Telecommunications Union (1992). Doria, A. (2007). What do the Words »Internet Security« Mean? In Kleinwoechter (Ed.), The Power of Ideas: Internet Governance in a Global Multi-Stakeholder Environment. Berlin Kanuck, S. (2009). Sovereign Discourse on Cyber Conflict under International Law. Texas Law Review, 88. van Niekerk, B., & Maharaj, M. S. (2011). The Information Warfare Life Cycle Model. SA Journal of Information Management, Vol 13, No1 European Commission. (2013a). Cyber Security Strategy of the European Union: An Open, Safe and Secure Cyberspace. Retrieved from http://ec.europa.eu/digital-agenda/en/news/eu-cybersecurity- plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security. European Commission. (2013b). Proposal for a Directive of the European Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union. (COM(2013) 48). Retrieved from http://ec.europa.eu/digital-agenda/en/news/eu- cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security. Tikk, E. (2011). Ten Rules for Cyber Security. Survival: Global Politics and Strategy, 53(3).