Ciaran Martin was the founder of the UK’s National Cyber Security Center and the former head of cyber operations at GCHQ. He gave a thought-provoking speech busting many myths around cyber power and cyber operations (text and video ).
I try to deconstruct it in 18 tweets. Click on the tweet to follow the thread:
“Russia creates conditions in which liberal democracies are forced to debate about the introduction of censorship for the sake of national security and sovereignty (Barandiy, 2018).”
Due to the biases which emerge from legal determinism influenced by analogical reasoning, the cyber policy community often ends up ignoring the actual cases of normative behavior in cyberspace. Okay, if not normative behavior then at least a semblance of some kind of customary law.
Continue reading “Congratulations, it’s a cyber norm!”
In my recent
essay for the Centre for Internet & Society, I surmised that the
current initiatives to derive cyber norms within the ambit of international law
could be incongruous with the technical dynamics of cyber operations. I shed
light on the critical fissures in global attempts to establish normative
frameworks for cyberspace.
Continue reading “What Microsoft needs to get right about cyber norms”
In a guest post in relation to The Centre for Internet & Society’s recently held roundtable on “India’s cyber defense strategy,” Pukhraj Singh looks at the critical fissures – at the technical and policy levels – in global normative efforts to secure cyberspace. By charting out the key vectors and power asymmetries among key stakeholders – both leading state actors and private actors like Microsoft – Singh posits that there is much to be done before we circumscribe cyber operations within legal strictures: https://cis-india.org/internet-governance/blog/guest-post-before-cyber-norms-let2019s-talk-about-disanalogy-and-disintermediation.
Continue reading “Before cyber norms, let’s talk about disanalogy and disintermediation – The Centre for Internet & Society”
Check out this thread by Sara-Jayne Terp of the Misinfosec Working Group.
Last year, Sara proposed the ingenious idea that, like cyber operations, cyber-enabled information operations (and disinformation) are also pivoted around the foundational triad of cybersecurity: confidentiality, integrity and availability (C-I-A).
I thought that was a phenomenal statement as it allowed us to define cyber-enabled information operations in machine-to-machine taxonomies and ontologies.
Continue reading “Keep an eye out for the Misinfosec Working Group”
Arindrajit Basu and Karan Saini wrote a detailed critique of my essay on cyber norms for the Modern War Institute: Setting International Norms of Cyber Conflict Is Hard, but That Doesn’t Mean We Should Stop Trying.
Here’s my rejoinder to their rejoinder:
Continue reading “A rejoinder to a rejoinder”
My essay for the Modern War Institute, US Military Academy at West Point: https://mwi.usma.edu/death-knell-international-norms-cyber-conflict/.
On July 8, Michael Schmitt, a law professor and former judge advocate in the US Air Force, posted a perplexing tweet about changing his mind on the “status of cyber capabilities as ‘weapons.’” He followed it up with the link to a recent paper he coauthored for the International Law Studies journal of the US Naval War College.
Continue reading “A Death Knell for the International Norms of Cyber Conflict – US Military Academy”