keep in touch for cyber peace_20150212

Download Keep in touch for cyber peace_20150212

Post on 24-Jul-2015




2 download

Embed Size (px)



    OSIPP Guest Lecturer/ Special Appointed Reseacher !Kunihiro

    cybersecurity norms, confidence building measures, and capacity building

  • Outline:

    Todays keyword is Confidence building. Confidence Building Measures(CBM) is the word from Cold War Age. It is like a HOT LINE after Cuba Crisis between Soviet Union and U.S.A. It took a 6 hours to talk with Sovietschief secretary Khrushchevfor President Kennedy through the diplomatic protocol then. Its a risk of miscommunication. We have to keep in touch with enemy or not, because of keeping peace. Its a simple solution.

    1. Communication Channel is very important(Human connection, Telecommunication infrastructure, Mass Media with good journalism, e.t.c.) 2. Soft law and power is not so weak. Weak tieprovide available approach against emergency. Make the trust and relationship one upon another. It will be great wall.(ex. UN GGE) 3. Technology is always dual-use. Good for fun, but for genocide. Capacity/Capability raise our standard of IT literacy. Its a quiet method, but eective.

  • Profile Kunihiro Maeda


    CEO of Unique ID Inc., and Quantum ID Inc. Specially Appointed Researcher of Osaka School of International Public Policy at Osaka University, Visiting Fellow of Tokyo University, Part-time lecturer of Tamagawa University. Part-time lecturer of Graduate School of Arts and Design at Onomichi University.

    I made SNS with my friend in 1996. It was called "Human Web". Maybe it was First SNS in Japan. In 1998, They tried to make another version Small World Connection as work of art. We sent their works to multi-media competition Ars Electronica in Australia. And They entered it Digital Be-in in USA. We went to San Francisco for presentation. Our work won the praise of early adapter, just as art. In 2001, We tried to make commercial web site Kanshin Kukan(Interest Community). Our work won the praise of early adapter in Japan. We got Good Design award in 2001 and he got Web Creation Award in 2006 as a pioneer of Japanese CGM(Consumer Generated Media=Social Media).

    Now Im is interested in ICT for peace, Humanitarian Technology(Critical Infrastructure, Drone, not only web technology), Cyber Warfare, Cyber Intelligence and Collective Intelligence for Human Security.

  • Do you know about Seoul Framework


    The Seoul Framework oers guidelines for governments and international organizations on coping with cybercrime and cyberwar. It highlights the importance of boosting internet access, particularly for developing countries, for education, development and to ensure freedom of information and expression.

    The annual conference on cyberspace aims to establish international cyber-norms and guidelines. The Seoul conference followed previous gatherings in London and Budapest. It will likely become a bi-annual event, with the next conference set for the Netherlands in 2015.

  • Seoul Conference on Cyberspace 2013 - Panel Discussion 5 International Security


    Seoul Conference on Cyberspace 2013 - Panel Discussion 5 International Security October 18(Fri.) 10:50-12:20 Auditorium, Coex, Seoul!

  • Five Principles for Shaping Cybersecurity NormsHarmonization of Laws and Standards: Given the global and ubiquitous nature of the Internet, developing global cybersecurity laws and standards will promote understanding, predictability, and enables collaboration on problem solving among countries.!

    Risk Reduction Cybersecurity stakeholders should work to improve the security of the Internet through collective responses to threats by sharing information about threats and vulnerabilities, and by engaging in the active prevention of cybercrime. !

    Transparency Governments can help to build trust and increase predictability and stability in cyberspace by practicing greater transparency in their cybersecurity practices. Microsoft supports greater government transparency, and recently released another paper promoting the development of a national cybersecurity strategy to articulate priorities, principles, and approaches for managing national level risks in cyberspace.!

    Collaboration!As governments construct cybersecurity practices to address security concerns at the international level, they can seek input from a variety of stakeholders, including the private sector, civil society, and academia.!

    Proportionality!The issue of proportionality is challenging, because it not yet clear how proportionality in cyberspace will be interpreted. However, nations should begin to develop interpretations of proportionality in cyberspace under customary international law.


  • Accusation? not only for Freedom of expression. U.S. Gov let them know to keep their easy hacks in check

    N.S.A. Breached North Korean Networks Before Sony Attack, Ocials Say


    WASHINGTON The trail that led American ocials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most impenetrable targets on earth. Spurred by growing concern about North Koreas maturing capabilities, the American spy agency drilled into the Chinese networks that connect North Korea to the outside world, picked through connections in Malaysia favored by North Korean hackers and penetrated directly into the North with the help of South Korea and other American allies, according to former United States and foreign ocials, computer experts later briefed on the operations and a newly disclosed N.S.A. document.

    A classified security agency program expanded into an ambitious eort, ocials said, to place malware that could track the internal workings of many of the computers and networks used by the Norths hackers, a force that South Koreas military recently said numbers roughly 6,000 people. Most are commanded by the countrys main intelligence service, called the Reconnaissance General Bureau, and Bureau 121, its secretive hacking unit, with a large outpost in China.

    We dont have a better plan youre going to have to stick it up your ass.

  • This a light caution? from U.S. to China


  • The risk of confidentiality"


  • The risk of confidentiality"


  • U.S. cyber strategy for national interest


  • Xinhua Insight: Conference urges int'l action against cyber-terrorism@World Internet Conference 2014


    WUZHEN, Zhejiang, Nov. 21 (Xinhua) -- That the international community must cooperate to fight online terrorism and maintain peace and stability, is consensus of the World Internet Conference that closed on Friday.

    China has been a major victim of terrorism in recent years, said Gu Jianguo, head of the cyber security and protection bureau under the Ministry of Public Security. The Internet is an important tool for groups to plan and organize acts of terror and incite followers.

    The East Turkestan Islamic Movement (ETIM) has claimed responsibility for a series of incidents featuring knife attacks in Kunming, a bombing in Urumqi and a car plowing through a crowd in Beijing and threatened to continue their campaign in an online video clip.Since 2010, ETIM has released almost 300 videos inciting people to participate in their terror campaign. The videos show bomb-making techniques and spread religious extremism.

    "Terrorists have their own websites and propaganda platforms on other major portals. They take advantage of social network sites to promote terrorism,"said Gu, claiming it is easy access to terrorist videos and learn how to make bombs on video sharing websites.

    Such freewheeling activities have severely undermined world peace and stability and damaged lives and property, said Gu. "The Internet gives them a global presence that they did not have before," said James Andrew Lewis, a senior fellow at the Center for Strategic and International Studies based in the United States. "First of all they use it for propaganda to disseminate Jihad ideology. Besides that they share information and technology that allow them to make bombs, to recruit people in the west and in Xinjiang," said Michael Barak of Israel's international institute for counter-terrorism. "They are very active on social media and every terror organization has their own media outlet and twitter accounts. Jihad magazines are in English," he said. Barak believes terrorist even use online payment systems similar to bitcoin to raise money. No country can manage the threat of cyber-terrorism alone, but at present, there is no international legal framework to deal with cyber-terrorism, said Cheng Lin, president of the People's Public Securi


View more >