.

  • Written by Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana University

Digital conflict and military action are increasingly intertwined, and civilian targets – private businesses and everyday internet users alike – are vulnerable in the digital crossfire. But there are forces at work trying to promote peace online.

It will be a tough challenge: In May 2019, Israel responded to unspecified cyberattacks[1] by Hamas with an immediate airstrike[2] that destroyed the Gaza Strip building where the hackers were located.

The U.S. had done something similar in 2015, launching a drone strike to kill[3] an alleged Islamic State hacker[4], but that operation was months in the making[5]. In July 2019, the U.S. also reversed the equation, digitally disabling Iranian missile-launching computers[6] in response to Iran shooting down a U.S. military drone[7] over the Strait of Hormuz[8].

U.S. businesses fear they might be the targets of retaliation[9] for that attack from Iran. Even local nonprofits[10] need to learn how to protect themselves from online threats[11], potentially including national governments and terrorists. In some ways cyberspace has rarely seemed more unstable, even hostile.

At the same time, dozens of countries and hundreds of firms and nonprofits are fed up with all this digital violence, and are working toward greater cybersecurity for all – and even what might be called cyber peace.

Serious hacking is getting easier

Data and security breaches like the one carried out by the Shadow Brokers[12], revealed in 2016, released extremely advanced hacking tools to the public, including ones created by the National Security Agency. Cybercriminals are using those programs, among others, to hijack computer systems and data storage[13] in governments across the country[14].

Some companies have been forced to revert to one-to-one instant-messaging and passing written memos[15] in the wake of ransomware attacks[16] and other cybercrimes.

The U.S. government is taking note. Instead of pushing the technological envelope, it has elected to use tried and true analog technologies[17] to help secure the electricity grid, for example.

A rising international effort

A growing coalition, including the governments of France and New Zealand, is coming together to promote international standards of online behavior, aimed at reducing cyber insecurity. Nonprofits like the Online Trust Alliance[18], Cyber Peace Alliance[19], Cybersecurity Tech Accord[20] and ICT4Peace[21], are joining, as are major funders like the Hewlett Foundation[22] and the Carnegie Endowment for International Peace[23].

I am the acting director of the Ostrom Workshop[24] at Indiana University that includes the Cyber Peace Working Group[25], one of several academic groups also working to protect the Internet and its users.

Although it’s too soon to say anything certain about long-term results, there are some early indications of success, including the outcome of a Paris meeting in November 2018. More than 60 nations[26] – though not the United States – signed the Paris Call for Trust and Security in Cyberspace[27], along with more than 130 companies and 90 universities and nonprofit organizations. The document is a broad statement of principles[28] that focus on improving “cyber hygiene,” along with “the security of digital products and services” and the “integrity of the internet,” among other topics. It doesn’t legally bind its participants to do anything, but does lay out some basic points of agreement that could, in time, be codified into laws or other enforceable standards.

Its critics[29] question whether it is too early to establish global commitments given that core issues of sovereignty over the internet remain unresolved. Nevertheless, the Paris Call has helped shape the conversation around the scope and meaning of cyber peace[30].

In a world of cyber threats, the push for cyber peace is growing In the wake of a mass shooting in Christchurch, New Zealand, that country’s prime minister, Jacinda Ardern, spearheaded a call to reduce violent and extremist content online. AP Photo/Vincent Thian[31]

Another international effort began in the aftermath of the March 2019 mass shooting at two mosques in Christchurch, New Zealand. The governments of 18 nations – along with more than a dozen well-known technology firms like Google and Facebook – adopted the Christchurch Call[32] to Eliminate Terrorist and Violent Extremist Content Online.

This effort[33] has led many of the companies involved to change their policies[34] governing hate speech and disinformation on their platforms. For example, YouTube, owned by Google parent company Alphabet, announced a new hate speech policy[35] prohibiting content “alleging that a group is superior in order to justify discrimination, segregation or exclusion based on qualities like age, gender, race, caste, religion, sexual orientation or veteran status.” The Christchurch Call has also helped widen the discussion about cyber peace to include thorny questions about democracy[36], such as how to balance freedom of speech with limits on extremist content.

A digital Geneva Convention?

A key element remains the need to protect civilians from harm in a future cyber conflict[37], such as attacks on the electricity grid[38], dams[39] and other systems that affect daily life for much of the world.

One idea is to fashion an agreement along the lines of the Geneva Conventions[40], which with their predecessors have sought to protect innocent lives in military conflict for more than a century[41]. An international treaty along the lines of the Outer Space Treaty[42], Antarctic Treaty[43] or the U.N. Convention on the Law of the Sea[44] may be[45] useful[46].

There is not yet a grand “Treaty for Cyberspace,” though. The relevant international agreement with the highest number of ratifications so far is the 2004 Council of Europe Convention on Cybercrime, also called the Budapest Convention[47], which guides international prosecution and extradition of cyber criminals. The U.N. has several[48] groups[49] working on aspects of international cybersecurity[50].

But as with potential solutions to climate change[51], there’s not a lot of political energy being put into the efforts.

In a world of cyber threats, the push for cyber peace is growing Independent groups seek to help online users stay safe and avoid trouble. Screenshot by The Conversation, CC BY-ND[52][53]

Making progress anyway

In an attempt to avoid leaving people to fend for themselves in a perilous online world, the nonprofit Consumer Reports organization has launched a “Digital Standard[54]” program that will evaluate and rate the privacy and security features of various internet-connected devices and services. Academics are also helping out, such as the Security Planner[55] tool created by Citizen Lab at the University of Toronto, which helps civil society groups and researchers protect their data.

There’s much more to be done to protect a digitally centered society, both politically[56] and technically[57]. The key will be focusing on a more positive vision[58] of peace that includes better governance, respect for human rights, making internet access more widely available around the world, and teaching everyone how to protect themselves – and each other – online.

This will not happen overnight, and the path may not be a straight line. Consider that the often-derided 1928 Kellogg-Briand Pact[59], also called the Pact of Paris[60], outlawed aggressive war. It didn’t work, but did eventually help lay a foundation[61] for the United Nations and a more stable international system.

Similarly, a Cyber Peace Accord – building from efforts such as the Paris Call and the Cybersecurity Tech Accord – could, in time, lead the international community toward greater stability in cyberspace. One possibility could take inspiration from efforts to fight climate change[62], by asking individual nations, towns, groups and even individuals to announce “Cyber Peace Pledges,” to build momentum toward a more collective solution.

Working together, we may just be able to achieve cyber peace through a mix of shaming, outcasting and inspiring users, firms and policymakers to act.

[ You’re smart and curious about the world. So are The Conversation’s authors and editors. You can read us daily by subscribing to our newsletter[63]. ]

References

  1. ^ Israel responded to unspecified cyberattacks (www.forbes.com)
  2. ^ immediate airstrike (www.cnbc.com)
  3. ^ drone strike to kill (www.nytimes.com)
  4. ^ alleged Islamic State hacker (dod.defense.gov)
  5. ^ months in the making (www.nytimes.com)
  6. ^ digitally disabling Iranian missile-launching computers (www.cnbc.com)
  7. ^ Iran shooting down a U.S. military drone (www.cnbc.com)
  8. ^ Strait of Hormuz (theconversation.com)
  9. ^ fear they might be the targets of retaliation (www.washingtonpost.com)
  10. ^ local nonprofits (theconversation.com)
  11. ^ protect themselves from online threats (theconversation.com)
  12. ^ Shadow Brokers (www.nytimes.com)
  13. ^ hijack computer systems and data storage (www.wsj.com)
  14. ^ governments across the country (theconversation.com)
  15. ^ revert to one-to-one instant-messaging and passing written memos (www.wired.com)
  16. ^ ransomware attacks (theconversation.com)
  17. ^ analog technologies (www.zdnet.com)
  18. ^ Online Trust Alliance (otalliance.org)
  19. ^ Cyber Peace Alliance (www.cyberpeacealliance.net)
  20. ^ Cybersecurity Tech Accord (cybertechaccord.org)
  21. ^ ICT4Peace (ict4peace.org)
  22. ^ Hewlett Foundation (hewlett.org)
  23. ^ Carnegie Endowment for International Peace (carnegieendowment.org)
  24. ^ Ostrom Workshop (ostromworkshop.indiana.edu)
  25. ^ Cyber Peace Working Group (ostromworkshop.indiana.edu)
  26. ^ More than 60 nations (www.nytimes.com)
  27. ^ Paris Call for Trust and Security in Cyberspace (www.diplomatie.gouv.fr)
  28. ^ broad statement of principles (www.diplomatie.gouv.fr)
  29. ^ critics (www.internetgovernance.org)
  30. ^ meaning of cyber peace (ndias.nd.edu)
  31. ^ AP Photo/Vincent Thian (www.apimages.com)
  32. ^ Christchurch Call (www.christchurchcall.com)
  33. ^ effort (www.justsecurity.org)
  34. ^ change their policies (www.cnet.com)
  35. ^ new hate speech policy (youtube.googleblog.com)
  36. ^ thorny questions about democracy (repository.law.umich.edu)
  37. ^ protect civilians from harm in a future cyber conflict (www.unhcr.org)
  38. ^ electricity grid (www.eenews.net)
  39. ^ dams (time.com)
  40. ^ Geneva Conventions (www.icrc.org)
  41. ^ for more than a century (theconversation.com)
  42. ^ Outer Space Treaty (2009-2017.state.gov)
  43. ^ Antarctic Treaty (www.ats.aq)
  44. ^ U.N. Convention on the Law of the Sea (www.iucn.org)
  45. ^ may be (www.hoover.org)
  46. ^ useful (www.thenation.com)
  47. ^ Budapest Convention (www.coe.int)
  48. ^ several (dig.watch)
  49. ^ groups (cyberstability.org)
  50. ^ aspects of international cybersecurity (cyberstability.org)
  51. ^ potential solutions to climate change (dx.doi.org)
  52. ^ Screenshot by The Conversation (securityplanner.org)
  53. ^ CC BY-ND (creativecommons.org)
  54. ^ Digital Standard (www.consumerreports.org)
  55. ^ Security Planner (securityplanner.org)
  56. ^ politically (www.csis.org)
  57. ^ technically (www.entrepreneur.com)
  58. ^ positive vision (www.huffpost.com)
  59. ^ Kellogg-Briand Pact (history.state.gov)
  60. ^ Pact of Paris (www.theguardian.com)
  61. ^ foundation (courses.lumenlearning.com)
  62. ^ efforts to fight climate change (www.wearestillin.com)
  63. ^ You can read us daily by subscribing to our newsletter (theconversation.com)

Authors: Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana University

Read more http://theconversation.com/in-a-world-of-cyber-threats-the-push-for-cyber-peace-is-growing-119419

Metropolitan republishes selected articles from The Conversation USA with permission

Visit The Conversation to see more