While many countries around the world filter and censor the Internet, Australia has been the poster child for Internet filtering and censorship by a Western-style, liberal, democratic state. Â Proposals to filter the Internet have become a centerpiece of the ongoing political campaign, with the opposition vowing to scrap the current government’s filtering plans.
An American, Samir Khan, who ran a radical Islamic website is facing charges that he use his website to aid al-Qaeda in training and recruiting efforts. Â He is believed to have fled the U.S. to join Anwar al-Awlaki in Yemen. Â al-Awlaki was dubbed the “bin Laden of the Internet” this week by USA Today.
This article from a Chinese news source provides a Chinese perspective on the issues of Internet freedom and governance. Â In particular, it argues that recent discussion of offensive cyberwar strategies by the U.S. mean that it is the U.S., not China, that is a threat to global Internet freedom.
On the heels of the ongoing controversy over pressure on Research In Motion by several governments worldwide, all of whom want to be able to monitor communications on the company’s popular BlackBerry service, India is now also seeking greater access to Internet communications by its law enforcement and intelligence services.
This story is a profile of the radical, American cleric, Anwar al-Awlaki. Â It discusses his successes in recruiting American Muslims to the cause of jihad and, in particular, his use of Internet technologies like YouTube.
Based largely on Deputy Secretary of Defense William Lynn’s recent article in Foreign Affairs, this piece outlines the offensive technologies and policies that the U.S. is considering in the area of cybersecurity.
The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking out parts of an adversary’s computer network overseas – but it is still wrestling with how to pursue the strategy legally.
But officials are reluctant to use the tools until questions of international law and technical feasibility are resolved, and that has proved to be a major challenge for policymakers. Government lawyers and some officials question whether the Pentagon could take such action without violating international law or other countries’ sovereignty.
Some officials and experts say they doubt the technology exists to use such capabilities effectively, and they question the need for such measures when, they say, traditional defensive steps such as updating firewalls, protecting computer ports and changing passwords are not always taken.
Still, the deployment of such hardware and software would be the next logical step in a cyber strategy outlined last week by Deputy Secretary of Defense William J. Lynn III. The strategy turns on the “active defense” of military computer systems, what he called a “fundamental shift in the U.S. approach to network defense.”
The military’s dismantling in 2008 of a Saudi Web site that U.S. officials suspected of facilitating suicide bombers in Iraq also inadvertently disrupted more than 300 servers in Saudi Arabia, Germany and Texas, for example, and the Obama administration put a moratorium on such network warfare actions until clear rules could be established.
Still, taking action against an attacker’s computer in another country may well violate a country’s sovereignty, experts said. And government lawyers have questioned whether the Pentagon has the legal authority to take certain actions – such as shutting down a network in a country with which the United States is not at war. The CIA has argued that doing so constitutes a “covert” action that only it has the authority to carry out, and only with a presidential order.
Policymakers also are grappling with questions of international law. “We are having a big debate about what constitutes the use of force or an armed attack in cyberspace,” said Herbert S. Lin, a cyber expert with the National Research Council of the National Academy of Sciences. “We need to know where those lines are so that we don’t cross them ourselves when we conduct offensive actions in cyberspace against other nations.”
Yet another example of someone who should know better manufacturing ambiguity where it does not exist. Â What constitutes “use of force” and “armed attack” is the same as it was before, is still based on the same treaties and norms of international behavior as before. Â See Michael Schmitt’s work on developing metrics for determining when cyber attacks constitute “used of force” or “armed attack” under international law.
The industry official said his concern is “the militarization” of the international dialogue. “Any time Pentagon leaders start using the terms ‘active defense,’ ” he said, “then my concern is that foreign countries use that as a basis for their doctrine, starting a cycle of tit for tat.”
Exactly. Â We have based our narrative thus far on the argument that it is “them”–foreign actors of various sorts, from governments to terrorists–who are developing cyber attack capabilities and threatening “us.” Â In actuality, we are finding out that this is all just a cover for our own creation of new weapons systems and, with them, a new “domain” of war. Â In turn, we stand the real risk of creating a self-fulfilling prophecy. Â If “they” were not developing cyber attack capabilities for use against “us” before, “they” certainly will now.