SlideShare a Scribd company logo
1 of 27
Download to read offline
“KEEP IN TOUCH”
for CYBER PEACE
OSIPP Guest Lecturer/ Special Appointed Reseacher!
Kunihiro Maeda
kunihiro.maeda@mac.com
cybersecurity norms, confidence building measures,
and capacity building
Outline: 
Today’s keyword is “Confidence building”. Confidence Building
Measures(CBM) is the word from Cold War Age. It is like a HOT
LINE after Cuba Crisis between Soviet Union and U.S.A. It took a
6 hours to talk with Soviet’s chief secretary Khrushchev for
President Kennedy through the diplomatic protocol then. It’s a risk
of miscommunication. We have to keep in touch with enemy or
not, because of keeping peace. It’s a simple solution. 
1. Communication Channel is very important(Human connection,
Telecommunication infrastructure, Mass Media with good
journalism, e.t.c.) 
2. Soft law and power is not so weak. Weak tie provide available
approach against emergency. Make the trust and relationship one
upon another. It will be great wall.(ex. UN GGE)
3. Technology is always dual-use. Good for fun, but for genocide.
Capacity/Capability raise our standard of IT literacy. It’s a quiet
method, but effective.
Profile Kunihiro Maeda
4
CEO of Unique ID Inc., and Quantum ID Inc. Specially Appointed Researcher of Osaka
School of International Public Policy at Osaka University, Visiting Fellow of Tokyo University,
Part-time lecturer of Tamagawa University. Part-time lecturer of Graduate School of Arts
and Design at Onomichi University.
I made SNS with my friend in 1996. It was called "Human Web". Maybe it was First SNS in
Japan. In 1998, They tried to make another version “Small World Connection” as work of
art. We sent their works to multi-media competition “Ars Electronica” in Australia. And They
entered it Digital Be-in in USA. We went to San Francisco for presentation. Our work won
the praise of early adapter, just as art. In 2001, We tried to make commercial web site
“Kanshin Kukan(Interest Community)”. Our work won the praise of early adapter in Japan.
We got “Good Design award” in 2001 and he got Web Creation Award in 2006 as a pioneer
of Japanese CGM(Consumer Generated Media=Social Media).
Now I’m is interested in ICT for peace, Humanitarian Technology(Critical Infrastructure,
Drone, not only web technology), Cyber Warfare, Cyber Intelligence and Collective
Intelligence for Human Security.
Do you know about “Seoul Framework”
5
The ‘Seoul Framework’ offers guidelines for governments and international organizations on coping with
cybercrime and cyberwar. It highlights the importance of boosting internet access, particularly for developing
countries, for education, development and to ensure freedom of information and expression.
The annual conference on cyberspace aims to establish international cyber-norms and guidelines. The Seoul
conference followed previous gatherings in London and Budapest. It will likely become a bi-annual event, with the
next conference set for the Netherlands in 2015.
http://www.undp.org/content/seoul_policy_center/en/home/presscenter/articles/2013/10/18/-seoul-framework-could-make-cyberspace-safer-more-accessible-.html
Seoul Conference on Cyberspace 2013 - Panel Discussion 5
International Security
6
Seoul Conference on Cyberspace 2013 - Panel Discussion 5 International Security October 18(Fri.)
10:50-12:20 Auditorium, Coex, Seoul!
http://www.undp.org/content/seoul_policy_center/en/home/presscenter/articles/2013/10/18/-seoul-framework-could-make-cyberspace-safer-more-accessible-.htmlhttp://www.undp.org/content/seoul_policy_center/en/home/presscenter/articles/2013/10/18/-seoul-framework-could-make-cyberspace-safer-more-accessible-.html
https://www.youtube.com/watch?v=8HWxPPwtuWg
Five Principles for Shaping Cybersecurity Norms
Harmonization of Laws and Standards: Given the global and ubiquitous nature of the Internet, developing global
cybersecurity laws and standards will promote understanding, predictability, and enables collaboration on
problem solving among countries.!
・Risk Reduction
Cybersecurity stakeholders should work to improve the security of the Internet through collective responses to
threats by sharing information about threats and vulnerabilities, and by engaging in the active prevention of
cybercrime. !
・Transparency
Governments can help to build trust and increase predictability and stability in cyberspace by practicing greater
transparency in their cybersecurity practices. Microsoft supports greater government transparency, and recently
released another paper promoting the development of a national cybersecurity strategy to articulate priorities,
principles, and approaches for managing national level risks in cyberspace.!
・Collaboration!
As governments construct cybersecurity practices to address security concerns at the international level, they can
seek input from a variety of stakeholders, including the private sector, civil society, and academia.!
・Proportionality!
The issue of proportionality is challenging, because it not yet clear how proportionality in cyberspace will be
interpreted. However, nations should begin to develop interpretations of proportionality in cyberspace under
customary international law.
7
http://download.microsoft.com/download/B/F/0/BF05DA49-7127-4C05-BFE8-0063DAB88F72/Five_Principles_Norms.pdf
Accusation? not only for Freedom of expression. U.S. Gov
let them know to keep their easy hacks in check
N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say
8
WASHINGTON — The trail that led American officials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in
November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most
impenetrable targets on earth. Spurred by growing concern about North Korea’s maturing capabilities, the American spy agency drilled into the Chinese
networks that connect North Korea to the outside world, picked through connections in Malaysia favored by North Korean hackers and penetrated directly
into the North with the help of South Korea and other American allies, according to former United States and foreign officials, computer experts later
briefed on the operations and a newly disclosed N.S.A. document.
A classified security agency program expanded into an ambitious effort, officials said, to place malware that could track the internal workings of many of
the computers and networks used by the North’s hackers, a force that South Korea’s military recently said numbers roughly 6,000 people. Most are
commanded by the country’s main intelligence service, called the Reconnaissance General Bureau, and Bureau 121, its secretive hacking unit, with a large
outpost in China. …
http://www.nytimes.com/2015/01/19/world/asia/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html?_r=0
“We don’t have a better plan – you’re
going to have to stick it up your ass.”
This a light caution? from U.S. to China
9
The risk of “confidentiality"
10
The risk of “confidentiality"
11
http://www.forbes.com/sites/scottasnyder/2015/01/08/south-koreas-other-hacking-incident-and-the-need-for-greater-cooperation-in-northeast-asia/print/
U.S. cyber strategy for national interest
12
http://www.wsj.com/articles/white-house-to-create-new-division-to-streamline-cyberthreat-intelligence-1423572846
Xinhua Insight: Conference urges int'l action against
cyber-terrorism@World Internet Conference 2014
13
WUZHEN, Zhejiang, Nov. 21 (Xinhua) -- That the international community must cooperate to fight online terrorism and maintain peace and stability, is
consensus of the World Internet Conference that closed on Friday.
China has been a major victim of terrorism in recent years, said Gu Jianguo, head of the cyber security and protection bureau under the Ministry of Public
Security. The Internet is an important tool for groups to plan and organize acts of terror and incite followers.
The East Turkestan Islamic Movement (ETIM) has claimed responsibility for a series of incidents featuring knife attacks in Kunming, a bombing in
Urumqi and a car plowing through a crowd in Beijing and threatened to continue their campaign in an online video clip.Since 2010, ETIM has released
almost 300 videos inciting people to participate in their terror campaign. The videos show bomb-making techniques and spread religious extremism.
"Terrorists have their own websites and propaganda platforms on other major portals. They take advantage of social network sites to promote
terrorism,"said Gu, claiming it is easy access to terrorist videos and learn how to make bombs on video sharing websites.
Such freewheeling activities have severely undermined world peace and stability and damaged lives and property, said Gu. "The Internet gives them a global
presence that they did not have before," said James Andrew Lewis, a senior fellow at the Center for Strategic and International Studies based in the United
States. "First of all they use it for propaganda to disseminate Jihad ideology. Besides that they share information and technology that allow them to make
bombs, to recruit people in the west and in Xinjiang," said Michael Barak of Israel's international institute for counter-terrorism. "They are very active on
social media and every terror organization has their own media outlet and twitter accounts. Jihad magazines are in English," he said. Barak believes terrorist
even use online payment systems similar to bitcoin to raise money. No country can manage the threat of cyber-terrorism alone, but at present, there is no
international legal framework to deal with cyber-terrorism, said Cheng Lin, president of the People's Public Security University of China.
"Worse yet, there is neither an effective coordination mechanism nor a top-level design bringing together different countries,"said Cheng.
"International cooperation is very important: monitoring all the websites, everything they run, and recruitment analysis," said Barak.
Gu suggested the international community reach a consensus on the definition of cyber-terrorism, which he said should include all kinds of online
activities promoting and inciting terrorism.
"The answer is that maybe not to focus on the symptoms but on the disease, propaganda and fund-raising are the symptoms, the disease is terrorism, that's
where we need to cooperate," said Lewis.
Gu revealed that there has been a sharp decline of criminal prosecutions for materials promoting terrorism since the beginning of the year when China
tightened up scrutiny and penalties.
"Those who produce and disseminate terrorist materials are based outside China, so we need international cooperation to address the 'cancer' of the
Internet," said Gu.
http://www.xinhuanet.com/english/special/wicwuzhen2014/
WUZHEN, Zhejiang, Nov. 21 (Xinhua) -- That the international community must cooperate to fight online terrorism and maintain peace and stability, is
consensus of the World Internet Conference that closed on Friday.
China has been a major victim of terrorism in recent years, said Gu Jianguo, head of the cyber security and protection bureau under the Ministry of Public
Security. The Internet is an important tool for groups to plan and organize acts of terror and incite followers.
The East Turkestan Islamic Movement (ETIM) has claimed responsibility for a series of incidents featuring knife attacks in Kunming, a bombing in
Urumqi and a car plowing through a crowd in Beijing and threatened to continue their campaign in an online video clip.Since 2010, ETIM has released
almost 300 videos inciting people to participate in their terror campaign. The videos show bomb-making techniques and spread religious extremism.
"Terrorists have their own websites and propaganda platforms on other major portals. They take advantage of social network sites to promote
terrorism,"said Gu, claiming it is easy access to terrorist videos and learn how to make bombs on video sharing websites.
Such freewheeling activities have severely undermined world peace and stability and damaged lives and property, said Gu. "The Internet gives them a global
presence that they did not have before," said James Andrew Lewis, a senior fellow at the Center for Strategic and International Studies based in the United
States. "First of all they use it for propaganda to disseminate Jihad ideology. Besides that they share information and technology that allow them to make
bombs, to recruit people in the west and in Xinjiang," said Michael Barak of Israel's international institute for counter-terrorism. "They are very active on
social media and every terror organization has their own media outlet and twitter accounts. Jihad magazines are in English," he said. Barak believes terrorist
even use online payment systems similar to bitcoin to raise money. No country can manage the threat of cyber-terrorism alone, but at present, there is no
international legal framework to deal with cyber-terrorism, said Cheng Lin, president of the People's Public Security University of China.
"Worse yet, there is neither an effective coordination mechanism nor a top-level design bringing together diffective coordination mechanism nor a top-level design bringing together diff fferent countries,"said Cheng.fferent countries,"said Cheng.ff
"International cooperation is very important: monitoring all the websites, everything they run, and recruitment analysis," said Barak.
Gu suggested the international community reach a consensus on the definition of cyber-terrorism, which he said should include all kinds of online
activities promoting and inciting terrorism.
"The answer is that maybe not to focus on the symptoms but on the disease, propaganda and fund-raising are the symptoms, the disease is terrorism, that's
where we need to cooperate," said Lewis.
Gu revealed that there has been a sharp decline of criminal prosecutions for materials promoting terrorism since the beginning of the year when China
tightened up scrutiny and penalties.
"Those who produce and disseminate terrorist materials are based outside China, so we need international cooperation to address the 'cancer' of the
Internet," said Gu.
Xinhua Insight: Conference urges int'l action against
cyber-terrorism@World Internet Conference 2014
14
WUZHEN, Zhejiang, Nov. 21 (Xinhua) -- That the international community must cooperate to fight online terrorism and maintain peace and stability, is
consensus of the World Internet Conference that closed on Friday.
China has been a major victim of terrorism in recent years, said Gu Jianguo, head of the cyber security and protection bureau under the Ministry of Public
Security. The Internet is an important tool for groups to plan and organize acts of terror and incite followers.
The East Turkestan Islamic Movement (ETIM) has claimed responsibility for a series of incidents featuring knife attacks in Kunming, a bombing in
Urumqi and a car plowing through a crowd in Beijing and threatened to continue their campaign in an online video clip.Since 2010, ETIM has released
almost 300 videos inciting people to participate in their terror campaign. The videos show bomb-making techniques and spread religious extremism.
"Terrorists have their own websites and propaganda platforms on other major portals. They take advantage of social network sites to promote
terrorism,"said Gu, claiming it is easy access to terrorist videos and learn how to make bombs on video sharing websites.
Such freewheeling activities have severely undermined world peace and stability and damaged lives and property, said Gu. "The Internet gives them a global
presence that they did not have before," said James Andrew Lewis, a senior fellow at the Center for Strategic and International Studies based in the United
States. "First of all they use it for propaganda to disseminate Jihad ideology. Besides that they share information and technology that allow them to make
bombs, to recruit people in the west and in Xinjiang," said Michael Barak of Israel's international institute for counter-terrorism. "They are very active on
social media and every terror organization has their own media outlet and twitter accounts. Jihad magazines are in English," he said. Barak believes terrorist
even use online payment systems similar to bitcoin to raise money. No country can manage the threat of cyber-terrorism alone, but at present, there is no
international legal framework to deal with cyber-terrorism, said Cheng Lin, president of the People's Public Security University of China.
"Worse yet, there is neither an effective coordination mechanism nor a top-level design bringing together different countries,"said Cheng.
"International cooperation is very important: monitoring all the websites, everything they run, and recruitment analysis," said Barak.
Gu suggested the international community reach a consensus on the definition of cyber-terrorism, which he said should include all kinds of online
activities promoting and inciting terrorism.
"The answer is that maybe not to focus on the symptoms but on the disease, propaganda and fund-raising are the symptoms, the disease is terrorism, that's
where we need to cooperate," said Lewis.
Gu revealed that there has been a sharp decline of criminal prosecutions for materials promoting terrorism since the beginning of the year when China
tightened up scrutiny and penalties.
"Those who produce and disseminate terrorist materials are based outside China, so we need international cooperation to address the 'cancer' of the
Internet," said Gu.
http://www.xinhuanet.com/english/special/wicwuzhen2014/
IoT(Internet of things) Hacking is serious issue
15
Not in front of the telly: Warning over 'listening' TV:
(Business Intelligence in IoT age)
16
Samsung is warning customers about discussing personal information in front of their smart television set. The warning applies to TV viewers who control their
Samsung Smart TV using its voice activation feature. When the feature is active, such TV sets "listen" to what is said and may share what they hear with Samsung
or third parties, it said. Privacy campaigners said the technology smacked of the telescreens, in George Orwell's 1984, which spied on citizens.
Data sharing
The warning came to light via a story in online news magazine the Daily Beast which published an excerpt of a section of Samsung's privacy policy for its net-
connected Smart TV sets. These record what is said when a button on a remote control is pressed.
The policy explains that the TV set will be listening to people in the same room to try to spot when commands or queries are issued via the remote. It goes on to
say: "If your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party."
Corynne McSherry, an intellectual property lawyer for the Electronic Frontier Foundation (EFF) which campaigns on digital rights issues, told the Daily Beast
that the third party was probably the company providing speech-to-text conversion for Samsung.
She added: "If I were the customer, I might like to know who that third party was, and I'd definitely like to know whether my words were being transmitted in a
secure form."
Soon after, an activist for the EFF circulated the policy statement on Twitter comparing it to George Orwell's description of the telescreens in his novel 1984 that
listen to what people say in their homes.
In response to the widespread sharing of its policy statement, Samsung has issued a statement to clarify how voice activation works. It emphasised that the voice
recognition feature is activated using the TV's remote control.
It said the privacy policy was an attempt to be transparent with owners in order to help them make informed choices about whether to use some features on its
Smart TV sets, adding that it took consumer privacy "very seriously".
Samsung said: "If a consumer consents and uses the voice recognition feature, voice data is provided to a third party during a requested voice command search.
At that time, the voice data is sent to a server, which searches for the requested content then returns the desired content to the TV."
It added that it did not retain voice data or sell the audio being captured. Smart-TV owners would always know if voice activation was turned on because a
microphone icon would be visible on the screen, it said.
The third party handling the translation from speech to text is a firm called Nuance, which specialises in voice recognition, Samsung has confirmed to the BBC.
Samsung is not the first maker of a smart, net-connected TV to run into problems with the data the set collects. In late 2013, a UK IT consultant found his LG
TV was gathering information about his viewing habits.
Publicity about the issue led LG to create a software update which ensured data collection was turned off for those who did not want to share information.
http://www.bbc.com/news/technology-31296188
World Economic Forum : The Global Risks Landscape 2015
(What is the impact and likelihood of global risks?)
17
Survey respondents were asked
to assess the likelihood and
impact of the individual risks on
a scale of 1 to 7, 1 representing
a risk that is not likely to
happen or have impact, and 7 a
risk very likely to occur and
with massive and devastating
impacts. !
!
http://reports.weforum.org/
global-risks-2015/appendix-b-
the-global-risks-perception-
survey-2014-and-methodology/
Internet Mapping(Attack) by AKAMAI
18
19
Internet Mapping(Traffic) by AKAMAI
Seoul Conference on Cyberspace 2013 - Plenary Session 3
20https://www.youtube.com/watch?v=Wb7ON1njlwA
1. Development of international rules for cyberspace
2. Confidence building measures in cyberspace
3. Cybersecurity capacity building
Conventional regulatory framework(at ITU)
21http://www.slideshare.net/izumia/internet-governance-and-development-140305
Conventional regulatory framework
(at ITU)
!! Governments to regulate; business and technologist
participate and form international organization (ITU)
!! Civil Society/individual users have no role
!! Inter-national, but not Global
Governments
Int’l Orgs
Technologist
Industry
Civil Society
Internet governance old model:private sector self management
22http://www.slideshare.net/izumia/internet-governance-and-development-140305
Internet governance old model
private sector self management
	
IETF, ICANN, W3C, Unicode Consortium)
!! Self-management led by technologists
!! Engineers, pioneers form “private club” to manage
!! Looks global, but lacks legal and political legitimacy
!! Not scalable, little civil society involvement
Int’l
Orgs
Governments
Technologists
New industry
Traditional
industry
Civil Society
Self- management
New Model: Multi-stakeholder governance
23http://www.slideshare.net/izumia/internet-governance-and-development-140305
New Model: Multi-stakeholder
governance
!! Net governance cannot exclude users
!! Not “consumers” or “mass”, but Netizens who have power
!! All stakeholders to get involved with proper balance
!! Minimize government involvement, support participation from
civil society and developing countries
Government
Civil Society
(Netizens)
Technologists
Industry
Multi-stakeholder
Governance
Int’l Orgs
JAPANESE APPROACH: PRACTICE (Proactive Response Against
Cyber-attacks Through International Collaborative Exchange)
24
JAPANESE APPROACH: PRACTICE (Proactive Response Against
Cyber-attacks Through International Collaborative Exchange)
25
- The project has been implemented since the fiscal year 2011 with the aim of
countering
and reducing the risks of cyber attacks (distributed denial of service attacks, malware
infection activities, etc.) which produce growing damages in recent years.
- We will internationally build a network to gather information related to cyber attacks
and
malware, etc. through cooperation with Internet service providers and universities in
Japan and other countries, and collaborate with other countries to conduct research,
development, and field trial for technology that makes it possible to predict the
occurrence
of cyber attacks and quickly respond to them.
- We will utilize international conferences (bilateral and multilateral) and call upon
organizations (Internet service providers, universities, etc.) of various countries to
collaborate in sharing information such as cyber attack monitoring data and analysis
results and in conducting research and development.
http://www.nisc.go.jp/active/kihon/pdf/InternationalStrategyonCybersecurityCooperation_e.pdf
JAPANESE APPROACH: TSUBAME (International network traffic
monitoring project) www.nisc.go.jp/eng/
26
JAPANESE APPROACH: TSUBAME (International network traffic
monitoring project) www.nisc.go.jp/eng/
27
- TSUBAME is a project for monitoring and visualizing Internet traffic, and has been
implemented since 2007. The project was developed under the framework of the Asia
Pacific Computer Emergency Response Team (APCERT), which is a community of
Computer Security Incident Response Teams (CSIRT*) in the Asia Pacific region. The
project was initiated and is led by JPCERT/CC.!
- This project installs monitoring sensors in the national CSIRTs of the Asia Pacific
region(as of September 2013, sensors have been installed in 23 teams in 20 economic
regions), and visualizes the monitoring results in the region. The project is aimed at
strengthening collaboration among CSIRTs (cooperation in responding to cross-border
security incidents, and sharing threat information and analysis capabilities) through
the process of gathering and visualizing malicious Internet activities detected by each
sensor, sharing this information among all members, and responding to them together.
http://www.nisc.go.jp/active/kihon/pdf/InternationalStrategyonCybersecurityCooperation_e.pdf
Thank you!
Keep in touch for
our good relationship
kunihiro.maeda@mac.com

More Related Content

What's hot

Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Brent Guglielmino
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Planbfuesz
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarán Mc Mahon
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementThomas Ewert
 
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...Dick Pirozzolo, APR
 
In defence of the human factor
In defence of the human factorIn defence of the human factor
In defence of the human factorCiarán Mc Mahon
 
Nigf report appendix pages
Nigf report   appendix pagesNigf report   appendix pages
Nigf report appendix pagesAgidigba
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Russia and the Challenges of the Digital Environment
Russia and the Challenges of the Digital EnvironmentRussia and the Challenges of the Digital Environment
Russia and the Challenges of the Digital EnvironmentRussian Council
 
Modernizing Dept of Homeland Security for CFAA investigations
Modernizing Dept of Homeland Security for CFAA investigationsModernizing Dept of Homeland Security for CFAA investigations
Modernizing Dept of Homeland Security for CFAA investigationsDavid Sweigert
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Saptarshi Ghosh
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2groot83
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspacemark-smith
 

What's hot (20)

Julie Clegg
Julie CleggJulie Clegg
Julie Clegg
 
ISACA UW Handbook 2016
ISACA UW Handbook 2016ISACA UW Handbook 2016
ISACA UW Handbook 2016
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Plan
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information Security
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
 
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
 
The RuNet generation
The RuNet generationThe RuNet generation
The RuNet generation
 
In defence of the human factor
In defence of the human factorIn defence of the human factor
In defence of the human factor
 
Nigf report appendix pages
Nigf report   appendix pagesNigf report   appendix pages
Nigf report appendix pages
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Russia and the Challenges of the Digital Environment
Russia and the Challenges of the Digital EnvironmentRussia and the Challenges of the Digital Environment
Russia and the Challenges of the Digital Environment
 
Modernizing Dept of Homeland Security for CFAA investigations
Modernizing Dept of Homeland Security for CFAA investigationsModernizing Dept of Homeland Security for CFAA investigations
Modernizing Dept of Homeland Security for CFAA investigations
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
The UaNet Generation
The UaNet GenerationThe UaNet Generation
The UaNet Generation
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Viewers also liked

20150408_Tamagawa-Univ_Service-Managemnet-sp
20150408_Tamagawa-Univ_Service-Managemnet-sp20150408_Tamagawa-Univ_Service-Managemnet-sp
20150408_Tamagawa-Univ_Service-Managemnet-spKunihiro Maeda
 
尾道大学情報処理センター20121113
尾道大学情報処理センター20121113尾道大学情報処理センター20121113
尾道大学情報処理センター20121113Kunihiro Maeda
 
「知」が拡散する時代アーカイブ・キュレーション
「知」が拡散する時代アーカイブ・キュレーション「知」が拡散する時代アーカイブ・キュレーション
「知」が拡散する時代アーカイブ・キュレーションKunihiro Maeda
 
日本知財学会シンポジウム前田130620
日本知財学会シンポジウム前田130620日本知財学会シンポジウム前田130620
日本知財学会シンポジウム前田130620Kunihiro Maeda
 
国際安全保障学会20121209配布用最終
国際安全保障学会20121209配布用最終国際安全保障学会20121209配布用最終
国際安全保障学会20121209配布用最終Kunihiro Maeda
 
OSIPP_グローバル・ガバナンス論_20150105
OSIPP_グローバル・ガバナンス論_20150105OSIPP_グローバル・ガバナンス論_20150105
OSIPP_グローバル・ガバナンス論_20150105Kunihiro Maeda
 
東大新図書館トークイベント Vo.3 『境界条件』2013/10/18
東大新図書館トークイベント Vo.3 『境界条件』2013/10/18東大新図書館トークイベント Vo.3 『境界条件』2013/10/18
東大新図書館トークイベント Vo.3 『境界条件』2013/10/18Kunihiro Maeda
 

Viewers also liked (8)

20150408_Tamagawa-Univ_Service-Managemnet-sp
20150408_Tamagawa-Univ_Service-Managemnet-sp20150408_Tamagawa-Univ_Service-Managemnet-sp
20150408_Tamagawa-Univ_Service-Managemnet-sp
 
尾道大学情報処理センター20121113
尾道大学情報処理センター20121113尾道大学情報処理センター20121113
尾道大学情報処理センター20121113
 
Teri singleton
Teri singletonTeri singleton
Teri singleton
 
「知」が拡散する時代アーカイブ・キュレーション
「知」が拡散する時代アーカイブ・キュレーション「知」が拡散する時代アーカイブ・キュレーション
「知」が拡散する時代アーカイブ・キュレーション
 
日本知財学会シンポジウム前田130620
日本知財学会シンポジウム前田130620日本知財学会シンポジウム前田130620
日本知財学会シンポジウム前田130620
 
国際安全保障学会20121209配布用最終
国際安全保障学会20121209配布用最終国際安全保障学会20121209配布用最終
国際安全保障学会20121209配布用最終
 
OSIPP_グローバル・ガバナンス論_20150105
OSIPP_グローバル・ガバナンス論_20150105OSIPP_グローバル・ガバナンス論_20150105
OSIPP_グローバル・ガバナンス論_20150105
 
東大新図書館トークイベント Vo.3 『境界条件』2013/10/18
東大新図書館トークイベント Vo.3 『境界条件』2013/10/18東大新図書館トークイベント Vo.3 『境界条件』2013/10/18
東大新図書館トークイベント Vo.3 『境界条件』2013/10/18
 

Similar to Keep in touch for cyber peace_20150212

CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityBen Liu
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTopCyberNewsMAGAZINE
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite12
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite31
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiShreedeep Rayamajhi
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynBoston Global Forum
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMADavid Sweigert
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017NgocHaBui1
 

Similar to Keep in touch for cyber peace_20150212 (20)

CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
 
6026 Cybersecurity China
6026 Cybersecurity China6026 Cybersecurity China
6026 Cybersecurity China
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 

More from Kunihiro Maeda

技術立国のためのサイバー防諜  ― サイバー攻撃が問う経営者の資質と 企業のコアコンピタンス ―
技術立国のためのサイバー防諜  ― サイバー攻撃が問う経営者の資質と 企業のコアコンピタンス ―技術立国のためのサイバー防諜  ― サイバー攻撃が問う経営者の資質と 企業のコアコンピタンス ―
技術立国のためのサイバー防諜  ― サイバー攻撃が問う経営者の資質と 企業のコアコンピタンス ―Kunihiro Maeda
 
201528 ossip international_securities-04
201528 ossip international_securities-04201528 ossip international_securities-04
201528 ossip international_securities-04Kunihiro Maeda
 
東大総合図書館新館プロジェクトプレス発表会資料
東大総合図書館新館プロジェクトプレス発表会資料東大総合図書館新館プロジェクトプレス発表会資料
東大総合図書館新館プロジェクトプレス発表会資料Kunihiro Maeda
 
北海道大学大学院講演2010年10月19日
北海道大学大学院講演2010年10月19日北海道大学大学院講演2010年10月19日
北海道大学大学院講演2010年10月19日Kunihiro Maeda
 
防衛研究所講演2013014配布用
防衛研究所講演2013014配布用防衛研究所講演2013014配布用
防衛研究所講演2013014配布用Kunihiro Maeda
 
大阪大学大学院国際公共政策学科20121030
大阪大学大学院国際公共政策学科20121030大阪大学大学院国際公共政策学科20121030
大阪大学大学院国際公共政策学科20121030Kunihiro Maeda
 
Lectutre for kinshasa20120222
Lectutre for kinshasa20120222Lectutre for kinshasa20120222
Lectutre for kinshasa20120222Kunihiro Maeda
 
JAGAT20111019印刷白書Seminar
JAGAT20111019印刷白書SeminarJAGAT20111019印刷白書Seminar
JAGAT20111019印刷白書SeminarKunihiro Maeda
 
国会図書館20110216
国会図書館20110216国会図書館20110216
国会図書館20110216Kunihiro Maeda
 
科学コミュニケーション研究会年次大会口頭発表2011light
科学コミュニケーション研究会年次大会口頭発表2011light科学コミュニケーション研究会年次大会口頭発表2011light
科学コミュニケーション研究会年次大会口頭発表2011lightKunihiro Maeda
 

More from Kunihiro Maeda (11)

技術立国のためのサイバー防諜  ― サイバー攻撃が問う経営者の資質と 企業のコアコンピタンス ―
技術立国のためのサイバー防諜  ― サイバー攻撃が問う経営者の資質と 企業のコアコンピタンス ―技術立国のためのサイバー防諜  ― サイバー攻撃が問う経営者の資質と 企業のコアコンピタンス ―
技術立国のためのサイバー防諜  ― サイバー攻撃が問う経営者の資質と 企業のコアコンピタンス ―
 
201528 ossip international_securities-04
201528 ossip international_securities-04201528 ossip international_securities-04
201528 ossip international_securities-04
 
東大総合図書館新館プロジェクトプレス発表会資料
東大総合図書館新館プロジェクトプレス発表会資料東大総合図書館新館プロジェクトプレス発表会資料
東大総合図書館新館プロジェクトプレス発表会資料
 
北海道大学大学院講演2010年10月19日
北海道大学大学院講演2010年10月19日北海道大学大学院講演2010年10月19日
北海道大学大学院講演2010年10月19日
 
防衛研究所講演2013014配布用
防衛研究所講演2013014配布用防衛研究所講演2013014配布用
防衛研究所講演2013014配布用
 
大阪大学大学院国際公共政策学科20121030
大阪大学大学院国際公共政策学科20121030大阪大学大学院国際公共政策学科20121030
大阪大学大学院国際公共政策学科20121030
 
Lectutre for kinshasa20120222
Lectutre for kinshasa20120222Lectutre for kinshasa20120222
Lectutre for kinshasa20120222
 
JAGAT20111019印刷白書Seminar
JAGAT20111019印刷白書SeminarJAGAT20111019印刷白書Seminar
JAGAT20111019印刷白書Seminar
 
国会図書館20110216
国会図書館20110216国会図書館20110216
国会図書館20110216
 
科学コミュニケーション研究会年次大会口頭発表2011light
科学コミュニケーション研究会年次大会口頭発表2011light科学コミュニケーション研究会年次大会口頭発表2011light
科学コミュニケーション研究会年次大会口頭発表2011light
 
Tamagawa univ20110426
Tamagawa univ20110426Tamagawa univ20110426
Tamagawa univ20110426
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Keep in touch for cyber peace_20150212

  • 1. “KEEP IN TOUCH” for CYBER PEACE OSIPP Guest Lecturer/ Special Appointed Reseacher! Kunihiro Maeda kunihiro.maeda@mac.com cybersecurity norms, confidence building measures, and capacity building
  • 2. Outline:  Today’s keyword is “Confidence building”. Confidence Building Measures(CBM) is the word from Cold War Age. It is like a HOT LINE after Cuba Crisis between Soviet Union and U.S.A. It took a 6 hours to talk with Soviet’s chief secretary Khrushchev for President Kennedy through the diplomatic protocol then. It’s a risk of miscommunication. We have to keep in touch with enemy or not, because of keeping peace. It’s a simple solution.  1. Communication Channel is very important(Human connection, Telecommunication infrastructure, Mass Media with good journalism, e.t.c.)  2. Soft law and power is not so weak. Weak tie provide available approach against emergency. Make the trust and relationship one upon another. It will be great wall.(ex. UN GGE) 3. Technology is always dual-use. Good for fun, but for genocide. Capacity/Capability raise our standard of IT literacy. It’s a quiet method, but effective.
  • 3. Profile Kunihiro Maeda 4 CEO of Unique ID Inc., and Quantum ID Inc. Specially Appointed Researcher of Osaka School of International Public Policy at Osaka University, Visiting Fellow of Tokyo University, Part-time lecturer of Tamagawa University. Part-time lecturer of Graduate School of Arts and Design at Onomichi University. I made SNS with my friend in 1996. It was called "Human Web". Maybe it was First SNS in Japan. In 1998, They tried to make another version “Small World Connection” as work of art. We sent their works to multi-media competition “Ars Electronica” in Australia. And They entered it Digital Be-in in USA. We went to San Francisco for presentation. Our work won the praise of early adapter, just as art. In 2001, We tried to make commercial web site “Kanshin Kukan(Interest Community)”. Our work won the praise of early adapter in Japan. We got “Good Design award” in 2001 and he got Web Creation Award in 2006 as a pioneer of Japanese CGM(Consumer Generated Media=Social Media). Now I’m is interested in ICT for peace, Humanitarian Technology(Critical Infrastructure, Drone, not only web technology), Cyber Warfare, Cyber Intelligence and Collective Intelligence for Human Security.
  • 4. Do you know about “Seoul Framework” 5 The ‘Seoul Framework’ offers guidelines for governments and international organizations on coping with cybercrime and cyberwar. It highlights the importance of boosting internet access, particularly for developing countries, for education, development and to ensure freedom of information and expression. The annual conference on cyberspace aims to establish international cyber-norms and guidelines. The Seoul conference followed previous gatherings in London and Budapest. It will likely become a bi-annual event, with the next conference set for the Netherlands in 2015. http://www.undp.org/content/seoul_policy_center/en/home/presscenter/articles/2013/10/18/-seoul-framework-could-make-cyberspace-safer-more-accessible-.html
  • 5. Seoul Conference on Cyberspace 2013 - Panel Discussion 5 International Security 6 Seoul Conference on Cyberspace 2013 - Panel Discussion 5 International Security October 18(Fri.) 10:50-12:20 Auditorium, Coex, Seoul! http://www.undp.org/content/seoul_policy_center/en/home/presscenter/articles/2013/10/18/-seoul-framework-could-make-cyberspace-safer-more-accessible-.htmlhttp://www.undp.org/content/seoul_policy_center/en/home/presscenter/articles/2013/10/18/-seoul-framework-could-make-cyberspace-safer-more-accessible-.html https://www.youtube.com/watch?v=8HWxPPwtuWg
  • 6. Five Principles for Shaping Cybersecurity Norms Harmonization of Laws and Standards: Given the global and ubiquitous nature of the Internet, developing global cybersecurity laws and standards will promote understanding, predictability, and enables collaboration on problem solving among countries.! ・Risk Reduction Cybersecurity stakeholders should work to improve the security of the Internet through collective responses to threats by sharing information about threats and vulnerabilities, and by engaging in the active prevention of cybercrime. ! ・Transparency Governments can help to build trust and increase predictability and stability in cyberspace by practicing greater transparency in their cybersecurity practices. Microsoft supports greater government transparency, and recently released another paper promoting the development of a national cybersecurity strategy to articulate priorities, principles, and approaches for managing national level risks in cyberspace.! ・Collaboration! As governments construct cybersecurity practices to address security concerns at the international level, they can seek input from a variety of stakeholders, including the private sector, civil society, and academia.! ・Proportionality! The issue of proportionality is challenging, because it not yet clear how proportionality in cyberspace will be interpreted. However, nations should begin to develop interpretations of proportionality in cyberspace under customary international law. 7 http://download.microsoft.com/download/B/F/0/BF05DA49-7127-4C05-BFE8-0063DAB88F72/Five_Principles_Norms.pdf
  • 7. Accusation? not only for Freedom of expression. U.S. Gov let them know to keep their easy hacks in check N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say 8 WASHINGTON — The trail that led American officials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most impenetrable targets on earth. Spurred by growing concern about North Korea’s maturing capabilities, the American spy agency drilled into the Chinese networks that connect North Korea to the outside world, picked through connections in Malaysia favored by North Korean hackers and penetrated directly into the North with the help of South Korea and other American allies, according to former United States and foreign officials, computer experts later briefed on the operations and a newly disclosed N.S.A. document. A classified security agency program expanded into an ambitious effort, officials said, to place malware that could track the internal workings of many of the computers and networks used by the North’s hackers, a force that South Korea’s military recently said numbers roughly 6,000 people. Most are commanded by the country’s main intelligence service, called the Reconnaissance General Bureau, and Bureau 121, its secretive hacking unit, with a large outpost in China. … http://www.nytimes.com/2015/01/19/world/asia/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html?_r=0 “We don’t have a better plan – you’re going to have to stick it up your ass.”
  • 8. This a light caution? from U.S. to China 9
  • 9. The risk of “confidentiality" 10
  • 10. The risk of “confidentiality" 11 http://www.forbes.com/sites/scottasnyder/2015/01/08/south-koreas-other-hacking-incident-and-the-need-for-greater-cooperation-in-northeast-asia/print/
  • 11. U.S. cyber strategy for national interest 12 http://www.wsj.com/articles/white-house-to-create-new-division-to-streamline-cyberthreat-intelligence-1423572846
  • 12. Xinhua Insight: Conference urges int'l action against cyber-terrorism@World Internet Conference 2014 13 WUZHEN, Zhejiang, Nov. 21 (Xinhua) -- That the international community must cooperate to fight online terrorism and maintain peace and stability, is consensus of the World Internet Conference that closed on Friday. China has been a major victim of terrorism in recent years, said Gu Jianguo, head of the cyber security and protection bureau under the Ministry of Public Security. The Internet is an important tool for groups to plan and organize acts of terror and incite followers. The East Turkestan Islamic Movement (ETIM) has claimed responsibility for a series of incidents featuring knife attacks in Kunming, a bombing in Urumqi and a car plowing through a crowd in Beijing and threatened to continue their campaign in an online video clip.Since 2010, ETIM has released almost 300 videos inciting people to participate in their terror campaign. The videos show bomb-making techniques and spread religious extremism. "Terrorists have their own websites and propaganda platforms on other major portals. They take advantage of social network sites to promote terrorism,"said Gu, claiming it is easy access to terrorist videos and learn how to make bombs on video sharing websites. Such freewheeling activities have severely undermined world peace and stability and damaged lives and property, said Gu. "The Internet gives them a global presence that they did not have before," said James Andrew Lewis, a senior fellow at the Center for Strategic and International Studies based in the United States. "First of all they use it for propaganda to disseminate Jihad ideology. Besides that they share information and technology that allow them to make bombs, to recruit people in the west and in Xinjiang," said Michael Barak of Israel's international institute for counter-terrorism. "They are very active on social media and every terror organization has their own media outlet and twitter accounts. Jihad magazines are in English," he said. Barak believes terrorist even use online payment systems similar to bitcoin to raise money. No country can manage the threat of cyber-terrorism alone, but at present, there is no international legal framework to deal with cyber-terrorism, said Cheng Lin, president of the People's Public Security University of China. "Worse yet, there is neither an effective coordination mechanism nor a top-level design bringing together different countries,"said Cheng. "International cooperation is very important: monitoring all the websites, everything they run, and recruitment analysis," said Barak. Gu suggested the international community reach a consensus on the definition of cyber-terrorism, which he said should include all kinds of online activities promoting and inciting terrorism. "The answer is that maybe not to focus on the symptoms but on the disease, propaganda and fund-raising are the symptoms, the disease is terrorism, that's where we need to cooperate," said Lewis. Gu revealed that there has been a sharp decline of criminal prosecutions for materials promoting terrorism since the beginning of the year when China tightened up scrutiny and penalties. "Those who produce and disseminate terrorist materials are based outside China, so we need international cooperation to address the 'cancer' of the Internet," said Gu. http://www.xinhuanet.com/english/special/wicwuzhen2014/ WUZHEN, Zhejiang, Nov. 21 (Xinhua) -- That the international community must cooperate to fight online terrorism and maintain peace and stability, is consensus of the World Internet Conference that closed on Friday. China has been a major victim of terrorism in recent years, said Gu Jianguo, head of the cyber security and protection bureau under the Ministry of Public Security. The Internet is an important tool for groups to plan and organize acts of terror and incite followers. The East Turkestan Islamic Movement (ETIM) has claimed responsibility for a series of incidents featuring knife attacks in Kunming, a bombing in Urumqi and a car plowing through a crowd in Beijing and threatened to continue their campaign in an online video clip.Since 2010, ETIM has released almost 300 videos inciting people to participate in their terror campaign. The videos show bomb-making techniques and spread religious extremism. "Terrorists have their own websites and propaganda platforms on other major portals. They take advantage of social network sites to promote terrorism,"said Gu, claiming it is easy access to terrorist videos and learn how to make bombs on video sharing websites. Such freewheeling activities have severely undermined world peace and stability and damaged lives and property, said Gu. "The Internet gives them a global presence that they did not have before," said James Andrew Lewis, a senior fellow at the Center for Strategic and International Studies based in the United States. "First of all they use it for propaganda to disseminate Jihad ideology. Besides that they share information and technology that allow them to make bombs, to recruit people in the west and in Xinjiang," said Michael Barak of Israel's international institute for counter-terrorism. "They are very active on social media and every terror organization has their own media outlet and twitter accounts. Jihad magazines are in English," he said. Barak believes terrorist even use online payment systems similar to bitcoin to raise money. No country can manage the threat of cyber-terrorism alone, but at present, there is no international legal framework to deal with cyber-terrorism, said Cheng Lin, president of the People's Public Security University of China. "Worse yet, there is neither an effective coordination mechanism nor a top-level design bringing together diffective coordination mechanism nor a top-level design bringing together diff fferent countries,"said Cheng.fferent countries,"said Cheng.ff "International cooperation is very important: monitoring all the websites, everything they run, and recruitment analysis," said Barak. Gu suggested the international community reach a consensus on the definition of cyber-terrorism, which he said should include all kinds of online activities promoting and inciting terrorism. "The answer is that maybe not to focus on the symptoms but on the disease, propaganda and fund-raising are the symptoms, the disease is terrorism, that's where we need to cooperate," said Lewis. Gu revealed that there has been a sharp decline of criminal prosecutions for materials promoting terrorism since the beginning of the year when China tightened up scrutiny and penalties. "Those who produce and disseminate terrorist materials are based outside China, so we need international cooperation to address the 'cancer' of the Internet," said Gu.
  • 13. Xinhua Insight: Conference urges int'l action against cyber-terrorism@World Internet Conference 2014 14 WUZHEN, Zhejiang, Nov. 21 (Xinhua) -- That the international community must cooperate to fight online terrorism and maintain peace and stability, is consensus of the World Internet Conference that closed on Friday. China has been a major victim of terrorism in recent years, said Gu Jianguo, head of the cyber security and protection bureau under the Ministry of Public Security. The Internet is an important tool for groups to plan and organize acts of terror and incite followers. The East Turkestan Islamic Movement (ETIM) has claimed responsibility for a series of incidents featuring knife attacks in Kunming, a bombing in Urumqi and a car plowing through a crowd in Beijing and threatened to continue their campaign in an online video clip.Since 2010, ETIM has released almost 300 videos inciting people to participate in their terror campaign. The videos show bomb-making techniques and spread religious extremism. "Terrorists have their own websites and propaganda platforms on other major portals. They take advantage of social network sites to promote terrorism,"said Gu, claiming it is easy access to terrorist videos and learn how to make bombs on video sharing websites. Such freewheeling activities have severely undermined world peace and stability and damaged lives and property, said Gu. "The Internet gives them a global presence that they did not have before," said James Andrew Lewis, a senior fellow at the Center for Strategic and International Studies based in the United States. "First of all they use it for propaganda to disseminate Jihad ideology. Besides that they share information and technology that allow them to make bombs, to recruit people in the west and in Xinjiang," said Michael Barak of Israel's international institute for counter-terrorism. "They are very active on social media and every terror organization has their own media outlet and twitter accounts. Jihad magazines are in English," he said. Barak believes terrorist even use online payment systems similar to bitcoin to raise money. No country can manage the threat of cyber-terrorism alone, but at present, there is no international legal framework to deal with cyber-terrorism, said Cheng Lin, president of the People's Public Security University of China. "Worse yet, there is neither an effective coordination mechanism nor a top-level design bringing together different countries,"said Cheng. "International cooperation is very important: monitoring all the websites, everything they run, and recruitment analysis," said Barak. Gu suggested the international community reach a consensus on the definition of cyber-terrorism, which he said should include all kinds of online activities promoting and inciting terrorism. "The answer is that maybe not to focus on the symptoms but on the disease, propaganda and fund-raising are the symptoms, the disease is terrorism, that's where we need to cooperate," said Lewis. Gu revealed that there has been a sharp decline of criminal prosecutions for materials promoting terrorism since the beginning of the year when China tightened up scrutiny and penalties. "Those who produce and disseminate terrorist materials are based outside China, so we need international cooperation to address the 'cancer' of the Internet," said Gu. http://www.xinhuanet.com/english/special/wicwuzhen2014/
  • 14. IoT(Internet of things) Hacking is serious issue 15
  • 15. Not in front of the telly: Warning over 'listening' TV: (Business Intelligence in IoT age) 16 Samsung is warning customers about discussing personal information in front of their smart television set. The warning applies to TV viewers who control their Samsung Smart TV using its voice activation feature. When the feature is active, such TV sets "listen" to what is said and may share what they hear with Samsung or third parties, it said. Privacy campaigners said the technology smacked of the telescreens, in George Orwell's 1984, which spied on citizens. Data sharing The warning came to light via a story in online news magazine the Daily Beast which published an excerpt of a section of Samsung's privacy policy for its net- connected Smart TV sets. These record what is said when a button on a remote control is pressed. The policy explains that the TV set will be listening to people in the same room to try to spot when commands or queries are issued via the remote. It goes on to say: "If your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party." Corynne McSherry, an intellectual property lawyer for the Electronic Frontier Foundation (EFF) which campaigns on digital rights issues, told the Daily Beast that the third party was probably the company providing speech-to-text conversion for Samsung. She added: "If I were the customer, I might like to know who that third party was, and I'd definitely like to know whether my words were being transmitted in a secure form." Soon after, an activist for the EFF circulated the policy statement on Twitter comparing it to George Orwell's description of the telescreens in his novel 1984 that listen to what people say in their homes. In response to the widespread sharing of its policy statement, Samsung has issued a statement to clarify how voice activation works. It emphasised that the voice recognition feature is activated using the TV's remote control. It said the privacy policy was an attempt to be transparent with owners in order to help them make informed choices about whether to use some features on its Smart TV sets, adding that it took consumer privacy "very seriously". Samsung said: "If a consumer consents and uses the voice recognition feature, voice data is provided to a third party during a requested voice command search. At that time, the voice data is sent to a server, which searches for the requested content then returns the desired content to the TV." It added that it did not retain voice data or sell the audio being captured. Smart-TV owners would always know if voice activation was turned on because a microphone icon would be visible on the screen, it said. The third party handling the translation from speech to text is a firm called Nuance, which specialises in voice recognition, Samsung has confirmed to the BBC. Samsung is not the first maker of a smart, net-connected TV to run into problems with the data the set collects. In late 2013, a UK IT consultant found his LG TV was gathering information about his viewing habits. Publicity about the issue led LG to create a software update which ensured data collection was turned off for those who did not want to share information. http://www.bbc.com/news/technology-31296188
  • 16. World Economic Forum : The Global Risks Landscape 2015 (What is the impact and likelihood of global risks?) 17 Survey respondents were asked to assess the likelihood and impact of the individual risks on a scale of 1 to 7, 1 representing a risk that is not likely to happen or have impact, and 7 a risk very likely to occur and with massive and devastating impacts. ! ! http://reports.weforum.org/ global-risks-2015/appendix-b- the-global-risks-perception- survey-2014-and-methodology/
  • 19. Seoul Conference on Cyberspace 2013 - Plenary Session 3 20https://www.youtube.com/watch?v=Wb7ON1njlwA 1. Development of international rules for cyberspace 2. Confidence building measures in cyberspace 3. Cybersecurity capacity building
  • 20. Conventional regulatory framework(at ITU) 21http://www.slideshare.net/izumia/internet-governance-and-development-140305 Conventional regulatory framework (at ITU) !! Governments to regulate; business and technologist participate and form international organization (ITU) !! Civil Society/individual users have no role !! Inter-national, but not Global Governments Int’l Orgs Technologist Industry Civil Society
  • 21. Internet governance old model:private sector self management 22http://www.slideshare.net/izumia/internet-governance-and-development-140305 Internet governance old model private sector self management IETF, ICANN, W3C, Unicode Consortium) !! Self-management led by technologists !! Engineers, pioneers form “private club” to manage !! Looks global, but lacks legal and political legitimacy !! Not scalable, little civil society involvement Int’l Orgs Governments Technologists New industry Traditional industry Civil Society Self- management
  • 22. New Model: Multi-stakeholder governance 23http://www.slideshare.net/izumia/internet-governance-and-development-140305 New Model: Multi-stakeholder governance !! Net governance cannot exclude users !! Not “consumers” or “mass”, but Netizens who have power !! All stakeholders to get involved with proper balance !! Minimize government involvement, support participation from civil society and developing countries Government Civil Society (Netizens) Technologists Industry Multi-stakeholder Governance Int’l Orgs
  • 23. JAPANESE APPROACH: PRACTICE (Proactive Response Against Cyber-attacks Through International Collaborative Exchange) 24
  • 24. JAPANESE APPROACH: PRACTICE (Proactive Response Against Cyber-attacks Through International Collaborative Exchange) 25 - The project has been implemented since the fiscal year 2011 with the aim of countering and reducing the risks of cyber attacks (distributed denial of service attacks, malware infection activities, etc.) which produce growing damages in recent years. - We will internationally build a network to gather information related to cyber attacks and malware, etc. through cooperation with Internet service providers and universities in Japan and other countries, and collaborate with other countries to conduct research, development, and field trial for technology that makes it possible to predict the occurrence of cyber attacks and quickly respond to them. - We will utilize international conferences (bilateral and multilateral) and call upon organizations (Internet service providers, universities, etc.) of various countries to collaborate in sharing information such as cyber attack monitoring data and analysis results and in conducting research and development. http://www.nisc.go.jp/active/kihon/pdf/InternationalStrategyonCybersecurityCooperation_e.pdf
  • 25. JAPANESE APPROACH: TSUBAME (International network traffic monitoring project) www.nisc.go.jp/eng/ 26
  • 26. JAPANESE APPROACH: TSUBAME (International network traffic monitoring project) www.nisc.go.jp/eng/ 27 - TSUBAME is a project for monitoring and visualizing Internet traffic, and has been implemented since 2007. The project was developed under the framework of the Asia Pacific Computer Emergency Response Team (APCERT), which is a community of Computer Security Incident Response Teams (CSIRT*) in the Asia Pacific region. The project was initiated and is led by JPCERT/CC.! - This project installs monitoring sensors in the national CSIRTs of the Asia Pacific region(as of September 2013, sensors have been installed in 23 teams in 20 economic regions), and visualizes the monitoring results in the region. The project is aimed at strengthening collaboration among CSIRTs (cooperation in responding to cross-border security incidents, and sharing threat information and analysis capabilities) through the process of gathering and visualizing malicious Internet activities detected by each sensor, sharing this information among all members, and responding to them together. http://www.nisc.go.jp/active/kihon/pdf/InternationalStrategyonCybersecurityCooperation_e.pdf
  • 27. Thank you! Keep in touch for our good relationship kunihiro.maeda@mac.com