Power and Leverage in the XXI Century


Published on

Presentation given in the NATO Parliamentary Assembly 74th Rose-Roth Seminar in June 18th 2010

Published in: News & Politics, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Eero Paloheimo, Martti Tiuri, Jyrki Katainen
  • Power and Leverage in the XXI Century

    1. 1. Power and Leverage in the XXI Century Nordic Perspective Jyrki J.J. Kasvi Parliament of Finland Committee for the Future Wikimedia Commons
    2. 2. Committee for the Future <ul><li>The first committee for the future in the world! </li></ul><ul><li>Established in 1993 in the middle of a deep national recession </li></ul><ul><ul><li>Initiative by the members of the Parliament (167/200)‏ </li></ul></ul><ul><li>Does not take actively part in day to day legislation by choice </li></ul><ul><ul><li>Issues statements on law proposals from futures perspective </li></ul></ul><ul><li>Prepares Parliament’s replies for Government’s Futures reports concerning national long-term development </li></ul><ul><ul><li>e.g. Finnish population policy </li></ul></ul><ul><li>Responsible for parliamentary technology assessment </li></ul><ul><ul><li>e.g. Information society, gene technology, RFID, future of health care </li></ul></ul><ul><li>Brings into political discussion longer term (10-100 yrs) issues and perspectives </li></ul><ul><ul><li>” A parliamentary think-tank” </li></ul></ul>
    3. 3. New glocal identities <ul><li>Traditional local social networks are becoming closer </li></ul><ul><ul><li>” Mobile tribes” are constantly online, communicating </li></ul></ul><ul><ul><li>Virtual societies weaken the meaning of time and place (facebook, LinkedIn)‏ </li></ul></ul><ul><ul><li>The concept of privacy is changing as we distribute private information to our personal networks (twitter, flicker, …)‏ </li></ul></ul><ul><li>New global social networks are spreading around the world </li></ul><ul><ul><li>Global network cultures of like minded people, sharing the same values and interests and interacting in the Web (Open source movement, Greenpeace, Al Qaida)‏ </li></ul></ul><ul><ul><li>Geographical borders lose their meaning as social barriers (Habbo, 2nd Life)‏ </li></ul></ul><ul><li>New interactive participative media create new social cultures </li></ul><ul><ul><li>Network cultures, even network nations are replacing geographical borders, languages or history as a basis for identity </li></ul></ul>
    4. 4. 18.6.2010 www.kasvi.org Asymmetric world <ul><li>Asymmetric values, crises and conflicts </li></ul><ul><ul><li>Global network cultures vs. Nation states </li></ul></ul><ul><ul><ul><li>WWF Rainbow Warrior vs. French secret service </li></ul></ul></ul><ul><ul><ul><li>Al Qaida vs. Western world </li></ul></ul></ul><ul><ul><li>Local conflicts spread around the world in the web </li></ul></ul><ul><li>Completely virtual internet conflicts </li></ul><ul><ul><li>E.g. civil rights activists vs. hate groups </li></ul></ul><ul><li>Memes create spontaneus uncoordinated citizen movements </li></ul><ul><ul><li>Philippines in 2001: An SMS - &quot;Go 2 EDSA. Wear Blck&quot; </li></ul></ul><ul><li>Asymmetric costs of cyber warfare </li></ul><ul><ul><li>Attack is cheap, defense is expensive </li></ul></ul><ul><ul><li>A limitless number of targets to defend while a single security lapse is enough for the attacker </li></ul></ul><ul><ul><li>Even identification of the attacker may be impossible </li></ul></ul>
    5. 5. (R)evolution of warfare <ul><li>Wars are fought for/with/against the most valuable assets of the time: </li></ul><ul><ul><li>Agrarian: fertile land and people </li></ul></ul><ul><ul><li>Industrial: (and) raw materials and industry </li></ul></ul><ul><ul><li>Information society: (and) information and information systems </li></ul></ul><ul><ul><li>Value society: (and) values, reputations, brands, ? </li></ul></ul><ul><li>(Hannu K. Kari, National Defence University)‏ </li></ul>
    6. 6. New targets <ul><li>Military information systems </li></ul><ul><ul><li>U.S. 1997: The Eligible Receiver military exercise </li></ul></ul><ul><ul><li>Irak 2003: ”If we run out of batteries, we are screwed” </li></ul></ul><ul><ul><li>Afganistan 2008: Taleban tapping on Predator video feeds </li></ul></ul><ul><li>Internet infrastructure </li></ul><ul><ul><li>Estonia 2007: Web War One </li></ul></ul><ul><ul><ul><li>What if they had had an Internet election at the time? </li></ul></ul></ul><ul><ul><li>Protected, secured and separated networks for critical systems </li></ul></ul><ul><li>Data and information </li></ul><ul><ul><li>Manipulation and destruction of public and corporate databases </li></ul></ul><ul><ul><li>Weakening the capability to make decisions and to act on them </li></ul></ul><ul><ul><li>Information integrity, usability and backup </li></ul></ul><ul><li>Values and attitudes </li></ul><ul><ul><li>Influencing people’s motivation and attitude </li></ul></ul><ul><ul><li>Open, transparent society </li></ul></ul>
    7. 7. New enemies <ul><li>Originally teenage hackers </li></ul><ul><ul><li>For fun and prestige (pranks, “accidents”)‏ </li></ul></ul><ul><ul><li>Easy due to good-for-nothing security of the systems </li></ul></ul><ul><li>Now it is well paid professional crackers </li></ul><ul><ul><li>Orgnised crime (extortion, fraud, phishing, ...)‏ </li></ul></ul><ul><ul><li>Activist movements (sabotage, information manipulation)‏ </li></ul></ul><ul><ul><li>Terrorist organisations </li></ul></ul><ul><ul><ul><li>Al Qaida has its own Internet forces creating and distributing tools for propaganda and recruitment, intelligence gathering, encryption and steganography and Internet attacks </li></ul></ul></ul><ul><ul><li>Global corporations (industrial espionage)‏ </li></ul></ul><ul><ul><ul><li>Espcially defence industry has ties to national intelligence organisations </li></ul></ul></ul><ul><ul><li>Military forces and national intelligence organisations </li></ul></ul><ul><ul><ul><li>PLA of China (and Finnish army) have their reasons to use Linux </li></ul></ul></ul><ul><li>Crowdsourcing hacktivists </li></ul><ul><ul><li>A major role in the 2007 attack on Estonia </li></ul></ul>
    8. 8. Are we there yet? <ul><li>About 120 countries have developed internet weapons that can be used to attack the information systems of the finance markets or public authorities of other countries (McAfee 2007)‏ </li></ul><ul><li>10 million bots are used to distribute malware and spam every day (Panda Labs 2008)‏ </li></ul><ul><li>The annual take by theft -oriented cyber crime is estimated to be as high as 100 billion U.S. Dollars a year (CBI’s Conference on International Police Cooperation against Cyber Crime 2009)‏ </li></ul><ul><li>Are our authorities and laws there yet? </li></ul>
    9. 9. Yes, we _are_ there already <ul><li>2003: Slammer (376 bytes) crashed Davis-Bessen (Ohio) nuclear power plant safety system, Seattle 911 and Bank of America ATM’s </li></ul><ul><li>2006: striking city employees hacked into Los Angeles traffic light control system and caused a traffic jam that lasted for days </li></ul><ul><li>2006: Iceman broke into several underground services trafficking stolen credit card information, stole the info and set up a service of his own </li></ul><ul><li>2008: Chip card readers were tampered with in the factory so that they sent card information to Chinese and Pakistani criminals in addition to credit card companies </li></ul><ul><li>2009: GhostNet – Someone in China spied on government, corporate and media information systems in 103 countries </li></ul>
    10. 10. Out of the frying pan – into the fire <ul><li>Rfid passports may actually undermine security </li></ul><ul><ul><li>Also criminals and terrorists know how to read rfid chips </li></ul></ul><ul><ul><li>Rfid passports of many countries have already been broken and data altered </li></ul></ul><ul><li>Telecom data retention may actually be dangerous </li></ul><ul><ul><li>Colombian drug cartels have used telecom data to identify informers </li></ul></ul><ul><ul><li>Azerbaidžan police interrogated citizens that had voted Armenia with their mobile phones in the 2009 Eurovision song contest </li></ul></ul><ul><li>Child porn filtering may actually help pedophiles </li></ul><ul><ul><li>Filtering is very easy to circumvent </li></ul></ul><ul><ul><li>Filtering lists are relatively easy to analyse to find child porn </li></ul></ul><ul><li>Actions aimed to improve safety and security may actually make the situation worse </li></ul>
    11. 11. Nordic perspective <ul><li>Nordic countries are information society forerunners. We are setting an example for the rest of the world! </li></ul><ul><ul><li>Compact homogenous societies are easy to manage </li></ul></ul><ul><ul><ul><li>Finland was an ideal test bed for gsm technology </li></ul></ul></ul><ul><ul><li>Among the first ICT dependent societies </li></ul></ul><ul><ul><ul><li>Culture of technological and social data security </li></ul></ul></ul><ul><ul><li>Civil rights like privacy and freedom of expression are respected </li></ul></ul><ul><ul><ul><li>Even against security or economic interests ... usually </li></ul></ul></ul><ul><ul><li>ICT is used to support social inclusion and transparent government </li></ul></ul><ul><ul><ul><li>Good defence against value attacks </li></ul></ul></ul><ul><ul><li>Rule of law is respected </li></ul></ul><ul><ul><ul><li>FRA and the privacy of Finnish emails) </li></ul></ul></ul><ul><li>Of course there are alternative examples </li></ul><ul><ul><li>30.000+ Internet police and the Firewall of China </li></ul></ul>
    12. 12. Digital value questions <ul><li>Democracy = privacy + freedom of speech </li></ul><ul><ul><li>Right to get information freely and without tracing </li></ul></ul><ul><ul><li>Right to express oneself without fear of retribution </li></ul></ul><ul><ul><ul><li>e.g. the background of the Finnish Constitution 100 years ago, when censorship of critical papers lead to civil unrest and political terrorism. </li></ul></ul></ul><ul><li>Right for personal privacy is being questioned </li></ul><ul><ul><li>Retention of telecommunication vs. retention of mail communication data </li></ul></ul><ul><li>Right for freedom of speech is being questioned </li></ul><ul><ul><li>Anonymity in a demonstration vs. anonymity in Internet discussions </li></ul></ul><ul><ul><li>Discussion about drug manufacturing tech. vs. copy protection tech. </li></ul></ul><ul><li>Control encourages counter culture </li></ul><ul><ul><li>The Finnish “video law” inspired the most sophisticated splatter movie culture in the world, based on a huge number of smuggled and copied ultra violent video tapes </li></ul></ul>
    13. 13. The home front (literally)‏ <ul><li>Your daughter has a new boyfriend, and you have access to a database with his crime/credit/health/insurance/loyalty program information. Would you take a peek? </li></ul><ul><ul><li>Never! </li></ul></ul><ul><ul><li>Only if there was something suspicious with him </li></ul></ul><ul><ul><li>Of course! </li></ul></ul><ul><ul><li>I have already done something like that </li></ul></ul>
    14. 14. Sukupuolten välinen digikuilu? Discussion? U.S. Army Photo