o

Following the money in a massive “sextortion” spam scheme

Cryptocurrency profits from sextortion spam funneled into wallets tied to other cybercrime and dark web market activity.







o

How to remove unused devices from Sophos Central

We take you through the steps to clear your old devices from Sophos Central, so you've got more time to focus on the devices that matter.




o

Protecting the Cloud: Securing access to public cloud accounts

How Sophos Cloud Optix helps you secure access to your AWS, Azure and Google Cloud Platform accounts.




o

Protecting the Cloud: Securing user remote access to AWS

How to create secure access to services hosted in AWS with Sophos XG Firewall.






o

Mathematical light shines blindly on us

By William Yslas Vélez Professor Emeritus University of Arizona “When I go to a Mexican restaurant I would gladly pay the musicians to stop playing.” John (not his real name) did not like the noise level. This statement came up … Continue reading





o

Bank of REU/Grad Fair Questions

By Lucy Martinez and Eduardo Torres Davila We attended the Joint Math Meetings (JMM) conference in Denver to present our research from our work at the Mathematical Sciences Research Institute Undergraduate Program. At JMM, there was a fair of graduate … Continue reading




o

A New Type of Learning Community

Setting high standards is expected from all educators. Yet, I think I may have taken this to an extreme in my 2019 spring senior seminar course in algebraic combinatorics. Students walked in to class, got a copy of the syllabus … Continue reading




o

Dare To Share

Guest blog by Professor Mohamed Omar It started as a dare between friends. Would you dare post a video of yourself doing math on YouTube, for the entire world to see? That was the seed of what has become a … Continue reading




o

Finding belonging through mentorship

Guest blog by Stephen McKean On my first day of college, I showed up an hour early to my very first class. The class was Math 2210, multivariable calculus. For some reason, I thought this was the highest math class … Continue reading




o

A mathematician’s mission statement

By Pamela E. Harris and Julianne Vega Companies and organizations are driven by their mission statements. These mission statements provide a concrete summary of what they value and what they work to achieve. Take for example the following mission statements: … Continue reading




o

Learning During the Pandemic: What we wish our professors and mentors knew

Student Authors: Mayleen Cortez, Brooke Keene-Gomez, Lucy Martinez, Amaury V. Miniño, Jenna Race, Kelemua Tesfaye, and Stephanie. Blog post compiled by Melissa Gutiérrez González, Pamela E. Harris, and Alicia Prieto Langarica. In this blog we center the voices of mathematics students as … Continue reading




o

Strengthening Urban Preparedness and Resilience Against Biological Threats in Accra

Invitation Only Research Event

1 March 2019 - 10:30am to 2 March 2019 - 3:00pm

Chatham House, London

Capacity to contain and respond to biological threats varies considerably across the world. Yet such preparedness is vital for prevention, impact-reduction and resilience in the face of biological events, whether they be natural or deliberate outbreaks.

Chatham House is conducting a series of meetings to strengthen urban preparedness for, and resilience against, biological threats in African countries. This meeting will examine the preparedness and prevention mechanisms in Accra, reviewing the comprehensiveness of city-level preparedness.  

This meeting will focus on the formation and implementation of city-level action plans in the context of preparedness for managing biological threats. It will also explore how local authorities are contributing to this effort with their knowledge and expertise.

Attendance at this event is by invitation only.

Nilza Amaral

Project Manager, International Security Programme




o

Cybersecurity in the Commonwealth: Building the Foundations of Effective National Responses in the Caribbean

Invitation Only Research Event

8 March 2019 - 9:00am to 5:30pm

Bridgetown, Barbados

Event participants

Joyce Hakmeh, Cyber Research Fellow, International Security Department, Chatham House

This workshop is the second in a series in the 'Implementing the Commonwealth Cybersecurity Agenda' project. The workshop aims to provide a multi-stakeholder pan-Commonwealth platform to discuss how to take the implementation of the 'Commonwealth Cyber Declaration' forward with a focus on the second pillar of the declaration – building the foundations of an effective national cybersecurity response with eight action points. 

As such, the workshop gathers different project implementers under the UK Foreign and Commonwealth Office’s Cyber Programme, in addition to other key relevant stakeholders from the global level, to explore ongoing initiatives which aim to deliver one or more of pillar two’s action points.

The workshop addresses issues from a global perspective and a Commonwealth perspective and will include presentations from selected partners from different Commonwealth countries.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




o

Transparency and Accountability for Drone Use: European Approaches

Invitation Only Research Event

11 March 2019 - 9:30am to 12 March 2019 - 12:30pm

Chatham House

With increased use of military drones in recent years there have also been many calls for greater transparency and accountability with regards to drone operations.

This would allow for greater public understanding, particularly as the complex nature of military operations today intensifies difficulties in sustaining perceptions of the legitimate use of force.

For example, in Europe, leading states rely on the US for drone platforms and for the infrastructure - such as military communication networks - that enable those operations, while the US also relies on airbases in European states to operate its drone programme.

In addition, with reports that the US is loosening the rules on the use of drones, it is important to understand how European approaches to transparency and accountability may be affected by these developments.

This workshop focuses on how European states can facilitate transparency to ensure accountability for drone use, as well as what the limits might be, considering both the complexity of military operations today and the need for achieving operational goals.

With the US easing restrictions on export controls, the discussion also considers the role of regulation in ensuring accountability and prospects for developing common standards.

Attendance at this event is by invitation only.

Nilza Amaral

Project Manager, International Security Programme




o

European Approaches to Remote Warfare

Research Event

15 May 2019 - 9:00am to 6:00pm

Brussels, Belgium

With continuing instability at Europe's borders, along with uncertainty on future US support for NATO, many European countries are increasing their allocations to defence budgets and to collective European strategic defence. In addition, with non-state armed groups creating instability and threatening civilian lives and livelihoods in proximity to the EU’s borders, various operations have been carried out in conflict theatres in the Middle East, North Africa and the Sahel under the auspices of NATO, the UN, the EU or by single EU member states.

Although European military personnel have been deployed in many regions, with countries becoming more reluctant to deploy ‘boots on the ground’, warfare has been increasingly conducted through remote means. This has led to criticism on the limited transparency and accountability mechanisms at work in these operations, while some have questioned the military effectiveness of such tactics or the capacity and willingness of states to ensure that targets are struck accurately and without impact on civilian populations.

Against this background, the EU has started allocating resources to military research and development projects with a focus on unmanned systems and related technologies. Under the auspices of the European Defence Fund such funding is set to increase, while potential bilateral programmes between some states have also been explored. Despite concerns raised by the European Parliament, the development of these policies and technologies has taken place without significant consideration of what the legal, ethical and military-strategic impact of these instruments might be.    

This event will bring together a range of experts, policymakers and civil society organizations to discuss the technology horizon of European defence investments and policy developments around remote warfare. Participants will discuss the implications of the new EU defence fund, legal, ethical, and transparency issues in military research and development and the position of the EU as a global actor. 

This event is being organized in partnership with PAX Netherlands.

THIS EVENT IS NOW FULL AND REGISTRATION HAS CLOSED.

Nilza Amaral

Project Manager, International Security Programme




o

How Regulation Could Break the Internet: In Conversation with Andrew Sullivan

Research Event

19 June 2019 - 6:00pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Andrew Sullivan, President and CEO Internet Society
Chair: Emily Taylor, Associate Fellow, International Security Department, Chatham House; Editor, Journal of Cyber Policy

Internet regulation is increasing around the world creating positive obligations on internet providers and exerting negative unintended consequences on the internet infrastructure. In some ways, most of this regulatory activity is justifiable. Governments are concerned about the increased risk that the use of the internet brings to societies. As a response, many governments have been enacting regulations as their main approach to dealing with these concerns. The main challenge is that most of the current regulations are either ill-defined or unworkable.  

On the one hand, several governments have established procedures that seek to analyze the impacts of new regulatory proposals before they were adopted. However, there hasn’t been enough attention aimed at analyzing regulations after they have been adopted and only a few have measures in place to evaluate the impacts of the procedures and practices that govern the regulatory process itself.

On the other hand, much of the regulation creates unintended consequences to the internet itself. It undermines many of its fundamental properties and challenges the integrity and resiliency of its infrastructure.  

This event discusses current practices in internet-related regulation and the related challenges. Panellists will discuss how governments can enforce regulations that achieve their intended purpose while at the same time protecting the internet’s core infrastructure and its properties, including its openness, interoperability and global reach.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




o

The Implications of Drone Proliferation in Europe

Invitation Only Research Event

20 May 2019 - 9:30am to 21 May 2019 - 12:30pm

Chatham House, London

Several countries in Europe are currently developing, increasing or arming their drone capabilities. This increase in drone capability is taking place through procurement by individual states, bilateral projects – such as the French-German Future Combat Air Systems – and multinational efforts that include the development of the Eurodrone – a project by Germany, France, Italy and Spain – and the nEUROn which involves France, Greece, Italy, Spain, Sweden and Switzerland. In addition, the EU has recently approved the European Defence Fund which, along with funds for joint development of defence equipment and technology and for defence research, also includes direct funding to support the development of the Eurodrone.
  
Other recent developments include the UK obtaining the MQ−9B SkyGuardian – an updated variant of the MQ-9 Reaper – and Germany signing a leasing agreement for the Israeli-made Heron TP. Also, in March 2019, the US State Department approved the sale of the MQ-9B SkyGuardian to Belgium and announced the provision of MQ-9 Reaper drones to the Netherlands. While the UK and France are the only countries in Europe so far to possess armed drones, Italy is on track to acquire armed drones in the near future. However, out of the European countries currently seeking to obtain unarmed drones – including Spain, Poland and Greece – only Switzerland has so far ruled out weaponizing its drones in the future.
 
This Chatham House workshop will examine key issues pertaining to drone proliferation in Europe including: 
  • The risks and challenges of the increasing number and arming of drones. 
  • The risks for countries of not doing so in terms of geostrategic interests and the future battlefield.
  • Opportunities for developing common standards on drone transfers and deployment across EU member states.
  • Sharing and cooperation on drone use.
  • What legal and policy implications might arise for European states as a result.

With Brexit on the horizon, participants will also consider what impact this may have on future drone developments in Europe.

Attendance at this event is by invitation only.

Nilza Amaral

Project Manager, International Security Programme




o

Protecting Children in Conflict: See Me Safe Symposium

Invitation Only Research Event

7 May 2019 - 10:00am to 5:00pm

Chatham House, London

Today there are 420 million children, or one-fifth of children worldwide, who live in conflict zones and are at risk of being killed or injured and denied access to education, healthcare and humanitarian assistance. From Myanmar and Syria, to South Sudan and Yemen, the impact of conflict on children and their families is devastating. With conflicts becoming more protracted and urbanized, and the undermining of international rules and norms, the risk to civilians is rapidly increasing. 
 
The impact of the crisis in civilian protection is not only devastating children’s lives and risking a lost generation, it threatens global stability and prosperity, contributing to the degradation of the international rules-based system and its institutions and undermining the ability to hold perpetrators accountable and prevent these atrocities from happening.
 
This symposium will bring together practitioners, policymakers, business leaders, philanthropists and academics for a day of panel discussions on the protection of children in conflict. The aim of the event is to generate an informed debate and to deepen engagement with issues around protecting children in conflict as well as to inspire support to help rebuild children’s lives.
 
This event will be followed by a reception from 17:00-18:30.
 
Attendance is by invitation only.
 
Celebrating its centenary in 2020, Chatham House is partnering with Save the Children on this core area of their work, in their anniversary year.

Nilza Amaral

Project Manager, International Security Programme




o

Christopher Painter

Associate Fellow, International Security Programme

Biography

Christopher Painter is a globally recognized leader on cyber policy, cyber diplomacy, cybersecurity and combatting cybercrime.

He has been at the vanguard of cyber issues for over 27 years, first as a federal prosecutor handling some of the most high-profile cyber cases in the U.S., then as a senior official at the U.S. Department of Justice, the FBI, the White House National Security Council and, finally, as the world’s first cyber diplomat at the U.S. Department of State.

Among other things, Christopher currently serves as a commissioner on the Global Commission for the Stability of Cyberspace and chairs a working group on cyber capacity for the Global Forum for Cyber Expertise.

He is a frequent speaker on cyber issues, frequently is interviewed and quoted in the media and has testified on numerous occasions to U.S. Congressional committees. 

He has received a number of awards and honors including Japan’s Order of the Rising Sun, the RSA Security Conference Public Policy Award and the Attorney General’s Award for Exceptional Service. 

He received his B.A. from Cornell University and J.D. from Stanford Law School.

Areas of expertise

  • International aspects of cyber policy including cyber diplomacy
  • Deterrence and collective action in cyberspace
  • Combatting cybercrime and enhancing cybersecurity

Past experience

2019William J. Perry Fellow, Center for Security and Cooperation, Stanford University 
2017 - presentBoard member, Center for Internet Security
2017 - presentCommissioner, Global Commission for the Stability of Cyberspace




o

Cyber Insurance for Civil Nuclear Facilities: Risks and Opportunities

8 May 2019

This paper sets out a roadmap for how organizations in the civil nuclear sector can explore their options and review their cyber risk exposure.

Éireann Leverett

Senior Risk Researcher, University of Cambridge

GettyImages-667179424.jpg

The control room inside the Paks nuclear power plant in Hungary, 10 April 2017. Photo: Getty Images
  • Civil nuclear facilities and organizations hold sensitive information on security clearances, national security, health and safety, nuclear regulatory issues and international inspection obligations. The sensitivity and variety of such data mean that products tailored for insuring the civil nuclear industry have evolved independently and are likely to continue to do so.
  • ‘Air-gaps’ – measures designed to isolate computer systems from the internet – need to be continually maintained for industrial systems. Yet years of evidence indicate that proper maintenance of such protections is often lacking (mainly because very real economic drivers exist that push users towards keeping infrastructure connected). Indeed, even when air-gaps are maintained, security breaches can still occur.
  • Even if a particular organization has staff that are highly trained, ready and capable of handling a technological accident, hacking attack or incidence of insider sabotage, it still has to do business and/or communicate with other organizations that may not have the essentials of cybersecurity in place.
  • Regardless of whether the choice is made to buy external insurance or put aside revenues in preparation for costly incidents, the approach to cyber risk calculation should be the same. Prevention is one part of the equation, but an organization will also need to consider the resources and contingency measures available to it should prevention strategies fail. Can it balance the likelihood of a hacker’s success against the maximum cost to the organization, and put aside enough capital and manpower to get it through a crisis?
  • All civil nuclear facilities should consider the establishment of computer security incident response (CSIR) teams as a relevant concern, if such arrangements are not already in place. The existence of a CSIR team will be a prerequisite for any facility seeking to obtain civil nuclear cyber insurance.
  • Preventing attacks such as those involving phishing and ransomware requires good cyber hygiene practices throughout the workforce. Reducing an organization’s ‘time to recovery’ takes training and dedication. Practising the necessary tasks in crisis simulations greatly reduces the likelihood of friction and the potential for error in a crisis.




o

Understanding Cybercrime for Better Policing: Regional and Global Challenges

Research Event

18 June 2019 - 9:00am to 5:30pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

In recent years, cybercrime has evolved from a niche technological concern into a prominent global issue with substantial preventative and remedial costs for businesses and governments alike. Despite heavy investment in sophisticated cybersecurity measures and the adoption of several legal, organizational and capacity-building measures, cybercrime remains a major threat which is evolving on a daily basis. Today’s cybercrime is more aggressive, more complex, more organized and – importantly – more unpredictable than ever before.

The challenges posed by cybercrime are experienced acutely by countries undergoing digital transformations: as the level of connectivity rises, so too does the potential for online theft, fraud and abuse. Cybercrime is pervasive but governments can work to limit its impact by creating a resilient overall economy and robust institution, and appropriately equipping law enforcement and the justice system to navigate its novel challenges.

To advance the discourse surrounding these issues, this workshop will assess the current cyber threat landscape and how it is evolving. It will identify the main obstacles encountered by law enforcement, the judiciary and prosecutors in their fight against cybercrime. It will also compare national, regional and global approaches that countries can use to effectively curb cybercrime and tackle its emerging challenges.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




o

Create a Global Code of Conduct for Outer Space

12 June 2019

Dr Patricia Lewis

Research Director, Conflict, Science & Transformation; Director, International Security Programme
The rules governing human activity in space have been in place for only a few decades, and yet they are already out of date. They need to be built on and extended to reflect the dramatic and rapid changes in the use of space.

2016-09-27-Space2.jpg

Nighttime view of the strait of Gibraltar. Photo by NASA.

The 1967 Outer Space Treaty (OST) is the mainframe for space law. It recognizes the importance of the use and scientific exploration of outer space for the benefit and in the interests of all countries. It also prohibits national sovereignty in space, including of the Moon and other celestial bodies.

The OST prohibits all weapons of mass destruction in space – in orbit or on other planets and moons – and does not allow the establishment of military infrastructure, manoeuvres or the testing of any type of weapon on planets or moons. As the treaty makes clear, outer space is for peaceful purposes only. Except of course, it is not – nor has it ever been so.

The very first satellite, Sputnik, was a military satellite which kicked off the Cold War space race between the US and the USSR. The militaries of many countries followed suit, and space is now used for military communication, signals intelligence, imaging, targeting, arms control verification and so on.

However, in keeping with international aspirations, space is also being used for all kinds of peaceful purposes such as environmental monitoring, broadcast communications, delivering the internet, weather prediction, navigation, scientific exploration and – very importantly – monitoring the ‘space weather’ (including the activity from the Sun).

There are several other international agreements on space, such as on the rescue of astronauts, the registration of satellites and liability for damage caused by space objects. There is also the Moon Treaty, which governs activities on the Moon and other moons, asteroids and planets.[i]

More recently, states at the UN Committee on the Peaceful Uses of Outer Space (COPUOS) in Vienna have agreed on guidelines to deal with the worrying situation of space debris which is cluttering up orbits and posing a danger to satellites, the space station and astronauts.

The problem the international community now faces is that the use of space is changing dramatically and rapidly. There are more satellites than ever – well over 1,000 – and more owners of satellites – almost every country uses information generated from space. Increasingly, however, those owners are not countries, militaries or international organizations but the commercial sector. Very soon, the owners will even include individuals.

Small ‘mini-satellites’ or ‘cube-sats’ are poised to be deployed in space. These can act independently or in ‘swarms’, and are so small that they piggy-back on the launching of other satellites and so are very cheap to launch. This is changing the cost–benefit equation of satellite ownership and use. Developing countries are increasingly dependent on space for communications, the internet and information on, for example, weather systems, coastal activities and agriculture. 

Another major development is the advent of asteroid mining. Asteroids contain a wide range of metals and minerals – some asteroids are more promising than others, and some are closer to Earth than others. Several companies have been set up and registered around the world to begin the exploitation of asteroids for precious metals (such as platinum) and compounds (such as rare-earth minerals).

Legally, however, this will be a murky venture. The current international treaty regime prohibits the ownership of a celestial body by a country – space is for all. But does international law prohibit the ownership or exploitation of a celestial body by a private company? The law has yet to be tested, but there are space lawyers who think that companies are exempt. Luxembourg and Australia are two countries that have already begun the registration of interest for space-mining companies.

As humanity becomes more dependent on information that is generated in or transmitted through space, the vulnerability to the manipulation of space data is increasing. The demands on the use of communications frequencies (the issue of spectrum availability and rights), managed by the International Telecommunication Union (ITU),[ii] need to be urgently addressed.

There are now constant cyberattacks in space and on the digital information on which our systems rely. For example, position, navigation and timing information such as from GPS or Galileo is not only vital for getting us safely from A to B, but also for fast-moving financial transactions that require accurate timing signals.

Almost all of our electronic systems depend on those timing signals for synchronization and basic functioning. Cyber hacks, digital spoofing and ‘fake’ information are now a real possibility. There is no rules-based order in place that is fit to deal with these types of attacks.

Cyberweapons are only part of the problem. It is assumed that states, if they haven’t already done so, will be positioning ‘defensive’ space weaponry to protect their satellites. The protection may be intended to be against space debris – nets, grabber bars and harpoons, for example, are all being investigated.

All of these ideas, however, could be used as offensive weapons. Once one satellite operator decides to equip its assets with such devices, many others will follow. The weaponization of space is in the horizon.

There are no international rules or agreements to manage these developments. Attempts in Geneva to address the arms race in space have floundered alongside the inability of the Conference on Disarmament to negotiate any instrument since 1996.

Attempts to develop rules of the road and codes of conduct, or even to begin negotiations to prohibit weapons in space, have failed again and again. There are no agreed rules to govern cyber activity. The Tallinn Manuals[iii] that address how international law is applicable to cyberwarfare also address the laws of armed conflict in space, but data spoofing and cyber hacking in space exist in far murkier legal frameworks.

The current system of international space law – which does not even allow for a regular review and consideration of the OST – is struggling to keep up. Space is the inheritance of humankind, yet the current generation of elders – as they have done with so many other parts of our global environment – have let things go and failed to shepherd in the much-needed system of rules to protect space for future generations.

It is not too late, but it will require international cooperation among the major space players: Russia, the US, China, India and Europe – hardly a promising line-up of collaborators in the current political climate.

Filling the governance gaps

Norms of behaviour and rules of the road need to be established for space before it becomes a 21st-century ‘wild west’ of technology and activity. Issues such as cleaning up space debris, the principle of non-interference, and how close satellites can manoeuvre to each other (proximity rules) need to be agreed as a set of international norms for space behaviour.

A cross-regional group of like-minded countries (for example Algeria, Canada, Chile, France, India, Kazakhstan, Malaysia, Nigeria, Sweden, the UAE and the UK) should link up with UN bodies, including the Office for Outer Space Affairs (UNOOSA), COPUOS and ITU, and key private-sector companies to kick-start a new process for a global code of conduct to establish norms and regulate behaviour in space.

The UN could be the host entity for this new approach – or it could be established in the way the Ottawa process for landmines was established, by a group of like-minded states with collective responsibility for, and collective hosting and funding of, the negotiations.

A new approach should also cover cybersecurity in space. The UN processes on space and cyber should intersect more to find ways to create synergies in their endeavours. And the problems ahead as regards spectrum management – particularly given the large number of small satellites and constellations that are to be launched in the near future – need urgent attention in ITU.

What needs to happen

  • The international rules-based order for space – enshrined in particular in the 1967 Outer Space Treaty – has not kept pace with the rapid and dramatic changes in the use of space. New norms of behaviour and rules of the road are needed.
  • These norms and rules need to address a host of contemporary or prospective developments, including asteroid mining, increased numbers of satellite owners, the emergence of ‘mini-satellites’, cyberwarfare, and the potential deployment of ‘defensive’ space weaponry to protect satellites.
  • A cross-regional group of like-minded countries should link up with UN bodies – including UNOOSA, COPUOS and ITU – and key private-sector companies to kick-start a new process for developing a global code of conduct.
  • Problems related to radio spectrum management – given the large number of small satellites and constellations to be launched in the near future – need urgent attention in ITU.

Notes

[i] All of these treaties and other documents can be found at UN Office for Outer Space Affairs (2002), United Nations Treaties and Principles on Outer Space, http://www.unoosa.org/pdf/publications/STSPACE11E.pdf.

[ii] ITU (undated), ‘ITU Radiocommunication Sector’, https://www.itu.int/en/ITU-R/Pages/default.aspx.

[iii] The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), ‘Tallinn Manual 2.0’, https://ccdcoe.org/research/tallinn-manual/.

This essay was produced for the 2019 edition of Chatham House Expert Perspectives – our annual survey of risks and opportunities in global affairs – in which our researchers identify areas where the current sets of rules, institutions and mechanisms for peaceful international cooperation are falling short, and present ideas for reform and modernization.




o

Cybersecurity of NATO’s Space-based Strategic Assets

1 July 2019

Almost all modern military engagements rely on space-based assets, but cyber vulnerabilities can undermine confidence in the performance of strategic systems. This paper will evaluate the threats, vulnerabilities and consequences of cyber risks to strategic systems.

Dr Beyza Unal

Senior Research Fellow, International Security Programme

2019-06-25-Space-Cybersecurity.jpg

The radar domes of RAF Menwith Hill, reported to be the biggest spy base in the world, dominate the skyline on 30 October 2007 in Harrogate, UK. Photo: Getty Images

Summary

  • All satellites depend on cyber technology including software, hardware and other digital components. Any threat to a satellite’s control system or available bandwidth poses a direct challenge to national critical assets.
  • NATO’s missions and operations are conducted in the air, land, cyber and maritime domains. Space-based architecture is fundamental to the provision of data and services in each of these contexts. The critical dependency on space has resulted in new cyber risks that disproportionately affect mission assurance. Investing in mitigation measures and in the resilience of space systems for the military is key to achieving protection in all domains.
  • Almost all modern military engagements rely on space-based assets. During the US-led invasion of Iraq in 2003, 68 per cent of US munitions were guided utilizing space-based means (including laser-, infrared- and satellite-guided munitions); up sharply from 10 per cent in 1990–91, during the first Gulf war. In 2001, 60 per cent of the weapons used by the US in Afghanistan were precision-guided munitions, many of which had the capability to use information provided by space-based assets to correct their own positioning to hit a target.
  • NATO does not own satellites. It owns and operates a few terrestrial elements, such as satellite communications anchor stations and terminals. It requests access to products and services – such as space weather reports and satellite overflight reports provided via satellite reconnaissance advance notice systems – but does not have direct access to satellites: it is up to individual NATO member states to determine whether they allow access.
  • Cyber vulnerabilities undermine confidence in the performance of strategic systems. As a result, rising uncertainty in information and analysis continues to impact the credibility of deterrence and strategic stability. Loss of trust in technology also has implications for determining the source of a malicious attack (attribution), strategic calculus in crisis decision-making and may increase the risk of misperception.




o

The Destabilizing Danger of Cyberattacks on Missile Systems

2 July 2019

Dr Patricia Lewis

Research Director, Conflict, Science & Transformation; Director, International Security Programme

Dr Beyza Unal

Senior Research Fellow, International Security Programme
‘Left-of-launch’ attacks that aim to disable enemy missile systems may increase the chance of them being used, not least because the systems are so vulnerable.

2019-07-02-NKMissile.jpg

This undated photo released by North Korea's news agency in March 2017 shows the launch of four ballistic missiles during a military drill at an undisclosed location in North Korea. Photo: STR/AFP/Getty Images.

After President Trump decided to halt a missile attack on Iran in response to the downing of a US drone, it was revealed that the US had conducted cyberattacks on Iranian weapons systems to prevent Iran launching missiles against US assets in the region.

This ‘left-of-launch’ strategy – the pre-emptive action to prevent an adversary launch missiles – has been part of the US missile defence strategy for some time now. President George W Bush asked the US military and intelligence community to infiltrate the supply chain of North Korean missiles. It was claimed that the US hacked the North Korean ballistic missile programme, causing a failed ballistic missile test, in 2012.

It was not clear then – or now – whether these ‘left-of-launch’ cyberattacks aimed at North Korea were successful as described or whether they were primarily a bluff. But that is somewhat irrelevant; the belief in the possibility and the understanding of the potential impact of such cyber capabilities undermines North Korean or Iranian confidence in their abilities to launch their missiles. In times of conflict, loss of confidence in weapons systems may lead to escalation.

In other words, the adversary may be left with no option but to take the chance to use these missiles or to lose them in a conflict setting. ‘Left of launch’ is a dangerous game. If it is based on a bluff, it could be called upon and lead to deterrence failure. If it is based on real action, then it could create an asymmetrical power struggle. If the attacker establishes false confidence in the power of a cyber weapon, then it might lead to false signalling and messaging.

This is the new normal. The cat-and-mouse game has to be taken seriously, not least because missile systems are so vulnerable.

There are several ways an offensive cyber operation against missile systems might work. These include exploiting missile designs, altering software or hardware, or creating clandestine pathways to the missile command and control systems.

They can also be attacked in space, targeting space assets and their link to strategic systems.

Most missile systems rely, at least in part, on digital information that comes from or via space-based or space-dependent assets such as: communication satellites; satellites that provide position, navigation and timing (PNT) information (for example GPS or Galileo); weather satellites to help predict flight paths, accurate targeting and launch conditions; and remote imagery satellites to assist with information and intelligence for the planning and targeting.

Missile launches themselves depend on 1) the command and control systems of the missiles, 2) the way in which information is transmitted to the missile launch facilities and 3) the way in which information is transmitted to the missiles themselves in flight. All these aspects rely on space technology.

In addition, the ground stations that transmit and receive data to and from satellites are also vulnerable to cyberattack – either through their known and unknown internet connectivity or through malicious use of flash drives that contain a deliberate cyber infection.

Non-space-based communications systems that use cable and ground-to-air-to-ground masts are likewise under threat from cyberattacks that find their way in via internet connectivity, proximity interference or memory sticks. Human error in introducing connectivity via phones, laptops and external drives, and in clicking on malicious links in sophisticated phishing lures, is common in facilitating inadvertent connectivity and malware infection.

All of these can create a military capacity able to interfere with missile launches. Malware might have been sitting on the missile command and control system for months or even years, remaining inactivated until a chosen time or by a trigger that sets in motion a disruption either to the launch or to the flight path of the missile. The country that launches the missile that either fails to launch or fails to reach the target may never know if this was the result of a design flaw, a common malfunction or a deliberate cyberattack.

States with these capabilities must exercise caution: cyber offence manoeuvres may prevent the launch of missile attacks against US assets in the Middle East or in the Pacific regions, but they may also interfere with US missile launches in the future. Even, as has recently been revealed, US cyber weapons targeting an adversary may blow back and inadvertently infect US systems. Nobody is invulnerable.




o

Cybersecurity by Design in Civil Nuclear Power Plants

24 July 2019

Cyberattacks are increasingly challenging critical national infrastructure. This paper considers the security by design approach for civil nuclear power plants and analyses areas of risk and opportunities for the nuclear industry.

Dr Beyza Unal

Senior Research Fellow, International Security Programme

Roger Brunt

Managing Director, Grosmont Howe Ltd

2019-07-24-NuclearPlant.jpg

An employee climbs into the cooling tower of the third and fourth unit at Mochovce nuclear power plant in Slovakia on 2 July 2019. Photo: Getty Images

Summary

  • The application of ‘security by design’ in nuclear new builds could provide operators with the opportunity to establish a robust and resilient security architecture at the beginning of a nuclear power plant’s life cycle. This will enhance the protection of the plant and reduce the need for costly security improvements during its operating life.
  • Security by design cannot fully protect a nuclear power plant from rapidly evolving cyberattacks, which expose previously unsuspected or unknown vulnerabilities.
  • Careful design of security systems and architecture can – and should – achieve levels of protection that exceed current norms and expectations. However, the sourcing of components from a global supply chain means that the integrity of even the most skilfully designed security regime cannot be guaranteed without exhaustive checks of its components.
  • Security by design may well include a requirement for a technical support organization to conduct quality assurance of cyber defences and practices, and this regime should be endorsed by a facility’s executive board and continued at regular intervals after the new build facility has been commissioned.
  • Given the years it takes to design, plan and build a new nuclear power plant, it is important to recognize that from the point of ‘design freeze’ onwards, the operator will be building in vulnerabilities, as technology continues to evolve rapidly while construction fails to keep pace with it. Security by design cannot be a panacea, but it is an important factor in the establishment of a robust nuclear security – and cybersecurity – culture.




o

Policy Implications of Armed Drone Use

This project brings together experts on the use of armed drones, including current and former military officials, academia, think-tanks and NGOs, to discuss and exchange perspectives based on their different experiences, with the aim of sharing knowledge and increasing understanding on these issues, and to inform and provide input into the European debate.

With the increased use of armed drones in recent years, ethical and legal concerns have been raised in regard to civilian casualties, secrecy and lack of transparency and accountability for drone strikes.

This project brings together experts on the use of armed drones, including current and former military officials, academia, think-tanks and NGOs, to discuss and exchange perspectives based on their different experiences, with the aim of sharing knowledge and increasing understanding on these issues, and to inform and provide input into the European debate. The experts explore the issues and controversies surrounding the use of drones outside formal armed conflict and study the broader policy implications in detail, particularly with regards to what this means for the UK and other European countries.

Building on the findings from the workshops, this project will hold a simulation exercise to stress test critical areas of concern around the use of armed drones that are relevant for the UK and other EU member states.

The discussions and the simulation exercise will provide opportunities for policy input on areas of mutual concern and feed into practical policy recommendations on the use of armed drones.

This project builds on previous work on armed drones by the International Security Department and is funded by the Open Society Foundations.

More on Policy Implications of Armed Drone Use




o

Dorothy Gordon

Associate Fellow, International Security Programme and Global Economy and Finance Programme

Biography

Dorothy was the founding director general of the Ghana-India Kofi Annan Centre of Excellence in ICT, a position which she held for over a decade.

She works globally as a policy adviser, evaluator, project manager and organizational management consultant.

Over the course of her 30-year career in international development and technology she has held management positions with the UN and global management consulting firms on four continents.

As a strong advocate of the importance of building robust local innovation ecosystems based on open source technologies, she serves on the board and as a mentor to a number of start-ups and NGOs focused on women in tech.




o

Cyber Governance in the Commonwealth: Towards Stability and Responsible State Behaviour in Cyberspace

Invitation Only Research Event

7 October 2019 - 10:30am to 5:30pm

Addis Ababa, Ethiopia

This roundtable is part of a series under the project, 'Implementing the Commonwealth Cybersecurity Agenda', funded by the UK Foreign and Commonwealth Office (FCO). The roundtable aims to provide a multi-stakeholder, pan-Commonwealth platform to discuss how to implement the Commonwealth Cyber Declaration with a focus on its third pillar 'To promote stability in cyberspace through international cooperation'.

In particular, the roundtable focuses on points 3 and 4 of the third pillar which revolve around the commitment to promote frameworks for stability in cyberspace including the applicability of international law, agreed voluntary norms of responsible state behaviour and the development and implementation of confidence-building measures consistent with the 2015 report of the UNGGE. 

The workshop also focuses on the commitment to advance discussions on how existing international law, including the Charter of the United Nations and applicable international humanitarian law, applies in cyberspace.

The roundtable addresses the issue of global cyber governance from a Commonwealth perspective and will also include a discussion around the way forward, the needed capacity of the different Commonwealth countries and the cooperation between its members for better cyber governance.

Participants include UNGGE members from Commonwealth countries in addition to representatives to the UN Open-Ended Working Group from African countries as well as members from academia, civil society and industry.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




o

Artificial Intelligence Prediction and Counterterrorism

9 August 2019

The use of AI in counterterrorism is not inherently wrong, and this paper suggests some necessary conditions for legitimate use of AI as part of a predictive approach to counterterrorism on the part of liberal democratic states.

Kathleen McKendrick

British Army Officer, Former Visiting Research Fellow at Chatham House

2019-08-06-AICounterterrorism.jpg

Surveillance cameras manufactured by Hangzhou Hikvision Digital Technology Co. at a testing station near the company’s headquarters in Hangzhou, China. Photo: Getty Images

Summary

  • The use of predictive artificial intelligence (AI) in countering terrorism is often assumed to have a deleterious effect on human rights, generating spectres of ‘pre-crime’ punishment and surveillance states. However, the well-regulated use of new capabilities may enhance states’ abilities to protect citizens’ right to life, while at the same time improving adherence to principles intended to protect other human rights, such as transparency, proportionality and freedom from unfair discrimination. The same regulatory framework could also contribute to safeguarding against broader misuse of related technologies.
  • Most states focus on preventing terrorist attacks, rather than reacting to them. As such, prediction is already central to effective counterterrorism. AI allows higher volumes of data to be analysed, and may perceive patterns in those data that would, for reasons of both volume and dimensionality, otherwise be beyond the capacity of human interpretation. The impact of this is that traditional methods of investigation that work outwards from known suspects may be supplemented by methods that analyse the activity of a broad section of an entire population to identify previously unknown threats.
  • Developments in AI have amplified the ability to conduct surveillance without being constrained by resources. Facial recognition technology, for instance, may enable the complete automation of surveillance using CCTV in public places in the near future.
  • The current way predictive AI capabilities are used presents a number of interrelated problems from both a human rights and a practical perspective. Where limitations and regulations do exist, they may have the effect of curtailing the utility of approaches that apply AI, while not necessarily safeguarding human rights to an adequate extent.
  • The infringement of privacy associated with the automated analysis of certain types of public data is not wrong in principle, but the analysis must be conducted within a robust legal and policy framework that places sensible limitations on interventions based on its results.
  • In future, broader access to less intrusive aspects of public data, direct regulation of how those data are used – including oversight of activities by private-sector actors – and the imposition of technical as well as regulatory safeguards may improve both operational performance and compliance with human rights legislation. It is important that any such measures proceed in a manner that is sensitive to the impact on other rights such as freedom of expression, and freedom of association and assembly.




o

Human Control Is Essential to the Responsible Use of Military Neurotechnology

8 August 2019

Yasmin Afina

Research Assistant, International Security Programme
The military importance of AI-connected brain–machine interfaces is growing. Steps must be taken to ensure human control at all times over these technologies.

2019-08-08-BABWIB.jpg

A model of a human brain is displayed at an exhibition in Lisbon, Portugal. Photo: Getty Images.

Technological progress in neurotechnology and its military use is proceeding apace. As early as the 1970s, brain-machine interfaces have been the subject of study. By 2014, the UK’s Ministry of Defence was arguing that the development of artificial devices, such as artificial limbs, is ‘likely to see refinement of control to provide… new ways to connect the able-bodied to machines and computers.’ Today, brain-machine interface technology is being investigated around the world, including in Russia, China and South Korea.

Recent developments in the private sector are producing exciting new capabilities for people with disabilities and medical conditions. In early July, Elon Musk and Neuralink presented their ‘high-bandwidth’ brain-machine interface system, with small and flexible electrode threads packaged into a small device containing custom chips and to be inserted and implanted into the user’s brain for medical purposes.

In the military realm, in 2018, the United States’ Defense Advanced Research Projects Agency (DARPA) put out a call for proposals to investigate the potential of nonsurgical brain-machine interfaces to allow soldiers to ‘interact regularly and intuitively with artificially intelligent, semi-autonomous and autonomous systems in a manner currently not possible with conventional interfaces’. DARPA further highlighted the need for these interfaces to be bidirectional – where information is sent both from brain to machine (neural recording) and from machine to brain (neural stimulation) – which will eventually allow machines and humans to learn from each other.

This technology may provide soldiers and commanders with a superior level of sensory sensitivity and the ability to process a greater amount of data related to their environment at a faster pace, thus enhancing situational awareness. These capabilities will support military decision-making as well as targeting processes.

Neural recording will also enable the obtention of a tremendous amount of data from operations, including visuals, real-time thought processes and emotions. These sets of data may be used for feedback and training (including for virtual wargaming and for machine learning training), as well as for investigatory purposes. Collected data will also feed into research that may help researchers understand and predict human intent from brain signals – a tremendous advantage from a military standpoint.

Legal and ethical considerations

The flip side of these advancements is the responsibilities they will impose and the risks and vulnerabilities of the technology as well as legal and ethical considerations.

The primary risk would be for users to lose control over the technology, especially in a military context; hence a fail-safe feature is critical for humans to maintain ultimate control over decision-making. Despite the potential benefits of symbiosis between humans and AI, users must have the unconditional possibility to override these technologies should they believe it is appropriate and necessary for them to do so.

This is important given the significance of human control over targeting, as well as strategic and operational decision-making. An integrated fail-safe in brain-machine interfaces may in fact allow for a greater degree of human control over critical, time-sensitive decision-making. In other words, in the event of incoming missiles alert, while the AI may suggest a specific course of action, users must be able to decide in a timely manner whether to execute it or not.

Machines can learn from coded past experiences and decisions, but humans also use gut feelings to make life and death decisions. A gut feeling is a human characteristic that is not completely transferable, as it relies on both rational and emotional traits – and is part of the ‘second-brain’ and the gut-brain axis which is currently poorly understood. It is however risky to take decisions solely on gut feelings or solely on primary brain analysis—therefore, receiving a comprehensive set of data via an AI-connected brain-machine interface may help to verify and evaluate the information in a timely manner, and complement decision-making processes. However, these connections and interactions would have to be much better understood than the current state of knowledge. 

Fail-safe features are necessary to ensure compliance with the law, including international humanitarian law and international human rights law. As a baseline, human control must be used to 1) define areas where technology may or may not be trusted and to what extent, and 2) ensure legal, political and ethical accountability, responsibility and explainability at all times. Legal and ethical considerations must be taken into account from as early as the design and conceptualizing stage of these technologies, and oversight must be ensured across the entirety of the manufacturing supply chain.  

The second point raises the need to further explore and clarify whether existing national, regional and international legal, political and ethical frameworks are sufficient to cover the development and use of these technologies. For instance, there is value in assessing to what extent AI-connected brain-machine interfaces will affect the assessment of the mental element in war crimes and their human rights implications.

In addition, these technologies need to be highly secure and invulnerable to cyber hacks. Neural recording and neural stimulation will be directly affecting brain processes in humans and if an adversary has the ability to connect to a human brain, steps need to be taken to ensure that memory and personality could not be damaged.

Future questions

Military applications of technological progress in neurotechnology is inevitable, and their implications cannot be ignored. There is an urgent need for policymakers to understand the fast-developing neurotechnical capabilities, develop international standards and best practices – and, if necessary, new and dedicated legal instruments – to frame the use of these technologies.

Considering the opportunities that brain-machine interfaces may present in the realms of security and defence, inclusive, multi-stakeholder discussions and negotiations leading to the development of standards must include the following considerations:

  • What degree of human control would be desirable, at what stage and by whom? To what extent could human users be trusted with their own judgment in decision-making processes?
  • How could algorithmic and human biases, the cyber security and vulnerabilities of these technologies and the quality of data be factored into these discussions?
  • How can ethical and legal considerations be incorporated into the design stage of these technologies?
  • How can it be ensured that humans cannot be harmed in the process, either inadvertently or deliberately?
  • Is there a need for a dedicated international forum to discuss the military applications of neurotechnology? How could these discussions be integrated to existing international processes related to emerging military applications of technological progress, such as the Convention on Certain Conventional Weapons (CCW) Group of Governmental Experts on Lethal Autonomous Weapons Systems?




o

The Future of EU–US Cooperation in Space Traffic Management and Space Situational Awareness

29 August 2019

As more space activities develop, there is an increasing requirement for comprehensive space situational awareness (SSA). This paper provides an overview of the current landscape in SSA and space traffic management as well as possible scenarios for EU–US cooperation in this area. 

Alexandra Stickings

Research Fellow for Space Policy and Security, RUSI

2019-08-19-SpaceTrafficManagement.jpg

Deployment of the NanoRacks-Remove Debris Satellite from the International Space Station. Photo: Getty Images.

Summary

  • Space situational awareness (SSA) and space traffic management (STM) are essential for sustainable near-Earth orbit. International cooperation in SSA and STM is vital with the growing number of satellite operators and the increasingly complex space environment.
  • The various definitions of SSA and STM are ambiguous. Understanding the activities that fall under each term can better assist in finding areas for cooperation and collaboration.
  • SSA has historically been a military activity, leading to an incomplete public catalogue of its use and barriers to sharing information with other states and the commercial sector. The rise in private space actors has increased the number of commercial STM providers and, with plans in the US to move responsibility for STM to civilian control, there will likely be more opportunities for international collaboration, particularly through the EU Space Surveillance and Tracking (SST) programme.
  • Individual EU member states possess developed STM capabilities, but overall these are still some way behind those of allies such as the US. Further investment in STM infrastructure and programmes is required for the EU and individual European states to be an essential partner to the US and add value to the global effort.
  • There are worldwide challenges, both political and technical, to providing STM coverage, which may lead to a lack of collaboration and gaps in understanding of activities in orbit. Existing sensors have limitations in terms of the size of objects that can be detected and the precision with which their movements can be predicted. These capability gaps represent opportunities for the EU to contribute.
  • The EU can build on its tradition of support for openness and civil society by creating a system that fosters an environment of cooperation and collaboration involving industry, commercial STM providers and the wider international community.
  • Although collaboration in STM is vital, the EU should also aim to tackle issues within the wider definition of SSA including space weather, intelligence and the security of ground stations.
  • The EU is well placed to become a global leader in SSA and STM. However, it needs to take into consideration the current political and technical landscape when making decisions regarding investment in capabilities and the pursuit of international partnerships.




o

Examining Measures to Mitigate Cyber Vulnerabilities of Space-based Strategic Assets

Invitation Only Research Event

30 October 2019 - 9:30am to 4:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Beyza Unal, Senior Research Fellow, International Security Department, Chatham House
Patricia Lewis, Research Director, International Security Department, Chatham House

Strategic systems that depend on space-based assets, such as command, control and communication, early warning systems, weapons systems and weapons platforms, are essential for conducting successful NATO operations and missions. Given the increasing dependency on such systems, the alliance and key member states would therefore benefit from an in-depth analysis of possible mitigation and resilience measures.

This workshop is part of the International Security Department’s (ISD) project on space security and the vulnerability of strategic assets to cyberattacks, which includes a recently published report. This project aims to create resilience in NATO and key NATO member states, building the capacity of key policymakers and stakeholders to respond with effective policies and procedures. This workshop will focus on measures to mitigate the cyber vulnerabilities of NATO’s space-dependent strategic assets. Moreover, participants will discuss the type of resilience measures and mechanisms required.

Attendance at this event is by invitation only. 

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




o

Who’s Afraid of Huawei? Understanding the 5G Security Concerns

9 September 2019

Emily Taylor

Associate Fellow, International Security Programme
Emily Taylor examines the controversy around the Chinese tech giant’s mobile broadband equipment and the different approaches taken by Western countries.

2019-09-06-Huawei.jpg

Huawei's Ox Horn campus in Dongguan, China. Photo: Getty Images.

As countries move towards the fifth generation of mobile broadband, 5G, the United States has been loudly calling out Huawei as a security threat. It has employed alarmist rhetoric and threatened to limit trade and intelligence sharing with close allies that use Huawei in their 5G infrastructure.

While some countries such as Australia have adopted a hard line against Huawei, others like the UK have been more circumspect, arguing that the risks of using the firm’s technology can be mitigated without forgoing the benefits.

So, who is right, and why have these close allies taken such different approaches?

The risks

Long-standing concerns relating to Huawei are plausible. There are credible allegations that it has benefitted from stolen intellectual property, and that it could not thrive without a close relationship with the Chinese state.

Huawei hotly denies allegations that users are at risk of its technology being used for state espionage, and says it would resist any order to share information with the Chinese government. But there are questions over whether it could really resist China’s stringent domestic legislation, which compels companies to share data with the government. And given China’s track record of using cyberattacks to conduct intellectual property theft, there may be added risks of embedding a Chinese provider into critical communications infrastructure.

In addition, China’s rise as a global technological superpower has been boosted by the flow of financial capital through government subsidies, venture and private equity, which reveal murky boundaries between the state and private sector for domestic darlings. Meanwhile, the Belt and Road initiative has seen generous investment by China in technology infrastructure across Africa, South America and Asia.

There’s no such thing as a free lunch or a free network – as Sri Lanka discovered when China assumed shares in a strategic port in return for debt forgiveness; or Mexico when a 1% interest loan for its 4G network came on the condition that 80% of the funding was spent with Huawei.

Aside from intelligence and geopolitical concerns, the quality of Huawei’s products represents a significant cyber risk, one that has received less attention than it deserves.

On top of that, 5G by itself will significantly increase the threat landscape from a cybersecurity perspective. The network layer will be more intelligent and adaptable through the use of software and cloud services. The number of network antennae will increase by a factor of 20, and many will be poorly secured ‘things’; there is no need for a backdoor if you have any number of ‘bug doors’.

Finally, the US is threatening to limit intelligence sharing with its closest allies if they adopt Huawei. So why would any country even consider using Huawei in their 5G infrastructure?

Different situations

The truth is that not every country is free to manoeuvre; 5G technology will sit on top of existing mobile infrastructure.

Australia and the US can afford to take a hard line: their national infrastructure has been largely Huawei-free since 2012. However, the Chinese firm is deeply embedded in other countries’ existing structures – for example, in the UK, Huawei has provided telecommunications infrastructure since 2005. Even if the UK decided tomorrow to ditch Huawei, it cannot just rip up existing 4G infrastructure. To do so would cost a fortune, risk years of delay in the adoption of 5G and limit competition in 5G provisioning.

As a result, the UK has adopted a pragmatic approach resulting from years of oversight and analysis of Huawei equipment, during which it has never found evidence of malicious Chinese state cyber activity through Huawei.

At the heart of this process is the Huawei Cyber Security Evaluation Centre, which was founded in 2010 as a confidence-building measure. Originally criticized for ‘effectively policing itself’, as it was run and staffed entirely by Huawei, the governance has now been strengthened, with the National Cyber Security Centre chairing its oversight board.

The board’s 2019 report makes grim reading, highlighting ‘serious and system defects in Huawei’s software engineering and cyber security competence’. But it does not accuse the company of serving as a platform for state-sponsored surveillance.

Similar evidence-based policy approaches are emerging in other countries like Norway and Italy. They offer flexibility for governments, for example by limiting access to some contract competition through legitimate and transparent means, such as security reviews during procurement. The approaches also raise security concerns (both national and cyber) to a primary issue when awarding contracts – something that was not always done in the past, when price was the key driver.

The UK is also stressing the need to manage risk and increase vendor diversity in the ecosystem to avoid single points of failure. A further approach that is beginning to emerge is to draw a line between network ‘core’ and ‘periphery’ components, excluding some providers from the more sensitive ‘core’. The limited rollouts of 5G in the UK so far have adopted multi-provider strategies, and only one has reportedly not included Huawei kit.

Managing the risks to cyber security and national security will become more complex in a 5G environment. In global supply chains, bans based on the nationality of the provider offer little assurance. For countries that have already committed to Huawei in the past, and who may not wish to be drawn into an outright trade war with China, these moderate approaches offer a potential way forward.




o

How Is New Technology Driving Geopolitical Relations?

Research Event

22 October 2019 - 6:00pm to 7:00pm

Chatham House, London

Event participants

Rt Hon Baroness Neville-Jones DCMG, Minister of State for Security and Counter Terrorism (2010-11)
Jamie Condliffe, Editor, DealBook Newsletter and Writer, Bits Tech Newsletter, The New York Times
Jamie Saunders, Partner, Wychwood Partners LLP; Visiting Professor, University College London
Chair: Dr Patricia Lewis, Research Director, International Security Department, Chatham House

New technology such as 5G, artificial intelligence, nanotechnology and robotics have become, now more than ever, intertwined with geopolitical, economic and trade interests. Leading powers are using new technology to exert power and influence and to shape geopolitics more generally.

The ongoing race between the US and China around 5G technology is a case in point. Amid these tensions, the impact on developing countries is not sufficiently addressed.

Arguably, the existing digital divide will increase leading developing countries to the early, if not hasty, adoption of new technology for fear of lagging behind. This could create opportunities but will also pose risks.

This panel discusses how new technology is changing the geopolitical landscape. It also discusses the role that stakeholders, including governments, play in the creation of standards for new technologies and what that means for its deployment in key markets technically and financially.

Finally, the panel looks at the issue from the perspective of developing countries, addressing the choices that have to be made in terms of affordability, development priorities and security concerns.

This event was organized with the kind support of DXC Technology.

Nicole Darabian

Research Assistant, Cyber Policy, International Security Department




o

EU–US Cooperation on Tackling Disinformation

3 October 2019

Disinformation, as the latest iteration of propaganda suitable for a digitally interconnected world, shows no signs of abating. This paper provides a holistic overview of the current state of play and outlines how EU and US cooperation can mitigate disinformation in the future.

Sophia Ignatidou

Academy Associate, International Security Programme

2019-09-19-FakeNews.jpg

A congressional staff member displays print outs of social media posts during a hearing before the House Select Intelligence Committee 1 November 2017 in Washington, DC. Photo: Getty Images.
  • EU and US cooperation on tackling disinformation needs to be grounded in an international human rights framework in order to bridge the differences of both parties and include other countries facing this challenge.
  • The disinformation debate needs to be reformulated to cover systemic issues rather than merely technical or security concerns. A lag in regulatory development has led to systemic vulnerabilities. In this context, policymakers need to push for more evidence-based analysis, which is only attainable if technology companies engage in honest debate and allow meaningful access to data – as determined by government appointed researchers rather than the companies themselves – taking into account and respecting users’ privacy.
  • Data governance needs to be the focus of attempts to tackle disinformation. Data’s implications for information, market and power asymmetries, feed into and exacerbate the problem.
  • Policymakers should focus on regulating the distribution of online content rather than the subject matter itself, which may have implications for freedom of speech.
  • Disinformation is mainly the result of inefficient gatekeeping of highly extractive digital companies. The old gatekeepers, journalists and their respective regulators, need to be actively engaged in devising the new regulatory framework.
  • Legacy media need to urgently consider the issue of ‘strategic silence’ and avoid being co-opted by political actors aiming to manipulate the accelerated, reactive news cycle by engaging in divisive ‘clickbait’ rhetoric verging on disinformation and propaganda. When strategic silence is not an option, contextual analysis is fundamental.
  •  The EU delegation should assist the coordination of EU–US efforts to tackle disinformation by drawing on the work and expertise at the G7 Rapid Response Mechanism (RRM), the Transatlantic Commission on Election Integrity (TCEI), the European Centre of Excellence for Countering Hybrid Threats (Hybrid CoE), the High-level Panel on Digital Cooperation, and work with the International Telecommunication Union (ITU) to foster a long-term interdisciplinary forum to harness technological innovation to protect and support democracy from threats such as disinformation.
  • The EU and US must avoid rushed regulation that may condone enhanced surveillance or vilify journalism that scrutinizes those in power in the name of security.




o

Who Runs the Internet: Internet Consolidation and Control

Research Event

10 December 2019 - 6:00pm to 7:15pm

Chatham House, London

Event participants

Andrew Sullivan, President and CEO, Internet Society
Jennifer Cobbe, Research Associate, Department of Computer Science and Technology, University of Cambridge
Jesse Sowell, Assistant Professor, Department of International Affairs, Bush School of Government and Public Service, Texas A&M University
Chair: Emily Taylor, Associate Fellow, International Security, Chatham House, Editor, Journal of Cyber Policy

In recent years, there has been a growing debate around the influence of a few large internet technology companies on the internet’s infrastructure and over the popular applications and social media platforms that we use every day.

The internet which was once widely viewed as a collective platform for limitless, permissionless innovation, competition and growth, is now increasingly viewed as a consolidated environment dominated by a few. Such market dominance threatens to undermine the internet’s fundamental benefits as a distributed network in which no single entity has control.  

The panel examines the risks of consolidation throughout the internet’s technology stack such as the impact on complex supply chains that support applications, including cloud provisions, ‘as a service’.

It also explores the potential benefits, for example, when building out essential infrastructure to support faster and cheaper internet services in developing economies, consolidation can create economies of scale that bring the resource-intensive building blocks of the internet economy within the reach of new start-ups and innovators.

The panel provides an interdisciplinary perspective exploring the relationship between consolidation and evolutions in the internet infrastructure as well as unpacking its policy implications.

This event supports a special issue of the Journal of Cyber Policy as part of a collaboration between Chatham House and the Internet Society which explores the impact of the consolidation on the internet’s fundamental architecture.

Nilza Amaral

Project Manager, International Security Programme




o

EU–US Relations on Internet Governance

14 November 2019

As internet governance issues emerge in the wake of innovations such as the Internet of Things and advanced artificial intelligence, there is an urgent need for the EU and US to establish a common, positive multi-stakeholder vision for regulating and governing the internet.

Emily Taylor

Associate Fellow, International Security Programme

Stacie Hoffmann

Internet Policy and Cybersecurity Consultant, Oxford Information Labs

2019-11-14-EUUSInternet.jpg

Server room network cables in New York City, November 2014. Photo: Michael Bocchieri/Staff/Getty.
  • Political, economic, sociological and technological factors are poised to challenge EU and US ideological positions on internet governance, which will make it difficult to find consensus and common ground in the years to come.
  • The EU and US share core values and perspectives relating to internet governance, such as openness, freedom and interoperability, as well as a human rights framework for cybersecurity. There have been many examples of successful multi-stakeholder cooperation between the EU and US, including the Internet Assigned Numbers Authority (IANA) transition and the European Dialogue on Internet Governance (EuroDIG).
  • There are also subtle differences between the EU and US, and each has different reasons to support multi-stakeholderism. Cases that highlight growing tensions in EU–US coordination on internet governance include the controversies surrounding the EU General Data Protection Regulation (GDPR), the WHOIS system that governs domain name registration data, and the board of the Internet Corporation for Assigned Names and Numbers (ICANN), which undermined an independent cybersecurity review.
  • Internet governance is becoming more complex, with a multiplicity of actors and no obvious authority for important emerging issues. Additionally, the rise of China and its authoritarian vision for the future of the internet is a threat to the current internet governance institutions that have been shaped by and reflect Western values.
  • To bridge ideological gaps the EU and US should build capacity between likeminded stakeholders, create a taskforce on effective multi-stakeholder internet governance, and work through non-governmental stakeholders to improve participation.




o

AI-driven Personalization in Digital Media: Political and Societal Implications

2 December 2019

The fallout from disinformation and online manipulation strategies have alerted Western democracies to the novel, nuanced vulnerabilities of our information society. This paper outlines the implications of the adoption of AI by the the legacy media, as well as by the new media, focusing on personalization.

Sophia Ignatidou

Academy Associate, International Security Programme

2019-12-02-AI-Driven-Personalization-small.jpg

The Reuters and other news apps seen on an iPhone, 29 January 2019. Photo: Getty Images.

Summary

  • Machine learning (ML)-driven personalization is fast expanding from social media to the wider information space, encompassing legacy media, multinational conglomerates and digital-native publishers: however, this is happening within a regulatory and oversight vacuum that needs to be addressed as a matter of urgency.
  • Mass-scale adoption of personalization in communication has serious implications for human rights, societal resilience and political security. Data protection, privacy and wrongful discrimination, as well as freedom of opinion and of expression, are some of the areas impacted by this technological transformation.
  • Artificial intelligence (AI) and its ML subset are novel technologies that demand novel ways of approaching oversight, monitoring and analysis. Policymakers, regulators, media professionals and engineers need to be able to conceptualize issues in an interdisciplinary way that is appropriate for sociotechnical systems.
  • Funding needs to be allocated to research into human–computer interaction in information environments, data infrastructure, technology market trends, and the broader impact of ML systems within the communication sector.
  • Although global, high-level ethical frameworks for AI are welcome, they are no substitute for domain- and context-specific codes of ethics. Legacy media and digital-native publishers need to overhaul their editorial codes to make them fit for purpose in a digital ecosystem transformed by ML. Journalistic principles need to be reformulated and refined in the current informational context in order to efficiently inform the ML models built for personalized communication.
  • Codes of ethics will not by themselves be enough, so current regulatory and legislative frameworks as they relate to media need to be reassessed. Media regulators need to develop their in-house capacity for thorough research and monitoring into ML systems, and – when appropriate –proportionate sanctions for actors found to be employing such systems towards malign ends. Collaboration with data protection authorities, competition authorities and national electoral commissions is paramount for preserving the integrity of elections and of a political discourse grounded on democratic principles.
  • Upskilling senior managers and editorial teams is fundamental if media professionals are to be able to engage meaningfully and effectively with data scientists and AI engineers.




o

Trump’s Threat to Target Iran’s Cultural Heritage Is Illegal and Wrong

7 January 2020

Héloïse Goodley

Army Chief of General Staff Research Fellow (2018–19), International Security
Targeting cultural property is rightly prohibited under the 1954 Hague Convention.

2020-01-07-Trump.jpg

Donald Trump at Mar-a-Lago in December. Photo: Getty Images

As tensions escalate in the Middle East, US President Donald Trump has threatened to strike targets in Iran should they seek to retaliate over the killing of Qassem Soleimani. According to the president’s tweet, these sites includes those that are ‘important to Iran and Iranian culture’.

Defense Secretary Mark Esper was quick on Monday to rule out any such action and acknowledged that the US would ‘follow the laws of armed conflict’. But Trump has not since commented further on the matter.

Any move to target Iranian cultural heritage could constitute a breach of the international laws protecting cultural property. Attacks on cultural sites are deemed unlawful under two United Nations conventions; the 1954 Hague Convention for the Protection of Cultural Property during Armed Conflict, and the 1972 UNESCO World Heritage Convention for the Protection of the World Cultural and Natural Heritage.

These have established deliberate attacks on cultural heritage (when not militarily necessary) as a war crime under the Rome Statute of the International Criminal Court in recognition of the irreparable damage that the loss of cultural heritage can have locally, regionally and globally.

These conventions were established in the aftermath of the Second World War, in reaction to the legacy of the massive destruction of cultural property that took place, including the intense bombing of cities, and systematic plunder of artworks across Europe. The conventions recognize that damage to the cultural property of any people means ‘damage to the cultural heritage of all mankind’. The intention of these is to establish a new norm whereby protecting culture and history – that includes cultural and historical property – is as important as safeguarding people.

Such historical sites are important not simply as a matter of buildings and statues, but rather for their symbolic significance in a people’s history and identity. Destroying cultural artefacts is a direct attack on the identity of the population that values them, erasing their memories and historical legacy. Following the heavy bombing of Dresden during the Second World War, one resident summed up the psychological impact of such destruction in observing that ‘you expect people to die, but you don’t expect the buildings to die’.

Targeting sites of cultural significance isn’t just an act of intimidation during conflict. It can also have a lasting effect far beyond the cessation of violence, hampering post-conflict reconciliation and reconstruction, where ruins or the absence of previously significant cultural monuments act as a lasting physical reminder of hostilities.

For example, during the Bosnian War in the 1990s, the Old Bridge in Mostar represented a symbol of centuries of shared cultural heritage and peaceful co-existence between the Serbian and Croat communities. The bridge’s destruction in 1993 at the height of the civil war and the temporary cable bridge which took its place acted as a lasting reminder of the bitter hostilities, prompting its reconstruction a decade later as a mark of the reunification of the ethnically divided town.

More recently, the destruction of cultural property has been a feature of terrorist organizations, such as the Taliban’s demolition of the 1,700-year-old Buddhas of Bamiyan in 2001, eliciting international condemnation. Similarly, in Iraq in 2014 following ISIS’s seizure of the city of Mosul, the terrorist group set about systematically destroying a number of cultural sites, including the Great Mosque of al-Nuri with its leaning minaret, which had stood since 1172. And in Syria, the ancient city of Palmyra was destroyed by ISIS in 2015, who attacked its archaeological sites with bulldozers and explosives.

Such violations go beyond destruction: they include the looting of archaeological sites and trafficking of cultural objects, which are used to finance terrorist activities, which are also prohibited under the 1954 Hague Convention.

As a war crime, the destruction of cultural property has been successfully prosecuted in the International Criminal Court, which sentenced Ahmad Al-Faqi Al-Mahdi to nine years in jail in 2016 for his part in the destruction of the Timbuktu mausoleums in Mali. Mahdi led members of Al-Qaeda in the Islamic Maghreb to destroy mausoleums and monuments of cultural and religious importance in Timbuktu, irreversibly erasing what the chief prosecutor described as ‘the embodiment of Malian history captured in tangible form from an era long gone’.

Targeting cultural property is prohibited under customary international humanitarian law, not only by the Hague Convention. But the Convention sets out detailed regulations for protection of such property, and it has taken some states a lot of time to provide for these.

Although the UK was an original signatory to the 1954 Hague Convention, it did not ratify it until 2017, introducing into law the Cultural Property (Armed Conflicts) Act 2017, and setting up the Cultural Protection Fund to safeguard heritage of international importance threatened by conflict in countries across the Middle East and North Africa.

Ostensibly, the UK’s delay in ratifying the convention lay in concerns over the definition of key terms and adequate criminal sanctions, which were addressed in the Second Protocol in 1999. However, changing social attitudes towards the plunder of antiquities, and an alarming increase in the use of cultural destruction as a weapon of war by extremist groups to eliminate cultures that do not align with their own ideology, eventually compelled the UK to act.

In the US, it is notoriously difficult to get the necessary majority for the approval of any treaty in the Senate; for the Hague Convention, approval was achieved in 2008, following which the US ratified the Convention in 2009.

Destroying the buildings and monuments which form the common heritage of humanity is to wipe out the physical record of who we are. People are people within a place, and they draw meaning about who they are from their surroundings. Religious buildings, historical sites, works of art, monuments and historic artefacts all tell the story of who we are and how we got here. We have a responsibility to protect them.




o

Building LGBTIQ+ Inclusivity in the Armed Forces, 20 Years After the Ban Was Lifted

16 January 2020

Will Davies

Army Chief of General Staff Research Fellow, International Security Programme
Change was slow to come but progress has since been swift. Not only can a continuing focus on inclusivity benefit service people and the organization, it is also an essential element of a values-based foreign policy.

2020-01-16-Westminster.jpg

Crew members from HMS Westminster march through Admiralty Arch as they exercise their freedom of the city in August 2019 in London. Photo: Getty Images.

The new UK government will conduct a review of foreign, security and defence policy in 2020. If the UK decides to use values as a framework for foreign policy this needs to be reflected in its armed forces. One area where this is essential is continuing to deepen inclusivity for LGBTIQ+ personnel, building on the progress made since the ban on their service was lifted in 2000.

I witnessed the ban first-hand as a young officer in the British Army in 1998. As the duty officer I visited soldiers being held in the regimental detention cells to check all was well. One day a corporal, who I knew, was there awaiting discharge from the army having been convicted of being gay. On the one hand, here was service law in action, which was officially protecting the army’s operational effectiveness and an authority not to be questioned at my level. On the other, here was an excellent soldier in a state of turmoil and public humiliation. How extreme this seems now.

On 12 January 2000 Tony Blair’s Labour government announced an immediate lifting of the ban for lesbian, gay and bisexual personnel (LGB) and introduced a new code of conduct for personal relationships. (LGB is the term used by the armed forces to describe those personnel who had been banned prior to 2000.) This followed a landmark ruling in a case taken to the European Court of Human Rights in 1999 by four LGB ex-service personnel – supported by Stonewall – who had been dismissed from service for their sexuality.

Up to that point the Ministry of Defence's long-held position had been that LGB personnel had a negative impact on the morale and cohesion of a unit and damaged operational effectiveness. Service personnel were automatically dismissed if it was discovered they were LGB, even though homosexuality had been decriminalized in the UK by 1967.

Proof that the armed forces had been lagging behind the rest of society was confirmed by the positive response to the change among service personnel, despite a handful of vocal political and military leaders who foresaw negative impacts. The noteworthy service of LGBTIQ+ people in Iraq and Afghanistan only served to debunk any residual myths.

Twenty years on, considerable progress has been made and my memories from 1998 now seem alien. This is a story to celebrate – however in the quest for greater inclusivity there is always room for improvement.

Defence Minister Johnny Mercer last week apologized following recent calls from campaign group Liberty for a fuller apology. In December 2019, the Ministry of Defence announced it was putting in place a scheme to return medals stripped from veterans upon their discharge.

The armed forces today have a range of inclusivity measures to improve workplace culture including assessments of workplace climate and diversity networks supported by champions drawn from senior leadership.

But assessing the actual lived experience for LGBTIQ+ people is challenging due to its subjectivity. This has not been helped by low participation in the 2015 initiative to encourage people to declare confidentially their sexual orientation, designed to facilitate more focused and relevant policies. As of 1 October 2019, only 20.3 per cent of regular service people had declared a sexual orientation.

A measure of positive progress is the annual Stonewall Workplace Equality Index, the definitive benchmarking tool for employers to measure their progress on LGBTIQ+ inclusion in the workplace; 2015 marked the first year in which all three services were placed in the top 100 employers in the UK and in 2019 the Royal Navy, British Army and Royal Air Force were placed 15th=, 51st= and 68th respectively.

Nevertheless, LGBTIQ+ service people and those in other protected groups still face challenges. The 2019 Ministry of Defence review of inappropriate behaviour in the armed forces, the Wigston Report, concluded there is an unacceptable level of sexual harassment, bullying and discrimination. It found that 26-36% of LGBTIQ+ service people have experienced negative comments or conduct at work because of their sexual orientation.

The Secretary of State for Defence accepted the report’s 36 recommendations on culture, incident reporting, training and a more effective complaints system. Pivotal to successful implementation will be a coherent strategy driven by fully engaged leaders.

Society is also expecting ever higher standards, particularly in public bodies. The armed forces emphasise their values and standards, including ‘respect for others’, as defining organisational characteristics; individuals are expected to live by them. Only in a genuinely inclusive environment can an individual thrive and operate confidently within a team.

The armed forces also recognize as a priority the need to connect to and reflect society more closely in order to attract and retain talent from across all of society. The armed forces’ active participation in UK Pride is helping to break down barriers in this area.

In a post-Brexit world, the UK’s values, support for human rights and reputation for fairness are distinctive strengths that can have an impact on the world stage and offer a framework for future policy. The armed forces must continue to push and promote greater inclusivity in support. When operating overseas with less liberal regimes, this will be sensitive and require careful handling; however it will be an overt manifestation of a broader policy and a way to communicate strong and consistent values over time.

The armed forces were damagingly behind the times 20 years ago. But good progress has been made since. Inclusion initiatives must continue to be pushed to bring benefits to the individual and the organization as well as demonstrate a values-based foreign policy.




o

A World Without the NPT Redux

Invitation Only Research Event

10 February 2020 - 3:00pm to 4:30pm

Chatham House

Event participants

Dr Joseph Pilat, Los Alamos National Laboratory and Woodrow Wilson International Center for Scholars
Chair: Dr Patricia Lewis, Research Director, International Security Programme, Chatham House

In the late 1980s, with the 1995 decision on the future of the nuclear Non-Proliferation Treaty (NPT) looming, Joseph Pilat wrote an essay on "A World without the NPT?" which was published in The International Nuclear Non-Proliferation Regime in the 1990s, edited by John Simpson (Cambridge, England: Cambridge University Press, 1986). In this piece, the speaker attempted to think through the effects of a limited or no agreement on extension to the treaty and regime, to nuclear non-proliferation, arms control and energy and to the broader geopolitical landscape. The purpose was not a prediction, but a cautionary tale of the value of the treaty.

Now, nearly 25 years after indefinite extension and 50 years after the NPT's entry into force, the treaty and the regime are facing serious challenges. In this roundtable meeting, the speaker will revisit the questions he addressed thirty years ago.




o

The Commonwealth Cyber Declaration: Achievements and Way Forward

Invitation Only Research Event

4 February 2020 - 9:15am to 5:30pm

Chatham House, London

In April 2018, the Commonwealth Heads of Government Meeting (CHOGM), held in London, saw the creation and the adoption of the Commonwealth Cyber Declaration. The declaration outlines the framework for a concerted effort to advance cybersecurity practices to promote a safe and prosperous cyberspace for Commonwealth citizens, businesses and societies. 

The conference will aim to provide an overview on the progress made on cybersecurity in the Commonwealth since the declaration was announced in 2018. In addition, it will examine future challenges and potential solutions going forward.

This conference is part of the International Security Programme's project on Implementing the Commonwealth Cybersecurity Agenda and will convene a range of senior Commonwealth representatives as well as a selection of civil society and industry stakeholders. This project aims to develop a pan-Commonwealth platform to take the Commonwealth Cyber Declaration forward by means of a holistic, inclusive and representative approach.

Please see below meeting summaries from previous events on Cybersecurity in the Commonwealth:  

Attendance at this event is by invitation only. 

Esther Naylor

Research Assistant, International Security Programme
+44 (0)20 7314 3628




o

The Smart Peace Initiative: An Integrated and Adaptive Approach to Building Peace

Invitation Only Research Event

12 May 2020 - 10:00am to 11:30am
Add to Calendar

Smart Peace brings together global expertise in conflict analysis and research, peacebuilding and mediation programming, and behavioural science and evaluation. Together, Smart Peace partners are developing integrated and adaptive peace initiatives, working with local partners to prevent and resolve complex and intractable conflicts in Central African Republic, Myanmar and northern Nigeria.
 
This roundtable is an opportunity for Smart Peace partners to share the Smart Peace concept, approach and objectives, and experiences of the first phases of programme implementation. Roundtable discussions among participants from policy, practice and research communities will inform future priorities and planning for Smart Peace learning, advocacy and communication.
 
Smart Peace partners include Conciliation Resources, Behavioural Insights Team, The Centre for Humanitarian Dialogue, Chatham House, ETH Zurich, International Crisis Group and The Asia Foundation.

Nilza Amaral

Project Manager, International Security Programme




o

POSTPONED: Working Towards Cyber Resilience in the GCC: Opportunities and Challenges

Invitation Only Research Event

12 March 2020 - 9:00am to 5:00pm

Muscat, Oman

The GCC states have invested significantly in cybersecurity and have made large strides in protecting governments, businesses and individuals from cyber threats, with the aim of delivering on their ambitious national strategies and future visions. However, several challenges to cybersecurity and cyber resilience in the region persist, putting those ambitious plans at risk.

These challenges include the uneven nature of cybersecurity protections, the incomplete implementation of cybersecurity strategies and regulations, and the issues around international cooperation. Such challenges mean that GCC states need to focus on the more difficult task of cyber resilience, in addition to the simpler initial stages of cybersecurity capacity-building, to ensure they harness the true potential of digital technologies and mitigate associated threats.

Set against this background, this workshop will explore opportunities and challenges to cyber resilience in the GCC focusing on four main pillars:

1. Cyber resilience: in concept and in practice
2. Building an effective cybersecurity capacity
3. The potential of regional and international cooperation to cyber resilience
4. Deterrence and disruption: different approaches

This event will be held in collaboration with the Arab Regional Cybersecurity Centre (ARCC) and OMAN CERT.

PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE. 

Event attributes

Chatham House Rule

Esther Naylor

Research Assistant, International Security Programme
+44 (0)20 7314 3628