Rubrics » UNCOVERstory
Pandora’s Botnet
Cybersecurity is mentioned so often that it has become a cliché like climate change, with the other thing they have in common being a disagreement on what solutions are required, who is responsible for them and whether there is a responsibility in changing behaviour so as to minimize these risks. All of these difficult questions are left unanswered not just by the conceptual breadth and diversity of the issue at hand, but also by the ease with which dilettantes and people with agendas can spot facile solutions that obviate the need for difficult questions and answers. More
PrestiDigital GeoPolitics
We, humans, live and act in the old physical space, though spatiality will never be the same after digits became the atoms of some “virtual matter”, in which our bodies and souls e-immersed. Cyberspace, equated reasonably with the Internet, allows for larger and better markets and fortunes, as well as more and fierce dangers to our security and liberty, to our homes and homelands. More
The Grand (Binary) Chessboard: Security, Geopolitics and Geoeconomics in the Cyber-era
For each age that we think to define, there are words that describe the aspects or characteristics that are thought to define it best. The mid-twentieth century was known as the ‘Atomic Age’, when the results of research into nuclear physics were brought to the forefront with the detonation of nuclear bombs. Shortly thereafter, it was succeeded by the Space Age, with the drive to explore outer space and the competition between the world’s superpowers to develop technology to that end. Somewhere from the 1970s, the Information Age is believed to have begun, sprung by the Digital Revolution, with information technology playing an increasingly greater role in human affairs on an ever-growing number of levels: the economy, society, culture, language and politics. Thus, geographic distance became less and less relevant in defining human interaction, and physical contact was no longer an imperative for relations between people. More
Essentials of Military Cyber Security Strategies
There are considerable, even astonishing, differences between the old and new versions of Department of Defense (DoD) cyber strategies. There is a four-year period between the two strategies and the new version explicitly states that the United States may take offensive actions against its persistent adversaries in cyber space. In this article, the major changes in the new strategy are shared with the reader. Secondly, cyber-attacks against the assets of the US in a four-year period have been summarized. Probably, these persistent attacks may be the primary reason for the offensive nature of the new strategy. This article also shares the essentials of a military cyber security strategy, which are in parallel with the evolution of the DoD cyber strategy. More
Cyber Conflict and International Law
This article provides a brief overview of the international principles and standards applicable to cyber conflict. The main assumption is that globalization and technological development have changed the international order. These changes affect the nation states and principles and standards established to regulate their relations. The existing international law has limited applicability to regulate potential cyber conflict. Therefore, the International Community must take further steps to prevent these challenges. More
Cyber Diplomacy – Addressing the Gap in Strategic Cyber Policy
Although it is a new topic, cyber-diplomacy has already advanced in leaps and bounds worldwide in an attempt to define and to summarize the efforts constantly made to solve a new type of conflict, namely those taking place in cyberspace. The primary role of diplomacy is to generate common advantage through dialogue, thus the primary role of cyber diplomacy would be to generate advantage through dialogue on cyber security issues. More concrete, a simple assumption would be that cyber diplomacy uses diplomatic tools to solve the problems that emerge in cyberspace. Topics like internet governance, enforcement of law against cyber crime, response to malicious attacks arising in cyberspace, the protection of critical infrastructure, just to mention a few, are of utmost importance and require a dedicated agenda and concrete action. The last decade has seen emerging technologies impact national economic systems in virtual space. This has changed the diplomatic agenda, with cyber threats moving to the top and with many governments already acknowledging that ignoring cyber diplomacy is no longer an option for global dynamics. Both a confusion in terminology and a lack of common legislation when addressing the cyber diplomacy topic is observed, since beyond internet governance and cyber security, a range of topics, from military use of internet to economic growth, are also enclosed by cyber diplomacy. More
Terrorist Influence on Children in Cyberspace
Terrorist groups are using cyberspace to propagandize ideological, political and religious concepts, for mutual communication and organization of activities, for planning attacks in the real world and for financing. Social networks such as Facebook, Twitter, Instagram, Telegrams have contributed to radicalization and recruitment, primarily of children and young people who accept the principles of terrorists and join their ranks. Modern ways of communication have enabled terrorists to successfully increase membership and their ranks without direct, physical contact. More
Terrorism Has No Echo without the Media
Terrorism can be seen as an act of communication. In order to transform an attack into a message, the media’s dissemination capabilities are needed, being a vital pawn in the game the terrorists are playing. Sending the perfect message in the way the terrorist desire is much more important that the act itself. The challenge in the relationship stated is the conflict of interests between the media having to broadcast unbiased information about the event, the social responsibility they carry and the prospect of giving sensational news that may alter the reality in order to have a wider audience. More
What Is Blockchain?
During the age of the crusades, several knightly orders were formed out of international groups of feudal knights to protect pilgrims to the Holy Land. In the interludes between the various wars, the number of pilgrims would grow, seeking salvation and other personal benefits, such as the prestige of having performed the pilgrimage. The Templars were one of the groups approached by these medieval tourists and were asked for protection on the long road against robbers. The trend continued and there was a growing need for protection. Since the Templar Order had a limited number of members, they became overwhelmed and they came up with a solution. More
Building the Future, One Blockchain at a Time
The European Center for Excellence in Blockchain (ECEB) was founded in Bucharest in 2017 by the National Institute for Research and Development in Informatics (ICI), the Idea Factory Think Tank and Old Dominion University (Norfolk, Virginia, USA) as a as a promoter of the Blockchain issue and its link with the protection of Critical Infrastructures for state institutions and for the private sector (i.e. finance, energy, etc.), both nationally and internationally. It seeks to foster an understanding of blockchain issues on the part of decision makers and to encourage the development of key applications for use in governance, such as that of critical infrastructures. It will cooperate with both public authorities and private actors to facilitate a sustainable exploitation of blockchain potential. More
The European Construction. Intellectual Project vs. Emergence
Society is a component element of Popper’s third world, i.e., of the world formed by objectivizing the content of thoughts (ideas, theories, desirability, etc.), which is achieved mostly by social action. This means that the social “objects” (therefore the economic “objects” too) appear, become and disappear only by social action. One may say that the social ontology is, simply, the effect of the social praxeology, that society is a political product (supra-individual cause and effect). Therefore, the social construction is a teleological construction obtained by completing the universal causes (material, efficient, formal) with the final cause (purpose). Being a teleological construction, the social construction is an intellectual construction (intellectual project), therefore a normative process, not a natural process (as one of the parents of the European construction, Robert Schuman, believed). More
Do Not Miss the EU’s Ringing Bell!
Romania has to comply quite quickly with the documents produced and published by the European Commission with regard to the future of the European Union. As authors, we are advancing some proposals according to which Romanian policymakers should see the reformation of the EU as a good opportunity to match the country’s future with the EU’s destiny. We are advocating for immediate steps to be taken if Romania will effectively contribute to a more united Union with Romania in it. All European partners should consider seriously the principles of solidarity and cohesion and sharing responsibilities for a stronger Europe. The disrespect these stakeholders felt during the last crisis was echoing in the lack of political discipline in many economic and social engagements regarding the EU as a whole and every member state individually. Romania has to take the opportunity to be closer to the decision-making process within the EU, thinking seriously about becoming a member of the Eurozone by joining the Banking Union and adopting the euro. More