Presentation is loading. Please wait.

Presentation is loading. Please wait.

“Securitizing” the Internet – A Socio-Political Analysis Oxford Internet Institute Summer Doctorate Program July 2004 Nimrod Kozlovski

Similar presentations


Presentation on theme: "“Securitizing” the Internet – A Socio-Political Analysis Oxford Internet Institute Summer Doctorate Program July 2004 Nimrod Kozlovski"— Presentation transcript:

1 “Securitizing” the Internet – A Socio-Political Analysis Oxford Internet Institute Summer Doctorate Program July 2004 Nimrod Kozlovski nimrod@yale.edu Post-Doc Associate, Yale CS Department, PORTIA Project

2 “Securitizing” the Internet – A Socio- Political Analysis The internet model of communication The political economy of Information - the Internet model – type of discoursetype of discourse Security on the Internet (TCP/IP-based network) Survivability and take-over resistance – through redundancy and distributed system (Lack of) security with TCP/IP Integrity Confidentiality Availability (information availability vs. node/ server availability) Brief Background introduction

3 … Attacks on the Internet Layers of attack – physical, logical, semantic Targets – integrity, confidentiality, availability Methods of attack – Intrusion – Hacking, Defacement, Spoofing, Malicious code Disruption – Dos, DDos, Hijacking, Rerouting

4 … Security responses Technological Social/ Business Legal CyberCrime Law – towards securitization of the internet Cybercrime 1.0 – criminal legislation adaptation Cybercrime 2.0 – procedural and evidentiary Cybercrime 3.0 - the current battlefield Negotiating the security theory Policy choices for a communication medium

5 Negotiating the security theory Security through obscurity/ confidentiality vs. Security through openness e.g. Code openness – choice in IP regimes (copyright vs. patent); reverse engineering regulation e.g. Vulnerabilities reporting requirements End to End design vs. In- network control Security by diversity vs. Security by homogeneity Peer security vs. Owners’ control e.g. port scanning; trespass Zero Tolerance vs. Failures management False positive/ False negative calibration

6 Security-informed policy choices for the emerging virtual world Notions of space vs. Notions of flow (of information) Identity playfulness vs. Controlling identity Routing policy – Open road vs. Property rules Downstream liability vs. No-liability (virtual pollution laws) Enforcement – Public vs. Self help Service providers’ role – Liability vs. Immunity {Fair information practices vs. Contractual freedom}

7 Policy choices – the trends Security-informed policy choices for the emerging virtual world – the trends Notions of space vs. Notions of flow (of information) Identity playfulness vs. Controlling identity e.g. Spoofing, names duplication Routing policy – Open road vs. Property rules Downstream liability vs. No-liability (virtual pollution laws) Enforcement – Public vs. Self help (corporate – ISP, IP owner, conditional) Service providers’ role – Liability vs. Immunity (vis-à-vis user, but regulated) {Fair information practices vs. Contractual freedom}

8 Political economy in CyberCrime 3.0 Discussion – Cybercrime 3.0 – implications on the political economy of information – rethinking discourse dynamics and power Who controls the design of the communication process? What uses are possible? What and who decides whether new applications and services will be available? Who can shut off the conversation? Control the flow? Channel traffic? Favor speakers? How is the topology of the social network determined? (emergence or structured) What determines how the user can be presented in a conversation? Who defines who you are in a conversation?

9 Further socio-political dimensions of securitization implications Innovation – what innovation enabled/ limited? Cultural exploration Social organization Political mobilization

10 Towards normative security discourse Discussion – From security to securitization (See: Helen Nissenbaum) Security policy as a political discourse Revealing the biases in security policy Understanding the dynamics of regulation Political economy analysis as normative guidelines to securitization

11 Background slides to follow

12 The Internet Model for Communication and Information Network Internet Model Network Open network Decentralized Parity among users Interactive Neutral among applications Anonymous Linked Easy and cheap to use Lack central control (and central failure point) Inter-connected (to other systems, networks)

13 The discourse in an Internet Model Network Vivid, robust and unmediated public discourse from diverse and antagonistic sources The Individual controls the type, mode and scope of communication/ interaction From consumers (of information) to producers and distributors of information Dynamic and modular modes of communication to accommodate needs-tailored-communication Emerging design of the network (social, technological, information linkage)


Download ppt "“Securitizing” the Internet – A Socio-Political Analysis Oxford Internet Institute Summer Doctorate Program July 2004 Nimrod Kozlovski"

Similar presentations


Ads by Google