Private-Sector Cyberweapons: An Adequate Response to the Sovereignty Gap?
<p style="text-align:justify;">The cyber domain exhibits a sovereignty gap: the government cannot protect the private sector against all relevant threats. The challenge of cybersecurity, therefore, is essentially one of civil defense: how to equip the private sector to protect its ow...
Main Author: | |
---|---|
Other Authors: | |
Format: | Book |
Published: |
Brookings Institution Press
2018
|
_version_ | 1797082325957214208 |
---|---|
author | Kello, L |
author2 | Lin, H |
author_facet | Lin, H Kello, L |
author_sort | Kello, L |
collection | OXFORD |
description | <p style="text-align:justify;">The cyber domain exhibits a sovereignty gap: the government cannot protect the private sector against all relevant threats. The challenge of cybersecurity, therefore, is essentially one of civil defense: how to equip the private sector to protect its own computer systems in the absence of decisive government involvement. Ordinarily, civil defense has involved passive measures such as resilience and redundancy. These measures, however, will not redress the sovereignty gap unless they are complemented by a proactive approach – especially the techniques of “active defense,” which attempt to neutralize threats before they are carried out. Yet presently the authority to implement active defense belongs exclusively to the government. Top officials in the United States and other countries have called for changes in law and policy that would bolster private sector active defense, such the insertion of web beacons in hostile machines. This paper explores the possible strategic and other consequences of arming the civilian quarters of cyberspace with active defense capabilities. It argues that while the potential defensive and other benefits of private-sector arms are significant, the risks to defenders, innocent third parties, and international conflict stability are notably greater. Cyber civil defense should remain a reactive enterprise. </p> |
first_indexed | 2024-03-07T01:26:34Z |
format | Book |
id | oxford-uuid:922db543-757c-4d5a-9c3f-22bba0ce19c9 |
institution | University of Oxford |
last_indexed | 2024-03-07T01:26:34Z |
publishDate | 2018 |
publisher | Brookings Institution Press |
record_format | dspace |
spelling | oxford-uuid:922db543-757c-4d5a-9c3f-22bba0ce19c92022-03-26T23:23:40ZPrivate-Sector Cyberweapons: An Adequate Response to the Sovereignty Gap?Bookhttp://purl.org/coar/resource_type/c_1843uuid:922db543-757c-4d5a-9c3f-22bba0ce19c9Symplectic Elements at OxfordBrookings Institution Press2018Kello, LLin, HZegart, A<p style="text-align:justify;">The cyber domain exhibits a sovereignty gap: the government cannot protect the private sector against all relevant threats. The challenge of cybersecurity, therefore, is essentially one of civil defense: how to equip the private sector to protect its own computer systems in the absence of decisive government involvement. Ordinarily, civil defense has involved passive measures such as resilience and redundancy. These measures, however, will not redress the sovereignty gap unless they are complemented by a proactive approach – especially the techniques of “active defense,” which attempt to neutralize threats before they are carried out. Yet presently the authority to implement active defense belongs exclusively to the government. Top officials in the United States and other countries have called for changes in law and policy that would bolster private sector active defense, such the insertion of web beacons in hostile machines. This paper explores the possible strategic and other consequences of arming the civilian quarters of cyberspace with active defense capabilities. It argues that while the potential defensive and other benefits of private-sector arms are significant, the risks to defenders, innocent third parties, and international conflict stability are notably greater. Cyber civil defense should remain a reactive enterprise. </p> |
spellingShingle | Kello, L Private-Sector Cyberweapons: An Adequate Response to the Sovereignty Gap? |
title | Private-Sector Cyberweapons: An Adequate Response to the Sovereignty Gap? |
title_full | Private-Sector Cyberweapons: An Adequate Response to the Sovereignty Gap? |
title_fullStr | Private-Sector Cyberweapons: An Adequate Response to the Sovereignty Gap? |
title_full_unstemmed | Private-Sector Cyberweapons: An Adequate Response to the Sovereignty Gap? |
title_short | Private-Sector Cyberweapons: An Adequate Response to the Sovereignty Gap? |
title_sort | private sector cyberweapons an adequate response to the sovereignty gap |
work_keys_str_mv | AT kellol privatesectorcyberweaponsanadequateresponsetothesovereigntygap |