Governing Cyberspace during a Crisis in Trust

Centre for International Governance Innovation
26 Mar 201902:49

Summary

TLDR网络安全领域存在一个悖论:一方面我们推动财富创造和经济繁荣,另一方面我们通过连接一切到互联网中,构建了经济脆弱性。制定网络安全政策的难点在于其跨越经济、安全和国际稳定三大支柱。当前的治理结构滞后于技术发展,导致国家利用灰色地带进行侵略性网络行动,侵蚀了个人和国家层面的信任。为应对这一挑战,CIGI召集了企业高管、学者和政策制定者,展开重要的全球对话,旨在重建网络空间中的信任。

Takeaways

  • 🤔 网络安全存在悖论:一方面推动财富创造,另一方面却带来经济脆弱性。
  • 💻 网络安全政策制定的困难在于,它横跨经济、国家安全和国际稳定三个支柱。
  • 📜 联合国宪章虽然是网络空间治理的起点,但其诞生于1940年代,无法完全应对现代技术挑战。
  • ⚔️ 国家在网络空间中的行动处于灰色地带,既具有攻击性和对抗性,但不完全符合现代国际法的标准。
  • 🌍 由于全球规则的滞后,国家利用这一灰色地带采取激进的网络行动。
  • 😟 信任的消退发生在两方面:个体层面和国家层面。
  • 📰 由于频繁的网络安全事件,个体层面的技术信任感正在减弱。
  • 👁️ 国家层面的信任也在被侵蚀,主要体现在外国势力干涉选举和知识产权盗窃上。
  • 🤝 CIGI召集了一群专家,试图解决网络空间中的信任问题。
  • 🎯 CIGI采取了不同的方式,邀请了公司CEO、学者和政策制定者,希望开展有意义的国际对话,重建网络空间中的信任。

Q & A

  • 问题 1: 网络安全中的悖论是什么?

    -网络安全中的悖论在于,一方面我们推动财富创造和经济繁荣,另一方面我们通过将一切连接到互联网,建立了经济脆弱性。

  • 问题 2: 网络安全政策的制定为何困难?

    -网络安全政策的制定困难在于治理结构通常分为经济、安全和国际稳定三个方面,而网络安全跨越了这三者。

  • 问题 3: 联合国宪章如何影响网络空间的规则?

    -联合国宪章规定了国家之间使用武力或威胁使用武力的行为,但它是在1940年代制定的,面对当今的变革性技术显得过时。

  • 问题 4: 国家如何在网络空间中操作?

    -国家在网络空间中操作时处于一个“灰色地带”,这种行为虽然是侵略性的,但不一定符合传统国际法对国家行为的定义。

  • 问题 5: 为什么当前的治理结构被认为是过时的?

    -当前的治理结构被认为是过时的,因为它无法应对现代技术和国家在网络空间中采取的复杂且具有侵略性的行动。

  • 问题 6: 信任的衰退在个人层面表现如何?

    -在个人层面,信任的衰退表现为人们对技术的互动方式发生了变化,媒体中频繁报道的网络攻击事件让人们对技术产生不信任。

  • 问题 7: 国家层面的信任衰退是如何表现的?

    -在国家层面,信任衰退表现在外国对选举的干预、知识产权的盗窃等行为上,这些行为破坏了国际体系中的信任。

  • 问题 8: CIGI组织的专家组与其他智库有何不同?

    -CIGI的专家组与其他智库不同之处在于,他们邀请了实际在网络安全领域工作的企业CEO,以及学者和政策制定者,以推动国家和国际对话。

  • 问题 9: 现行全球规则的不足对网络安全有什么影响?

    -现行全球规则的不足导致了个人和国家层面的信任衰退,这给网络安全带来了重大挑战。

  • 问题 10: 为什么恢复对网络空间的信任至关重要?

    -恢复对网络空间的信任至关重要,因为信任的缺失会导致技术互动的减少,并削弱国家间的合作与安全。

Outlines

00:00

💻 网络安全的双重矛盾

网络安全存在一个矛盾:一方面我们致力于创造财富和经济繁荣,另一方面,我们通过将一切连接到互联网,建立了经济脆弱性。政策制定的难点在于,传统的治理结构通常从经济、国家安全和国际稳定三方面考虑,但网络安全横跨这三大支柱。

🌐 网络安全与国际法的脱节

讨论网络空间规则时,可以从《联合国宪章》入手,该宪章规定了国家间使用武力或威胁使用武力的行为。然而,宪章是20世纪40年代起草的,无法应对2019年及未来的变革性技术。国家在网络空间中处于灰色地带,采取激进行动,而现有的国际法律框架难以应对这些行为。

⚖️ 信任危机的双重层面

全球规则的落后导致了信任的削弱,分为两个层面:个人层面和国家层面。个人越来越不信任技术,尤其是面对像Facebook、Cambridge Analytica等数据泄露事件。国家层面则出现了选举干预和知识产权盗窃,侵蚀了对体系的信任,这对全球安全构成了重大威胁。

🤝 CIGI的应对举措

为了应对信任危机,CIGI召集了专家,包括公司CEO、学者和政策制定者,致力于展开关于网络空间信任的重要对话。他们希望通过这种多方参与的方式,找到重建网络空间信任的有效途径,推动国际和国家层面的讨论。

Mindmap

Keywords

💡网络安全悖论

网络安全悖论指的是在推动经济繁荣和财富创造的同时,由于将一切都连接到互联网,反而在经济体系中引入了脆弱性。这种矛盾的状态是视频的核心问题之一,体现了技术进步与安全风险的对立关系。

💡经济脆弱性

经济脆弱性是指由于网络互联带来的经济系统的易受攻击性。视频中提到,尽管网络带来了经济机会,但也让经济体系面临更大的风险,特别是在网络攻击和数据泄露的背景下。

💡治理结构

治理结构指的是国家在制定网络安全政策时,基于经济、国家安全和国际稳定三大支柱来管理网络空间。然而,网络安全涉及所有这些领域,使得传统的治理框架变得复杂而不适用。

💡联合国宪章

联合国宪章是管理国家间武力使用和威胁的国际法律框架。然而,由于其起草于1940年代,它在面对现代网络安全问题时显得过时和不充分。视频中提到,国家利用网络空间的灰色地带来实施攻击行为,而不触犯传统国际法。

💡灰色地带

灰色地带指的是网络空间中,国家间的行为处于传统国际法的模糊地带,不完全符合战争或和平的标准。国家可以在这种区域内采取对抗性但未被明确定义为战争的行为,使得网络攻击变得更加频繁和复杂。

💡信任侵蚀

信任侵蚀是指在网络空间中,个体和国家对技术和制度的信任逐渐下降。视频提到,个人由于隐私泄露、数据滥用事件(如Facebook和剑桥分析事件)而改变了对技术的信任,而国家层面则因选举干预和知识产权盗窃而失去对国际体系的信任。

💡国家间信任

国家间信任指的是各国在网络空间中的互动方式。由于网络攻击和知识产权盗窃等行为,国家间的信任正在下降。这种信任的削弱对全球安全稳定构成了严重威胁,也是视频中的一个关键问题。

💡混合战争

混合战争是指在网络空间中,国家采用既非和平也非战争的手段进行对抗。这种手段既可以是信息战,也可以是网络攻击,目标是通过非传统的方式打击对方。视频中提到,这类行为因为难以归类为战争行为而更加难以应对。

💡知识产权盗窃

知识产权盗窃是指通过网络手段非法获取他国的创新技术和商业机密。视频中提到,这种行为导致了国家层面对国际秩序的信任下降,同时对全球经济秩序造成了破坏。

💡个人隐私

个人隐私指的是个体在数字空间中的数据安全和信息控制权。随着越来越多的数据泄露和滥用事件发生,如剑桥分析事件,视频指出,个体对技术的信任正在减弱,这直接影响了人们与技术的互动方式。

Highlights

Cybersecurity creates a paradox: it drives wealth creation and economic opportunity, but also builds economic vulnerability by connecting everything to the internet.

Cybersecurity policy faces challenges due to its intersection with economics, national security, and international stability.

Cybersecurity issues now transcend traditional governance structures, running between economics, national security, and international stability pillars.

The UN Charter, drafted in the 1940s, governs the use of force between states, but it is outdated in the context of today's technology.

States operate in a 'hybrid zone' in cyberspace where their actions are aggressive and adversarial but do not meet traditional thresholds of international law.

There is a growing concern about how states use the grey areas in cyber governance to conduct aggressive cyber actions.

The global rules governing cyberspace are still in their infancy, leading to a waning of trust at both individual and state levels.

Individuals are losing trust in technology, as exemplified by scandals like Facebook and Cambridge Analytica, leading to changed behavior in how they interact with technology.

Trust at the state level is eroding as foreign adversaries meddle in elections and steal intellectual property, undermining trust in the system.

The erosion of trust in cyberspace is seen as one of the most dangerous developments.

CIGI convened a group of experts from companies, academia, and policy-making to address the trust issue in cyberspace.

The aim of CIGI’s initiative is to start a national and international conversation on building trust in cyberspace.

Bringing in CEOs of companies that operate daily in the cyber domain was a unique approach taken by CIGI to address cybersecurity challenges.

The inadequate and antiquated cyber governance structure has allowed aggressive cyber actions to flourish in the grey zone between legal thresholds.

CIGI hopes their efforts will lead to improved national and international cybersecurity policies and practices.

Transcripts

play00:04

There’s a paradox in cyber security.

play00:06

On the one hand we’re trying to drive wealth creation

play00:09

and economic opportunity and prosperity,

play00:12

on the other hand what we’re doing is building economic vulnerability

play00:15

into our model because we’re connecting everything that we can

play00:18

to the internet.

play00:19

The difficulty when it comes to making cyber security policy

play00:22

is that when we think about our governance structure,

play00:25

we usually do it in one of three ways.

play00:27

We look at economics on the one hand,

play00:29

we look at national security on the other hand

play00:31

and we look at international stability as a third and final pillar.

play00:36

The problem with that, of course,

play00:37

is now cyber security runs between all three of those pillars.

play00:40

So when I think about the rules that govern cyberspace,

play00:42

one of the starting points is actually the United Nations Charter.

play00:45

And that governs the use of force

play00:47

— or the threat of the use of force —

play00:48

between states.

play00:49

The problem, of course, is that the UN Charter was drafted in the 1940s.

play00:53

and we’re sitting here today in 2019

play00:56

dealing with transformative technology.

play00:58

So when you think about the way

play00:59

that states are operating in cyberspace

play01:01

the problem is they’re operating in this hybrid zone

play01:04

where it’s certainly aggressive, it’s certainly adversarial

play01:07

but it doesn’t necessarily meet the traditional thresholds

play01:10

that we see in modern international law

play01:14

as it relates to the conduct between states.

play01:16

So what we’re seeing is states being able to use that grey area

play01:20

to effectively undertake aggressive cyber action

play01:23

and cyber security knowing that the current governance structure

play01:26

is a little bit inadequate and antiquated.

play01:28

The fact that the global rules are still in their infancy

play01:31

has led to a waning of trust in two important respects:

play01:34

one at the individual level and the second at the state level.

play01:37

So with respect to individuals,

play01:39

it’s hard not to see individuals changing the way

play01:42

that they’re interacting with technology because

play01:44

you can’t pick up a newspaper without

play01:46

there being a story about the greatest exploit that just happened.

play01:48

Think of Facebook, think of Cambridge Analytica.

play01:51

So we’re starting to see an erosion of trust at the individual level,

play01:54

which is deeply problematic.

play01:56

But even more so

play01:57

we’re seeing an erosion of trust at the state level.

play01:59

We’re looking at foreign adversaries meddling in elections,

play02:01

we’re looking at people stealing intellectual property,

play02:03

which erodes trust in the system,

play02:05

and that is the most dangerous thing that we’re seeing.

play02:08

CIGI wanted to convene a group of experts

play02:10

to deal with this issue because of its importance

play02:12

and we took a bit of a different tack

play02:14

than most other think tanks.

play02:14

We brought in CEOs of companies

play02:17

that are actually working day to day in this space.

play02:19

We brought in academics and policy makers

play02:21

to convene what we’re hoping will be

play02:23

an important national and international conversation

play02:25

to be able to get trust in cyberspace right.

Rate This

5.0 / 5 (0 votes)

相关标签
网络安全经济脆弱性国际治理技术信任国家安全政策制定网络攻击个人隐私选举干扰全球规则