Blog

March 15th, 2013 // Realism Endures: Why States Seek Digital Arms and Will Continue to Do So – by John B. Sheldon

Why is there an emerging market in so-called ‘digital arms’? More particularly, where is the demand for digital arms coming from? Just as James Lewis, writing elsewhere in this forum, asks what it is that regulation of the digital arms … Continue reading

March 14th, 2013 // Cyber Stewards Join the Dialogue

At the Citizen Lab and Canada Centre for Global Security Studies, we believe that it is essential that the process of cyber securitization taking place in the South includes local voices, who can articulate a vision of cyber security in … Continue reading

March 13th, 2013 // You Only Click Twice: FinFisher’s Global Proliferation – by Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri, and John Scott-Railton

This research brief, authored by Morgan Marquis-Boire, Security Researcher with the Citizen Lab, Bill Marczak, Claudio Guarnieri, and John Scott-Railton, Research Fellow with the Citizen Lab, describes the results of a comprehensive global Internet scan for the command and control … Continue reading

March 13th, 2013 // Governance for a Domain Constructed – by Chris Bronk

“Politicians should read science fiction, not westerns or detective stories.” Arthur C. Clarke As cyber issues become a more significant element of geopolitics, they attract more attention from policymakers. Today, those in positions of economic and political leadership are concerned … Continue reading

March 13th, 2013 // Facing the Costs of an Open Internet – by Karl Kathuria

The future of openness on the Internet is currently the subject of wide debate. Having started with engineers defining standards through informal mechanisms, it has grown through a multi-stakeholder approach, taking in the private sector, public sector, informal and formal … Continue reading

March 13th, 2013 // Democratic State Surveillance, Transparency and Trust – by Andrew Clement

Those of us who believe that democratic governments have a central role to play in multi-stakeholder cyberspace governance have received in the past few weeks a bracing reminder of both the hazards of this ideal in practice and the importance … Continue reading

March 9th, 2013 // Against Hypocrisy: Updating Export Controls for the Digital Age – by Danielle Kehl and Tim Maurer

The revolutions in the Arab world showcased the catalytic role that information technology can play in political movements. As each regime toppled, leaders in other countries increasingly focused on how to prevent similar uprisings within their borders, ramping up the … Continue reading

March 5th, 2013 // Watching the Watchers: A Role for the ITU in the Internet Age – by Jonathon W. Penney

The Internet appears headed on a collision course with international regulatory institutions like the International Telecommunications Union, but might an impact be avoided? Put another way, what role might such international institutions play that promotes a free and open Internet? … Continue reading

March 4th, 2013 // WCIT-12: The Shadow at Evening Rising – by Alexander Klimburg

If it can be said that most international conferences occur in their own little world, the World Conference of International Telecommunications (WCIT-12) happened in another dimension. For outside observers the WCIT-12 goings-on (as well as out-comings) sometimes seemed to border … Continue reading

March 1st, 2013 // Hacking Back, Signaling, and State-Society Relations – by Adam Segal

Over the last year, in the wake of continuous revelations of cyber attacks on companies, the media, think tanks, and civil society groups, there has been an increasingly, vocal debate over whether private actors should be allowed to engage in … Continue reading