Skip to content
NUPI skole

Event

Naming and shaming of cyber intruders – does it work?

Last month Norwegian authorities made the rather unusual decision to call out - to attribute - Russia for being behind a cyber operation towards the Norwegian parliament. NUPI’s Cybersecurity Centre has the pleasure to invite to a webinar with Professor Madeline Carr. She will provide an overview of why attribution in cyberspace is difficult, the challenges of not being able to attribute - and different options on how to deal with this issue.
17 November 2020
14:00 Europe/Oslo
Language: English
Microsoft Teams
Seminar

Themes

  • Security policy
  • Cyber
  • Diplomacy
  • Foreign policy
  • Europe
  • Russia and Eurasia
  • The Nordic countries
  • English
  • Seminar
  • Physical and digital

The growing importance of cybersecurity and the handling of the attribution of cyberoperations have led to increased action from national authorities all over the world. The cyberoperations toward the Norwegian Parliament 24 August this year and the public attribution from the Norwegian Authorities can serve as an example for its relevance, as it’s the first time Norway has gone public with a clear attribution.

The attribution of cyber operations raises several questions. At this webinar, Professor Madeline Carr will provide an overview of why attribution is difficult, the challenges of not being able to attribute - and different options on how to deal with this issue.

Moderator is Karsten Friis, head of NUPI’s Research group on security and defence.

Want to know more about NUPI's research on cyber security? Click here to visit NUPI's Centre for Cyber Security Studies.

Speaker

Madeline Carr
Professor of Global Politics and Cybersecurity, UCL

Related publications

Publications
Publications
Report

Intergovernmental checkmate on cyber? Processes on cyberspace in the United Nations

Cyberspace is an increasingly controversial field on the international agenda. Despite the fact that processes on the thematic have been going on in the UN since 1998, a more significant international agreement is needed on what basic principles should apply in cyberspace. Small states have the opportunity of pushing cybersecurity as a thematic priority in the United Nations Security Council – a path Norway could pursue in its forthcoming 2021–2022 Security Council term. The attribution of the assumed Russian cyber operations toward the Norwegian parliament earlier this year actualizes the addressing of the issue in the Council. The policy brief discusses the GGE negotiations on cyberspace in 2015 and 2017 - and gives policy recommendations on the way forward.

  • Cyber
  • Foreign policy
  • United Nations
  • Cyber
  • Foreign policy
  • United Nations
Publications
Publications
Scientific article

Offensive cyberoperasjoner: Den nye normalen?

Can states retaliate if they get digitally attacked in peace-time? What are states doing and what does international law say about this? What are the potential security implications of an eventual increase in the use of offensive cyber operations?

  • Defence
  • Security policy
  • Cyber
  • Intelligence
  • Defence
  • Security policy
  • Cyber
  • Intelligence
Publications
Publications
Report

The Politics of Stability: Cement and Change in Cyber Affairs

In November 2018, the Global Commission on the Stability of Cyberspace, inaugurated one year earlier ‘to develop proposals for norms and policies to enhance international security and stability and guide responsible state and non-state behavior in cyberspace’, launched six norms pointing ‘the way to new opportunities for increasing the stability of cyberspace’. However, the Commission has not examined or explained the very concept it was established to explore. Quite the contrary, the Commission argues that its proposed norms will be used to define what cyber stability actually is. Focusing on the interrelationship between international peace and stability, and ways of achieving both in the context of ICTs, the authors will offer a model of stability of cyberspace. They begin by examining the concepts of ‘stability’ and ‘strategic stability’ as understood with regard to international security. This conceptual analysis is followed by a presentation of the political claims of stability expressed in national and international cyber-and information-security discourses. Drawing on the conceptual approaches and the political claims, the report then model the stability of cyberspace in three interlinked and reinforcing dimensions: 1) equal and inclusive international relations; 2) prevention of war: the minimal peace, with emphasis on averting a devastating nuclear war between the superpowers; and 3) the functionality of global and national technical systems and services. After discussing how international law, preventive diplomacy, confidence-building measures, and norms of responsible state behaviour can support cyberspace stability, this report concludes with recommendations for action aimed at helping to create and maintain a stable - resilient and adaptive - cyberspace.

  • Security policy
  • Cyber
  • Conflict
  • International organizations
  • United Nations
  • Security policy
  • Cyber
  • Conflict
  • International organizations
  • United Nations
Publications
Publications
Book

Conflict in Cyber Space: Theoretical, strategic and legal perspectives

Adopting a multidisciplinary perspective, this book explores the key challenges associated with the proliferation of cyber capabilities. Over the past two decades, a new man-made domain of conflict has materialized. Alongside armed conflict in the domains of land, sea, air, and space, hostilities between different types of political actors are now taking place in cyberspace. This volume addresses the challenges posed by cyberspace hostility from theoretical, political, strategic and legal perspectives. In doing so, and in contrast to current literature, cyber-security is analysed through a multidimensional lens, as opposed to being treated solely as a military or criminal issues, for example. The individual chapters map out the different scholarly and political positions associated with various key aspects of cyber conflict and seek to answer the following questions: do existing theories provide sufficient answers to the current challenges posed by conflict in cyberspace, and, if not, could alternative approaches be developed?; how do states and non-state actors make use of cyber-weapons when pursuing strategic and political aims?; and, how does the advent of conflict in cyberspace challenge our established legal framework? By asking important strategic questions on the theoretical, strategic, ethical and legal implications and challenges of the proliferation of cyber warfare capabilities, the book seeks to stimulate research into an area that has hitherto been neglected. This book will be of much interest to students of cyber-conflict and cyber-warfare, war and conflict studies, international relations, and security studies.

  • Defence
  • Security policy
  • Cyber
  • Conflict
  • Defence
  • Security policy
  • Cyber
  • Conflict

Related projects

Research project
2019 (Completed)

Protecting Democracies from Digital Threats (PRODEM)

How are states responding to the threat of using digital technologies to subvert democratic processes?...

  • Defence
  • Security policy
  • Cyber
  • Conflict
  • Defence
  • Security policy
  • Cyber
  • Conflict
Research project
2019 - 2022 (Completed)

Digital sovereignty and autonomy (GAIA)

NUPI in collaboration with Simula Research Lab will map global data flows and their impact on national autonomy and sovereignty....

  • Security policy
  • Cyber
  • Diplomacy
  • Governance
  • International organizations
  • Security policy
  • Cyber
  • Diplomacy
  • Governance
  • International organizations
Research project
2018 - 2019 (Completed)

Critical Digital Infrastructures (KRIDI)

Protecting critical infrastructures from digital threats is a key challenge for modern states, how should the state approach and make sense of the security of privately owned infrastructures?...

  • Security policy
  • Cyber
  • Conflict
  • Security policy
  • Cyber
  • Conflict
The Troll Oil Plattform in the North Sea
Research Project
2017 - 2018 (Completed)

Digital Attacks against the Norwegian Petroleum Sector (DISP)

This project is mapping the threats and the historical usage of digital weapons against critical infrastructures, as well as examining the problems arising from unclear responsibilities in responding ...

  • Security policy
  • Cyber
  • Foreign policy
  • Europe
  • Energy
  • The EU
  • Security policy
  • Cyber
  • Foreign policy
  • Europe
  • Energy
  • The EU
17 November 2020
14:00 Europe/Oslo
Language: English
Microsoft Teams
Seminar

Themes

  • Security policy
  • Cyber
  • Diplomacy
  • Foreign policy
  • Europe
  • Russia and Eurasia
  • The Nordic countries
  • English
  • Seminar
  • Physical and digital