I joined the Transatlantic Cybersecurity Partnership

I joined the Transatlantic Cybersecurity Partnership facilitated by the American Institute for Contemporary German Studies and the Hanns-Seidel Foundation. The project description reads as follows

In the context of three meetings in Munich, Berlin, and Washington, DC, the working group of 10 American and 10 German policymakers will be discussing policies to address threats posed by cyber war and digital propaganda. These include digital propaganda affecting the democratic process during elections, and daily cyber security attacks that target government, military, and public service providers’ critical infrastructure. In addition, the national and international legal grey zone for many aspects of cybersecurity makes agreement between policymakers of both countries on cybersecurity norms critical. Cooperation between the private sector and government entities on best practices for ensuring cybersecurity is equally vital as tech firms have the cutting-edge ability to prevent and warn of cyberattacks.

The members of the working group are developing policy recommendations, which will be published and made available for both German and American policymakers as well as the general public. The Transatlantic Cybersecurity Partnership aims to:

  • improve information-sharing between the two countries on key cyber threats;
  • increase understanding between the private sector and government entities on best practices for ensuring cybersecurity;
  • expand the research on solutions to cybersecurity threats; and to
  • move the legislative and policy conversation in both countries to ensure budgets, standards, infrastructure, early warning, and risk management systems are in place to protect national and international security.
Advertisements
Posted in Uncategorized

Publikation – Going Dark? Dilemma zwischen sicherer, privater Kommunikation und den Sicherheitsinteressen von Staaten

Posted in publication, Uncategorized | Tagged ,

SWP Working Paper: Digitale Gegenangriffe. Eine Analyse der technischen und politischen Implikationen von „hack backs“

Posted in SWP | Tagged ,

Encryption under Threat / Verschlüsselung in Gefahr

Posted in SWP | Tagged

Von Wannacry zu Petya: Die neue Normalität von Cyber-Vorfällen

Posted in SWP | Tagged ,

Tappen im Dunkeln? Staatlicher Zugriff auf verschlüsselte Kommunikation

Die deutschen Innenminister möchten Schwachstellen in Software verstärkt zur Überwachung nutzen. Angesichts der immensen Verwundbarkeit der globalen IT-Welt sollte Deutschland stattdessen eine Vorreiterrolle bei der Schließung von Sicherheitslücken übernehmen. Link

Posted in SWP, Uncategorized | Tagged ,

New Publication: Clipper Meets Apple vs. FBI—A Comparison of the Cryptography Discourses from 1993 and 2016

This article analyzes two cryptography discourses dealing with the question of whether governments should be able to monitor secure and encrypted communication, for example via security vulnerabilities in cryptographic systems. The Clipper chip debate of 1993 and the FBI vs. Apple case of 2016 are analyzed to infer whether these discourses show similarities in their arguments and to draw lessons from them. The study is based on the securitization framework and analyzes the social construction of security threats in political discourses. The findings are that the arguments made by the proponents of exceptional access show major continuities between the two cases. In contrast, the arguments of the critics are more diverse. The critical arguments for stronger encryption remain highly relevant, especially in the context of the Snowden revelations. The article concludes that we need to adopt a more general cyber security perspective, considering the threat of cyber crime and state hacking, when debating whether the government should be able to weaken encryption.

Download for free

Citation: Schulze, M. (2017). Clipper Meets Apple vs. FBI—A Comparison of the Cryptography Discourses from 1993 and 2016. Media and Communication, 5(1).

Posted in publication | Tagged , , , , ,