“Typically, they find a flaw, then notify the vendor. And at that point they get a cease and desist or threatening letter…” Last week, the Cybersecurity Advisors Network (CyAN)’s International VP Peter Coroneos spoke to The Register, a leading British technology news site, about the launch of our inclusive …
“At a time of unprecedented scale and seriousness of cyber attacks threatening our personal information, the continuity of our businesses and the systems and infrastructure that support our societies, we find the very people we rely on to protect us remain under threat.” On Tuesday, …
Yesterday, the Australian Financial Review, one of Australia’s most respected business-focused newspapers, covered the launch of the Cybersecurity Advisors Network (CyAN)’s inclusive global coalition to work towards securing internationally consistent legal immunities for bona fide zero day researchers.
CyAN member Edward Farrel is one such researcher who discussed his experience with the AFR of being silenced by legal threats after responsibly disclosing serious security flaws in Australia.
Edward is not alone in his experience, however. Bona fide zero day researchers face similar legal threats the world over for trying to improve the health of our digital environment.
If you or your organisation are willing to join our efforts, please contact us.
The Cybersecurity Advisors Network (CyAN) is joining 81 individual cybersecurity experts and organisations in signing the Global Encryption Coalition’s open letter against Belgium’s Data Retention Legislation. The Data Retention Legislation requires encrypted systems operators to allow law enforcement access to content from specific users upon …
The Cybersecurity Advisors Network (CyAN) is committed to making our digital environment safe from crime through cooperation and the rule of law. For this reason, CyAN is a signatory to the Multistakeholder Manifesto on the proposed UN Cybercrime Treaty led by the CyberPeace Institute and …
On September 9th 2021, CyAN hosted a webinar on how space infrastructure and satellites are vulnerable to cyberattack. CyAN International VP Peter Coroneos hosted the event and was joined by an extraordinary panel: Prof. Steven Freeland, international space law authority and Vice-Chair of a 5-year Working Group on the “exploration, exploitation and utilisation of space resources”; Edward Farrell, highly regarded cybersecurity expert and researcher, and Dr Samuli Haataja, legal academic and author of “Cyber Attacks and International Law on the Use of Force: The Turn to Information Ethics”.
You can watch the entire webinar here at:
Due to time constraints, not all audience questions could be answered. However, the panellists took the time afterwards to answer some of the webinar chat and email questions which we have provided below. The answers are unattributed as per the panellists’ request:
Q: To the panel- Bezos, Branson and Musk have all breached the atmosphere in the past few months. Is there danger in this activity, and what are the implications
A: More of a legal question, but on a personal note, I think this is awesome; we’re in a place to motivate and inspire others.
Q: I am curious as to how the Tallinn Manual 2.0 applies to Space Law and specifically to Australia?
A: Chapter 10 of the Tallinn manual already covers off on a chapter of space law. However, I would also add in the protection of the natural environment as a rule in the manual, noting the Kessler effect, as well as protection of objects indispensable to survival, which given the roles mentioned previously of technologies such as GPS and its role in logistics/human supply chains could mean that everything has to be considered protected in space. I am not a lawyer, but another issue that will come out is using civil technology for military purposes, and the contention that the technology is then a legitimate target for war IE use of iridium sat phones- does this make these a target?
Whilst the Tallinn Manual 2.0 does cover some aspects regarding space activities (and their interaction with cyber), it is intentionally not comprehensive. Moreover, whilst a useful starting point, there are many points where States appear to disagree with some of the assertions made in the Manual.
Q: On the topic of attribution of state-sponsored attacks, how do we call out specific countries for attacks in educational media?
A: The same strategy we have long applied; disclose, publish and point out fault.
Q: So Australia is legally on the hook if an Australian-owned satellite causes physical problems in space. Are we similarly on the hook if one of our satellites gets hacked, or if a hack on someone else’s satellite originated from inside Australia?
A: Space law liability covers in space collisions and damage on Earth / to aircraft caused by falling debris.
Like everything, it will depend on the circumstances. If, for example, the hacking leads to loss of control of a satellite resulting in a collision in space with someone else’s satellite, the space law liability regime provides for a ‘fault’ basis to determine who is liable and to what extent.
Q: Are micro-satellites more vulnerable?
A: I would say they’re no less vulnerable, but the open availability of their tech stacks through open sourcing means that weaknesses are readily identifiable; however, the disclosure process is also more achievable, which, over a prolonged period, will see a reduction in vulnerabilities.
Q: Does the battle for the arctic reflect the ownership disputes we can anticipate in the future for space?
A: The Arctic raises different legal issues than outer space – outer space is akin to a ‘global commons’ (though some do not like that expression) with no sovereign territorial claims possible, whereas rights to utilise the Arctic may, under the relevant Law of the Sea treaty regime, ultimately be at least in part dependent on claims based on a countries’ continental shelf reach.
Q:To the panel – if automated orbital weapons platforms eventuate, is there a chance that they could be ‘spoofed’ or fooled by false inputs by bad actors into incorrectly activating/firing? I’m thinking of a comparison to Tesla cars mistaking a very bright full moon as a yellow light and breaking on a highway incorrectly.
A: Perhaps less focus on orbital weapons and look at spaces current military applications with GPS- short answer yes and this question of targeting sensor systems is a wider issue with other mission systems. I’d encourage looking at Zoz Brooks’ work in this space, specifically relying on multiple sensors in the process of making a decision.
In any set of rules for any activity, bad actors may still attempt to act irresponsibly and it is impossible to stop that possibility entirely.
Q: Thank you all for such an interesting discussion. If I may, I would like to ask whether you see the most effective mitigations in security against threats to be created by commercial or government actors?
A: This is quite an expansive question- there is never a silver bullet in cyber security, and mitigation will be dependent on context, which is ever-changing.
We are very happy to announce that, for another year, CyAN will be a partner of the FIC. Many of our members will be attending with some of them hosting roundtables and happy to meet. Our member Sándor Fehér, who will speak at a roundtable on …
This year again, CyAN supports ICT Spring and it’s side event, the European Security Forum – a full day event gathering cybersecurity professionals to discuss the latest trends in a field that is evolving at a faster pace than ever, with the number of (sophisticated) cyberattacks …
L’Observatoire FIC* organise une visioconférence le mardi 22 juin 2021, de 8h30 à 10h00, sur le thème « Déchets électroniques et sécurité des données : un objectif commun ? ». Un événement animé par Jean-Christophe Le Toquin, président du Cybersecurity Advisors Network (CyAN).
Selon le Global E-waste Monitor 2020 de l’ONU publié en juillet 2020 et repris par l’Organisation Mondiale de la Santé dans son rapport Les enfants et les décharges numériques publié le 15 juin 2021, un record de 53,6 millions de tonnes métriques de déchets électroniques ont été générés dans le monde en 2019, soit une augmentation de 21 % en seulement cinq ans.
Les déchets électroniques constituent aujourd’hui un défi sanitaire et environnemental majeur, qui pousse les clients comme les investisseurs à accorder une importance toute particulière à la durabilité environnementale. Mais les déchets électroniques posent également un réel problème de sécurité des données. Il ne peut y avoir de réemploi et de prolongement de la durée de vie de ces équipements sans la garantie d’effacement sécurisé.
Quelles sont les tendances actuelles en matière de gestion des déchets électroniques, et quelles perspectives peut-on tracer pour les années à venir ? Comment les grands acteurs industriels traitent-ils cette problématique ?
Quelles sont les différentes pratiques et les politiques de destruction des matériels informatiques ? Ont-elles, et si oui comment, été affectées par la crise sanitaire actuelle ?
Comment éviter la destruction inutile d’équipements informatiques et comment favoriser leur réutilisation ?
Comment assurer la sécurité des données lors de la réutilisation ou de la revente d’équipements ?
Comment les politiques de responsabilité sociale des entreprises (RSE) intègrent la question de la destruction des matériels informatiques et les bonnes pratiques en matière de déchets électroniques (DEEE) ?
Au cours de cette session, Yves Gheeraert, Directeur Benelux, France et Europe du Sud chez Blancco, présentera les principales conclusions de leur nouvelle étude “La Vague Montante des Déchets Électroniques”.
Yves abordera les problèmes de sécurité des données liés à la réutilisation des équipements informatiques. Il partagera des conseils pour la mise en œuvre des pratiques informatiques durables au sein des organisations.
Il débattra de ces enjeux avec :
Laetitia Vasseur Directrice Générale et co-fondatrice HOP // Halte à l’Obsolescence Programmée
Le Cybersecurity Advisor Network (CyAN) et l’Observatoire FIC* organisent une visioconférence le jeudi 10 juin 2021, de 8h30 à 10h00, sur le thème « Chercheurs de zero-day, le temps de la réhabilitation ? ». Parmi les cyberattaques les plus impressionnantes qui ont été rendues possibles par l’exploitation de failles …