[LINK] Formulating National Security in Cyberspace

Tom Worthington tom.worthington at tomw.net.au
Fri Nov 8 13:32:07 AEDT 2013


Greetings from the Australian National University in Canberra, where an 
international research project on "Political Ecology in Cyberspace" is 
being launched.  This research uses techniques of complex systems and 
natural ecology. The researchers are asking for input from the community 
and will reach out via blogs and other on-line forms.

Professor Paul Cornish from University of Exeter UK, argued that 
cyberspace should be treated as a strategic space. Professor Roger 
Bradbury,  National Security College at ANU expressed concern about the 
Internet being balkanized with countries such s China separating their 
national systems from the global network.

One of the audience members commented that the Internet was built by 
engineers and and that might cause an impediment to security. I found 
this discussion of balkanization and engineers acting without reference 
to the public interest troubling. The term "internet" refers to a 
"Network of Networks", with "The Internet" as the global example of 
this. Those designing the Internet did not so in isolation from issues 
of governance, that was key to the system.

I suggest researchers need to first look at how the Internet was created 
and is now governed. Professor Fred Cate , Director of the Center for 
Applied Cybersecurity Research at Indiana University, pointed out that 
most of the Internet is run by non-government organizations. He argued 
that the law and governance was lagging actual use of the Internet. 
However, this is not my experience.

When advocating the use of the Internet in Australia in the 1990s, 
myself and others considered the governance and legal implications. In 
my day job I had to devise policies for the use of the Internet and the 
world Wide web by the Department of Defence. This turned out to be 
relativity easy, identifying existing polices, laws and guidelines and 
interpreting these where necessary. The general assumption which many 
people in government and academia made, that public utilities are 
administered primarily by government turned out not to be true. In 
practice, most public services are provided by non-government entities 
following guidelines and standards written by non-government bodies. 
This approach-was extended to the Internet and proved resilient.

Governments and researchers who want to impose top-down government 
control of the Internet in order to protect democracy are missing the point.

More at: 
http://blog.highereducationwhisperer.com/2013/11/formulating-national-security-in.html


-- 
Tom Worthington FACS CP, TomW Communications Pty Ltd. t: 0419496150
The Higher Education Whisperer http://blog.highereducationwhisperer.com/
PO Box 13, Belconnen ACT 2617, Australia  http://www.tomw.net.au
Liability limited by a scheme approved under Professional Standards
Legislation

Adjunct Senior Lecturer, Research School of Computer Science,
Australian National University http://cs.anu.edu.au/courses/COMP7310/



More information about the Link mailing list