United Nations Digital Blue Helmets as a Starting Point for Cyber Peacekeeping

by   Nikolay Akatyev, et al.

Prior works, such as the Tallinn manual on the international law applicable to cyber warfare, focus on the circumstances of cyber warfare. Many organizations are considering how to conduct cyber warfare, but few have discussed methods to reduce, or even prevent, cyber conflict. A recent series of publications started developing the framework of Cyber Peacekeeping (CPK) and its legal requirements. These works assessed the current state of organizations such as ITU IMPACT, NATO CCDCOE and Shanghai Cooperation Organization, and found that they did not satisfy requirements to effectively host CPK activities. An assessment of organizations currently working in the areas related to CPK found that the United Nations (UN) has mandates and organizational structures that appear to somewhat overlap the needs of CPK. However, the UN's current approach to Peacekeeping cannot be directly mapped to cyberspace. In this research we analyze the development of traditional Peacekeeping in the United Nations, and current initiatives in cyberspace. Specifically, we will compare the proposed CPK framework with the recent initiative of the United Nations named the 'Digital Blue Helmets' as well as with other projects in the UN which helps to predict and mitigate conflicts. Our goal is to find practical recommendations for the implementation of the CPK framework in the United Nations, and to examine how responsibilities defined in the CPK framework overlap with those of the 'Digital Blue Helmets' and the Global Pulse program.



There are no comments yet.


page 1

page 2

page 3

page 4


The Second Amendment and Cyber Weapons - The Constitutional Relevance of Digital Gun Rights

In the future, the United States government can seek to limit the owners...

Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance

Spending on cybersecurity products and services is expected to top 123 b...

Developing Cyber Buffer Zones

The United Nations conducts peace operations around the world, aiming to...

Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations

The number of cyber attacks has increased tremendously in the last few y...

Socio-Technical Root Cause Analysis of Cyber-enabled Theft of the U.S. Intellectual Property – The Case of APT41

Increased connectivity has made us all more vulnerable. Cyberspace, besi...

An Introduction to Cyber Peacekeeping

Peacekeeping is a noble and essential activity, helping to bring peace t...

Football and externalities: Using mathematical modelling to predict the changing fortunes of Newcastle United

The Public Investment Fund (PIF), is Saudi Arabia's sovereign wealth fun...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.