United Nations Digital Blue Helmets as a Starting Point for Cyber Peacekeeping

11/13/2017
by   Nikolay Akatyev, et al.
0

Prior works, such as the Tallinn manual on the international law applicable to cyber warfare, focus on the circumstances of cyber warfare. Many organizations are considering how to conduct cyber warfare, but few have discussed methods to reduce, or even prevent, cyber conflict. A recent series of publications started developing the framework of Cyber Peacekeeping (CPK) and its legal requirements. These works assessed the current state of organizations such as ITU IMPACT, NATO CCDCOE and Shanghai Cooperation Organization, and found that they did not satisfy requirements to effectively host CPK activities. An assessment of organizations currently working in the areas related to CPK found that the United Nations (UN) has mandates and organizational structures that appear to somewhat overlap the needs of CPK. However, the UN's current approach to Peacekeeping cannot be directly mapped to cyberspace. In this research we analyze the development of traditional Peacekeeping in the United Nations, and current initiatives in cyberspace. Specifically, we will compare the proposed CPK framework with the recent initiative of the United Nations named the 'Digital Blue Helmets' as well as with other projects in the UN which helps to predict and mitigate conflicts. Our goal is to find practical recommendations for the implementation of the CPK framework in the United Nations, and to examine how responsibilities defined in the CPK framework overlap with those of the 'Digital Blue Helmets' and the Global Pulse program.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/10/2023

Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies

Cyber ranges mimic real-world cyber environments and are in high demand....
research
07/29/2018

The Second Amendment and Cyber Weapons - The Constitutional Relevance of Digital Gun Rights

In the future, the United States government can seek to limit the owners...
research
07/08/2021

Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance

Spending on cybersecurity products and services is expected to top 123 b...
research
08/28/2023

Turnkey Technology: A Powerful Tool for Cyber Warfare

Turnkey technology has emerged as a game-changing tool in cyber warfare,...
research
03/08/2021

Socio-Technical Root Cause Analysis of Cyber-enabled Theft of the U.S. Intellectual Property – The Case of APT41

Increased connectivity has made us all more vulnerable. Cyberspace, besi...
research
12/31/2018

Developing Cyber Buffer Zones

The United Nations conducts peace operations around the world, aiming to...
research
09/22/2020

Football and externalities: Using mathematical modelling to predict the changing fortunes of Newcastle United

The Public Investment Fund (PIF), is Saudi Arabia's sovereign wealth fun...

Please sign up or login with your details

Forgot password? Click here to reset