Small anniversary: Link post #25. By the way, do you find these useful?
On cyber attacks, I would like to recommend three pieces that might not be for everyone, but are interesting to get a more technical understanding of what is going:
- Ralph Langner has written a fascinating account of “Stuxnet”. It turns out that the U.S./Israeli (?) attack on Iranian nuclear centrifuges consisted not of one, but two separate types of computer virus, with trade-offs between effectiveness, predictability and stealth. The newer version used a less sophisticated way to damage centrifuges, but a much more sophisticated way to gain access in the first place and then spread across systems.
- Nicholas Weaver summarizes the steps taken by U.S. intelligence agencies to access/hijack communications through the Internet’s backbone. This discussion of the NSA QUANTUM program is not too technical, but introduces a couple of phrases you might hear more often in the future. (via Bruce Schneier)
- Jim Cowie discusses a different form of attack, in which internet traffic is redirected to get access to sensitive information. Fascinating for laypeople: Since we’re talking about milliseconds, “[t]he recipient, perhaps sitting at home in a pleasant Virginia suburb drinking his morning coffee, has no idea that someone in Minsk has the ability to watch him surf the web”. (But keep in mind that this comes form a private IT security company and is phrased to maximize PR effects.)
Two items on free trade negotiations:
First, Philip Murphy, the former U.S. Ambassador to Germany, is very confident that President Obama will manage to get approval from Congress for the Transatlantic Trade and Investment Partnership TTIP (via AICGS / Tobias Bunde).
Second, regarding the other U.S. free trade effort currently under negotiation – the Trans-Pacific Partnership TPP – you’ve probably heard that the part dealing with intellectual property rights was leaked last week. GWU PhD candidate Gabriel J. Michael has analyzed the way in which different countries proposed changes to the document (which is visible in the leaked text) and offers the following summary:
- The U.S. and Japan are relatively isolated in their negotiating positions.
- There appears to be a strong negotiating network between Singapore, Chile, Malaysia and New Zealand.
- Canada is up to something!
Some commentators pointed out that he might be neglecting an alternative explanation: that the U.S. and Japan are simply happy with the current document, as they have had a bigger say in creating the draft.
Irrespective of the arguments about causality, Michael’s blog post is a great example of what can be done with leaked documents and visualization! (via The Monkey Cage, where you can find more comments).
Finally, a quick follow-up on last week’s post on combat drones, again by Charli Carpenter at the Duck:
The Campaign to Stop Killer Robots secured an important victory last week when delegates of States Parties to the Convention on Certain Conventional Weapons (CCW) voted unanimously to take up the issue (…).
While this is an important and promising moment, the shape and trajectory of norm-building efforts will depend a great deal on the tenor and outcome of next May’s CCW meeting. And one thing is sure: if that meeting results in weaker norms that hoped for my human security advocates, NGOs may simply take their cause elsewhere.
2 thoughts on “Links: Cyber Attacks, Trade Negotiations, Combat Drones”
So what is Canada up to?
Seems kinda boring: “From what I’ve heard from others, Canada’s large overall number of proposals may be due to its being a latecomer in the negotiations.”