'The Jerusalem Post recently interviewed Col. Sharon Afek, formerly deputy head of the IDF's legal division, who wrote a 149-page treatise on cyber warfare law - the first treatise of that comprehensiveness by a military lawyer of his rank and stature.' http://www.jpost.com/Defense/Analysis-How-Israel-is-dealing-with-cyber-warfa... 'Many are also asking more strongly than ever: "Is international law still relevant?" Afek, who views his treatise also as a "bridge" between the pre- and post-cyber world of war, answers with a resounding "yes," but then goes further to try to resolve some of the questions of how and where it applies. One debate in the new wild west of cyberwarfare law is between two schools of thought about where to draw the line of which cyber operations should be declared illegal under international law.' http://www.jpost.com/Features/Front-Lines/A-revolution-in-war-339962 -- Cari Machet NYC 646-436-7795 carimachet@gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet <https://twitter.com/carimachet> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited.
One debate in the new wild west of cyberwarfare law is between two schools of thought about where to draw the line of which cyber operations should be declared illegal under international law.'
Keep in mind the US thinks it's both legal and good to fly drones around the world killing people remotely. It's that remote aspect that seems to draw in the weak minded, cyber or otherwise. Kind of hard to get it twisted like that when you're face to face in person.
A few comments regarding both articles. There is nothing that is new in either pieces. There is alot of fluff and Israeli self promotion in both - in that sense I see both articles as a form of psyops. Regarding Afek's "groundbreaking" thesis - bullshit. Perhaps in Hebrew it is unique, but the legal aspects of cyberwar have been researched and discussed in many forums. The Tallinn document of the EU for example. International relations theory, political science and legal theory, within academia and the military have been dealing with this for years. For example, serious treatment of the concept of "just war" in cyber terms. As a senior legal officer in the IDF, Afek is directly responsible, at the macro level, for whitewashing the Israeli occupation of Palestine, and at the micro level legalizing Israeli crimes against Palestinians. Exactly the kind of person you would want to draft a thesis on cyberwar. Not. One can google Saalbach, or Thomas Ridd as a start regarding a more serious discussion of cyberwar. Michael Dahan On Mar 17, 2014 9:30 AM, "Cari Machet" <carimachet@gmail.com> wrote:
'The Jerusalem Post recently interviewed Col. Sharon Afek, formerly deputy head of the IDF's legal division, who wrote a 149-page treatise on cyber warfare law - the first treatise of that comprehensiveness by a military lawyer of his rank and stature.'
http://www.jpost.com/Defense/Analysis-How-Israel-is-dealing-with-cyber-warfa...
'Many are also asking more strongly than ever: "Is international law still relevant?" Afek, who views his treatise also as a "bridge" between the pre- and post-cyber world of war, answers with a resounding "yes," but then goes further to try to resolve some of the questions of how and where it applies.
One debate in the new wild west of cyberwarfare law is between two schools of thought about where to draw the line of which cyber operations should be declared illegal under international law.'
http://www.jpost.com/Features/Front-Lines/A-revolution-in-war-339962 -- Cari Machet NYC 646-436-7795 carimachet@gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet <https://twitter.com/carimachet>
7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187
Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited.
May I suggest A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 http://www.amazon.com/Fierce-Domain-Conflict-Cyberspace-1986/dp/098932740X The Tallinn Manual on the International Law Applicable to Cyber Warfare http://www.ccdcoe.org/249.html and a whole lot of ongoing things at http://www.lawfareblog.com/ --dan
On Mon, Mar 17, 2014 at 7:15 PM, <dan@geer.org> wrote:
May I suggest
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 http://www.amazon.com/Fierce-Domain-Conflict-Cyberspace-1986/dp/098932740X
The Tallinn Manual on the International Law Applicable to Cyber Warfare http://www.ccdcoe.org/249.html
and a whole lot of ongoing things at http://www.lawfareblog.com/
--dan
thanks for the resources everyone - yes to all - of my look is the gap between tech and law and the bloody concept that law is not a construct but an absolute that the religious look to for their ethical objectification of the actions they perform under the logo of 'state' arguably the most oppressive violent and destructive structural force not sure the pathetic position of so called international law (jewish state or not) can encompass tech so easily... -- Cari Machet NYC 646-436-7795 carimachet@gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet <https://twitter.com/carimachet> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited.
A joint contribution by the NSA and Huawei just removed the AES-SIV mode of operation from IEEE 802.11: https://mentor.ieee.org/802.11/dcn/14/11-14-0414-00-00ai-resolution-to-open-... Very strange bedfellows. AES-SIV was being proposed in the draft for a key wrap application. AES-CCM is now the only alternative … SIV is increasingly my favorite AEAD mode. It is more efficient over-the wire than CCM or GCM and is 'nonce safe’. Is anyone using or considering ChaCha-SIV? Nonce-safe is a very nice property - particularly for multicast applications.
The more the NSA removes competition the more obvious it is what's exploited. I can't read the document right now, do they actually have a good reason to remove it?
On Mar 18, 2014, at 8:06 PM, Lodewijk andré de la porte <l@odewijk.nl> wrote:
The more the NSA removes competition the more obvious it is what's exploited. I can't read the document right now, do they actually have a good reason to remove it?
Document is not worth reading except for the context. No reason is provided .. except by others in room that CCM is NIST approved and SIV is not. CCM is used in all 802.11 hardware, but not for this application, so HW is not a relevant arguement.
On Wed, Mar 19, 2014 at 10:19 AM, nymble <nymble@gmail.com> wrote:
... CCM is _NIST approved_ and SIV is not.
NIST has so perverted the ways of randomness, their crimes an affront to decency and entropy oppression... explain to current day me how y2k day me playing with first generation C5XL single source XSTORE feature would over a decade later still be dealing with a shit pool of broken randomness in crypto everywhere. the only consolation being that the technology irrelevant total fuck-ups, like goto fail, or debian openssl, or android secure random, prove that the world needs to learn to sweat the simple, dead important stuff before they get all concerned and atwatter over the esoterics of threat models and computational complexity. . . . i have been informed that hackers and cypherpunks and malcontents are more productive countering the quo when they are amused or happy. ... "2014 [and counting] - never have we reduced the scope of info|comsuck unknown unknowns at a faster rate!" for the REers ... "2014 [and counting] - never have we expanded our attack surfaces at a faster rate!" , ... the and counting is a heavy handed overt reference to the fact that i will overdose on some cool new future drug long before the trickle of disclosure reaches its conslusion. this is not an acceptable circumstance. -_- (did do lul right?)
On Wed, Mar 19, 2014 at 10:47 AM, coderman <coderman@gmail.com> wrote:
... (did do lul right?)
i forgot citelulz 0. "I know that I know nothing" https://en.wikipedia.org/wiki/Epistemic_modal_logic 1. "42 Years for Snowden docs release" http://cryptome.org/2013/11/snowden-tally.htm 2. when living better with chemistry: at least do so safely! we keep losing un-replaceable brilliance; pointless losses. https://www.erowid.org "Know thyself"
participants (7)
-
Cari Machet
-
coderman
-
dan@geer.org
-
grarpamp
-
Lodewijk andré de la porte
-
Michael Dahan
-
nymble