Abstract
Our research demonstrates that active abuse of cyberspace by virtually all groups of sanctions violators across many UN sanctions regimes has grown over the past almost 20 years. For almost as long, UN sanctions monitoring experts have formulated concrete examples and recommendations for how to address these expanding problems. The Security Council chose not to respond for much of this time, and when it finally did, in response to cyber space abuses by ISIL, it still did not answer with a comprehensive cyber sanctions policy. While more security in cyberspace is clearly in the public and private sectors' interest, leading governments equally clearly prefer their many secret intelligence programs that have come to light over the past years through leaks and other indiscretions. Fear of terrorism serves governments well in justifying countermeasures that undermine privacy rights in the name of enhancing public security. Procrastinating on adopting comprehensive sanctions solutions against cyber threats is likely connected with their preference for gaining control over advanced information technologies in order to weaponize them before multilateral agreements create restrictions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Angola ’s war can be delineated by the war of independence, by the pre-election civil war for control of the political leadership, the third war over the election results, and finally the fourth war that UNITA commenced in 1997–1998 after a prolonged phase of mediation that Jonas Savimbi used to resupply and retrain his rebels.
- 2.
For an excellent account of Bout ’s story and capture, see, for example, Nicholas Schmidle in the New Yorker, Disarming Viktor Bout —The rise and fall of the world’s most notorious weapons trafficker. 5 March 2012 issue.
- 3.
For important research on the role of the Internet and the radicalization of some Somali groups see, for example, Ken Menkhaus,
2014. Al Shabaab and Social Media: A Double-Edged Sword. Brown Journal of World Affairs, Spring/Summer 2014, Volume xx, Issue II.
- 4.
- 5.
The public–private key encryption system is described in numerous academic works, but the UK’s Government Communications Headquarters, usually referred to by its acronym GHCQ has released a very short text on its website to take credit for its pioneering work: https://web.archive.org/web/20100519084635/http://www.gchq.gov.uk/history/pke.html.
References
Amarasingam, A. (2015, December 30). War on the rocks; What Twitter really means for Islamic state supporters. https://warontherocks.com/author/amarnath-amarasingam/. Accessed 8 February 2017.
Audio Archive. Full text of complete archive of Sheikh Imam Anwar Al awlaki Audio lectures. https://archive.org/stream/Anwar.Awlaki.Audio.Archive/44Ways.for.supporting.Jihad_djvu.txt. Accessed 8 February 2017.
Benraad, M. (2010, June 3). Combating terrorism center at West Point; Assessing AQI’s resilience after April’s leadership decapitations. https://www.ctc.usma.edu/posts/assessing-aqi’s-resilience-after-april’s-leadership-decapitations. 29 August 2016.
Berger, J. M., & Morgan J. (2015, March 20). The ISIS Twitter Census—Defining and describing the population of ISIS supporters on Twitter. In The Brookings project on U.S. relations with the Islamic world. Analysis Paper.
Bergen, P. L. (2002, November 15). Al Qaeda’s new tactics. New York Times. The Opinion Pages.
Bintchaos Blog. (2015, July 16). Jihadi-cool. https://bintchaos.wordpress.com/2015/07/16/jihadi-cool/. Accessed 3 November 2016.
Brown, A. D. (2006). Proposal for an international convention to regulate the use of information systems in armed conflict (Vol. 47(1), p. 179). Cambridge, MA: Harvard International Law Journal. Winter.
Clapper, J. R. (2016, February 9). Statement for the record worldwide threat assessment of the US intelligence community. Senate Armed Services Committee.
Comey, J. (2015, December 9). Statement of James B. Comey, Director Federal Bureau of Investigation before the Committee on the Judiciary United States Senate for a hearing regarding oversight of The Federal Bureau of Investigation. Washington, DC: US Senate. https://www.judiciary.senate.gov/imo/media/doc/12-09-15%20Comey%20Testimony.pdf. Accessed 3 November 2016.
Dinniss, H. H. (2014). Cyber warfare and the laws of war (p. 28). Cambridge, UK: Cambridge University Press.
Gellman B., & Soltani A. (2013, October 30). NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say. Washington Post. https://www.washingtonpost.com/world/nationalsecurity/nsainfiltrates-links-to-yahoo-google-datacenters-worldwide-snowdendocuments-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html. Accessed 5 September 2016.
General Assembly of the United Nations. (2001, December 21). Resolution 56/183. New York: United Nations.
ICAO – International Convention on Civil Aviation. (1963). Convention on offences and certain other acts committed on board aircraft. Chicago: ICAO Treaties Collection. https://treaties.un.org/doc/db/Terrorism/Conv1-english.pdf. Accessed 3 November 2016.
Internet Archive. Al Kataib media productions the excellent video woolwich attack it’s an eye for an eye. https://archive.org/details/Woolwich. Accessed 3 November 2016.
Internet Society. (2017). The Internet in Africa: A snapshot. http://internet-africa.projects.visual.ly/en/#. 10 February 2017.
May, T. C. (1994, September 10). The cyphernomicon: Cypherpunks FAQ and more, Version 0.666. https://www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.txt. 10 February 2017.
Menkhause, K. (2014). Al Shabaab and social media: A double-edged sword. Brown Journal of World Affairs, Spring/Summer, xx(II).
Moore, D., & Rid, T. (2016, February 1). The darkness online: Cryptopolitik and the darknet (Vol. 58(1), pp. 7–38). Taylor and Francis Online: http://dx.doi.org/10.1080/00396338.2016.1142085. Accessed 6 September 2016.
NATO Cooperative Cyber Defence Centre of Excellence. (2017, February). Tallinn manual 0.2 on the international law applicable to cyber warfare. Cambridge: Cambridge University Press.
Norland, R. (2009, November 22). Analysis: voting with bombs. New York Times.
Obama, B. (2015, February 13). Remarks during the cybersecurity and consumer protection summit at Stanford University. Washington DC: The White House, Office of the Press Secretary. https://obamawhitehouse.archives.gov/the-press-office/2015/02/13/remarks-president-cybersecurity-and-consumer-protection-summit. Accessed 9 February 2017.
Pearson, E. (2015, November 11). VOX-Pol; Wilayat Twitter and the battle against Islamic state’s Twitter Jihad. http://www.voxpol.eu/wilayat-twitter-and-the-battle-against-islamic-states-twitter-jihad/. 10 February 2017.
Peritz, A. (2014, July 2). I watched all the terrorist beheadings for the U.S. government, and here’s what I learned. Washington Post.
Robertson, C. (2009, May 30). Terrorist of mythic symbol: A tale of Iraqi politics. New York Times.
Security Council. (2001, October 12). Supplementary report of the monitoring mechanism on sanctions against UNITA, S/2001/966. New York: United Nations.
Security Council. (2002, September 20). Second report of the Monitoring Group established pursuant to Security Council resolution 1363 (2001) and extended by resolution 1390 (2002)—S/1050/2002 (para. 5ff). New York: United Nations.
Security Council. (2005, September 9). Chapter IX. Al Qaida and the Internet. In Third report of the Analytical Support and Sanctions Monitoring Team appointed pursuant to resolution 1526 (2004) concerning Al Qaida and the Taliban and associated individuals and entities. New York: United Nations.
Security Council. (2006, March 10). Fourth report of the Analytical Support and Sanctions Monitoring Team appointed pursuant to Security Council Resolutions 1526 (2004) and 1617 (2005) concerning Al Qaida and the Taliban and associated individuals and entities (para. 123–127). New York: United Nations.
Security Council. (2015, December 17). S/RES/2214/2015 (para. 22). New York: United Nations.
Weimann, G. (2006, March). Terror on the Internet: The new arena, the new challenges (1st ed.). Washington, DC: United States Institute of Peace Press.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Carisch, E., Rickard-Martin, L., Meister, S.R. (2017). Emerging Threats and Sanctions: Abuses of Digital and Information Technologies. In: The Evolution of UN Sanctions. Springer, Cham. https://doi.org/10.1007/978-3-319-60005-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-60005-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60004-8
Online ISBN: 978-3-319-60005-5
eBook Packages: Law and CriminologyLaw and Criminology (R0)