{"id":49542,"date":"2014-11-10T12:00:52","date_gmt":"2014-11-10T12:00:52","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=49542"},"modified":"2015-05-05T21:22:46","modified_gmt":"2015-05-05T20:22:46","slug":"cyberpeace-demands-from-computer-scientists-for-peace-and-social-responsibility","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/11\/cyberpeace-demands-from-computer-scientists-for-peace-and-social-responsibility\/","title":{"rendered":"CyberPeace Demands from Computer Scientists for Peace and Social Responsibility"},"content":{"rendered":"<div id=\"attachment_49191\" style=\"width: 260px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/10\/Emblem-der-Kampagne-cyberpeace.jpeg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-49191\" class=\"wp-image-49191 size-full\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/10\/Emblem-der-Kampagne-cyberpeace.jpeg\" alt=\"Campaign Logo\" width=\"250\" height=\"196\" \/><\/a><p id=\"caption-attachment-49191\" class=\"wp-caption-text\">Campaign Logo<\/p><\/div>\n<p><strong>Political Measures Demanded by FIfF:<br \/>\n<\/strong><\/p>\n<ol>\n<li>Renouncement of first strikes and offensive acts in cyberspace: States should publicly abandon the preventive use of cyber weapons to attack.<\/li>\n<li>Purely defensive security strategy: States should bind themselves to not develop offensive weapons for cyberwar, let alone use them.<\/li>\n<li>Digital Geneva Convention: Civil infrastructure for basic needs like electricity, water, health care, etc. may not be attacked. Violating this principle should count as a war crime.<\/li>\n<li>Online forms of protests may not be criminalized, let alone be an excuse for war.<\/li>\n<li>Economic interests, e.g. an offence against Intellectual properties, are not a legitimate reason for war.<\/li>\n<li>Conventional weapons may not be uses as an answer to a cyber attach.<\/li>\n<li>Governmental entities, companies and citizens have to be informed about the disclosure of weaknesses (deducible from the fundamental right to guarantee of secrecy and integrity of IT systems, which the state has to protect).<\/li>\n<li>Carriers of critical infrastructure should be obliged to protect themselves and to design, implement and run IT system in a secure way, instead of calling for the state or even the military.<\/li>\n<li>Transparent assessments and tests have to be a requirement for a license.<\/li>\n<li>We demand denetworking and decentralization of critical infrastructure (e.g. DE-CIX).<\/li>\n<li>Disarmament of political speech: Distinguish clearly between cyberwar, cyber terror, cyber crime, ethical hacking, and political protest forms.<\/li>\n<li>Democratic control, separation of powers, parliamentary prerogative for cyber security strategy and its implementation.<\/li>\n<\/ol>\n<p>_______________________________<\/p>\n<p><em>Translated by Malvin Gattinger, TRANSCEND member &amp; webmaster.<\/em><\/p>\n<p><em>Original in German: <a target=\"_blank\" href=\"http:\/\/cyberpeace.fiff.de\/forderungen\/index.html\" >http:\/\/cyberpeace.fiff.de\/forderungen\/index.html<\/a>)<\/em><\/p>\n<p><em>See also:<a href=\"https:\/\/www.transcend.org\/tms\/2014\/11\/deutsche-cyberpeace-kampagne-engagierter-informatikerinnen-wird-gefordert\/\" > (Deutsch) \u201cCyberpeace\u201d-Kampagne engagierter InformatikerInnen wird gef\u00f6rdert<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Political Measures Demanded by FIfF:<br \/>\n1) Renouncement of first strikes and offensive acts in cyberspace: States should publicly abandon the preventive use of cyber weapons to attack.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[216],"tags":[],"class_list":["post-49542","post","type-post","status-publish","format-standard","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/49542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=49542"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/49542\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=49542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=49542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=49542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}