There are governments who are regulating things in different ways and those forms of regulation often don't square up. So you have a real legislative mess, in the meanwhile various bad people are developing all sorts of tools to exploit the Internet for their own gain and the militaries are beginning to develop some extremely frightening offensive capabilities in cyber. Yet all of this is taking place outside of any international agreement or even framework.
Misha GlennyThe sort of sweeping parochial espionage and attempts to extract information from all sorts of institutions are well documented, but I think in this context there's a danger of oversimplifying and seeing that sector of cyber as a one-way street.
Misha GlennyThe anonymity issue is a big question. As long as people can disguise cyber attacks and as long as there is a sort of question mark over who is responsible, then the problem will continue to exist. And of course what happens in response to that is that there is a move to try and refashion the Internet so that anonymity is impossible, which of course leads to fears among all sorts of groups - civil rights groups, NGOs, and political parties - that the Internet is going to be used simply as a method of control. So these are very sensitive issues.
Misha GlennyThe Internet obviously changes things; we've seen that in the music industry above all else. As an author, I'm now having to deal with the fact that it's happening in the publishing industry as well. And publishing is going through a very difficult time. Some view it as positive, some negative, but nobody really knows how to deal with it. If you're an author it looks very challenging because your work can be pirated so easily and there's very little you can do about it.
Misha GlennyThe Internet has fashioned a new and complicated environment for an age-old dilemma that pits the demands of security against the desire for freedom.
Misha GlennyOne of the problem with cyber is that it lends itself to preemptive action. Your assets in cyber-warfare are your opponents' vulnerabilities, therefore in order to quantify your assets you have to be able to ascertain how vulnerable your opponents are and that involves pre-emptive exploration of your opponents' networks. So in that sense it lends itself to some pretty nasty stuff.
Misha GlennyThere are governments who are regulating things in different ways and those forms of regulation often don't square up. So you have a real legislative mess, in the meanwhile various bad people are developing all sorts of tools to exploit the Internet for their own gain and the militaries are beginning to develop some extremely frightening offensive capabilities in cyber. Yet all of this is taking place outside of any international agreement or even framework.
Misha Glenny