61. Pugwash Document on Cyber Security and Warfare
- Author:
- Gian Piero Siroli, Gotz Neuneck, and Paolo Cotta-Ramusino
- Publication Date:
- 11-2020
- Content Type:
- Working Paper
- Institution:
- Pugwash Conferences on Science and World Affairs
- Abstract:
- Since its foundation, the Pugwash Conferences on Science and World Affairs (Pugwash) has continued to bring together, from around the world, influential scientists, scholars, experts and public figures concerned with reducing the dangers of armed conflict, especially regarding nuclear weapons and other weapons of mass destruction, and with understanding the new threats related to new technologies, while seeking cooperative solutions. Pugwash held three workshops on the topic of cyber security and warfare between December 2018 and January 2020, gathering a total of about 60 experts and practitioners from Europe, North and South America, and Asia, focusing on a broad set of specific themes. The first workshop (Geneva, Switzerland, December 2018, hosted by the GCSP) discussed battlefield digitalization and offensive cyber capabilities, weapon-system vulnerabilities, and the implications of Artificial Intelligence (AI). The second workshop (Bariloche, Argentina, October 2019, supported by INVAP, Global Security Foundation and KPMG) focused on “Cybersecurity in Latin America”. The third workshop (Geneva, Switzerland, January 2020, sponsored by the Mission of Brazil to the UN Office in Geneva) focused on “Cyber Security and Warfare,” and included discussions on international cooperation, the multi-stakeholder approach, and implications of AI and autonomous weapons systems. Reports are available on the Pugwash website1. The participants, who came from many countries, carried out an analysis and reflection on various aspects of the cyber ecosystem in the context of international stability and security, and reviewed current initiatives included within the international agenda. Better definitions, a common nomenclature, and reliable communication between responsible stakeholders—based on the principles of International Humanitarian Law and the experiences of arms control for risk reduction, self-restraint and crisis management--might be useful or necessary. Sound technical analysis and forensics are a precondition to understanding the different threats and vulnerabilities of the cyber-sphere. Detailed proposals for discussion and implementation were elaborated during the workshops.
- Topic:
- Security, War, Cybersecurity, Conflict, and Artificial Intelligence
- Political Geography:
- Global Focus