Data di Pubblicazione:
2021
Abstract:
It would be difficult to imagine our daily life, our production systems and, in general, our society without the technology solutions we are immersed in and surrounded by. However, technology, and in particular information technology, is a double-edged sword.
The capillary diffusion and reach of social networks enable us to communicate our ideas to the world, but they could easily be used to spread fake news; the adoption of digitized industrial control systems is rewarded with a boost in cost reduction, efficiency and performance, but those very same controls can also make the controlled systems much more fragile; the advent of novel digital financial instruments and tools, from high-frequency trading to cryptocurrencies, do multiply the possibility to trade and to access financial instruments, but they also pose a threat, for the policy makers, to the control of the financial leverage; technologies that have been developed for entertainment, such as drones, have expanded to a number of no-one-envisioned-before applications and jobs, but they also enabled the possibility of physical attacks through the very same media.
Technology has drastically reduced the distance between ideas and implementa- tion, projects, and outcomes. This is just a logical consequence of what technology is: a magnifier of our capabilities. Nowadays, a 240-character piece of news, conveyed to hundreds of millions, could sink the NYSE or skyrocket the price of a share. An induced malicious glitch in a water-desalinization or oil-extraction pressure controller could induce the outage of critical infrastructure and spur, according to the allegedly attribution, geo-political tensions in vast regions of the world. Similarly, the use of a social network by billions of young people can slowly induce, by subtle AI algorithms, new life models and different values to new generations--potentially creating domestic turmoil of an unprecedented magnitude.
As a result, the technology transformed the society so in-depth and so quickly that almost all the essential functions and services of a Nation have been digitalized; this is why even the decision on the very same adoption of an apparently neutral
technology, such as the 5G, or which data can be exploited by a social network com- pany, could lie with the Department of State as a national security matter rather than with a technical, bureaucratic desk. This means every nation needs to set appropriate cyber defenses in terms of sociological, legal, organizational, and technical issues to cope with the complexity and threats induced by the cited technology waves that could harm the very pillars of our democracies, putting at stake even the values of our new generations. While initially lagging behind these threats, States and Supranational Organizations have started to respond. For instance, at the EU level the Network and Information Security (NIS) directive and the "Cybersecurity act" are being implemented. In the USA, each government organization is involved on a daily basis to implement its own piece of a multidimensional Cybersecurity Strategy regularly revised by the White House to take both latest technology development and its social-economic implications into account. In Italy, the Parliament has recently passed a law: "National Security Perimeter for Cyber", whose mission is twofold: (1) to create a more resilient Country by reinforcing security measures for essential functions and services of the State through a complex techno-legal organization and (2) to foster a strategic plan to achieve an intended degree of digital sovereignty.
As a consequence of the previous arguments, it is true more than ever that "Information (and the technology used to manage it) is power". It is no surprise, therefore, that In
Tipologia CRIS:
03.01 Monografia o trattato scientifico
Keywords:
information warfare
Elenco autori:
Cresci, Stefano
Link alla scheda completa: