Advertisement

CyberBRICS: A Multidimensional Approach to Cybersecurity for the BRICS

Chapter
  • 118 Downloads

Abstract

This book stems from the CyberBRICS project, which is the first initiative to develop a comparative analysis of the digital policies developed by BRICS (Brazil, Russia, India, China and South Africa) countries. BRICS have been chosen as a focus not only because their digital policies are affecting more than 40% of the global population – i.e. roughly 3.2 billion individuals living in such countries – but also all the individuals and businesses willing to use technologies developed in the BRICS or trading digital goods and services with these countries.

References

  1. Antonakakis, Manos et al. (2017). Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium August 16–18, 2017. Vancouver, BC, Canada <https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-antonakakis.pdf>.
  2. Banga, Rashmi & Jeet Singh, Parminder (2019). BRICS Digital Cooperation for Industrialization. Working Paper 4/2019. Centre for Competition Regulation and Economic Development. University of Johannesburg.Google Scholar
  3. Belli, Luca. (2017). Net Neutrality, Zero-rating and the Minitelisation of the Internet. Journal of Cyber Policy. Routledge. Vol 2. n° 1. < https://doi.org/10.1080/23738871.2016.1238954>.
  4. Belli, Luca. (2019). The Need for a RIoT (Responsible Internet of Things): A Human Rights Perspective on IoT Systems. In Mullen M. et al (2019). Navigating a New Era in Business and Human Rights. Institute of Human Rights and Peace Studies and Article 30. Pp. 181–188. <https://article30.org/wp-content/uploads/2019/08/a_new_era.pdf>.
  5. Belli, Luca. (2016). De la gouvernance à la regulation de l’Internet. Paris: Berger-Levrault.Google Scholar
  6. Belli, Luca. (2015). A heterostakeholder cooperation for sustainable Internet policymaking. Internet Policy Review, 4(2). < https://doi.org/10.14763/2015.2.364>.
  7. Belli, Luca; Francisco, Pedro & Zingales, Nicolo. (2017). Law of the Land or Law of the Platform? Beware of the Privatisation of Regulation and Police. In Belli, Luca & Zingales, Nicolo (Eds.) Platform regulations: how platforms are regulated and how they regulate us. Rio de Janeiro. FGV Direito Rio. Pp 41–64. <https://bibliotecadigital.fgv.br/dspace/handle/10438/19402>.
  8. Belli, Luca & Sappa, Cristiana. (2017). The Intermediary Conundrum: Cyber-regulators, Cyber-police or both? JIPITEC (Journal of Intellectual Property, Information Technology and Electronic Commerce Law) Special Issue: Intermediary Liability as a Human Rights Issue. Vol. 8, n° 3. Pp 183–198. <https://www.jipitec.eu/issues/jipitec-8-3-2017/4620>.
  9. Belli, Luca & Venturini, Jamila. (2016). Private ordering and the rise of terms of service as cyber-regulation. Internet Policy Review, 5(4). < https://doi.org/10.14763/2016.4.441>.
  10. Bond. (2019). Internet Trends 2019. <https://www.bondcap.com/report/itr19/#view/1>.
  11. Boston Consulting Group (September 2017). Decoding the Chinese Internet. A white paper on China’s Internet economy.Google Scholar
  12. Brazilian Presidency of the BRICS. (2019). What is BRICS? <http://brics2019.itamaraty.gov.br/en/about-brics/what-is-brics>.
  13. BRICS (October 2019). BRICS Science, Technology and Innovation Work Plan 2019–2022. <http://brics2019.itamaraty.gov.br/images/documentos/BRICS_STI_Work_Plan_2019-2022__Final.pdf>.
  14. BRICS. (14 August 2019). Declaration of the BRICS Ministers of Science, Technology and Telecommunications, Brasilia, Brasil. <http://brics2019.itamaraty.gov.br/images/documentos/Declarao_da_5_Reunio_de_Comunicao_dos_Ministros_do_BRICS.pdf>.
  15. BRICS. (July 2018). 10th BRICS Summit Johannesburg Declaration — BRICS in Africa: Collaboration for Inclusive Growth and Shared Prosperity in the 4th Industrial Revolution. July 25–27 2018, Johannesburg, South Africa. <http://www.brics.utoronto.ca/docs/180726-johannesburg.html>.
  16. BRICS. (4 September 2017). 9th BRICS Summit. BRICS Leaders Xiamen Declaration. Xiamen, China. <http://www.itamaraty.gov.br/en/press-releases/17427-9th-brics-summit-brics-leaders-xiamen-declaration-xiamen-china-september-4-2017>.
  17. BRICS. (18 March 2015). BRICS Memorandum of Understanding on Cooperation in Science, Technology and Innovation. Second BRICS Science, Technology and Innovation Ministerial Meeting. Brasília, 18 March, 2015. <http://www.itamaraty.gov.br/pt-BR/notas-a-imprensa/8342-ii-reuniao-de-ministros-de-ciencia-tecnologia-e-inovacao-do-brics-documentos-aprovados-brasilia-18-de-marco-de-2015#mos>.
  18. BRICS Competition Centre. (2019). Digital Era Competition BRICS Report. <https://cyberbrics.info/digital-era-competition-brics-report/>.
  19. BRICS STIEP WG. (May 2019). Minutes of the BRICS Working Group on Science Technology Innovation and Entrepreneurship Partnership (STIEP WG). Foz do Iguaçu, Brasil 12–15 May 2019. <http://brics2019.itamaraty.gov.br/images/documentos/Minutes_of_the_3rd_Meeting_of_the_STIEP_WG_-_Complete_version.pdf>.
  20. BRICS Working Group on ICT Cooperation. (11 November 2016). Digital Partnership – Transformation through ICTs. ICT Development Agenda and Action Plan. 2nd Meeting of BRICS Ministers of Communications.Google Scholar
  21. Bridi, Sonia & Greenwald, Glenn (1 September 2013). Documentos revelam esquema de agência dos EUA para espionar Dilma. O Globo. <http://g1.globo.com/fantastico/noticia/2013/09/documentos-revelam-esquema-de-agencia-dos-eua-para-espionar-dilma-rousseff.html>.
  22. Canongia, Claudia & Mandarino, Raphael. (2012). Cybersecurity: The new challenge of the information society. Handbook of Research on Business Social Networking: Organizational, Managerial, and Technological Dimensions. IGI Global.Google Scholar
  23. Cisco. (2017). Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2016 2021. White Paper. San Jose, CA: Cisco. <https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-738429.html>.
  24. Department of Telecommunications and Postal Services, South Africa. (2017). Cybersecurity Readiness Report 2017. <https://www.cybersecurityhub.gov.za/images/docs/Cyber-Readiness-Report.pdf>.
  25. Dewar, Robert S. (Ed.) (2018) National Cyberdefence Policy Snapshots. Cyber Defence Project (CDP). Zürich, September 2018. Centre for Security Studies (CSS).Google Scholar
  26. Drake, William J.; Cerf Vinton G. & Kleinwächter, Wolfgang. (January 2016). Internet Fragmentation: An Overview. Future of the Internet Initiative White Paper. <http://www3.weforum.org/docs/WEF_FII_Internet_Fragmentation_An_Overview_2016.pdf>.
  27. Ewing, Reese. (27 July 2016) Brazil prosecutor freezes $11.7 million of Facebook funds due to WhatsApp case. Reuters. <https://www.reuters.com/article/us-brazil-facebook-whatsapp-idUSKCN10801Q>.
  28. European Union Chamber of Commerce in China (2019). The Digital Hand: How China’s Corporate Social Credit System Conditions Market Actors. <https://www.europeanchamber.com.cn/en/publications-archive/709/The_Digital_Hand_How_China_s_Corporate_Social_Credit_System_Conditions_Market_Actors>
  29. Fichtner, L. (2018_). What kind of cyber security? Theorising cyber security and mapping approaches. Internet Policy Review, 7(2), 1–19. < https://doi.org/10.14763/2018.2.788>.
  30. Gemalto. (2018). Breach Level Index. <https://breachlevelindex.com/request-report>.
  31. Kolomychenko, Maria. (30 August 2018). Russia tries more precise technology to block Telegram messenger. Reuters. <https://www.reuters.com/article/us-russia-telegram/russia-tries-more-precise-technology-to-block-telegram-messenger-idUSKCN1LF1ZZ>.
  32. Kunming. (11 September 2019). Kunming enhances technology cooperation with BRICS countries. <http://en.kunming.cn/c/2019-09-11/10793655.htm>.
  33. Kiselev, Vladimir & Nechaeva, Elena. (2018). Priorities and Possible Risks of the BRICS Countries’ Cooperation in Science, Technology and Innovation, 5(4) BRICS Law Journal 33–60 < https://doi.org/10.21684/2412-2343-2018-5-4-33-60>.
  34. Kuneva, Meglena. (31 March 2009). Keynote Speech. Roundtable on Online Data Collection, Targeting and Profiling. Brussels, European Commission. <http://europa.eu/rapid/press-release_SPEECH-09-156_en.htm>.
  35. Marzano, Artur et al. (2018). The Evolution of Bashlite and Mirai IoT Botnets. in 2018 IEEE Symposium on Computers and Communications (ISCC). <https://ieeexplore.ieee.org/document/8538636>.
  36. Mosenia, Arsalan & Jha, Niraj K. (2016). A Comprehensive Study of Security of Internet-of-Things. in IEEE Transactions on Emerging Topics in Computing. Vol. 5 N° 4 <https://ieeexplore.ieee.org/document/7562568>.
  37. NIST (National Institute of Standards and Technology) (August 2003). Special Publication 800-59. <https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-59.pdf>.
  38. ICCPR (International Covenant on Civil and Political Rights). (1966). Adopted and opened for signature, ratification and accession by General Assembly resolution 2200A (XXI) of 16 December 1966 entry into force 23 March 1976. <https://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx>.
  39. Itamaraty. (27 June 2019). BRICS Informal leaders’ meeting on the margins of the G20 Summit – Joint Media Statement – Osaka, 28 June 2019. <http://www.itamaraty.gov.br/en/press-releases/20557-brics-informal-leaders-meeting-on-the-margins-of-the-g20-summit-joint-media-statement-osaka-28-june-2019>.
  40. ITU. (2014) Understanding cybercrime: Phenomena, challenges and legal response Geneva: ITU Telecommunication Development Bureau. <https://www.itu.int/en/ITU-D/Cybersecurity/Documents/Cybercrime2014_E.pdf>.
  41. ITU. (2005). ITU WSIS Thematic Meeting on Cybersecurity. Chairman’s Report. ITU Headquarters, Geneva, Switzerland. 28 June–1 July 2005.Google Scholar
  42. ITU-T. (2009). Recommendation X.1205 (04/08): Overview of cybersecurity. Approved in 2008-04-18. <https://www.itu.int/rec/T-REC-X.1205-200804-I>.
  43. UN Broadband Commission for Sustainable Development (2016). Harnessing the Internet of Things for Global Development. Geneva: International Telecommunication Union <https://www.itu.int/en/action/broadband/Documents/Harnessing-IoT-Global-Development.pdf>.
  44. O Globo. (4 July 2015). EUA grampearam Dilma, ex-ministros e avião presidencial, revela WikiLeak. <http://g1.globo.com/politica/noticia/2015/07/lista-revela-29-integrantes-do-governo-dilma-espionados-pelos-eua.html>.
  45. O’Neill, Jim. (November 2001). Building better global economic BRICs. New York: Goldman Sachs. Global Economics Paper, n. 66. <http://www.goldmansachs.com/our-thinking/archive/archive-pdfs/build-better-brics.pdf>.
  46. Pankov, Nikolay. (19 March 2019). Mirai goes Enterprise. Kaspersky Daily. <https://www.kaspersky.com/blog/mirai-enterprise/26032/>.
  47. Sanger, David E. & Perlroth, Nicole. (June 15, 2019). U.S. Escalates Online Attacks on Russia’s Power Grid. <https://www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.html?smid=nytcore-ios-share>.
  48. Sevastopulo, Demetri & Bond, David. (17 February 2019) UK says Huawei is manageable risk to 5G. Financial Times. <https://www.ft.com/content/619f9df4-32c2-11e9-bd3a-8b2a211d90d5>.
  49. Statista. (2019). Number of smartphone users by country as of September 2019 (in millions). <https://www.statista.com/statistics/748053/worldwide-top-countries-smartphone-users/>.
  50. Stuenkel, Oliver. (2016). Post-Western World: How Emerging Powers Are Remaking Global Order. Polity Press.Google Scholar
  51. The Economist. (6 May 2017). The world’s most valuable resource is no longer oil, but data. <https://www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource>.
  52. UNCTAD (United Nations Conference on Trade and Development). (2016). Data protection regulations and international data flows: Implications for trade and development. <https://unctad.org/en/PublicationsLibrary/dtlstict2016d1_en.pdf>.
  53. UNGA (United Nations General Assembly). (1 March 2018). Progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society at the regional and international levels. Report of the Secretary-General. A/73/66–E/2018/10.Google Scholar
  54. UNODC (United Nations Office on Drugs and Crime). (2013). Comprehensive Study on Cybercrime. Vienna: UNODC. <https://www.unodc.org/documents/organized-crime/cybercrime/CYBERCRIME_STUDY_210213.pdf>.
  55. Vaidya, Tavish. (July 2015). 2001-2013: Survey and Analysis of Major Cyberattacks. Department of Computer Science, Georgetown University. <http://arxiv.org/pdf/1507.06673.pdf>.
  56. WEF. (January 2011). Personal Data: The Emergence of a New Asset Class. <http://www3.weforum.org/docs/WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf>.
  57. Wolff, J. (2016). What we talk about when we talk about cybersecurity: Security in Internet governance debates. Internet Policy Review, 5(3). < https://doi.org/10.14763/2016.3.430>.
  58. World Bank. (2016). World Development Report 2016: Digital Dividends. Washington, DC: World Bank. <http://pubdocs.worldbank.org/en/391452529895999/WDR16-BP-Exploring-the-Relationship-between-Broadband-and-Economic-Growth-Minges.pdf>.
  59. World Bank (2017). Combatting Cybercrime Tools and Capacity Building for Emerging Economies. Washington, DC: The World Bank. <https://www.itu.int/en/ITU-D/Cybersecurity/Documents/worldbank-combating-cybercrime-toolkit.pdf>.
  60. Ziero, Gabriel Webber. (December 2015). Looking for a BRICS perspective on international law. Revista de Direito Internacional, Brasília. Vol. 12. N. 2. Pp. 303–322. < https://doi.org/10.5102/rdi.v12i2.3678>.
  61. XinhuaNet. (7 August 2019). BRICS set up new institutional branch to strengthen cooperation on ICT. <http://www.xinhuanet.com/english/2019-08/07/c_138289903.htm>.

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021

Authors and Affiliations

  1. 1.Center for Technology and SocietyFGV Rio de Janeiro Law SchoolRio de JaneiroBrazil

Personalised recommendations