Cyber Warfare and Organised Crime. A Regulatory Model and Meta-Model for Open Source Intelligence (OSINT)

OSINT stands for Open Source Intelligence, (O)SI for (Open) Social Intelligence, and PbD for Privacy by Design. The CAPER EU project has built an OSINT solution oriented to the prevention of organized crime. How to balance freedom and security? This chapter describes a way to embed the legal and ethical issues raised by the General Data Reform Package (GDRP) in Europe into security and surveillance platforms. It focuses on the indirect strategy to flesh out ethical principles through Semantic Web Regulatory Models (SWRM), and discusses the possibility to extend them to Cyber Warfare. Institutional design and the possibility to build up a Meta-rule of law are also discussed.

[1]  Marta Poblet Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation , 2013 .

[2]  Pompeu Casanovas,et al.  Fighting Organized Crime Through Open Source Intelligence: Regulatory Strategies of the CAPER Project , 2014, JURIX.

[3]  Sherali Zeadally,et al.  Cyberwar: The What, When, Why, and How [Commentary] , 2014, IEEE Technol. Soc. Mag..

[4]  Gianluigi Palombella,et al.  The Rule of Law as Institutional Ideal , 2010 .

[5]  Pompeu Casanovas,et al.  OPJK into PROTON: Legal Domain Ontology Integration into an Upper-Level Ontology , 2005, OTM Workshops.

[6]  N. Kshetri The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives , 2010 .

[7]  Ronald Leenes,et al.  Privacy regulation cannot be hardcoded. A critical comment on the ‘privacy by design’ provision in data-protection law , 2014 .

[8]  Petter Gottschalk Information Sources in Police Intelligence , 2009 .

[9]  Serge Gutwirth,et al.  Reforming European Data Protection , 2015 .

[10]  Marta Poblet,et al.  Mobile Technologies for Conflict Management , 2011 .

[11]  Danny Bradbury In plain view: open source intelligence , 2011 .

[12]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[13]  Pompeu Casanovas,et al.  Agreement and Relational Justice: A Perspective from Philosophy and Sociology of Law , 2013 .

[14]  M. Risch Virtual rule of law , 2018 .

[15]  Pompeu Casanovas,et al.  Crowdsourcing Tools for Disaster Management: A Review of Platforms and Methods , 2013, AICOL.

[16]  Cody Burke Freeing knowledge, telling secrets: Open source intelligence and development , 2007 .

[17]  M. Poblet Visualizing the law: crisis mapping as an open tool for legal practice , 2013 .

[18]  M. Schmitt The Law of Cyber Warfare: Quo Vadis? , 2013 .

[19]  L. Floridi,et al.  The Ethics of Information Warfare , 2014 .

[20]  Cristiano Castelfranchi,et al.  Minds as social institutions , 2014 .

[21]  Mark Burdon Privacy invasive geo-mashups: privacy 2.0 and the limits of first generation information privacy laws , 2009 .

[22]  Jaap-Henk Hoepman,et al.  Open-source intelligence and privacy by design , 2013, Comput. Law Secur. Rev..

[23]  Pablo Noriega,et al.  Crowd-Based Socio-Cognitive Systems , 2014 .

[24]  Pompeu Casanovas,et al.  Drafting a Composite Indicator of Validity for Regulatory Models and Legal Systems , 2013, AICOL.

[25]  M. Wendy Hennequin,et al.  The Future of the Internet and How to Stop It , 2011 .

[26]  B. Tamanaha The Rule of Law and Legal Pluralism in Development , 2011 .

[27]  G. Palombella The Rule of Law Beyond the State: Failures, Promises and Theory , 2009 .

[28]  Fabio Vitali,et al.  Special Issue on The Semantic Web for the Legal Domain - Guest Editors’ Editorial: The Next Step , 2016 .

[29]  Pompeu Casanovas,et al.  Online Dispute Resolution and Models of Relational Law and Justice: A Table of Ethical Principles , 2013, AICOL.

[30]  John H. Aldrich Elinor Ostrom and the “just right” solution , 2010 .

[31]  Ann Cavoukian,et al.  Privacy by Design [Leading Edge] , 2012, IEEE Technol. Soc. Mag..

[32]  Ido Kilovaty Cyber Warfare and the Jus Ad Bellum Challenges: Evaluation in the Light of the Tallinn Manual on the International Law Applicable to Cyber Warfare , 2014 .

[33]  John Arquilla From blitzkrieg to bitskrieg: the military encounter with computers , 2011, CACM.

[34]  Pompeu Casanovas,et al.  Semantic Web Regulatory Models: Why Ethics Matter , 2014, Philosophy & Technology.

[35]  Andreas Kornmaier,et al.  Beyond technical data - a more comprehensive situational awareness fed by available intelligence information , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).

[36]  Police and User-led Investigations on Social Media , 2014 .

[37]  Sebastian Zimmeck The Information Privacy Law of Web Applications and Cloud Computing , 2013 .

[38]  Serge Gutwirth,et al.  Reforming European Data Protection Law , 2014 .

[39]  John Arquilla TWENTY YEARS OF CYBERWAR , 2013 .

[40]  Michael Glassman,et al.  Intelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT) , 2012, Comput. Hum. Behav..

[41]  Mark McCary Sun Tzu’s Battle for Your Footnotes: The Emergent Role of Libraries in Judicial Warfare , 2013 .

[42]  N. Kshetri The Global Cybercrime Industry , 2010 .

[43]  Won Kim,et al.  On cyberwarfare , 2012, Int. J. Web Grid Serv..

[44]  T. V. Beken,et al.  Proactive Policing and the Assessment of Organised Crime , 2008 .

[45]  Pompeu Casanovas,et al.  OPJK and DILIGENT: ontology modeling in a distributed environment , 2007, Artificial Intelligence and Law.

[46]  Peter J. Boettke,et al.  The Two Social Philosophies of Ostroms' Institutionalism , 2011 .

[47]  Gerald Quirchmayr,et al.  Open Source Intelligence in Disaster Management , 2012, 2012 European Intelligence and Security Informatics Conference.

[48]  Thomas A. Robson A Burning Need to Know: The Use of Open Source Intelligence in the Fire Service , 2009 .

[49]  Jaap-Henk Hoepman,et al.  A Critical Analysis of Privacy Design Strategies , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[50]  Laura K. Donohue Anglo-American Privacy and Surveillance , 2006 .

[51]  Pompeu Casanovas,et al.  Semantic Web for the Legal Domain: The next step , 2016, Semantic Web.

[52]  M. Schmitt,et al.  The Decline of International Humanitarian Law Opinio Juris and the Law of Cyber Warfare , 2014 .

[53]  Julian Padget,et al.  The Challenge of Artificial Socio-Cognitive Systems , 2014 .

[54]  Mitchell Bartholomew,et al.  Creating an educational context for Open Source Intelligence: The development of Internet self-efficacy through a blogcentric course , 2013, Comput. Educ..

[55]  Peter Schaar,et al.  Privacy by Design , 2010 .

[56]  M. Taddeo Information Warfare: A Philosophical Perspective , 2011, Philosophy & Technology.

[57]  John Arquilla,et al.  Cyberwar is coming , 1993 .

[58]  Paul De Hert,et al.  The new General Data Protection Regulation: Still a sound system for the protection of individuals? , 2016, Comput. Law Secur. Rev..

[59]  Jaap-Henk Hoepman,et al.  PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .

[60]  Pompeu Casanovas Open Source Intelligence, Open Social Intelligence and Privacy by Design , 2014, ECSI.

[61]  Brian Orend Fog in the Fifth Dimension: The Ethics of Cyber-War , 2014 .

[62]  Jerry H. Ratcliffe Intelligence-Led Policing , 2016 .

[63]  Mark Cenite Code and Other Laws of Cyberspace , 2000 .

[64]  P. Bell,et al.  Confidence in the police: Balancing public image with community safety – A comparative review of the literature , 2013 .

[65]  J. Murkens The Future of Staatsrecht: Dominance, Demise or Demystification? , 2007 .

[66]  Joshua Fairfield Mixed reality: how the laws of virtual worlds govern everyday life , 2018 .

[67]  Jorge González-Conejero,et al.  Organized Crime Structure Modelling for European Law Enforcement Agencies Interoperability through Ontologies , 2013, AICOL.

[68]  Patrick Lin,et al.  Is Warfare the Right Frame for the Cyber Debate , 2014 .

[69]  Pompeu Casanovas Conceptualisation of rights and meta-rule of law for the web of data , 2015 .

[70]  M. Phythian,et al.  Intellectuals of the Left and the Atomic Dilemma in the Age of the US Atomic Monopoly, 1945–1949 , 2015 .

[71]  John Arquilla,et al.  Three Wars of Ideas about the Idea of War , 2015 .

[72]  Pompeu Casanovas,et al.  Legal aspects of linked data - The European framework , 2016, Comput. Law Secur. Rev..

[73]  Clive Best,et al.  Open Source Intelligence , 2007, NATO ASI Mining Massive Data Sets for Security.