Cyber Threats, Harsh Environment and the European High North (EHN) in a Human Security and Multi-Level Regulatory Global Dimension: Which Framework Applicable to Critical Infrastructures under “Exceptionally Critical Infrastructure Conditions” (ECIC)?
Sandra Cassotta, Roman Sidortsov, Christer Pursiainen and Michael Evan Goodsite
Abstract
Business opportunities in the European High North (EHN) are accompanied by the danger of cyber-threats, especially to critical infrastructures which in these Arctic regions become “extra critical” because of the harsh environmental climatic conditions and remoteness of distances. Critical infrastructures (CI) in the EHN are crucial for numerous sectors, such as the energy sector which is completely depended on digitalization, internet and computers’ commands. Such a new condition of extra criticality should also include human security concerns to avoid human disasters. An effective legal framework under “exceptionally critically infrastructure conditions” (ECIC) for this technology is important not only in terms of national legislation, but also in view of a regional, international and global networks character. This paper links for the first time, law, internet and cybersecurity, environment and society in a global human security dimension in a multi-regulatory contextual analysis.
The aim is to trace the legal framework for response to a cyber-attack to critical infrastructure in the energy sector and takes Norway as a case study because this country is highly dependent on cyber technology and on critical infrastructures. The question of research is: using a human security focus in the case of cyber-threats under ECIC in the EHN, what ways can an assessment recommend to improve international , and regional law? Five analytical tasks are undertaken: 1) the concept of critical infrastructure vulnerability to cyber-attacks under “exceptionally critically infrastructure conditions” (ECIC) in the EHN with focus on the energy sector is explained in connection to the notion of human security, 2) a backdrop of regional and international collaboration is followed, 3) a trajectory of multilevel contextual analysis of the different sources of law and policy applicable to cyber-threats to CI is outlined, and 4) an examination of cooperation under the North Atlantic Treaty Organization (NATO).
This paper is a deliverable of the ECoHuCy Research Project supported by NordForsk – organization under the Nordic Council of Ministers. ISDP is one of four other Project Partners behind this consortium grant. Led by Sandra Cassotta, ISDP is administering “Working Package Four” on Climate Change, Environmental Threats and Cybersecurity.
Related Publications
-
Kamala Harris and North Korea: Between Continuity, Pragmatism, and Strategic Realignment
A possible future Harris administration is likely to continue the Biden administration’s approach to North Korea, focusing on sanctions and diplomatic pressure. This strategy may be shaped by broader geopolitical […]
-
Eco-Economic Balancing Act: The EU’s Approach to the China EV Trade Dispute
The European Commission unveiled in June the long-expected preliminary results from the ongoing anti-subsidy investigation into Chinese Electric Vehicle (EV) manufacturers. Applicable from July 5, 2024, a new provisional tariff […]
-
Deciphering North Korea’s Military Activities
In 2024, the growing tensions on the Korean Peninsula have highlighted the unpredictability of North Korea’s military intentions. This issue brief evaluates the strategic behaviors of North Korea, particularly under […]
-
EU-Thailand FTA Negotiations: IUU Fishing and Human Rights Remain Obstacles
Thailand’s fishing industry, which at its height saw as many as 200,000 migrant workers from neighboring Laos, Myanmar, and Cambodia caught in a brutal system of abuse, withered global criticism […]
-
EU-U.S. Convergence on China Chip Sanctions: On Brittle Ground?
The United States unveiled new wide-ranging restrictions on China’s semiconductor industry in October 2022, unprecedented in scope and intent. Abandoning the Trump years’ erratic approach to individual Chinese tech companies, […]