A South African Legal Perspective on the Regulation of Net Neutrality and Its Implications for Cyber-Security and Cyber-Warfare

A South African Legal Perspective on the Regulation of Net Neutrality and Its Implications for Cyber-Security and Cyber-Warfare

Trishana Ramluckan
Copyright: © 2020 |Pages: 12
DOI: 10.4018/IJCWT.2020100103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With the approval of Articles 11 and 13 in Europe, net neutrality has become a contentious issue globally. These articles refer to European Union (EU) copyright law, which could possibly destroy the freedom of the internet that once existed. Throughout Europe it has become known as the “meme ban,” referring to the censorship elements. While there is much opposition to these articles, its supporters consider it necessary for the preservation for creative works online. Opposition to the legislation, which includes certain websites and internet presences, remains of the opinion that these two pieces of legislation will mean an end to “meme culture and user-generated content.” Along with the limitation to the freedom of the internet, cyber-security and cyber-warfare risks and vulnerabilities are imminent. This paper seeks to provide an in-depth discussion on the implications of neutrality on cyber-security and cyber-warfare.
Article Preview
Top

Introduction

With reference to Hartman and Giles (2018) net neutrality or network neutrality refers to the basic principle that all Internet Service Providers (ISPs) should “treat all Internet communications equally without discrimination”. Further to this net neutrality should be regarded as a set of principles and not a technical implementation. This may include service charges that are incurred differently based upon either the user, the content, the website or means of communication. Internet service providers (ISPs) are not permitted to intentionally “block, slow down, or incur monetary value” for any online content. Without net neutrality regulations, ISPs would be able to prioritize certain types of traffic and even potentially block traffic from specific services. ISPs may even charge users depending on the type of service (Gilroy, 2011). The concept of net neutrality is deemed to predate the Internet technology era, existing since the time of the telegraph. With the development of the telegram a federal law (Pacific Telegraph Act) had to be introduced 1860 in order to subsidize a telegraph line, stating that:

messages received from any individual, company, or corporation, or from any telegraph lines connecting with this line at either of its termini, shall be impartially transmitted in the order of their reception, excepting that the dispatches of the government shall have priority ...

The act was created to facilitate communications between the Atlantic and Pacific states by electric telegraph on June 16, 1860. With the advent of the Internet in modern times, it was deemed necessary that governments have the right to regulate internet usage. Whilst some control is necessary, these regulations are said to create more issues specifically regarding cybersecurity and cyberwarfare. It is important to note that both malicious and legitimate actors have attained comparable capabilities in the age of the Internet. However, with net neutrality regulations being implemented, it has also created a situation where legitimate actors have become restricted by legal and political restrictions, in most cases rendering them immobile in cyberwarfare instances. According to Hartman and Giles (2018), the transference of the principles relating to net neutrality into reality would correlate to the deprivation of the military, police and emergency operators from any sort of privilege that permits them in effectively responding to an incident. This may in turn deprive them of blue light privileges even in responding to severe critical incidents.

Top

Cybersecurity And Cyberwarfare

Cybersecurity involves the practice of “protecting systems, networks, and programs” from cyber-attacks (Cisco, 2020). These cyberattacks are known for accessing, often editing and/or destroying important and sometimes sensitive information. It may also include the extortion of money from users and/or the disruptions of normal business processes. Having more technology means that there are now more devices than people, and this creates challenges in the implementation of effective cybersecurity. Further to this, vulnerabilities in cyber systems open the door to cyber attackers who are becoming more innovative.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing