15
telephony are just some examples of how far the integration of ICTs into our daily lives
has advanced.
20
However, the growth of the information society is accompanied by new and serious
threats.
21
Essential services such as water and electricity supply now rely on ICTs.
22
Cars, traffic control, elevators, air conditioning and telephones also depend on the
smooth functioning of ICTs.
23
Attacks against information infrastructure and Internet
services now have the potential to harm society in new and critical ways.
24
Attacks against information infrastructure and Internet services have already taken
place.
25
Online fraud and hacking attacks are just some examples of computer-related
crimes that are committed on a large scale every day.
26
The financial damage caused by
20
Regarding the extent of integration of ICTs into the daily lives and the related threats, see: § 3.2.1
below, as well as Goodman, The Civil Aviation Analogy – International Cooperation to Protect Civil
Aviation Against Cyber Crime and Terrorism, in Sofaer/Goodman, The Transnational Dimension of
Cyber Crime and Terrorism, 2001, page 69, available at:
http://media.hoover.org/documents/0817999825_69.pdf.
21
See UNGA Resolution: Creation of a global culture of cybersecurity and taking stock of national
efforts to protect critical information infrastructure, A/RES/64/211, page 1; Sieber, The Threat of
Cybercrime, Organised crime in Europe: the threat of Cybercrime, page 212; ITU Global
Cybersecurity Agenda / High-Level Experts Group, Global Strategic Report, 2008, page 14,
available at: http://www.itu.int/osg/csd/cybersecurity/gca/global_strategic_report/index.html.
22
See Suter, A Generic National Framework For Critical Information Infrastructure Protection, 2007,
available at: http://www.itu.int/osg/spu/cybersecurity/pgc/2007/events/docs/background-paper-suter-
C5-meeting-14-may-2007.pdf.
23
Bohn/Coroama/Langheinrich/Mattern/Rohs, Living in a World of Smart Everyday Objects – Social,
Economic & Ethical Implications, Journal of Human and Ecological Risk Assessment, Vol. 10,
page 763 et seq., available at: http://www.vs.inf.ethz.ch/res/papers/hera.pdf.
24
See Wigert, Varying policy responses to Critical Information Infrastructure Protection (CIIP) in
selected countries, Cybercrime and Security, IIB-1, page 1; Wilshusen, Internet Infrastructure,
Challenges in Developing a Public/Private Recovery Plan, Testimony before the Subcommittee on
Information Policy, 2007, GAO Document GAO-08-212T, available at:
http://www.gao.gov/new.items/d08212t.pdf.
25
Regarding the attack against online service in Estonia, see: Toth, Estonia under cyberattack,
available at: http://www.cert.hu/dmdocuments/Estonia_attack2.pdf. Regarding the attacks against
major online companies in the United States in 2000, see: Sofaer/Goodman, Cyber Crime and Security
– The Transnational Dimension, in Sofaer/Goodman, The Transnational Dimension of Cyber Crime
and Terrorism, 2001, page 14, available at: http://media.hoover.org/documents/0817999825_1.pdf.
The attacks took place between 07.02.2000 and 09.02.2000. For a full list of attacked companies and
the dates of the attacks, see: Yurcik, Information Warfare Survivability: Is the Best Defense a Good
Offence?, page 4, available at: http://www.projects.ncassr.org/hackback/ethics00.pdf.
26
The Online-Community HackerWatch publishes reports on hacking attacks. Based on their sources,
more than 219 million incidents were reported in one month (November 2010). Source:
http://www.hackerwatch.org. Regarding the necessary differentiation between port scans and possible