{"id":5468,"date":"2011-10-24T08:00:04","date_gmt":"2011-10-24T12:00:04","guid":{"rendered":"http:\/\/www.journals.law.harvard.edu\/ilj\/?p=5468"},"modified":"2013-10-09T15:29:45","modified_gmt":"2013-10-09T19:29:45","slug":"online_53_jensen","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/ilj\/2011\/10\/online_53_jensen\/","title":{"rendered":"A Response to Duncan Hollis, An e-SOS for Cyberspace"},"content":{"rendered":"<p>Drawing on the familiar and effective maritime principle of an SOS distress call, Professor Hollis argues in his paper, <em>An e-SOS for Cyberspace<\/em>, that an analogous system should be established to respond to cyber distresses. Traditionally, an SOS call required ships in the area \u201cto \u2018proceed with all speed\u2019 to provide whatever assistance\u201d they could. Hollis argues that \u201cinternational law needs a new norm for cyber-security: a duty to assist, or DTA.\u201d This duty to assist (DTA) would be much like an SOS in maritime law, in that it would \u201cmarshal[] sufficient resources to avoid or at least mitigate . . . harm as much as possible.\u201d Under Hollis\u2019 proposal, individuals, businesses, organizations, and\/or states should have a similar ability (and a similar corresponding duty) to seek and provide aid to the victims of cyber attacks. If the DTA is effective, Hollis argues that it will not only help avoid or mitigate cyber harms but that it will also act as a deterrent by making attackers \u201cthink twice about whether it is worth the effort to attack at all.\u201d Hollis is careful to make clear that he does not \u201cexpect any resulting duty to remediate all threats nor to operate in all contexts,\u201d but he lays out a framework, inviting the international community to accept the apparent need and to craft a solution that will provide the assistance required.<\/p>\n<p>Recognizing that Hollis\u2019 project here is not to propose a complete solution but merely a framework upon which to build, I will focus my comments on four points in Hollis\u2019 paper: proximity, frequency, technology protection, and the continuing problem of attribution. While these four points are fundamental to Hollis\u2019 proposal, I believe that they also present some difficulties.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recognizing that Hollis\u2019 project here is not to propose a complete solution [to the threat posed by cyber attacks] but merely a framework upon which to build, I will focus my comments on four points in Hollis\u2019 paper: proximity, frequency, technology protection, and the continuing problem of attribution. While these four points are fundamental to Hollis\u2019 proposal, I believe that they also present some difficulties.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_FSMCFIC_featured_image_caption":"","_FSMCFIC_featured_image_nocaption":"","_FSMCFIC_featured_image_hide":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[120],"tags":[48],"class_list":["post-5468","post","type-post","status-publish","format-standard","hentry","category-article-responses","tag-ip-law"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/peZu3S-1qc","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts\/5468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/comments?post=5468"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts\/5468\/revisions"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/media?parent=5468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/categories?post=5468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/tags?post=5468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}