Beyond Data Protection to Command and Control (C2) Sustainability in a Post-COVID19 World

Yogesh Malhotra

Abstract


The current article about execution of the Data Protection Act (DPA) proposal was sent a week before the State of New York state wide shut-down due to the global COVID-19 coronavirus pandemic to Senator Kirsten Gillibrand, the US Senator from the State of New York who had proposed the DPA. The article underscored the need to advance the focus of its execution beyond ex-post reactive penalization of respective firms for compromise of privacy of personal information by firms 'storing' such data to focus on ex-ante Sustainability and Survival material to individuals. There were two specific issues underlying the above recommendations. First, it is not just about storage of such 'entrusted' data but if and how such data was 'exploited' by the trusted firms to Command & Control the Survival and Sustainability of respective individuals. Second, in most cases, those firms may not even be responsible for such compromise of individual data entrusted to them given that they are themselves subject to being 'hacked' by third parties. Hence, to solve the more critical systemic problem encompassing all individuals and firms, we need to build and stress-test systems to preempt and prevent such 'hacking' attacks in addition to the proposed normative compliance measures. Essentially, for Sustainability and Survival of individual Command & Control (C2), we need to focus on developing and deploying Adversarial C2 systems to stress test the robustness of C2 systems as well as Counter-Adversarial C2 to counter the adversarial threats.

The specific focus of global networked systems, infrastructures, and networks that can get impacted in global systemic exponential cascading attacks given the inter-connectivity of networks and often endogenous nature of such attacks was compared with analogous global contagion risks of COVID-19 and its global and national 'spread' that all are monitoring. Over the subsequent few weeks, the COVID-19 global pandemic has unfolded with major adverse impacts evident across public health, global financial and economic, and, global geopolitical, national defense and security, and, related socioeconomic domains. The Survival & Sustainability of Systems at all levels which is at stake and the respective critical significance of Command & Controls - spanning global, national, organizational, individual, and, even human cellular levels of analysis - has been recognized globally as never before on the COVID-19 pandemic "global theater". The respective role of such Command & Controls that are the most essential defining attributes of any self-adaptive System and its self-identity, self-regulation, and, self-direction have also been recognized in terms of determining the Sustainability and Survival of the respective Systems. For preempting and preventing future similar global threats such as COVID-19, we need to develop and deploy Adversarial C2 systems to stress test the robustness of C2 for respective Systems as well as Counter-Adversarial C2 to counter the adversarial threats. Our latest Global Command & Control Network venture being developed as a United States Air Force (USAF) Air Force Research Lab (AFRL) Commercialization Academy venture C4I-Cyber (TM) Global Risk Management Network (C4I-Cyber.com) fulfills this mission.

Keywords: Risk Management, Command & Control, Adversarial Command & Control, Counter-Adversarial Command & Control, Survival & Sustainability, Systems, Cyber Security, Network Security, Pandemic, COVID-19, Coronavirus, Contagion, Cascading Attacks, Data Protection, Data Protection Act.


Full Text:

PDF

References


https://medium.com/@gillibrandny/the-u-s-needs-a-data-protection-agency-98a054f7b6bf

https://finrm.com/globalimpact.html

https://shoshanazuboff.com/book/

http://www.brint.org/km/KnowledgeManagementMeasurementResearch/technologyacceptance.pdf

https://www.kmnetwork.com/ITUseCACM.pdf

https://brint.org/NewLogicOfCRM.pdf

https://www.brint.org/JMIS.pdf

https://www.brint.org/JMIS2.pdf

https://finrm.com/casestudies.html

https://www.finrm.com/Background.html

https://www.fastcompany.com/39678/nerds-need-apply

https://www.nytimes.com/2020/01/10/technology/facebook-election.html

https://www.theatlantic.com/technology/archive/2017/10/what-facebook-did/542502/

https://ssrn.com/abstract=3399781

https://ssrn.com/abstract=2791863

https://ssrn.com/abstract=2590258

https://ssrn.com/abstract=2766099

https://ssrn.com/abstract=3167035

https://aimlexchange.com/MIT/

https://ssrn.com/abstract=3193693

https://ssrn.com/abstract=3111837

https://www.yogeshmalhotra.com/Cybersecurity.html

https://ssrn.com/abstract=2553547

https://ssrn.com/abstract=2693886

https://www.cdc.gov/coronavirus/2019-ncov/about/transmission.html

https://www.risk.net/journal-of-operational-risk/5462036/bridging-networks-systems-and-controls-frameworks-for-cybersecurity-curriculums-and-standards-development

https://news.sophos.com/en-us/2014/03/26/how-malware-works-anatomy-of-a-drive-by-download-web-attack-infographic/

https://www.bloomberg.com/news/articles/2018-01-08/-it-can-t-be-true-inside-the-semiconductor-industry-s-meltdown

https://ssrn.com/abstract=2553547

https://www.cdc.gov/coronavirus/2019-ncov/about/transmission.html

https://www.theverge.com/2020/2/13/21135231/kirsten-gillibrand-facebook-google-data-protection-agency-privacy-big-tech

https://ssrn.com/abstract=2766099

https://ssrn.com/abstract=2553547

https://www.risk.net/journal-of-operational-risk/5462036/bridging-networks-systems-and-controls-frameworks-for-cybersecurity-curriculums-and-standards-development

https://www.yogeshmalhotra.com/Cybersecurity.html#Projects

https://www.linkedin.com/company/global-risk-management-network-llc/

https://www.griffissinstitute.org/

https://griffissinstitute.org/who-we-work-with/afrl/tech-transfer/commercialization-academy

https://aimlexchange.com/aboutus.html#SavetheWorld

https://medium.com/@gillibrandny/the-u-s-needs-a-data-protection-agency-98a054f7b6bf

https://finrm.com/globalimpact.html


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Yogesh Malhotra

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.