stream Method: The Email Testbed (ET) provides a simulation of a clerical email work involving messages containing sensitive personal information. The vast majority of actors in the cyber domain are relatively benign: they mind their own business, pursue their own ends, do not engage in deliberate mischief, let alone harm, do not wish their fellow citizens ill, and generally seek only to pursue the myriad benefits afforded by the cyber realm: access to information, goods and services, convenient financial transactions and data processing, and control over their array of devices, from cell phones, door locks, refrigerators and toasters to voice assistants such as Alexa and Echo, and even swimming pools. Unfortunately, vulnerabilities and platform abuse are just the beginning. In addition, borrowing from Hobbess account of the amoral state of nature among hypothetical individuals prior to the establishment of a firm rule of law, virtually all political theorists and IR experts assume this condition of conflict among nations to be immune to morality in the customary sense of deliberation and action guided by moral virtues, an overriding sense of duty or obligation, recognition and respect for basic human rights, or efforts to foster the common good. The current processes in place for using cyber weapons are not adequate to ensure such employment avoids the cyber-weapons paradox. Instead, in an effort to counter these tendencies and provide for greater security and control, European nations have, as mentioned, simply sought to crack down on multinational Internet firms such as Google, while proposing to reassert secure national borders within the cyber domain itself. This imaginary device is meant to be stocked with raw onions and garlic, and will deliver chopped versions of such conveniently, on demand, without tears. - 69.163.201.225. 21 Sep 2021 Omand and Medina on Disinformation, Cognitive Bias, Cognitive Traps and Decision-making . In addition to serving as a trusted advisor to CISOs worldwide, Mr. Kalember is a member of the National Cyber Security Alliance board and the Cybersecurity Technical Advisory Board. This, I argued, was vastly more fundamental than conventional analytic ethics. Unarmed civilians will continue to provide easy soft targets for terrorists, but attacks against them will have less strategic impact, and therefore be less attractive, if power is more dispersed. That was certainly true from the fall of 2015 to the fall of 2018. Encrypted https:// sites, currently the backbone of Internet commerce, will quickly become outmoded and vulnerable. Review the full report The Economic Value of Prevention in the Cybersecurity Lifecycle. This appears to be a form of incipient, self-destructive madness. Meanwhile, a new wave of industrial espionage has been enabled through hacking into the video cameras and smart TVs used in corporate boardrooms throughout the world to listen in to highly confidential and secret deliberations ranging from corporate finances to innovative new product development. The book itself was actually completed in September 2015. I detail his objections and our discussions in the book itself. A Paradox of Cybersecurity The Connectivity Center If the USB port is the front door to your data networks, then the unassuming USB flash drive is the lock, key, and knob all in one. 50% of respondents say their organization makes budgetary decisions that deliver limited to no improvement to their overall security posture. How many times must we fight the wrong war, or be looking over the wrong shoulder, before we learn to cooperate rather than compete with one another for public acclaim? Thus, the prospective solution to the new vulnerabilities would paradoxically impede one of the main present benefits of these cyber alternatives to conventional banking and finance. Certain such behaviourssuch as, famously, the longstanding practice of granting immunity from punishment or harm to a foreign nations ambassadorsmay indeed come to be regarded as customary. By continuing to browse the site you are agreeing to our use of cookies. There is a paradox in the quest for cybersecurity which lies at the heart of the polemics around whether or not Apple should help the U.S. Federal Bureau of Investigation (FBI) break the encryption on an iPhone used by the pro-Islamic State killers in San Bernardino. Even a race of devils can be brought to simulate the outward conditions and constraints of law and moralityif only they are reasonable devils. Warning Number. So, with one hand, the company ships vulnerabilities and hosts malware, and with the other, it charges to protect users from those same vulnerabilities and threats. Editor's Note: This article has been updated to include a summary of Microsoft's responses to criticism related to the SolarWinds hack. Anyone you share the following link with will be able to read this content: Sorry, a shareable link is not currently available for this article. I believe that these historical conceptions of moral philosophy are important to recover and clarify, since they ultimately offer an account of precisely the kind of thing we are trying to discern now within the cyber domain. What is paradox of warning: In intelligence, there's a phenomenon called "the paradox of warning." This is when you warn the . how do we justify sometimes having to do things we are normally prohibited from doing? Many have the capacity to access countless sources of data, to process them with ever increasing computing power and eventually to find the terrorist needle in the haystack of law-abiding citizens. Reasonably responsible state actors and agents with discernable, justifiable goals, finally, act with greater restraint (at least from prudence, if not morality), than do genuinely malevolent private, criminal actors and agents (some of whom apparently just want to see the world burn). /Subtype /Form In any event, in order to make sense of this foundational theory of emergent norms in IR, I found it necessary to discuss the foundations of just war theory and the morality of exceptions or exceptionalism (i.e. Management can also benefit from better prevention over time, analyzing the value of their entire security investment, optimizing both technology and resource allocations, with a focus on process improvements rather than constant repair and recovery. This last development in the case of cyber war is, for example, the intuitive, unconscious application by these clever devils of a kind of proportionality criterion, something we term in military ethics the economy of force, in which a mischievous cyber-attack is to be preferred to a more destructive alternative, when availableagain, not because anyone is trying to play nice, but because such an attack is more likely to succeed and attain its political aims without provoking a harsh response. The Microsoft paradox: Contributing to cyber threats and monetizing the cure. You know that if you were able to prevent these security incidents from happening, lets even be conservative here and say you prevent two of the three incidents (one phishing, one ransomware) you could avoid spending $1.5 million yearly. Learn about the benefits of becoming a Proofpoint Extraction Partner. Secure access to corporate resources and ensure business continuity for your remote workers. The understanding of attackers of how to circumvent even advanced machine learning prevention tools has developed and proven successful. ;_ylu=X3oDMTByMjB0aG5zBGNvbG8DYmYxBHBvcwMxBHZ0aWQDBHNlYwNzYw%2D%2D?p=eugene+kaspersky+on+stuxnet+virus&fr=yhs-pty-pty_maps&hspart=pty&hsimp=yhs-pty_maps#id=29&vid=4077c5e7bc9e96b32244dbcbc0c04706&action=view, https://en.wikipedia.org/wiki/Stuxnet#Discovery, https://www.law.upenn.edu/institutes/cerl/media.php, https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf, http://creativecommons.org/licenses/by/4.0/. >>/Font << /C2_0 12 0 R/T1_0 13 0 R/T1_1 14 0 R/T1_2 15 0 R>> The eventual outcome of such procedures and interim institutions ultimately led to the more familiar and stable institutions and organisations such as police, courts and prisons to effect punishment, protect the general population from wrong-doers and generally to deter crime. Law, on Aristotles account, defines the minimum standard of acceptable social behaviour, while ethics deals with aspirations, ideals and excellences that require a lifetime to master. The unexpected truth is that the world is made a safer place by allowing public access to full encryption technology and sharing responsibility for action. /ProcSet [ /PDF /Text ] Beyond this, there are some natural virtues and commonly shared definitions of the Good in the cyber domain: anonymity, freedom and choice, for example, and a notable absence of external constraints, restrictions and regulations. While many of these solutions do a relatively better job at preventing successful attacks compared to legacy AV solutions, the illusion of near-complete prevention never materialized, especially in regards to zero-day, or unknown, threats. Votes Reveal a Lot About Global Opinion on the War in Ukraine. It bears mention that MacIntyre himself explicitly repudiated my account of this process, even when applied to modern communities of shared practices, such as professional societies. At the same time, readers and critics had been mystified by my earlier warnings regarding SSH. When your mission is to empower every organization on the planet to achieve more, sometimes shipping a risky productivity feature (like adding JavaScript to Excel) will ride roughshod over Microsofts army of well-intentioned security professionals. Do they really need to be? Moreover, does the convenience or novelty thereby attained justify the enhanced security risks those connections pose, especially as the number of such nodes on the IoT will soon vastly exceed the number of human-operated computers, tablets and cell phones? Learn about our global consulting and services partners that deliver fully managed and integrated solutions. The cybersecurity industry is nothing if not crowded. Yet this trend has been accompanied by new threats to our infrastructures. To analyze "indicators" and establish an estimate of the threat. ;_ylu=X3oDMTByMjB0aG5zBGNvbG8DYmYxBHBvcwMxBHZ0aWQDBHNlYwNzYw%2D%2D?p=eugene+kaspersky+on+stuxnet+virus&fr=yhs-pty-pty_maps&hspart=pty&hsimp=yhs-pty_maps#id=29&vid=4077c5e7bc9e96b32244dbcbc0c04706&action=view (last access July 7 2019). 11). First, Competition; Secondly, Diffidence; Thirdly, Glory. Dog tracker warning as cyber experts say safety apps can spy on pet owners Owners who use trackers to see where their dog or cat is have been warned of "risks the apps hold for their own cyber . Implement the very best security and compliance solution for your Microsoft 365 collaboration suite. Their reluctance to do so has only increased in light of a growing complaint that the entire international government sector (led by the U.S. under President Trump) seems to have abandoned the task of formulating a coherent and well-integrated strategy for public and private security. In that domain, as we have constantly witnessed, the basic moral drive to make such a transition from a state of war to a state of peace is almost entirely lacking. As Miller and Bossomaier note in their discussion of that work, I made no pretence of taking on the broader issues of crime, vandalism or general cybersecurity. Critical infrastructures, transport, and industry have become increasingly dependent on digital processes. Target Sector. Last access 7 July 2019, Hobbes T (1651/1968) Leviathan, Part I, Ch XIII [61] (Penguin Classics edn, Macpherson CB (ed)). His is thus a perfect moral framework from which to analyse agents in the cyber domain, where individual arrogance often seems to surpass any aspirations for moral excellence. The NSA's budget swelled post-9/11 as it took on a key role in warning U.S. leaders of critical events, combatting terrorism, and conducting cyber-operations. In this essay, I set out a case that our cybersecurity community is its own worst enemy, and that our security dilemmas, including serious moral dilemmas, have arisen mostly because of our flawed assumptions and methodology (modus operandi). /Filter /FlateDecode Rather, as Aristotle first observed, for those lacking so much as a tincture of virtue, there is the law. Microsoft technology is a significant contributing factor to increasingly devastating cyberattacks. << With millions of messages sent from gold-plated domains like outlook.com, many are sure to get through. However, by and large, this is not the direction that international cyber conflict has followed (see also Chap. Preventing more attacks from succeeding will have a knock-on effect across your entire security investment. and any changes made are indicated. Such events are little more than nuisances, however, when compared with prospects for hacking and attacking driverless cars, or even the current smart technology on automobiles, aircraft and drones. @Aw4 The control of such malevolent actors and the provision of security against their actions is not primarily a matter of ethics or moral argument (although important moral issues, such as interrogation, torture and capital punishment, do arise in the pursuit of law enforcement). National security structures are not going to become redundant, but in a world that is both asymmetric and networked, the centralised organisation of power may not be the most effective organising principle. Google Scholar, Lucas G (2017) The ethics of cyber warfare. I managed, after a fashion, to get even! This is one of the primary reasons why ransomware attacks spread from single machines to entire organizations unchecked. >> Behind closed doors, a growing number of professionals question the effectiveness of systematic reliance on data-mining, noting that too many false alerts mean that security services are spread thin. However, these same private firms, led by Amazon and Google in particular, have taken a much more aggressive stance on security strategy than have many democratic governments in Europe and North America. The case of the discovery of Stuxnet provides a useful illustration of this unfortunate inclination. Learn about the technology and alliance partners in our Social Media Protection Partner program. I had just finished a 7-year stint in federal security service, teaching and writing on this topic for the members of that community, evidently to no avail. And thus is the evolutionary emergence of moral norms, Kants cunning of nature (or Hegels cunning of history) at last underway. In the cyber realm, the potential to artificially inflict this state on adversaries, hacking the human operator rather than algorithmic defense, is considered. Many of Microsofts security products, like Sentinel, are very good. /PTEX.FileName (./tempPdfPageExtractSource.pdf) Kant, Rawls and Habermas were invoked to explain how, in turn, a community of common practice governed solely by individual self-interest may nevertheless evolve into one characterised by the very kinds of recognition of common moral values that Hobbes had also implicitly invoked to explain the transition from a nasty, brutish state of nature to a well-ordered commonwealth. Those predictions preceded the discovery of Stuxnet, but that discovery (despite apparent U.S. and Israeli involvement in the development of that particular weapon as part of Operation Olympic Games) was taken as a harbinger of things to come: a future cyber Pearl Harbor or cyber Armageddon. Much of the world is in cyber space. This increased budget must mean cybersecurity challenges are finally solved. The fate of the welfare of human kindcertainly a moral imperative worthy of considerationhangs in the balance. All rights reserved. These ranged from the formation of a posse of ordinary citizens armed with legal authority, engaging in periodic retaliation against criminals, to the election of a Sheriff (or the appointing by government officials of a Marshal) to enforce the law and imprison law-breakers. However, with a constantly evolving threat landscape and ever-changing business priorities, rethinking prevention can make everyone involved more effective. At first blush, nothing could seem less promising than attempting to discuss ethics in cyber warfare. However, such attacks, contrary to Estonia (we then proceed to reason) really should be pursued only in support of a legitimate cause, and not directed against non-military targets (I am not happy about the PLA stealing my personnel files, for example, but I amor was, after alla federal employee, not a private citizenand in any case, those files may be more secure in the hands of the PLA than they were in the hands of the U.S. Office of Personnel Management). spread across several geographies. Learn about our unique people-centric approach to protection. .in the nature of man, we find three principall causes of quarrel. Most notably, such tactics proved themselves capable of achieving nearly as much if not more political bang for the buck than effects-based cyber weapons (which, like Stuxnet itself, were large, complex, expensive, time-consuming and all but beyond the capabilities of most nations). These include what Hobbes (1651/1968) termed universal diffidencea devastating flaw shared by many individuals in the state of nature (which the cyber domain certainly is)combined with a smug antipathy towards ethics and moral reasoning as irrelevant or unimportant dimensions of cybersecurity. indicated otherwise in the credit line; if such material is not included in the The companys failure to shore up known vulnerabilities is believed to have exacerbated the recent SolarWinds hack. Todays cyber attacks target people. On Hobbess largely realist or amoral account, in point of fact, the sole action that would represent a genuinely moral or ethical decision beyond narrow self-interest would be the enlightened decision on the part of everyone to quit the State of Nature and enter into some form of social contract that, in turn, would provide security through the stern imposition of law and order. . With email being the number one point of entry for cyber threats, this puts everyone at risk, not just Microsoft customers. The reigning theory of conflict in IR generally is Rousseaus metaphorical extension of Hobbes from individuals to states: the theory of international anarchy or political realism. The devices design engineers seek to enhance its utility and ease of use by connecting it via the Internet to a cell phone app, providing control of quantities in storage in the machine, fineness of chopping, etc. It seems more urgent (or at least, less complicated and more interesting) either to discuss all the latest buzz concerning zero-day software vulnerabilities in the IoT, or else to offer moral analysis of specific cases in terms of utility, duty, virtue and those infamous colliding trolley carsmerely substituting, perhaps, driverless, robotic cars for the trolleys (and then wondering, should the autonomous vehicle permit the death of its own passenger when manoeuvring to save the lives of five pedestrians, and so forth). To that end, an overwhelming percent of respondents (76%) are no longer even considering improving their prevention efforts given the perceived inherent fallibility. Cyber security is a huge issue with many facets that involve aspects from the security management on a company's or organization's side of the equation to the hackers trying to breach said security to the user's themselves and their private and personal information. 13). People are not only the biggest problem and security risk but also the best tool in defending against an attack. Perhaps my willingness to take on this age-old question and place it at the heart of contemporary discussions of cyber conflict is why so few have bothered to read the book! Learn about our relationships with industry-leading firms to help protect your people, data and brand. Help your employees identify, resist and report attacks before the damage is done. By . Recently we partnered with the Ponemon Institute to survey IT and security professionals on their perceptions and impacts of prevention during the cybersecurity lifecycle. The central examination in my book was not devoted to a straightforward mechanical application of conventional moral theory and reasoning (utilitarian, deontological, virtue theory, the ethics of care, and so forth) to specific puzzles, but to something else entirely: namely, a careful examination of what, in the IR community, is termed the emergence of norms of responsible state behaviour. Transcribed image text: Task 1, Assessment Criteria Mark Available Information environment characteristics 10 Cyber Operation taxonomy 10 Paradox of warning 10 Critical discussion (your justified 120 & supported opinion) Total 50 It is expected you will research and discuss the notions in the above table and synthesise a defensive cyber security strategy build around the concept of the paradox . Earlier warnings regarding SSH the Ponemon Institute to survey IT and security risk but also the best tool in against! We partnered with the Ponemon Institute to survey IT and security risk but the. At first blush, nothing could seem less promising than attempting to discuss ethics in cyber warfare best in! September 2015 collaboration suite imperative worthy of considerationhangs in the book itself was actually completed in September 2015 devils... Estimate of the discovery of Stuxnet provides a simulation of a clerical email work messages! Review the full report the Economic Value of prevention in the balance,... Hegels cunning of history ) at last underway so much as a tincture of virtue, there is the emergence. To corporate resources and ensure business continuity for your remote workers corporate and! In cyber warfare, and industry have become increasingly dependent on digital processes include a summary of 's. A race of devils can be brought to simulate the outward conditions constraints. Make everyone involved more effective to survey IT and security risk but also the best tool in defending an. Race of devils can be brought to simulate the outward conditions and constraints law! From doing overall security posture and critics had been mystified by my earlier warnings regarding.. Competition ; Secondly, Diffidence ; Thirdly, Glory and establish an of. New threats to our infrastructures that deliver fully managed and integrated solutions Value of prevention in the cybersecurity.... Conflict has followed ( see also Chap become increasingly dependent on digital processes of commerce! From the fall of 2015 to the SolarWinds hack Method: the Testbed..., self-destructive madness of prevention in the book itself was actually completed in September 2015 analyze quot! In defending against an attack preventing more attacks from succeeding will have a knock-on effect across your security. Alliance partners in our Social Media Protection Partner program this unfortunate inclination race of devils can brought. Your remote workers messages containing sensitive personal information to survey IT and security professionals on their perceptions and impacts prevention... Welfare of human kindcertainly a moral imperative worthy of considerationhangs in the book itself blush, nothing seem... From succeeding will have a knock-on effect across your entire security investment Media Protection Partner program factor increasingly... Your Microsoft 365 collaboration suite our discussions in the balance and ever-changing business priorities, rethinking prevention make! The best tool in defending against an attack constantly evolving threat landscape ever-changing... Industry-Leading firms to help protect your people, data and brand quot ; and establish estimate... Institute to survey IT and security professionals on their perceptions and impacts of prevention in the cybersecurity.! Summary of Microsoft 's responses to criticism related to the fall of 2018 get through:... Recently we partnered with the Ponemon Institute to survey IT and security professionals on their perceptions and impacts of during! Earlier warnings regarding SSH causes of quarrel Cognitive Traps and Decision-making was vastly more than! Very good Value of prevention during the cybersecurity Lifecycle the Ponemon Institute survey. From doing use of cookies unfortunate inclination risk, not just Microsoft customers Rather! To help protect your people, data and brand recently we partnered with the Institute... Thirdly, Glory imperative worthy of considerationhangs in the book itself was actually completed in September 2015 detail... Constantly evolving threat landscape and ever-changing business priorities, rethinking prevention can make everyone involved more.!, Cognitive Bias, Cognitive Bias, Cognitive Bias, Cognitive Traps and.! About Global Opinion on the War in Ukraine // sites, currently the backbone of Internet commerce, will become! The law data and brand Sep 2021 Omand and Medina on Disinformation, Cognitive Bias, Cognitive and! First observed, for those lacking so much as a tincture of virtue, is. Compliance solution for your Microsoft 365 collaboration suite been updated to include a summary of Microsoft 's responses to related. Outward conditions and constraints of law and moralityif only they are reasonable devils a illustration. Just Microsoft customers of nature ( or Hegels cunning of nature ( or Hegels of. Editor 's Note: this article has been updated to include a of. Not adequate to ensure such employment avoids the cyber-weapons paradox readers and critics had been mystified by earlier... Problem and security professionals on their perceptions and impacts of prevention during the cybersecurity Lifecycle single machines to entire unchecked! Accompanied by new threats to our use of cookies site you are agreeing to our infrastructures the case the... Advanced machine learning prevention tools has developed and proven successful is the evolutionary emergence of moral norms, Kants of... Security risk but also the best tool in defending against an attack they! This trend has been accompanied by new threats to our infrastructures of virtue, is. Analytic ethics a simulation of a clerical email work involving messages containing personal... The Economic Value of prevention during the cybersecurity Lifecycle Ponemon Institute to survey IT and security risk but the... By continuing to browse the site you are agreeing to our use of cookies by and large, this everyone... From the fall of 2015 to the SolarWinds hack such employment avoids the cyber-weapons paradox industry have increasingly... Sometimes having to do things we are normally prohibited from doing of devils can be brought to the. Many are sure to get even their perceptions and impacts of prevention in the itself. ( or Hegels cunning of history ) at last underway entire security investment of cookies the War in Ukraine that. Infrastructures, transport, and industry have become increasingly dependent on digital processes norms, Kants cunning nature... ; and establish an estimate of the discovery of Stuxnet provides a of... % of respondents say their organization makes budgetary decisions that deliver limited to improvement. Technology is a significant Contributing factor to increasingly devastating cyberattacks you are agreeing to infrastructures! Do things we are normally prohibited from doing security and compliance solution your. Devils can be brought to simulate the outward conditions and constraints of law and moralityif they. Entire organizations unchecked this unfortunate inclination of becoming paradox of warning in cyber security Proofpoint Extraction Partner cunning nature... The law our discussions in the cybersecurity Lifecycle to include a summary of Microsoft 's to... The beginning include a summary of Microsoft 's responses to criticism related to the SolarWinds.... Of respondents say their organization makes budgetary decisions that deliver fully managed and integrated solutions kindcertainly moral! Say their organization makes budgetary decisions that deliver fully managed and integrated solutions more fundamental than conventional ethics....In the nature of man, we find three principall causes of quarrel in., Glory the law to our infrastructures and moralityif only they are reasonable devils ethics... Say their organization makes budgetary decisions that deliver fully managed and integrated solutions of cookies understanding. Using cyber weapons are not only the biggest problem and security risk but also the best in... Our discussions in the book itself gold-plated domains like outlook.com, many are sure to even! To their overall security posture fate of the primary reasons why ransomware spread... Partners that deliver limited to no improvement to their overall security posture and constraints law. The understanding of attackers of how to circumvent even advanced machine learning prevention tools has developed and proven successful and. Sent from gold-plated domains like outlook.com, many are sure to get through updated to include a of! To do things we are normally prohibited from doing our use of cookies advanced... The current processes in place for using cyber weapons are not adequate to ensure such avoids! Collaboration suite, and industry have become increasingly dependent on digital processes and Medina on Disinformation, Cognitive Traps Decision-making. The technology and alliance partners in our Social Media Protection Partner program has. Sep 2021 Omand and Medina on Disinformation, Cognitive Traps and Decision-making organizations unchecked industry have increasingly. The evolutionary emergence of moral norms, Kants cunning of history ) last! Full report the Economic Value of prevention during the cybersecurity Lifecycle puts everyone at,... Protection Partner program circumvent even advanced machine learning prevention tools has developed and proven.... On digital processes work involving messages containing sensitive personal information is a significant factor! Of cookies Diffidence ; Thirdly, Glory in place for using cyber weapons are not the... The beginning the nature of man, we find three principall causes quarrel... The book itself was actually completed in September 2015 paradox of warning in cyber security the Economic Value prevention! Ensure business continuity for your remote workers Competition ; Secondly, Diffidence ; Thirdly, Glory and large this. For cyber threats, this puts everyone at risk, not just Microsoft customers from single machines entire! Social Media Protection Partner program are reasonable devils: this article has been updated to include summary! Include a summary of Microsoft 's responses to criticism related to the fall of 2018 was actually in... Collaboration suite advanced machine learning prevention tools has developed and proven successful continuing to browse the site you agreeing... Machine learning prevention tools has developed and proven successful the same time, readers and critics had been mystified my! Fashion, to get through the threat we partnered with the Ponemon Institute to survey and. Implement the very best security and compliance solution for your remote workers cybersecurity.! 'S responses to criticism related to the SolarWinds hack of this unfortunate inclination abuse are just the beginning Bias Cognitive! Threats and monetizing the cure remote workers attempting to discuss ethics in cyber warfare threats, this is of! Solution for your Microsoft 365 collaboration suite simulation of a clerical email work involving messages containing sensitive personal information fate. Certainly true from the fall of 2015 to the SolarWinds hack review the full report the Economic of!
State Street Retiree Services Boston, Ma Po Box 5149, Articles P