IS THERE SUCH A THING AS A VIOLENT ACT IN CYBERSPACE?

Size: px
Start display at page:

Download "IS THERE SUCH A THING AS A VIOLENT ACT IN CYBERSPACE?"

Transcription

1 IS THERE SUCH A THING AS A VIOLENT ACT IN CYBERSPACE? By Michael Turner International Security and Intelligence Summer School 2013 Pembroke College University of Cambridge

2 INTRODUCTION Thomas Rid, in his paper Cyber War Will Not Take Place (1), claims that of all the cyberattacks that have taken place, none so far have been violent. Rid claims that Cyber war has never happened in the past. Cyber war does not take place in the present. And it is highly unlikely that cyber war will occur in the future. And part of that claim is the belief that cyberattacks are not violent: the causal chain that links somebody pushing a button to somebody else being hurt is mediated, delayed, and permeated by chance and friction. I however think Rid focuses too much on the method of the cyberattack when analysing the level of violence and he does not consider all of the consequences of a cyberattack. I get the feeling Rid thinks the link between the initial attack across the network and the indirect damage done to individuals and structures in the physical world is too loose and therefore it s inappropriate to claim cyberattacks are violent. J. Lewis does a better job at expressing the opposite view to Rid in the paper for the Center for Strategic and International Studies (2): the weapon is, for all practical purposes, intangible, tiny electrical pulses whose lethality comes not from their own innate destructive capacity but from the ability to instruct other tangible systems to malfunction. I will stress however that the purpose of the this paper is not to go up against Rid s main conclusion that cyberwar will not take place others have already responded to Rid, for example Cyber War is Inevitable (Unless We Build Security In) by Gary McGraw (3). Instead I will just focus on assessing the violence of a cyberattack, if at all violent, whether that s a hypothetical or a historical cyberattack. In this paper I will explain how I d like to define cyberspace and I will explain that the important aspects when assessing the level of violence of a cyberattack are the consequences and not the methods or mechanisms of the attack. I will look at what violence is in the physical world and then apply that knowledge to assess the violence of several hypothetical and historical cyberattacks, with a more in-depth look at the Stuxnet attack. However, I am not going to talk about cybercrime or cyberespionage, these topics fall outside the scope of this paper. WHAT IS CYBERSPACE? Having looked at several explanations of cyberspace I personally think the clearest and simplest to understand explanation is by Lior Tabansky (4). Tabansky doesn t try to concise the explanation to a sentence; Tabansky instead takes time to explain cyberspace in terms of 3 separate layers. Tabansky describes the first layer as being the physical layer, which contains physical objects such as processors, storage devices and communications infrastructure etc. that are capable of providing the physical infrastructure for the other 2 layers. Sitting on top of the physical layer are the software layer and the data layer; the software layer being the programs and the set of instructions that a computing device follows and the data layer is the information that a computer stores and uses within the computer s programs. As there is only one aspect of cyberspace that is rooted in the physical world, cyberspace is a very different space to the physical world we live in. The behaviour within cyberspace can differ greatly to

3 the physical world. Hence, what can be described as cyberwarfare, cyberattacks, cyberespionage or cybercrime can look very different to the actions without the prefix cyber, despite the cyber version being the cyberspace analogy of the physical world action. VIOLENCE IN THE PHYSICAL WORLD Violence is not an easy word to define, and what levels of violence are acceptable change over time and vary across the world, as the World Health Organization states in the World Report on Violence and Health (5): A generation ago, for instance, the cane was a regular part of discipline in British schools, used to beat pupils on the buttocks, legs or hands. Today a teacher in Great Britain can be prosecuted for using physical restraint of any kind on a child. Despite acknowledging the ever changing tolerance of violence, the World Health Organization then go on to define violence in their report as: "the intentional use of physical force or power, threatened or actual, against oneself, another person, or against a group or community, that either results in or has a high likelihood of resulting in injury, death, psychological harm, maldevelopment, or deprivation." However the Oxford English Dictionary (6) regards violence to not just be restricted to the harm of someone, but also something. Thus it encompasses more than the WHO s definition. The definition given by the WHO is a good definition of violence, although I will also consider the damage to physical objects as violent. However I don t think we can split actions into violent actions and non-violent actions. I think violence is a continuous scale of intensity. Within the British legal system we have acknowledgement of the different levels of intensity as can be seen by the progression: common assault, ABH, GBH, manslaughter and murder. If there was just a violent act or a non-violent act would they not all bring the same penalty if they were all classed as violent? To try and find a definition of violence when there is this intensity scale of violence would amount to finding the fine line that then separates a violent act from non-violent act. I think this is the wrong approach, as the perception of where that line is will depend on person to person, country to country and will inevitably change over time. Within this paper I will not worry too much about whether an act is violent or not, but instead concentrate more on comparing different cyberattacks and finding their relative intensity of violence. Looking at violence in cyberspace is not easy however, as humans can not directly be harmed by cyberattacks we are not elements of cyberspace. This is also true of every other animal, plant, rock etc. on this planet. Hence in cyberspace, we are not looking at the direct attack to see how violent the act is but instead the indirect consequences of the attack. Events are often undetected until after the damage is done, the attack itself may take only a fraction of a second to complete its task, and its direct impacts may be unclear (7). For example in a hypothetical scenario, forcing components in a hospital s electrical power system to malfunction causes direct harm to those components, but the indirect harm could be that individuals within that hospital that are on a life

4 support system may die and patients in need of urgent medical care that would be expected to survive could die as a result of the inability of the hospital staff to provide the care that they would be able to provide under normal circumstances. In this case I would say the cyberattack had caused the loss of life and so is can be considered an especially violent act. This is I think a problem with assessing the intensity of the violence of a cyberattack, before the attack happens we are merely speculating on how much harm it will incur but even after an attack has happened we will be trying to judge which parts of the damage that have occurred can be explained by the attack. If it was just direct consequences then it would be easier, but the harm it causes to individuals and structures will always be secondary and indirect. To highlight this, think of the effects of a nuclear weapon; it has the immediate effect, the effect of the initial explosion which directly destroys individuals and structures, but there is also the lasting nuclear fallout which continues to cause harm indirectly long after the event has taken place. In this example we can see both the direct and indirect consequences. DISTRIBUTED DENIAL OF SERVICE AND PORT BLOCKADES There are many different types of cyberattacks, but in this section I m going to argue that the cyberattack is not what s important in deciding just how violent the attack is, but rather the important aspects to consider are intended targets and the potential consequences of the cyberattack. The method of the cyberattack is not important in assessing the level of violence. In this section I m going to focus on distributed denial of service (DDoS) attacks. I will show that different levels of violence can be inflicted by just one method, highlighting that the method does not itself decribe the level of violence. DDoS attacks are types of attacks that do not force the physical elements in cyberspace to malfunction but instead shut down a software or network service. The direct consequences of DDoS attacks only affect the virtual software and data layers of cyberspace and not the physical layer, so we could think of DDoS attacks as being the least violent type of cyberattack. I will show that this is irrelevant however as it is the overall consequences, direct and indirect, that matter. As part of Rid s (1) claims that cyberattacks aren t violent, Rid quotes Andrus Ansip to reason that DDoS cyberattacks are non-violent. Andrus Ansip, then Estonia s prime minister, asked, What s the difference between a blockade of harbours or airports of sovereign states and the blockade of government institutions and newspaper websites? It was of course a rhetorical question. Yet the answer is simple: unlike a naval blockade, the mere blockade of websites is not violent, not even potentially; unlike a naval blockade, the DDoS attack was not instrumentally tied to a tactical objective, but an act of undirected protest; and unlike ships blocking the way, the pings remained anonymous, without political backing. Here Rid focuses on the method of the blockade, pings against ships. DDoS attacks and traditional blockades both stop a service from running for a certain amount of time and so are comparable in

5 that sense. However a blockade is aimed at shutting off trade, whereas a DDoS attack is a general attack that is not confined to stopping just trade. We could launch a DDoS on a TV service and therefore stop people that use that TV service from watching TV, this would not cause harm to anyone and I think could be classed as not showing any violence. Alternatively we could shut down an internet banking service, denying individuals and companies with access to their money. Depending on the amount of time that the service was down for this could be considered violent if people struggle get their money out to buy the necessities of life (food etc.). Or a DDoS attack could be more serious if we shut down a telephony service such as the emergency services, then people who could ordinarily be rescued and saved from fire, illness or injury would not get the help they required and preventable harm would not be prevented. But these examples of violence have only a loose connection to the attack and claiming some level of violence is sketchy. If however an air traffic control system was attacked, the result could be catastrophic for the aircraft involved and the passengers and crew. In an article in New Scientist (8) they talk about the vulnerabilities of air traffic control systems in a different way, but it also claims that ADS-B uses GPS signals to continuously broadcast a plane's identity, ground position, altitude and velocity to networks of ground stations and other nearby aircraft. And so the ADS-B service is a service listening to signals, therefore it can be targeted by DDoS attacks. A target such as an air traffic control system has the potential to cause a significant amount of destruction and loss of life. I would argue that this is a very violent act. The target of the DDoS attack and the effects of that service being prevented from running are the important aspects to consider when assessing the intensity of the violence of the attack. If a DDoS attack causes damage, destruction, harm or loss of life, I argue that it should be considered violent. The intensity of which should be evaluated by the scale of the harm caused. The method may seem non-violent, even the direct effects don t damage physical components, but I argue that it is the overall effects that should concern us. As hopefully you can see from the hypothetical examples above, the level of violence varies dramatically because of the varying target of the attack and therefore consequences of the attack For a historical example consider the attacks on Estonia in 2007, for the story of what happened see Joshua Davis article in Wired Magazine (9). Within this and from the news articles at the time, including this one from the guardian (10), there is no sign of any damage being done or harm coming to any individual. As the level of destruction would have hit the headlines at the time I m inclined to say that there was no harm done, however this is obvious inconclusive. The attacks (DDoS attacks on government and media websites) were quickly contained. This sort of attack caused alarm but did not cause harm and so I would judge this to not be a violent attack. The intent also seems to be a protest at the government for the removal of a statue, not to cause harm to anyone in Estonia. And the intent is something that should come into consideration too when assessing the violence of a cyberattack.

6 INTENT AND VIOLENCE The definition of violence used by the WHO (stated above) states that violence is an intentional act. This then gives several cases where the intended outcome is different to the actual outcome in one way or another. I will talk about these cases in the cyberattack setting. Consider a cyberattack where the intention is to harm, but the outcome is less than expected. The intention was there to begin with, and the will was there to harm, but for some reason the attack did not achieve what it set out to achieve. This could be because of better than expected cyberdefences by the target or because the aggressors did not have the skills to achieve the outcome, or maybe just because of unexpected variations and unpredictability in performance of components and/or software. I liken this situation to attempted-murder. The intent was there but the outcome didn t happen the way it was planned. In my opinion this doesn t make it any less violent, if the attackers were more skilled or maybe luckier, then the desired damage would take place and we would consider it a violent act. The aggressor s lack of skills to carry out the task does not make it any less violent. Similarly consider a cyberattack where the outcome causes greater harm than the intended level of harm. Perhaps there were unforeseen consequences that the aggressor failed to take into account, or the methods were more effective than anticipated. In this case I think of it as an inability to control intended destruction and I liken this to manslaughter, the intent was less than the outcome. It then comes down to your background and country of origin as to whether we view this as a less violent act because the intentions were not to cause so much harm. I would argue that it isn t less violent, especially in cyberattacks where the consequences could be quite severe if a vital infrastructure is taken down. In an article written at the time by CNN on the USA s Aurora project (11), Meserve says that if one third of the US electricity grid goes down, that is equivalent to hurricanes. This is obviously a news article playing on fear and the accuracy should not be taken as truth, but it highlights that there could be serious consequences to come out of cyberattacks and those that are unleashing cyberattacks should take into account the total damage and harm that can be caused by a cyberattack. HOW VIOLENT WAS THE STUXNET ATTACK? Stuxnet was arguably the most sophisticated cyberattack from history. Ralph Langer (12), Sharon Weinberger (13) and the report by the Institute for Science and International Security (14) all give good overviews of the Stuxnet attack. But how violent was the Stuxnet attack? As I ve stated before, I m not going to concern myself with the methods used in cyberattacks, no matter how sophisticated and interesting they are, as is the case with Stuxnet. The important aspects to consider when assessing the intensity of violence of a cyberattack are the intent of the aggressor and the outcome of the attack. The target of the Stuxnet attack was very specific; it was after very specific Siemens industrial control systems and in particular the programmable logic controllers to alter the speed of the delicate centrifuges of nuclear facilities, causing the centrifuges to malfunction. The target is claimed

7 to be the Iranian uranium enrichment facility in Natanz, 60% of the infected devices were in Iran (13). It caused physical damage to the centrifuges, which then needed replacing. It was the first cyberattack in history that caused physical damage all by itself. The outcome then was a low intensity of violence, no individual got hurt but there was a small amount of physical damage caused to complex components of Iran s nuclear facilities. Judging the intent is more difficult though. Nobody has come out and claimed responsibility for the cyberattack and nobody has stated the real purpose of the attack, there is only speculation. The report by the Institute for Science and International Security (14) says: in the event of a malfunction, the safety systems are designed to quickly empty the centrifuges of uranium hexafluoride. Symantec stated in a comment to ISIS that its researchers found no code in Stuxnet that would block the dumping of uranium hexafluoride from the centrifuges. The report then goes on to say: If its goal was to quickly destroy all the centrifuges in the FEP, Stuxnet failed. But if the goal was to destroy a more limited number of centrifuges and set back Iran s progress in operating the FEP, while making detection difficult, it may have succeeded, at least temporarily. These quotes seem to hint that Stuxnet was not trying to cause an explosion or cause serious damage, but merely to slow down Iran s research and development. This is backed up by an article in Breaking Defence (15) that defends the Stuxnet attack by claiming that it actively aimed to limit collateral damage. This may be further backed up an article by Robertson (16) which summarises the Symantec technical report Stuxnet 0.5: The missing Link (17), Robertson s article claims that Stuxnet originally was going to target the gas valves in the nuclear facility potentially causing an explosion. These arguments point to the intent of the attack to be contained to only Iran s nuclear facilities and to not cause massive damage but to slow the research and development of nuclear enrichment, a potential precursor to the development of nuclear weapons. However Stuxnet did spread outside of Iran (let us assume that Iran was the intended target), potentially causing damage outside of Iran. An article in Ars Technica (18) claims that the creators of Stuxnet lost control of the worm and it spread much further than intended (this is possibly exaggerated). This is however backed up by the quote Stuxnet appears to have spread unintentionally and well beyond its targets from the report by the Institute for Science and International Security (14). What is worrying is the impact that Stuxnet might have on the world if some actor wants to use Stuxnet as a basis to create their own malware to bring down power grids, water systems or other vital infrastructures. As said in Sharon Weinberger s article (13), Stuxnet essentially laid out a blueprint for future attackers to learn from and perhaps improve. Stuxnet appears to be an extremely targeted cyberattack; Stuxnet did not affect other nuclear facilities outside of Iran. It appears that the attack was not intended to cause massive destruction or harm individuals (we could claim that it should be classed as cybersabotage). Hence I would class the violence of Stuxnet as low intensity.

8 CONCLUSION I think that when assessing the intensity of the violence of a cyberattack, we should base this assessment on the outcomes and effects of the attack, including indirect consequences, and not on the actual method. This way we can assess the violence of a cyberattack in the same manner that we would assess the intensity of the violence of an act taken outside of cyberspace. We base the assessment on how many individuals and other objects are harmed or damaged and to what degree they are affected. Mirroring the assessment of violence outside of cyberspace, the assessment should take into account the intent of the aggressor, although this may be more difficult in cyberspace as sometimes the aggressor is unknown as their identity has been concealed. I see cyberspace as just another space to do battle in. Just like how the invention of aircraft brought about another space to do battle in, cyberspace is again providing states with a space to form attacks within. I think states will seek to control cyberspace just as they sought to control the skies decades ago. The difference is that the direct effects of the attacks don t result in explosions and loud noises, instead they subtly affect devices connected to cyberspace, and so it s easy to be fooled into thinking that cyberattacks are not violent. The violent aspects of a cyberattack will be very similar to violent acts outside of cyberspace but the mechanisms and methods will be different. Randretsa articulates it well in the article Violence and Cyberspace (19) by saying Just as chemical or biological weapons and neutron bombs, a computer network weapon is likely to cause violence despite the absence of kinetic energy. Although Randretsa then goes on to conclude in the article that ultimately, it seems that the advent of cyberwar constitutes a break with the way that war has been waged so far, a war based on physical violence. Such a virtual fight avoiding death and destruction should be welcomed. This I think is naïve and contradictory, Randretsa claims that cyberweapons can cause violence and then welcomes cyberwar with the thinking that no violence will come of it. I would go the opposite way and say that in the future we are more at risk. We are more at risk because of the spreading of advanced cyberweapons that can be picked up and modified by people who aren t interested in keeping the harm contained and the collateral damage minimized. This then endangers citizens who could become the target. We are also connecting more and more devices to the internet and therefore to cyberspace. I agree with Langø, who says in the paper Defining War and Warfare in Cyberspace (20) Because of the seemingly unstoppable drift towards more and more connectivity, we as a society are becoming increasingly dependent on cyberspace. Due to the inherently weak defensive aspect of cyberspace, it is said that increased vulnerability is the inevitable result of increased dependency. Smart cities, smart grids, smart homes etc. all require dumb devices to be connected to the internet, placing the previously isolated systems at risk. Moreover, the inexpensive nature of cyberweapons mean that it s going to be more than the just the state acting in a violent way in cyberspace, non-state actors will play a part in this story. Unfortunately I think with the expansion of cyberspace and development of exciting new technologies, the opportunities for cyberattacks by the aggressors in the world are much greater, and so there will be more potential for violent acts in the future.

9 BIBLIOGRAPHY 1. Cyber War Will Not Take Place. Rid, Thomas. 1, 2012, Journal of Strategic Studies, Vol. 35, pp Lewis, James Andrew. Thresholds for Cyberwar. Center for Strategic and International Studies. September Cyber War is Inevitable (Unless We Build Security In). McGraw, Gary. 1, 2013, Journal of Strategic Studies, Vol. 36, pp Basic Concepts in Cyber Warfare. Tabansky, Lior. 1, May 2011, Military and Strategic Affairs, Vol. 3, pp World Health Organization. World Report on Violence and Health. Geneva : World Health Organization, Oxford Dictionaries. [Online] Oxford University Press, Richardson, John C. Stuxnet as Cyberwarfare: Applying the Law of War to the Virtual Battlefield. [Online] Social Science Research Network, July or 8. Marks, Paul. Air traffic system vulnerable to cyber attack. [Online] New Scientist, September Davis, Joshua. Hackers Take Down the Most Wired Country in Europe. [Online] Wired Magazine, August Traynor, Ian. Russia accused of unleashing cyberwar to disable Estonia. [Online] The Guardian, May Meserve, Jeanne. Sources: Staged cyber attack reveals vulnerability in power grid. [Online] CNN, September Stuxnet: Dissecting a Cyberwarfare Weapon. Langner, Ralph. 3, May-June 2011, Security & Privacy, IEEE, Vol. 9, pp Is this the start of cyberwarfare? Weinberger, Sharon. 2011, Nature, Vol. 474, pp Albright, David, Brannan, Paul and Walron, Christina. Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? [Online] December Freedberg jr., Sydney J. Cyber Command Lawyer Praises Stuxnet, Disses Chinese Cyber Stance. [Online] March

10 16. Robertson, Jordan. Stuxnet Had Earlier, Potentially Explosive Version, Symantec Says. [Online] February McDonald, Geoff, et al., et al. Stuxnet 0.5: The Missing Link. s.l. : Symantec, Anderson, Nate. Confirmed: US and Israel created Stuxnet, lost control of it. [Online] Ars Technica, June Randretsa, Thierry. Violence and Cyberspace. [Online] Revue Defense Nationale, Langø, Hans-Inge. Defining War and Warfare in Cyberspace. [Online] Hegemonic Obsessions, November Parks, Raymond C and Duggan, David P. Principles of Cyberwarfare. IEEE Security and Privacy. September 2011, pp The Ethics of Cyberwarfare. Dipert, Randall R. 4, 2010, Journal of Military Ethics, Vol. 9, pp Lab, Kaspersky. Kaspersky Lab Identifies Operation Red October, an Advanced Cyber- Espionage Campaign Targeting Diplomatic and Government Institutions Worldwide. [Online] January ber_an_advanced_cyber_espionage_campaign_targeting_diplomatic_and_government_institution s_worldwide.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information

More information

Research Note Engaging in Cyber Warfare

Research Note Engaging in Cyber Warfare Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines

More information

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. Cyberterror Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. What are terrorists main uses of cyberspace? How does cyberterror

More information

Conference Call with Dr. Olli Heinonen Transcript

Conference Call with Dr. Olli Heinonen Transcript 1 Conference Call with Dr. Olli Heinonen Transcript David Harris: Welcome ladies and gentlemen. I m absolutely delighted that The Israel Project is hosting Dr. Olli Heinonen for this conference call on

More information

"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information

Cyber War or Electronic Espionage - Active Defense or Hack Back David Willson Attorney at Law, CISSP Assess & Protect Corporate Information "Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information Iran Georgia France Estonia Attacks on Nations UK Belgium South

More information

Cybersecurity. Canisius College

Cybersecurity. Canisius College Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never

More information

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace

More information

SCADA/ICS Security in an. RobertMichael.Lee@Gmail.com Twitter: @RobertMLee

SCADA/ICS Security in an. RobertMichael.Lee@Gmail.com Twitter: @RobertMLee SCADA/ICS Security in an Insecure Domain RobertMichael.Lee@Gmail.com Twitter: @RobertMLee Introduction CYA The opinions held and expressed by Robert M. Lee do not constitute or represent an opinion or

More information

A Detailed Strategy for Managing Corporation Cyber War Security

A Detailed Strategy for Managing Corporation Cyber War Security A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait alahmed.w@gust.edu.kw ABSTRACT Modern corporations

More information

How To Make A Speech At The Cyber Defenders Discovery Camp

How To Make A Speech At The Cyber Defenders Discovery Camp SPEECH Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH BY MINISTER OF STATE FOR DEFENCE DR MOHAMAD MALIKI BIN OSMAN, AT THE CYBER DEFENDERS DISCOVERY CAMP AWARDS

More information

United States Cyber Security in the 21st Century

United States Cyber Security in the 21st Century United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a

More information

NATO & Cyber Conflict: Background & Challenges

NATO & Cyber Conflict: Background & Challenges NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented

More information

Harmful Interference into Satellite Telecommunications by Cyber Attack

Harmful Interference into Satellite Telecommunications by Cyber Attack Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,

More information

White Paper: Cyber Hawk or Digital Dove

White Paper: Cyber Hawk or Digital Dove White Paper: Cyber Hawk or Digital Dove Published By: SkillBridge, LLC September 18, 2013 Today s Modern Warfare With the recent debate over whether or not the United States should take military action

More information

CERT's role in national Cyber Security: policy suggestions

CERT's role in national Cyber Security: policy suggestions CERT's role in national Cyber Security: policy suggestions Subject: Legal Aspect of Cyber Security. Author: Vladimir Chitashvili Lecture: Anna-Maria Osula What is national Cyber Security is? In another

More information

Cyber security and critical national infrastructure

Cyber security and critical national infrastructure 120 Dr Richard Piggin Manager Defence, Aerospace & Communications Atkins Cyber security and critical national infrastructure Abstract Cyber security is an all-embracing term, meaning different things to

More information

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015 UTCS CyberSecurity Educating Cyber Professionals Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring Semester, 2015 Slideset 1: 1 From the Headlines U.S. Not Ready for Cyberwar

More information

Worm Was Perfect for Sabotaging Centrifuges By WILLIAM J. BROAD and DAVID E. SANGER

Worm Was Perfect for Sabotaging Centrifuges By WILLIAM J. BROAD and DAVID E. SANGER Page 1 of 5 Reprints This copy is for your personal, noncommercial use only. You can order presentation-ready copies for distribution to your colleagues, clients or customers here or use the "Reprints"

More information

SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions

SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions SentinelOne Labs Advanced Threat Intelligence Report 2015 Predictions 2014 Rearview More, Better Malware The past 12 months were characterized by the extension of threats that emerged in 2013: more sophisticated,

More information

Business Continuity for Cyber Threat

Business Continuity for Cyber Threat Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between

More information

Offensive capabilities

Offensive capabilities Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and

More information

Cyber-Intelligence and Cyber-Espionage

Cyber-Intelligence and Cyber-Espionage London First Cyber-Intelligence and Cyber-Espionage Roundtable 23 October 2013 Sponsored and Hosted by Avanta CONTENTS Executive Summary Introduction Cyber-Warfare: The Emerging Frontier I. CASCADING FAILURE

More information

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? ABOUT JLT SPECIALTY JLT Specialty Insurance Services is the U.S. platform of JLT Group, the leading specialty business adivsory

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

The impact of corporate reputation on business performance

The impact of corporate reputation on business performance The impact of corporate reputation on business performance Graham McWilliam, Group Director of Corporate Affairs PR Week Reputation Management Strategy Conference 27 November 2012 Thanks James. I m going

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations

More information

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private

More information

ADVANCED CYBER ATTACKS ON GLOBAL ENERGY FACILITIES

ADVANCED CYBER ATTACKS ON GLOBAL ENERGY FACILITIES MARSH RISK MANAGEMENT RESEARCH ADVANCED CYBER ATTACKS ON GLOBAL ENERGY FACILITIES MARCH 2014 CONTENTS 1 PROTECTING ENERGY FACILITIES AGAINST GROWING CYBER RISKS 2 ENERGY SECTOR TARGETED DISPROPORTIONATELY

More information

The Five Most Common Cyber-Attack Myths Debunked

The Five Most Common Cyber-Attack Myths Debunked cybereason The Five Most Common Cyber-Attack Myths Debunked 2016 Cybereason. All rights reserved. 1 Cyber attacks show no sign of decreasing any time soon. If anything, hackers have expanded the type of

More information

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Two recent studies National Academies Study: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack

More information

Annex 1: Assesing risk: threats, vulnerabilities and capacities

Annex 1: Assesing risk: threats, vulnerabilities and capacities Annex 1: Assesing risk: threats, vulnerabilities and capacities There is no widely accepted definition of risk, but we can say that risk refers to possible events, however uncertain, that result in harm.

More information

10 Victims and the law 57

10 Victims and the law 57 10 Victims and the law 57 10: Victims and the law This section gives a summary of the law in relation to victims of crime. Introduction The court may call a victim as a witness in a criminal case. However,

More information

Cyber Confrontation: Hackers Convincing Victory Over the Security Industry

Cyber Confrontation: Hackers Convincing Victory Over the Security Industry Your texte here. Cyber Confrontation: Hackers Convincing Victory Over the Security Industry Ilia Kolochenko, High-Tech Bridge, CEO Regional Cyber Security Summit 20 th of April 2014 From where does the

More information

Disaster Recovery and Business Continuity What Every Executive Needs to Know

Disaster Recovery and Business Continuity What Every Executive Needs to Know Disaster Recovery and Business Continuity What Every Executive Needs to Know Bruce Campbell & Sandra Evans Contents Why you need DR and BC What constitutes a Disaster? The difference between disaster recovery

More information

a threat made in school

a threat made in school a threat made in school ADAM S BACKGROUND LEADING UP TO THE CRIME Adam, 15, is the youngest of four children. His parents are divorced. He lives with his mother, has regular contact with his father, and

More information

Andrzej Kozłowski Research Fellow Casimir pulaski Foundation. The cyber strikes back the retaliation against the cyberattack

Andrzej Kozłowski Research Fellow Casimir pulaski Foundation. The cyber strikes back the retaliation against the cyberattack Andrzej Kozłowski Research Fellow Casimir pulaski Foundation The cyber strikes back the retaliation against the cyberattack Road to WARSAW SECURITY FORUM 2015 The growing threat The constant grow of threats

More information

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems. 1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood

More information

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013 Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,

More information

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace , pp.137-146 http://dx.doi.org/10.14257/ijseia.2014.8.9.11 Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace Jung ho Eom Military Studies, Daejeon University, 62 Daehakro,

More information

Last time we had arrived at the following provisional interpretation of Aquinas second way:

Last time we had arrived at the following provisional interpretation of Aquinas second way: Aquinas Third Way Last time we had arrived at the following provisional interpretation of Aquinas second way: 1. 2. 3. 4. At least one thing has an efficient cause. Every causal chain must either be circular,

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

SPECIAL REPORT: 4 BIG REASONS YOU CAN T AFFORD TO IGNORE BUSINESS CREDIT!

SPECIAL REPORT: 4 BIG REASONS YOU CAN T AFFORD TO IGNORE BUSINESS CREDIT! SPECIAL REPORT: 4 BIG REASONS YOU CAN T AFFORD TO IGNORE BUSINESS CREDIT! 4 BIG REASONS YOU CAN T AFFORD TO IGNORE BUSINESS CREDIT! Provided compliments of: FIRSTUSA DATA SERVICES, LLC 877-857-5045 SUPPORT@FIRSTUSADATA.COM

More information

Reality in the Eyes of Descartes and Berkeley. By: Nada Shokry 5/21/2013 AUC - Philosophy

Reality in the Eyes of Descartes and Berkeley. By: Nada Shokry 5/21/2013 AUC - Philosophy Reality in the Eyes of Descartes and Berkeley By: Nada Shokry 5/21/2013 AUC - Philosophy Shokry, 2 One person's craziness is another person's reality. Tim Burton This quote best describes what one finds

More information

AS PREPARED EMBARGOED UNTIL DELIVERY

AS PREPARED EMBARGOED UNTIL DELIVERY SECRETARY OF DEFENSE LEON E. PANETTA DEFENDING THE NATION FROM CYBER ATTACK BUSINESS EXECUTIVES FOR NATIONAL SECURITY NEW YORK, NY THURSDAY, OCTOBER 11, 2012 Let me begin by extending my deepest gratitude

More information

Cyber defence in the EU Preparing for cyber warfare?

Cyber defence in the EU Preparing for cyber warfare? Preparing for cyber warfare? SUMMARY In recent years, cyber attacks on a serious scale have become a matter of concern to states, due to the threat they can pose to national security, but also a potential

More information

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Igor Nai Fovino-Head of Research GCSEC The last two years will surely enter in the history of IT Security. 2010 was the year

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12 Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,

More information

How Do IT Security Professionals Prioritize

How Do IT Security Professionals Prioritize WHITE PAPER How Do IT Security Professionals Prioritize Headlines versus Reality: Survey Report Table of Contents Executive Summary 3 Recommendations 3 Survey Statistics 4 Methodology 6 About BeyondTrust

More information

Frequency Matters. The keys to optimizing email send frequency

Frequency Matters. The keys to optimizing email send frequency The keys to optimizing email send frequency Email send frequency requires a delicate balance. Send too little and you miss out on sales opportunities and end up leaving money on the table. Send too much

More information

Lecture 7-1 Computer and Network Security. Based on slides 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Lecture 7-1 Computer and Network Security. Based on slides 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Lecture 7-1 Computer and Network Security Participation Quiz You are the conductor of a train. It is headed down on one track where you see 5 workers fixing the track. They cannot hear, see, or feel the

More information

The Stuxnet Worm The Nexus of Cyber Security and International Policy. By George Aquila george.aquila@tufts.edu Mentor: Ming Chow

The Stuxnet Worm The Nexus of Cyber Security and International Policy. By George Aquila george.aquila@tufts.edu Mentor: Ming Chow The Stuxnet Worm The Nexus of Cyber Security and International Policy By George Aquila george.aquila@tufts.edu Mentor: Ming Chow 1 Abstract: This paper focuses on the Stuxnet worm as an example of the

More information

Variable Damage Effects in Naval Wargames

Variable Damage Effects in Naval Wargames Variable Damage Effects in Naval Wargames Christopher Carlson Cold Wars 2008 Admiralty Trilogy Seminar Presented by: Clash of Arms Games Outline What is damage? Damage modeling philosophies Drivers in

More information

How To Cover A Data Breach In The European Market

How To Cover A Data Breach In The European Market SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to

More information

China s Cyberwar Against the US: Truth or Fiction?

China s Cyberwar Against the US: Truth or Fiction? 23 July 2013 Hattie Jones China s Cyberwar Against the US: Truth or Fiction? 1. Introduction. On the 6 th May, 2013, an Annual Report to Congress prepared by the Office of the Secretary of Defense claimed

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There

More information

Appendix 2 Deterrence as a security concept against cyber threats

Appendix 2 Deterrence as a security concept against cyber threats Appendix 2 Deterrence as a security concept against cyber threats Sico van der Meer Current situation Cyber threats, also referred to as digital threats, are among the greatest threats currently facing

More information

The Christian Science Monitor

The Christian Science Monitor 1 The Christian Science Monitor Stuxnet spyware targets industrial facilities, via USB memory stick Beware the USB memory stick. Infected sticks are the means by which a mystery spyware, dubbed Stuxnet,

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

CROSS EXAMINATION OF AN EXPERT WITNESS IN A CHILD SEXUAL ABUSE CASE. Mark Montgomery

CROSS EXAMINATION OF AN EXPERT WITNESS IN A CHILD SEXUAL ABUSE CASE. Mark Montgomery CROSS EXAMINATION OF AN EXPERT WITNESS IN A CHILD SEXUAL ABUSE CASE Mark Montgomery Post Office Box 161 Durham, NC 27702 (919) 680-6249 mark.montgomery@mindspring.com Opinion Testimony by a Pediatrician/Nurse/Counselor/Social

More information

6 Steps To Success With Your Web Agent Solutions Website

6 Steps To Success With Your Web Agent Solutions Website 6 Steps To Success With Your Web Agent Solutions Website By Jay Kinder and Michael Reese Introduction Congratulations on your decision to join the Web Agent Solutions family. It s an enormously effective

More information

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,

More information

CYBER SECURITY. May 6, 2013

CYBER SECURITY. May 6, 2013 CYBER SECURITY May 6, 2013 Cyber Headlines: dramatic and numerous Burning up a generator on demand Staged cyber attack reveals vulnerability in power grid, CNN 09/26/2007 Georgia Takes a Beating in the

More information

Firewalls for small business

Firewalls for small business By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try

More information

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. April 1st, 2015

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. April 1st, 2015 UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI April 1st, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security Forum

More information

The Battlefield. critical infrastructure:

The Battlefield. critical infrastructure: CIP A Business View Rolf Schulz CEO Definition critical infrastructure: 1. Elements of a system that are so vital that disabling any of them would incapacitate the entire system. 2. [In security,] those

More information

Option 1: Use the Might of the U.S. Military to End the Assad Regime

Option 1: Use the Might of the U.S. Military to End the Assad Regime 1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

Microwave Warfare. Barrie Trower

Microwave Warfare. Barrie Trower Microwave Warfare Barrie Trower Interviewer: I understand that you have a wealth of experience with microwaves. Can you begin explaining how you began your career in microwave technology? Barrie Trower:

More information

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern

More information

VIENNA MODEL UNITED NATIONS CLUB

VIENNA MODEL UNITED NATIONS CLUB VIENNA MODEL UNITED NATIONS CLUB STUDY GUIDE APRIL SESSION 2013 CYBER SECURITYAND CYBER WARFARE 1 INTRODUCTION With anever-increasingnumber of technological improvements and the expansion of online services

More information

Energy Cybersecurity Regulatory Brief

Energy Cybersecurity Regulatory Brief Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider

More information

CARVER+Shock Vulnerability Assessment Tool

CARVER+Shock Vulnerability Assessment Tool Published by: Government Training Inc. ISBN: 978-09832361-7-7 CARVER+Shock Vulnerability Assessment Tool A Six Step Approach to Conducting Security Vulnerability Assessments on Critical Infrastructure

More information

Transcription of Questions and Answers from Virtual Open Event of Wednesday 23 rd February 2011

Transcription of Questions and Answers from Virtual Open Event of Wednesday 23 rd February 2011 Transcription of Questions and Answers from Virtual Open Event of Wednesday 23 rd February 2011 Topic Question Answer Administration Administration Administration Administration/Entry Requirements Is it

More information

the Council of Councils initiative

the Council of Councils initiative Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global

More information

Anti-exploit tools: The next wave of enterprise security

Anti-exploit tools: The next wave of enterprise security Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of

More information

NATIONAL DEFENSE AND SECURITY ECONOMICS

NATIONAL DEFENSE AND SECURITY ECONOMICS NATIONAL DEFENSE AND SECURITY ECONOMICS FUTURE DEVELOPMENT OF ECONOMICS OF DEFENSE AND SECURITY ECONOMIC DIMENSION OF CYBERSPACE AS NEW SECURITY THREAT Content of Topic Introduction Basic Concepts Cyberspace

More information

Where can I get help after a sexual assault?

Where can I get help after a sexual assault? Sexual Assault What is assault? Assault is when someone uses force to hurt you. Slapping, kicking and pushing can be assault. Sometimes touching can be an assault. Threatening or trying to hurt someone

More information

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism? 2013 cyber attacks on the websites of media companies

More information

The Road Safety Act 2006: Causing death by careless driving Do good headlines make good law?

The Road Safety Act 2006: Causing death by careless driving Do good headlines make good law? The Road Safety Act 2006: Causing death by careless driving Do good headlines make good law? By Jim Wormington and Caoimhe Daly, QEB Hollis Whiteman Widow calls for change in law after lorry driver is

More information

Secure Software Development Trends in the Oil & Gas Sectors. How the Microsoft Security Development Lifecycle helps protect critical industries

Secure Software Development Trends in the Oil & Gas Sectors. How the Microsoft Security Development Lifecycle helps protect critical industries Secure Software Development Trends in the Oil & Gas Sectors How the Microsoft Security Development Lifecycle helps protect critical industries Secure Software Development Trends in the Oil & Gas Sectors

More information

HOMELAND SECURITY INTELLIGENCE RPAD 556

HOMELAND SECURITY INTELLIGENCE RPAD 556 HOMELAND SECURITY INTELLIGENCE RPAD 556 Dr. James E. Steiner Public Service Professor Rockefeller College The University at Albany, SUNY 423 State Street 518 708 4183 Office hours: by appointment Course

More information

NECESSARY AND SUFFICIENT CONDITIONS

NECESSARY AND SUFFICIENT CONDITIONS Michael Lacewing Personal identity: Physical and psychological continuity theories A FIRST DISTINCTION In order to understand what is at issue in personal identity, it is important to distinguish between

More information

The term cyberwar is common in

The term cyberwar is common in U.S. Army (Austin Berner) Unpacking Cyberwar The Sufficiency of the Law of Armed Conflict in the Cyber Domain By Kyle Genaro Phillips The term cyberwar is common in today s discussions of the national

More information

Big Data, Big Mess: Sound Cyber Risk Intelligence through Complete Context

Big Data, Big Mess: Sound Cyber Risk Intelligence through Complete Context Big Data, Big Mess: Sound Cyber Risk Intelligence through Complete Context Introduction When it comes to cybersecurity, perhaps nothing has been as highly touted as the answer to every executive s prayers

More information

Domestic Violence. (b) Assaulting, attacking, beating, molesting, or wounding a named individual.

Domestic Violence. (b) Assaulting, attacking, beating, molesting, or wounding a named individual. Domestic Violence Domestic Violence is one of the 12 factors of the best interests test set forth at MCLA 722.23. The best interest factors were modified in 1993 to include domestic violence as factor

More information

Victims of Crime the help and advice that s available

Victims of Crime the help and advice that s available Details about Victim Support Your local Victim Support Scheme is: Victims of Crime the help and advice that s available You can also contact the Victim Supportline on: 0845 30 30 900 Or, if you prefer,

More information

Guide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network?

Guide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network? You wouldn t leave the door to your premises open at night. So why risk doing the same with your network? Most businesses know the importance of installing antivirus products on their PCs to securely protect

More information

Protecting Organizations from Cyber Attack

Protecting Organizations from Cyber Attack Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 cliff.glantz@pnnl.gov guy.landine@pnnl.gov 1 Key Topics

More information

Cyberspace: An Assessment of Current Threats, Real Consequences and Potential Solutions Alberto Muti and Katherine Tajer.

Cyberspace: An Assessment of Current Threats, Real Consequences and Potential Solutions Alberto Muti and Katherine Tajer. Cyberspace: An Assessment of Current Threats, Real Consequences and Potential Solutions Alberto Muti and Katherine Tajer with Larry Macfaul october 2014 The Remote Control project is a project of the Network

More information

Parents recording social workers - A guidance note for parents and professionals

Parents recording social workers - A guidance note for parents and professionals Parents recording social workers - A guidance note for parents and professionals The Transparency Project December 2015 www.transparencyproject.org.uk info@transparencyproject.org.uk (Charity Registration

More information

Critical Study David Benatar. Better Never To Have Been: The Harm of Coming into Existence (Oxford: Oxford University Press, 2006)

Critical Study David Benatar. Better Never To Have Been: The Harm of Coming into Existence (Oxford: Oxford University Press, 2006) NOÛS 43:4 (2009) 776 785 Critical Study David Benatar. Better Never To Have Been: The Harm of Coming into Existence (Oxford: Oxford University Press, 2006) ELIZABETH HARMAN Princeton University In this

More information

The International Context for Cybersecurity

The International Context for Cybersecurity THE TRILATERAL COMMISSION 2011 WASHINGTON MEETING SESSION ON CYBERSECURITY Saturday, April 9, 2011 The International Context for Cybersecurity James A. Lewis Center for Strategic and International Studies

More information

The support you should get if you are a victim of crime

The support you should get if you are a victim of crime The support you should get if you are a victim of crime This is an EasyRead booklet showing you what to do. About this booklet The Ministry of Justice wrote this information. This is an EasyRead guide

More information

Dealing with risk. Why is risk management important?

Dealing with risk. Why is risk management important? Why is risk management important? Things don t always go according to plan: a company s sales manager changes employment in the middle of an important project, a packaging machine breaks down, a lathe

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information