Some Modest Steps Towards Improving US-China Relations in Cyberspace
|
|
- Duane Cole
- 7 years ago
- Views:
Transcription
1 Some Modest Steps Towards Improving US-China Relations in Cyberspace Herb Lin CISAC/Hoover Stanford University (after 1/1/2015) December 5, /20/2014 1
2 SOURCE MATERIAL /20/2014 2
3 The importance of cybersecurity to both nations Economy Research and development Control of advanced manufacturing Control of critical infrastructure electric power telecommunications Banking and finance Education and training Civil government functions National security Defense Intelligence Law enforcement 12/20/2014 3
4 United States and China Competitors with different interests Protection of free speech Protection of intellectual property Supremacy of individual rights Partners with similar interests and common ground. 12/20/2014 4
5 Many differences U.S. private sector is very separate from U.S. government as compared to China: U.S. private sector is often successful in challenging government actions. U.S. private citizens do not always act in accordance with U.S. government wishes and desires. U.S. government does not collect intelligence to benefit U.S. private sector companies. U.S. government is often restrained by Congress and judiciary, even when acting for national security; Chinese government is more unitary. U.S. government makes public a great deal of information about its defense strategies (including cyber), although many things are classified; Chinese government is apparently reluctant to discuss specifics of its security in cyberspace. 12/20/2014 5
6 A comparison (much exaggerated and stereotyped) United States China Rights Political over economic Economic over political Societal stability Important Very, very important History Unimportant Important Knowledge and wisdom of other nations Not valued Valued Trust in government or other authorities No Yes 12/20/2014 6
7 Premises The U.S.-China relationship is the most important bilateral relationship in the twenty-first century The United States and China have common interests in cyberspace, even if the relationship may sometimes be tense or adversarial. Both nations should work to build common understandings regardless of the rhetoric of their leaders. Each side profoundly misunderstands the other. 12/20/2014 7
8 Three categories of problems Problems involving fundamental differences between U.S. and China. Political systems Concepts of basic rights (free speech, sovereignty) Problems that both countries face Protection of critical infrastructure Developing more secure code Problems whose solution requires cooperation Prevention of inadvertent escalation Confidence-building measures Dialog and understanding` 12/20/2014 8
9 Some possible common ground Common vocabulary Shared and accurate conceptual understanding Dissimilarity between nuclear and cyber Attribution Curbing criminal activity in cyberspace Preventing inadvertent escalation Communicating during crisis Differentiating exploitation from attack (especially during crisis) Cooperating against 3 rd party provocateur Declaring cyber-cease fire 12/20/2014 9
10 Common vocabulary 12/20/
11 Common vocabulary Cyberspace Cyber attack Cyber exploitation Deterrence Private sector Critical infrastructure Laws of war in cyberspace 12/20/
12 The meaning of deterrence Deterrence in cyberspace.. relies on two principal mechanisms: denying an adversary s objectives and, if necessary, imposing costs on an adversary for aggression. Section%20934%20Report_For%20webpage.pdf Cyberspace is a field where security can hardly be secured through deterrence. During the era of the nuclear arms race, mutual deterrence remained a top concern of rival countries. In the same way, the offenseand-defense game of cyber deterrence will only lead other countries to improve their offensive and defensive cyber skills. 12/20/
13 The meaning of laws of war in cyberspace established principles of international law do apply in cyberspace. Harold Koh, Legal Advisor U.S. Department of State, September 18,2012, Koh also noted that at least one country has questioned whether existing bodies of international law apply to the cutting edge issues presented by the Internet. More recently, China is alleged to have accepted that the laws of war apply in cyberspace, but no authoritative statement is available. Many uncertainties about how laws of war should be interpreted in any given instance. 12/20/
14 Conceptual understanding 12/20/
15 Chinese statements on cyber conflict If Internet security cannot be controlled, it s not an exaggeration to say the effects could be no less than a nuclear bomb, The Internet is open to everyone and attacks can be launched from anywhere. Fang Fenghui, chairman of the People s Liberation Army General Staff (Bloomberg News, Apr 22, Cyber arms are more horrible than nuclear weapons. Once cyber warfare is triggered there will never be peaceful days. People s Daliy, 9 May 2013, 12/20/
16 American statements on cyber conflict Cyber is sort of the modern day,.. the 21st century nuclear weapons equivalent. John Kerry, Secretary of State confirmation hearings, 14 January 2013, Senate Foreign Relations Confirmation hearing, Confirmation-Testimony.pdf The single biggest existential threat that s out there, I think, is cyber Cyber actually, more than theoretically, can attack our infrastructure, our financial systems Mike Mullen, former Chair of US Joint Chiefs of Staff, July 7, 2013, /DoD-Release-Public-Version-Cyber-Strategy 12/20/
17 The reality Cyber weapons are not like nuclear weapons, and cyber conflict is not like nuclear conflict. A single nuclear weapon exploding can kill 10 5 people instantly. Multiple nuclear weapons exploding could end modern civilization. Nuclear explosion a distinct threshold event that all can recognize. Only a few nations can wield nuclear weapons; private sector has none. Damage from a nuclear weapon explosion is long-lasting and rebuilding is very hard. Many of the same questions/issues arise in cyber as in nuclear (as well as in many other forms of conflict), BUT answers to these questions are mostly very different. 12/20/
18 On attribution 12/20/
19 Decomposing attribution Definition of responsible party can have many meanings from this example: The machine that is directly connected to the target (computer Y) The machine that launched or initiated the operation (A) The individual (George) sitting at the keyboard of the initiating machine. Other possible meanings: The geographical location of the machine that launched or initiated the operation (George is sitting at a keyboard located in Greece) The nation under whose jurisdiction the named individual falls (George is a citizen of Germany). The entity under whose auspices the individual acted (George works for the Japanese Ministry of Defense). 12/20/
20 Evidence for attribution Very hard/impossible if (and only if) Perpetrator s techniques are unprecedented Perpetrator s actions have left no clues Perpetrator has maintained perfect operational security (no one else knows) Perpetrator s motivations or demands are unknown Easier/possible if any of these conditions are violated and the likelihood of violation increases over time. Evidence builds up spinning a coin once vs. many times, comes up heads every time. Assigning responsibility is a political act, not a technological problem. 12/20/
21 Curbing criminal activity in cyberspace 12/20/
22 Curbing criminal activity in cyberspace Spam Fighting Spam to Build Trust, East-West Institute and Internet Society of China Child pornography 18 Child Porn Websites Shut Down: Result of Joint U.S.-China Cooperation a man [in the United States] was recently indicted on federal charges of running 18 Chinese-language child pornography websites in New York... The FBI investigated this case in the U.S. [and].. received what U.S. Attorney Preet Bharara of the Southern District of New York called extensive cooperation and assistance from the Chinese Ministry of Public Security. s_ /20/
23 Preventing inadvertent escalation 12/20/
24 Communicating during crisis Explicit communication Hotlines? Third party intermediaries? Signaling by actions risk of inadvertent escalation (mutual misunderstanding regarding thresholds). Communicating thresholds regarding activity in cyberspace is particularly problematic, in peacetime. Active threat neutralization and exploitation can be interpreted as attack How to define and communicate thresholds? How to keep tight control over lower-level personnel, who may do things with provocative results? Overzealous interpretation of standing rules of engagement Unintended damage Soldiers going beyond or acting in violation of orders Civilian acting without authorization 12/20/
25 Differentiating exploitation from attack (especially during crisis) Attacks and exploitations Look similar from the victim s perspective. Are entirely different from the perpetrator s perspective. Intermingling of civilian and military networks, nuclear and conventional military networks can lead to escalation. How, if at all, can perpetrator signal the victim that an operation is an attack vs an exploitation? How, if at all, can perpetrator signal that an exploitation is for national security purposes rather than for economic purposes? Consider both technical and non-technical means. 12/20/
26 Cooperating against 3 rd party provocateur Catalytic escalation a third party provokes two parties to engage in conflict. Inherent anonymity of cyber operations make false-flag operations easier to undertake in cyberspace. Misdirected retaliatory act intended to discourage further attacks is seen overtly offensive. What structures must be established in advance to investigate such actions? 12/20/
27 Declaring cyber-cease fire A clear understanding about what the terms of any agreement require each side to do. How to know where cyber weapons are deployed (needed for demining ) Capabilities for each party to verify compliance with the terms of a cease-fire. How much information would be shared by one nation with another? Why would either nation believe a claim by the other that it was complying with the terms of a cease-fire? Overt or cooperative intelligence not likely to be believed Covert cyber exploitation to gain intelligence likely to be misinterpreted if discovered Patriotic hackers continuing Differentiating background of ongoing normal hacking No national identifiers on attack traffic so cessation cannot be verified 12/20/
28 For more information Herb Lin Stanford University Center for International Security and Cooperation Encina Hall, C Serra Street Stanford, CA /20/
Research Note Engaging in Cyber Warfare
Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines
More informationThe main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
More informationConfrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
More informationThe Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
More informationUnited States Cyber Security in the 21st Century
United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 2311.01E May 9, 2006 Incorporating Change 1, November 15, 2010 Certified Current as of February 22, 2011 GC, DoD SUBJECT: DoD Law of War Program References: (a) DoD
More informationHow To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
More informationTrends Concerning Cyberspace
Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming
More informationRecent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009
Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Two recent studies National Academies Study: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack
More informationworking group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
More informationVocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights
A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.
More informationA Reluctant Cyber Security Agreement between the US and China
16 November, 2015 A Reluctant Cyber Security Agreement between the US and China Dr. Omair Anas* Three months after the biggest data theft from the American networks, the US and China have agreed to cooperate
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
More informationSTATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
More informationThe Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York
The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York Introduction: the role of economics Economists are not usually associated with debates about wars. Such
More informationChina s Economic Espionage
China s Economic Espionage Stealing, Not Destroying Reema Hibrawi This paper seeks to examine the economic espionage threat to the national security of the United States from the Chinese government in
More informationCybersecurity. Canisius College
Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never
More informationEspionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
More informationThe FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
More informationTHE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY
前 沿 探 索 THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY By Lt Col Jose Luis Llagran Bonilla 1 (Ecuador) I. Introduction Cyberspace is an interdependent network of information technology infrastructures
More informationSCADA/ICS Security in an. RobertMichael.Lee@Gmail.com Twitter: @RobertMLee
SCADA/ICS Security in an Insecure Domain RobertMichael.Lee@Gmail.com Twitter: @RobertMLee Introduction CYA The opinions held and expressed by Robert M. Lee do not constitute or represent an opinion or
More informationADMINISTRATIVE REGULATION Office of the City Administrator
HUNTINGTON BEACH ADMINISTRATIVE REGULATION Number: 416 Sections: 1-9 Effective Date: 10-9-02 SUBJECT: Workplace Violence Policy 1. Purpose: 1.1 To establish a City policy regarding the prohibition of violence
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationWRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
More informationBefore the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives
Testimony of Fiona M. Alexander Associate Administrator, Office of International Affairs National Telecommunications and Information Administration United States Department of Commerce Before the Committee
More informationMyths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
More informationPresenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations
TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights
More informationCyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011
Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011 Notes abstracted from Desmond Ball, China s Cyber Warfare Capabilities, Security Challenges, Vol. 7, No. 2, Winter 2011, pp. 81-103).
More informationForeign Affairs and National Security
Foreign Affairs and National Security Objectives: TLW understand and explain the following questions as it relates to the Foreign affairs of the American Government What is foreign policy? What is the
More informationJames R. Clapper. Director of National Intelligence
Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide
More informationSTATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
More informationCyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World
Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern
More informationTestimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
More informationthe Council of Councils initiative
Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global
More informationFederal, Confederal, and Unitary systems of government
Federal, Confederal, and Unitary systems of government Standard 12.9.3: Discuss the advantages and disadvantages of federal, confederal, and unitary systems of government. The United States government
More informationCSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015
CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 On March 10, 2015 the Center for Strategic and International Studies, in conjunction with the Cybersecurity Unit of the U.S. Department of
More informationAppendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
More informationUN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
More information(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
More informationCourt, School and Law Enforcement Collaborative Task Force: Guidelines for Schools in Contacting Law Enforcement Appendix A
A: Aggravated Assault Alcohol Armed Robbery Arson, of an occupied structure Arson, of a structure or property(not occupied) Assault B: Bomb Threat Bullying Burglary/ Breaking & Entering (2 nd & 3 rd Degree)
More informationWhite Paper: Cyber Hawk or Digital Dove
White Paper: Cyber Hawk or Digital Dove Published By: SkillBridge, LLC September 18, 2013 Today s Modern Warfare With the recent debate over whether or not the United States should take military action
More informationSUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012
SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through
More informationAS PREPARED EMBARGOED UNTIL DELIVERY
SECRETARY OF DEFENSE LEON E. PANETTA DEFENDING THE NATION FROM CYBER ATTACK BUSINESS EXECUTIVES FOR NATIONAL SECURITY NEW YORK, NY THURSDAY, OCTOBER 11, 2012 Let me begin by extending my deepest gratitude
More informationThe virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
More informationToday s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
More informationWRITTEN TESTIMONY OF JOHN A
WRITTEN TESTIMONY OF JOHN A. KOSKINEN COMMISSIONER INTERNAL REVENUE SERVICE BEFORE THE SENATE FINANCE COMMITTEE ON UNAUTHORIZED ATTEMPTS TO ACCESS TAXPAYER DATA JUNE 2, 2015 Chairman Hatch, Ranking Member
More informationINTELLIGENCE SUPPORT TO U.S. BUSINESS. Steven M. Shaker Director of Business Intelligence Global Associates, Ltd.
INTELLIGENCE SUPPORT TO U.S. BUSINESS BY Steven M. Shaker Director of Business Intelligence Global Associates, Ltd. George Kardulias Deputy Director of Business Intelligence Global Associates, Ltd. Presented
More informationPennsylvania House Veterans Affairs and Emergency Preparedness Public Hearing
Pennsylvania House Veterans Affairs and Emergency Preparedness Public Hearing Cyber-Terrorism: The Security of Banking, Financial and Insurance Systems Thursday, October 16, 2003 Pennsylvania Insurance
More informationTestimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
More informationWhatWorks in Detecting and Blocking Advanced Threats:
WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization with WhatWorks is a user-to-user program in which security managers who have implemented effective
More informationOPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE SALE OF CHILDREN, CHILD PROSTITUTION AND CHILD PORNOGRAPHY
[ ENGLISH TEXT TEXTE ANGLAIS ] OPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE SALE OF CHILDREN, CHILD PROSTITUTION AND CHILD PORNOGRAPHY The States Parties to the present Protocol,
More informationInsurance Basics. WHITE PAPER Tough Issues Registered Sex Offenders in Ministry Activities
Insurance Basics WHITE PAPER Tough Issues Registered Sex Offenders in Ministry Activities 6400 Brotherhood Way, P.O. Box 2227, Fort Wayne IN 46801-2227 800 333 3735 fax.260 482 7709 brotherhoodmutual.com
More informationPublic Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
More informationHearing on Domestic Minor Sex Trafficking
Written Submission of the Center for Democracy & Technology before the House Committee on the Judiciary, Subcommittee on Crime, Terrorism, and Homeland Security Hearing on Domestic Minor Sex Trafficking
More informationPresidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,
More informationA very incomplete history of medical data breaches
An Expanding Threat Spectrum for Health Information Technologies: Starting a Conversation Herb Lin Stanford University A very incomplete history of medical data breaches Name Date Number of people affected
More informationCOJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft
COJUMA s Legal Considerations for Defense Support to Civil Authorities U.S. Southern Command 28 Miami, Florida Miami, Florida Draft Table of Contents Legal Considerations for Defense Support to Civil Authorities.....10
More informationCyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
More informationDraft Resolution. Submitted for revision by the delegations to the Model United Nation, College of Charleston, Spring 2011
Committee A: Net Neutrality and Internet Access Draft Resolution Submitted for revision by the delegations to the Model United Nation, College of Charleston, Spring 2011 The General Assembly Reaffirming
More informationCYBERSPACE AS BATTLESPACE Black Hat webcast, Oct 9, 2014
CYBERSPACE AS BATTLESPACE Black Hat webcast, Oct 9, 2014 Kenneth Geers 2501 Introduction: mission creep The Internet is still a baby. But the cyberspace around it the effective connection between computers,
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationCYBER SECURITY THREATS AND RESPONSES
CYBER SECURITY THREATS AND RESPONSES AT GLOBAL, NATION-STATE, INDUSTRY AND INDIVIDUAL LEVELS Heli Tiirmaa-Klaar* Although cyber security has accompanied the ICT sector since the first computer systems
More informationFuture Governance of the Space and Cyber Commons
Promoting Cooperative Solutions for Space Sustainability Future Governance of the Space and Cyber Commons Brian Weeden Technical Advisor Secure World Foundation 2011 Secure World Foundation. Used with
More information"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information
"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information Iran Georgia France Estonia Attacks on Nations UK Belgium South
More informationIRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary
IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary Copyright Invictis Information Security Ltd. All rights reserved. Invictis Risk Intelligence Service Report Commercial
More informationFINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
More informationCyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.
Cyberterror Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. What are terrorists main uses of cyberspace? How does cyberterror
More informationCONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing
More informationA conversation with Allan Friedman about cybersecurity issues
A conversation with Allan Friedman about cybersecurity issues Participants Allan Friedman, co-author of Cybersecurity and Cyberwar: What Everyone Needs to Know Luke Muehlhauser, Executive Director, Machine
More informationSUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.
. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote
More informationPreface to the Fourth Edition
The frequency of new editions of this book is indicative of the rapid and tremendous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through
More informationWho Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
More informationU. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
More informationResolution 1244 (1999) Adopted by the Security Council at its 4011th meeting, on 10 June 1999
Resolution 1244 (1999) Adopted by the Security Council at its 4011th meeting, on 10 June 1999 The Security Council, Bearing in mind the purposes and principles of the Charter of the United Nations, and
More informationCyber Security Ultimately Is Military Security
Cyber Security Ultimately Is Military Security Reporter: ZUO Xiaoyu You Ji Professor of Macau University, School of Social Sciences. Research Area: national security. With deepening development of cyber
More informationHarmful Interference into Satellite Telecommunications by Cyber Attack
Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,
More informationIt's a MAD, MAD, MAD Cyber World
It's a MAD, MAD, MAD Cyber World Remarks by Rod Beckstrom at the Personal Democracy Forum New York City June 6, 2013 As prepared for delivery EMBARGOED FOR RELEASE AT 16.00 EST, 06 JUNE 2013 Let s start
More informationOffensive capabilities
Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and
More informationAlthough the dominant military confrontations of the 20 th century were centered on the
To what extent were the policies of the United States responsible for the outbreak and development of the Cold War between 1945 and 1949? Although the dominant military confrontations of the 20 th century
More information1. Title: The Organizational Structure and Powers of the Federal Government as Defined in Articles I, II, and III of the U.S. Constitution Grade 5
Teacher s Name: Employee Number: School: SS.5.C.3.1 Describe the organizational structure (legislative, executive, judicial branches) and powers of the federal government as defined in Articles I, II,
More informationECOWAS COMMON POSITION ON THE ARMS TRADE TREATY
COMISSÂO DA CEDEAO ECOWAS COMMISSION COMMISSION DE LA CEDEAO ECOWAS COMMON POSITION ON THE ARMS TRADE TREATY COTONOU, DECEMBER 2010 1 BACKGROUND AND JUSTIFICATION 1. During its 55 th plenary meeting on
More informationA Detailed Strategy for Managing Corporation Cyber War Security
A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait alahmed.w@gust.edu.kw ABSTRACT Modern corporations
More informationAdopted by the Security Council at its 6225th meeting, on 30 November 2009
United Nations S/RES/1896 (2009) Security Council Distr.: General 30 November 2009 Resolution 1896 (2009) Adopted by the Security Council at its 6225th meeting, on 30 November 2009 The Security Council,
More informationAdopted by the Security Council at its 5430th meeting, on 28 April 2006
United Nations S/RES/1674 (2006) Security Council Distr.: General 28 April 2006 Resolution 1674 (2006) Adopted by the Security Council at its 5430th meeting, on 28 April 2006 The Security Council, Reaffirming
More informationUNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015
UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI June 15th, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security Forum
More informationISOO Notice 2015-04: Update on Recent Cyber Incidents at OPM
ISOO Notice 2015-04: Update on Recent Cyber Incidents at OPM July 10, 2015 The following notice provides an update on the recent cyber incidents at the U.S. Office of Personnel Management (OPM). The information
More informationCode of Business Conduct and Ethics. With Special Message for Senior Business and Finance Leaders
Code of Business Conduct and Ethics With Special Message for Senior Business and Finance Leaders Index Letter from our Chairman & CEO and from our President Annual Letter to Senior Leaders Introduction
More informationwww.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
More informationGovernment Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015
Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:
More informationWorkplace Violence Prevention Policy
Workplace Violence Prevention Policy I. OBJECTIVE The Town of Chapel Hill is concerned with the safety of both employees and the public. We want to maintain a workplace that is free of violence. We believe
More informationExport Controls: What are they? Why do we care?
Export Controls: What are they? Why do we care? Laura Langton, PhD Export Control Manager langton@wustl.edu 314-747-1378 http://research.wustl.edu/complianceareas/exportcontrols What is an Export? Release
More informationA Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note
A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,
More informationTrain Like You Will Fight
Train Like You Will Fight Reliability First Workshop 1 October 2015 Dr. Joe Adams Disclaimer 2 The content of this presentation is based on personal and professional experience of the speaker. The content
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationThe Korean Cyber Attacks and Their Implications for Cyber Conflict James A. Lewis Center for Strategic and International Studies October 2009
The Korean Cyber Attacks and Their Implications for Cyber Conflict James A. Lewis Center for Strategic and International Studies October 2009 It has been several months since the basic denial of service
More informationA New Obstacle For Cyberinsurance Coverage
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com A New Obstacle For Cyberinsurance Coverage Law360,
More informationKeynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
More information