Cyberdeterrence, and Cyberwar

Size: px
Start display at page:

Download "Cyberdeterrence, and Cyberwar"

Transcription

1 Cyberdeterrence, and Cyberwar

2 Prologue In the 1950s, defense against nuclear weapons was next to impossible Hence deterrence theory and its accoutrements Second-strike Extended deterrence Counterforce v. countervalue Today cyberwar appears to be a salient threat With everything being digitized, dedicated hackers could bring everything to a halt in theory Cyberdefense is expensive and leaky So why not protect this country against the new threat by threatening retaliation, as we did for the nuclear threat? A /2010

3 Purpose Discuss cyberdeterrence and whether it makes sense That is, about decisions made by states not colonels Is offense the best defense? Is directed against states (especially if responding in kind) Tease out some of the salient characteristics of cyberwar -- which may result from: The failure of deterrence to forestall attack Escalation of tit-for-tat carried out in the name of deterrence Examine some dynamics of cyber-escalation Akin, in some ways to intra-war deterrence A /2010

4 What Cyberwar Is A /2010

5 What Cyberwar Is The use of information (messages) A /2010

6 What Cyberwar Is The use of information (messages) to harm target information systems A /2010

7 What Cyberwar Is The use of information (messages) to harm target information systems making them fail A /2010

8 What Cyberwar Is The use of information (messages) to harm target information systems or corrupting their contents making them fail A /2010

9 What Cyberwar Is The use of information (messages) to harm target information systems or corrupting their contents making them fail Information attacking information by attacking information systems A /2010

10 What Cyberwar Is t Cyber-espionage (despite similar methods) Far different treatment by international norms Electronic warfare (despite similar modalities) Directed energy (microwave) attacks on systems Psychological operations (even though cyberwar may produce strong psychological effects) Web site whack-a-mole And it goes well beyond flooding/ddos attacks Which only affect public-facing web sites And which many firms can offer protection against A /2010

11 What Cyberwar Cannot Usually Do Create direct permanent effect (usually) It does not break anything directly Systems can usually be restored What about Stuxnet? Preceded by 2007 Aurora experiment Iranians had little experience with normal operations Their devices have no stand-off safety guards or monitoring capablity Be used repeatably Cyberspace is made by its defenders Hackers can only follow paths that already exist Attacks expose holes, which can get patched Which is why Stuxnet I does not imply Stuxnet II The bag of tricks is depletable A /2010

12 Counterforce/Pre-emption Does t Apply in Cyberspace Because command-and-control can be simultaneously hosted in redundant servers, killing any one server may be pointless Of the prerequisites to cyber-attacks a computer, a network connection, hackers, know-how, intelligence only computers can (conceivably) be destroyed by a cyberattack Although defenders need to understand cyber-attacks quickly to minimize or reverse their damage, striking back quickly usually confers little protection A /2010

13 Outline Cyberwar and cyberdeterrence issues A cyberdeterrence decision cycle Controlling Cyber-escalation Conclusions A /2010

14 Generally Cyberattacks Have Two Motives Coercion To demonstrate capability and will But two caveats: It may induce more anger than fear It may escalate a local conflict into a strategic one Pre-emption If a physical attack is going to follow, it must come quickly Unless it is a feint or a test A /2010

15 Attribution Is Imperative Good attribution supports retaliation in three ways Avoids punishing the innocent Makes the case to the rest of the world (and potential attackers) Links action to reaction (retaliation) in the minds of attackers Proof beyond a shadow of a doubt is unnecessary What the accused state did is less important than what it can prevent (hackers need not work for states) but since cyberattacks rarely kill anyone, thresholds for punishment must be developed, communicated, and measured believably A /2010

16 But Attribution Is Hard Cyberattack Lacks obviousness of kinetic attack Leaves no physical evidence (e.g. DNA) States rarely suffer from being linked to a cyberattack (but would take more pains to hide if they did) Finding the machine does not show who did it could come from anywhere Attacker might be known.. If he boasts about it (e.g., to coerce) If he uses a known modus operandi If he makes a mistake Through human intelligence, video, etc. But will this happen often enough to be a basis for deterrence policy? A /2010

17 Predicting Battle Damage Is Also Hard Prediction timeframe Far in advance In the near term All the time Prediction difficult because: Systems change with every software update What can be observed about systems may say little about how the respond to attack: May have war reserve modes May have processes that kick in only when systems go awry Damage roughly proportional to downtime or persistence of corruption, but even system administrators don t know how fast they can reverse effects A /2010

18 Predicting Battle Damage Is Also Hard Prediction timeframe Far in advance In the near term All the time Prediction difficult because: Systems change with every software update What can be observed about systems may say little about how the respond to attack: May have war reserve modes May have processes that kick in only when systems go awry Damage roughly proportional to downtime or persistence of corruption, but even system administrators don t know how fast they can reverse effects A /2010

19 Predicting Battle Damage Is Also Hard Prediction timeframe Far in advance In the near term All the time Prediction difficult because: Systems change with every software update What can be observed about systems may say little about how they respond to attack: May have crisis reserve modes May have processes that kick in only when systems threaten to go awry Damage roughly proportional to downtime or persistence of corruption, but even system administrators don t know how fast they can reverse effects A /2010

20 Predicting Battle Damage Is Also Hard Prediction timeframe Far in advance In the near term All the time Prediction difficult because: Systems change with every software update What can be observed about systems may say little about how they respond to attack: May have crisis reserve modes May have processes that kick in only when systems threaten to go awry Damage roughly proportional to downtime or persistence of corruption, but even system administrators don t know how fast they can reverse effects A /2010

21 Cyberwar May Be Hard to Control Escalation into violence is always a risk A tit-for-tat may activate third-party hackers Cyberwar termination how do we know they stopped? is very difficult because of the attribution problem, particularly if third-party hackers are activated yet, to complain of being attacked in cyberspace is tantamount to admitting that you have been conned, something states may be reluctant to publicize, hence respond to A /2010

22 Outline Cyberwar and cyberdeterrence issues A cyberdeterrence decision cycle Controlling Cyber-escalation Conclusions A /2010

23 What Would a Decision Tree Look Like? Something s happening A /2010

24 First Determine What Something s happening The result of hacking? A /2010

25 Then Try to Figure Out Whether War or Crime Something s happening The result of hacking? Would a state do this? A /2010

26 Then Try to Figure Out Whether War or Crime Something s happening The result of hacking? Would a state do this? But call the FBI A /2010

27 Make Your Best Guess on Who Did It Something s happening The result of hacking? Would a state do this? Attack can be attributed? A /2010

28 Weigh Public Reaction Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Maybe retaliate sub rosa A /2010

29 and Public Relations Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Maybe retaliate sub rosa or tell the public A /2010

30 ...and Whether You Go Public with What you Know Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Can target make attribution public? Maybe retaliate sub rosa Maybe retaliate sub rosa A /2010

31 Determine Whether You Can Retaliate Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Can target make attribution public? Have a way to retaliate? Maybe retaliate sub rosa Maybe retaliate sub rosa A /2010

32 and Whether Retaliation Is Worth It Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Can target make attribution public? Have a way to retaliate? Maybe retaliate sub rosa Maybe retaliate sub rosa Retaliation do more good than harm? A /2010

33 Contemplate the Pressures on Target of Retaliation Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Can target make attribution public? Have a way to retaliate? Maybe retaliate sub rosa Maybe retaliate sub rosa Retaliation do more good than harm? Can attacker allay its public ire enough to counter-retaliate? Maybe retaliate sub rosa A /2010

34 and Hope for the Best Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Can target make attribution public? Have a way to retaliate? Maybe retaliate sub rosa Maybe retaliate sub rosa Retaliation do more good than harm? Can attacker allay its public ire enough to counter-retaliate? YES Maybe retaliate sub rosa So, the target state hits back and that settles things or not

35 Outline Cyberwar and cyberdeterrence issues A cyberdeterrence decision cycle Controlling Cyber-escalation Conclusions A /2010

36 Fundamental Features of Escalation Control Attribution is often uncertain Attackers can be combatant states or third party states, nonstate actors, criminal organizations, or individuals So is predicting or even assessing battle damage Overall, because Intentions are poor predictors of actual effects and Perceptions may not match actual effects Perceptions can be two stages removed from intentions But perceptions are what breed pressure to respond Escalation in cyberspace looks different if Cyber operations are carried out against military targets Cyber operations go beyond targets for kinetic attack, or Cyber operations take place in what is otherwise peacetime A /2010

37 Escalation in Cyberspace Beyond Kinetic War Can Follow Many Paths Escalation that Raises Regime Security Issues Anti- Great Firewall Surveillance Systems Police Systems Escalation From Military to Dual-Use to Civilian Attacks on States to Attacks on their Allies Dual-use Facilities Critical Infrastructure In-theater systems of great power friends Health/safety systems All military systems of great power friends To Strategic Systems Out of theater Homeland based Strategic systems A /2010

38 Trying to Escalate is not the Same as Succeeding Others will see only (what they perceive as) effects and not the effort There is no way to tell how many man-years are being thrown at a task or whether anything is being kept in reserve (cf., U.S. escalation in Vietnam measured in troop deployments) There are also few good reasons not to allocate at the outset all cyberwarriors (already on the payroll) to a specific conflict The intent to escalate may not match the actual degree of escalation much less the perceived degree of escalation Kinetic Escalation Options/Outcomes Cyber Escalation Options/Outcomes Don t thing happens Don t thing happens Something is perceived to happen Do thing much happens (rare) Something happens Do thing happens; invisible failure thing happens; visible failure Something happens A /2010

39 But Escalation Can Also Be Accidental or Inadvertent Them Attacks that Imperil Safety Attacks on Civilian Infrastructure Attacks on Military Support They hack the FAA They hack one of our coal-fired power plants They hack Guam s port We hack into their 911 systems. We hack their hydropower dam We hack a civilian port in their country We hack their afloat naval supply facility Attacks on Personal Safety Attacks on Industrial Safety Attacks on the Homeland Attacks in the Field US Or maybe the induced malfunction in the naval supply facility broke the port management software. Unintended escalation is a greater risk when combatants fail to communicate thresholds or define them differently A /2010

40 Adversaries Can Interpret U.S. Escalation Decisions in Many Ways If we escalate in cyberspace, they might conclude, alternatively: We can escalate (if our attacks succeed and impress) We are willing to take risks but not casualties We believe cyberattacks on non-military targets are legitimate We know they have escalated and would risk mutual escalation to get them to stop (if they thought we were responding to their escalation) We are trigger-happy even though our detection mechanisms are weak (if they thought we were responding to something that did not occur or was not their fault) If we do not escalate or even respond, they might conclude: We do not have the capability to escalate We do not know it was they who attacked us or even whether the effects were those intended We do know but are showing restraint A /2010

41 Threatening Escalation to Control Escalation is Tricky Our threat to escalate may inhibit their escalation or make them stop, but only if They believe we have the means They believe we have the will (even in the face of potential counterresponse) Their escalation has no compelling military rationale They do not fear losing too much face by complying They feel that our declared red lines are well-defined, straightforward to monitor and fair (v. one-sided, arbitrary, unfounded in customary law, or self-serving), and They believe that if they do not cross the line neither will we A /2010

42 Outline Cyberwar and cyberdeterrence issues A cyberdeterrence decision cycle Controlling Cyber-escalation Conclusions A /2010

43 Conclusions Cyberwar is not just war carried on in another dimension (same for cyberdeterrence) In many cases, key questions are different In other cases, key answers are different Although cyberwar may share some facets of other types of warfare (e.g., electronic, terrorism), it merits consideration from first principles Compared to retaliation, defense, although expensive, is less problematic and risky Even if we do not forswear retaliation as a policy, we should think carefully before embracing it A /2010

44

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,

More information

Does NATO s Article V Genuinely Protect Its Members?

Does NATO s Article V Genuinely Protect Its Members? Does NATO s Article V Genuinely Protect Its Members? NATO has been the most successful alliance of history. We repeat this truth quite frequently, especially now that we celebrate 60 years of its successful

More information

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information

More information

CHAPTER 13: International Law, Norms, and Human Rights

CHAPTER 13: International Law, Norms, and Human Rights CHAPTER 13: International Law, Norms, and Human Rights MULTIPLE CHOICE 1. Why did the former Secretary General of the United Nations, Kofi Annan, state that the US invasion of Iraq in 2003 was illegal?

More information

10 Hidden IT Risks That Might Threaten Your Law Firm

10 Hidden IT Risks That Might Threaten Your Law Firm (Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

NATO & Cyber Conflict: Background & Challenges

NATO & Cyber Conflict: Background & Challenges NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information

Cyber War or Electronic Espionage - Active Defense or Hack Back David Willson Attorney at Law, CISSP Assess & Protect Corporate Information "Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information Iran Georgia France Estonia Attacks on Nations UK Belgium South

More information

The Korean Cyber Attacks and Their Implications for Cyber Conflict James A. Lewis Center for Strategic and International Studies October 2009

The Korean Cyber Attacks and Their Implications for Cyber Conflict James A. Lewis Center for Strategic and International Studies October 2009 The Korean Cyber Attacks and Their Implications for Cyber Conflict James A. Lewis Center for Strategic and International Studies October 2009 It has been several months since the basic denial of service

More information

Appendix 2 Deterrence as a security concept against cyber threats

Appendix 2 Deterrence as a security concept against cyber threats Appendix 2 Deterrence as a security concept against cyber threats Sico van der Meer Current situation Cyber threats, also referred to as digital threats, are among the greatest threats currently facing

More information

Cyber Security and Infrastructure: Problems of Today, Challenges for Tomorrow

Cyber Security and Infrastructure: Problems of Today, Challenges for Tomorrow Cyber Security and Infrastructure: Problems of Today, Challenges for Tomorrow Herb Lin Computer Science and Telecommunications Board NAE Convocation of Engineering Professional Societies Washington DC

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

FBI AND CYBER SECURITY

FBI AND CYBER SECURITY FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.

More information

Advanced & Persistent Threat Analysis - I

Advanced & Persistent Threat Analysis - I Advanced & Persistent Threat Analysis - I Burak Ekici ekcburak@hotmail.com Department of Computer Engineering, Yaşar University, Turkey. April 21, 2012 Burak Ekici (Dept. of Comp. Eng.) Advanced & Persistent

More information

Our Code is for all of us

Our Code is for all of us This is Our Code This is Our Code Our Code How we behave forms the character of our company and dictates how others see us. How we conduct ourselves determines if people want to do business with us, work

More information

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

UN Emergency Summit on Cyber Security Topic Abstract

UN Emergency Summit on Cyber Security Topic Abstract UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international

More information

MANAGING DIFFICULT BEHAVIOUR

MANAGING DIFFICULT BEHAVIOUR MANAGING DIFFICULT BEHAVIOUR All materials Lindsay Wright. This pack for sample purposes only and not for re-use. 1 WHAT IS CONFLICT Conflict can be defined as a difference in view between stakeholders;

More information

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism? 2013 cyber attacks on the websites of media companies

More information

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI Recommendation: The Executive Branch should provide for a central planning and coordination mechanism (likely within an existing entity)

More information

Religious Studies (Short Course) Revision Religion, War and Peace

Religious Studies (Short Course) Revision Religion, War and Peace Religious Studies (Short Course) Revision Religion, War and Peace How to use this presentation The first part of this presentation (blue headings) will give you brief information, religious viewpoints

More information

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Two recent studies National Academies Study: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack

More information

Obstacles for Security Cooperation in North America. Roberto Domínguez 2012-2013 Jean Monnet/GGP Fellow

Obstacles for Security Cooperation in North America. Roberto Domínguez 2012-2013 Jean Monnet/GGP Fellow Obstacles for Security Cooperation in North America Roberto Domínguez 2012-2013 Jean Monnet/GGP Fellow What is North America? IR literature: United States and Canada After NAFTA: US, Canada, Mexico Over-theorization

More information

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace

More information

Network Security Landscape

Network Security Landscape Cole p01.tex V3-07/28/2009 3:46pm Page 1 Network Security Landscape COPYRIGHTED MATERIAL IN THIS PART Chapter 1 State of Network Security Chapter 2 New Approaches to Cyber Security Chapter 3 Interfacing

More information

THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY

THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY 前 沿 探 索 THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY By Lt Col Jose Luis Llagran Bonilla 1 (Ecuador) I. Introduction Cyberspace is an interdependent network of information technology infrastructures

More information

Marketing strategy questionnaire

Marketing strategy questionnaire Marketing strategy questionnaire Prepared by: Date: Purpose Use this template to capture the key information that you need to develop a thorough marketing strategy. Then use the information that you collect,

More information

It's a MAD, MAD, MAD Cyber World

It's a MAD, MAD, MAD Cyber World It's a MAD, MAD, MAD Cyber World Remarks by Rod Beckstrom at the Personal Democracy Forum New York City June 6, 2013 As prepared for delivery EMBARGOED FOR RELEASE AT 16.00 EST, 06 JUNE 2013 Let s start

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

Option 1: Use the Might of the U.S. Military to End the Assad Regime

Option 1: Use the Might of the U.S. Military to End the Assad Regime 1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger

More information

Flexible, Life-Cycle Support for Unique Mission Requirements

Flexible, Life-Cycle Support for Unique Mission Requirements Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

A Detailed Strategy for Managing Corporation Cyber War Security

A Detailed Strategy for Managing Corporation Cyber War Security A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait alahmed.w@gust.edu.kw ABSTRACT Modern corporations

More information

The Four-Step Guide to Understanding Cyber Risk

The Four-Step Guide to Understanding Cyber Risk Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Federal Bureau of Investigation

Federal Bureau of Investigation Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United

More information

Global Security Academy

Global Security Academy Global Security Academy Athena GS3 Security implementation Systems Ltd. 5 Hatzoref St, Holon, 58856, Israel Tel: +972 3 5572462 Fax: +972 3 5572472 www.athenalss.com Message from Chief Executive Officer

More information

SPICE EduGuide EG0015 Security of Administrative Accounts

SPICE EduGuide EG0015 Security of Administrative Accounts This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and

More information

Respect Handout. You receive respect when you show others respect regardless of how they treat you.

Respect Handout. You receive respect when you show others respect regardless of how they treat you. RESPECT -- THE WILL TO UNDERSTAND Part Two Heading in Decent People, Decent Company: How to Lead with Character at Work and in Life by Robert Turknett and Carolyn Turknett, 2005 Respect Handout Respect

More information

Information about INTERVENTION ORDERS

Information about INTERVENTION ORDERS Information about INTERVENTION ORDERS This publication has been prepared as a public service initiated by South Australia Police and, while every care has been taken in its preparation, no warranty is

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private

More information

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Approved: 4 September 2014 Review Date: Page 1 of 7 GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Introduction Schools have a duty of care for pupils and

More information

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to

More information

SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions

SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions SentinelOne Labs Advanced Threat Intelligence Report 2015 Predictions 2014 Rearview More, Better Malware The past 12 months were characterized by the extension of threats that emerged in 2013: more sophisticated,

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

How to Justify Your Security Assessment Budget

How to Justify Your Security Assessment Budget 2BWhite Paper How to Justify Your Security Assessment Budget Building a Business Case For Penetration Testing WHITE PAPER Introduction Penetration testing has been established as a standard security practice

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

10 Hidden IT Risks That Threaten Your Financial Services Firm

10 Hidden IT Risks That Threaten Your Financial Services Firm Your firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your business without IT. Today,

More information

How NAS Can Increase Reliability, Uptime & Data Loss Protection: An IT Executive s Story

How NAS Can Increase Reliability, Uptime & Data Loss Protection: An IT Executive s Story How NAS Can Increase Reliability, Uptime & Data Loss Protection: An IT Executive s Story How NAS Can Increase Reliability, Uptime & Data Loss Protection: An IT Executive s Story 1 This is Connor, The Small-to-Midsize

More information

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There

More information

Security Goals Services

Security Goals Services 1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;

More information

The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York

The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York Introduction: the role of economics Economists are not usually associated with debates about wars. Such

More information

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1 PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a

More information

Talking to our children about Violence and Terrorism: Living in Anxious times

Talking to our children about Violence and Terrorism: Living in Anxious times Talking to our children about Violence and Terrorism: Living in Anxious times Living in Anxious Times: Introductory Remarks Since the September 11 attack America has changed. Children and adults alike

More information

Moscow subway cars to have CCTV

Moscow subway cars to have CCTV www.breaking News English.com Ready-to-use ESL / EFL Lessons Moscow subway cars to have CCTV URL: http://www.breakingnewsenglish.com/0507/050719-moscow-e.html Today s contents The Article 2 Warm-ups 3

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

Moscow subway cars to have CCTV

Moscow subway cars to have CCTV www.breaking News English.com Ready-to-use ESL / EFL Lessons Moscow subway cars to have CCTV URL: http://www.breakingnewsenglish.com/0507/050719-moscow.html Today s contents The Article 2 Warm-ups 3 Before

More information

CYBERSECURITY: ASSESSING THE IMMEDIATE THREAT TO THE UNITED STATES

CYBERSECURITY: ASSESSING THE IMMEDIATE THREAT TO THE UNITED STATES Statement before the House Oversight and Government Reform Committee, Subcommittee on National Security, Homeland Defense, and Foreign Operations CYBERSECURITY: ASSESSING THE IMMEDIATE THREAT TO THE UNITED

More information

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence ARI ARI 26/2013 (Translated from Spanish) 17 September 2013 Cyber cells: a tool for national cyber security and cyber defence Thiber Theme 1 Cyber cells are effective tools that enable countries to operate,

More information

Swedish Code of Statutes

Swedish Code of Statutes Swedish Code of Statutes Act on criminal responsibility for genocide, crimes against humanity and war crimes SFS 2014:406 Published 11 June 2014 issued on 28 May 2014. In accordance with a decision by

More information

Network Security Threat Matrix May 2004

Network Security Threat Matrix May 2004 May 2004 By Lawrence Allhands BlueMotorcycle Consulting 650/704-4821 2830 Flores #18 San Mateo, CA 94403 http://www.bluemotorcycle.com Abstract Know your enemy If you know the enemy and know yourself,

More information

United States Cyber Security in the 21st Century

United States Cyber Security in the 21st Century United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a

More information

Principles of Soccer

Principles of Soccer What criteria can we use to tell how well our team is playing? Analysis of soccer always starts out with the same question, Who has the ball? Principle #1: Possession If our team has possession of the

More information

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education Dr. Clay Wilson, CISSP Program Director, Cybersecurity Studies American Public University System Overview About

More information

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace , pp.137-146 http://dx.doi.org/10.14257/ijseia.2014.8.9.11 Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace Jung ho Eom Military Studies, Daejeon University, 62 Daehakro,

More information

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term

More information

SUB Hamburg A/578680. Cyber Conflict. Competing National Perspectives. Edited by Daniel Ventre ) WILEY

SUB Hamburg A/578680. Cyber Conflict. Competing National Perspectives. Edited by Daniel Ventre ) WILEY SUB Hamburg A/578680 Cyber Conflict Competing National Perspectives Edited by Daniel Ventre ) WILEY Table of Contents Introduction xi Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a

More information

Spyware and Viruses. There is a distinct difference between spyware and viruses.

Spyware and Viruses. There is a distinct difference between spyware and viruses. Spyware and Viruses Spyware and viruses are getting to be the largest problem in the battle of keeping your computer running smoothly and being able to use your computer with any kind of efficiency. There

More information

DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000

DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 5000 Ser NOO / )00063 21 May 10 MEMORANDUM FOR DISTRIBUTION From: Subj: Ref: Encl: Chief of Naval Operations

More information

The European Marine Energy Centre Ltd. HARASSMENT AND BULLYING POLICY

The European Marine Energy Centre Ltd. HARASSMENT AND BULLYING POLICY The European Marine Energy Centre Ltd. HARASSMENT AND BULLYING POLICY Table of Contents 1 Policy Statement... 3 2 Scope... 3 3 Definitions... 3 4 Detailed Guidelines... 5 4.1 What to do if you are being

More information

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015 Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology

More information

FAQ Exodus Proxima Centauri 07/2013

FAQ Exodus Proxima Centauri 07/2013 Resources & Population Q: Do I pay tax for the resources I had before together with the new ones? A: No, it is a tax per income, not per fortune. You pay tax for what you get fresh that turn. Q: My stash

More information

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 NATO is anything but obsolete. It is needed more now than at any point since the end

More information

The Nuclear Weapons Debate

The Nuclear Weapons Debate Scottish CND - Education Pack The Nuclear Weapons Debate Scottish CND s educational resource Nuclear Weapons: Yes or No is aimed at late primary to early secondary school pupils. It has 4 units: The Nuclear

More information

Risk Identification Checklist for Stalking Cases (VS-DASH 2009) 1

Risk Identification Checklist for Stalking Cases (VS-DASH 2009) 1 Risk Identification Checklist for Stalking Cases (VS-DASH 2009) 1 There is still limited knowledge, awareness and education about stalking, even though the problem is getting bigger. Many people and agencies,

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Examples of International terrorist attacks since 9/11

Examples of International terrorist attacks since 9/11 PAPER ONE INTERNATIONAL TERRORISM: THE THREAT Any discussion of the Government s strategy to reduce the threat from international terrorism to the UK and its citizens must begin with the nature of the

More information

Covert Operations: Kill Chain Actions using Security Analytics

Covert Operations: Kill Chain Actions using Security Analytics Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special

More information

Cyber Security Management

Cyber Security Management Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies

More information

the Council of Councils initiative

the Council of Councils initiative Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global

More information

Neoscope www.neoscopeit.com 888.810.9077

Neoscope www.neoscopeit.com 888.810.9077 Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your practice without IT. Today,

More information

To use the Muslim concept of Jihad to understand Muslim attitudes to war.

To use the Muslim concept of Jihad to understand Muslim attitudes to war. To use the Muslim concept of Jihad to understand Muslim attitudes to war. Grade C All will be able to describe the meaning of greater and lesser JIHAD. Grade B Most will be able to explain why the concept

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Security & privacy in the cloud; an easy road?

Security & privacy in the cloud; an easy road? Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands mvliem@microsoft.com THE SHIFT O L D W O R L D

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

Keren Elazari Hackers: The Internet s Immune System

Keren Elazari Hackers: The Internet s Immune System Keren Elazari Hackers: The Internet s Immune System For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think

More information

Internet security: Shutting the doors to keep hackers off your network

Internet security: Shutting the doors to keep hackers off your network Internet security: Shutting the doors to keep hackers off your network A Paralogic Networks Guide www.scholarisintl.com Introduction Like all revolutionary steps in technological development the Internet

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

PROTECT YOUR FINANCIAL TRANSACTIONS

PROTECT YOUR FINANCIAL TRANSACTIONS PROTECT YOUR FINANCIAL TRANSACTIONS Caisses populaires acadiennes www.acadie.com/en It s a wealth of ways to strengthen the security of your financial transactions. By implementing simple measures to mitigate

More information

Policy wording. General conditions. AMI Businesspack Business Insurance. Your duty to comply. About this Businesspack policy. Interpreting this Policy

Policy wording. General conditions. AMI Businesspack Business Insurance. Your duty to comply. About this Businesspack policy. Interpreting this Policy AMI Businesspack Business Insurance Policy wording Welcome, thanks for choosing to protect your business with IAG New Zealand Limited. AMI Insurance Limited is part of the IAG group of companies in New

More information

The Future of Hacking

The Future of Hacking The Future of Hacking An Ethical Hacker s View Peter Wood Chief of Operations First Base Technologies Who am I? Started in electronics in 1969 Worked in networked computers since 1976 Second microcomputer

More information

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12 Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,

More information