A Reluctant Cyber Security Agreement between the US and China
|
|
|
- Lynn Patterson
- 10 years ago
- Views:
Transcription
1 16 November, 2015 A Reluctant Cyber Security Agreement between the US and China Dr. Omair Anas* Three months after the biggest data theft from the American networks, the US and China have agreed to cooperate in the field of cyber security. 1 The blame game continued for many years between China and the United States over cyber attacks on the American and Chinese networks, so much so that the United States decided to consider sanctions on individuals and firms involved in the cyber attacks. In August, the US had declared to formulate a set of economic sanctions to be slapped on Chinese businesses suspected of carrying out cyber-thefts. Experts think that these talks of sanctions have brought the two countries on the table for talks. The tension between China and America over continued cyber attacks escalated when thousands of accounts of the White House Office of Personnel Management were accessed by hackers over a period of time. According to an order passed in April 2015, the US Treasury can freeze or block assets belonging to those involved in cyber attacks on critical computer networks. The White House statement also said: We've previously indicated our concerns [about] China's activity in cyberspace. These are concerns that the President has raised directly with his Chinese counterpart in the past. Certainly, the announcement by the Department of Justice last year to indict five Chinese military officials for their actions in cyberspace should be an indication that we take these concerns very seriously." Soon after the indictment, China had suspended the working group for cyber security cooperation established in However, the joint statement issued by the two presidents clearly demonstrates the limitations of any cyber security
2 framework, which show states inability to report each and every individual cyber violation. The US President, Barack Obama said: President Xi, during these discussions, indicated to me that, with 1.3 billion people, he can't guarantee the behavior of every single person on Chinese soil which I completely understand. I can t guarantee the actions of every single American. What I can guarantee, though, and what I m hoping President Xi will show me, is that we are not sponsoring these activities, and that when it comes to our attention that non-governmental entities or individuals are engaging in this stuff, that we take it seriously and we re cooperating to enforce the law. The last point I ll make on the cyber issue because this is a global problem, and because, unlike some of the other areas of international cooperation, the rules in this area are not well developed, I think it s going to (be) very important for the United States and China, working with other nations and the United Nations and others and the private sector, to start developing an architecture to govern behavior in cyberspace that is enforceable and clear. It doesn t mean that we re going (to) prevent every cyber-crime, but it does start to serve as a template whereby countries know what the rules are, they re held accountable, and we re able to jointly go after non-state actors in this area. 3 The Chinese President Xi Jinping, in response, underlined the need to strengthen cooperation and avoid this issue leading to confrontation and politicization. What was agreed upon by the two leaders was not about any mechanism to detect and react against a cyber theft, it was mostly to work through a high level joint dialogue mechanism, provide investigation assistance and facilitate information-sharing. The joint statement reads: The United States and China agree that neither country s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors
3 Given the fact that the two giant nations occupy the greatest pie of the global e- commerce (55 percent of global e-commerce), they are also competitors. China, with its huge consumer base, is expected to dominate global e-commerce with $1 trillion e- commerce sales by 2018, accounting for more than 40 percent of the total worldwide. In the recent economic slowdown, the United States has retaken the first position from China with $349 billion e-commerce sales. 5 But in the long term, China will remain as the fastest growing e-commerce market. However, a fundamental difference between the US and Chinese market is that many of the Chinese companies are directly or indirectly linked with the state. The cyber security discourse has developed in the context of cyber security of their e-commerce stakeholders. With repeated cyber attacks on US companies, American politicians are under pressure to respond against these attacks, which, apparently, originate from China. China has used the sensational leaks by the former National Security Agency worker, Edward Snowden, in its defence, accusing the Americans for violating internet norms. 6 At a time when US trade data was vulnerable to cyber attacks and the US government was making an effort to develop some norms in order to protect trade secrets, Snowden s disclosures inflicted much damage on America s international credibility. The Chinese, Russians and many other countries have always used these disclosures against the US Despite being attacked repeatedly, the United States had failed to facilitate an international understanding on cyber security. This was mainly due to its support to the bilateral arrangements among countries and participation of non-state stakeholders including corporate and civil society. Unlike the United States, Russia, China and other Asian countries are looking for a more state controlled mechanism. Most of the regional as well as global cyber security agenda are framed around legal measures, technical and procedural measures, organizational structures, capacity building and international cooperation as advised by the International Telecommunication Union. 7 ASEAN countries, European Union, Gulf Countries and other regions are developing their regional cyber security. At least 600 attacks on American computers have reportedly originated from China. The media reports say that these attacks were particularly targeting major companies and their customers, such as Apple icloud users, and the U.S. aviation companies, such as 3
4 Boeing and Lockheed Martin. The latest and the most sensational cyber attack was the cyber-intrusion into the U.S. Office of Personnel Management (OPM) in April The OPM data breach provoked much of the American response, which required an effective deterrence and sanctions against individuals and entities involved in such intrusions. Given this backdrop of the US-China cyber security agreement, it can be said that the US-China cyber security cooperation may facilitate further clarification and definition of cyber security issues, which are still largely undefined. 8 This deal is more a beginning towards evolving more defined and globally acceptable cyber behaviour. What is the agreement about? According to the Council on Foreign Relations Senior Fellow, Robert Knake, the agreement will be enforced by something called CERT-to-CERT agreement that is, direct cooperation between Chinese and American law enforcement officials. The agreement also establishes a Cabinet-level dialogue between the countries on espionage. The joint statement says: Both sides are committed to making common effort to further identify and promote appropriate norms of state behaviour in cyberspace within the international community. The United States and China welcome the July 2015 report of the UN Group of Governmental Experts in the Field of Information and Telecommunications in the Context of International security, which addresses norms of behavior and other crucial issues for international security in cyberspace. The two sides also agree to create a senior experts group for further discussions on this topic. A high-level joint dialogue mechanism on fighting cyber crime and related issues will be established. This mechanism will be used to review the timeliness and quality of responses to requests for information and assistance with respect to malicious cyber activity of concern identified by either side. The dialogue will take place twice a year starting from Experts at the Council for Foreign Relations say that the high-level joint dialogue involves the Ministry of Public Security, Ministry of State Security, Ministry of Justice and the State Internet and Information Office on the Chinese side, and the Secretary of Homeland Security, U.S. Attorney General, representatives of the intelligence community, 4
5 and FBI on the U.S. side. 9 From the US perspective, this deal was more about convincing China to stop engaging in economic espionage and to set up a CERT-to-CERT response in case any further theft happens. In a later agreement between China and the UK, commercial espionage again came as the main concern and it was agreed to be stopped. 10 This will also involve the establishment of ministerial level dialogue. The deal does not affect the US plans of sanctions against individuals and entities involved in data theft. 11 Interestingly, the deal does not talk about non-business data theft secured through traditional or cyber spying, which suggests that the two sides would maintain the status quo. The White House Fact Sheet on US-China Cyber security states that the US and China have agreed that timely responses should be provided to requests for information and assistance concerning malicious cyber activities. Further, both sides agree to cooperate, in a manner consistent with their respective national laws and relevant international obligations, with requests to investigate cyber crimes, collect electronic evidence and mitigate malicious cyber activity emanating from their territory. The deal has received a mixed response from the optimists camp and there still remains much pessimism. Those, who see this deal as a small but important step, think that the deal is important because it allows the United States to evolve an active policy discourse on developing the norm against economic espionage in other diplomatic contexts, including trade negotiations, regional and bilateral cooperation on cyber security. This deal may not stop the next cyber attack, but as David Fidler of CFR observes, the next economic espionage will unfold in a different normative context, 12 which will open up a new legal discourse on cyber security beyond the current blame game and politicization. The Chinese willingness to sign such an agreement is touted as a win-win situation by the Chinese state media, as the use of sanction by the US against Chinese individuals and entities, as declared, would have affected China s international credibility. The Chinese official media, the People s Daily underlines the fact that nearly 50 Chinese IT companies are listed in the U.S. stock market with a total worth of nearly US$ 500 billion. Similarly, nearly 1,000 U.S. investment funds' money has gone to Chinese high-tech companies. 13 The 5
6 size of common interests in cyber security is better protected by a joint mechanism, instead of persistent denial. From Chinese perspective, China is also a victim of data theft and hacking. According to the People s Daily, 40,186 Chinese websites were hacked and 24 percent of attacks originated from the US. 14 China s National Computer Network Emergency Response Technical Team Coordination Center (CNCERT or CNCERT/CC) is perhaps more consistent in reporting cyber attacks on Chinese networks with its weekly reports. It helps China not only as a victim of the cyber attack and espionage, but also as a crucial partner for the global cyber security. 15 Mixed Reactions Much of the US complains against Chinese cyber thefts are not about attacks on critical infrastructure, rather it is about theft of intellectual property, trade data, consumer base data, financial data. Those, who are sceptical about the current agreement, complain that this deal does not agree on norms of cyber behaviour by the international community. They understand the limitations of such an international agreement in pinpointing cyber crimes, such as the geographic point of origin, the identity of the actual perpetrator doing the keystrokes, and who was responsible for directing the act. 16 The United States, indeed, has strengthened its position against China as the two countries have agreed to address the issue at the highest level at least on a commonly agreed program, such as infringement on intellectual properties, trade and other data. With this agreement, both countries are obliged to formally engage in future cyber breaches suspected of having originated from either country. The Commission on the Theft of American Intellectual Property has estimated annual losses of $300 billion of which more than 50 percent of were attributed to Chinese hackers. 17 For American business, this deal may facilitate a new cyber environment once further complains are treated by the joint mechanism. However, for traditional government to government spying, this does not offer much or they did not want anything either. now, media, One major problem that this agreement may face is that it does not include, as of enterprises and other non-state stakeholders. Unlike the US cyber policy 6
7 making where non-state entities are far more influential than the state itself, China s cyber policy is predominantly controlled by the state. For this reason, cyber security debate in the US is heavily influenced by the non-state commercial entities and civil society. This will remain a major hindrance between China and the international community as China s cyber security policy is shaped by the principle of cyber space sovereignty, a contested perception. As the characteristics of cyberspace face limitation of attribution, only an international norm can define how the principle of territorial sovereignty can guide international cyber space. 18 As of now, the Chinese perception of the cyber space restricts the role of other stakeholders in the governance of cyber space. 19 Global trade groups have been putting pressure on the US government to find a way to get Chinese cyber laws amended as they find their mobility hindered and their reach to the vast Chinese market restricted. This deal, though an important step, does not show much hope for liberal internet governance in China and, hence, in case of cyber security violations, the Chinese state will remain the central reference and their deniability will remain unchanged. The deal hopes only to get Chinese convinced for more changes in their cyber laws in conformity with the evolving international cyber security measures. *** * Dr. Omair Anas is Research Fellow at the Indian Council of World Affairs, New Delhi Endnotes: 1 Fact Sheet: President Xi Jinping s State Visit to the United States, The White House, 25 September Retrieved: 2 China Halts Cybersecurity Cooperation after U.S. Spying Charges, 20 May Retrieved: 3 Remarks by President Obama and President Xi of the People's Republic of China in Joint Press Conference 25 September 2015, The White House, 7
8 4 Fact Sheet: President Xi Jinping s State Visit to the United States, The White House, 25 September Retrieved: 5 Global e-commerce Set to Grow 25% in 2015, 29 July Retrieved: 6 Rupert Cornwell, US Declares Cyber War on China: Chinese Military Hackers Charged with Trying to Steal Secrets from Companies Including Nuclear Energy Firm, 19 May Retrieved: 7 Global Cybersecurity Agenda (GCA), 8 Antonia Chayes, Rethinking Warfare: The Ambiguity of Cyber Attacks, Harvard National Security Journal, Vol. 6, Adam Segal, Attribution, Proxies, and U.S.-China Cybersecurity, 28 September Retrieved: Agreementhttp://blogs.cfr.org/cyber/2015/09/28/attribution-proxies-and-u-s-china-cybersecurityagreement/. 10 UK/China Cyber Security Deal: National Security Attacks Still OK, It Seems, 22 October 2015, Retrieved online URL: 11 Robert Knake, Quick Reactions to the U.S.-China Cybersecurity Agreement, 25 September Retrieved: Commentary: China is a Staunch Defender of Cybersecurity, The People s Daily, 26 September Retrieved: 14 Cyber Security a Common Task for China and US, The People s Daily, 21 September Retrieved: 15 Official website of National Computer Network Emergency Response Technical Team Coordination Center of China (CNCERT or CNCERT/CC) 16 Top U.S. Spy Skeptical about U.S.-China Cyber Agreement, Reuter, 29 September 2015, Retrieved: 17 Will the US-China Cybersecurity Pact Work? Voice of America, 29 September Retrieved: 18 Heinegg, Wolff Heintschel von, Legal Implications of Territorial Sovereignty in Cyberspace, 2012, 4th International Conference on Cyber Conflict. 8
9 19 Chinese Response to White House: It's Cyber Sovereignty, 9
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President
RUSSIA CHINA NEXUS IN CYBER SPACE
RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
China s Economic Espionage
China s Economic Espionage Stealing, Not Destroying Reema Hibrawi This paper seeks to examine the economic espionage threat to the national security of the United States from the Chinese government in
Cybersecurity. Canisius College
Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never
UN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
Confrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
Thank you for your very kind introduction.
AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act
In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.
Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
James R. Clapper. Director of National Intelligence
Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide
the Council of Councils initiative
Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global
Hearing on Commercial Cyber Espionage and Barriers to Digital Trade in China
Hearing on Commercial Cyber Espionage and Barriers to Digital Trade in China June 15, 2015 Dirksen Senate Office Building Room 608 Washington, DC 20510 Paul M. Tiao Partner, Hunton & Williams LLP Testimony
Research Project RM 01-01-08. Assumed role of India in the international community in the short and medium
Assumed role of India in the international community in the short and medium Daniel Novotný Alice Rezková SUMMARY AND CONCLUSION: RECOMMENDATIONS FOR FUTURE STRATEGIC APPROACH OF THE EU TOWARDS INDIA Assessment
Corporate Spying An Overview
Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential
United States Cyber Security in the 21st Century
United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a
Five Principles for Shaping Cybersecurity Norms
TRANSPARENCY PROPORTIONALITY HARMONIZATION RISK REDUCTION COLLABORATION Five Principles for Shaping Cybersecurity Norms Contents Introduction 3 Cybersecurity Norms 5 The Role of the Public Sector 6 Cybersecurity
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
SMALL BUSINESS PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson [email protected] WASHINGTON, D.C. Satish M. Kini [email protected] Renee
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
Women in an Age of Cyber Wars: Risks, Management and Opportunity
: Risks, Management and Opportunity Key Note Address, European Summer Academy for Leading Women June 26, 2015, Malta Dr. Sarah Lohmann, Institute for Political Science, University of the German National
Trends Concerning Cyberspace
Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming
Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
A Detailed Strategy for Managing Corporation Cyber War Security
A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait [email protected] ABSTRACT Modern corporations
For More Information
C O R P O R A T I O N CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY
Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge
Cybercrime Bedrohung, Intervention, Abwehr BKA-Herbsttagung vom 12. - 13. November 2013 Cybersecurity strategic-political aspects of this global challenge Full version Michael Daniel Special Assistant
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary
IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary Copyright Invictis Information Security Ltd. All rights reserved. Invictis Risk Intelligence Service Report Commercial
working group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
FINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015
UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI June 15th, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security Forum
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Future Governance of the Space and Cyber Commons
Promoting Cooperative Solutions for Space Sustainability Future Governance of the Space and Cyber Commons Brian Weeden Technical Advisor Secure World Foundation 2011 Secure World Foundation. Used with
FIREEYE isight INTELLIGENCE REDLINE DRAWN: CHINA RECALCULATES ITS USE OF CYBER ESPIONAGE
FIREEYE isight INTELLIGENCE REDLINE DRAWN: CHINA RECALCULATES ITS USE OF CYBER ESPIONAGE SPECIAL REPORT / JUNE 2016 CONTENTS Introduction 3 Key Findings 4 Factors Influencing Chinese Cyber Operations 5
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
CRS Reports & Analysis Print Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist ([email protected], 7-6739) View Key CRS Policy Staff May
Sponsored by. A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks
A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks Sponsored by Copyright 2014 Harvard Business School Publishing. All rights
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014
The Geospatial Approach to Cybersecurity: An Executive Overview An Esri White Paper January 2014 Copyright 2014 Esri All rights reserved. Printed in the United States of America. The information contained
THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY
THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
Research Note Engaging in Cyber Warfare
Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines
DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES
DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5500 companies in 26 countries around the world
The main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
Michael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
General Assembly. United Nations A/69/723
United Nations A/69/723 General Assembly Distr.: General 13 January 2015 Original: English Sixty-ninth session Agenda item 91 Developments in the field of information and telecommunications in the context
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 18, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter
An Introduction to Cyber Liability Insurance Catherine Berry Senior Underwriter What is cyber risk? Exposures emanating from computer networks and the internet The Cyber Risk Phenomenon The incredible
Cyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
