Volunteers and Cyber Security: Options for Georgia

Size: px
Start display at page:

Download "Volunteers and Cyber Security: Options for Georgia"

Transcription

1 TALLINN UNIVERSITY OF TECHNOLOGY Faculty of Information Technology Department of Computer Science Chair of Network Software ITI70LT Volunteers and Cyber Security: Options for Georgia Master Thesis Student: Mikheil Basilaia Student Code: IVCM Supervisor: Rain Ottis, PhD Prof. Tanel Tammet Tallinn, 2012

2 Declaration Hereby I declare that this Master s thesis, my investigation and achievement, submitted for the Master s degree at Tallinn University of Technology has not been submitted for any academic degree or examination at any other university. / Mikheil Basilaia / (Signature and date) 2

3 Volunteers and Cyber Security: Options for Georgia Master Thesis Annotation The thesis explores possibilities to develop defensive cyber capabilities of Georgia by finding practical ways to overcome the qualified manpower shortage in the cyber security sector. The work focuses on leveraging the volunteer option. The thesis brings relevant examples of potential solutions from Estonia (Cyber Defense Unit), the UK (Land Information Assurance Group LIAG; Warning, Advice and Reporting Point WARP), the USA (cyber units of Reserve Component of US armed forces), China (cyber militias), Russia (patriotic cyber volunteers) and also discusses possibilities which can arise from the Georgian environment. The thesis will not only discuss probable positive solutions, but also argue why some solutions will not work for Georgia. Potential solutions should be applicable to and implementable in Georgia taking into account its current IT environment, political, economic, social factors and resources that Georgia could realistically allocate for solutions in the coming years. Georgian example can also be useful for other small countries with limited financial and human resources. The sources of the thesis are research papers, books, (independent) experts from Estonia and Georgia, representatives of governmental agencies of Georgia, as well as supporting material from popular media. The thesis is written in English, consists of 72 pages, 6 chapters, 3 figures and 4 tables. 3

4 Vabatahtlikud ja küberjulgeolek: valikuvõimalused Georgia jaoks Magistritöö Annotatsioon Käesolev magistritöö uurib võimalusi tõsta Georgia küberkaitse alast võimekust. Täpsemalt, töö keskendub vabatahtlike kaasamisele, et vähendada kvalifitseeritud tööjõu puudust küberkaitse sektoris. Magistritöö toob potentsiaalsete lahendustena välja asjakohased näited Eestist (Kaitseliidu Küberkaitse üksus), Suurbritanniast (Land Information Assurance Group LIAG; Warning, Advice and Reporting Point WARP), Ameerika Ü hendriikidest (USA relvajõudude reservvägede küberkaitse üksused), Hiinast (küberkaitsevägi) ja Venemaalt (patriootilised kübervabatahtlikud) ning ühtlasi arutleb lahenduste ümber, mis võivad tekkida Georgia keskkonnas. Töö ei arutle ainult võimalike positiivsete lahenduste teemadel, vaid põhjendab ka, miks osad lahendused Georgia jaoks eisobi. Toodud näidete põhjal pakub töö välja Georgia olude jaoks kohandatud ja sobivad variandid, võttes arvesse riigi hetkelist infotehnoloogia keskkonda, poliitilisi, majanduslikke ja sotsiaalseid faktoreid ning ressursse, mida Georgia võiks lähiaastatel reaalselt lahenduste tarbeks töösse rakendada. Georgia näide võib kasulik olla ka teistele piiratud eelarvete ja tööjõuga väikeriikidele. Antud diplomitöö allikmaterjalideks on uurimustööd, raamatud, Eesti ja Georgia (iseseisvate) ekspertide arvamused, Georgia riiklike asutuste esindajate arvamused ning tugimaterjalid populaarmeediast. Magistritöö on kirjutatud inglise keeles, sellel on 72 lehekülge, kuus peatükki, kolm joonist ning neli tabelit. 4

5 List of Abbreviations CDU Cyber Defense Unit (Estonia) CERT Computer Emergency Response Team CERT-GE CERT of GRENA (Georgia) CERT.gov.ge National CERT of Georgia CII Critical Information Infrastructure CRRC Caucasus Research Resource Centers CVHQ Central Volunteer Headquarters (UK) DEA Data Exchange Agency (Georgia) EDL Estonian Defense League ENISA European Network and Information Security Agency GDP Gross Domestic Product GNCC Georgian National Communications Commission GRENA Georgian Research and Educational Networking Association GFR Ground Forces Reserve (Georgia) (proposed) GSAC Georgian Security Analysis Center ICT Information and Communications Technologies IDS Intrusion Detection System IETF Internet Engineering Task Force 5

6 IMF International Monetary Fund ISP Internet Service Provider IT Information Technology LIAG Land Information Assurance Group (UK) LICSG Land Information and Communications Services Group (UK) LII Legal Information Institute (Cornell University Law School) MCP Microsoft Certified Professionals' Club Tbilisi N/A Not Applicable NGO Non-governmental Organization NSC National Security Council of Georgia OPSEC Operations Security RC Reserve Component of US armed forces SWOT Strengths, Weaknesses, Opportunities, Threats TDR Territorial Defense Reserve (Georgia) (proposed) UN United Nations WARP Warning, Advice and Reporting Point 6

7 Figures Figure 1 Defacement of website of President of Georgia during cyber attacks of Figure 2 List of Georgian online targets during cyber attacks of Figure 3 A manual how to attack (ping flood) an online target Tables Table 1 Summary of various cyber volunteer entities Table 2 SWOT matrix for a volunteer entity Table 3 SWOT matrix for WARPs in Georgia Table 4 SWOT matrix for Reserve Cyber Units

8 Table of Contents 1 Introduction Problem Statement Related work Thesis overview Acknowledgements Overview of Georgian ICT sector and current Information Security Environment of Georgia Economic indicators of Georgia Information Security policy formation, legislative framework, main actors and information infrastructure Policy formation Legislative Framework Main actors Information infrastructure Current cyber security capabilities of Georgia Directions for development and overview of problems Cyber attacks of 2008 and their impact Obstacles in IT field Volunteerism in Georgia Cyber Volunteerism and Volunteer Cyber Forces Volunteer cyber forces at national level Cyber Defense League (Estonia) LIAG, LICSG, 81st Signal Squadron (UK) Warning, Advice and Reporting Point (WARP) (UK)

9 nd Network Warfare Squadron and other examples from the USA Cyber militias and patriotic volunteerism (China, India, Japan, Russia) Needs, Limitations, Building Blocks Proposals and Analysis A voluntary entity proposal A WARP Proposal Reserve Cyber Units Recommendations for Georgia Conclusion and Future Research References

10 1 Introduction 1.1 Problem Statement Developed countries are widely dependant on information systems. Developing countries are catching up in that direction. With all its benefits, technological advancement also brings the need to address security issues. Time by time world gets rude awakenings. Georgia got its cold cyber shower in The cyber attacks during the Russia-Georgia war of 2008 showed Georgia s weaknesses in cyberspace. Georgian information infrastructure was overwhelmed by attacks and both public and private sectors looked helpless. Georgia had to seek immediate help from abroad. Governmental online resources and information assets of private entities were found highly vulnerable and poorly defended. Attacks showed ultimate lack of cyber capabilities there were no entities either in public or in private sector able to defend critical information infrastructure or other information assets of the country. During the last four years Georgia s capabilities have advanced. But there is still a long way to go. While upgrading technical cyber capabilities is one issue, available human and financial resources are another. The purpose of my work is to find solutions for the manpower issue, which are not financially demanding, are possible to implement immediately and of course, improve defensive cyber capabilities of Georgia. I consider current Georgian information security environment with its needs and resources and examine possibilities of establishing various entities based on volunteerism. In the frame of the thesis, volunteerism is defined as noncommercial, self-motivated work for shared goals, which in some circumstances can be financially compensated. Throughout the thesis I discuss volunteer cyber capabilities which exist throughout the world. They can be civilian or military, established as a result of a governmental or a private initiative. They will be considered for applicability to Georgia. I take out some of the elements and add new ones to these examples to make them appropriate for Georgia s information security environment. Then I analyze possible solutions and according to their relevance, make recommendations to Georgia. My analysis employs a qualitative approach to examine proposed solutions. They are also discussed with SWOT method. The sources of the work are research papers, Estonian and 10

11 Georgian experts, representatives of the government of Georgia, articles and blog entries from authoritative newspapers, magazines and reviewers. 1.2 Related work Volunteerism in cyber space is not a new topic and there are quite a few academic works which consider various models and examples. But there are not similar riches on the issue of implementing volunteer solutions in Georgia. To be precise, there are none. The aim of my work in not a general discussion of volunteer cyber entities throughout the world, but finding practical solutions for Georgia to advance its defensive cyber capabilities. Ottis (2010) discusses the organization of employing amateur computer users to mount a cyber attack. The real-life example comes from cyber attacks on Georgia in 2008, which is thoroughly described by Grey Goose Project (2008), Tikk et al. (2008), Korns and Kastenberg (2009) and Rios (2009). Klimburg (2011a) and Krekel (2009) look at Chinese cyber capabilities and discuss Chinese cyber militias. A different approach is explained in the ENISA UK country report (2011), and Ellefsen and Van Solms (2010) who discuss the Warning, Advice and Reporting Point system (WARP) established in the UK. Along the key papers mentioned in this section, I consider various other academic works, researches and sources. 1.3 Thesis overview Chapter 2 of the work discusses current state of the Georgian ICT sector. It provides statistical data, economic indicators, and reviews current cyber capabilities and information infrastructure of Georgia, actors, policy and law issues of Georgian information security environment. Chapter 3 is concerned with existing volunteer cyber capability solutions. Examples are taken from various countries from Estonia, the USA, the UK, China, Russia, etc. Chapter 4 is concerned with existing foundations on which future volunteer entities of Georgia can be built. The main contribution of the thesis comes in Chapter 5, which outlines proposals, analyses them and recommends a course of action to Georgia. Conclusions are provided in Chapter Acknowledgements First of all, I want to thank Rain Ottis for his outstanding support, for his remarks, comments and insight. I would like to thank Tanel Tammet and Marko Kääramees for their help. I am also grateful for my friends for their notes and observations. 11

12 2 Overview of ICT sector and current Information Security Environment of Georgia Georgia declared independence from the Soviet Union in That was the new beginning for Georgia as well as for other 14 post-soviet states. The Internet had a slow start - severe economic and political problems were hindering the spread of new technologies throughout the country. For years, the Internet was luxury of a handful of people in the capital city of Tbilisi. Nowadays more than 1 million people use internet in Georgia, but it still remains inaccessible for a large fraction of population in the countryside. One of the first commercial ISPs in Georgia was Sanet, which showed up in 1993 [Caucasus Online, 2012a]. Another big ISP Caucasus Online entered the market in 1997 [Caucasus Online, 2012b]. However, the market potential remained largely unused until the 2000s. In 2000, Georgia had only 20,000 users online [Internet World Stats, 2010a], and with the population of 4.4 million, the penetration rate was 0.5%. For comparison, Estonia had 370,000 internet users at the same period [Internet World Stats, 2010b] - with the population of 1.3 million people, the penetration rate was about 30%. Currently, Georgia has 1.3 million users online [Internet World Stats, a], with the penetration rate of 29%. As of 2010, 150,000 users had broadband connection [Freedom House, 2011]. Georgian National Communications Commission (GNCC) provides data about the Internet usage based on digital technologies: for October of 2011, there were 115,000 fiber-optic, 200,000 DSL and 50,000 CDMA & EVDO users in Georgia. At the same time, Georgia had more than 3.7 million mobile phone and about 1.3 million fixed telephony users. In addition, there were 36 private radio stations and 52 private TV stations (14 cable and 12 satellite TV channels) [GNCC, 2012]. More than half of Georgian internet users access the Internet from their homes, 21% from their friend s computer, 9% from workplace, 6% from mobile phones and another 6% from Internet cafes [Freedom House, 2011]. According to the countrywide study of Caucasus Research Resource Centers (CRRC), in % of Georgians used the Internet everyday, 9% - at least once a week, 3% - once a month and 54% did not accessed the Internet at all [CRRC, 2011]. For April 1 st of 2012 there were 22 ISPs on Georgian market. Silknet had around 45% of the market 12

13 share, Caucasus Online was second with 32% and Egrisi was third with 11%. From mobile operators, Magticom possesses 2.7% (5 th place overall) of internet service market, Geocell - 0.5% (9 th ) and Beeline 0.03% (18 th ) [Karchava, 2012]. The average internet connection speed in Georgia is 6.94 Mbps and with that score the country is on the 61 th place in the world [Net Index, 2012]. For comparison, Estonia is on 28 th place with Mbps [Net Index, 2012]. The rapid development of IT sectors in the Baltic States served as an example for Georgia. Development of IT has a high position in internal political agenda and also receives a lot of attention from the Georgian media. Georgia is moving towards implementing e-government [Electronic Government Resources of Georgia, 2012]. For example, the digital ID card was introduced in 2011 [Civil Registry of Georgia, 2012], schools began to teach from the first class with laptops [Buki Project, 2012], since February 2012 it is possible to pass driving license practical tests in computerized environment (with sensors and software) without a human tester [Netgazeti, 2012]). In May 2012, The Society for Computer Knowledge Dissemination was established in Georgia [Ministry of Justice of Georgia, 2012]. The Society aims to bring IT knowledge to the regions of the country [Ministry of Justice of Georgia, 2012]. With the help of Estonian experts, educational institution for cyber security will be established in August, 2012 [Ministry of Education and Science of Georgia, 2012b]. 2.1 Economic indicators of Georgia According to IMF estimation, Nominal GDP of Georgia in 2011 was around 13 billion US dollars [IMF, 2012]. For comparison, Estonian GDP for the same period was more than 20 billion USD [IMF, 2012]. GDP of Georgia per capita was around 3,000 USD and the same indicator for Estonia was more than 15,000 USD [IMF, 2012]. National Statistics Office of Georgia estimated the share of communications sector in country s GDP as 2.7% and financial services had share of 2.3% in 2011 [National Statistics Office of Georgia, 2012b]. Compared to 2010, share of communications sector increased by 8% and of financial services - by 24% [National Statistics Office of Georgia, 2012b]. Unfortunately the document does not provide any data concretely on IT sector [National Statistics Office of Georgia, 2012b]. 13

14 Budget of Georgia was 7 billion GEL (around 4.1 billion USD) for 2011 [Corso, 2010; Ministry of Finance of Georgia, 2012a]. Ministry of Defense got around 400 million USD [Ministry of Finance of Georgia, 2012b]. 2.2 Information security policy formation, legislative framework, main actors and information infrastructure Policy formation National Security Council of Georgia (NSC) is the main advisory body to President of Georgia [NSC, 2012a]. One of the responsibilities of NSC is to define security policy of the country including information security and cyber security [NSC, 2012a]. It is the author of National Security Concept of Georgia [2011]; it took part in elaboration of Draft Law of Georgia on Information Security [NSC, 2012b]; and it is working on National Cyber Security Concept of the country too [NSC, 2012c]. GNCC and Ministry of Economy and Sustainable Development are also concerned with ICT policy formation. GNCC is a regulatory body for electronic communications field, its main responsibilities are creating fair environment in ICT sector and defending lawful interests of the users [GNCC, 2005]. There is the department of Communications, Informational Technologies and Innovation at the Ministry of Economy [Ministry of Economy and Sustainable Development, 2012]. Some of the responsibilities of the Department are defining and monitoring main directions for ICT development and elaboration of Georgian e-government concept [Ministry of Economy and Sustainable Development, 2012] Legislative framework Georgian information security legal environment is under development. Various laws are being under consideration in correspondence with European Union regulations and standards. Cyber security has its place in national conceptual and strategic documents of Georgia. The National Security Concept names strengthening cyber security as one of the 14 national interests of the country [National Security Concept of Georgia, 2011]. The Document for Threat Assessment of Georgia for declares security of Georgian cyberspace of the same 14

15 importance as security of Land, Sea and Air spaces of the country [Threat Assessment for , 2010]. In addition, National Security Council is working on the national cyber security strategy of Georgia [NSC, 2012c]. Georgia is a signatory to Cybercrime Convention of Council of Europe, but has not yet ratified it [Council of Europe, 2012]. For the moment there is no statistical data available about cyber crime volume in the official crime statistics of Georgia [National Statistics Office of Georgia, 2012a]. There is the Law of Georgia on Digital Signature and Digital Document [2010]. In the beginning of 2012, Law of Georgia on Protection of Personal Data was enacted [2012]. Cyber crime and cyber terrorism were defined in Criminal Code of Georgia also in 2012 [Matsne, 2012; Criminal Code of Georgia, 2012], but the major legislative shifts are still to come. Law of Georgia on Information Security, which was drafted to parliament in February, 2012, will be a step ahead for development of Georgian information security environment [Draft of Law of Georgia on Information Security, 2012; NSC, 2012e]. The law will define Critical Information Infrastructure (CII) as entities and their activities which are vital for the security and economy of the country, for normal functioning of the government and the society of Georgia [Draft of Law of Georgia on Information Security, 2012, p. 2]. The list of the critical infrastructure will be compiled by the National Security Council of Georgia within 6 months after the enforcement of the Law on Information Security [Draft of Law of Georgia on Information Security, 2012]. The law also sets 3 levels of information classification (confidential, restricted, public) for critical infrastructure entities [Natroshvili, 2012], obliges the entities to introduce the position of Information Security Officer and to have personnel dedicated to information security [Draft of Law of Georgia on Information Security, 2012]. The law will grant rights to set countrywide information security standards to Data Exchange Agency (DEA) [Draft of Law of Georgia on Information Security, 2012]. 15

16 2.2.3 Main Actors Data Exchange Agency (legal entity of Georgian Public Law, established under the auspices of Ministry of Justice [Ministry of Justice, 2010]) can be considered as a main executive body in information security and cyber security field in Georgia. At the same time it has limited power to influence policy formation. DEA s rights and responsibilities are outlined in the Law of Georgia on Creation of a Legal Entity of Public Law Data Exchange Agency [2009]. According to this legal document, DEA is responsible for supporting the development and coordinating united national policy for IT development, implementing the electronic governance system, elaborating information security policy standards and supporting its implementation, setting standards for data preservation and exchange [Law of Georgia on Creation of DEA, 2009]. DEA is supposed to play a more active role in Georgian information security environment after the Draft Law on Information Security will be adopted by the Georgian Parliament [Draft of Law of Georgia on Information Security, 2012]. National CERT of Georgia (CERT.gov.ge) is part of DEA [DEA, 2011a). Law on Information Security will widen its rights and responsibilities too [Draft of Law of Georgia on Information Security, 2012]. CERT.gov.ge s main task will be defending critical information infrastructure of Georgia [Draft of Law of Georgia on Information Security, 2012]. There are some other entities, which play their role in Georgian information security environment and they will be discussed in the Section 2.3 concerning current cyber security capabilities of Georgia Information Infrastructure Currently one of the most influential public projects is implementation of electronic government [Electronic Government Resources of Georgia, 2012]. E-governance is one of the priorities of the government and the working processes of various ministries are being digitalized [Civil Service Bureau, 2012]. One of the main achievements of the e-governance reform is the adoption of the digital ID card. It was introduced in 2011 and can be considered as information infrastructure asset for the 16

17 country [Civil Registry, 2012]. Some of the functions of the digital ID card are identifying a person online, providing digital signature and facilitate the use of various services from online banking to public transport [Civil Registry, 2012]. First digital ID card was issued in August 2011 and as of February, 2012 Georgia had more than 160,000 digital ID card holders [Navigator, 2012a]. Georgian government announced the tender to create the Georgian Governmental Network (GGN) in 2007 [Magticom, 2008; Navigator, 2007]. The idea was to develop a network (based on VPN) which would cover the whole country and include governmental agencies and other public institutions to facilitate data exchange [Navigator, 2007]. Mobile communications company Magticom won the tender and by 2009 the GGN was created [Magticom, 2008; Navigator, 2007]. The communications infrastructure is centralized to Tbilisi. Georgian ISPs get the Internet connection from Turkey and Russia by land based cables and from Bulgaria via the fiber-optic cable under the Black Sea [GNCC, 2008]. The Black Sea fiber-optic cable is operated solely by one of the Georgian ISPs Caucasus Online [Liberali, 2011; Caucasus Online, 2012b]. From a countrywide perspective, dependency on Russian and Turkish upstream providers was reduced after the Black Sea fiber-optic cable become operational. The importance of having duplicating connections was well demonstrated in 2011, when an old Georgian woman, who was digging for scrap, accidentally cut the cable and left almost all of Armenia without Internet connection for several hours [Parfitt, 2011]. All major banks in Georgia offer online banking (internet banking) service to their customers. During cyber attacks of 2008 (which are discussed in more detail in Section 2.4.1), Georgian banks were not able to provide their online services for 10 days [Tikk, et al. 2008]. It should also be mentioned that banks do not provide their online banking statistics. For example, TBC Bank considers it confidential information [TBC]. 17

18 2.3 Current cyber security capabilities of Georgia The cornerstone of Georgian cyber defense capabilities is DEA, which is part Ministry of Justice of Georgia (therefore it is a completely civilian entity). By legal status, DEA is a legal entity of public law [Law of Georgia on Creation of DEA, 2009]. It was established in 2010 [Ministry of Justice of Georgia, 2010]. DEA develops and maintains data exchange capacity between different governmental agencies and ensures information security of the critical information infrastructure [Law of Georgia on Creation of DEA, 2009]. From information security point of view, DEA is only concerned with public entities and critical information infrastructure [Draft of Law of Georgia on Information Security, 2012]. The legal basis for DEA as a main pillar of information security of Georgia is outlined in the Draft of Law of Georgia on Information Security [2012]. It will give DEA the responsibilities to set the information security standards and if needed, audit, test and monitor the information systems of critical infrastructure (upon their request and in correspondence of the standards set by DEA itself) [Draft of Law of Georgia on Information Security, 2012]. In case of cyber attack, DEA will be able mobilize all information security personnel who work in critical infrastructure entities [Draft of Law of Georgia on Information Security, 2012]. Arguably the main cyber capability asset of Georgia is the National CERT of Georgia - CERT.gov.ge. It is created under the auspices of DEA and became operational about a year ago [DEA, 2011a]. Its main responsibility is reacting to cyber incidents [DEA, 2011a]. CERT.gov.ge is part of Trusted Introducer (European network of CERTs) and a member of International Telecommunication Union s (ITU) IMPACT agency formal cyber security executive arm of the United Nations [DEA, 2011b; Navigator, 2012]. The Law on Information Security will give CERT.gov.ge more rights and responsibilities - one of them will be responding to cyber attacks [Draft of Law of Georgia on Information Security, 2012]. CERT.gov.ge is supposed to be concerned, first of all, with critical information infrastructure of the country [Draft of Law of Georgia on Information Security, 2012]. During cyber attacks CERT.gov.ge will have the power to request any information from critical infrastructure entities about their attacked systems if this information is needed to repulse/stop the attack [Draft of Law of Georgia on Information Security, 2012]. 18

19 According to the head of analytical department of National Security Council Lasha Darsalia Ministry of Internal Affairs of Georgia is developing some capabilities too, but their aim is to fight cyber crime [Darsalia, 2012]. From non-governmental capabilities CERT-GE can be distinguished. It was established in 2006 [Tabatadze, 2010]. CERT-GE is hosted by Georgian Research and Educational Networking Association (GRENA) [GRENA, 2012a]. It is part of Trusted Introducer [GRENA, 2012a]. CERT-GE offers various services to GRENA s customers: implementation and maintenance of Intrusion Detection Systems (IDS), incident coordination, vulnerability announcement, IP monitoring [GRENA, 2012a]. CERT-GE is oriented only on NGOs and commercial entities [GRENA, 2012b]. There are some think tanks working in the area of information security/cyber security. One of them is Information Security Studies and Analysis Center (ISSAC). It was established in 2010 and has some educational and certification programs in information security. It also offers information security consulting and software solutions to its customers [ISSAC, 2012]. Another think tank is Georgian Security Analysis Center (GSAC), which was established at another think tank - Georgian Foundation for Strategic and International Studies (GFSIS) [GSAC, 2012a]. GSAC is focused on research of current problems in information security and cyber security of Georgia. They have a cyber security awareness project [GSAC, 2012b]. Within the project, they try to raise various global or local cyber security issues via articles published online or in printed newspapers/magazines [GSAC, 2012b]. The Club of Microsoft Certified Professionals can be counted as cyber capability [MCP, 2012]. Another informal group is overclockers. They run website and forum and often meet to discuss various computer related issues [Overclockers, 2012]. The now-defunct site hacking.ge could be also considered as cyber capability. Its members ran popular forum topics about cyber defense issues (steps to enhance IT security, manuals for defense against various attacks, etc). The site was one of the early targets of August 2008 cyber attacks on Georgia [Tikk et al, 2008; Grey Goose, 2008]. 19

20 2.4 Directions for development and overview of problems Cyber attacks of 2008 and their impact The problems of Georgian cyberspace were brought to the surface during the war between Russia and Georgia in August, Conventional warfare was accompanied by cyber attacks on Georgian information infrastructure. On the other hand, Grey Goose project understood that cyber attacks on Georgian web resources began even earlier - in July [Tikk, et al., 2008; Grey Goose, 2008; Rios, 2009; Nazario and DiMino, 2008; Hollis, 2011]. During actual military confrontation various kinds of cyber attacks occurred more actively used methods were Distributed Denial of Service (DDoS) attacks with botnets and SQL injections [Tikk, et al., 2008; Rios, 2009; Danchev, 2008; Gray Goose, 2008]. Website of President of Georgia Mikheil Saakashvili was defaced and instead of original content a propaganda poster (Figure 1 [Tikk, et al., 2008]) was placed [Tikk, et al., 2008; Markoff, 2008]. Georgian fragile cyber capabilities were overstretched as they had to cope with various threats. Georgian side was dictated the terms of conflict and by having to respond to different attacks, their chances for success diminished [Rios, 2009; Grey Goose, 2008]. Georgian government had to move its web resources to other servers. Websites of President of Georgia and Ministry of Defense were moved to the servers of Tulip Systems to the USA [Korns and Kastenberg, 2009; Tikk, et al,. 2008]. Website of Ministry of Foreign Affairs was moved to Estonian servers [Tikk, et al., 2008], but to disseminate press releases and news updates the Ministry had to use Blogspot blogging service (website still available at ) [Korns and Kastenberg, 2009; Tikk, et al., 2008]. Website of President of Poland ( helped Georgian government with posting news and press releases on their site [Tikk, et al., 2008]. Non-governmental sites (news portals, online forums, banks) were also targeted. News site Civil.ge moved to Blogspot [Tikk, et al., 2008]. National Bank of Georgia ordered private banks to stop providing their online services and they only resumed their operations in 10 days [Tikk, et al., 2008]. 20

21 Georgia did not have national CERT in Its role was assumed by CERT-GE of GRENA [Tikk, et al., 2008]. Georgia needed help in forensics. Polish, French and Estonian CERTs assisted Georgia with their expertise [Tikk, et al., 2008]. Figure 1. Website of President of Georgia was defaced and propaganda poster uploaded. Some analysts suggest, that outsourcing of services was a good maneuver from Georgian side [Korns and Kastenberg, 2009], but one may argue that this was an act of desperation. First conclusion to be drawn from 2008 cyber attacks was the inability of the Georgian government to defend (at least in place, without outsourcing) its information infrastructure. At the same time, cyber attacks did not deteriorate only governmental resources, but also online communication capabilities. Korns and Kastenberg note, that Georgia was cyber-locked [2009; p. 1] the government and population of Georgia were not able to communicate online to each other and to the outside world [Tikk, et al., 2008; Grey Goose, 2008; Hollis, 2011; Downing, 2011]. Government was not able to spread its messages and the people of Georgia were left in 21

22 information vacuum [Tikk, et al., 2008]. Georgian cyberspace was frozen. Civil society and private sector did not have any reasonable response to cyber attacks. In response counterattacks or direct engagement are not meant, but rather finding ways to break the cyber deadlock. In addition to governmental cyber incapability, it can be concluded that private sector and Georgian society in general were not prepared for the scale of cyber aggression of The cyber attacks showed that Georgia not only needs developing cyber capabilities to defend its governmental resources and critical infrastructure, but private sector is also in need of cyber initiatives. Government can be a leader in developing information security environment in the country. But without cooperation and initiatives from private sector and civil society, Georgian cyber capability development will be full of obstacles. In the Western countries, major part of information infrastructure and moreover of critical information infrastructure falls on private sector, which underlines the importance of public-private partnership on one hand and the power of private sector on another. Cyber attacks of 2008, not surprisingly, had an impact on cyber security perception in the country. Cyber security rose upwards in the internal political agenda. It is named as one of the 14 national interests in the National Security Concept of Georgia [2011], when it was not mentioned in the document of 2005 at all [National Security Concept of Georgia, 2005]. DEA and National CERT (CERT.gov.ge) were established. IT as a field of study and research became one of the top priorities for Ministry of Education of Georgia alongside exact sciences and engineering [Ministry of Education and Science of Georgia, 2012a] Obstacles in IT Field Georgia is a developing country, which has to pay attention to a number of economic and social problems. For the moment, the biggest issue on the way of IT development is resources - both human and financial. As Khatuna Mshvidobadze, expert at local think tank GSAC notes, Georgia lacks both quality and quantity of personnel [2012]. After the collapse of the Soviet Union the education system of Georgia also collapsed. The reforms were taken only in 2000s. IT as a study and research field was practically non-existent several years ago in Georgia. To address the problem, Georgia decided to establish a school for cyber security with the help of Estonian 22

23 expertise [Ministry of Education and Science of Georgia, 2012b]. There are many IT certifications and private IT educational programs available in the country too. One of the solutions to fill the gap between available and needed human resources is volunteerism. Even countries which have much more human and financial resources use volunteers in cyber defense. Exploring volunteerism opportunities will allow Georgia to use its scarce human resources in a more efficient way Volunteerism in Georgia1 Volunteerism as self-motivated, non-compensated work is not widespread in Georgia. According to CRRC study, only 4.8% of population of Georgia did volunteer work in 2007 [CRRC, 2008]. In European Union about 90 million people do volunteer work annually [Abashidze and Abashishvili, 2012]. Volunteer inclusiveness of Europeans is average of 22% of the total population of age 15 and more [Abashidze and Abashishvili, 2012]. From 20% to 29% of population volunteer every year in Estonia [Abashidze and Abashishvili, 2012]. UN valued annual planet wide volunteer contribution as 10 billion USD in 2004 [United Nations Volunteers, 2004]. Weak volunteer culture in Georgia is sometimes explained by lack of incentives. Abashidze and Abashishvili note, that volunteerism is not popular in almost every former Warsaw pact country, moreover if it is a collective activity [2012]. Clearly, Soviet times influenced Georgian minds on volunteerism. In Soviet Union volunteer activities were part of communist ideology and in reality were obligatory and forced. This undermined not only the understanding of the term, but also the motivation of people to volunteer [Abashidze and Abashishvili, 2012]. Other than Soviet mentality, Georgian society does not have any objection to volunteerism. Foreign volunteers are welcomed in Georgia and local young people (mainly students) do not refuse opportunities to volunteer (sometimes mixed up with internship [Abashidze and Abashishvili, 2012]). 1 Please note that in this subchapter volunteerism is considered as self-motivated, non-compensated work. 23

24 Georgian labor code is flexible. Georgia does not have minimum salary and labor contract can be written as well as oral [Labor Code of Georgia, 2010]. The termination of labor contract is easy and more flexible than in European countries [Abashidze and Abashisvhili, 2012; Labor Code of Georgia, 2010]. In spite of the fact that volunteer and volunteerism are not defined in the labor code of Georgia, it hardly can be considered as an obstacle to volunteer work [Abashidze and Abashishvili, 2012]. 24

25 3 Cyber Volunteerism and Volunteer Cyber Forces Volunteer, non-profit activism was one of the major drives for the development of global cyberspace. In late 1980s Computer Emergency Response Team Coordination Center (CERT- CC) was established at Carnegie Mellon University [Ferwerda, et al., 2010; Killcrece, 2006]. Its creation was motivated by the Morris worm and its responsibilities were to respond to emerging security threats in cyberspace [Killcrece, 2006]. It was volunteer, non-profit organization and for now it has transformed into a coordination point of national CERTs of various countries [Ferwerda, et al., 2010]. Actually there can be several CERTs in a country. Basis for CERT operations is volunteerism and it is non-profit in nature [Ferwerda, et al., 2010]. Internet Engineering Task Force (IETF) is another relevant example for the case. IETF is an open organization, which develops Internet standards and its members are volunteers [IETF, 2012]. As IETF members say, they reject kings, presidents and voting. And believe in rough consensus and running code (the phrase is attributed to American computer scientist David Clarke) [IETF, 2011; Borsook, 1995]. Another example of international cyber volunteerism is Grey Goose a non-profit project of independent cyber security experts, who were interested in 2008 cyber attacks on Georgia [Grey Goose, 2012]. The project researched the attacks and provided two reports about it [Grey Goose, 2012]. The thesis employs the findings of these reports. 3.1 Volunteer cyber forces at national level World gets more and more dependent on information systems and communications. Information security and cyber security are climbing up on the hierarchical tree of political agendas in lots of countries. Human resources are usually scarce in IT field; on the other hand government has to spend millions, sometimes billions of US dollars to implement effective cyber security measures and to boost cyber capabilities. The issue of volunteerism comes forward at this time and there are examples of incorporation of volunteers in cyber defense of several countries. 25

26 Volunteerism usually means self-motivated, uncompensated work. People volunteer to gain skills and experience or spend their free time doing activities they like. There can be various incentives set (in some circumstances including financial compensation) to attract volunteers. The following sections bring and discuss cyber volunteering examples from Estonia, the UK, the USA, China, Japan, India and Russia. These examples may be based on different understanding of volunteerism, but the differences will be explained in each occasion Cyber Defense Unit (Estonia) Estonia provides an example of cyber volunteerism with its Cyber Defense Unit (CDU) of Estonian Defense League (EDL). EDL is a voluntary paramilitary organization and is included in Defense Forces of Estonia [Kaitseliit, 2012d]. Any citizen of Estonia can apply to join EDL. People with IT education and experience can join CDU. The issue of establishing a volunteer cyber entity was raised after the cyber attacks on Estonia in 2007 [Kaitseliit, 2012b]. Creation of CDU was a bottom-up initiative - interested parties found each other and self-organized [Anon. A., 2012; Anon. B., 2012]. Estonian Ministry of Defense decided to make CDU the separate unit of EDL in 2011 [Estonian Ministry of Foreign Affairs, 2011; Gelzis, 2011; Estonian Ministry of Defence, 2011]. CDU aims to bring Estonian volunteer cyber security expertise together both from public and private sectors [e-estonia, 2012]. Expertise scope of members of CDU spans from programming to information security management and law [e-estonia, 2012]. Slogan of CDU is Defending Estonia s high-tech way of life [Kaitseliit, 2012a]. Its missions include cooperation enhancement and knowledge sharing [Kaitseliit, 2012a]. CDU works in the direction of cyber security awareness rising, has various training programs for members and runs several projects [Kaitseliit, 2012a; Gelzis, 2011]. 26

27 CDU has less than 100 members [Estonian Ministry of Foreign Affairs, 2011; Gelzis, 2011]. It has its own commander and employs military ranks [Gelzis, 2011]. CDU has two sub-units one is based in capital Tallinn and another - in Tartu, second largest city of Estonia [Gelzis, 2011]. In general, CDU members are not paid for their membership, but the CDU has several full-time employees who take care of the administrative details [Anon. A., 2012]. As for incentives, members are encouraged to participate in relevant events, conferences and fairs. Transportation, participation fee (if any) and daily allowance (in case an event is held abroad) are compensated [Anon. A., 2012]. CDU has its own infrastructure. Part of equipment was donated by members, another part by Estonian private companies [Anon. A., 2012; Anon, B, 2012]. This underlines the voluntary value of CDU and the willingness of its members to cooperate for a shared set of goals LIAG, LICSG, 81 st Signal Squadron (UK) British and American military have advanced cyber capabilities, which include volunteer units. British Central Volunteer Headquarters Royal Signals (CVHQ) [British Army, 2012a] includes 3 volunteer units: Land Information Assurance Group (LIAG) [British Army, 2012b], Land Information and Communications Services Group (LICSG) [British Army 2012c] and 81 st Signal Squadron [British Army, 2012d]. LIAG was established in 1999 and provides information assurance expertise to British Army, Air Force and Navy [British Army, 2012b]. LIAG can be called to any place of the world where British military forces conduct operations. Since 1999, LIAG gained working experience in Afghanistan, Iraq, Germany, Kosovo, etc [British Army, 2012b]. LICSG provides management and technical support capability to information infrastructure (including software and network infrastructure and the Internet technologies) of the British army (including Air Force and Navy) [British Army, 2012c]. As the name implies itself, its one of the main area of expertise is communications [British Army 2012c]. 27

28 81 st Signal Squadron does not have as much connection to cyber security as LIAG and LICSG. It provides fixed telecoms expertise to British Army. Its members are telecommunications engineers [British Army 2012d]. LIAG and LICSG members are highly qualified, trained IT professionals, who have served in different structures of British military [British Army, 2012b]. Usually they have civilian careers in British ICT sector [British Army, 2012b]. LIAG, LICSG and 81 st Signal Squadron are part of British Territorial Army (TA) [British Army, 2012a]. TA is volunteer reserve force of the British Army [British Army, 2012f], but a member of LIAG/LICSG/81 st Signal Squadron may also be a regular military serviceman [British Army, 2012b]. When on duty (training or actual military operation), the TA members are paid [British Army, 2012e]. At the same time, they can claim difference between their civilian wages and military allowance [Job Spectrum, 2012]. Therefore LIAG (as well as LICSG and 81 st Signal Squadron) members are not volunteers in the strict understanding of the term (self-motivated, non-paid activists), but they fit in the volunteerism definition employed by the thesis for proposals to Georgia: noncommercial, self-motivated work for shared goals, which in some circumstances can be financially compensated. LIAG, LICSG and 81 st Signal Squadron members are picked out carefully. For example, a candidate wishing to serve in LIAG should have information assurance qualification and at least 5 years of working experience [British Army, 2012b]. The units have regular meetings and trainings. Serving period is at least 19 days a year [British Army, 2012b]. Civilian careers of the members ensure that they are aware of the new developments in their respective fields. Their qualification suggests that these units may need only specific/focused training for relatively short period of time. 28

29 3.1.3 Warning, Advice and Reporting Point (WARP) (UK) UK contributes another example of cyber volunteerism with a Warning, Advice and Reporting Point (WARP) an establishment providing early warning, expert advice and incident reporting services to its members. A WARP is a community of 20 to 100 members. Potential members of a WARP are legal entities of both public and private law - local governments, educational or nonprofit entities, commercial companies, etc. [WARP, 2012c]. A WARP can be created by bottomup initiative, by its future members [WARP, 2012a]. The participation in a WARP is voluntary and they are non-profit in nature [WARP, 2012a; Harrison, 2009]. There can be a lot of WARPs in a country. WARP s functioning is based on trust of its participants they share their cyber incidents, IT security problems and other security-related information (anonymity can be ensured) [WARP, 2012a]. A WARP is built around an operator, who is not necessarily a person with IT background [WARP, 2012a]. The operator communicates with WARP members by (as usual) electronic means and shares relevant information (incident reports, threat warnings, advice to mitigate the results of potential/ongoing damages) among the parties. WARPs were introduced as cost-effective solution to mitigate risks from malicious hackers, organized crime, malware and other threats existent in the global cyberspace [WARP, 2012a; Harrison, 2009]. A WARP can be established taking into account administrative division of a country or can be created in a particular business sector. For instance, there is a WARP for North Western Region of the UK (NWWARP), Police WARP (PolWARP), WARP provided by Northumbria University for small and medium sized enterprises (NUWARP) [WARP, 2012c; ENISA, 2011]. There are WARPs for various kinds of communities (WARP for Radio Amateurs) and for international organizations too (IE1WARP for Irish small and medium sized enterprises) [WARP, 2012c; ENISA, 2011]. There are 20 active WARPs and 6 WARPs whose status is pending [WARP, 2012c]. 29

30 The official website for WARP ( provides case studies, which illustrate how a WARP works and what can be its benefits in various circumstances [WARP, 2012b]. One of the case studies tells a story of a WARP, whose members used the same software to manage housing benefits. One of the workers at a WARP member entity updated software. But the patch caused the software to stop working, which actually resulted in Denial of Service. Other members of the WARP were immediately informed about the issue and the early warning avoided service hindrance at other member entities of the WARP [WARP, 2012b] nd Network Warfare Squadron and other examples from the USA Alongside the UK, the USA possesses advanced military cyber capabilities. In addition to its regular active forces, volunteer cyber personnel and units can be seen in the Reserve Component (RC) of US armed forces. The RC includes Navy, Marine Corps, Army, and Air Force Reserve, as well as the Air and Army National Guard [LII, 2012a]. In spite of billions of financing and professional pool of manpower, US Department of Homeland Security and US Department of Defense have their limitations. Once active duty military personnel gain cyber expertise and security clearances, they often leave the military for high pay in the private sector. National Guard and Reserve cyber units often capture those that leave the military [Evans, 2012]. The RC adds valuable expertise to already existent capabilities and provides services to various military units [Homeland Security NewsWire, 2011; Francis, 2011]. Examples of American volunteer cyber forces include the 175 th Network Warfare Squadron (Maryland Air National Guard, Ft. Meade, Maryland), the 166 th Network Warfare Squadron (Delaware Air National Guard, Ft. Meade, Maryland), the 262 nd Network Warfare Squadron (Washington Air National Guard, McChord AFB, Washington) and Virginia Army National Guard Data Processing Unit [Evans, 2012; Puryear, 2006; Campbell, 2011; Matthews, 2008; Virginia National Guard, 2011]. There can be found other cyber units at National Guard and Land, Air Force and Navy reserve structures [United States Navy, 2012; Matthews, 2008]. 30

31 The first two Network Warfare Squadrons in the Air National Guard conducting national missions include the 175 th Network Warfare Squadron and the 166 th Network Warfare Squadron [Evans, 2012]. They are part of U.S. Cyber Command and 24 th Air Force [Evans, 2012]. Both units conduct Computer Network Operations, including Computer Network Defense and other related activities at the National Level [Evans, 2012; Matthews, 2008]. Many of their members come from civilian governmental agencies, government contractors, the academic community and other highly qualified personnel [Evans, 2012; Matthews, 2008] Another cyber unit is 262 nd Network Warfare Unit which is tasked with finding vulnerabilities in Air Force (as the unit is part of Air Force) computer systems and provide OPSEC expertise to Air Force [Bergesen, 2004; Hemstreet, 2010]. The unit includes programming, network security and communications proficiency [Bergesen, 2004]. Virginia Army National Guard Data Processing Unit served in Iraq, Afghanistan and other countries as a mobile CERT providing technical expertise and threat analysis to the army [Virginia National Guard, 2011]. They also monitored official and unofficial army websites for OPSEC breaches [Newborn, 2006]. Usually members of National Guard/Reserve cyber units are IT professionals with respective experience and qualification. For example, 262 nd Network Warfare Squadron is made up from employees of Microsoft, Cisco, Adobe and other leading corporations of IT sphere [Lasker, 2007]. Like their British counterparts, American National Guard/Reserve members are not volunteers in its strict sense. They are paid for their service in National Guard or in reserve forces [US Army National Guard, 2012; US Office of Personnel Management, 2012]. Concerning on duty/training period, National Guard and Reserve forces are based on formula one weekend per month and for two weeks a year. Reserve members are required to do at least 35 duty days annually [Evans, 2012; Military.com, 2012]. But serving can go on longer in case of needs defined by the US law [LII, 2012b]. 31

32 Like in British LIAG, LICSG, 81 st Signal Squadron case, civilian careers of the American cyber units members ensure that they stay tuned on advancements in their field of expertise Cyber militias and patriot volunteers (China, India, Japan, Russia) China, one of the busiest actors of global cyberspace, is rich with cyber capabilities. It reportedly has an (unofficial) group of 30,000 cyber agents [Klimburg, 2011a]. China utilizes its vast human resources to build diverse capabilities. It employs IT professionals both from private and public sectors (also from military) including academia and hi-tech savvy students [Klimburg, 2011a; Krekel, 2009; Carr, 2011; Wittman, 2011]. Chinese government has established cyber capabilities at both federal and local levels of government [Klimburg, 2011a; Krekel, 2009]. Militaries develop their own cyber forces. Government and military are focused on different tasks the former is more oriented on internal politics and censorship, the latter is engaged with attacking operations and tries to obtain military advantage in cyberspace [Carr, 2011]. Chinese cyber units (sometimes called information warfare units in academic works and media) are organized in local militias - usually province, municipality or county administrations/local governments have their own capabilities developed [Krekel, 2009]. They are established around local educational or research institution [Krekel, 2009; Klimburg, 2011]. That can be one reason why some attacks on American federal resources are traced back to universities or other public institutions in various towns throughout China. Concerning cyber militias, it is hard to speak about any kind of volunteerism. China is authoritarian state and its government coerces or co-opts (democratic states mostly convince) cyberspace actors to mobilize and use them [Klimburg, 2011b]. Chinese physically able men between 18 and 35 are supposed to be conscripted either for regular military service or reserve forces [Klimburg, 2011a]. But if a person is not conscripted because of any reason, he is supposed to enter in local militia service [Klimburg, 2011a]. If not conscription, appeal on patriotism can lure people into cyber hacktivism. Academic incentives can be set to incorporate students and they are believed to be actively involved in local cyber militias [Klimburg, 2011a; Krekel, 2009; Carr, 2011]. 32

33 Comparing to American and British military volunteer cyber units, advantage of Chinese counterparts is in numbers. American and British units are comprised of IT professionals, when Chinese militias are more catch-all style entities. IT students, who are going to be drafted for any kind of cyber service, have training sessions for at least a month [Klimburg, 2011a]. Serving period may not be defined at all as cyber militias are of fluid structure; on the other hand, its members may be able to accomplish tasks from their own homes or educational institutions. Chinese cyber militias provide both offensive and defensive capabilities. But Chinese offensives are one of the favorite cyber topics for Western media and academia. Interestingly, McAfee supported report of Brussels based think-tank SDA (Security & Defence Agenda), estimates China s cyber-readiness as moderate against high expectations [Grauman, 2012; Lee, 2012; Miks, 2012; Phneah, 2012]. China lags behind the USA, the UK, Estonia and other European countries as well as Japan in cyber-readiness index [Grauman, 2012]. Other than institutionalized cyber units, China has a large pool of hacktivists, who may attack (local or international) targets identified by the government. In exchange, the government turns a blind eye to their (supposedly criminal) activities [Klimburg, 2011a]. Other Asian nations also have patriot hacker groups, for example India and Pakistan [Grey Goose, 2009; Carr, 2011; Dudney, 2011]. Chinese cyber militia model on one hand and their activity in cyberspace on another, serves as an example to other Asian nations. India and Japan are presumed to wish to incorporate their (patriot) hackers in institutionalized units [Segal, 2012]. According to Japanese expert Motohiro Tsuchiya, Japan, closely monitoring cyber capabilities of China, Russia and North Korea, needs cyber experts to boost its own cyber capabilities and feel secure in cyberspace [2012]. India, like China, has vast human resources. In 2010, Indian educational institutions were supposed to produce more than half million graduates and post-graduates with technical background [Times of India, 2010]. In order to enhance cyber capabilities of the country, Indian officials considered granting legislative protection to its cyber recruits [Times of India, 2010]. Besides human resources, India has another advantage American and European tech corporations (Microsoft, Intel, McAfee, etc.) have outsourced part of their services and 33

34 established Research and Development units there [Times of India, 2010; Hagerty, 2012; MSIDC, 2012]. Along with China and India, Russia provides a prominent example of volunteer, patriot hacktivists [Ottis, 2010; Nazario, 2009]. They do not have institutional organization and their activities are organized ad-hoc [Ottis, 2010]. Their skill levels vary greatly from amateurs/script kiddies to experienced IT professionals [Ottis, 2010]. Targets and manuals to attack are usually posted online. On Figure 2 [Tikk, et al., 2008] and Figure 3 [Gray Goose, 2008] are shown respectively Georgian online targets and manuals. They were hosted on various Russian-language websites and forums alongside vulnerability reports and different hacking tools during 2008 cyber attacks on Georgia [Tikk, et al., 2008; Grey Goose, 2008]. There are doubts but no proof that Russian hacktivists have affiliation to Russian government [Grey Goose, 2008; Grey Goose, 2009; Tikk, et al., 2008]. Figure 2. List of Georgian online targets during 2008 cyber attacks 34

35 Well-known deeds of Russian cyber volunteers include attacks on Estonia (2007), on Lithuania (2008) and on Georgia (2008) [Dudney, 2011]. In Estonian and Lithuanian cases, cyber attacks coincided with political complications between these countries and Russia. As for Georgia, cyber attacks accompanied conventional warfare between two states. Figure 3. A manual how to ping flood Volunteer hacktivists, who are active in Asia as well as in Russia, can bring short term gains and temporarily increase nation s cyber capabilities. It can also reserve some financial resources. But in the long term perspective the issue of controlling these hackers arises. It bears destabilizing power for relations between countries and political complications are already observable in Asia [Segal, 2012]. Playing difficult to attribute (which can be considered one of the advantages of patriotic hacktivism) card can have counterproductive effect. Table 1 briefly summarizes major aspects of various cyber volunteer forces and entities discussed above. There are other examples of cyber volunteerism throughout the world, but the thesis analysis is limited to these instances. 35

36 Table 1. Summary of various cyber volunteer entities Entity Status Cyber Defense Unit (Estonia) Para-military WARP (UK) Legal entity of public law (or a NGO) LIAG, LICSG, 81st Signal Squadron (UK) Military Reserve (Territorial Army) 262nd Network Warfare Squadron (USA) Virginia Army National Guard Data Processing Unit (USA) Membership Voluntary; Professionals2 Voluntary membership of entities of both public and private law Voluntary (Paid) Professionals. Picked up with careful examination of experience and skills Mission / Responsibilities Cooperation enhancement between public and private sectors, knowledge sharing, awareness, member training Military (Army National Guard) Professionals from leading IT sector corporations Voluntary (paid) Professionals Depends on members Incident reporting, early warning, expert advice N/A Providing Information Assurance, communications, fixed telecoms expertise to British Army, Air Force, Navy Serving at least 19 days a year At least 35 duty days a year. Voluntary (paid) Military (Air National Guard) Serving/ Training Period Defense of military infrastructure, OPSEC Supporting various military structures as a mobile CERT Can be called on duty for various time spans At least 35 duty days a year. Can be called on duty for various time spans A Professional in the framework of the table means person with IT education and work experience in IT sector 2 36

37 175 th Network Warfare Squadron and 166 th Network Warfare Squadron (USA) Military (Air National Guard) Voluntary (paid) Professionals from civilian governmental agencies, government contractors and academic community Computer network operation, computer network defense and other related activities at the National level At least 35 duty days a year. Can be called on duty for various time spans Local Militias (China) Organized at province/muni cipality level around educational or research institutions Voluntary (coercion from government, academic incentives for students); IT savvy students, professionals Varies from internal political issues (censorship, monitoring) to attacking operations Training for at least 4 weeks; Possibility to be involved in operations from home or educational institution Patriot Hacktivists (proposed in India and Japan) Informal entities / Institutionaliz ed units Voluntary (incentives and coercion from government); Professionals Attacking operations, response to attacks N/A Russian Cyber Volunteers Informal entity Voluntary; skill levels vary from amateurs to professionals Attacking operations Any time; Online manuals 37

38 4 Needs, Limitations, Building Blocks The following passage concerns the applicability of cyber volunteerism examples (discussed in the previous chapter) to Georgia. It reviews needs and limitations for potential solutions and looks at foundations on which the future cyber capabilities can be built, before proceeding to the analysis. At first, it has to be noted that Georgia should have in mind defensive side of cyber capabilities in development of any kind of cyber entity. This thesis explores possibilities to develop cyber capabilities with their institutional structure. Georgia does not need any entity tasked with conducting cyber attacks. If we take into account human and financial resources available to Georgia, need for offensive cyber security organization will be bleaker. Cyber attacks of 2008 showed failure of Georgian side in securing its own information infrastructure. First of all, security of critical information infrastructure and other information systems of the country should be addressed. There are already examples of volunteerism (as non-commercial, self-motivated activities) in the IT field in Georgia. Some interested persons run a website and work together when they have free time - testing computers and overclocking [Overclockers, 2012]. They test on their own hardware or share the price of it. Another community of IT people is MCP club of Microsoft Certified Professional [2012]. They run a blog-type website, organize events and share knowledge. There is a voluntary organization of persons interested in military affairs in Georgia too, although it has no affiliation to Ministry of Defense of Georgia. Its name is Aisi and it has about 100 members [2012]. It is more like a club of similar minded persons. Its members have a website and web-forum, they work to popularize (old) martial arts of Georgia, practice together in military tactics (they use Strike Ball equipment [Aisi, 2012]) and make trips throughout the country to various historic places just for their own interest. Also there is an organization - Volunteer Information Center - which works to popularize volunteering culture in Georgia [VIC, 2012]. Examples of overclockers and MCP suggest that there will be interest towards a cyber volunteer entity, modeled on Estonian CDU. Lack of research of Georgian IT sector makes it hard to 38

39 predict potential expertise pool for Georgian volunteer organization. But in any case, its ultimate value should be creative thinking, promotion of innovative ideas and encouraging interests of its members. It should be distinguished by covering issues outside the attention of governmental agencies. Future volunteer organization should not be supposed to be the front line of information security or cyber security of Georgia and preferably should have responsibilities limited in scope to increase effectiveness. The entity should engage with non-critical infrastructure (as critical infrastructure protection is the responsibility of DEA and CERT.gov.ge). Potential activities of a cyber volunteer entity can cover cyber security awareness rising throughout the country (especially outside the capital city of Tbilisi), knowledge sharing, information exchange and cooperation enhancement within private sector or between public and private sectors. Unlike the Estonian counterpart, Georgian volunteer entity may not necessarily be military or paramilitary institution. One of the reasons is that Ministry of Defense of Georgia has other opportunities to develop cyber capabilities (which will be discussed in the coming passages). At the same time, at the head of military entities stand militaries not IT people, therefore the organization will be more military oriented (concerned with military needs) than answering the needs of (civilian) IT sector. On the other hand, any service related to military is associated to obligations, not volunteerism in Georgian society. Of course, it will only be good if an entity will not have any affiliation to political parties (or youth movements of any political party). Beside Estonian CDU, British WARPs are a credible option for Georgia. They offer insight how to respond to information sharing, incident reporting, expert advice and early warning issues. In Georgia, information sharing problem will be partly solved when the Law on Information Security of Georgia will be enforced. It will oblige critical information infrastructures to report incidents and share other relevant information with DEA and CERT.gov.ge [Draft of Law of Georgia on Information Security, 2012]. As there already is legislative basis for information sharing and incident reporting between DEA and critical infrastructure entities, they can institutionalize the process with the establishment of a WARP. Non-critical infrastructure institutions/private companies can be encouraged, but not obliged to establish WARPs of their own. 39

40 Unlike WARP and Estonian CDU, Russian example of patriotic cyber volunteers does not represent an acceptable solution for Georgia. First of all, Georgia does not seek offensive cyber capabilities. Secondly, employing patriotic hackers raises the issue of controlling them their actions are unpredictable [Ottis, 2009]. Often patriotic hackers are involved in cyber crime and a government has to cover their wrongdoings, which in turn may result in rise of cyber crime rates [Ottis, 2009]. Using patriotic hacktivists for political aims is a signal to society that cyber attacks are acceptable action; at the same time, it bears the potential to strain political relations with other countries [Ottis, 2009]. Georgia should wish to solve, not to create additional problems in its own cyberspace. Like Russian example of patriotic cyber volunteers, neither Chinese model of local militias is of much use for Georgia. Reasons are similar as in the case of Russian cyber volunteers: Chinese cyber militias are used either for cyber offensive operations or for controlling and monitoring internal cyberspace of the country this is not what Georgia needs. On the other hand, scope of Chinese cyber forces, their activities and goals (as well as funding and resources) are hardly attainable for small countries like Georgia. Issue of controlling vast cyber militias and covering their potential unlawful activities offers one more reason to disregard this suggestion. Georgia should take a closer look at British and American examples of cyber reserve forces as it has its own military reserve system. Potential difference in levels of human resources should be taken into account, but the reserve system offers a valuable opportunity to Georgia to develop and diversify its own (defensive) cyber capabilities. Georgian reserve military system was introduced in 2006, but the war between Russia and Georgia in 2008 proved it unsuccessful [Civil.ge, 2012]. The initial reserve system was modified several times. Currently, military reserve service is compulsory for physically able males between the ages of 27 and 40 [Law of Georgia on Military Reserve Service, 2012; Civil.ge, 2012]. A person aged at least 18 can volunteer for reserve service and there is no upper age limit for a volunteer [Civil.ge, 2012]. Reservists are called up once a year for at most 45 days [Law of Georgia on Military Reserve Service, 2012]. 40

41 In April 2012, parliament of Georgia discussed new concept for military reserve service of Georgia [Tarkhnishvili, 2012]. The Concept of Defense Reserve System of Georgia (Project) outlines the principles for future military reserve of Georgia: it will be divided into two components: Ground Forces Reserve (GFR) and Territorial Defense Reserve (TDR) [2012; Tarkhnishvili, 2012; NSC, 2012e; Civil.ge, 2012]. GFR will be completed by former regular army servicemen on compulsory basis [NSC, 2012e]. There will be possibility to volunteer for GFR [Concept of Defense Reserve System of Georgia (Project), 2012]. It will be under the command of land forces of the Georgian army and will train with them [Concept of Defense Reserve System of Georgia (Project), 2012]. TDR will be based on territorial principle and will be completely voluntary. TDR will be trained by and will be under the command of National Guard Department of Georgia [Concept of Defense Reserve System of Georgia (Project), 2012; Tarkhnishvili, 2012; NSC, 2012e; Civil.ge, 2012]. The project of the concept does not say anything about serving period either in GFR or TDR; though there is no indication to think that current period of service (once a year for at most 45 days) will be changed (at least for GFR). It has to be noted, that the document does not mention information security or cyber security. Georgia can use its current military reserve system to form cyber defense units. On the other hand, proposed reserve concept neither excludes nor diminishes opportunities to develop cyber units. As the concept for future reserve system plans major changes, it will be better to model potential cyber units on future reserve system. In the proposed reserve system, destination for cyber reserve units should be GFR, not TDR. The latter will be created according to administrative division of Georgia [Concept of Defense Reserve System of Georgia (Project), 2012]. TDR subdivisions will be tied to districts of their origin. Their responsibility will be back up operations [Concept of Defense Reserve System of Georgia (Project), 2012]. GFR will be more close to the regular army. Besides training with land forces of the army, tasks of GFR will be supporting regular army units and if necessary replacing them during wartime [Concept of Defense Reserve System of Georgia (Project), 2012]. There are two possibilities to form cyber units both in current reserve system and in GFR: First option is to pick up draftees with IT background to form cyber units. Another option is to make room for volunteerism with announcing competition for cyber units. In the latter case, the 41

42 draftees will have a choice: to go to regular reserve units or apply for cyber units. Persons with IT education and experience will have an incentive to go for cyber units. With serving in units which are correspondent to their profession, they will get an opportunity to enlarge their knowledge and skills. Additional incentives, for instance, financial compensation during serving period, can be set to attract draftees to cyber units. Supposedly, draftees who will volunteer for cyber units will be more committed than persons who are picked up in a predefined manner. On the other hand, the financial compensation and opportunity for professional growth may attract volunteers to GFR people who do not have to serve in reserve system. Expertise of reserve cyber units should be differentiated. One unit can provide information assurance expertise to the army; another can be tasked with security of communications and military network infrastructure. Units should be formed according to available human resources. The further details about cyber reserve units and other potential solutions will be discussed in the next chapter. 42

43 5 Proposals and Analysis The earlier chapters gave overview of Georgia s current capabilities, existing problems and available human resources, discussed various examples of defensive cyber capability development and their limitations for Georgia s case. Existing foundations for cyber capability development of Georgia were reviewed in the previous chapter. The coming part is the main contribution of the thesis. Taking into account the content of everything previously described in the thesis, I offer and analyze solutions for development of defensive cyber capabilities. After the analysis of the proposals I make recommendations for Georgia. Proposals are based on volunteerism. Resource scarcity for cyber defense is an issue worldwide. That s why the question of volunteerism raises. It (as self-motivated, non-paid activity) was one of the driving forces of the Internet development in its early years. Nowadays volunteerism (which in concrete occasions can be financially motivated) represents a cost-effective way to fill the holes in cyber defense structure of a country. Georgia and small countries alike should seek to utilize their volunteer potential. Volunteerism, by its widespread understanding, means nonpaid self-motivated work. Though the proposals will imply volunteerism as noncommercial, selfmotivated work for shared goals, which in some circumstances can be financially compensated. Proposals will be analyzed with SWOT (Strengths, Weaknesses, Opportunities, Threats) method. SWOT is qualitative analysis method and as the name implies, helps understanding the advantages (strengths) and disadvantages (weaknesses) of a given choice (policy, business decision, practical solution to a problem, etc.), its potentials for future development (opportunities) and problems (threats) which may arise from them [Berry, 2012; University of Cambridge, 2012]. SWOT is interactive and dynamic it is designed for comparing different solutions, organizing and interpreting all strengths/weaknesses/opportunities/threats of the choices relatively to each other and drafting conclusions upon the comparison [Berry, 2012] [University of Cambridge, 2012]. SWOT matrices will be provided in the analysis. 43

44 5.1 A volunteer entity proposal My first proposal is to establish volunteer institution modeled on the Estonian CDU. The entity can be created as an extension of DEA or CERT.gov.ge. It can also be established at the Department of Communications, Information Technologies and Innovation at Ministry of Economy and Sustainable Development of Georgia. The department looks after the elaboration and implementation of Georgian e-governance concept, determines and monitors directions of communications and ICT policies, develops strategy and priorities for communications and ICT networks and applications [Ministry of Economy and Sustainable Development of Georgia, 2012]. The department is not concerned first and foremost with information security and cyber security, but DEA is. So establishing a cyber volunteer entity under the auspices of DEA will be in correspondence with its activities. On the other hand, DEA and CERT.gov.ge will be preoccupied with critical information infrastructure after the enactment of the Law on Information Security and the volunteer entity can free them from other issues. The volunteer organization will be civilian. Its legal status can be defined as a legal entity of Georgian public law (which excludes an entity to be commercial/profit-oriented) [Parliament of Georgia, 1999]. Membership will be totally voluntary. Goals and responsibilities of the entity should be defined taking into account its expertise pool, financial resources and time its members can spare for its activities. Looking at the experience of international organization in IT field, which were created on voluntary basis (for instance, IETF), it would be better if future Georgian cyber volunteer entity will not have a single decision maker person or body. The entity is not meant to be large. It is possible to resolve issues (on activities, projects, directions to work at, etc.) with consensus. In this way, interests of the members will be paid attention and their ideas promoted. The idea behind the entity innovative and creative thinking should not be lost in bureaucratic procedures. The members of the organization are supposed to have IT background. It will be hard to establish regional units or representations because IT sector is concentrated to the capital city of Tbilisi. It is hard to predict whether human resources allow organizing the entity by subgroups based on expertise. 44

45 Supposedly the volunteer institution will get funding from parent (governmental) agency. At the same time, it can seek funding from (international) NGOs and other potential sources. A budget should be spent on infrastructure and projects, members should be encouraged to participate in relevant (international) events, conferences and fairs by financing participation fees and transportation. Members should not be paid for their membership. Georgian voluntary organization can cover matters of awareness raising, knowledge sharing, information sharing, and cooperation enhancement within private and between public and private sectors. These issues need to be addressed in Georgia. It can also try to eradicate lack of research in Georgian IT sector. In general, the volunteers should focus on areas beyond the reach of DEA, CERT.gov.ge or other governmental entities. The strength of volunteer entity will be its members whoever joins, will have commitment to shared goals. Inclusive character (consensual decision making is part of it) is one of the advantages of the organization. It can attract bright persons. Creative thinking is one of its potential merits. Areas not covered by relevant governmental agencies will be addressed. Establishment and maintenance of the organization needs relatively small amount of finances. Potential lack of (diverse) expertise will be one of the weaknesses - it is questionable whether the organization will be able to attract expertise pool with variety of skills. Part time nature of the organization can be a hindrance too. But this issue can be settled by the quantity (and quality) of members. Projects will have to be planned and implemented according to the time schedule of the participants. Scope of goals and activities should be limited to increase effectiveness. The organization will cover the issues beyond the attention of other actors of Georgian cyberspace. Voluntary organization can also provide possibility to its members to gain additional skills and experience, which will benefit IT sector overall. It can serve as a back-up to CERT.gov.ge in some circumstances (as CERT.gov.ge is supposed to be preoccupied with critical information infrastructure). Voluntary institution can also serve as a talent identification, recruiting and training pool. Theoretically, there can be some threats as well. The entity may not be able to cover every issue their members will raise. Some people can feel themselves as outsiders and lose interest to the 45

46 organization. High expectations towards the entity (it is not meant to be front line of cyber defense of Georgian cyberspace) can also prove wrong. Table 2 shows SWOT matrix of a cyber voluntary organization. Table 2. SWOT matrix for a volunteer entity Strengths Weaknesses needs relatively small amount of funds diverse expertise not expected will cover issues beyond reach of other cyber entities motivated/committed members creative approach limited in scope of goals and activities dependent on time schedule of members Opportunities Threats covering issues beyond reach of other management (hard to satisfy every entities member s interests) back-up for CERT.gov.ge high expectations may prove wrong Talent identification, recruiting and training 46

47 5.2 A WARP proposal My another suggestion is to establish WARPs modeled on British counterparts. WARPs will enhance issues of information sharing, incident reporting, expert advice and early warning of threats for their members. They will be designated to receive and analyze incident reports, get and disseminate information about (potential) threats, issue expert advice to members (members will be not persons but legal entities of public and private law). Several WARPs can be created based on geography and business sector. Cooperation and information sharing (at some degree, without abusing any WARP member in any sense) is possible not only within a WARP, but also among WARPs. Establishment of WARPs should boost cooperation among actors of Georgian cyberspace. Formation of a WARP needs legislative basis defining its rights and responsibilities, allocation of personnel (an operator) and finances, developing necessary infrastructure (defining means of communication, developing software if needed, etc.). WARP s legal status can be either legal entity of public law or non-profit NGO. Volunteerism in WARP s case concerns voluntary participation of entities into a WARP. Incentives for actors are clear: early warning, expert advice, information sharing. Incident reporting can be a hindrance because of (business) reputation reasons. Though WARP members may not know each other at all there is room for anonymity. Even if WARP members know which institutions are other members, anonymity can be still secured. WARP is formed around an operator (for other details of WARP activities, please refer to section 2.1.3), which communicates to members so a member can share incident report, but others will not know which one of them had this incident. In Georgia, one WARP should be formed for DEA and critical information infrastructure entities. The Law on Information Security will define critical information infrastructure. The list of CII will be compiled within 6 months after the adoption of the law. CII entities will share incident reports and other relevant information with DEA. The process can be institutionalized with a WARP. Though the WARP cannot be established until there is CII list, DEA should not wait for it as cyber threats will not consider waiting for the law enactment and other procedures. 47

48 DEA should consider forming a WARP involving (on voluntary basis) parties supposed to be in the CII list. One the one hand time can be saved and on the other hand (if needed) reorganizing a WARP will be easier than establishing a new one. Besides DEA-CII WARP, non-critical information infrastructure entities and private companies should form WARPs of their own. As information security of Georgian cyberspace is the main concern of DEA, it should encourage non-critical infrastructure institutions including governmental agencies (for instance, police or local administrations), public institutions (universities, libraries, etc.), non-governmental organizations and private companies (banks, insurance companies, etc.) to form WARPs for themselves. DEA can encourage them by raising awareness about a WARP model or providing necessary technical or administrative support for formation of WARPs. One of the strengths of a WARP is anonymity, which lays basis for safe incident reporting. Another is low costs of establishment and maintenance. It is also flexible can be formed taking into account geography or business sector. Georgia is a small country and anonymity part for WARP can be undermined. Because Georgian cyberspace is small and arguably not the hottest spot of global cyber net, there may not be a lot of activities for some of Georgian (mainly non-governmental) WARPs. They may lose their momentum. WARPs will support cooperation among Georgian cyberspace actors. It also provides a chance to cover non-critical information infrastructure. The above mentioned flexibility offers inclusiveness. Actors of a given business sector (for instance, media outlets) will be encouraged to join a WARP by the fact that its members will be only from this sector. Information leakage is a threat for reputation of any WARP. Incentives for potential members of a WARP can be a case. Georgian cyberspace actors should be persuaded that they can really benefit from WARP services. Table 3 briefs SWOT analysis for a WARP. 48

49 Table 3. SWOT matrix for WARPs in Georgia Strengths Weaknesses anonymity low costs of maintenance flexibility breached possibility WARPs may lose their Threats to cover non-critical infrastructure entities Some momentum Opportunities small country anonymity can be information leakage incentives enhance cooperation among various actors inclusiveness 5.3 Reserve Cyber Units My third suggestion will be forming cyber units within military reserve of Georgia. Military reserve system is the most valuable asset for cyber capability development. British LIAG, LICSG and 81st Signal Squadron should be the role models for potential cyber reserve units of Georgia. Both current military reserve system of Georgia and the concept for the future one are described in the previous chapter. Formation of cyber units can be initiated immediately, but structure of the future system should be taken into account. GFR will be completed with former military servicemen on compulsory basis. Among its draftees will be former conscripts. Currently minimal age for a potential reservist is set at 27, therefore candidates for cyber units probably 49

50 will have IT education and working experience (civilian career). Cyber unit members should be picked up by competition with careful examination of their experience and skills. Draftees will have incentives to apply for reserve cyber units, because they will get an opportunity to enlarge their professional knowledge. As draftees will have to serve as reservists anyway, there is high probability they prefer to be in cyber units rather than in regular units. Cyber alternative can be considered as principal stimulus. Financial compensation during serving period should also be considered. Serving period at reserve currently is at most 45 days a year. British LIAG members serve at least 19 days a year. From training point of view, serving period at Georgian reserve service looks promising. Reserve cyber units will not overlap with their activities with other proposed solutions (a cyber volunteer entity and WARPs). They will be engaged with military, while the voluntary organization and WARPs will operate in civilian sphere. The goals of reserve cyber units will be defense of military information infrastructure and providing specialized services to the armed forces of Georgia. There will be an opportunity to form various units (as available human resources allows) to diversify expertise (like in British CVHQ) one unit can provide information assurance to the army, another - security of communications and military networks, etc. Cyber units created in the framework of reserve military service preferably should stay within military domain. A potential law regulating their rights and responsibilities can give them a role in defense of civilian information infrastructure. But this is not usual practice worldwide. It is desirable that civilian information infrastructure is defended by civilian entities and military and civilian spheres are sharply distinguished from each other to avoid potential legal or political troubles. The rights and responsibilities of Georgian cyber reserve units will be defined in the law on military reserve service and they should be clearly distinguished from rights and responsibilities of CERT.gov.ge and other corresponding governmental (civilian) entities. Cyber units should not be used for countrywide Internet censorship (as it is in case of Chinese cyber militias) or other political purposes. 50

51 Cyber reserve units will be financed by government (they will get their share from overall reserve service budget). Funding will be needed for infrastructure (including training environment). Financial compensations for members of cyber units and for their companies (where they have civilian careers) should be defined. One of the strengths of cyber reserve units will be its members. They are supposed to have IT education and work experience. Serving period up to 45 days a year looks reliable for training. Possibility of division by expertise is another advantage. Currently military reserve system concerns all the able man of Georgia (with population of 4.5 million people) between the age of 27 and 40. In the future, GFR will include former military servicemen. In any case, there is high probability of availability of human resources. Though diversified and high quality expertise can be just hope. Lack of research of Georgian IT sector makes it impossible to predict the variety and level of expertise for cyber reserve units. GFR will train with land forces of Georgian army. This should help reserve cyber units for coordination and adaptation within overall military system of Georgian armed forces. As Georgian reserve military system is being reformed, it will be difficult to begin formation of cyber units immediately. On the other hand, achieving tangible results will need time anyway. Developing high quality cyber reserve units will take several years. Recruiting and organizing process will be prolonged and complicated, but this issue should be addressed from now with the conceptualization of cyber reserve units in future reserve system. In comparison with other proposals, maintenance of cyber reserve units will need more financial resources. Cyber reserve units will provide lots of opportunities to Georgia. First of all, it will enhance development of IT by supporting knowledge accumulation and expertise dissemination throughout the sector. It will also serve as an indicator of what kind of IT expertise is present in Georgia nowadays, what directions are problematic and need to be addressed. Cyber reserve units will give opportunities to its members too gaining experience and acquiring new skills. Recruitment and organization of cyber reserve units will be difficult. The process should be scrupulous and well-planned. Coordination and inclusion in overall military structure will be another issue. Development of proper training environment is also crucial. 51

52 Table 4 summarizes the SWOT analysis of cyber reserve solution. Table 4. SWOT matrix for Reserve Cyber Units Strengths Weaknesses serving period (up to 45 days) looks promising for training diverse/high level expertise questionable high probability of availability of will need time to bring results human resources more expensive than a cyber volunteer can be formed various units based on entity and WARPs expertise fields Georgian military reserve system is GFR will train with land forces of being reformed Georgia it will help coordination and adaptation Opportunities supporting further development of cyber capabilities Threats complicated recruitment and organization issues overview of existing expertise in coordination and inclusion in military Georgia structure opportunity for members to gain addition skills and experience reserve cyber units need proper training environment 52

53 5.4 Recommendations for Georgia The aim of my work was to get over the deficit of human resources in Georgian IT sector and find ways to develop defensive cyber capabilities of the country. The solutions were supposed to be cost-effective and possible to implement immediately. I focused on options based on volunteerism. First I reviewed the needs, limitations and characteristics of Georgian information security environment along with existing foundations on which potential solutions could be built. Hoping to find an applicable solution for Georgia, I brought various examples from Estonia, the UK, the USA, China and Russia. After examination of the examples, formation and analysis of the proposals, I have come to the conclusion that the best option for Georgia is to pursue the implementation of three different solutions. First is the establishment of a volunteer organization modeled on Estonian CDU. Another solution is formation of the WARP for DEA and Georgia CII entities along with establishment of other WARPs organized according to geography and business sector. Third proposal is development of cyber units within the reserve military system of Georgia. These solutions do not compete, but supplement each other. A volunteer organization should be established under the auspices of DEA. It is cost-effective solution and can be implemented immediately. Its practical value will be covering issues beyond the reach of DEA and CERT.gov.ge cyber security awareness rising, cooperation enhancement between public and private sectors, knowledge sharing. On the other hand, it will spare DEA from some of its activities and in some circumstances can cover CERT.gov.ge. Its potential members are people with IT background both from public and private sectors. WARPs are another cost-effective solution. In spite of the fact that the Law of Georgia on Information Security is not adopted for the moment (therefore there is not any CII list yet), DEA should form a WARP to include itself and supposed CII institutions. First of all, this will save time. Secondly, if needed, modifying a WARP will be easier than establishing a new one. Besides DEA should promote WARPs in Georgia with awareness rising and if necessary, provide technical or administrative assistance to interested parties to form WARPs. 53

54 A WARP is operated by an operator (not necessarily with IT background) and its members are legal entities of both public and private law. A WARP cannot be competitor of the voluntary organization for human resources. WARP s missions are incident reporting, expert advice and early warning. Therefore its goals will not coincide with the objectives of the voluntary entity. If the voluntary organization and WARPs will cover civilian domain, my third proposal concerns military sphere. Reserve cyber units are more expensive solution in comparison with a volunteer organization and WARPs. Meanwhile because Georgian military reserve system is under reform, it will be difficult to immediately form cyber units within the reserve system. But what Georgia needs to do, is to include cyber units in the concept of the future reserve system and as soon as it will be conceptualized, take on the recruitment and organizational issues. The goals of reserve cyber units will be defense of military information infrastructure and providing specialized services to the armed forces of Georgia. So it will not duplicate mission areas of the voluntary organization and WARPs. Reserve cyber units will have their own human resource pool as they will be completed (by competition) by reserve service draftees. Reserve service will be obligatory for former military servicemen. Manpower pool for the volunteer entity will be larger, but there is possibility that some of its potential members may be drafted for the military reserve service. Though it should be noted that there are no obvious reasons why a person, if interested, cannot be a member of both reserve cyber units and the voluntary organization. To sum up, my recommendations to Georgia will be immediate establishment of a voluntary organization; formation of a WARP for DEA and CII entities; tasking DEA with the promotion of a WARP model; including cyber units in the concept of the future reserve system and after conceptualization, organizing recruitment and other logistic issues. 54

55 6 Conclusion and Future Research Developing countries get more and more dependent on computer systems. On the other hand, IT advancement brings the security of the vital systems into focus. Governments have to spend time and money to address information security/cyber security issues. Cyber attacks of 2008 showed that Georgia lacked cyber capabilities and was unable to defend its information infrastructure. On the other hand, shortage of human resources in IT sector is an issue not only for Georgia, but for developed countries as well. My work aimed to overcome the manpower issue and to find cost-effective, immediately implementable solutions to develop defensive cyber capabilities of Georgia. Deficit of human and financial resources brings us to volunteerism. Since the first days of the Internet, volunteerism was one of the driving forces for its development. Volunteers are actively involved in cyber defense of Estonia, the UK, the USA and other countries. I explored these examples and analyzed them for applicability to Georgia. Then I constructed 3 proposals based on volunteerism (as noncommercial, self-motivated work for shared goals, which in some circumstances can be financially compensated) for Georgia. First solution was the establishment of a voluntary organization modeled on Estonian CDU. Another was formation of WARPs. And third proposal was developing cyber units within reserve military system of Georgia. All of them are affordable for Georgia and it is possible to begin the implementation of these solutions immediately. The solutions will not compete for human resources and will not duplicate the mission areas of each other. My ultimate conclusion is that volunteerism offers an opportunity to get over the manpower deficit and to find cost-effective ways for defensive cyber capability development. Volunteer option is significant for small countries like Georgia. Volunteerism for cyber security can be further explored. Further search for volunteer examples and analysis of the volunteer solutions in relation to other countries would be crucial for understanding of all potential gains volunteerism offers to cyber defense. The questions about potential legal and political setbacks should be considered. As the countries pay more attention to cyberspace, there will be more empirical data for analysis. Further research should also take into account international volunteer organizations in IT field. 55

56 References Abashidze, A., Abashishvili, G. (2012). სახელმწიფო პოლიტიკა მოხალისეობის სფეროში: ქართული კანონმდებლობა და მსოფლიო პრაქტიკა. [State Policy for Volunteerism: Georgian Law and World Practice]. [pdf] Georgian Business and Political Insight. Available at: [Last accessed ] Aisi. (2012). ჩვენს შესახებ [About Us]. [online] Available at: [Last Accessed ] Anonymous Source A. (2012). Member of Cyber Defense Unit of Estonia. Personal Communication. May, Anonymous Source B. (2012b). Member of Cyber Defense Unit of Estonia. Personal Communication, May, Bergesen, A. (2004). The Fight Goes Hi-Tech. Washington National Guard. [online] (April, 2004). Available at: [Last accessed ] Berry, T. (2012). How to Perform SWOT Analysis. Bplans. [online] Available at: [Last Accessed ] Brenner, S. W., Clarke, L. C. (2011). Conscription and Cyber Conflict: Legal Issues. In: C. Czossek, E. Tyugu, T. Wingfield, eds. (2010). 3rd International Conference on Cyber Conflict, Tallinn: NATO Cooperative Cyber Defence Center of Excellence Publication. pp 1-12 Borsook, P. (1995). How anarchy works. Wired. [online] (October, 1995). Available at: [Last Accessed ] British Army. (2012a). CVHQ ( Royal Signals.) [online] [Last Accessed ] British Army. (2012b). LIAG (V). [online] [Last Accessed ] British Army. (2012c). LICSG(V). [online] [Last Accessed ] 56 Available Available Available at: at: at:

57 British Army. (2012d). 81 Sig Sqn (V). [online] Available at: [Last Accessed ] British Army. (2012e). Territorial Army Pay and Allowances. [online] Available at: [Last Accessed ] British Army. (2012f). Territorial and Reserve. [online] Available at: [Last Accessed ] Buki Project. (2012). პროექტის შესახებ [About Project].[online] Available at: [Last Accessed ] Campbell, S. (2011). Data Processing Unit holds change of command ceremony. Virginia National Guard. [online] (April, 2011) Available at: [Last Accessed ] Carr, J. (2011). Inside Cyber Warfare. 2 nd ed. Sebastopol: O Reilly Media Caucasus Online. (2012a). კომპანიის ისტორია [History of the Company]. [online] Available at: [Last Accessed ] Caucasus Online. (2012b). ჩვენს შესახებ [About Us]. [online] Available at: [Last Accessed ] Civil.ge. (2012). Concept of New Reserve Forces Discussed. [online] Available at: [Last Accessed ] Civil Registry of Georgia. (2012). ID Card. [online] Available at: [Last Accessed ] Civil Service Bureau of Georgia. (2012). E-Governance. [online] Available at: [Last Accessed ] Corso, M. (2010). Georgia: 2011 Budget Is Big on Bucks, Small on Public Details. Eurasianet. [online] (December, 2010) Available at: [Last Accessed ] 57

58 Council of Europe. (2012). Convention on Cybercrime. Status as of: 8/5/12. [online] Available at: [Last Accessed ] საქართველოს თავდაცვის რეზერვის სისტემის კონცეფცია (პროექტი) [Concept of Defense Reserve System of Georgia (Project)]. (2012). [pdf] Available at: [Last Accessed ] საქართველოს სისხლის სამართლის კოდექსი [Criminal Code of Georgia]. (2012). Codex Legislative Acts of Georgia. [doc] Available at: [Last Accessed ] CRRC (Caucasus Research Resource Centers). (2008). Comparing civic participation: Caucasus Data Social Science in the Caucasus [blog] (October, 2008). Available at: [Last Accessed ] CRRC (Caucasus Research Resource Centers). (2011). E-transparency in Georgia: A key to faith in Democracy?. Social Science in the Caucasus [blog] (March, 2011). Available at: [Last Accessed ] Danchev. D. (2008). Coordinated Russia vs Georgia cyber attack in progress. ZDNet. [online] (August, 2008). Available at: [Last Accessed ] Darsalia, L. (2012). [Interview by ] (Personal communication. February 7, 2012.) DEA (Data Exchange Agency). (2011). CERT.gov.ge CERT-ების ევროპული გაერთიანების Trusted Introducer ის წევრი გახდა [CERT.gov.ge becomes a member of Trusted Introducer European CERT community]. [online] Available at: [Last Accessed ] DEA (Data Exchange Agency). (2012). ჩვენს შესახებ [About Us]. [online] Available at: [Last Accessed ] Dogrul, M., Aslan, A., Celik, E. (2011). Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism. In: C. Czossek, E. Tyugu, T. Wingfield, eds. 58

59 (2010). 3 rd International Conference on Cyber Conflict, Tallinn: NATO Cooperative Cyber Defence Center of Excellence Publication. pp Downing, E. (2011). Cyber Security A new national programme. [pdf] Parliament of the United Kingdom. Available at: [Last Accessed ] კანონპროექტი ინფორმაციული უსაფრთხოების შესახებ [Draft of Law of Georgia on Information Security] (2012). Registration Number #07 3/550; [docx] Available at: %83%9C%E1%83%9E%E1%83%A0%E1%83%9D%E1%83%94%E1%83%A5%E1%83%A2 %E1%83%98%20%E1%83%98%E1%83%9C%E1%83%A4%E1%83%9D%E1%83%A0%E1 %83%9B%E1%83%90%E1%83%AA%E1%83%98%E1%83%A3%E1%83%9A%E1%83%98 %20%E1%83%A3%E1%83%A1%E1%83%90%E1%83%A4%E1%83%A0%E1%83%97%E1 %83%AE%E1%83%9D%E1%83%94%E1%83%91%E1%83%98%E1%83%A1%20%E1%83% A8%E1%83%94%E1%83%A1%E1%83%90%E1%83%AE%E1%83%94%E1%83%91.docx?g _download=1 [Last Accessed ] Dudney, R. S. (2011). Rise of the Cyber Militias. Air Force Magazine. [pdf] Available at: [Last Accessed ] e-estonia. (2012). Cyber Security. [online] Available at: [Last Accessed ] Electronic Government Resources of Georgia. (2012). Home Page. [online] Available at: [Last Accessed ] Ellefsen, I. Von Solms, S. (2010). The Community-Oriented Computer Security, Advisory and Warning Team. IST-Africa 2010 Conference Proceedings. [pdf] University of Johannesburg. Available at: sequence=1 [Last Accessed ] ENISA (European Network and Information Security Agency). (2011). United Kingdom Country Report. [pdf] ENISA. Available at: [Last Accessed ] 59

60 Estonian Ministry of Defense. (2011). Government formed Cyber Defense Unit of the Defense League. [online] Available at: [Last Accessed ] Estonian Ministry of Foreign Affairs. (2011). Around 150 experts associated with Estonia s Cyber Defense League. [online] Available at: [Last Accessed ] Colonel Timothy J. Evans, Commander of 175th Network Warfare Squadron, USAF. (2012). Comments sent via personal to the supervisor. May, 2012 Ferwerda, J., Choucri, N., Madnick, S. (2010). Institutional Foundations for Cyber Security: Current Responses and New Challenges. [pdf] Massachusetts Institute of Technology. Available at: [Last Accessed ] Francis, M. (2011) Wash. state military units prepare for cyber war. Komonews. [online] (December, 2011). Available at: [Last Accessed ] Freedom House. (2011). Freedom on the Net 2011 Report on Georgia. [pdf] Freedom House. Available at: [Last Accessed ] Geers, K. (2011). Strategic Cyber Security. Tallinn: NATO Cooperative Cyber Defence Center of Excellence Publication, 2011 Gelzis, G. (2011). Estonian voluntary cyber-soldiers integrated into national guard. Deutsche Welle. [online] (April, 2011]. Available at: [Last Accessed ] Giles, K. (2011). Information Troops A Russian Cyber Command? In: C. Czossek, E. Tyugu, T. Wingfield, eds. (2010). 3 rd International Conference on Cyber Conflict, Tallinn: NATO Cooperative Cyber Defence Center of Excellence Publication. pp GNCC (Georgian National Communications Commission). (2005). საქართველოს კომუნიკაციების ეროვნული კომისიის შესახებ [About Georgian National Communications Commission]. [online] Available at: [Last Accessed ] 60

61 GNCC (Georgian National Communications Commission). (2008). ინტერნეტი [The Internet]. [online] Available at: [Last Accessed ] GNCC (Georgian National Communications Commission). (2012). სტატისტიკა [Statistics]. [online] Available at: [Last Accessed ] Grauman, B. (2012). Cyber-security: The vexed question of global rules. An independent report on cyber-preparedness around the world. Security & Defense Agenda with support of McAfee. [pdf] McAfee. Available at: [Last Accessed ] GRENA (Georgian Research and Educational Networking Association). (2012a). Services CERT. [online] Available at: [Last Accessed ] GRENA (Georgian Research and Educational Networking Association). (2012b). Main page. [online]. Available at: [Last Accessed ] Grey Goose Project. (2008). Phase I Report. [online] Available at: [Last Accessed ] Grey Goose Project. (2009). Phase II Report. [online] Available at: [Last Accessed ] Grey Goose Project. (2012). Grey Goose page. Palantir Technologies. [online]. Available at: [Last Accessed ] GSAC (Georgian Security Analysis Center). (2012a). About Us. [online] Available at: [Last Accessed ] GSAC (Georgian Security Analysis Center). (2012b). Cyber Awareness Project. [online] Available at: [Last Accessed ] 61

62 Hagerty, J. R. (2012). U.S. Loses High-Tech Jobs as R&D Shifts Towards Asia. The Wall Street Journal. [online] (January, 2012). Available at: [Last Accessed ] Hare, F. (2010). The Cyber Threat to National Security: Why Can t We Agree? In: C. Czossek, K. Podins, eds. Conference on Cyber Conflict - Proceedings Tallinn: NATO Cooperative Cyber Defence Center of Excellence Publication, pp Harrison, J. (2009). Trusted Information Sharing. ENISA-FORTH Summer School on Network and Information Security, September, 2009, Crete, Greece. [pdf] ENISA, FORTH. Available at: [Last Accessed ] Hemstreet, T. (2010). Hi-Tech line of Defense. Northwest Military Community. [online] (January, 2010). Avaiable at: [Last Accessed ] Hollis, D. (2011). Cyberwar Case Study: Georgia [pdf] Small Wars Journal. Available at: [Last Accessed ] Homeland Security NewsWire. (2011). National Guardsmen, the new front line in cybersecurity. [online] Available at: [Last Accessed ] IETF (Internet Engineering Task Force). (2011). The Tao of IETF: A Novice's Guide to the Internet Engineering Task Force. [onlinr] Available at: [Last Accessed ] IETF (Internet Engineering Task Force). (2012). Mission Statement. [online] Available at: [Last Accessed ] IMF (International Monetary Fund). (2012). Report on Selected Countries and Subjects. [online] Available at: 009&ey=2016&scsm=1&ssd=1&sort=country&ds=.&br=1&c=939%2C915&s=NGDPD%2CN GDPDPC&grp=0&a= [Last Accessed ] 62

63 Internet World Stats. (2010a). Georgia. [online] Available at: [Last Accessed ] Internet World Stats. (2010b). Estonia. [online] Available at: [Last Accessed ] ISSAC (Information Security Studies and Analysis Center). (2012). Mission. [online] Available at: [Last Accessed ] Joubert, V. (2010). Getting the Essence of Cyberspace; A Theoretical Framework to Face Cyber Issues. In: C. Czossek, K. Podins, eds. Conference on Cyber Conflict - Proceedings Tallinn: NATO Cooperative Cyber Defence Center of Excellence Publication, pp Job Spectrum. (2012). British Reserve Life changing part time service. [online] Available at: [Last Accessed ] Justice Ministry of Georgia. (2010). Presentation of Data Exchange Agency. [online] Available at: [Last Accessed ] Kaitseliit. (2012a). Küberkaitse üksus [Cyber Defense Unit]. [online] Available at: [Last Accessed ] Kaitseliit. (2012b). Küberkaitse üksuse loomise ajalugu [History of Cyber Defense Unit]. [online] Available at: [Last Accessed ] Kaitseliit. (2012c). Küberkaitse üksuse peamised ülesanded [Tasks of Cyber Defense Unit]. [online] Available at: [Last Accessed ] Kaitseliit. (2012d). Kaitseliit [About Estonian Defense League]. [online] Available at: [Last Accessed ] Karchava, T. (2012). Caucasus Online Lost 3.82 of Market Share Last Year. Georgian Business and Political Insight. [online] Available at: 63

64 &catid=921%3a &lang=ka [Last Accessed ] Killcrece, G. (2006). CERT/CC Overview and CSIRT Development Team Activities. [pdf] Available at: CC_Killcreece.pdf [Last Accessed ] Klimburg, A. (2011a). Mobilising Cyber Power. Survival, vol. 53, no. 1, February-March 2011, [pdf] The Austrian Institute for International Affairs (OIIP). Available at: [Last Accessed ] Klimburg, A. (2011b). The Whole of Nation in Cyberpower. Georgetown Journal of International Affairs, Special Issue 2011, International Engagement on Cyber: Establishing International Norms and Improved Cybersecurity, 2011, gj [pdf] The Austrian Institute for International Affairs (OIIP). Available at: er_ak.pdf [Last Accessed ] Korns, S. W., Kastenberg, J. E. (2009). Georgia s Cyber Left Hook. [pdf] US Army War College. available at: [Last Accessed ] Krekel, B. (2009). Capability of People s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. Prepared for The U.S.-China Economic and Security Review Commission. Northrop Grumman. [pdf] U.S.-China Economic and Security Review Commission. Available at: oved%20report_16oct2009.pdf [Last Accessed ] საქართველოს შრომის კოდექსი [Labor Code of Georgia]. (2010). Matsne (Database of legal documents of Georgia). [online] Available at: [Last Accessed ] 64

65 Lasker, J. (2007). Air Force Draws Weekend Cyberwarriors From Microsoft, Cisco. Wired. [online] (July, 2007). Available at: [Last Accessed ] საქართველოს კანონი საჯარო სამართლის იურიდიული პირის მონაცემთა გაცვლის სააგენტოს შექმნის შესახებ [Law of Georgia on Creation of a Legal Entity of Public Law - Data Exchange Agency]. (2009.) DEA. [pdf] Available at: [Last Accessed ] საქართველოს კანონი ელექტრონული ხელმოწერისა და ელექტრონული დოკუმენტის შესახებ [Law of Georgia on Digital Signature and Digital Document]. (2010). Matsne (Database of legal documents of Georgia). [online]. Available at: [Last Accessed ] საქართველოს კანონი პერსონალურ მონაცემთა დაცვის შესახებ [Law of Georgia on Protection of Personal Data]. (2012). Codex Legislative Acts of Georgia. [online] Available at: [Last Accessed ] Law of Georgian on Military Reserve Service. (2010). National Guard Department of Georgia. [online] Available at: [Last Accessed ] Lee, D. (2012). Israel tops cyber-readiness poll but China lags behind. BBC [online] (January, 2012). Available at: [Last Accessed ] LII (Legal Information Institute), Cornell University Law School. (2012a). Reserve Components Named. [online] Available at: [Last Accessed ] LII (Legal Information Institute), Cornell University Law School. (2012b). National Guard in Federal Service: Period of Service; Apportionment. [online] Available at: [Last Accessed ] Liberali. (2011). ინტერNETარება [Internet Bliss]. [online] Available at: [Last Accessed ] 65

66 Liles, S. (2010). Cyber warfare: As a form of low-intensity conflict and insurgency. In: C. Czossek, K. Podins, eds. Conference on Cyber Conflict - Proceedings Tallinn: NATO Cooperative Cyber Defence Center of Excellence Publication, pp Lorents, P., Ottis, R., Rikk, R. (2009). Cyber Society and Cooperative Cyber Defence. Lecture Notes in Computer Science, 2009, Volume 5623/2009, Magticom. (2008). The first phase of implementation of the integrated Georgian Governmental Network has been completed. [online] Available at: [Last Accessed ] Markoff, J. (2008). Before the Gunfire, Cyberattacks. The New York Times. [online] (August, 2013). Available at: [Last Accessed ] Matsne (Database of legal documents of Georgia). (2012). საქართველოს სისხლის სამართლის კოდექსში ცვლილებების შეტანის შესახებ [Criminal Code of Georgia amendments of 2012]. [online] Available at: [Last Accessed ] Matthews, W. (2008). US Military is increasingly turning to the Guard to protect critical networks and computer systems. [pdf] The National Guard Association of the United States. Available at: [Last Accessed ] MCP (Microsoft Certified Professionals Club). (2012). Home page. [online] Available at: [Last Accessed ] Military.com. (2012). Joining the Army National Guard. [online] Available at: [Last Accessed ] Miks, J. (2012). Israel, China and Cyber Security. The Diplomat. [online] Available at: [Last Accessed ] 66

67 Ministry of Economy and Sustainable Development of Georgia. (2012). Department of Communications, Informational Technologies and Innovation. [online] Available at: [Last Accessed ] Ministry of Education and Science of Georgia. (2012a). MA Programs Abroad. [online] Available at: [Last Accessed ] Ministry of Education and Science of Georgia. (2012b). A School of Cyber Security will be launched in Georgia. [online] Available at: [Last Accessed ] Ministry of Finances of Georgia. (2012a). საქართველოს სახელმწიფო ბიუჯეტის ასიგნებები [Assignments of Budget of Georgia]. [online] Available at: [Last Accessed ] Ministry of Finances of Georgia. (2012b). საქართველოს სახელმწიფო ბიუჯეტი 2011 წლის ფისკალური წლისთვის [State Budget of Georgia for 2011 Fiscal Year]. [xls] Available at: [Last Accessed ] Ministry of Justice of Georgia. (2010). Presentation of data Exchange Agency. [online] Available at: [Last Accessed ] Ministry of Justice of Georgia. (2012). კომპიუტერული ცოდნის გამავრცელებელი საზოგადოება დაფუძნდა [The Society for Computer Knowledge Dissemination was established]. [online] Available at: [Last Accessed ] Mshvidzobadze, K. (2012). [Interview by Facebook] (Personal Communication. February 26, 2012) MSIDC (Microsoft India Development Center). (2012). Home page. [online] Available at: [Last Accessed ] საქართველოს ეროვნული უსაფრთხოების კონცეფცია [National Security Concept of Georgia]. (2005). Matsne (Database of legal documents of Georgia). [online] Available at: 67

68 [Last Accessed ] National Security Concept of Georgia (2011). [pdf] Available at: [Last Accessed ] National Statistics Office of Georgia (2012a). Criminal Justice Statistics. [online] Available at: [Last Accessed ] National Statistics Office of Georgia (2012b). მთლიანი შიდა პროდუქტი 2011 წელს [GDP of Georgia in 2011]. [pdf] Available at: press-release Geo1.pdf [Last Accessed ] Natroshvili, Nino. (2012). ნიშნავს თუ არა უსაფრთხოება შეზღუდვას. [Does security mean restraints]. Liberali. [online] (April, 2012) Available at: [Last Accessed ] Navigator. (2007). ერთიან სამთავრობო ქსელს კომპანია მაგთიკომი შექმნის [Magticom will create Georgian Governmental Network]. [online] Available at: [Last Accessed ] Navigator. (2012a). ID ბარათის აღების მსურველთა რაოდენობა იზრდება [Demand on Digital ID card raises]. [online] Available at: [Last Accessed ] Navigator. (2012b). საქართველოს კიბერ უსაფრთხოების სფერო ადამიანური რესურსების ნაკლებობას განიცდის [Georgian cyber security field lacks human resources] [online] Available at: [Last Accessed ] Nazario, J. (2009). Politically Motivated Denial of Service Attacks. [pdf] NATO Cooperative Cyber Defence Center of Excellence. Available at: d%20ddos.pdf [Last Accessed ] 68

69 Nazario, J. DiMino, A. (2008). An In-Depth Look at the Georgia-Russia Cyber Conflict of [pdf] Shadowserver Foundation. Available at: [Last Accessed ] Netgazeti. (2012). მართვის მოწმობის პრაქტიკული გამოცდა გამომცდელების გარეშე [Driving license tests without human testers]. [online] Available at: [Last Accessed ] Net Index by Ookla. (2012). Household Download Index. [online] Available at: [Last Accessed ] Newborn, P. (2006) Virginia National Guard eyes Web sites, blogs. The Official Homepage of the United States Army. [online] (October, 2006). Available at: blogs/ [Last Accessed ] NSC (National Security Council of Georgia). (2012a). Mission. [online] Available at: [Last Accessed ] NSC (National Security Council of Georgia). (2012b). Draft Information Security Law to Be Discussed in Parliament. [online] Available at: [Last Accessed ] NSC (National Security Council of Georgia). (2012c). Cyber Security. [online] Available at: [Last Accessed ] NSC (National Security Council of Georgia). (2012d). Public discussion of the draft Concept on Georgia s Defense Reserve System Continues. [online] Available at: [Last Accessed ] Nye, J. S. (2010). Cyber Power. [pdf] Belfer Center for for Science and International Affairs, John F. Kennedy School of Government, Harvard University. Available at: [Last Accessed ] Ottis, R. (2009). Theoretical Model for Creating a Nation-State Level Offensive Cyber Capability. In H. Santos, ed. 8th European Conference on Information Warfare and Security. Academic Publishing Limited, pp

70 Ottis, R. (2010). From Pitchforks to Laptops: Volunteers in Cyber Conflicts. In: C. Czossek, K. Podins, eds. Conference on Cyber Conflict - Proceedings Tallinn: NATO Cooperative Cyber Defence Center of Excellence Publication, pp Ottis, R, Lorents, P. (2010). Cyberspace: Definition and Implications. [pdf] NATO Cooperative Cyber Defence Center of Excellence. Available at: [Last Accessed ] Overclockers. (2012). Home Page. [online] Available at: [Last Accessed ] Parfitt, T. (2011). Georgian woman cuts off web access to whole of Armenia. The Guardian. [online] (April, 2011). Available at: [Last Accessed ] Parliament of Georgia. (1999). საჯარო სამართლის იურიდიული პირის შესახებ [On Legal Entity of Public Law]. [online] Available at: [Last Accessed ] Phneah, E. (2012). China, India lag in cyber-readiness. ZDNet. [online] (January, 2012). Available at: [Last Accessed ] Puryear, C. (2009) Virginia Guard network defenders welcomed home. Virginia National Guard. [online] (August, 2011). Available at: [Last Accessed ] Rios, B. K. (2009). Sun Tzu was a Hacker: An Examination of the Tactics and Operations from a Real World Cyber Attack. [pdf] NATO Cooperative Cyber Defence Center of Excellence. Available at: [Last Accessed ] Segal, A. (2012) Beware the Patriotic Geek: The Risk of Cyber Militias in Asia. Council on Foreign Relations, Asia Unbound blog [blog] (February, 2012). 70

71 [Last Accessed ] Starr, S., Kuehl, D., Pudas, T. (2010). Perspectives on Bulding a Cyber Force Structure. In: C. Czossek, K. Podins, eds. Conference on Cyber Conflict - Proceedings Tallinn: NATO Cooperative Cyber Defence Center of Excellence Publication, pp Tabatadze, D. (2010). GRENA CERT Activities during Cyber Attacks against Georgia. Electronic Governmental Resources [online] Available at: [Last Accessed ] Tarkhnishvili, Nino. (2012). პარლამენტში განიხილეს რეზერვის სისტემის კონცეფცია [Parliament Discussed Concept of Reserve System]. Radio Free Europe/Radio Liberty s Georgian Service. [online] Available at: [Last Accessed ] TBC Bank. Public Relations Office. (2012). [ ] Personal Communication. March 3, 2012 Threat Assessment for (2010). National Security Council of Georgia (NSC). [pdf] Available at: [Last Accessed ] Tikk, et al. (2008). Cyber Attacks Against Georgia: Legal Lessons Identified. NATO Unclassified Document. [pdf] US Army War College. Available at: [Last Accessed ] Times of India. (2010). Desi hackers join Indian cyber army!. [online] (August, 2010) Available at: [Last Accessed ] Tsuchiya, M. (2012). Patriotic Geeks Wanted to Counter a Cyber Militia. The Association of Japanese Institute of Strategic Studies. [online] (February, 2012). Available at: [Last Accessed ] United Nations Volunteers. (2004). Volunteering for development. [online] (October, 2007). Available at: /doc/volunteering-for-development.html [Last Accessed ] 71

72 University of Cambridge. Institute of Manufacturing. (2012). SWOT (Strengths, Weaknesses, Opportunities, Threats). [online] Available at: [Last Accessed ] US Army National Guard. (2012). Guard Pay. [online] Available at: [Last Accessed ] US Navy (Official website). (2011). Navy Reserve U.S. 10 th Fleet Holds Change of Command Ceremony. [online] Available at: [Last Accessed ] US Office of Personnel Management. (2012). Reservist Differential. [online] Available at: [Last Accessed ] VIC (Volunteer Information Center). (2012). Home page. [online] Available at: [Last Accessed ] Virginia National Guard. (2011). Virginia Guard Mobilization Overview. [online] (June, 2011). [Last Accessed ] WARP (Warning, Advice and Reporting Point). (2012a). WARP Background. [online] Available at: [Last Accessed ] WARP (Warning, Advice and Reporting Point). (2012b). Case Studies. [online] Available at: [Last Accessed ] WARP (Warning, Advice and Reporting Point). (2012c). Directory of WARPs. [online] Available at: [Last Accessed ] Washington Air National Guard. (2012). 194 th Regional Support Wing. [online] Available at: [Last Accessed ] Wittman, George H. (2011). China s Cyber Militia. The American Spectator. [online] Available at: [Last Accessed ] 72

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

CERT-GOV-GE Activities & Services

CERT-GOV-GE Activities & Services CERT-GOV-GE Activities & Services Tbilisi, Georgia 2014 CERT-GOV-GE Manager David Kvatadze www.dea.gov.ge CERT-GOV-GE - Structural unit was formed within the Information Security and Policy division of

More information

E - G O V E R N M E N T. G E

E - G O V E R N M E N T. G E N E W S L E T T E R Issue #1 May, 2012 I N S I D E T H I S I S S U E Y O U W I L L R E A D A L L E - S E R V I C E S U N D E R A S I N G L E P O R T A L M Y. G O V. G E A L L E - S E R V I C E S U N D

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme

Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme Final Report July, 2011 Prepared by David Tabatadze Project Coordinator [email protected] Project Overview With the internet

More information

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015: COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national

More information

Harmful Interference into Satellite Telecommunications by Cyber Attack

Harmful Interference into Satellite Telecommunications by Cyber Attack Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,

More information

Cyber Space in Estonia: Greater Security, Greater Challenges

Cyber Space in Estonia: Greater Security, Greater Challenges Report Cyber Space in Estonia: Greater Security, Greater Challenges By Piret Pernik with Emmet Tuohy August 2013 ISSN 2228-0529 {Author(s)} Introduction For the last five years, Estonia has been implementing

More information

Resources projected in the previous development plan and the reality

Resources projected in the previous development plan and the reality NATIONAL DEFENCE DEVELOPMENT PLAN 2013-2022 Resources projected in the previous development plan and the reality 1. The previous 10-year development plan approved in 2009 (Military Defence Development

More information

CERT-GOV-GE Activities & International Partnerships

CERT-GOV-GE Activities & International Partnerships CERT-GOV-GE Activities & International Partnerships Zurich, Switzerland 2014 CERT-GOV-GE Manager David Kvatadze www.dea.gov.ge CERT-GOV-GE - Structural unit was formed within the Information Security and

More information

Alexa, Top Sites in Georgia, http://www.alexa.com/topsites/countries/ge, accessed September 20, 2010. 2

Alexa, Top Sites in Georgia, http://www.alexa.com/topsites/countries/ge, accessed September 20, 2010. 2 141 2009 2011 INTERNET FREEDOM STATUS Partly Free Partly Free Obstacles to Access 15 12 Limits on Content 15 10 Violations of User Rights 13 13 Total 43 35 POPULATION: 4.6 million INTERNET PENETRATION

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

The European Security Strategy Austrian Perspective

The European Security Strategy Austrian Perspective Erich Reiter and Johann Frank The European Security Strategy Austrian Perspective The following essay gives the Austrian view on the ESS from a security political perspective and analyses the needs and

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]

More information

The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices

The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices Hans Born, Senior Fellow, DCAF Geneva Brussels, 29 April 2004 Presentation given at the Book

More information

CYBER SECURITY THREATS AND RESPONSES

CYBER SECURITY THREATS AND RESPONSES CYBER SECURITY THREATS AND RESPONSES AT GLOBAL, NATION-STATE, INDUSTRY AND INDIVIDUAL LEVELS Heli Tiirmaa-Klaar* Although cyber security has accompanied the ICT sector since the first computer systems

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

MINISTRY OF NATIONAL DEFENCE BUDGETARY DEPARTMENT. BASIC INFORMATION ON THE MoND BUDGET FOR 2016

MINISTRY OF NATIONAL DEFENCE BUDGETARY DEPARTMENT. BASIC INFORMATION ON THE MoND BUDGET FOR 2016 MINISTRY OF NATIONAL DEFENCE BUDGETARY DEPARTMENT BASIC INFORMATION ON THE MoND BUDGET FOR 2016 Warsaw, February 2016 Basic Macroeconomic Indicators 2016 National budget 2016 Defence budget 2016 2,00%

More information

Georgia. Progress Report

Georgia. Progress Report Anti-Corruption Network for Eastern Europe and Central Asia Istanbul Anti-Corruption Action Plan Second Round of Monitoring Georgia Progress Report Report is presented by Georgia at the 10 th Monitoring

More information

National Cyber Security Strategy of Afghanistan (NCSA)

National Cyber Security Strategy of Afghanistan (NCSA) Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013 Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Foreign Affairs and National Security

Foreign Affairs and National Security Foreign Affairs and National Security Objectives: TLW understand and explain the following questions as it relates to the Foreign affairs of the American Government What is foreign policy? What is the

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, [email protected], [email protected]

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through

More information

Romanian National Computer Security Incident Response Team CERT-RO. [email protected] http://www.cert-ro.eu

Romanian National Computer Security Incident Response Team CERT-RO. dan.tofan@cert-ro.eu http://www.cert-ro.eu Romanian National Computer Security Incident Response Team CERT-RO [email protected] http://www.cert-ro.eu About A Digital Agenda for Europe, Pillar : Trust and Security, Action 38 Member States to

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

TLP WHITE. Denial of service attacks: what you need to know

TLP WHITE. Denial of service attacks: what you need to know Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...

More information

Mustafa AYDINLI NLO CYBER SECURITY ADVISOR

Mustafa AYDINLI NLO CYBER SECURITY ADVISOR Mustafa AYDINLI NLO CYBER SECURITY ADVISOR AGENDA Introduction to Cyber Security Establishment & History of TR-CERT Responsibilities of TR-CERT Competencies of TR-CERT CYBER SECURITY Cyber security is

More information

Legal Issues / Estonia Cyber Incident

Legal Issues / Estonia Cyber Incident Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

Cyber security in an organization-transcending way

Cyber security in an organization-transcending way Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

CYBERSECURITY INDEX OF INDICES

CYBERSECURITY INDEX OF INDICES Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

Tel. : 206 370 9722 E-mail: [email protected] To: REECAS Conference

Tel. : 206 370 9722 E-mail: emin.aliyev@yahoo.fr To: REECAS Conference From: Emin ALIYEV Tel. : 206 370 9722 E-mail: [email protected] To: REECAS Conference Subject: Ongoing Research Proposal Thesis Dissertation: The pertinence of Knowledge Based Azerbaijan hypothesis:

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information

REPUBLIC OF TURKEY. Ministry of Transport, Maritime Affairs and Communications. National Cyber Security Strategy and 2013-2014 Action Plan

REPUBLIC OF TURKEY. Ministry of Transport, Maritime Affairs and Communications. National Cyber Security Strategy and 2013-2014 Action Plan REPUBLIC OF TURKEY Ministry of Transport, Maritime Affairs and Communications National Cyber Security Strategy and 2013-2014 Action Plan [The page intentionally left blank.] National Cyber Security Strategy

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

NATIONAL DEFENSE AND SECURITY ECONOMICS

NATIONAL DEFENSE AND SECURITY ECONOMICS NATIONAL DEFENSE AND SECURITY ECONOMICS FUTURE DEVELOPMENT OF ECONOMICS OF DEFENSE AND SECURITY ECONOMIC DIMENSION OF CYBERSPACE AS NEW SECURITY THREAT Content of Topic Introduction Basic Concepts Cyberspace

More information

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014 Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014 1 July 2014 RESTRICTED 1 ICT as a Modern Solution Security Threats, Early Detection and Prevention

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Team of Training Center Patriot

Team of Training Center Patriot Team of Training Center Patriot Patriot Training center is a team of military professionals who are instructors from the USA, Israel, Georgia and Ukraine. Combat experience of the team members: Deployments

More information

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

A Detailed Strategy for Managing Corporation Cyber War Security

A Detailed Strategy for Managing Corporation Cyber War Security A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait [email protected] ABSTRACT Modern corporations

More information

Georgia - Telecoms, Mobile, Broadband and Forecasts

Georgia - Telecoms, Mobile, Broadband and Forecasts Brochure More information from http://www.researchandmarkets.com/reports/1452979/ Georgia - Telecoms, Mobile, Broadband and Forecasts Description: Georgia's telecom sector sees strong growth as the country

More information

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state

More information

the Council of Councils initiative

the Council of Councils initiative Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

REGULATION for MASTER S EDUCATION Approved on 27/05/2013 by Academic Board - Decision 2 (Appendix :1)

REGULATION for MASTER S EDUCATION Approved on 27/05/2013 by Academic Board - Decision 2 (Appendix :1) INTERNATIONAL BLACK SEA UNIVERSITY QUALITY MANAGEMENT SYSTEM DOCUMENTS REGULATION for MASTER S EDUCATION Approved on 27/05/2013 by Academic Board - Decision 2 (Appendix :1) Approvals The signatures below

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected]

Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia helmi.rais@ansi.tn helmi.rais@gmail.com Promoting a Cybersecurity Culture: Tunisian Experience ITU Regional Cybersecurity Forum for Eastern and Southern Africa Lusaka, Zambia, 25-28 August 2008 Helmi Rais CERT-TCC Team Manager National Agency

More information

Charter of Consumer Rights in the Digital World

Charter of Consumer Rights in the Digital World DOC No: INFOSOC 37 08 DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create

More information

ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session

ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session Note by the Chairman I attach for your information a list of the decisions

More information

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency I. Alarming call for cooperation with ISPs Slammer Worm Spread most of vulnerable SQL servers

More information

OSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propaganda on the Internet and Hate Crimes. Paris, France June 16, 2004

OSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propaganda on the Internet and Hate Crimes. Paris, France June 16, 2004 PC.DEL/507/04 16 June 2004 ENGLISH only OSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propaganda on the Internet and Hate Crimes Paris, France June 16, 2004 Public and Private

More information

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that: 3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

Georgia: Five Years of Non-Action

Georgia: Five Years of Non-Action Georgia: Five Years of Non-Action The Failure to Investigate the Crimes of the Russian- Georgian War of August 2008 No. 4-2014 After the brief war in Georgia in August 2008, when Russia invaded and for

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Policy Brief. Public e-procurement at the local level in Albania. Challenges in the fight against corruption. Mona Xhexhaj

Policy Brief. Public e-procurement at the local level in Albania. Challenges in the fight against corruption. Mona Xhexhaj Policy Brief Public e-procurement at the local level in Albania Challenges in the fight against corruption Mona Xhexhaj This policy brief has been prepared in the frame of the TRAIN Programme 2014 (Think

More information

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

Fujitsu Group s Information Security

Fujitsu Group s Information Security Fujitsu Group s Information Under the corporate governance system, the Fujitsu Group promotes appropriate information management and information usage according to Group rules, as part of risk management.

More information

National Cybersecurity & Communications Integration Center (NCCIC)

National Cybersecurity & Communications Integration Center (NCCIC) National Cybersecurity & Communications Integration Center (NCCIC) FOR OFFICIAL USE ONLY NCCIC Overview NCCIC Overview The National Cybersecurity and Communications Integration Center (NCCIC), a division

More information

Capacity Building in Cyberspace Security

Capacity Building in Cyberspace Security Capacity Building in Cyberspace Security Muhammad Amir Malik Member (IT), Government of Pakistan [email protected] Sequence of Presentation Country Profile of Pakistan ICT Profile of Pakistan Cyberspace

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information