China s Economic Espionage
|
|
|
- Melvin Greene
- 10 years ago
- Views:
Transcription
1 China s Economic Espionage Stealing, Not Destroying Reema Hibrawi This paper seeks to examine the economic espionage threat to the national security of the United States from the Chinese government in the private and public sector. In this paper, economic espionage will refer to the unauthorized access and use of information by a foreign entity for strategic, tactical, or economic purposes. 1 The theft of trade secrets with the intent of an economic benefit by a foreign power, also falls under economic espionage. 2 The key research questions of this paper are: 1) Which U.S. targets are pursued by the Chinese government? 2) Why is China engaging in economic espionage against the U.S.? 3) What are the implications for U.S. national security? This paper seeks to specifically discuss the economic, military, and security risks to U.S. national security. Economic risks include the loss of trade secrets and competitive advantage. Military risks include the theft of strategic information on operations, equipment, and personnel. 3 Security risks refer 1 Economic Espionage Act of 1996: Title 18 Crimes and Criminal Procedure, Part I Crimes, Chapter 90 Protection of Trade Secrets, Pub. L. No , 110 Stat (Oct. 11, 1996), codified at 18 U.S.C Passed as part of the National Information Infrastructure Protection Act of Charles Doyle, Stealing Trade Secrets and Economic Espionage: An Overview of 18 U.S.C and 1832, Congressional Research Service (July 25, 3 Testimony of Larry M. Wortzel, Cyber Espionage and the Theft of US Intellectual Property and Technology, before the House of Representatives, to infrastructure and government functions that rely on digital networks. The main focus will be on Chinese government network exploitation and attacks, as well as intellectual property theft. 4 The analysis predicts that the Chinese government will continue to focus on persistent and aggressive economic espionage of the United States. This judgment is made due to the vast information from private security consulting and public intelligence agencies on attacks originating from China, and the current Chinese cyber strategy. It is less clear how the Chinese will continue to use economic espionage as a tool to maintain their economic growth. This uncertainty is due to the opaque and complex internal strategy on China s economic espionage. This may or may not be the main tool or focus for China s economic growth moving forward. Just as uncertain but highly probable is that the Chinese will continue to resist ratifying an international legal framework for cyber monitoring and security that is restrictive. This is based on failed negotiations in the past, and China s continued focus on maintaining legitimacy through its domestic and foreign policies. RATIONALE Historically, China is not known for its prowess in modernity. It has lagged behind the U.S. in innovation and resources in much of the 20 th Century. China was inefficient, stagnant, and poor due to tight economic control and isolation by the state. 5 A shift occurred in the late 1970 s, with the Committee on Energy and Commerce Subcommittee on Oversight and Investigations (July 9, 2013). 4 Mark Lowenthal, Intelligence: From Secrets to Policy, 6 th Edition (Sage/CQ Press, 2014), Wayne Morrison, China s Economic Rise: History, Trends, Challenges, and Implications for the United States, Congressional Research Service (October 9, 1
2 implementation of free market reforms 6 China continued to push for foreign direct investment (FDI) to this economic development. 7 It has become more influential as a result of improving its technology and intelligence capabilities. 8 This includes the modernization of its signal intelligence (SIGINT). 9 It has also shown space-borne capabilities in the form of anti-satellite (ASAT) tests in 2007 and In the education sector, the state has emphasized science fields to continue this growth. There has since been an increase in Chinese students attending physics and computer science programs in U.S. universities and graduate programs. 11 This is seen as both an effort to modernize the population and develop cyber hacking capabilities for state use. The aim of modernizing into an information and industrial society has inspired the Informatization Plan of One of the main goals is to close the digital divide. 13 China is on track to do just that as illustrated by its successful economic espionage on U.S. civilian and military organizations. 14 With its growing power as a world economy and 6 Beina Xu and Eleanor Albert, The Chinese Communist Party: Backgrounders, Council on Foreign Relations (November 17, 7 Jim Lewis, China Economic Reform Timeline: Jim Lewis Blog, Center for Strategic & International Studies (December 11, 8 Wayne Morrison, China s Economic Rise: History, Trends, Challenges, and Implications for the United States, Congressional Research Service (October 9, 9 Mark Lowenthal, Intelligence: From Secrets to Policy, Ibid. 11 Ibid. 12 Amy Chang, Warring State: China s Cybersecurity Strategy, Center for New American Security (December 13 Zhongzhou Li, China s Information Strategy and its Impact on Trade in ICT Goods and ICT Services, UNCTAD Expert Meeting, in Support of the Implementation and Follow-Up of WSIS: Using ICTs to Achieve Growth and Development (December 2006). 14 Ibid. increasing need for resources, Chinese intelligence and technology capabilities have improved to meet these demands. IMPORTANCE TO THE U.S. Along with these developments, the cyber domain is relatively new and unregulated, which makes economic espionage without consequences more prevalent. There are no legal frameworks to monitor cyber security at the international level, 15 and no precedent exists in policy at the domestic or international level. 16 The sovereignty of digital information is a point of contention between states like China and the U.S.; China prefers a more flexible interpretation which will not affect its domestic and political stability. 17 This has led to stalled agreements on international cyber security and norms. 18 The U.S. infrastructure is reliant on digital networks for its electricity, water, transportation, flight travel, and the economy. 19 Like most industrialized states, the U.S. is more vulnerable to economic espionage due to the level of integration between digital networks and national infrastructure. 20 Government social services like healthcare, industry, and commerce have transferred to digital structures. Besides the government, the public also is increasing its use and trust of digital technologies. 21 One third of the world is digitally connected and 15 James Clapper, Worldwide Threat Assessment of the US Intelligence Community (January 29, 16 Michael Hayden, The Future of Things Cyber, Strategic Studies Quarterly (Spring 2011). 17 Amy Chang, Warring State: China s Cybersecurity Strategy, Center for New American Security (December 18 Ibid. 19 White House Online, International Strategy for Cyberspace (May 2011). 20 James Clapper. Worldwide Threat Assessment of the US Intelligence Community (January 29, 21 Ibid.
3 this is likely to increase as more countries modernize and develop technology. 22 For these reasons, the Director of National Intelligence (DNI) threat assessment of 2013 lists cyber security as a current and growing future threat to the U.S. and highlights China and Russia as the most pervasive and persistent in attacks against the U.S. 23 Chinese programs infiltrated over 1,295 computers in 103 nations. 24 They target U.S. national defense and national lab sites, 25 as well as cyber and technology firms. 26 These are substantial motivations for cyber security and protection from economic espionage as a key strategic initiative for the most recent Department of Defense (DoD) strategy of The executive branch also lists cybercrime as a key focus in the White House International Strategy for Cyberspace. 28 ANALYSIS China has persistently denied existence of cyber units or economic espionage. It describes these claims as fictitious and baseless. 29 In 2010, of 614 known advanced persistent threats (APT) with distinct IP addresses attacking infrastructure systems, 100% were found 22 Ibid. 23 Ibid. 24 A study undertaken by the University of Toronto in 2009, in Mark Lowenthal, Intelligence: From Secrets to Policy, Mark Lowenthal, Intelligence: From Secrets to Policy, Mandiant Online. APT1: Exposing One of China s Cyber Espionage Units. A private security consulting service periodically releases cyber threat reports against the US and private sector companies. 27 Department of Defense, Department of Defense Strategy for Operations in Cyberspace (July 2011). 28 White House Online, International Strategy for Cyberspace (May 2011). 29 Adam Segal, Axiom and the Deepening Divide in U.S China Cyber Relations, Council on Foreign Relations (October 29, operating out of Shanghai. 30 A prominent espionage unit, referred to as APT1, has instigated massive attacks and continues to steal huge quantities of information. Hundreds of investigations on economic espionage found that most activities originated in China and with government knowledge. 31 The extent of the attacks and resilience of the group suggest they have strong financial backing in addition to a sophisticated structure. With the highly monitored Chinese environment, it is unlikely the state is unaware. Evidence suggests the state must be supporting these activities because its attacks have not stopped. 32 The top industries include information technology, high-tech electronics, aerospace, public administration, and satellites and telecommunications. 33 Strong evidence shows that APT1 is Unit which is the People s Liberation Army (PLA) Third Department cyber espionage unit. Cyber activity originates in the same area where Unit is located. 34 The same structure, mission, and methodology exists in both units. The similarities between the two groups are difficult to ignore. The sophistication and investment in this espionage unit explains the assessment of China continuing persistent economic espionage against the U.S. as likely. The U.S. must continue to prepare for China s espionage activities. Of exemplary importance, Unit targets civilian technology and proprietary information. Evidence shows that APT1 started stealing data as early as Information that is targeted includes strategic plans, goals, calendar items, optimization 30 Mandiant Online. APT1: Exposing One of China s Cyber Espionage Units, Ibid. 32 Ibid. 33 Ibid. 34 Ibid. 35 Mandiant Online. Trends: Beyond the Breach, 2014 Threat Report.
4 processes, and joint venture information. 36 This suggests that the attacks are meant to understand how executives and decision makers think. 37 China is looking to gain influence through several means: economic, political, diplomatic, and military platforms. China-based attacks steal ideas and the process to developing those ideas. The cost for these activities is minimal. Risk is low and gaining access to large quantities of information can be done quickly by manipulating networks, , and digital downloads to external storage devices. 38 Detection is difficult over networks because the location of the perpetrator can also be masked. 39 U.S. private sector firms, academia, and private citizens of various countries are prime targets for China. Evidence shows that Marathon Oil, ExxonMobil, and ConocoPhillips were hacked in the summer of 2008 and lost data detailing the quantity, value, and location of oil discoveries around the world. The loss of such data per company ranges in the millions of dollars. 40 The Chinese are the most pervasive and relentless actors in economic espionage, besides Russia. 41 The U.S. is the leader in technological and economic development which makes it a target by its competitors, and especially China. 42 Information and stolen data is provided to Chinese state owned enterprises which cuts costs, research and development timelines, and improves the competitive edge of these industries. 43 The economy as a whole can also be damaged by the compromise of private sector trade secrets, which can affect job creation, profits, and future innovation. 44 Military economic espionage has targeted several DoD weapons systems including ballistic-missile defense systems, Black Hawk helicopters, and combat ships. 45 Military operations and the individuals involved are compromised when military documents are stolen. China seeks information on the manufacture of weapons and their systems to replicate and counter their designs. This is an effort to modernize the state and improve its military capabilities. Evidence of this is seen through its antisatellite tests to counter U.S. military use of satellites for offensive behavior. 46 More specifically, evidence has also shown that Chinese hackers stole classified information in February 2012 about the technology behind the F-35 joint strike fighters. 47 CHINESE STRATEGY Currently, China s cyber strategy is an extension of its national security strategy. This 36 Ibid. 37 Ibid. 38 Foreign Spies Stealing US Economic Secrets in 39 Ibid. 40 Cybersecurity: A list of significant cyber events since 2006, Center for Strategic and International Studies (April 2015). 41 Foreign Spies Stealing US Economic Secrets in 42 Ibid. 43 Testimony of Larry M. Wortzel, Cyber Espionage and the Theft of US Intellectual Property and Technology, before the House of Representatives, Committee on Energy and Commerce Subcommittee on Oversight and Investigations (July 9, 2013). 44 Foreign Spies Stealing US Economic Secrets in 45 Ibid. 46 Mark Lowenthal. Intelligence: From Secrets to Policy, Cybersecurity: A List of Significant Cyber Events Since 2006, Center for Strategic and International Studies (April 2015).
5 is to maintain legitimacy of the Chinese Communist Party (CCP). It is likely China will resist ratifying an international legal framework to maintain legitimacy. The CCP maintains legitimacy by ensuring domestic stability, military modernization, economic growth, and territorial integrity. 48 In order to become a better innovator of information and industry, Chinese domestic policy needs to focus on technology and science and the current leader in both technology and innovation is the U.S. It follows that China s main targets are U.S. private companies, military, and government. Chinese economic espionage serves several purposes: political, military, and economic. 49 China is simultaneously maintaining legitimacy, anticipating cyber conflict, and growing its economy. For these reasons, it is likely that China would use economic espionage as an integral tool for economic growth and other domestic policy objectives. Understanding that China seeks economic espionage for several reasons, mostly to maintain power and economic growth, is important in anticipating future U.S. targets. It has been argued that China is using economic espionage solely for military offensive strategy or economic growth. Either premise is too simplistic and overlooks the Chinese style of governance in the last century. As previously mentioned, a major objective of the CCP is to maintain its legitimacy. All policies, both domestic and foreign, are shaped by this priority of self- 48 Foreign Spies Stealing US Economic Secrets in 49 James Lewis and Simon Hansen, China s cyberpower: International and Domestic Priorities, Australian Strategic Policy Institute (November 12, preservation. 50 Because a major objective of the CCP is to maintain its political legitimacy, it is prone to using economic espionage to meet both objectives military prowess and economic development, as both are important contributors to CCP s legitimacy. The combination of military and economic growth is a stronger method of maintaining authority than either alone. The CCP has been in power for over eighty years, and has remained in power by maintaining political and economic stability. 51 Chinese President Xi Jingping has also emphasized the importance of cyber technology in China s pursuit of power through the 2006 Informatization Plan, and in recent national security law drafted specifically to establish systems of cyber and information security and national cyber sovereignty. 52 This law highlights the importance of cyber technology and security for Xi and the CCP in maintaining legitimacy. Economic espionage is likely to continue to be a tool for that end. The U.S. does not have complete information about the motivations and patterns of Chinese economic espionage. This is because not every Chinese economic espionage attack has been successful or detected. 53 The limitations of the CCP cyber strategy is also unknown. Few public 50 Amy Chang, Warring State: China s Cybersecurity Strategy, Center for New American Security (December, 51 Beina Xu; Eleanor Albert, The Chinese Communist Party: Backgrounders, Council on Foreign Relations (November 17, 2014) ; Amy Chang, Warring State: China s Cybersecurity Strategy, Center for New American Security (December 52 China defines overall national security outlook in draft law, People s Daily (April 20, 2015). 53 Testimony of Dr. Larry M. Wortzel before the House Armed Services Committee, China s Military Modernization and Cyber Activities, Strategic Studies Quarterly 8, no. 1: International Security and Counter Terrorism Reference Center (Spring
6 documents exist on this secretive program. 54 There are assumptions that the CCP would not steal information that could be seen as an act of war. Yet there is no evidence from the CCP or Xi if this assumption is accurate. The CCP may have its own unspoken rules about what to collect and what not to prioritize. This standard may be an understanding within the top leadership culture, not documented officially, and also kept secret. The highest priority for the Chinese government is maintaining domestic stability. If this were to change, China would be forced to focus on domestic rather than foreign policy. It is not likely that espionage acts would stop, but the attacks would decrease as focus is shifted to the domestic sphere and managing censorship or internal attacks. If China agrees to ratify an international legal framework, this might also alter the structure of China s economic espionage units. China still believes it needs the information provided by its economic espionage units to modernize and grow, so again economic espionage would continue. CONCLUSION The aim of Chinese espionage has historically been to gain an economic edge over its competitors. Because espionage has been a relatively low-cost method to obtain important technology for economic development, and because China needs these technologies at its current level of development, it is likely that such economic espionage will continue. On the other hand, this paper has found that China has not used its stolen information for military aggression, although it targets military intelligence in both nuclear and satellite classified information. 55 It is unlikely China will have a major cyber- 54 Amy Chang, Warring State: China s Cybersecurity Strategy, Center for New American Security (December, 55 Ibid. attack on U.S. infrastructure that would cause wide scale disruption. 56 It is also unlikely China will use cyber warfare in the next three years unless it believes its vital interest, the political legitimacy of the CCP regime, is violated. FURTHER READINGS: Chang, Amy. Warring State: China s Cybersecurity Strategy. Center for New American Security. December, Cybersecurity: A List of Significant Cyber Events Since Center for Strategic and International Studies, April Mandiant Online. APT1: Exposing One of China s Cyber Espionage Units. s/mandiant-reports/. Segal, Adam. Axiom and the Deepening Divide in the U.S China Cyber Relations. Council on Foreign Relations: Net Politics. October 29, White House Online. International Strategy for Cyberspace. May es/rss_viewer/international_strategy_for_cyb erspace.pdf. Wong, Edward. For China, Cybersecurity is Part of Strategy for Protecting the Communist Party. The New York Times. December, 3, Adam Segal, The code not taken: China, the United States, and the future of cyber espionage, Bulletin of the Atomic Scientists (2013).
7 Reema Hibrawi is a Syrian-American with an international background having lived and studied in the Middle East, Europe, and the US. Her educational background includes a Bachelor's of Science in Business Administration with a focus in HR, and currently is pursuing a Master's of Arts in International Relations at New York University. Currently a corporate planning intern at the Council on Foreign Relations (CFR) her career goals include continuing to work on international affairs and project management within civil society and international organizations, or think tanks with a concentration on post-conflict development, and diplomacy and civil society.
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
Corporate Spying An Overview
Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
working group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 18, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
Research Note Engaging in Cyber Warfare
Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines
United States Cyber Security in the 21st Century
United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
CRS Reports & Analysis Print Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist ([email protected], 7-6739) View Key CRS Policy Staff May
The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
For More Information
C O R P O R A T I O N CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
How To Protect Yourself From Cyber Crime
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
The Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 11, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
Hearing on Commercial Cyber Espionage and Barriers to Digital Trade in China
Hearing on Commercial Cyber Espionage and Barriers to Digital Trade in China June 15, 2015 Dirksen Senate Office Building Room 608 Washington, DC 20510 Paul M. Tiao Partner, Hunton & Williams LLP Testimony
A Reluctant Cyber Security Agreement between the US and China
16 November, 2015 A Reluctant Cyber Security Agreement between the US and China Dr. Omair Anas* Three months after the biggest data theft from the American networks, the US and China have agreed to cooperate
Counterintelligence Awareness Glossary
Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 Report Documentation Page Form Approved
Cyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist September 20, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 We Teach What You NEED TO KNOW
RETHINKING CYBER SECURITY
RETHINKING CYBER SECURITY Introduction Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time, the traditional cyber security vendor
Confrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate
Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state
Cyber-insurance: Understanding Your Risks
Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist September 20, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 Cybersecurity: Authoritative Reports
Cybersecurity Primer
Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers
Harmful Interference into Satellite Telecommunications by Cyber Attack
Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
James R. Clapper. Director of National Intelligence
Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide
UN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
Cybersecurity. Canisius College
Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never
GAO INFORMATION SECURITY. Computer Attacks at Department of Defense Pose Increasing Risks
GAO United States General Accounting Office Testimony Before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate For Release on Delivery Expected at 9:30 a.m. Wednesday
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist August 16, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 Cybersecurity: Authoritative Reports
AT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
A Detailed Strategy for Managing Corporation Cyber War Security
A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait [email protected] ABSTRACT Modern corporations
Michael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
Five Principles for Shaping Cybersecurity Norms
TRANSPARENCY PROPORTIONALITY HARMONIZATION RISK REDUCTION COLLABORATION Five Principles for Shaping Cybersecurity Norms Contents Introduction 3 Cybersecurity Norms 5 The Role of the Public Sector 6 Cybersecurity
Legal Issues / Estonia Cyber Incident
Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
CYBERSECURITY: DIVISION OF RESPONSIBILITY IN THE U.S. GOVERNMENT
CYBERSECURITY: DIVISION OF RESPONSIBILITY IN THE U.S. GOVERNMENT Joeli R. Field INTL604 Interagency Operations American Military University September 18, 2010 2 INTRODUCTION The cyber threat is one of
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
Cyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
S. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
EY Cyber Security Hacktics Center of Excellence
EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find
Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge
Cybercrime Bedrohung, Intervention, Abwehr BKA-Herbsttagung vom 12. - 13. November 2013 Cybersecurity strategic-political aspects of this global challenge Full version Michael Daniel Special Assistant
Developing a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION. Cristin Flynn Goodwin J.
Developing a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION Cristin Flynn Goodwin J. Paul Nicholas October 2013 Contents Executive Summary... 3 What Is a National
Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013
Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:
Espionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson [email protected] WASHINGTON, D.C. Satish M. Kini [email protected] Renee
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note
A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,
The National Counterintelligence Strategy of the United States
The National Counterintelligence Strategy of the United States Office of the National Counterintelligence Executive March 2005 National Counterintelligence Strategy of the United States PREFACE The Counterintelligence
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
China s Perceptions of Cybersecurity
China s Perceptions of Cybersecurity Wang Peiran Interest and research in cybersecurity issues began in China in the 1980s. In April 1987, retired Major Shen Weiguang published the essay The Harbingers
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
How To Protect Yourself From Cyber Crime
The Global Polity Cybercrime, Cybersecurity and the Future of the Internet The Challenges Cybercrime is now the fastest growing sector of cross-border organized crime. In 2009, reported losses in the US
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
