SUB Hamburg A/ Cyber Conflict. Competing National Perspectives. Edited by Daniel Ventre ) WILEY

Size: px
Start display at page:

Download "SUB Hamburg A/578680. Cyber Conflict. Competing National Perspectives. Edited by Daniel Ventre ) WILEY"

Transcription

1 SUB Hamburg A/ Cyber Conflict Competing National Perspectives Edited by Daniel Ventre ) WILEY

2 Table of Contents Introduction xi Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy 1 Hugo LOISEAU and Lina LEMAY 1.1. Introduction Canada in North America: sovereign but subordinate? Counter-terrorism for the improvement of national security The long path to a national CI protection strategy and national cyber security strategy The adoption of the current strategies for CI protection and cyber security Conclusion Bibliography Scientific and media articles Primary Data Websites 44 Chapter 2. Cuba: Towards an Active Cyber-defense Cyberspace: statistics and history The marginalization of Cuba Cuban cyberspace as the target of attacks Theoretical and practical considerations on information warfare and cyber-warfare Development of capabilities Cyber-warfare theories and practices Fidel Castro's discourse 57

3 vi Cyber Conflict The concept of active cyber-defense Regulations and ways around them The State's influence over cyberspace Getting around the restrictions Capabilities of control, surveillance and interception Enemies Conclusion Bibliography 73 Chapter 3. French Perspectives on Cyber-conflict Cyberspace Assessments, view on the world and awakening Attacks The feeling of insecurity, the threat Potential vulnerabilities of States Evolution of the international environment Reaction, position of France and choice: theories, political strategies and military doctrines Information: a powerful weapon for those controlling it Media information: beneficial if controlled Economic information as power, if controlled Information warfare Information warfare or information control The ANSSI Cyber-security and cyber-defense Army: Information operations, NEB (numerisation de l'espace de bataille/digitization of battlespace), info-development Cyber-war and other modalities of the cyber-conflict Conclusion Bibliography 131 Chapter 4. Digital Sparta: Information Operations and Cyber-warfare in Greece 135 Joseph FITSANAKIS 4.1. Geopolitical significance Strategic concerns and internal balancing Formative experiences in information operations: the Ergenekon conspiracy Formative experiences in information operations: intensifying cyber-attacks 142

4 Table of Contents vii 4.5. Formative experiences in information operations: the Ocalan affair Formative experiences in information operations: the Greek wiretapping case of Emerging civilian information operations strategies Emerging military information operations strategies The European Union dimension in Greek information operations Conclusion Bibliography 158 Chapter 5. Moving Toward an Italian Cyber Defense and Security Strategy 165 Stefania Ducci 5.1. Information warfare and cyber warfare: what are they? Understanding the current Italian geopolitical context The Italian legal and organizational framework The need for a national cyber-defense and-security strategy Conclusion Bibliography 188 Chapter 6. Cyberspace in Japan's New Defense Strategy Japan's defense policy Cyberspace in Japan's defense strategy The context Cyberspace in security and defense policies Conclusion Bibliography 221 Chapter 7. Singapore's Encounter with Information Warfare: Filtering Electronic Globalization and Military Enhancements 223 Alan CHONG 7.1. Singapore: electronic globalization and its pitfalls Cyberdefence in the private sector and society at large The Singapore Armed Forces and the embrace of third-generation warfare Force multiplication Continually revitalizing existing conventional arms capabilities Generating asymmetrical advantages in operational transparency 242

5 viii Cyber Conflict 7.4. Conclusion Bibliography Chapter 8. A Slovenian Perspective on Cyber Warfare 251 Gorazd PRAPROTNIK, Iztok PODBREGAR, Igor BERNIK and Bojan TICAR 8.1. Introduction Preparations for digital warfare Specifics of technologically-advanced small countries Geostrategic, geopolitics and the economic position of the Republic of Slovenia Information and communication development in Slovenia Cyber-thieats in Slovenia Slovenia in the field of information and communication security policy Slovenia's information and communication security policy strategy The EU information and communication security policy NATO's information and communications security policy Slovenia's information and communication security policy Analysis of key strategic documents regulating the field of information and communication security policy in the Republic of Slovenia National bodies that govern the field of information and communication security policy in the Republic of Slovenia Directorate for information society (Ministry of Higher Education, Science and Technology) Slovenian Computer Emergency Response Team Directorate of e-government and Administrative Processes (Ministry of Public Administration) Office of the Government of the Republic of Slovenia for the Protection of Classified Information Slovenian Intelligence and Security Agency National Center for Crisis Management Conclusion Bibliography 276 Chapter 9. A South African Perspective on Information Warfare and Cyber Warfare 279 Brett VAN NIEKERK and Manoj MAHARAJ 9.1. The South African structure of information warfare A South African perspective on cyber-warfare The Southern African cyber-environment 284

6 Table of Contents ix 9.4. Legislation Cyber-security and information warfare organizations in South Africa Estimated cyber-warfare capability in Africa Conclusion Bibliography 292 Chapter 10. Conclusion Cyberspace Bibliography 306 List of Authors 307 Index 309

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

NATIONAL DEFENSE AND SECURITY ECONOMICS

NATIONAL DEFENSE AND SECURITY ECONOMICS NATIONAL DEFENSE AND SECURITY ECONOMICS FUTURE DEVELOPMENT OF ECONOMICS OF DEFENSE AND SECURITY ECONOMIC DIMENSION OF CYBERSPACE AS NEW SECURITY THREAT Content of Topic Introduction Basic Concepts Cyberspace

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Estonia 2007 Cyberattakcs

Estonia 2007 Cyberattakcs Estonia 2007 Cyberattakcs 2010 Agenda Background April 2007 What is cyberattack Estonia as an information society Cyberattacks Protection measures used Lessons learned What are we doing - measures Background

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

Introduction to the International Humanitarian Law of Armed Conflicts

Introduction to the International Humanitarian Law of Armed Conflicts Introduction to the International Humanitarian Law of Armed Conflicts Natolin, 23-25 March 2015 Seminar organized by the International Committee of the Red Cross and the College of Europe Natolin Campus

More information

Public Private Partnerships and National Input to International Cyber Security

Public Private Partnerships and National Input to International Cyber Security Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,

More information

Cybersecurity. Canisius College

Cybersecurity. Canisius College Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never

More information

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

HOMELAND SECURITY INTERNET SOURCES

HOMELAND SECURITY INTERNET SOURCES I&S Internet Sources I&S HOMELAND SECURITY INTERNET SOURCES USEFUL SITES, PORTALS AND FORUMS Homeland Security Home Page http://www.whitehouse.gov/homeland/ A federal agency whose primary mission is to

More information

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: AMH 2047 COURSE TITLE: American Military History PREREQUISITE(S): None COREQUISITE(S): None CREDIT HOURS:

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

The EU s approach to Cyber Security and Defence

The EU s approach to Cyber Security and Defence Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific

More information

Trends Concerning Cyberspace

Trends Concerning Cyberspace Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming

More information

Five Principles for Shaping Cybersecurity Norms

Five Principles for Shaping Cybersecurity Norms TRANSPARENCY PROPORTIONALITY HARMONIZATION RISK REDUCTION COLLABORATION Five Principles for Shaping Cybersecurity Norms Contents Introduction 3 Cybersecurity Norms 5 The Role of the Public Sector 6 Cybersecurity

More information

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND

More information

Harmful Interference into Satellite Telecommunications by Cyber Attack

Harmful Interference into Satellite Telecommunications by Cyber Attack Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,

More information

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 I. Defense Cooperation and the Aim of the Guidelines In order to ensure Japan s peace and security under any circumstances, from peacetime

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

Hybrid Warfare & Cyber Defence

Hybrid Warfare & Cyber Defence Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency

More information

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso Cyber Attacks Protecting National Infrastructure Student Edition Edward G. Amoroso ELSEVIER. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann

More information

Environment & Technology Ellie Smith, Connor Dedrick Description of Position. Committee: Topic: Cyber Security. Officer(s):

Environment & Technology Ellie Smith, Connor Dedrick Description of Position. Committee: Topic: Cyber Security. Officer(s): Committee: Officer(s): Position Aggressive Defensive Environment & Technology Ellie Smith, Connor Dedrick Description of Position These countries actively pursue offensive cyber attack capabilities. These

More information

SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes

SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS Taught Masters programmes What s special about studying in the Department of International Relations at Sussex? With a history that spans

More information

The Geography of International terrorism

The Geography of International terrorism SUB Hamburg A/596060 The Geography of International terrorism An Introduction to Spaces and Places of Violent Non-State Groups Richard M. Medina and George F. Hepner CRC Press Taylor & Francis Croup Boca

More information

Ministry of Defence Bosnia and Herzegovina

Ministry of Defence Bosnia and Herzegovina Centre for Security Cooperation Military Academy "General Mihailo Apostolski"-Skopje Ministry of Defence Bosnia and Herzegovina Ministry of Foreign Affairs Bosnia and Herzegovina Ministry of Security Bosnia

More information

The role of special operations in the combating terrorism

The role of special operations in the combating terrorism AARMS Vol. 7, No. 1 (2008) 47 53 SECURITY The role of special operations in the combating terrorism CSABA KOVÁCS Miklós Zrínyi National Defence University, Budapest, Hungary The Special Operations Forces

More information

The Battlefield. critical infrastructure:

The Battlefield. critical infrastructure: CIP A Business View Rolf Schulz CEO Definition critical infrastructure: 1. Elements of a system that are so vital that disabling any of them would incapacitate the entire system. 2. [In security,] those

More information

Challenges in Cybersecurity Risks, Strategies, and Confidence-Building International Conference (Preliminary Programme 10.10.2011)

Challenges in Cybersecurity Risks, Strategies, and Confidence-Building International Conference (Preliminary Programme 10.10.2011) Challenges in Cybersecurity Risks, Strategies, and Confidence-Building International Conference (Preliminary Programme 10.10.2011) Organising Institutions: Institute of Computer Science and Institute for

More information

KUDELSKI SECURITY DEFENSE. www.kudelskisecurity.com

KUDELSKI SECURITY DEFENSE. www.kudelskisecurity.com KUDELSKI SECURITY DEFENSE Cyber Defense Center connection for remote information exchange with local monitoring consoles Satellite link Secure Data Sharing, a data-centric solution protecting documents

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

The Defence Strategy of the Slovak Republic

The Defence Strategy of the Slovak Republic The Defence Strategy of the Slovak Republic approved by the National Council of the Slovak Republic 23 September 2005 TABLE OF CONTENTS Introduction I II III IV V Slovak Republic in the Changing Security

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

MEMORANDUM OF UNDERSTANDING

MEMORANDUM OF UNDERSTANDING MEMORANDUM OF UNDERSTANDING BETWEEN THE GOVERNMENT OF THE KINGDOM OF SWEDEN AND THE MINISTRY OF DEFENCE OF THE KINGDOM OF DENMARK ON THE ENHANCED DEFENCE COOPERATION WITHIN THE AIR AND MARITIME DOMAIN

More information

REPORT ON THE IMPLEMENTATION OF THE HAGUE CONVENTION

REPORT ON THE IMPLEMENTATION OF THE HAGUE CONVENTION REPORT ON THE IMPLEMENTATION OF THE HAGUE CONVENTION Safeguarding of cultural property Article 3 The institution responsible for planning the protection of cultural heritage in wartime and state of emergency

More information

Cybercrimes: A Multidisciplinary Analysis

Cybercrimes: A Multidisciplinary Analysis Sumit Ghosh Elliot Turrini Editors Cybercrimes: A Multidisciplinary Analysis fyj Springer Part I Introducing Cybercrimes 1 A Pragmatic, Experiential Definition of Computer Crimes 3 1.1 Introducing Computer

More information

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU

More information

A Detailed Strategy for Managing Corporation Cyber War Security

A Detailed Strategy for Managing Corporation Cyber War Security A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait alahmed.w@gust.edu.kw ABSTRACT Modern corporations

More information

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November

More information

MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN)

MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN) MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN) Brief presentation of the program: The training covers specialized courses in sciences for risk, geopolitics and security, environmental and

More information

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS CYBER SECURITY WITHIN THE GLOBALIZATION PROCESS Milan PODHOREC University of Defence, Faculty of Economics and Management, Brno, Czech Republic The contribution focuses on the issue regarding security

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE

More information

Active Engagement, Modern Defence

Active Engagement, Modern Defence Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,

More information

Cyber defence in the EU Preparing for cyber warfare?

Cyber defence in the EU Preparing for cyber warfare? Preparing for cyber warfare? SUMMARY In recent years, cyber attacks on a serious scale have become a matter of concern to states, due to the threat they can pose to national security, but also a potential

More information

Confidence-building and international agreement in cybersecurity

Confidence-building and international agreement in cybersecurity Confidence-building and international agreement in cybersecurity James Andrew Lewis The global digital network has become the backbone of the world economy and a significant new venue for attack, but there

More information

Offensive capabilities

Offensive capabilities Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and

More information

F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations

F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations Brussels, 24 March 2014 140324/01 F A C T S H E E T EU-US Summit (Brussels, 26 March 2014) and EU-US relations The Leaders of the European Union and the United States of America will meet on 26 March 2014

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

GPSG Working Paper #07

GPSG Working Paper #07 GPSG Working Paper #07 Cyber-Security and the Law of War: The Legal and Ethical Aspects of Cyber-Conflict Dr. Andrew Liaropoulos Lecturer in International Relations and Strategy Department of International

More information

EUROPEAN CYBERSECURITY FORUM

EUROPEAN CYBERSECURITY FORUM EUROPEAN CYBERSECURITY FORUM The 2nd Annual Public Policy Conference dedicated to strategic aspects of cybersecurity 26-27 SEPTEMBER 2016 - KRAKÓW, POLAND - VENUE: ICE Kraków Congress Centre CONFERENCE

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

BUILDING DESIGN FOR HOMELAND SECURITY. Unit I Building Design for Homeland Security

BUILDING DESIGN FOR HOMELAND SECURITY. Unit I Building Design for Homeland Security BUILDING DESIGN FOR HOMELAND SECURITY Unit I Building Design for Homeland Security Participant Introductions Name Affiliation Area of Concentration BUILDING DESIGN FOR HOMELAND SECURITY Unit I-2 Course

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

MINISTRY OF NATIONAL DEFENCE BUDGETARY DEPARTMENT. BASIC INFORMATION ON THE MoND BUDGET FOR 2016

MINISTRY OF NATIONAL DEFENCE BUDGETARY DEPARTMENT. BASIC INFORMATION ON THE MoND BUDGET FOR 2016 MINISTRY OF NATIONAL DEFENCE BUDGETARY DEPARTMENT BASIC INFORMATION ON THE MoND BUDGET FOR 2016 Warsaw, February 2016 Basic Macroeconomic Indicators 2016 National budget 2016 Defence budget 2016 2,00%

More information

CYBERSECURITY INDEX OF INDICES

CYBERSECURITY INDEX OF INDICES Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration

More information

ACTIVE ENGAGEMENT IN COOPERATIVE SECURITY: A MORE EFFICIENT AND FLEXIBLE PARTNERSHIP POLICY

ACTIVE ENGAGEMENT IN COOPERATIVE SECURITY: A MORE EFFICIENT AND FLEXIBLE PARTNERSHIP POLICY I. Introduction ACTIVE ENGAGEMENT IN COOPERATIVE SECURITY: A MORE EFFICIENT AND FLEXIBLE PARTNERSHIP POLICY 1. Over the past two decades, NATO has reached out to partners to help build cooperative security

More information

Foreign Affairs and National Security

Foreign Affairs and National Security Foreign Affairs and National Security Objectives: TLW understand and explain the following questions as it relates to the Foreign affairs of the American Government What is foreign policy? What is the

More information

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate

More information

Obama s Cybersecurity Plan

Obama s Cybersecurity Plan SECURITY TECHNOLOGY POLICY PAPERS SERIES 1 Spring 10 Obama s Cybersecurity Plan Marianne STONE Geest-MSH - Paris Sciences Po Paris Columbia University, School of International and Public Affairs New York

More information

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,

More information

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace , pp.137-146 http://dx.doi.org/10.14257/ijseia.2014.8.9.11 Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace Jung ho Eom Military Studies, Daejeon University, 62 Daehakro,

More information

1 FOCUS Foresight Security Scenarios

1 FOCUS Foresight Security Scenarios New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military

More information

Is NATO Ready to Cross the Rubicon on Cyber Defence?

Is NATO Ready to Cross the Rubicon on Cyber Defence? Tallinn, June 2016 Cyber Policy Brief Is NATO Ready to Cross the Rubicon on Cyber Defence? Matthijs Veenendaal Kadri Kaska Pascal Brangetto This publication is a product of the NATO Cooperative Cyber Defence

More information

Hybrid-War and Critical Energy Infrastructure: the Ukrianian Conflict Case-Study

Hybrid-War and Critical Energy Infrastructure: the Ukrianian Conflict Case-Study Hybrid-War and Critical Energy Infrastructure: the Ukrianian Conflict Case-Study Study Ukraine is a polygon to investigate contemporary threats to infrastructure Study is on military/terrorist threat on

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP

More information

Jan van den Berg. Delft University of Technology. Faculty of Technology, Policy and Management, section of ICT

Jan van den Berg. Delft University of Technology. Faculty of Technology, Policy and Management, section of ICT 1 From From information information security security to cyber cyber warfare: warfare: some some paradigm paradigm shifts shifts and and research research challenges challenges Jan van den Berg Delft University

More information

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence ARI ARI 26/2013 (Translated from Spanish) 17 September 2013 Cyber cells: a tool for national cyber security and cyber defence Thiber Theme 1 Cyber cells are effective tools that enable countries to operate,

More information

CYBERSPACE AS BATTLESPACE Black Hat webcast, Oct 9, 2014

CYBERSPACE AS BATTLESPACE Black Hat webcast, Oct 9, 2014 CYBERSPACE AS BATTLESPACE Black Hat webcast, Oct 9, 2014 Kenneth Geers 2501 Introduction: mission creep The Internet is still a baby. But the cyberspace around it the effective connection between computers,

More information

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace

More information

MASTER OF PROFESSIONAL STUDIES

MASTER OF PROFESSIONAL STUDIES MASTER OF PROFESSIONAL STUDIES IN THE FIELD OF SECURITY AND SAFETY LEADERSHIP OFFERED BY THE GEORGE WASHINGTON UNIVERSITY COLLEGE OF PROFESSIONAL STUDIES CLASSES HELD AT: THE GW GRADUATE EDUCATION CENTER,

More information

New Battlegrounds: The Future of Cyber Security and Cyber Warfare

New Battlegrounds: The Future of Cyber Security and Cyber Warfare New Battlegrounds: The Future of Cyber Security and Cyber Warfare Information and communications technologies are part of daily life. They are helping to revolutionize health and education, transform the

More information

Defense Budget Programs That Provide Assistance To Foreign Countries

Defense Budget Programs That Provide Assistance To Foreign Countries Defense Budget Programs That Provide Assistance To Foreign Countries 1. Accounting for Missing United States Government Personnel First legislated in 2008. $1,000,000 Section 408 of Title 10, U.S. Code

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

MILITARY AND POLITICAL ASPECTS OF INTERNATIONAL CYBER SECURITY: ISSUES OF INTERNATIONAL LEGAL REGULATION

MILITARY AND POLITICAL ASPECTS OF INTERNATIONAL CYBER SECURITY: ISSUES OF INTERNATIONAL LEGAL REGULATION EUROPEAN POLITICAL AND LAW DISCOURSE Volume 2 Issue 1 2015 Olha Grytsun Taras Shevchenko National University of Kyiv MILITARY AND POLITICAL ASPECTS OF INTERNATIONAL CYBER SECURITY: ISSUES OF INTERNATIONAL

More information

Cybersecurity Competence Building Trends

Cybersecurity Competence Building Trends Cybersecurity Competence Building Trends GFCE, June 2016 Vladimir Radunović DiploFoundation Context Challenges Threats to institutions, business, CI Multidisciplinary area (technology, law, diplomacy,

More information

ECONOMICS OF PEACE AND SECURITY Global and Regional Security Alliances - Carlos Seiglie and Sylvie Matelly UNESCO EOLSS

ECONOMICS OF PEACE AND SECURITY Global and Regional Security Alliances - Carlos Seiglie and Sylvie Matelly UNESCO EOLSS GLOBAL AND REGIONAL SECURITY ALLIANCES Carlos Seiglie Rutgers University, NJ, USA Sylvie Matelly Université Pierre Mendes France, Grenoble, France Keywords: collective action, public good, regional security

More information

Contents. Acknowledgements Abbreviations List of Tables and Figures Tables of Cases Table of Statutes

Contents. Acknowledgements Abbreviations List of Tables and Figures Tables of Cases Table of Statutes Contents Acknowledgements Abbreviations List of Tables and Figures Tables of Cases Table of Statutes v xiii xv xvii xxxi 1 Introduction 1 I. EU Public Liability Law and its Convergence 1 a. Liability of

More information

TRANSFORMING PHILIPPINE DEFENSE AND MILITARY EDUCATION TO COPE WITH FUTURE CHALLENGES

TRANSFORMING PHILIPPINE DEFENSE AND MILITARY EDUCATION TO COPE WITH FUTURE CHALLENGES 11 th ASEAN Regional Forum Heads of Defense Universities/Colleges/Institutions Meeting 9-11 October 2007 Canberra, Australia TRANSFORMING PHILIPPINE DEFENSE AND MILITARY EDUCATION TO COPE WITH FUTURE CHALLENGES

More information

Cyberthreats. Al-Qaeda and Nuclear Weapons. Defence Against Terrorism Review

Cyberthreats. Al-Qaeda and Nuclear Weapons. Defence Against Terrorism Review Defence Against Terrorism Review Defence Against Terrorism Review Vol. 2, No. 2, Fall 2009, Vol.3, Copyright N o. 2, FCOE-DAT all 2010, pp. 13-22 Copyright ISSN: 1307-9190 ISSN: 1307-9190 Cyberattacks

More information

Legal Issues / Estonia Cyber Incident

Legal Issues / Estonia Cyber Incident Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia

More information

Preface to the Fourth Edition

Preface to the Fourth Edition The frequency of new editions of this book is indicative of the rapid and tremendous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through

More information

For twenty years, members of the United States national security

For twenty years, members of the United States national security Preparing for Netwars Repurposing Cyber Command Frank J. Cilluffo and Joseph R. Clark 2013 Frank J. Cilluffo and Joseph R. Clark Abstract: Recent debates about the organizational relationship between Cyber

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

The Cyber Index. International Security Trends and Realities

The Cyber Index. International Security Trends and Realities UNIDIR The Cyber Index Index International Security Trends and Realities The Cyber Index is intended to serve as a snapshot of current cybersecurity activities at the national, regional, and international

More information

Research Note Engaging in Cyber Warfare

Research Note Engaging in Cyber Warfare Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines

More information

A New Obstacle For Cyberinsurance Coverage

A New Obstacle For Cyberinsurance Coverage Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com A New Obstacle For Cyberinsurance Coverage Law360,

More information