White Paper: Cyber Hawk or Digital Dove



Similar documents
Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Option 1: Use the Might of the U.S. Military to End the Assad Regime

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Long Term Defence Study

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

SCADA/ICS Security in an.

Research Note Engaging in Cyber Warfare

United States Cyber Security in the 21st Century

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

How To Write A National Cybersecurity Act

The UK cyber security strategy: Landscape review. Cross-government

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

working group on foreign policy and grand strategy

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

Threat Intelligence: Friend of the Enterprise

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

The Nuclear Weapons Debate

Cybersecurity: Mission integration to protect your assets

Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative (302)

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

CARVER+Shock Vulnerability Assessment Tool

The National Counterintelligence Strategy of the United States

Cyber defence in the EU Preparing for cyber warfare?

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

Train Like You Will Fight

Offensive capabilities

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

A Detailed Strategy for Managing Corporation Cyber War Security

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Resources projected in the previous development plan and the reality

The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York

NATIONAL DEFENSE AND SECURITY ECONOMICS

Export Controls: What are they? Why do we care?

Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.

Public Private Partnerships and National Input to International Cyber Security

How To Make A Speech At The Cyber Defenders Discovery Camp

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Espionage and Intelligence. Debra A. Miller, Book Editor

Teaching Notes Crisis Guide: The Israeli-Palestinian Conflict

We have come a long way since the Goldwater-Nichols Act became law more than 2j years ago, we can go further. We will.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Top 5 Data Breaches in 2014

GAO INFORMATION SECURITY. Computer Attacks at Department of Defense Pose Increasing Risks

The Implication of TMD System in Japan to China s Security

MINISTRY OF NATIONAL DEFENCE BUDGETARY DEPARTMENT. BASIC INFORMATION ON THE MoND BUDGET FOR 2016

Designing Law Enforcement: Adaptive Strategies for the Complex Environment

CYBER WARFARE AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF SELECTED NATION STATES INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE

FUTURE NAVY VISION. The Royal Navy Today, Tomorrow and Towards Projecting maritime power to protect and promote our nation s interests

YPRES SALIENT Besieged city

CYBERSECURITY: DIVISION OF RESPONSIBILITY IN THE U.S. GOVERNMENT

Advanced Threat Protection with Dell SecureWorks Security Services

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012

Department of Defense INSTRUCTION

Risk Management in Practice A Guide for the Electric Sector

CYBER SECURITY Audit, Test & Compliance

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring

The Four-Step Guide to Understanding Cyber Risk

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

Understanding SCADA System Security Vulnerabilities

It's a MAD, MAD, MAD Cyber World

Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014

THE GREAT WAR and the Shaping of the 20th Century

IA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE

THE WHITE HOUSE Office of the Press Secretary. Annex to U.S. - Gulf Cooperation Council Camp David Joint Statement

AUSA Background Brief

An Interactive Planning Approach to Shaping U.S.-Russian Relations

Army Doctrine Update

Harvard Export Control Compliance Policy Statement

National Cyber Security Policy -2013

Challenges in Cybersecurity. Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard

CYBERSPACE SECURITY CONTINUUM

Predictive Cyber Defense A Strategic Thought Paper

Business Continuity for Cyber Threat

Cyber R &D Research Roundtable

Cybersecurity. Canisius College

Transcription:

White Paper: Cyber Hawk or Digital Dove Published By: SkillBridge, LLC September 18, 2013

Today s Modern Warfare With the recent debate over whether or not the United States should take military action in response to chemical weapons being used against innocent civilians in Syria, one thing has become certain - The American people at this point in time have little appetite for offensive minded, physical military engagement. Overwhelmingly, polls from every side of media show that this military action is unwelcome. Boots on the ground is the eventuality feared by both left and right wing opponents of a Syrian conflict. No boots on the ground is the promise our leaders make as they assure us that any military involvement will not put the men and women of our armed forces in the line of fire. However, one question that has not been asked is how the American public feels about a different kind of campaign one that does not involve soldiers on the front lines, but programmers using lines of code. What was once considered futuristic science fiction, Cyber warfare is now today s reality. Whether in the form of unmanned drones controlled by an operator thousands of miles away from a target, or viruses that travel that same distance in a nanosecond, like it or not, the cyber domain is the next war front. 2

To some this may still seem like an idea that is better left for the pages of a 5 cent comic book. In reality, short of a nuclear attack, cyber warfare can do far more damage in far less time than the unleashing of traditional military might. Attacks on a nation s communications systems, energy networks, food supply chain, and other critical infrastructure have the potential to do catastrophic damage beyond what many could ever comprehend. The severity of this threat can be underscored by the recent announcement of a new UK based think tank developed to study this very issue. Some of Britain s leading minds, including Lord Rees of Ludlow, past President of the Royal Society, Cambridge cosmologist Stephen Hawking, and Lord May of Oxford, a former government chief scientist, have launched The Cambridge Centre for the Study of Existential Risk. The Centre s effort includes the drafting of a Doomsday List. One of these primary catastrophic events believed to hold the potential to threaten civilization as we know it (i.e. to bring about the extinction of the human species) is a wide scale cyber attack. The bottom line, with the world s increased reliance on technologically interconnected networks, society as a whole is more vulnerable than ever. 3

For some nations Cyber warfare is an opportunity to level the playing field. The Syrian Electronic Army, while not identified as a direct vassal of the Syrian government, has wreaked havoc on Western targets, claiming credit for attacks against numerous Western news outlets and the US Marines recruitment website. Do we invest our energies and resources into offensive strategies in the cyber arena, or do we focus on building our defenses to keep the bad guy out? China is widely believed to be directly involved in attacks against multiple US companies, stealing vast sums of proprietary information and technology. Israel and the United State are commonly understood to have been behind the Stuxnet attack that targeted Iran s Natanz nuclear facility, a watershed moment in Cyber warfare as a proof of concept attack, vividly demonstrating SCADA command and control system vulnerability. As loosely affiliated rogue players and nation states alike proliferate their cyber warfare capabilities, a philosophical and strategic question for the United States becomes one of how to best approach the cyber front. Should the United States take an offensive of defensive posture as our enemies build their digital arsenal? Simply put, do we invest our energies and resources into offensive strategies in the cyber arena, or do we focus on building our defenses to keep the bad guy out? This is actually equal parts philosophical and strategic as it is a question of resource allocation. 4

How to Build Our New Army Whatever your preclusion may be, offensive or defensive minded, in the new world of cyber warfare, the real question we need to be asking ourselves is whether or not the United States is a Cyber Hawk or a Digital Dove. It is well documented and understood that the United States is vastly undermanned in terms of well trained cyber security talent. Whether one prescribes to an offensive or defensive posture in this next field of battle, one particular point is glaringly obvious - the United States needs more cyber soldiers. Sweeping measure must be implemented, both the private and public sectors, to address this growing cyber security personnel deficiency. The most effective way to begin the process is to build threat awareness at every level of every organization. When it comes to cyber security, the Not my job mentality is no longer sufficient. For the entire Cyber Security chain to be effective, it is imperative that Cyber Security become everyone s responsibility. In Cyber Security awareness training, the key to success is to quickly engage the participants, not only by demonstrating that the subject matter is pertinent, but that it directly applies to them. 5

This is accomplished by having the participants understand exactly what is at stake, both for them as individuals, as well as for the organization at large. For the general employee, this may mean that their job is on line. For the executive, the threat may be to the company s standing, reputation, and long term viability. For critical infrastructure organizations or government agencies, it may very well mean the safety and security of our nation s citizens. Regardless of whether or not you are in the offensive of defensive camp, one other thing is clear. For the United States to be well positioned for prosperous, long term viability in this new cyber world, we need to start proactively drafting and training Cyber Soldiers at every level. About the Author Steve Leventhal is a partner in SkillBridge, LLC, a leading provider of Cyber Security training solutions for government and private industry. SkillBridge s mission is to enhance enterprise security by providing targeted cyber security training that strengthens employee technical skills, processes, strategy, and user implementation in each distinct job role. www.skillbridgetraining.com 6