Hybrid Warfare & Cyber Defence



Similar documents
The EU s approach to Cyber Security and Defence

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

UN Emergency Summit on Cyber Security Topic Abstract

NATO & Cyber Conflict: Background & Challenges

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Cyber Risks and Insurance Solutions Malaysia, November 2013

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Harmful Interference into Satellite Telecommunications by Cyber Attack

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Industry. Cyber Security. Information Sharing at the Technical Level. Guidelines

Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Cyber Security Strategy for Defence

Raimonds Rublovskis Latvia

Cyberspace Strategic Impact Social Risk Management. Cyber Security and Cyber Defence. Cyber Defense: NATO Vision

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Trends Concerning Cyberspace

California State University, Chico. Information Security Incident Management Plan

National Cyber Security Policy -2013

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

What legal aspects are needed to address specific ICT related issues?

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

Legal Issues / Estonia Cyber Incident

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Active Engagement, Modern Defence

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

Long Term Defence Study

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

Cybersecurity Awareness. Part 1

NOTE NATO Missile defence

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Protecting Organizations from Cyber Attack

CYBER TERRORISM, AN INSTABILITY GLOBAL SOURCE

Identifying Cyber Risks and How they Impact Your Business

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Common Cyber Threats. Common cyber threats include:

Defensible Strategy To. Cyber Incident Response

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October Author note

Cyber Security Solutions:

Business Continuity for Cyber Threat

Gregg Gerber. Strategic Engagement, Emerging Markets

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION

CYBER SECURITY IN INDIA

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

Guidelines 1 on Information Technology Security

KUDELSKI SECURITY DEFENSE.

A Detailed Strategy for Managing Corporation Cyber War Security

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Cybersecurity for the C-Level

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cyber Adversary Characterization. Know thy enemy!

CYBERSPACE SECURITY CONTINUUM

Data Security Incident Response Plan. [Insert Organization Name]

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Promoting Network Security (A Service Provider Perspective)

Cyber security and critical national infrastructure

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

NATO Organization & Structure

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Physical Security of Remote Pilot Stations and Aircrafts (when On Ground)

Middle Class Economics: Cybersecurity Updated August 7, 2015

Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

National Cyber Crime Unit

7 Cs of WEB design - Customer Interface

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

INFORMATION SECURITY TESTING

NATIONAL DEFENSE AND SECURITY ECONOMICS

Cyber Security for audit committees

CYBER SECURITY IN INDIA'S COUNTER TERRORISM STRATEGY

GAO DEFENSE DEPARTMENT CYBER EFFORTS. DOD Faces Challenges In Its Cyber Activities. Report to Congressional Requesters

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

This post Deputizes for the Strategic and International Affairs Advisor (A-7) in his absence.

v. 03/03/2015 Page ii

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Unit 3 Cyber security

Information Technology Cyber Security Policy

Capabilities for Cybersecurity Resilience

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Beyond the Hype: Advanced Persistent Threats

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Transcription:

Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD

Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency conflicts, terrorism, cyber attacks Hybrid Warfare New and unfamiliar forms of warfare Cyber is a readily available tool for an adversary s tool kit Clausewitz: War is more than a true chameleon that slightly adapts its characteristics to the given cause Source: HYBRID WARFARE ASSESSMENT FOLLOW-ON TASKING FROM THE WALES SUMMIT, 7 Nov 2014 Hybrid Warfare, edited by Williamson Murray and Peter R. Mansoor, Cambridge University Press 2

Cyber Warfare vs. Hybrid Warfare Hybrid Warfare: Attacks on and from a variety of domains Land, Sea, Air, Cyber, InfoOps/StratComm Carried out by regular, irregular and clandestine forces More likely to be state sponsored More likely to be destructive in the physical and cyber realms Cyber Warfare: Attacks purely on and from the cyber domain Carried out by hackers, hactivists Could be state sponsored Could be non-destructive State-sponsored and Industrial-sponsored espionage 3

Russian Model for Cyber Defence Russian model for Cyber Defence differs from our own. Cyberspace as a subset of Information Warfare (IW) Information Troops within the Russian armed forces as Information Assurance and/or CyberOps Investment in Information Warfare troops, which actively participated during the Ukrainian crisis. Firepower of information attacks could be higher than that of conventional weapons Russian Military believe they must be prepared to effectively counter threats in cyberspace and to improve the level of protection of the relevant infrastructure 4

Defence is Always Behind Average Zero Day Exploit time-to-fix: ~230 days Online purchases for capabilities tend to be cheap and readily available Principal actors have significant resources Cyberwar in Ukraine Types of Attacks (Open Source Data) Symantec, 2012, FEYE, 2014, TREND Micro, 2012 5

What makes Cyber Attacks unique? Low cost of entry Difficulty in determining attribution of attack Easily available tools and expertise that can be bought or rented Cyber domain attack is easier than defence Differing national laws make catching and prosecuting cyber attackers very tough 6

Key Players NCIA (Technical Component) North Atlantic Council NATO HQ Committees Execution Decision Governance ACO (Military Component) NCI Agency (NCIRC) Supports prioritizes SHAPE NATO CIS Group Joint Force Command JFC Single Service Command SSC SSC Technical CD Service Provisioning Operational CD Planning 7

NATO Cyber Defence NATO primarily protects NATO s own networks Potential response to attacks in the cyber domain will be decided by NAC ACO response will be based on NAC authorization ACO works closely with NCIA during crises 8

ACO s Role in CD Consider Cyber in Operational Planning Conduct Operations in Cyber contested environments Maintain Cyber situational awareness Provide Cyber consequence management 9

NCI Agency und NCIRC Services NCIA = Technical Service Provider for NATO Cyber Defence - Prevention, Detection, Reaction and Recovery - Rapid Reaction Teams - Centralized Protection for Networks C2 arrangements SACEUR/NCI Agency guarantee effective support to operations Technical Achievements NCIRC FOC important step for NATO Cyber Defence Deployed CIS - Cyber Defence executed by NCISG (regional/ local) 10

Types of Incidents Lost or stolen computer hardware Computer facilitated fraud or hoax or scam Unauthorized access to, or modification of, system or data files Web site defacement Disruption or denial of service through electronic means Interception of electronically transmitted information Virus, worm or trojan infection Malicious probes or scams 11

ACO current work Consequence Management These are based on what-if scenarios How to continue military operations despite degradation in cyber capabilities Priority is to keep operations going, not to restore systems must have manual processes in place 12

ACO current work Situational Awareness over CD NCIRC Sensors Op Requirements/ Priorities Open Source Threat Intel Cyber Cyber SA SA Indications and Warnings IT Infrastructure IT Configuration, Incident and Vulnerability Management Safeguards 13

Summary Hybrid Warfare not new use of Cyber domain is new Cyber will likely play a role in future conflicts Adversaries will use the means (Cyber) where they have parity or an asymmetric advantage Establishing own protective measures is key NATO is actively working on CD integration into Alliance Ops & Missions 14

Questions? 15