Of Citadels And Sentinels: State. Tim Legrand and Jeff Malone



Similar documents
E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

THE STRATEGIC POLICING REQUIREMENT. July 2012

Partnership for Cyber Resilience

The UK Cyber Security Strategy Protecting and promoting the UK in a digital world

Cyber Security Strategy of the United Kingdom

2 Gabi Siboni, 1 Senior Research Fellow and Director,

The UK cyber security strategy: Landscape review. Cross-government

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

Cyber Security Strategy of the United Kingdom

Cyber Security Strategy

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

National Surface Transport Security Strategy. September Transport and Infrastructure Senior Officials Committee. Transport Security Committee

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008

Control Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Audit summary of Security of Infrastructure Control Systems for Water and Transport

Cyber security the facts

EXPLANATORY MEMORANDUM & REGULATORY IMPACT ASSESSMENT FRAMEWORK

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Cyber Security Strategy of Georgia

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Cyber Security Strategy

Subject: Critical Infrastructure Identification, Prioritization, and Protection

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

National Cyber Crime Unit

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

National Security Overview - Australia

How To Manage Risk On A Scada System

Cyber Diplomacy A New Component of Foreign Policy 6

National Cyber Security Strategy

CESG Certification of Cyber Security Training Courses

Cyberspace Situational Awarness in National Security System

CYBER SECURITY STRATEGY AN OVERVIEW

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

STRATEGIC POLICING REQUIREMENT

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

REPORT. Next steps in cyber security

NEW ZEALAND S CYBER SECURITY STRATEGY

Cyber Security Strategy

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

Cyber Security - What Would a Breach Really Mean for your Business?

ARI 26/2013 (Translated from Spanish) 17 September Cyber cells: a tool for national cyber security and cyber defence

AGENDA ITEM: 5E STRATEGIC POLICING REQUIREMENT (SPR)

Canada s Cyber Security Strategy. For a stronger and more prosperous Canada

CYBERSECURITY RISK MANAGEMENT

Canada s Cyber Security Strategy. For a stronger and more prosperous Canada

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

National Cyber Security Policy -2013

Eiffing A telecommunications Industry - Current Scenario

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013


The Strategic Policing Requirement. March 2015

Cyber security Building confidence in your digital future

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

Oil and Gas Industry A Comprehensive Security Risk Management Approach.

National Cybersecurity & Communications Integration Center (NCCIC)

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

OUTCOME OF PROCEEDINGS

Feature. SCADA Cybersecurity Framework

Cybersecurity Strategy of the Republic of Cyprus

Cyber security Building confidence in your digital future

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The main object of my research is :

Lessons from Defending Cyberspace

HMG Security Policy Framework

Det talte ord gælder

The European Response to the rising Cyber Threat

Honourable members of the National Parliaments of the EU member states and candidate countries,

Emerging risks for internet users

Critical Infrastructure Security and Resilience

DHS, National Cyber Security Division Overview

Cyber Security Strategy

KUDELSKI SECURITY DEFENSE.

The Danish Cyber and Information Security Strategy

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach.

AT A HEARING ENTITLED THREATS TO THE HOMELAND

The FBI and the Internet

Business Plan 2012/13

How To Write An Article On The European Cyberspace Policy And Security Strategy

Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework

Cyber security and critical national infrastructure

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Cybersecurity and Privacy Hot Topics 2015

ESKISP Conduct security testing, under supervision

Cyber Security Strategy for Germany

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

Cybersecurity: Mission integration to protect your assets

Middle Class Economics: Cybersecurity Updated August 7, 2015

Good Practice Guide Security Incident Management

Homeland Security Presidential Directive/HSPD-5 1

TUSKEGEE CYBER SECURITY PATH FORWARD

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Transcription:

Of Citadels And Sentinels: State Strategies For Contesting Cyber-terror Tim Legrand and Jeff Malone

4 key issues and challenges 1. A cyber architecture designed for efficiency, not security 2. Private ownership/operation of critical infrastructure 3. Evolving and ambiguous threats 4. Changing use of and reliance on the cyber realm

1. A cyber architecture designed for efficiency, not security The internet and cyber-structure has evolved anarchically: Development of cyber realm occurred beyond the control of governments Digital architecture designed by private/social entities to increase efficiency, not security

2. Private ownership/operation of critical infrastructure Since the 1980s, under the purview of New Public Management, critical national infrastructure has gradually moved into private operation and ownership: UK: ~80% of CIP owned/operated privately US: ~85% to 90% of CIP owned/operated privately Australia ~ 80% of CIP owned/operated privately

3. Evolving and ambiguous threats The architecture of the cyber realm makes threat origins difficult to discern: State-sponsored/state-endorsed cyber attacks increasing in frequency Issue-motivate groups growing in technical sophistication Spectre of cyberterrorism growing with calls for cyber-jihad

4. Changing use of and reliance on the cyber realm Gradual transfer of data and digital services into the cloud Allows for greater efficiency and scalability Sovereign ownership/control of data Increased uptake of and access to the internet in Australia and worldwide National Broadband Network (NBN) and the digital economy

New Public Management Era of privatisation: 1980s Sell-off of critical infrastructure Coincided with development of networked interoperability Onus of responsibility now placed in corporate sphere cyberspace constructed anarchically: no central direction (yet highly resilient and redundant) characterized by increased push towards efficiency in data access/interchange

Critical infrastructure Sector Matrix Overlapping and interdependent critical infrastructure/essential services Communications (Data Communications, Fixed Voice Communications, Mail, Public Information, Wireless Communications), Emergency Services (Ambulance, Fire and Rescue, Coastguard, Police), Energy (Electricity, Natural Gas, Petroleum), Finance (Asset Management, Financial Facilities, Investment Banking, Markets, Retail Banking), Food (Produce, Import, Process, Distribute, Retail), Government and Public Services (Central, Regional, and Local Government; Parliaments and Legislatures; Justice; National Security), Public Safety (Chemical, Biological, Radiological, and Nuclear (CBRN) Terrorism; Crowds and Mass Events), Health (Health Care, Public Health), Transport (Air, Marine, Rail, Road), Water (Mains Water, Sewerage).

The ambiguous, yet gathering, storm All these different groups criminals, terrorists, foreign intelligence services and militaries are active today against the UK s interests in cyberspace. But with the borderless and anonymous nature of the internet, precise attribution is often difficult and the distinction between adversaries is increasingly blurred (UK Cyber Security Strategy, 2011)

The cyber-terror threat Cyberspace is already used by terrorists to spread propaganda, radicalise potential supporters, raise funds, communicate and plan. While terrorists can be expected to continue to favour high-profile physical attacks, the threat that they might also use cyberspace to facilitate or to mount attacks against the UK is growing. We judge that it will continue to do so, especially if terrorists believe that our national infrastructure may be vulnerable (UK Cyber Security Strategy)

Government strategy (UK) Strategic Defence and Security Review in 2010 the Government put in place a 650 million, four-year National Cyber Security Programme (NCSP). Managed Government by the Office of Cyber Security and Information Assurance in the Cabinet Office UK Cyber Security Strategy (2011)

Government strategy (AS) E-Security National Agenda(s) promulgated in 2001 and 2008 Cyber-Security Strategy 2009 Defence White Paper 2009 Critical Infrastructure Resilience Strategy 2010 Cyber White Paper 2012 (to be released)

Issues in delivering cyber protection The digital architecture on which we now rely was built to be efficient and interoperable. When the internet first started to grow, security was less of a consideration (UK Cyber Security Strategy) AMBIGUITY AND THE RISK-BASED APPROACH: We will therefore apply a riskbased approach to prioritising our response. LIMITED CAPACITY: Government cannot act alone. It must recognise the limits of its competence in cyberspace. Much of the infrastructure we need to protect is owned and operated by the private sector TRANSNATIONAL COLLABORATION: Threats are cross-border. Not all the infrastructure on which we rely is UK-based. So the UK cannot make all the progress it needs to on its own. We will seek partnership with other countries that share our views, and reach out where we can to those who do not CLOUD COMPUTING VECTOR: Increased reliance on cloud computing- rollout of online public services based in the cloud next year.

Public-private cyber security (UK) CPNI hosts Information Exchanges (general intel) and Warning Advice and Reporting Points (WARPs) (Specific) Also hosts: Combined Security Incident Response Team (CSIRTUK) which works with private sector to identify and manage cyber-threats GCHQ advises the public sector via The Communications-Electronics Security Group (CESG) which runs GovCertUK (emergency response) Single Intelligence Account, building cross cutting capabilities, including Information Assurance 59% of 650m: will strengthen and upgrade the sovereign capability the UK needs to confront the high-end threat

Public-private cyber security (AS) AGD hosts TISN arrangements, enables information sharing and development of good practice guidance (via sectoral groups, ITSEAG and SCADA COI). Also hosts CERT Australia assists CI owners with response DSD advises public sector via CSOC Hosted by DSD, but integrates activities undertaken by other agencies (AFP, ASIO)

Threat to the individual Direct threat to individuals: criminal groups (Actual) cyber-based sabotage on physical architecture (potential) causing physical harm Indirect threat: disruption of key public services and/or utilities (actual/potential) Exploitation: botnets (actual) Response: educating individuals on staying safe online

Threat to cyber-communities Direct threat: Indirect threat: government CT/IP legislation might restrict cybercommunity interaction and freedoms Exploitation: exploitation of cybercommunities to foment criminal behaviour (cf. Darknet) Response: transnational agreements?

Threat to commercial (non-ci) sector Threat to commercial (non-ci) sector Direct threat: industrial espionage/ip theft (actual), criminal groups (actual) Indirect threat: disruption to commercial systems/loss of customer confidence Exploitation of commercial sector? Response: development of TISN (Aus) & CSIRTUK, Cleanfeed (IP)

Threat to commercial (CI) sector Direct: attacks to SCADA systems/disabling of critical elements Indirect: exploitation of CI in commission of physical attack/loss of government contracts (for non-compliance) Responses: Sovereign responses, internatinonal agreements

Threat to the state Direct: state-sponsored attacks/cyber espionage/cyber warfare Indirect: loss of dominion/state revenues associated with diminished cyber-economy Exploitation of the state:? Response: sovereign institutions/transnational agreements

Policy dilemmas Reliance on a digital architecture, designed for efficiency, that is clearly not fit for purpose. Simultaneously diffuse and aggregated cyber-threats Much of critical infrastructure is overseas and thus beyond traditional power of the state to intervene/influence Tensions between public and private imperatives in cyber security Inherent difficulty in establishing metrics and collecting good data to evaluate effectiveness of policy