Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage



Similar documents
The Impact of Terrorism on Insurance

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

Australia s counter-terrorism laws

NATIONAL TERRORISM RISK INSURANCE PROGRAMMES OF OECD COUNTRIES WITH GOVERNMENT PARTICIPATION MAIN FEATURES

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Introducing Catastrophe Risk man-made hazards*

Promoting a cyber security culture and demand compliance with minimum security standards;

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Survey of Cyber Security Frameworks

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Harmful Interference into Satellite Telecommunications by Cyber Attack

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Making Sense of Cyber Insurance: A Guide for SMEs

NATO & Cyber Conflict: Background & Challenges

UNITED KINGDOM TERRORISM RISK INSURANCE PROGRAMME

Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

CYBER SECURITY FOUNDATION - OUTLINE

How To Cover A Data Breach In The European Market

Audit summary of Security of Infrastructure Control Systems for Water and Transport

Cybersecurity. Canisius College

How do we Police Cyber Crime?

CYBER SECURITY IN INDIA

USING CRIMINAL AND CIVIL LAW TO DEAL WITH ORGANISED RACIST ACTIVITY

ACE European Risk Briefing 2012

Trends and Tactics in Cyber- Terrorism

COMMUNITY RESIDENTIAL POLICY SCHEDULE

Cyber security: A growing threat to the energy sector

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

Cybersecurity Strategy of the Republic of Cyprus

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

Project 2020: Preparing Your Organization for Future Cyber Threats Today

Cybercrime in the Automotive Industry How to improve your business cyber security

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

What legal aspects are needed to address specific ICT related issues?

Cyber Insurance Presentation

INSURING TERRORISM RISK IN INDIA

REPUBLIC OF POLAND Ministry of Administration and Digitisation, Internal Security Agency CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND

Assessment of the Terror Threat to Denmark

Cyber Security Strategy

Current Threat to the U.S. from Cyber Espionage & Cyberterrorism

Cybersecurity in the Commonwealth: Setting the Stage

Australia s proposed accession to the Council of Europe Convention on Cybercrime

The EU s approach to Cyber Security and Defence

Insurance implications for Cyber Threats

Cyber Crime Research. Presentation by the Australian Institute of Criminology. Dr Russell G Smith Principal Criminologist

Vulnerability Assessment & Compliance

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Achieving business resilience in a volatile political environment through Terrorism and Political Violence insurance

CYBER SECURITY THREATS AND RESPONSES

National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them

Nuclear Security Requires Cyber Security

Market Bulletin FROM:

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Excerpts of the Criminal Code (StGB) of Liechtenstein

2 Gabi Siboni, 1 Senior Research Fellow and Director,

RUAG Cyber Security. More security for your data

UN Emergency Summit on Cyber Security Topic Abstract

Hole In One Policy Wording

Global Energy Practice CYBER GAP INSURANCE CYBER RISK: FILLING THE COVERAGE GAP

ASEAN s Cooperation on Cybersecurity and against Cybercrime

EY Cyber Security Hacktics Center of Excellence

Women in an Age of Cyber Wars: Risks, Management and Opportunity

INDIA TERRORISM RISK INSURANCE PROGRAMME

Cyber Security for audit committees

National Security Overview - Australia

Mass Marketing Fraud Affecting Canadian Businesses

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Criminal Justice Courses

CRIME PROFILE SERIES ORGANISED CRIME IN PROFESSIONAL SPORT

Collateral Effects of Cyberwar

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Honourable members of the National Parliaments of the EU member states and candidate countries,

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

Transcription:

Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

Cyber Terrorism? 2013 cyber attacks on the websites of media companies such as the New York Times and Twitter were classed as cyber terrorism 2014 cyber attack on Sony Pictures was allegedly a form of state sponsored cyber terrorism Cyber terrorism can be classified into three distinct clusters, but perpetrated by a number of different actors 2

Cyber Terrorism? (cont.) Destructive Destructive cyber militancy Manipulate, Corrupt, Damage Cluster 3 Methods Disruptive Disruptive cyber militancy Expose, Deface, Deny Cluster 2 Enabling Enabling cyber militancy Recuit, Train, Radicalise, Plan, Finance, Incite, Communicate Cluster 1 Cognitive Virtual Physical Targets Figure 1: Clusters of cyber terrorism (Defining Cyberterrorism: Capturing a broad range of Activities in Cyberspace, Jonalan Brickey, CTC Sentinel, August 2012, VOL 5, Issue 8) 3

Cyber Terrorism? (cont.) Jonalan Brickey s definition of cyber terrorism is: the use of cyber capabilities to conduct enabling, disruptive, and destructive militant operations in cyberspace to create and exploit fear through violence or the threat of violence in the pursuit of political change This covers all examples that have come to light but does not impact on the legal definition of terrorism 4

Terrorism in Australian Law The action must cause harm/serious risk to people, or serious damage to property or serious interference, disruption or destruction There must be the intent of advancing a political, religious or ideological cause with an intent to coerce or influence by intimidation It must not be advocacy, protest or dissent and be unintended to cause harm/serious risk 5

Terrorism in Australian Law (contd.) Obvious overlaps between Brickey s definition of cyber terrorism and the Australian Legal definition of terrorism exist Clusters 2 and 3 (disruptive and destructive) would generally fall into this definition; cluster 1 may not As not all clusters of cyber terrorism would be considered terrorism under Australian Law this may affect insurance coverage 6

Australia s Growing Risk Australia remains susceptible to the threat of cyber terrorist attacks PwC survey: Annual global cost of US$375-$575 billion 2013-2014 saw a 41% increase in incidents in Europe, 11% in North America and 5% in Asia Pacific EY Global Information Security Survey 2014 shows similar trends 7

Evolution: Cyber Turns Physical Cyber attacks with catastrophic physical property and infrastructure losses have increased Incidents: 2008 Turkish crude oil pipeline explosion 2014 German steel mill blast furnace Governments, businesses, criminals and terrorists are locked in a race to protect, damage or exploit resources in cyberspace 8

General Property Insurance Market s Response Standard Mark IV and Mark V ISR policies contain the below section: PERILS EXCLUSIONS 7. Physical loss, destruction or damage occasioned by or happening through: (a) (ii) Access by any person(s) other than the Insured or the Insured s employee(s) to the Insured s computer system via data communication media that terminate in the Insured s computer system. This exclusion would likely prevent coverage for cyber-attack scenarios causing physical loss, such as the Turkish pipeline blast or German steel furnace shutdown If it was declared as a terrorism incident the TI Act would have no affect on the clause, as it is not a terrorism clause, and the scheme would not come into effect 9

General Property Insurance Market s Other industry examples: Response (contd.) EXAMPLE INSURER A - BUSINESS PACKAGE - EXCLUSIONS We will not pay You under this section for physical loss, destruction or Damage caused by, or as a consequence of: 24. Computer access - The gaining of access by any person other than You or Your employees to Your computer system via data communication media. EXAMPLE INSURER B - BUSINESS PROPERTY - Policy section exclusions 2. We will not cover You for loss or damage caused by: r) the gaining of unauthorised access to Your computer via any communication system by any person other than You or Your directors, partners, Employees, officers or any other person who has an interest in the property. These exclusions would respond in much the same way as those in the standard Mark IV and Mark V ISR policies 10

Terrorism Insurance Scheme s Response As it currently stands the response may be determined on a policy by policy basis, dependant on the exclusions in the individual policies The scheme and ARPC were set up in response to the perceived market failure following the September 11 terrorist attacks and were designed primarily to meet that market failure The coverage and operation of the ARPC scheme is limited primarily by the Terrorism Insurance Act 2003 and the Terrorism Insurance Regulations 2003 which contain 40 exclusions 11

Exclusion of Computer Crime The ARPC scheme covers eligible policies on eligible property, if a terrorism incident is declared by the relevant government minister, by striking out terrorism exclusion clauses The regulations provide a number of exclusions to determine this eligibility (most notably wars, nuclear explosions, attacks on ships and aircraft) Exclusion 32 of Schedule 1 of the regulations states: 32 A contract of insurance to the extent that it provides cover for loss arising from computer crime. 12

Computer Crime? Extract from Federal Attorney Generals Department website: In Australia, the term 'cybercrime' is used to describe both: crimes directed at computers or other information communications technologies (such as hacking and denial of service attacks) crimes where computers or ICTs are an integral part of an offence. Cybercrime Act 2001 introduced parts 10.6 and 10.7 into the Australian Criminal Code to deal with telecommunications and computer offences Therefore any loss due to an act of Cyber Terrorism will likely be defined as a computer crime and be excluded from coverage under the scheme 13

Interactions: Cybercrime, ICT Use, Terrorism and Terrorism Scheme 14

15

Cyber Insurance Policies Primarily aim to cover intangibles (such as electronic data), business interruption and response costs Coverage detail varies considerably and physical damage to tangible property isn t generally addressed 2014 Partner Re Article reported that: Despite the vulnerability and significant loss potential, cyber insurance cover is almost totally absent for physical damage and limited for business interruption If a Cyber policy was deemed an eligible policy for the ARPC scheme (due to an eligible property and loss type combination) the computer crime exclusion would likely remove any claimable loss 16

Global Terrorism Pool Responses Major global terrorism pools have yet to expand their coverage to include cyber terrorism Whilst cyber risk is an emerging market, no global terrorism pools expressly provide cover 17

Conclusion Cyber-attacks are generally increasing globally ARPC terrorism reinsurance scheme does not respond to any terrorism loss arising from computer crime and, like other global schemes, no express cover for cyber terrorism exists There is a definitive gap in the property insurance market in situations where a cyber terrorist attack may inflict major physical damage by primarily cyber means 18

Questions Please direct questions or comments to: Ph: 02 8223 6777 or Email: enquiries@arpc.gov.au 19