1 Cyberspace and Security

Similar documents
Trends Concerning Cyberspace

Confrontation or Collaboration?

Research Note Engaging in Cyber Warfare

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

The UK cyber security strategy: Landscape review. Cross-government

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

The main object of my research is :

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

James R. Clapper. Director of National Intelligence

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

United States Cyber Security in the 21st Century

Preventing and Defending Against Cyber Attacks June 2011

Secure Data Centers For America A SOLUTION TO

An Overview of Large US Military Cybersecurity Organizations

Cyber Diplomacy A New Component of Foreign Policy 6

Preventing and Defending Against Cyber Attacks November 2010

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

The Comprehensive National Cybersecurity Initiative

Cybersecurity: Authoritative Reports and Resources

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Foreign Affairs and National Security

Department of Defense DIRECTIVE

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

What legal aspects are needed to address specific ICT related issues?

Cyber Security Strategy

Middle Class Economics: Cybersecurity Updated August 7, 2015

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

Threats to Local Governments and What You Can Do to Mitigate the Risks

Cybersecurity: Authoritative Reports and Resources

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October Author note

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

Cyber Security Strategy

Espionage and Intelligence. Debra A. Miller, Book Editor

Cybersecurity: Authoritative Reports and Resources

How To Protect Yourself From Cyber Crime

ARI 26/2013 (Translated from Spanish) 17 September Cyber cells: a tool for national cyber security and cyber defence

Viewpoint: Implementing Japan s New Cyber Security Strategy*

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

WRITTEN TESTIMONY OF

Mustafa AYDINLI NLO CYBER SECURITY ADVISOR

CyberSecurity Solutions. Delivering

U. S. Attorney Office Northern District of Texas March 2013

Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks

Public Private Partnerships and National Input to International Cyber Security

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Foundations of Computer Security

China s Economic Espionage

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Cybersecurity: Authoritative Reports and Resources

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

For More Information

Offensive capabilities

Action Plan for Canada s Cyber Security Strategy

FINAL // FOR OFFICIAL USE ONLY. William Noonan

Hybrid Warfare & Cyber Defence

S. ll IN THE SENATE OF THE UNITED STATES

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge

ASIA: THE CYBERSECURITY BATTLEGROUND

Harmful Interference into Satellite Telecommunications by Cyber Attack

THE STRATEGIC POLICING REQUIREMENT. July 2012

Legal Issues / Estonia Cyber Incident

How To Write A National Cybersecurity Act

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

National Cyber Security Strategies: United States

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership

Cyber Security Strategy for Germany

Cyber Security Strategy of Georgia

DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE

Transcription:

1 Cyberspace and Security 1 Paper by Deputy Secretary of Defense William J. Lynn, Defending a New Domain: The Pentagon s Cyber Strategy, Foreign Affairs (Sep Oct 2010). In addition, an annual report by the U.S. China Economic and Security Review Commission (November 2009), a bipartisan consultative body of the U.S. Congress, indicated the possibility for the People s Liberation Army to execute computer network operations on enemy governments or military information systems during the initial stages of a conflict. 2 In a February 2011 speech, Deputy Secretary of Defense William J. Lynn pointed out cases of intrusion by foreign intelligence agencies, including the extraction of military plans and weapons systems designs from governmental networks. Moreover, the United States Department of Defense report Military and Security Developments Involving the People s Republic of China (August 2010) indicated that numerous computer systems throughout the world, including those of the United States, were the target of intrusions and information theft that originated in China, and there is the possibility that these attacks target intelligence on strategic and military facilities. 28 Section 1 Trends Concerning Cyberspace

Part I Security Environment Surrounding Japan 2 Threats in Cyberspace Chapter 1 Issues in the International Community 3 4 5 6 7 8 An annual report released by the U.S. China Economic and Security Review Commission (November 2010) indicated that during 2009 there were a total of 71,661 counts of malicious cyber activity carried out on the United States Department of Defense (an approximately 31.2% increase on the previous year). In addition, in October 2010, Australia s Defence Signals Directorate (DSD) announced that the number of monthly attacks received during 2010 on military networks had reached 700, a 3.5-fold increase on the previous year. Director of National Intelligence (DNI) Annual Threat Assessment (February 2009). The report assesses that many countries including Russia and China are capable of disrupting information infrastructure in the United States by cyber attacks. Aforementioned paper by Deputy Secretary of Defense William J. Lynn. An infected removable memory device was inserted into a computer at a U.S. base in the Middle East, and the virus, placed there by a foreign intelligence agency, was uploaded to the network of the Central Command. This virus was undetected and spread over systems that handle both classified and unclassified information, and data could have been transferred to servers under foreign control. Speeches by Chairman of the Joint Chiefs of Staff Admiral Mike Mullen (July 8, 2009) and Deputy Secretary of Defense William J. Lynn (October 1, 2009). In April 2011, the Korean National Police Agency (ROK) reported that the cyber attack on the ROK s Government that occurred in March 2011 was carried out by the same source as the cyber attack of July 2009. A report released by the United States Director of National Intelligence (DNI), Worldwide Threat Assessment (February 2011), indicated that in April 2010 a Chinese Internet provider posted inaccurate information which caused a massive amount of information to be redirected through the networks in China for 17 minutes, affecting the traffic to and from websites of the U.S. Government and military. March 2011 testimony of Department of Homeland Security, then Deputy Under Secretary Reitinger before the U.S. House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Section 1 Trends Concerning Cyberspace 29

3 Efforts against Cyber Attacks 1 United States 9 In addition to the efforts outlined in the main text that have been implemented within the defense structures of each country, the following initiative has been carried out in China. The spokesperson of the Ministry of National Defense of the People s Republic of China announced at the regular press conference held on May 25, 2011, that a Network Blue Army has been established within the People s Liberation Army in order to better safeguard the network security of armed forces. 10 For example, British Foreign Secretary Hague delivered a policy speech at the annual Munich Security Conference (MSC) held in February 2011, in which he set out the following seven principles: (1) the need for governments to act proportionately in cyberspace and in accordance with national and international law; (2) the need for everyone to have the ability in terms of skills, technology, confidence, and opportunity to access cyberspace; (3) the need for users of cyberspace to show tolerance and respect for diversity of language, culture, and ideas; (4) ensuring that cyberspace remains open to innovation and the free flow of ideas, information, and expression; (5) the need to respect individual rights of privacy and to provide proper protection to intellectual property; (6) the need to work collectively to tackle the threat from criminals acting online; and (7) the promotion of a competitive environment which ensures a fair return on investment in network, services, and content. In the International Strategy for Cyberspace released in May 2011, the United States outlined the following principles and norms in cyberspace: (1) upholding fundamental freedoms; (2) respect for property; (3) valuing privacy; (4) protection from crime; (5) right of self-defense; (6) global interoperability; (7) network stability; (8) reliable access; (9) multi-stakeholder Internet governance; and (10) cybersecurity due diligence. 30 Section 1 Trends Concerning Cyberspace

3 United Kingdom 2 NATO 11 Specifically, the International Strategy for Cyberspace states that the United States will continue to work with the militaries and civilian counterparts of their allies and partners to expand situational awareness and shared warning systems, enhance the ability to work together in times of peace and crisis, and develop the means and method of collective self-defense in cyberspace. 12 Aforementioned paper by Deputy Secretary of Defense William J. Lynn. 13 In a 15 February 2011 speech, Deputy Secretary of Defense William J. Lynn explained that, It is not adequate to rely on passive defenses that employ only after-the-fact detection and notification. Active defenses operate at network speed, using sensors, software, and signatures derived from intelligence to detect and stop malicious code before it succeeds. The Department of Homeland Security is currently developing Einstein 3, an intrusion prevention system that detects and blocks computer viruses before an intrusion occurs, with technical cooperation from the National Security Agency (NSA). 14 This paper states that ROE will first have to assist in distinguishing between the exploits of a mere hacker, criminal activity, espionage, and an attack on the United States. They will then have to determine what action is necessary, appropriate, proportional, and justified in each particular case based on the laws that govern action in times of war and peace. 15 OCS and CSOC comprise temporary transferred staff from related ministries and agencies and are inter-governmental organizations. Section 1 Trends Concerning Cyberspace 31

4 Australia 5 Republic of Korea 16 Also, CERT Australia, which was newly established within the Department of Justice based on the Cyber Security Strategy, provides private sector businesses with information on threats and assists in handling attacks. 17 Under the Director of the National Intelligence Service, the National Cybersecurity Strategy Council has been established to deliberate on important issues, including: 1) establishing and improving a national cybersecurity structure; 2) coordinating related policies and roles among institutions; and 3) deliberating measures and policies related to presidential orders. Moreover, the Defense Information Warfare Response Center of the Defense Security Command is in charge of protecting military networks, while the National Cyber Security Center (NCSC) of the National Intelligence Service oversees networks of the government and public institutions, and the Korea Internet Security Center (KISC) of the Korea Communications Commission oversees private sector networks. 18 In April 2011, the Ministry of National Defense announced its intentions to transfer the Cyber Command, set under the Defense Intelligence Headquarters, to a unit under the direct command of the Ministry of National Defense. 32 Section 1 Trends Concerning Cyberspace