Legal Issues / Estonia Cyber Incident

Similar documents
Public Private Partnerships and National Input to International Cyber Security

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

Estonia 2007 Cyberattakcs

Cyber Security Strategy

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

REPORT ON THE IMPLEMENTATION OF THE HAGUE CONVENTION

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Lessons from Defending Cyberspace

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Harmful Interference into Satellite Telecommunications by Cyber Attack

External Supplier Control Requirements

Working with the FBI

CYBERSECURITY RISK MANAGEMENT

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

An Overview of Large US Military Cybersecurity Organizations

working group on foreign policy and grand strategy

NATO & Cyber Conflict: Background & Challenges

v. 03/03/2015 Page ii

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Federal Bureau of Investigation

Frameworks for International Cyber Security: The Cube, the Pyramid, and the Screen

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Cyber Space in Estonia: Greater Security, Greater Challenges

INFRAGARD.ORG. Portland FBI. Unclassified 1

Into the cybersecurity breach

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

CYBER SECURITY GUIDANCE

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber Diplomacy A New Component of Foreign Policy 6

The FBI and the Internet

CYBER SECURITY THREATS AND RESPONSES

Cybersecurity: What CFO s Need to Know

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Legislative Language

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Trends Concerning Cyberspace

Privacy and Security in Healthcare

Data Breach Response Planning: Laying the Right Foundation

BUSINESS CONTINUITY PLANNING

Managing internet security

Actions and Recommendations (A/R) Summary

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Critical Infrastructure Security and Resilience

Who s Doing the Hacking?

Bellevue University Cybersecurity Programs & Courses

Cyber Security and Critical Information Infrastructure

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Microsoft s cybersecurity commitment

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG

AUSTRACLEAR REGULATIONS Guidance Note 10

Thank you for your very kind introduction.

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

How To Protect The Internet From Natural Disasters

CYBER TERRORISM, AN INSTABILITY GLOBAL SOURCE

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

How To Write A National Cybersecurity Act

The Protection Mission a constant endeavor

Italy. EY s Global Information Security Survey 2013

Legislative Language

Cybersecurity: Mission integration to protect your assets

Hybrid Warfare & Cyber Defence

Mitigating and managing cyber risk: ten issues to consider

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Executive Cyber Security Training. One Day Training Course

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Counterintelligence Awareness Glossary

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT

National Cyber Security Policy -2013

A Cyber Security Integrator s perspective and approach

TCOM 562 Network Security Fundamentals

BIG DATA AND CYBERSECURITY:

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours

The main object of my research is :

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

State of Security Survey GLOBAL FINDINGS

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE ( ) ON THIRD PARTY RELATIONSHIPS

Transcription:

Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law

Legal Issues / Estonia Cyber Incident CIP law, security, & defense. Estonia incident 2007. International concerns. Frameworks for international cyber security.

Sample* Areas of CIP Law Security Regulations by Industry / Sector Information Sharing (Open Government, Privacy) Antitrust / Competition Criminal Law Tort Law Private Ordering (Contracts) National Security & Defense Law International Agreements / Law

National Security & Defense Balance of Government Interests Security / Defense Intelligence Law Enforcement Diplomacy / Foreign Affairs Emergency Powers Resource Allocation Control of Systems Prioritization of Restoration War Powers & LOAC Other: Use of the Military to Support Civil Authorities State Secrets Foreign Ownership (access & control)

Jurisdictions (Situational Awareness) MIL HS CORP LE DEPT. of ST. IC

International Concerns Laws and procedures are different per country Different threats Different vulnerabilities Different social groundworks International cooperation and coordination REQUIRED for CIP / cyber incident management.

Cooperative Cyber Defence COE The mission of the CCD COE is to enhance the Cooperative Cyber Defence Capability of NATO and NATO nations, thus improving the Alliance s interoperability in the field of cooperative cyber defence. BY Doctrine and Concept Development Awareness and Training Research and Development Analysis and Lessons Learned Consultation What the CCD COE is NOT: a 24/7 incident handling centre Computer Emergency Response Team www.ccdcoe.org

Estonia Incident 2007 DDoS attacks. Defacement of government websites. Spam. Online distribution of attack code and instructions. Online propaganda.

Estonia Incident Tension regarding Soviet-era memorial & graves of soldiers. Public debate over relocation. Early spring 2007: government decision to relocate.

Estonia Incident 26 27 April: physical incidents in Estonia.

Estonia Incident 2007 27 Apr 1 May: siege of embassy in Moscow / ambassador attacked. Cyber attacks and sanctions begin: DDoS, defacement, spam, online distribution of attack codes and instructions, online propaganda. Duma delegation to Tallinn demands government step down. Bridge / trade closure; business contracts suspended.

Estonia Incident 2007 30 Apr. 18 May: main attack (DDoS). govt websites banks critical routers at ISP level govt s Internet-based communications

Estonia Incident 2007 War: use of force Terrorism Riot / flash mob Hactivist attacks

Estonia Incident 2007 Successful ad hoc response, domestically & internationally. Set the standard for public openness about an incident. New Estonian laws & CIP structures. Momentum for international cooperation & coordination.

International Concerns Domestic Law International Law Domestic Law Domestic Law Domestic Law Domestic Law

International Concerns Domestic Law International Law Domestic Law Domestic Law Domestic Law Domestic Law

Jurisdictions for Response Health / Pandemic Hospital / Clinic State Health / HS Federal Health / HS International WHO Quarantine Authorities Intelligence Community Law Enforcement Cyber Incident Corporation / Agency (network / system security) Federal HS ( cyber-related incident of national significance) Military (conflict mgt, armed conflict) IC, LE, Diplomacy

Frameworks for Criteria Definition Identification of Criteria Map Response Decisions to Criteria (decision tree) Legal Frameworks National Cyber Crimes Conflict Management / Armed Conflict International Treaties / Agreements Law of the Sea, Outer Space, Satellites, Telecommunications FICS initiative

FICS Frameworks for International Cyber Security Criteria Is there a military response? Is there a foreign relations response? Is there a law enforcement response? Is there an intelligence community response? Is international assistance / coordination required? Is there a regulatory response? Is there a corporate response?

Center for Infrastructure Protection Maeve Dion mdion@gmu.edu 703-993-4737

Policy Considerations for CIIP Access & Availability Identification, authentication, access controls, and auditing. Intrusion detection, firewalls, antivirus software. Network resilience, redundancy. Data storage, integrity, encryption. Protecting CII Human Factors Training / certification for technological capabilities. Organizational security programs, training, and oversight. End user education. Organizational Responsiveness Proactive Abilities To law enforcement and intelligence: Awareness and monitoring of technical requirements, interdependencies. information demands. Threat identification and prediction. To regulators: Informational auditing, security plans, licensing requirements. To emergency responders.

Policy Considerations for CIIP Threats Threats to CII, and threats via CII (disruption & weaponization) WHO? HOW? WHY? Natural disaster. Employee / insider. Associate (contractor / vendor). External (competitor / enemy). Human error (development or operations). Failure of awareness (human error at policy & management level). Deliberate act. Accident. Theft / Extortion. To hurt the infrastructure operator. To hurt an entity reliant upon the infrastructure. To hurt an economy / country.