Homeland Security v. Homeland Defense: The Big Gap

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

The Ethics of War Spring Main normative questions When, if ever, is resort to war justified? What can we permissibly do in war? Who are responsible.
INTERNATIONAL LAW THE USE OF FORCE. THE PROHIBITION OF FORCE: Art 2 t 3. All Members shall settle their international disputes by peaceful means in such.
Brian Connett, LCDR, USN US NAVAL ACADEMY
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network.
USE OF FORCE IN INTERNATIONAL LAW
International Law Unit 9: Use of Force Fall 2005 Mr. Morrison.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Chapter 17: Foreign Policy and National Defense
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Three features distinguish bureaucracies: Ch. 15 The Bureaucracy Hierarchical authority. Job specialization for each bureaucrat Formalized rules.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
International Organizations
Chapter 11 - Collective Self-Defense. 2 The UN What was the League of Nations? How well did it work? What did the world's nations promise in Article 2(4)
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Political Science American Government and Politics Chapter 15 Foreign and Defense Policy.
The Evolving Role of NATO Marko Savković Research Associate Centre for Civil-Military Relations, Belgrade.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
The President stands as the single strong leader of the executive branch Americans have looked to the President for leadership on complex issues As commander.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Chapter 17. For over 150 years, Americans were more interested in domestic affairs-what is happening in this country- than in foreign affairs—events.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
The Use of Force Unit 11. Introduction Before the U.N. Charter, before 1945, many states followed the Just War doctrine. Just War theory states that war.
Chapter 17: Foreign Policy and National Defense Section 2.
International Law and the Use of Force (LG566) Topic 4: Self-Defence.
Section 4: Foreign Aid and Alliances The United States works with other nations to keep the peace and to ensure political stability around the world. American.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Ensuring Cyberpeace in a New World Order Dr. Hamadoun Touré Secretary General International Telecommunications Union, Geneva.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
Foreign policy is the conduct of one nation towards another nation Domestic policy is the government’s actions within the borders of its own country.
Brooke Smith-Windsor, Ph.D. ACA 13 May 2016 Brooke Smith-Windsor, Ph.D. ACA 13 May 2016 NATO, Interconnected Security Threats and the Politics of Perception.
Federal Agencies. What Is a Bureaucracy? Hierarchical authority. Pyramid structure with a chain of command running from top to bottom. Job specialization.
International Law and the Use of Force (LG566) Topic 1: Introduction.
EOC REVIEW standard 4 As you move through the series of questions, at the end of section keep notes on what topics or vocabulary you are missing. On your.
Maritime Security as an Integral Part of an
Foreign Policy GOVT Module 16.
Tuesday, January 19th Good Morning, Happy Tuesday! 
Robin “Sak” Sakoda Armitage International, L.C.
Containment in Europe.
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
Foreign & Military Policy
Table of contents Foundation for support of reforms in Ukraine. Initiation……………………….3 Structure of the Foundation …………………………………………………………4 Areas of Activities …………………………………………………….5.
Bell Ringer Get with your groups and make any final changes to your political cartoon, paragraph explanation, and prepare for your presentation! You will.
P.J. Blount University of Mississippi School of Law
“Foreign Affairs and Diplomacy” Page
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
Cybersecurity in Belarus a general overview of support areas
Security challenges in the Balkans
Study the assignments in your binder from this week!
8 Building Blocks of National Cyber Strategies
U.S. Department of Justice
Public Policy Foreign and Domestic.
Federal Protective Service
President of the Russian Association of International Law
Cyber Security Ecosystem of Georgia. Experience and Challenges
The norms on the use of force in a nutshell
Foreign Policy and National Defense
Chapter VII Article 41 The Security Council may decide what measures not involving the use of armed force are to be employed to give effect to its decisions,
Chapter Six, Section Three “Making Foreign Policy”
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Prevention, Intelligence
Deborah Housen-Couriel, ADV.
Foreign Policy and National Defense
International Organizations
Presentation transcript:

Homeland Security v. Homeland Defense: The Big Gap World Federation of Scientists 40th Session International Seminars on Planetary Emergencies August 21, 2008 Jody R. Westby, Esq.

ADVERSARIES IN CYBERSPACE ACTORS RESPONDERS Nation States with Info War Capabilities Pvt, Military & Intel, , Homeland Security (HS) Terrorists Pvt, HS, Military & Intel, Law Enforcement Rogue Actors (Organized Crime, Pvt, Law Enf, HS, Intel Economic Espionage, Intelligence) Insiders Pvt, Law Enf, HS Script Kiddies Pvt, Law Enf, HS © Jody R. Westby

NEED FOR RESPONSE COORDINATION At Time of Attack Not Possible to Know Who Attacker Is – Attribution is one of biggest problems Response Baton May Have to Pass From Private Sector to Law Enforcement to Military Requires Swift Coordination, Certainty on Legal Authority for Actions Requires Information Sharing & Public-Private Sector Coordination 85% of U.S. Critical Infrastructure Owned by Private Sector 95% of DoD’s Global Telecom Needs Satisfied by Private Networks © Jody R. Westby

STATE OF CYBER WARFARE U.S. Government Engaged in Cyber Warfare Probably More Than Any Other Nation In 1982, CIA Exploited Software Transferred to Soviet Union That Operated Pumps, Turbines, & Valves of Pipeline. Caused Software to Malfunction and Reset Pump Speeds and Valve Settings. Result was Largest Non-Nuclear Explosion and Fire Ever Seen From Space. 3 Kilotons TNT Equivalent – Hiroshima Was 14-20 Kilotons TNT Operation Desert Storm in 1991: Strategic Air Command Targeted Command, Control, Communications Systems, Electrical Grids, & Key Infrastructure Estonia: Month of Attacks, Shut Down Govt Systems, Banks, Newspapers, Called in NATO, EU, Cyber Experts, Blocked Traffic Georgia: Attacks Since June, Govt Web Sites, DDoS, Russian Business Network & Russian Govt, Blocked .ru traffic 120 Countries With Cyber Warfare Capabilities; Terrorists With High Level of Skills, Rogue Actors (Bot Herders); US has Joint Functional Component Command Network Warfare (JFCCNW) © Jody R. Westby

GEO-CYBER CONSIDERATIONS Cyber Warfare Impacts Geo-Cyber Stability Geo-Cyber – Relationship Between Internet & the Geography, Demography, Economy & Politics of a Nation & its Foreign Policy Geo-Cyber Security – Ability to Protect Infrastructure, Systems & Information of a Nation From Intrusion, Attack, Espionage, Sabotage, & Other Forms of Negative or Criminal Activity That Could Undermine Its National & Economic Security © Jody R. Westby

Is More Than One Network Required? How Is This Negotiated? OPEN QUESTIONS Who on the Public & Private Sector Sides Can Approve Military Use of Network? Is More Than One Network Required? How Is This Negotiated? What Assistance or Permissions Are Needed From Other Countries? Can Governments Take Over Private Sector Network? What About Risk to Network & Private Sector Fiduciary Duty to Shareholders? When Can Governments Intervene On Behalf Of Private Sector in Event of Cyber Attacks? What is Private Sector Role? What Can the Government Ask the Private Sector to Do? Who Is Responsible For Damage to Networks Damaged in an Attack? © Jody R. Westby

LEGAL ISSUES: COMPLEX & LEAST PROGRESS Legal Frameworks (Cybercrime, Criminal Procedure) Information Sharing & Freedom of Information Act (Sunshine Laws) Antitrust Posse Comitatus (Military Cannot Engage in Law Enforcement) Executive Orders, Presidential Memoranda & Directives Jurisdictional Issues (extradition, dual criminality) International Cooperation (search/seizure, investigation, ISPs, 24/7) Council of Europe Convention on Cybercrime UN Charter NATO Treaty INT’L © Jody R. Westby

LEGAL FRAMEWORKS ARE ANTIQUATED: UN CHARTER Art. 2(4): Members refrain from threat or use of force against territorial integrity and political independence Art. 41: Security Council may decide what measures not involving the use of armed force are to be employed Art 42: If Security Council considers actions pursuant to Art 41 inadequate, it may take action by air, sea, or land forces Art 51: Nothing impairs inherent right to self-defense if armed attack occurs Art 99: Secretary-General may bring to the attention of the Security Council any matter which in his opinion may threaten the maintenance of peace and security © Jody R. Westby

LEGAL FRAMEWORKS ARE ANTIQUATED: NATO TREATY Art. 3: Parties separately & jointly maintain and develop individual and collective capacity to resist armed attack Art. 4: Parties will consult when territorial integrity, political independence, or security of any of the Parties is threatened Art 5: Parties agree armed attack against one or more of them shall be considered attack against all Art 6(1): Armed attack means On territory of any of Parties in Europe or North America On territories or on islands of any of Parties On the forces, vessels, or aircraft of any of the Parties Art 12: After 10 years in force, Parties shall, if any of them requests, consult together for the purposes of reviewing the Treaty, having regard for the factors then affecting peace and security © Jody R. Westby

Military neither owns the weapons nor knows how to use them SUMMARY Cyber warfare is increasingly engaged to exploit vulnerabilities and dependencies on ICTs Military neither owns the weapons nor knows how to use them Huge gaps in passing the response baton Gaps in response coordination, legal frameworks, policies Legal & technical issues present greatest barrier to effective response Collaboration between public and private sectors is critical Multinational cooperation and assistance mechanisms need to be defined © Jody R. Westby

THANK YOU! Jody R. Westby 202.255.2700 westby@globalcyberrisk.com