4/27/2019 Cyberwar Fiction, Facts, and the Future of Arms Control Ralf Bendrath, Berlin FoG:IS Forschungsgruppe Research Group on the Informationsgesellschaft.

Slides:



Advertisements
Similar presentations
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Advertisements

Foreign Affairs EOC Practice Quiz. EOC Quiz Which of the following terms below describes trade measures with an effort to punish another nation by imposing.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
DHS, National Cyber Security Division Overview
South Carolina Cyber.
Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
FoG:IS Civil-Military Relations in the Information Age Ralf Bendrath, Berlin FoG:IS Forschungsgruppe Research Group Informationsgesellschaft und Information.
Crisis Management and Arms Control The Evolutions of Nuclear Strategy US – Soviet Security Cooperation Yi-Ren Chen | Hist 5N | May 4 th, 2004.
China and space security National Defense University, PLA, China National Defense University, PLA, China Zhong Jing.
Chapter Eighteen: Foreign Policy and National Security 1.
CTTSO Overview John Morgan, Deputy Director for Science and Technology, CTTSO September 2010.
Today Finish Bin Laden Video
INTERNATIONAL SECURITY AND PEACE WAR FOR THE NEW WORLD ORDER AND WAR ON TERRORISM Arifah Raja Falency (I34014)
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Chapter 14 Foreign Policy.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Chapter 17: Foreign Policy and National Defense
Information Warfare Playgrounds to Battlegrounds.
Foreign & Defense Policy
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Jeopardy Cold War Category1 Category 2 Category3 Category 4 Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy Category5.
Foreign Policy and National Defense Chapter 17
Section Outline 1 of 12 American Foreign Policy Section 3: Foreign Policy in Action I.Foreign Policy Through World War II II.The Cold War III.Today’s Challenges.
Political Science American Government and Politics Chapter 15 Foreign and Defense Policy.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
North American Energy Infrastructure Policy Philip Gonda Steven Mays Robert Floyd Josh Kapp.
Information Warfare Playgrounds to Battlegrounds.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Chapter 17. For over 150 years, Americans were more interested in domestic affairs-what is happening in this country- than in foreign affairs—events.
The CIA and the INS The CIA
Chapter 14 Foreign Policy. What is Foreign Policy? ~ a nation’s external goals and techniques and strategies used to achieve them ~American foreign policy.
Presidential Power and Foreign Policy. American Public Congress Foreign Policy Bureaucracies White House Staff President.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Foreign policy is the conduct of one nation towards another nation Domestic policy is the government’s actions within the borders of its own country.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
Tomorrow’s Battleground Nicholas Jabbour Alice Culbertson.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Foreign Policy and National Defense
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
Containment in Europe.
USH 15:4 Eisenhower’s Cold War Policies
“Existing world order is being redefined.” Henry Kissinger Jan 2015
Foreign & Military Policy
California Cybersecurity Integration Center (Cal-CSIC)
The President and Foreign Policy
Homeland Security v. Homeland Defense: The Big Gap
“Domestic policy can only defeat us. Foreign policy can kill us.”
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
Pick up handouts Open notebooks to page 25
Containment & Soviet Control in Eastern Europe
U.S. FOREIGN POLICY.
Containment & Soviet Control in Eastern Europe
[ 6.6 ] National Security.
Foreign Policy; a brief introduction
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
Becoming the President
Foreign Policy: Protecting the American Way
Foreign Policy and National Defense
The American Cyber-Angst and the Real World – Any Link?
Foreign and Defense Policymaking
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
AN INTRODUCTION TO FOREIGN POLICY
Foreign Policy and National Defense
SSUSH23 Assess the political, economic, and technological changes during the Reagan, George H.W. Bush, Clinton, George W. Bush, and Obama administrations.
Presentation transcript:

4/27/2019 Cyberwar Fiction, Facts, and the Future of Arms Control Ralf Bendrath, Berlin FoG:IS Forschungsgruppe Research Group on the Informationsgesellschaft und Information Society and Sicherheitspolitik Security Policy Visiting Scholar Lecture George Washington University The Elliott School of International Affairs Center for International Science and Technology Policy (CISTP) Security Policy Studies Program (SPS) 26 March 2001

Cyberwar in political perception 4/27/2019 Cyberwar in political perception „one of the central challenges for security policy in the future“ (Senator John McCain in primaries 1999) „There will be an electronic attack sometime in our future” (John Hamre, Deputy Secretary of Defense 1996) „Cyberspace ain´t for geeks, it´s for warriors“ (John Hamre, Deputy Secretary of Defense 1999) „electronic Pearl Harbor“ (popular meme since 1991) „This is a classic deterrence mission” (Condoleezza Rice last week)

Cyberwar in US Security Policy 4/27/2019 Cyberwar in US Security Policy Part of counterterrorism policy PDD-63, May 1998 Seen as “emerging threat” Congress Included in military strategy planning JV 2010 & 2020, QDR 2001 “Homeland defense” CSIS, Hart-Rudman Commission a task for military strategy?

Underlying Assumptions 4/27/2019 Underlying Assumptions real threat foreign nations or terrorist groups have capabilities with intentions to use vulnerability of US systems can be answered militarily can be coordinated centrally threat independent of US policy

4/27/2019 What do we really know?

4/27/2019 It could be just junk mail, Colonel, or the beginning of a major enemy attack...

Real Threat? foreign nations terrorist groups Russia: media management 4/27/2019 Real Threat? foreign nations Russia: media management China: “People’s Information War” India/Pakistan: just began Germany: working on it, mainly defense France: economic espionage Cuba: ridiculous terrorist groups prefer bombs bin Laden uses encryption - so what?

Incidents Solar Sunrise Kosovo War Middle East China & Taiwan 4/27/2019 Incidents Solar Sunrise not Iraq, but US & Israeli teens Kosovo War website hacks, viruses, e-mails Middle East website hacks, DoS-attacks China & Taiwan private hackers, no govt. involved

Vulnerabilities? no sound estimates or statistics 4/27/2019 Vulnerabilities? no sound estimates or statistics national security systems not connected to public networks critical systems not connected to public networks patches! main damage from viruses

Military Answer? deterrence is communication unknown opponent 4/27/2019 Military Answer? deterrence is communication unknown opponent not a precise weapon Posse Comitatus law of armed conflict political oversight?

Central Coordination? private ownership of systems 4/27/2019 Central Coordination? private ownership of systems technology decentralised centralised structures too slow

Best Practice local solutions and defenses awareness & education info-sharing open source computer scientists, not soldiers

Cyber Security Policy (Clinton) law enforcement coordination within government cooperation with industry education for IT security awareness

U.S. Influence on Cyber-Threat have done it computer intrusions since 1980s cyberwar waged 1991 & 1999 part of military strategy Joint Doctrine for Info-Operations FM 100-6 (Info Operations) specialised military units infowar units (since 1994, expanding) part of combat commands (2001)

U.S. influence on Cyber-Threat 4/27/2019 U.S. influence on Cyber-Threat mid-eighties: CIA and NSA hack into Soviet and other computers late eighties: U.S. armed forces develop computer viruses and recruit hackers 1991: US forces hack into Iraq‘s C2 systems 1994: „School for Information Warfare and Strategy“, National Defense University 1996: „Information Warfare“ makes way into „Joint Vision 2010“ October 1998: Joint Pub. 3-13 „Joint Doctrine for Information Operations“, offensive use of hacking

U.S. influence on Cyber-Threat 4/27/2019 U.S. influence on Cyber-Threat Spring 1999: Computer Network Attacks on Serbia May 2000: „Joint Vision 2020“, even bigger role for information warfare than in JV 2010 October 2000: US Space Command assumes responsibility for Computer Network Attacks February 2001: Air Intelligence Agency becomes part of Air Combat Command, goal: integrate computer network attacks into operational planning

The IT - Insecurity Cycle 4/27/2019 The IT - Insecurity Cycle IT vulnerability usage of IT-security holes cyber warfare military and intelligence services

Dangers of U.S. Cyberwar Plans 4/27/2019 Dangers of U.S. Cyberwar Plans export problems for U.S. computer industry chilling effect on digital economy U.S. as role model cyber-arms race Cyberspace less safe

Cyber Arms Control needed politically possible urgent 4/27/2019 Cyber Arms Control needed to prevent cyber arms race to secure digital economy politically possible already proposed by other nations computer industry would love it urgent dynamic still slow - how long? U.S. policy critical most advanced, role model

Weapons systems approach 4/27/2019 Weapons systems approach quantitative what to count? manpower, computer power, network connections,...? qualitative what to prohibit? hacking tools, planning tools, network mapping tools,...? Verification almost impossible

Normative approach Doctrines Units Operations 4/27/2019 Normative approach Doctrines offensive use of hacking? Units computer attack units? Operations network attacks part of wargames? Verification difficult, but not impossible

Options for Action political oversight no first use 4/27/2019 Options for Action political oversight no first use international convention on peaceful use of cyberspace collaboration of security policy studies and computer science see you in Berlin? Conference on Cyber Arms Control 29 June - 1 July

If you have become curious... 4/27/2019 If you have become curious... Dipl. Pol. Ralf Bendrath e-mail discussion list Infowar.de http://userpage.fu-berlin.de/~bendrath FoG:IS Forschungsgruppe Informationsgesellschaft und Sicherheitspolitik http://www.fogis.de Telepolis Dossier „Infowar“ http://www.heise.de/tp/english/special/info Federation of American Scientists http://www.fas.org/irp/wwwinfo.html