5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Introduction to Information Operations Attaché Corps- SEP 09
© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview.
SECURITY STRATEGIES OF THE REGION Witek Nowosielski.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Dr. Serge S. AZAROV iLaw-2004 Tallinn Informational Society Innovation EconomyCollision Collaboration Modification of National Information Infrastructure.
Information Warfare Theory of Information Warfare
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
FoG:IS Civil-Military Relations in the Information Age Ralf Bendrath, Berlin FoG:IS Forschungsgruppe Research Group Informationsgesellschaft und Information.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
China and space security National Defense University, PLA, China National Defense University, PLA, China Zhong Jing.
International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Introduction to Military History. What is War? How do we define war? What distinguishes it from other forms of armed conflict?
Information Warfare Playgrounds to Battlegrounds.
Citizenship Issues C.I.4 U.S. Domestic and Foreign Policy Students are able to: 4.2 Describe U.S. foreign policy. Students may indicate this by: – Defining.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Global Conflicts and their Consequences By Chris and Yimaj.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Babak Akhgar, Simeon Yates & Eleanor Lockley Chapter 1 - Strategy Formation in a Globalized and Networked.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
ISSUES OF NATIONAL SECURITY ARE NO LONGER SIMPLE!
Assessing Cyberspace Security and Vulnerabilities: The Critical Impact on Civil Liberties and Privacy Is there a trade-off between civil liberties and.
Understanding the Threats of and Defenses Against Cyber Warfare.
MA “International Relations, Global Economy and Strategic Analysis” COURSE OUTLINE.
Information Warfare Playgrounds to Battlegrounds.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
December 2015 Visa Waiver Program Improvement & Terrorist Travel Prevention Act.
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Chapter 17: Foreign Policy and National Defense Section 2.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Unclassified MG. L. HOXHA Skopje, 21 st of June 2005 REPUBLIC OF ALBANIA MINISTRY OF DEFENCE GENERAL STAFF OF THE ARMED FORCES.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
International Humanitarian Law (IHL). What is IHL? >A large body of law >Rules for behaviour in armed conflict situations >Protects victims and vulnerable.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Types of War.
“The Cyber Security Challenge: What Can be Done
1- Introduction ii-. Part ONE : foreign and security policy.
Understanding the Threats of and Defenses Against Cyber Warfare
Panel Discussion: C4I Solutions for Combating
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
Cyber Crimes Chunlian QU 9/18/2018.
The Broader Picture Laws Governing Hacking and Other Computer Crimes
SA Army Seminar 21 Change and Continuity in Global Politics and Military Strategy (with special reference to Human Rights, the Nature of War and Humanitarian.
“Ukraine’s OSCE Chairmanship in 2013 – contribution to strengthening security and cooperation in Europe” Lecture by H.E.Viktor Nedopas, Ambassador of.
COUNTERING VIOLENT EXTREMISM: IMPACT ON GLOBAL GOVERNANCE
Chapter 21:Security Beyond Computer Networks: Information Assurance
Combating Cybercrime: Tools and Capacity Building for Emerging Economies WSIS 2015, Geneva Jinyong Chung May 25, 2015.
Moving beyond the Millennium Development Goals.
Foreign and Defense Policymaking
Third Geneva Convention (1949)
The American Cyber-Angst and the Real World – Any Link?
4/27/2019 Cyberwar Fiction, Facts, and the Future of Arms Control Ralf Bendrath, Berlin FoG:IS Forschungsgruppe Research Group on the Informationsgesellschaft.
Foreign and Defense Policymaking
Deborah Housen-Couriel, ADV.
CIVIL - MILITARY CO-OPERATION IN THE EMERGING SECURITY LANDSCAPE
Presentation transcript:

5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe Research Group Informationsgesellschaft und Information Society and Sicherheitspolitik Security Policy Lecture at the Green/EFA Research Forum European Parliament, Brussels, 6 June 2001

Infowar: The U.S. Concept 5/6/2019 Infowar: The U.S. Concept Goal: „information dominance“ Targets: not adversaries´ forces, but his information flows Means: more than just kinetic weapons Operations Security (OPSEC) Psychological Operations (PSYOPS) Deception of enemy´s sensors or soldiers Electronic Warfare physical Attack/Destruction „Public Affairs Activities“ (Spin Doctoring) Civil Affairs Computer Network Attacks (Cyberwarfare)

Cyberwar: The U.S. Efforts 5/6/2019 Cyberwar: The U.S. Efforts Goal: denying or disturbing adversary´s computer systems Targets: military and civilian computer networks, banks, infrastructures,... Means: digital break-ins and more: Hacker-tools Computer viruses & worms Denial-of-service attacks Insiders Back doors Electronic surveillance Global network mapping

Cyberwar: The U.S. practice 5/6/2019 Cyberwar: The U.S. practice have done it computer intrusions since 1980s cyberwar waged 1991 & 1999 part of military strategy Joint Doctrine for Info-Operations, JP 3-13 Field Manual 100-6 (Info Operations) specialised military units infowar units (since 1994, expanding) part of combat commands (2001)

Dangers of U.S. Cyberwar Plans 5/6/2019 Dangers of U.S. Cyberwar Plans IT - insecurity cycle threat to privacy acts of war in times of peace breaks laws of armed conflict covert operations, hard to control use against domestic actors? chilling effect on digital economy cyber-arms race Cyberspace less safe

The IT - Insecurity Cycle 5/6/2019 The IT - Insecurity Cycle IT vulnerability usage of IT-security holes cyber warfare military and intelligence services

Cyber Arms Control needed politically possible urgent 5/6/2019 Cyber Arms Control needed to prevent cyber arms race to secure emerging cyber-society politically possible already proposed by other nations computer industry would love it urgent dynamic still slow - how long?

Options for Action political oversight no first use 5/6/2019 Options for Action political oversight no first use international convention on peaceful use of cyberspace collaboration of security policy studies and computer science

European Research Policy I 5/6/2019 European Research Policy I Guiding principles good: observation of international conventions ethical norms: data protection & privacy missing: peaceful purpose for research and development dangers rising from new technologies not so good: technology is the answer - what was the question?

European Research Policy II 5/6/2019 European Research Policy II Information and communication technologies good: security technologies cryptography missing: open source software decentralized and diverse systems not so good: securing civilian infrastructures: self-healing networks or surveillance?

European Research Policy III 5/6/2019 European Research Policy III Citizens and governance in the knowledge-based society good: diversity of ways to the knowledge-based society security and conflict resolution missing: role of new media for conflict resolution democratic control of intelligence services & the military not so good: JRC-Europol cooperation in developing tools to fight cybercrime

European Research Policy IV 5/6/2019 European Research Policy IV Strengthening the foundations of a European research area good: science & technology indicators - but not only quantitative! missing: technology assessment before development indicators for preventive arms control assessment of social and political impacts of research projects not so good: too bureaucratic for small groups

Beyond Research Policy 5/6/2019 Beyond Research Policy continue work against ECHELON and global surveillance establish electronic privacy as a basic human right in Europe stop European efforts to establish own intelligence services stop ENFOPOL / ILETS support efforts for cyber arms control don´t believe the „cyber terrorism“-hype

It could be just junk mail, Colonel, or the beginning of a major enemy attack...

See you again in Berlin? International Conference 5/6/2019 See you again in Berlin? International Conference Arms Control in Cyberspace Perspectives for Peace Policy in the Age of Computer Network Attacks Berlin, 29 - 30 June 2001 www.boell.de/cyberpeace