Elements of Threat - Challenges for Visualisation Barry Horne Visualisation N/X Penn State University 11 March 2003.

Slides:



Advertisements
Similar presentations
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Advertisements

® Modern Strategic Governance Director General Global Strategy Deputy Director Global Strategy Deputy Director Response Management Associate Directors.
Department of Homeland Security Site Assistance Visit (SAV)
Presentation to the Standing Senate Committee on National Security and Defence Paul E. Kennedy Senior Assistant Deputy Solicitor General February 24, 2003.
CHAPTER 6 I. Human Systems A. Economic Geography
The Global Context Lecture 3 The Global Business Environment.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
Computer Crimes Chapter 9. Definition  Illegal act that involves a computer system or computer-related system  Telephone, microwave, satellite telecommunications.
Chapter 17 Law and Terrorism.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Cyberterrorism: The Bloodless War? Pat Mcgregor Chief Information Security Architect Intel Corporation 3 October 2001.
Information Warfare Theory of Information Warfare
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Leslie W Kennedy Director RUTGERS Newark. Sponsored by the Rutgers School of Criminal Justice, Center for Global Change and Governance, College of Nursing.
Nick Wainwright HP Labs / Effectsplus project. The report of a consultation of the Future Internet Assembly – a cross disciplinary assembly of researchers.
Cyber-Warfare: The Future is Now!
CYBER CRIME AND SECURITY TRENDS
Introduction Advent of ICT Increased integration of market Mobility of people for job and vacation Reach of satellite channels Internet Global Village.
Cracking down on international cyberterrorism
TERRORISM And how to tackle it. TERRORISM: THE USUAL CONFUSIONS ‘A new threat…’ - and aimed at the West ‘One man’s terrorist is another man’s freedom.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
ON INTELLIGENCE Overview 2.6
Scenario A devastating cyber attack has been launched against the United States, injecting viruses that have effectively shut down the U.S. power grid.
Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
SNDC/CATS 0802 LN Presentation at the Symposium “Threats from the Net” New asymmetric threats in modern information societies Tallinn February 29, 2008.
The Case of the Dirty Bomber TERRORISM IN AMERICA.
Committees Katia Black Period 6 th House standing Committees Agriculture Transportation and infrastructure Education and the workforce Resources.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Information Warfare Playgrounds to Battlegrounds.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
OPSEC and Geospatial Information. Five step process Our operations from an adversary point of view Compilation Indicators Operations Security.
The Future of Terrorism
CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
ISSUES OF NATIONAL SECURITY ARE NO LONGER SIMPLE!
Scott Charney Cybercrime and Risk Management PwC.
Aspen, Colorado September 19 th, 2013 BLACK AND VEATCH UTILITY EXECUTIVE LEADERSHIP INSTITUTE: “PREDICTABLE PERFORMANCE”
Information Warfare Playgrounds to Battlegrounds.
BAE Systems Small Business Program
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts.
Copyright © 2014 Cengage Learning FOREIGN POLICY AND NATIONAL SECURITY Chapter Seventeen.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
SPANISH NATIONAL POLICE INNOVATION & DEVELOPMENT SERVICE LOGISTICS GENERAL DIRECTORATE SMI2GS - H2020, BRUSSELS 26 & 27 February 2016 H2020 (CALL 2016)
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Dealing with Terror after 9-11 How do dealing with terrorism and trying to develop and practice peace fit together?
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Cultural Tensions Geographical Superpowers. Superpower Geographies 3. Implications of the continued rise of the superpowers? a) Resource implications.
Law and Terrorism Chapter 17.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Homeland Security v. Homeland Defense: The Big Gap
Economic Environment of Business
Federal Protective Service
CRITICAL INFRASTRUCTURE CYBERSECURITY
Chapter 19 Transnational actors and international organizations in global politics Name: MA XINYUE Student No.:ID02403 Student No.:ID02403.
What IS ?.
Electronic Surveillance, Post 9/11
Role of US Security and Intelligence Agencies
Criminal Investigations
Lecture 29 HUM111 Pakistan Studies.
Brigadier General Md Amin Akbar Colonel Justus Majyambere
Presentation transcript:

Elements of Threat - Challenges for Visualisation Barry Horne Visualisation N/X Penn State University 11 March 2003

“Winston Wiley Deputy Director, CIA in 1998 discussed a number of generic threats. He suggests that the most direct threats will probably come from terrorism, and will include attacks against information systems such as critical infrastructure systems.” (However, international disputes with nation states and non-state actors such as pressure groups cannot be ruled out.) Transnational Threats to NATO in Winston Wiley. Deputy Director, CIA 10 February

Critical National Infrastructure Telecommunications Financial Institutions Utilities Transport Infrastructure Health Services Emergency Services Large Commercial complexes Critical Technologies/Manufacture Government Buildings Military Installations Law Enforcement organisations

Threat Actors Nation State Insider Terrorist Investigative Agency Criminal Commercial Groups Pressure Group Hacker

Some Characteristics of Conflict in the Information Age The growth in asymmetric adversaries and non- state actors (empowered small agents) –Freely available easy to use technology The globalization of information systems, financial markets and economies, and the media –Geographical borders irrelevant –Freely available massive data sets

Where do attacks/intrusions originate?

You can never be sure….. Eligible Receiver ‘97 –Demonstration of hostile penetration of CNI and DOD Solar Sunrise ‘98 –Systematic intrusions to DOD at time of tension in Gulf by Californian juveniles and Israeli ‘mentor’ Moonlight Maze ‘98 - Wake Up Call! –Large scale intrusions eventually traced back to dial-up Internet connections near Moscow –“We are in the middle of a cyber war” - Dr Hamre, Dep Sec Def

Level playing field Equity in intelligence (David Hall) Massive amounts of quality data available freely on Internet from official sources Non-attributable information gathering –Anonymous browsing –Internet café

What’s available in the Internet Candy Store? Utilities Transport systems Personal data Maps Imagery Economic data … and much more! And it’s all FREE! (No audit trail)

Anomalous behaviour? How to detect intelligence gathering on the Internet? Anomalous behaviour = –Terrorist gathering information? –Or –High school student geography project?