CSCE 727 Strategic Information Warfare. National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
INTRODUCTION TO SPECIAL OPERATIONSUnclassified Special Operations Overview Click arrow below to continue WARNING - This document contains technical data.
Overview An emerging challenge A belated response Debating the alternatives – Air-Sea Battle – A distant blockade – Maritime denial Conclusions.
What is Game Theory? It is part of the theory of purposeful behavior commonly known as rational choice theory. It specifically focuses on situations with.
Defense Transformation: Concepts and Affordability Jack Treddenick George C. Marshall Center DRESMARA 16 October 2006.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
The Language of the Military Profession
Information Warfare Theory of Information Warfare
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
Do Now 1) What was one of the causes of the Cold War? 2) What do you think the United States might do to stop the spread of communism?
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Critical Infrastructure Interdependencies H. Scott Matthews March 30, 2004.
DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.
C4ISR and Information Warfare
Critical Infrastructure Interdependencies H. Scott Matthews March 3, 2003.
NATURE OF WAR Major Carlos Rascon.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
China and space security National Defense University, PLA, China National Defense University, PLA, China Zhong Jing.
Advent of the Air Age: World War I
Campaign Planning Process Step 3B – System Center of Gravity Analysis
Organization Theory and Nuclear Proliferation History 5N: The Challenge of Nuclear Weapons.
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Military Ethics in the New Millennium
Deliberative Working Document - Predecisional FOUO Supporting the Secretary’s Top Priorities Eric Coulter, Deputy Director OSD Program Analysis and Evaluation.
Introduction to Military History. What is War? How do we define war? What distinguishes it from other forms of armed conflict?
Information Warfare Playgrounds to Battlegrounds.
CSCE 727 Awareness and Training Secure System Development and Monitoring.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
CSCE 548 Security Standards Awareness and Training.
Information Warfare Midterm Overview. Lectures Covered Everything until (including) March 2 nd Reading: – All lecture slides – Denning book: Chapters.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Chapter 11 - Collective Self-Defense. 2 The UN What was the League of Nations? How well did it work? What did the world's nations promise in Article 2(4)
Mr. Steve Verna Northrop Grumman 01 May 2007 Validation Methodology for Agent-Based Simulations Workshop Irregular Warfare Working Definition.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
The Cold War as Total (Virtual) War: Prospect of Nuclear War The Post-World War Two Condition for Almost Fifty Years.
Information Warfare Playgrounds to Battlegrounds.
BAE Systems Small Business Program
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
United Nations. Key Terms General Assembly Security Council Military Staff Committee Secretary General.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
The 21st Century Security Environment: Weak States, Armed Groups, Irregular Conflicts Professor Richard. H. Shultz, Jr.
UNCLASSIFIED 3/9/2016 7:15:39 PM UNCLASSIFIED Page 1 of 5 Pages Space Policy Issues - Space Threats - 14 June, 2010.
Business Strategy Introduction to Strategy Session 1 1.
CSCE 727 Awareness and Training Secure System Development and Monitoring.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Employment Considerations: Considerations at the Outset of Combat
Army Aviation in MOUT.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
What is Cyber Security Cyber War Cyber Power?
“Existing world order is being redefined.” Henry Kissinger Jan 2015
The Russian Way of War TEFOR G-27
California Cybersecurity Integration Center (Cal-CSIC)
Homeland Security v. Homeland Defense: The Big Gap
Fires Conceptual Framework Supporting Multi-Domain Battle
Chapter VII Article 2.4 All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or.
Chapter VII Article 41 The Security Council may decide what measures not involving the use of armed force are to be employed to give effect to its decisions,
Presentation transcript:

CSCE 727 Strategic Information Warfare

National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine – business as usual for the Russian bear, Homeland Security News Wire, March 13, 2014, business-as-usual-for-the-russian-bear Roger C. Molander, Peter A. Wilson, B. David Mussington, Richard Mesic: What is Strategic Information Warfare?, 1996,

IW Weapons Computer Viruses Worms Trojan Horses Logic Bombs Trap Doors Van Eck devices Chipping Nano machines and Microbes Electronic Jamming HERF Guns - EMP Bombs Penetration exploits and tools Information Warfare - Farkas3

Schmitt Analysis – International Law Article 51 of the UN Charter – Nothing in the present Charter shall impair the inherent right of individual or collective self-defense if an armed attack occurs against a Member of the United Nations Article 41 – The Security Council may decide what measures not involving the use of armed force are to be employed to give effect to its decisions, and it may call upon the Members of the United Nations to apply such measures. These may include complete or partial interruption of economic relations and of rail, sea, air, postal,telegraphic, radio, and other means of communication, and the severance of diplomatic relations Information Warfare - Farkas4

5 National Security and IW U.S. agencies responsible for national security: large, complex information infrastructure 1990: defense information infrastructure (DOD). Supports – Critical war-fighting functions – Peacetime defense planning – Information for logistical support – Defense support organizations Need proper functioning of information infrastructure “digitized battlefield”

Information Operations Command-and-Control Warfare Intelligence-Based Warfare Electronic Warfare Psychological Warfare Hacker Warfare Economic Information Warfare Cyber Warfare Information Warfare - Farkas6

7 National Security and IW Increased reliance on information infrastructure Heavily connected to commercial infrastructure – 95% of DOD’s unclassified communication via public network No boundaries, cost effectiveness, ambiguous

Information Warfare - Farkas8 National Security and IW Vital human services – Law enforcement – Firefighters – Emergency telephone system – Federal Emergency Management Agency Other Government Services and public utilities – Financial sector – Transportation – Communications – Power – Health system

Information Warfare - Farkas9 Information Warfare Persian Gulf War: first “information war” After the war: – U.S. concern about own vulnerability for IW – “strategic” level of information warfare No clear understanding of objectives, actors, and types of activities What is IW? –Academia, national security community, intelligence community, etc.

Information Warfare - Farkas10 Strategic Warfare Cold War: “single class of weapons delivered at a specific range” (Rattray) – E.g., use of nuclear weapons with intercontinental range Current: “variety of means … can create “strategic” effects, independent of considerations of distance and range.” Center of gravity: – Those characteristics, capabilities, or sources of power from which a military force derives its freedom of action, physical strength, or will to fight (DOD)

Information Warfare - Farkas11 Strategic IW “…means for state and non-state actors to achieve objectives through digital attacks on an adversary’s center of gravity.” (Rattray)

Information Warfare - Farkas12 SIW Operating Environment Man-made environment Increased reliance on information infrastructure  new center of gravity

Information Warfare - Farkas13 Strategic Warfare vs. SIW Similar challenges Historical observation: centers of gravity are difficult to damage because of – Resistance – Adaptation

Information Warfare - Farkas14 Dimensions of Strategic Analysis Threads: – Need to engage in multiple related means to achieve desired results – Interacting with opponent capable of independent action Distinction between” – “grand strategy”: achievement of political object of the war (includes economic strength and man power, financial pressure, etc.) – “military strategy”: gain object of war (via battles as means)

Information Warfare - Farkas15 Waging Strategic Warfare Creates new battlefields and realms of conflict Need identification of center of gravity – WWI: German submarines: strangle U.K. economy Airplanes: tactical use: reconnaissance and artillery spotting. Strategic use: 1915: German zeppelin: striking cities in England

Information Warfare - Farkas16 Strategic Air Power Targets center of gravity WWI: – Deliver devastating strikes – Civilian morale WWII: – U.S. targets German economic targets – Massive bombing campaigns – Crushing civilian morale – Paralyzing economy Problems: – Difficulty to achieve general industrial collapse – Grossly overestimated the damage

Information Warfare - Farkas17 Other Weapons – Cold War Military capacity as means to achieve political leverage through strategic attacks: – E.g., nuclear weapons, ballistic missile, satellite capability, WMD Massive retaliation – Ability to use is limited, e.g., 1956 Soviet invasion of Hungary

Information Warfare - Farkas18 SW – Past Focused on offensive actions Largely ignored – Interaction between adversaries  difficult to determine utility of offensive action – Defense capabilities, vulnerabilities, and commitment

Information Warfare - Farkas19 Necessary conditions for SW Offensive freedom of action Significant vulnerability to attack Prospects for effective retaliation and escalation are minimized Vulnerabilities can be identified, targeted, and damage can be assessed

Information Warfare - Farkas20 SIW Growing reliance  new target of concern Commercial networks for crucial functions Rapid change Widely available tools Significant uncertainties – Determining political consequences – Predicting damage, including cascading effects

Information Warfare - Farkas21 SIW Complexity and openness – Weakness – Strength Difficult to distinguish offensive from defensive Public information – Vulnerabilities – Incentives

Next class Security Policies Information Warfare - Farkas22