17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy.

Slides:



Advertisements
Similar presentations
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Advertisements

W ashington A rea T rustworthy C omputing H our
14th WATCH: Medical Device Cybersecurity: The First 164 Years Kevin Fu University of Massachusetts Amherst. THURSDAY November 15 th, Noon, Room 110 W ashington.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
David A. Brown Chief Information Security Officer State of Ohio
Brian Connett, LCDR, USN US NAVAL ACADEMY
International Cyber- Collaboration – Issues and Opportunities Moderator –Dr Andrew Vallerand Canadian Centre for Security Science Panellists - Mr. Josh.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
16th WATCH: Security, Cybercrime and Scale Cormac Herley Microsoft Research THURSDAY March 21 st, Noon, Room 110 W ashington A rea T rustworthy C omputing.
18th WATCH: An Experiment in Hiring Discrimination via Online Social Networks Alessandro Acquisti Carnegie Mellon University MONDAY Nov. 25 th, Noon, Room.
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
29th WATCH: Cybersecurity for the Internet of Everything (IoE) Bret Hartman Cisco Systems, Inc. Thursday June 18, Noon, Room 110 W ashington A rea T rustworthy.
Cybersecurity Workforce Opportunities RI Defense Economy Planning Commission 6 May 2015 The Rhode Island Defense Sector Innovation Focused - Economic Generator.
China and space security National Defense University, PLA, China National Defense University, PLA, China Zhong Jing.
1 Creating American Foreign Policy How should the United States conduct foreign policy? Definition of Foreign Policy: a government's strategy in dealing.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
David C. Croson, Ph.D. Office of the Assistant Director Directorate for Social, Behavioral, and Economic Sciences National Science Foundation
U.S. Foreign Policy. Defining Domestic policy – matters dealing within the U.S. Foreign policy – matters that involve the U.S. and countries outside the.
26th WATCH: Differential Privacy: Theoretical and Practical Challenges Salil Vadhan Harvard University THURSDAY Jan. 15, Noon, Room 110 W ashington A rea.
21st WATCH: Increasing Trust in the E-Health Environment: Privacy Mechanisms and Policy Problems Maya Bernstein US Department of Health & Human Services.
5th WATCH: So what if I take over a botnet to do my research? An examination of the current state of Ethics in Information and Communications Technology.
INTERNATIONAL SECURITY AND PEACE WAR FOR THE NEW WORLD ORDER AND WAR ON TERRORISM Arifah Raja Falency (I34014)
Advanced Systems and Concepts Office 20-Sep-15 What are National Security Threats? 2 nd Annual JTAC Workshop 4 April 2006 ASCO and DTRA Update and Welcome.
BELLRINGER:.
Winning the Silicon Sweepstakes: Can the United States Compete in Global Telecommunications? Rob Frieden, Pioneers Chair and Professor of Telecommunications.
Project author: Andres & nick Why we shouldn’t trust G. W. Bush.
11th WATCH: Security, Privacy, and Usability: Better Together Lorrie Cranor Computer Science & Engineering Science Policy Carnegie Mellon University THURSDAY.
Presidential Power PERIOD The Constitutional Indeterminacy of the Presidency The constitution is very vague on the roles of the president so it.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
NSF Programs and Possibilities Research Linkages EU-US 23 September 2004 Sylvia Spengler US National Science Foundation.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Foreign & Defense Policies. Discussion Questions:  Why do you think the Founders intentionally divided responsibility for foreign affairs between president.
International law and IR theories The invasion of Iraq, 2003.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Section Outline 1 of 12 American Foreign Policy Section 3: Foreign Policy in Action I.Foreign Policy Through World War II II.The Cold War III.Today’s Challenges.
Political Science American Government and Politics Chapter 15 Foreign and Defense Policy.
The President stands as the single strong leader of the executive branch Americans have looked to the President for leadership on complex issues As commander.
IARPA Overview Jason Matheny Director, IARPA October, 2015.
Week 4. Tonight’s seminar National Security Strategy National Security Strategy Local Response Local Response United Kingdom’s plan United Kingdom’s plan.
10th WATCH: Barriers to the Science of Security Tom Longstaff National Security Agency John Hopkins University THURSDAY March 15, Noon, Room 110 W ashington.
US Foreign Policy defending and advancing national interests abroad.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
Defense Policy Making You may not be interested in war, but war is interested in you.
Copyright © 2014 Cengage Learning FOREIGN POLICY AND NATIONAL SECURITY Chapter Seventeen.
Chapter 7 Strategy and Technology
Keith A. Marzullo, Ph.D. CISE/CNS DD February 24, 2011 Welcome to the Directorate for Computer and Information Science and Engineering.
Chapter 17: Foreign Policy and National Defense Section 2.
33rd WATCH: Privacy: Plural, Contextual, Contestable but not Unworkable Deirdre K. Mulligan University of California, Berkeley Thursday March 17, Noon,
Emerging Global Trends and Strategic Challenges in the Coming Decade Marvin J. Cetron, President, Forecasting International June 12, 2012 Emerging Global.
LECTURE PRESENTATION FOR Thomas Rid, Cyberwar will not take place Manjikian
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Foreign policy is the conduct of one nation towards another nation Domestic policy is the government’s actions within the borders of its own country.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
Week 4 Tina Mainwaring. VERY IMPORTANT!!! NO SEMINAR NEXT WEEK!!! NO SEMINAR NEXT WEEK!!! NO DISCUSSION BOARDS NEXT WEEK!! NO DISCUSSION BOARDS NEXT WEEK!!
International Security and Peace
Advanced Income Tax Law
Who makes and carries out foreign policy?
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
[ 6.6 ] National Security.
Assessing Deterrence Options for Cyberweapons
As a Responsible Country in the World (2001- )
The European Union response to cyber threats
Community of Users.
Prevention, Intelligence
Presentation transcript:

17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy C omputing H our NSF Stafford I Room 110, Noon Public Invited Abstract US strategy on cybersecurity and cyberwar is dominated by wishful thinking and inapt metaphors, says Stewart Baker. Instead of bizarrely taking comfort in the notion that cyberweapons are like nuclear weapons, we should learn the lessons of an earlier war-shaping technology – the airplane. “The bomber will always get through” was as frightening and as true in the runup to World War II as “cyberwar favors the offense” is today. Examining how technologists and diplomats tried to deal with the threat of strategic bombing says a lot about what will work in a world of cyberweapons. Among the lessons: Diplomacy and appeals to the law or norms of law offer little protection against nightmare cyberweapons. Deterrence through ever more sophisticated offensive capabilities is equally unlikely to work. Other tactics, from creating false targets to doing the obvious on defense, must be pursued at the same time that we look for ways to erode the technological advantage of the offense. Indeed, that advantage is already eroding due to an emerging revolution in attribution. Stewart Baker argues that we have a growing ability to identify and eventually to deter attackers by exploiting their inevitable security errors. Identifying and punishing intruders must be a major part of any cyberwar or cyberespionage technological strategy. Secure systems should seek not so much to lock out attackers as to force them to make such heavy investments that they put at risk their own anonymity and their own networks. That means more digital dyepacks and network mantraps, he asserts, not stronger network walls. Oh, and online anonymity? Toast. Speaker Stewart Baker is a partner in the law firm of Steptoe & Johnson in Washington, D.C. From 2005 to 2009, he was the first Assistant Secretary for Policy at the Department of Homeland Security. His law practice covers matters homeland security, international trade, cybersecurity, data protection, and travel and foreign investment regulation. As an intelligence lawyer, Mr. Baker has been General Counsel of the National Security Agency and of the commission that investigated WMD intelligence failures prior to the Iraq war. Mr. Baker is the author of Skating on Stilts, a book on terrorism, cybersecurity, and other technology issues, and he blogs about such topics on About the WATCH series: Transforming today’s trusted but untrustworthy cyberinfrastructure into one that can meet society’s growing demands requires both technical advances and improved understanding of how people and organizations of many backgrounds perceive, decide to adopt, and actually use technology. WATCH aims to provide thought-provoking talks by innovative thinkers with ideas that illuminate these challenges and provide signposts toward solutions. The series is jointly organized by NSF’s Computer Science and Engineering (CISE) and Social, Behavioral, and Economic (SBE) Directorates and sponsored by the CISE Secure and Trustworthy Cyberspace (SaTC) Program. Talks will be recorded and made available over the Internet. Questions/comments about WATCH? Contact Keith Marzullo Thursday, July 18, 2013