SNDC/CATS 0802 LN Presentation at the Symposium “Threats from the Net” New asymmetric threats in modern information societies Tallinn February 29, 2008.

Slides:



Advertisements
Similar presentations
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Advertisements

INTERNATIONAL RELATIONS AN INTRODUCTION 2011Sophie Kropman1.
NATIONAL SECURITY The first and most important obligation of government... Not just the safety and security of the country and its citizens... [but also]
INTERNATIONAL LAW THE USE OF FORCE. THE PROHIBITION OF FORCE: Art 2 t 3. All Members shall settle their international disputes by peaceful means in such.
1/18 Armed Forces in Cyber Era Namık KAPLAN, Commander Plans Projects Coordination Branch Head, Turkish Armed Forces Cyber Defence Command.
SECURITY STRATEGIES OF THE REGION Witek Nowosielski.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
MINISTRY OF NATIONAL DEFENCE REPUBLIC OF POLAND CLASSIFIED INFORMATION PROTECTION DEPARTMENT COL. PIOTR GRZYBOWSKI, Director, Classified Information Protection.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
1 SNDC/IOS LN 0111 The Swedish Initiative on Critical Infrastructure Protection Dir. Lars D. Nicander, National Office of IO/CIP-Studies, Swedish National.
Opportunities for All: Human Rights in Norway’s Foreign Policy and Development Cooperation White paper on human rights in Norway’s foreign and development.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
 Before you attempt the question given to you as an assignment … you must take note of the following information: ◦ A primary goal of terrorism is to.
Chapter Eighteen: Foreign Policy and National Security 1.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
INTERNATIONAL LAW different types of information: different types of information: laws, cases and regulations, guides or overviews, policy studies, conventions,
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Conceptual definition of the European Union as a security actor
Anita Nilsson Director, Office of Nuclear Security
Information Warfare Playgrounds to Battlegrounds.
Citizenship Issues C.I.4 U.S. Domestic and Foreign Policy Students are able to: 4.2 Describe U.S. foreign policy. Students may indicate this by: – Defining.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
SOCIO-TECHNICAL SYSTEMS APPROACH TO PEACE SUPPORT OPERATIONS Mapule Modise & Louise Leenen.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Fight against terrorism. EU institutional/legal framework A bit of history 1957: European Communities are born.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 17 - Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 213.
Center of Excellence PEACE OPERATIONS ROLE OF THE MILITARY IN UN OPERATIONS IN UN OPERATIONS Col (Ret) Peter Leentjes Center of Excellence in Disaster.
Cyber security implementation within an organization Ltn Andri Rebane Estonian MoD CIO.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
European security Security definitions and the main dilemmas Dr. Arūnas Molis 22 April, 2014 Tallinn.
Understanding the Threats of and Defenses Against Cyber Warfare.
Aspen, Colorado September 19 th, 2013 BLACK AND VEATCH UTILITY EXECUTIVE LEADERSHIP INSTITUTE: “PREDICTABLE PERFORMANCE”
Information Warfare Playgrounds to Battlegrounds.
Center of Excellence PEACE OPERATIONS ROLE OF THE MILITARY IN UN OPERATIONS IN UN OPERATIONS Col (Retd) Mike Morrison.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Copyright © 2014 Cengage Learning FOREIGN POLICY AND NATIONAL SECURITY Chapter Seventeen.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Chapter 17: Foreign Policy and National Defense Section 2.
Dealing with Terror after 9-11 How do dealing with terrorism and trying to develop and practice peace fit together?
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
EU-Thailand Cooperation in Export Control Additional Controls.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Unclassified MG. L. HOXHA Skopje, 21 st of June 2005 REPUBLIC OF ALBANIA MINISTRY OF DEFENCE GENERAL STAFF OF THE ARMED FORCES.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Into a New Century The War on Terrorism. September 11, 2001  Two airplanes hit the World Trade Center and a third hit the Pentagon A fourth plane was.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
International Terrorism: Defined
What is Cyber Security Cyber War Cyber Power?
Cybersecurity, competence and preparedness
Tuesday, January 19th Good Morning, Happy Tuesday! 
The Swedish Initiative on Critical Infrastructure Protection
« Space Applications as Instruments to Face Terrorist Threats » Mrs
PRESENTATION TO SELECT COMMITTEE ON SECURITY AND CONSTITUTIONAL DEVELOPMENT 9 FEBRUARY :00 -11:30 PROCLAMATIONS BY THE PRESIDENT UNDER SECTION 26.
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
Protection of Critical Infrastructure
Forth International Forum
President of the Russian Association of International Law
4/27/2019 Cyberwar Fiction, Facts, and the Future of Arms Control Ralf Bendrath, Berlin FoG:IS Forschungsgruppe Research Group on the Informationsgesellschaft.
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Introduction to IHL: Application and Basic Principles
Brigadier General Md Amin Akbar Colonel Justus Majyambere
Presentation transcript:

SNDC/CATS 0802 LN Presentation at the Symposium “Threats from the Net” New asymmetric threats in modern information societies Tallinn February 29, 2008 Dir. Lars D. Nicander, Center for Asymmetric Threat Studies, Swedish National Defence College

Terrorism Studies Dr. Magnus Ranstorp IO Studies Dr. Dan Kuehl Intelligence Studies Dr. Greg Treverton (+ Wilhelm (+ WilhelmAgrell) Asymmetric Threats Synergy Synergy

SNDC/CATS 0802 LN The Swedish Concept of IO* Information operations are joint and coordinated measures in peace, crises and war in support of political or military goals by affecting or using information and information systems owned by the opponents or other foreign parties. This can be done by using own information and information systems, which also at the same time must be protected. One important feature is to affect the processing of decisions and decision making. There are both offensive and defensive information operations, which are carried out in political, economic and military relations. Examples of information operations are information warfare, media manipulation, psychological warfare and intelligence operations. Defensive information operations are joint and coordinated measures in peace, crises and war regarding policy, operations, personnel and technology to protect and defend information, information systems and the ability for rational decision making. MoTIC-bill 99/00:86 * MoTIC-bill 99/00:86

SNDC/CATS 0802 LN Strategic/Economic Environment IO/IW Synergy Information Systems, Infosec Information, Intelligence Perceptions Joint Operations IO/ IW

SNDC/CATS 0802 LN Taxonomy Defensive Information Operations (IO-D)/ Defensive Information Warfare (IW-D) Critical Infrastructure Protection Information Assurance

SNDC/CATS 0802 LN The Asymmetric Character Coalitions Nations Organisations Individuals Coalitions Nations Organisations Individuals Classes III II I

SNDC/CATS 0802 LN The Dilemmas Anonymous attacks Anonymous attacks –How to detect an attack? –Who is at the other end? »A teenage hacker? »A corporation/organisation? »A nation? »Mix of these? What is an Act of War in Cyberspace? What is an Act of War in Cyberspace?

SNDC/CATS 0802 LN Information/Cyberterrorism

 Continuity of gov. (incl. media comm.)  Power  Telecom/ISP  Financial systems  ATC CIIP Critical Information Infrastructure Protection

SNDC/CATS 0802 LN Home Made HERF/EMP Device 20MWatts 30m Soft Kill Range

SNDC/CATS 0802 LN Cyber/Information Terrorism Aum Shinryko Aum Shinryko E-Jihad E-Jihad Arrest of an AQ-hacker in US Arrest of an AQ-hacker in US Al-Qaida IPB vs California Al-Qaida IPB vs California ATC – Boston and Schipol ATC – Boston and Schipol –Proliferation of DEW-weapons?

SNDC/CATS 0802 LN Physical Digital Target Tool Physical EM(DEW + digital) (a) Conventional Terrorism (Oklahoma City Bombing) (b) IRA attack plan on London Power Grids, July 1996 (c) Spoof (or HPM) Air Traffic Control to crash plane (d) “Pure” Cyber Terrorism (Trojan horse in public switched networks) Infrastructure Threat Matrix Critical Infrastructure Threat Matrix Cell (d) the most difficult to detect and counter

SNDC/CATS 0802 LN A scenario Airbus over Schipol or LAX Airbus over Schipol or LAX DEW or ”can-bomb” DEW or ”can-bomb” TV-camera or ”celluar-camera” TV-camera or ”celluar-camera”  9/11-effect…!

SNDC/CATS 0802 LN The International Context

SNDC/CATS 0802 LN Three Challenges Management issues (”bending pipes”) International Co-operation, Regimes etc International law (”use of force”) etc Domestic tasks International tasks

SNDC/CATS 0802 LN Some examples Conflict between East Timor and Indonesia in the end of Conflict between East Timor and Indonesia in the end of –The website (the ”.tp”-domain) of the East Timor independence movement located in Ireland was ”shot down” Indonesian Intelligence service suspected. “e-Jihad” “e-Jihad” –Attack on the Israeli Land Register Authority routed over Berlin and London Estonia Spring 2007 Estonia Spring 2007 Who´s law applies? Who´s law applies? What are the ROE`s for governments and LEA? What are the ROE`s for governments and LEA?

SNDC/CATS 0802 LN Collective Security in Cyberspace There are no borders in Cyberspace! There are no borders in Cyberspace! A cyber-intrusion could be routed from country A through country B, C and D before it ends up in country E. A cyber-intrusion could be routed from country A through country B, C and D before it ends up in country E. How can we trace back these intrusions? How can we trace back these intrusions? –Today: International Law Enforcement or private initiatives (FIRST etc) –Tomorrow: ”Fishwebs” between national CERT:s for tracing intrusions back in real time?

SNDC/CATS 0802 LN Country X Country E Country C Country D Country ACountry B Country Y Country Z Building “fishwebs” in Cyberspace UN, ITU etc

SNDC/CATS 0802 LN How to get an IA outreach? Closed technical and other arrangements (Five-eyes etc) has limited relevance when IT-attacks could pass through 192 countries Closed technical and other arrangements (Five-eyes etc) has limited relevance when IT-attacks could pass through 192 countries Global approach needed Global approach needed –How to deny “safe havens”? –What kind of incentives (“sticks and carrots”)? –Could the Stanford Treaty be a model?

SNDC/CATS 0802 LN Three Challenges Management issues (”bending pipes”) International Co-operation, Regimes etc International law (”use of force”) etc Domestic tasks International tasks

SNDC/CATS 0802 LN Conclusions of the Estonian case for Crisis Management  Enhancement of the security policy toolbox? –A state actor (with big resources) can act through cyber attacks and still conceal it's involvement.  Cyber attacks can be used in several ways: –As an add-on to economic sanctions or other non-miltary means of power projection (The Estonia Case) –As a force multiplier (taking out emergency systems after bomb attacks)  To improve preparedness and contingency planning in this area there is a need for: –Operational experience (More of Red Team exercises to detect critical vulnerabilities i societal networks, a GovCERT working 24/7 etc) –Cooperation – between agencies, private-public and international

SNDC/CATS 0802 LN Swedish IO and International Law* The use of cyber-weapons to attack information systems does not constitute violence in terms of international law but it may nevertheless contravene international law. At the same time it should be possible to make use of such weapons within the provision of the UN Charter (Article 41) – given an appropriate UN Resolution and consequent legal mandate – in order to uphold sanctions or for other conflict prevention measures even though this has hitherto not happened. A more flexible arsenal of non-violent measures of this type would be in line with traditional Swedish policy in this field. Another legal question is how, using measures permitted under international law, it is possible to bring to book, for example, terrorists who make use of such weapons. An international review of the provision of international law would be of interest to Sweden, with regard both to cyber-attacks perpetrated by states or individuals and to the possibility of using such a weapon as an instrument of sanction enforcement. *Parliament Decision 1999 (99/00:30)

SNDC/CATS 0802 LN Conclusion Areas of international co-operation Doctrines concerning use of IO/IW under UN or other international legal auspices (international operations, upholding sanctions etc.) Doctrines concerning use of IO/IW under UN or other international legal auspices (international operations, upholding sanctions etc.) Principles of building Regimes for defensive actions taken in Cyberspace (tracing, counterhacking etc.) Principles of building Regimes for defensive actions taken in Cyberspace (tracing, counterhacking etc.)

SNDC/CATS 0802 LN Q&A