PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Promoting Cooperative Solutions for Space Security 1 Is Current International Humanitarian Law Sufficient to Regulate a Potential.
Overview An emerging challenge A belated response Debating the alternatives – Air-Sea Battle – A distant blockade – Maritime denial Conclusions.
CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions May 16, 2015 DRAFT1.
Cyberspace: The New and Evolving Global Battlefield Herb Lin The National Academies Some work supported by the MacArthur Foundation, Microsoft, and the.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
South Carolina Cyber.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
Protecting our Cyber Space Staying Ahead of the Game Basel Alomair National Center for Cybersecurity Technology (C4C) King Abdulaziz City for Science and.
William Y. Arms Using Technology to Manage Copyrighted Resources.
Network Security of The United States of America By: Jeffery T. Pelletier.
CYBER CRIME AND SECURITY TRENDS
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
Disaster & Smart City in Aging Society – Designing a secure and resilient smart city Smart City and Resiliency Jirapon Sunkpho College of Innovation Thammasat.
CSCE 727 Strategic Information Warfare. National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine.
17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
National Security Cyberspace #Anti-SecWarfare Overview.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
China’s Rise and Cyberspace: Strategic Challenges for the U.S. James Mulvenon, Ph.D. 10 September 2009.
Legal Advisor to the Executive Director
© 2004 VeriSign, Inc. RAPID GROWTH: LESSONS LEARNED FROM.COM/.NET VeriSign Bart Mackay February 2005.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
“Cyberdéfense” A French view on cyberwarfare S. TAILLAT CREC-ST CYR
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 17 - Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 213.
Grid Security and Advancements in Smart Grid Technology Dr. Veronika A. RABL Chair, IEEE-USA Energy Policy Committee Principal, Vision & Results Washington,
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Understanding the Threats of and Defenses Against Cyber Warfare.
CyberPatriot: Introduction to Cyber Security 9/10/10 Joshua White Director of CyOON R&D Everis Inc (315)
Government 1740 International Law Summer 2006 Lecture 9: The Use of Force.
Prime Minister's Office ISRAEL NATIONAL SECURITY COUNCIL Counter Terrorism Bureau Cyber Terrorism and its Impact on the Civilian Sector Brig. Gen. (Res.)
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Charlotte McClain-Nhlapo, Senior Operations Officer, Workshop on Innovation in Accessible Transport for All. 14 January 2010 Washington, DC.
Chapter 8 War and Strife. Security Issues Global trends, see: –Human security.
Emerging Global Trends and Strategic Challenges in the Coming Decade Marvin J. Cetron, President, Forecasting International June 12, 2012 Emerging Global.
Cyber Security and Infrastructure: Problems of Today, Challenges for Tomorrow Herb Lin Computer Science and Telecommunications Board NAE Convocation of.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Ensuring Cyberpeace in a New World Order Dr. Hamadoun Touré Secretary General International Telecommunications Union, Geneva.
International Law in Military Operations: a NATO practitioner’s views Mr. Vincent Roobaert Senior Legal Advisor NATO Communications and Information Agency.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
The Multi-Faceted Role of Maritime Training in and for NATO and Non-NATO Operations by Professor Kostas A. Lavdas* &  Dr. Marios P. Efthymiopoulos**
RESPONSIBLE BEHAVIOUR OF A STATE IN CYBERSPACE
Broadband Challenges 2017 Christopher Tamarin
GOVT Module 16 Defense Policy.
Maritime Security as an Integral Part of an
“The Cyber Security Challenge: What Can be Done
Cyber Warfare and Importance of Cyber Awareness
Understanding the Threats of and Defenses Against Cyber Warfare
Missile Defense and the SDI
Homeland Security v. Homeland Defense: The Big Gap
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
8 Building Blocks of National Cyber Strategies
Key Principles: A few preliminaries
Preventing Information Technology Crimes
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Deborah Housen-Couriel, ADV.
Presentation transcript:

PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010

Some Definitions Cyberattack Offensive cyber action to disable or cause to malfunction computer systems or networks or to alter or destroy the information or programs resident in or transiting those systems. Critical National Infrastructure C yber-dependent networks that affect the efficient functioning of society, including its economy and civil governance. Examples are: the electric power grid, gas and oil transmission, telecommunications, the internet, the financial system, transportation management, and many government services, including air traffic control. This infrastructure is essentially civilian, but the military is also a user.

Why States Are Attracted To This Form Of Attack Can have strategic effect with few direct casualties and little physical damage. –Strategic meaning actions to alter a state’s behavior, reduce its ability to prosecute a war, or undermine domestic support. Growing number of targets Inexpensive compared to all other forms of modern warfare and is potentially accessible to otherwise weaker states (asymmetric warfare.) A new form of coercion and retaliation without use of armed force (sub jus ad bellum) and arguably not subject to the restriction of UN Charter Article 2.

What Are The Barriers To Its Adoption And Use? Strong Barriers Technically difficult to prep targets and test in situ, and its effects are hard to predict reliably. Collateral and cascading damage inside and outside the target state. Weak Barriers Deterrence (high background and difficult forensic and attribution problems.) Cyber defense Legal norms (barring new agreements.)

President Obama’s Perspective It’s the great irony of our Information Age: the very technologies that empower us to create and to build also empower those who would disrupt and destroy. International norms are critical to establishing a secure digital infrastructure. Only by working with international partners can the United States address the challenges of network defense and response to cyber attacks.

Future Prospects An increasing number of states will, without acknowledgment, pursue the development of cyberattack capability. States with highly evolved networks will make a major effort to secure those networks, but with uncertain outcomes. There may be some progress toward establishing norms against use affecting civil targets, perhaps beginning with a no first-use commitment (or convention.)