China’s Rise and Cyberspace: Strategic Challenges for the U.S. James Mulvenon, Ph.D. 10 September 2009.

Slides:



Advertisements
Similar presentations
Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
Advertisements

James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Jacky Altal. T O C  Hackers Terminology  Cyber attacks in 2012 (so far…)  Nations Conflict  Cyber Motives  Characteristics of CyberCrime  DEMO –
BUILDING THE BRIDGE-- USC CHINA RESEARCH INSTITUTE James Ellis Senior Executive Director for Global Initiatives.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Computer Crimes Chapter 9. Definition  Illegal act that involves a computer system or computer-related system  Telephone, microwave, satellite telecommunications.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions May 16, 2015 DRAFT1.
Cyber-Warfare Analyzed by: Josh Burleson Brian Epp Chrissy Miller Martin Vanis “Cyber attacks…is not in any way comparable to weapons of mass destruction.
Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.
China’s Aggressive Actions 1.Political 2.Economic 3.Military.
Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network.
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Emergency Management & Homeland Security Interface Samuel Musa National Defense University.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Disaster & Smart City in Aging Society – Designing a secure and resilient smart city Smart City and Resiliency Jirapon Sunkpho College of Innovation Thammasat.
International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) Presentation to: Insider Threat SOAR Workshop.
Information Warfare Playgrounds to Battlegrounds.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Workshop Positions Data Collection /Assessment Thursday, June 2 nd How Can We Make “International Strategy for Cyberspace” Acceptable?
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
First Nuclear Age, s Bipolarity – balance Deterrence – vulnerability Arms Control – Managing rivalry Rationality Second.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
“Cyberdéfense” A French view on cyberwarfare S. TAILLAT CREC-ST CYR
Focus points 1.What major ICT changes and transformations are coming 2. What opportunities will these give to agriculture 3. What issues do we need to.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 17 - Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 213.
Technology and National Security PGMs RMA Cyber war? Robotics?
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Information Warfare Playgrounds to Battlegrounds.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Chinese Hackers Tyler McGough & Douglas Edmonson.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 2: 25 March 2006.
The 5th International Conference on Internet of Things 2015 Coex, Soeul, S. Korea Oct , 2015 Internet of Processes Vladimír Kebo, Center of Advanced.
Technical Arms Control Work At IIS, Tsinghua Li Bin Tsinghua University East Asia Science & Security Network Nov 3, 2007; Beijing, China.
Ayman Irziqat Katarzyna Kosarska Sergio Pradel 1.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Ensuring Cyberpeace in a New World Order Dr. Hamadoun Touré Secretary General International Telecommunications Union, Geneva.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Energy security issues and policy implications: Topics within the scope of the study Geopolitical considerations of energy supply/delivery/use – Implications.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
Bipolarity Deterrence Arms Control Rationality Multipolarity
Cyber Security – An Existential Threat? (IIC, Singapore)
The vulnerability of economic markets to crime in 2015
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
Cyberwar Becomes a Reality
“Existing world order is being redefined.” Henry Kissinger Jan 2015
Technology and National Security
Technology and National Security
Panel Discussion: C4I Solutions for Combating
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 21 March 2018.
CYBER SPACE ASIA 2018.
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
The University of Adelaide, School of Computer Science
An Urgent National Imperative
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
Evolution Of Cybersecurity
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 26 September 2018.
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Keeping the Lights on in a Dangerous World
Seapower in the 21st Century
Presentation transcript:

China’s Rise and Cyberspace: Strategic Challenges for the U.S. James Mulvenon, Ph.D. 10 September 2009

Outline US-PRC strategic cyber dilemmas Beijing’s strategic perspective on cyberspace China and cyber as a tool of state power Chinese military views of computer network operations US, China, and cyberspace: the long-term view

US-PRC Strategic Cyber Dilemmas China: cyber threat, world’s IT workshop, or both? US-China cyber dilemma as microcosm of larger US- China strategic relationship US-China vs. US-USSR Bilateral relations = difficult tradeoffs

Beijing’s and Cyberspace: Contradictions, Anyone? Chinese philosophy and Hegelian/Marxist “science” centers on contradictions and their resolution China’s great information security “balancing act” –Desire: Access to global technology R&D and production –Desire: Connection to global information grid –Fear: Use of ICTs to undermine Beijing government Myths about the Internet and authoritarian regimes –How has China beaten the odds?

China and Cyber as a Tool of State Power China and Russia: cyber is a legitimate element of state power –Examples: patriotic hackers, Estonia, Georgia –More comfortable than US in overt use –Publicity and public opprobrium have had no effect Uses of cyber –Cyber/technology espionage –Intelligence preparation of the battlefield –Psyops, influence operations, denial and deception

Chinese Military Views on Computer Network Operations Why the PLA is attracted to CNO –Range and targets –US dependencies and vulnerabilities How would the PLA use CNO –CNO and the Taiwan scenario centers of gravity –Connection to the “intrusion set” Assessing PLA cyber capabilities Implications of PLA CNO for US defense –Attribution challenges –Deterrence challenges

US, China, and Cyberspace: The Long-Term View Short-term: cyber espionage Short-medium term: CNO and the Taiwan scenario Long-term –Supply chain –CFIUS –Infrastructure –Internet governance –IT standards