Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.

Slides:



Advertisements
Similar presentations
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Advertisements

Homeland Security and Law Enforcement Created By: Ashley Spivey For _Local_Actions_for_Homeland_Security.pdf.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Sensors and location technologies – the front end of ISR
David A. Brown Chief Information Security Officer State of Ohio
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Brian Connett, LCDR, USN US NAVAL ACADEMY
Rob Gaston 04/04/2013 CIS 150. Cyber Warfare  U.S. government security expert Richard A. Clarke, Cyber War (May 2010): "cyber warfare" is "actions by.
Computer Security Fundamentals
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
DHS, National Cyber Security Division Overview
COMP 2903 A21 – The Evolution of Cyber Warfare Danny Silver JSOCS, Acadia University.
Cyber-Warfare Analyzed by: Josh Burleson Brian Epp Chrissy Miller Martin Vanis “Cyber attacks…is not in any way comparable to weapons of mass destruction.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Wars Games By: Chris Hill. What is a Cyberwar? Cyberwar is a type of warfare that is all electronic attach instead of a physical attack which involves.
Network Security of The United States of America By: Jeffery T. Pelletier.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
The role of private security in the protection of critical infrastructures Veerle Pashley Free University of Brussels Department of Criminology.
10 th American History Unit III- U.S. Foreign Policy World War II - Today Nixon-Bush #9 George Bush’s Foreign Policy.
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
Spy v. Spy: Espionage, 1947-Present Dr. David R Smith Ohio Northern University.
Current Military Expenditures Top 20 United States$305.4 Billion Russia $55.0 Japan $41.1 China $37.5 United Kingdom $34.6 France $29.5 Germany $24.7 Saudi.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
China’s Rise and Cyberspace: Strategic Challenges for the U.S. James Mulvenon, Ph.D. 10 September 2009.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
BAE Systems Small Business Program
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
Chapter 17: Foreign Policy and National Defense Section 2.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Current State of Cyber Security and How to Defend Your Data.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Nation State Actors Lex Dunlap.
Federal Bureau of Investigation
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Understanding the Threats of and Defenses Against Cyber Warfare
California Cybersecurity Integration Center (Cal-CSIC)
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Cyber Crimes Chunlian QU 9/18/2018.
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
PGE Chris Nolke, Director of Cybersecurity
Evolution Of Cybersecurity
Assessing Deterrence Options for Cyberweapons
Dominic DeSoto, Jay Jackson IA 455 Oct. 23, 2017
Foreign Policy and National Defense
Strategic threat assessment
4/27/2019 Cyberwar Fiction, Facts, and the Future of Arms Control Ralf Bendrath, Berlin FoG:IS Forschungsgruppe Research Group on the Informationsgesellschaft.
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Prevention, Intelligence
Foreign Policy and National Defense
Presentation transcript:

Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014

Cyber Capabilities – U.S. Offense Aggressive espionage through the planting of logic bombs in foreign countries’ infrastructure in preparation of potential cyber warfare Exploitation of system vulnerabilities and ability to create back doors using cyberweaponry Pretargeted cyber weapons Global connectivity maps giving rise to “network situational awareness,” which shows geographical location, software, potential malware infections, and exploitations Defense The Department of Defense, the Department of Homeland Security, and the Federal Bureau of Investigation Task forces and cyber squads specially trained to identify and combat detected computer and network intrusions National Strategy to Secure Cyberspace: s/2010/0410_cybersec/docs/cyberspa ce_strategy%5B1%5D.pdf s/2010/0410_cybersec/docs/cyberspa ce_strategy%5B1%5D.pdf (U.S. Department of Justice, 2013)

Cyber Capabilities – China Offense Implementation of logic bombs in countries’ systems that have potential to be a threat in the future, or countries whose information is worth taking Asymmetric Warfare – Using obsolete forms of weaponry and combat against one more advanced Knowledge syphoning leading to leaps and bounds in technological prowess Defense Information Dominance – The country with the most gathered information is the country that prevails Ability to cut off sections of power to forego an entire blackout to a better extent than the U.S. Lowered dependence on network systems (Clarke & Knake, 2012)

Cyber Capabilities – Russia Offense Heightened espionage and exploitation abilities that are rarely exposed Broad view of information espionage that is integrated in military tactics ◦ “…intelligence, counterintelligence, deceit, disinformation, electronic warfare, debilitation of communications, degradation of navigation support, psychological pressure, degradation of information systems and propaganda.” Perfected Distributed Denial of Service attacks and botnets through test runs Defense Integrated military tactics are within the boundaries of Russian law Three main security objectives: ◦ Protect strategically important information ◦ Protect against dangerous foreign information ◦ Instill patriotism and values in citizens Uses youth groups to enact risky actions for added security and diminished pay (Smith, 2012)

Cyber Capabilities – Others “Other nations known to have skilled cyber war units are Israel and France. U.S. intelligence officials have suggested that there are twenty to thirty militaries with respectable cyber war capability, including those of Taiwan, Iran, Australia, South Korea, India, Pakistan, and several NATO states.” (Clarke & Knake, 2012)

Cyber Capabilities – Others Offense Australia – Developing offensive techniques that could destroy systems, exploitation of cyber power (Joye & Kerin, 2013) North Korea – Training for youth to become professional hackers, No. 91 Office (for computer hacking), espionage, DDoS attacks (Paganini, 2012) Defense Australia – Attractive target for attackers, Cyber Security Operations Centre responds to large threats (Joye & Kerin, 2013) North Korea – Lab 110 (technology reconnaissance team) (Clarke & Knake, 2012)

Who Might Win in a Real Cyberwar? It is difficult to say who would win in the event of a cyber war, as victory would depend on numerous factors that are difficult – if impossible – to predict. A country must display prominent tactics regarding both the offensive and defensive capabilities, unless a one-hit offense were enacted at the very beginning. Armed with the best possible reaction times and defense plans in a cyber crisis, to allow for recovery and counteraction to take place, has potential to offer stability in a nation hit by a cyber attack. In the end, however, it is all a matter of who is left standing after the damage has been done.

Sources Berman, I. (2012, April 26). The Iranian Cyber Threat to the U.S. Homeland. Retrieved from The House Committee on Homeland Security: Clarke, R. A., & Knake, R. K. (2012). Cyber War. New York: HarperCollins. Joye, C., & Kerin, J. (2013, May 6). Australia developing offensive cyber capabilities. Retrieved from Financial Review: ZL7tI ZL7tI Paganini, P. (2012, June 11). Concerns Mount over North Korean Cyber Warfare Capabilities. Retrieved from Infosec Island: Korean-Cyber-Warfare-Capabilities.htmlhttp:// Korean-Cyber-Warfare-Capabilities.html Schneier, B. (2013, June 21). US Offensive Cyberwar Policy. Retrieved from Schneier on Security: Smith, D. J. (2012, July). Russian Cyber Operations. Retrieved from Potomac Institute Cyber Center: U.S. Department of Justice. (2013). FBI — Cyber Crime. Retrieved from The Federal Bureau of Investigation: