CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
International CyberSecurity Collaboration: The Technical Cooperation Program Approved for public release; distribution is unlimited. 09 March 2010 Joshua.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Executive Cabinet.  Cabinet – group of advisors to the President that includes all of the heads of the 15 top-level executive departments  First Lady.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
August 2011Beyond the Border1 Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness CSG-ERC Canada-U.S. Relations Committee.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
Section 4 I can explain the presidential advisors I can describe the executive agencies.
Presidential Advisers and Executive Agencies
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Article 2 Executive Branch
Chapter 17: Foreign Policy and National Defense
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Citizenship Issues C.I.4 U.S. Domestic and Foreign Policy Students are able to: 4.2 Describe U.S. foreign policy. Students may indicate this by: – Defining.
Excellence in science The Royal Society is the independent scientific academy of the UK dedicated to promoting excellence in science. Royal Society’s work.
Chapter 9: The Executive Branch
Workshop Positions Data Collection /Assessment Thursday, June 2 nd How Can We Make “International Strategy for Cyberspace” Acceptable?
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
The Public Health Approach to Firearm Violence What is it, Why Do We Need It? Victor W. Sidel, MD Distinguished University Professor of Social Medicine.
Yangon, Myanmar, November 2013 Cybersecurity-Related Standardization Initiatives in the EU and the U.S.: Lessons for Developing Countries Nir Kshetri.
FOREIGN AFFAIRS. Isolationism to Internationalism For more than 150 years, the American people were chiefly interested in domestic affairs, or what was.
Section Outline 1 of 12 American Foreign Policy Section 3: Foreign Policy in Action I.Foreign Policy Through World War II II.The Cold War III.Today’s Challenges.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
The ESDP debate- the Convention on the Future of Europe.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Chapter 14 Section 5 Objective: To understand the executive agencies and the role of the cabinet.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
The Executive Branch: The Chief Executive Unit 6: The Executive Branch and Bureaucracy.
The Roles of the President
Chapter 13 The Presidency. The Many Roles of the President chief of state – the role of the president as the ceremonial head of government chief executive.
Ayman Irziqat Katarzyna Kosarska Sergio Pradel 1.
“Executive Departments & Cabinet” “Independent Agencies and Regulatory Commissions.
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Digital Enlightenment.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
New approach in EU Accession Negotiations: Rule of Law Brussels, May 2013 Sandra Pernar Government of the Republic of Croatia Office for Cooperation.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
THE EXECUTIVE BRANCH Chapter 7 (part 2). Foreign Policy Primary goal of foreign policy – national security – the ability to keep the country safe from.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Cyber Security and Georgia. New Challenges
The Executive Branch.
Cyberwar Becomes a Reality
Chapter 10 The Presidency.
“Existing world order is being redefined.” Henry Kissinger Jan 2015
Chapter 22 Foreign Policy
Saturday Night Live youtube. com/watch
The President and Foreign Policy
Homeland Security v. Homeland Defense: The Big Gap
“Foreign Affairs and Diplomacy” Page
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
Cybersecurity in Belarus a general overview of support areas
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
Presidential Approaches to Cybersecurity
The Presidency Why do you think it is the most visible part of the American political system? Does the President really serve the needs of the American.
The Roles of the President
Trust and Security Unit
TOWARD A COLLECTIVE SPACE SECURITY
Cyber Security Ecosystem of Georgia. Experience and Challenges
The Roles of the President
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
UNODC and CYBERCRIME October 2009.
Presentation transcript:

CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International Trade George Mason University (School of Public Policy) Dr. Malawer -- Oxford Cybersecurity Workshop (August 2009) 1

Introduction. Cybersecurity is the newest and most unique national security issue of the 21st century. The most critical aspect of this issue is the notion of cyberwarfare, which is the use of computer technologies as both defensive and offensive weapons in international relations. Until now, there has been no national debate within the United States or elsewhere over the concept of cyberwarfare. Dr. Malawer -- Oxford Cybersecurity Workshop (August 2009) 2

Approach. First, I examine recent government and private reports on cybersecurity and cyberwarfare. Second, I outline what I consider the major issue that confronts the United States and the global system as they struggle to address the dangers of cyberwarfare. Third, I conclude by proposing a method to begin structuring a comprehensive security strategy, taking into consideration the many domestic and global stakeholders. Dr. Malawer -- Oxford Cybersecurity Workshop (August 2009) 3

Recent Events. In early July 2009, a wave of cyberattacks, presumably from North Korea, temporarily jammed South Korean and American government websites. This Korean episode followed quickly upon the heels of the already well- known Russian Federation’s cyberattacks against Estonia in 2007 and against Georgia in As a response to the increasing use of cyberattacks in international relations, Defense Secretary Robert Gates in June 2009 created a new military command concerning cybersecurity. President Obama addressed the issue of cybersecurity in a major speech on May 29, 2009, and proposed a Cybersecurity Czar. (May 29, 2009, Press Conference video.)Press Conference video This speech was accompanied by the release of the administration’s Cyberspace Policy Review. Dr. Malawer -- Oxford Cybersecurity Workshop (August 2009) 4

U.S. Policy & Legal Issues. Would the federal government monitor private-sector networks, thus raising a slew of privacy concerns and further fueling debates on wiretapping without warrants that were first raised during the Bush era? What would be the expanding role of the military in defensive, offensive and preemptive cyberoperations as the military and the intelligence agencies gear up for digital war? Where would the new “Cyber Czar” be located in the White House or elsewhere? What are the rules of international law concerning cyberwarfare? For example, its use when attacked and when can it be used prior to an attack? Have traditional international law rules concerning armed attack failed to keep current with technology and digital warfare? Dr. Malawer -- Oxford Cybersecurity Workshop (August 2009) 5

Recent Governmental and Expert Reports (2009). Cyberspace Policy Review – Assuring a Trusted and Resilient Information and Communications Infrastructure (White House, May 2009). Cyber Security Strategy of the United Kingdom – Safety, Security and Resilience in Cyber Space (U.K. Cabinet Office, June 2009). Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (National Academy of Sciences and National Research Council, 2009). Securing Cyberspace for the 44 th Presidency – A Report of the Center for Strategic and International Studies Commission on Cybersecurity for the 44 th Presidency (Center for Strategic and International Studies, December 2008). Dr. Malawer -- Oxford Cybersecurity Workshop (August 2009) 6

MAJOR ISSUE CONFRONTING THE U.S. AND GLOBAL SYSTEM. The major issue, in my opinion, that confronts the United States and other nations is the need to create a sustainable global legal structure that promotes cooperation among nations to confront cybersecurity and, more specifically, cyberwarfare. The traditional legal structure governing the use of force and armed attacks under the U.N. Charter needs to be greatly clarified in this digital era. For the United States, a major policy issue confronting it is whether if the best defense against cyberattacks is the use of robust offensive actions in cyberspace. Dr. Malawer -- Oxford Cybersecurity Workshop (August 2009) 7

Proposal. The “Convention on Cybercrime” adopted by the Council of Europe in 2001 is a good starting place, in addition to the U.N. Charter, in formulating a strategy to update the rules of law and to create a global governance structure regulating cyberwarfare. A diplomatic conference similar to the naval and disarmament conferences in the interwar period should be called. Attendees could draft a global treaty regulating cyberwarfare and create political institutions that would enforce the adopted rules. The most important set of rules would provide a genuine limit to the offensive use of cyberwarfare in international relations. Dr. Malawer -- Oxford Cybersecurity Workshop (August 2009) s Japanese aircraft carrier 2009 computer networks.