100 likes | 224 Views
ADVERSARIES IN CYBERSPACE. ACTORSRESPONDERS Nation States with Info War CapabilitiesPvt, Military
E N D
1.
World Federation of Scientists
40th Session
International Seminars on Planetary Emergencies
August 21, 2008
Jody R. Westby, Esq.
3. NEED FOR RESPONSE COORDINATION At Time of Attack Not Possible to Know Who Attacker Is – Attribution is one of biggest problems
Response Baton May Have to Pass From Private Sector to Law Enforcement to Military
Requires Swift Coordination, Certainty on Legal Authority for Actions
Requires Information Sharing & Public-Private Sector Coordination
85% of U.S. Critical Infrastructure Owned by Private Sector
95% of DoD’s Global Telecom Needs Satisfied by Private Networks
4. STATE OF CYBER WARFARE U.S. Government Engaged in Cyber Warfare Probably More Than Any Other Nation
In 1982, CIA Exploited Software Transferred to Soviet Union That Operated Pumps, Turbines, & Valves of Pipeline. Caused Software to Malfunction and Reset Pump Speeds and Valve Settings. Result was Largest Non-Nuclear Explosion and Fire Ever Seen From Space. 3 Kilotons TNT Equivalent – Hiroshima Was 14-20 Kilotons TNT
Operation Desert Storm in 1991: Strategic Air Command Targeted Command, Control, Communications Systems, Electrical Grids, & Key Infrastructure
Estonia: Month of Attacks, Shut Down Govt Systems, Banks, Newspapers, Called in NATO, EU, Cyber Experts, Blocked Traffic
Georgia: Attacks Since June, Govt Web Sites, DDoS, Russian Business Network & Russian Govt, Blocked .ru traffic
120 Countries With Cyber Warfare Capabilities; Terrorists With High Level of Skills, Rogue Actors (Bot Herders); US has Joint Functional Component Command Network Warfare (JFCCNW)
5. GEO-CYBER CONSIDERATIONS Cyber Warfare Impacts Geo-Cyber Stability
Geo-Cyber –
Relationship Between Internet & the Geography, Demography,
Economy & Politics of a Nation & its Foreign Policy
Geo-Cyber Security –
Ability to Protect Infrastructure, Systems & Information of a Nation From
Intrusion, Attack, Espionage, Sabotage, & Other Forms of Negative or
Criminal Activity That Could Undermine Its National & Economic Security
6. OPEN QUESTIONS
Who on the Public & Private Sector Sides Can Approve Military Use of
Network?
Is More Than One Network Required? How Is This Negotiated?
What Assistance or Permissions Are Needed From Other Countries?
Can Governments Take Over Private Sector Network?
What About Risk to Network & Private Sector Fiduciary Duty to Shareholders?
When Can Governments Intervene On Behalf Of Private Sector in
Event of Cyber Attacks?
What is Private Sector Role? What Can the Government Ask the
Private Sector to Do?
Who Is Responsible For Damage to Networks Damaged in an Attack?
11. THANK YOU!
Jody R. Westby
202.255.2700
westby@globalcyberrisk.com