1 / 10

World Federation of Scientists 40th Session International Seminars on Planetary Emergencies August 21, 2008 Jody R. We

ADVERSARIES IN CYBERSPACE. ACTORSRESPONDERS Nation States with Info War CapabilitiesPvt, Military

amable
Download Presentation

World Federation of Scientists 40th Session International Seminars on Planetary Emergencies August 21, 2008 Jody R. We

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. World Federation of Scientists 40th Session International Seminars on Planetary Emergencies August 21, 2008 Jody R. Westby, Esq.

    3. NEED FOR RESPONSE COORDINATION At Time of Attack Not Possible to Know Who Attacker Is – Attribution is one of biggest problems Response Baton May Have to Pass From Private Sector to Law Enforcement to Military Requires Swift Coordination, Certainty on Legal Authority for Actions Requires Information Sharing & Public-Private Sector Coordination 85% of U.S. Critical Infrastructure Owned by Private Sector 95% of DoD’s Global Telecom Needs Satisfied by Private Networks

    4. STATE OF CYBER WARFARE U.S. Government Engaged in Cyber Warfare Probably More Than Any Other Nation In 1982, CIA Exploited Software Transferred to Soviet Union That Operated Pumps, Turbines, & Valves of Pipeline. Caused Software to Malfunction and Reset Pump Speeds and Valve Settings. Result was Largest Non-Nuclear Explosion and Fire Ever Seen From Space. 3 Kilotons TNT Equivalent – Hiroshima Was 14-20 Kilotons TNT Operation Desert Storm in 1991: Strategic Air Command Targeted Command, Control, Communications Systems, Electrical Grids, & Key Infrastructure Estonia: Month of Attacks, Shut Down Govt Systems, Banks, Newspapers, Called in NATO, EU, Cyber Experts, Blocked Traffic Georgia: Attacks Since June, Govt Web Sites, DDoS, Russian Business Network & Russian Govt, Blocked .ru traffic 120 Countries With Cyber Warfare Capabilities; Terrorists With High Level of Skills, Rogue Actors (Bot Herders); US has Joint Functional Component Command Network Warfare (JFCCNW)

    5. GEO-CYBER CONSIDERATIONS Cyber Warfare Impacts Geo-Cyber Stability Geo-Cyber – Relationship Between Internet & the Geography, Demography, Economy & Politics of a Nation & its Foreign Policy Geo-Cyber Security – Ability to Protect Infrastructure, Systems & Information of a Nation From Intrusion, Attack, Espionage, Sabotage, & Other Forms of Negative or Criminal Activity That Could Undermine Its National & Economic Security

    6. OPEN QUESTIONS Who on the Public & Private Sector Sides Can Approve Military Use of Network? Is More Than One Network Required? How Is This Negotiated? What Assistance or Permissions Are Needed From Other Countries? Can Governments Take Over Private Sector Network? What About Risk to Network & Private Sector Fiduciary Duty to Shareholders? When Can Governments Intervene On Behalf Of Private Sector in Event of Cyber Attacks? What is Private Sector Role? What Can the Government Ask the Private Sector to Do? Who Is Responsible For Damage to Networks Damaged in an Attack?

    11. THANK YOU! Jody R. Westby 202.255.2700 westby@globalcyberrisk.com

More Related