SlideShare a Scribd company logo
1 of 27
Cybersecurity Law and Policy
Summit One
Spring 2021
Prof. David Opderbeck
© 2020 - 2021 David W. Opderbeck
Creative Commons Attribution / Share-Alike
Introduction
Block Activity
1:15 – 2:15 Intro, Lecture
2:15-2:30 Break
2:30-3:00 Group Work Set Up
3:00 – 4:00 Kenneth Geers
4:00 – 4:15 Break
4:15 – 5:00 Group Work
5:00 – 6:00 Jamil Jaffer
6:00 – 6:15 Break
6:15 – 7:15 Group Work Reports; Preview Upcoming
Weeks
•“[W]herever there is historical
tension in the ‘real world’, there is
now parallel tension in cyberspace.”
– Kenneth Geers
Dynamics of Cyber Incidents
• After the Cold War, a new East vs. West: Russia, China – and North
Korea and Iran – vs. the U.S.
• Some activity in other Asian countries: India, Vietnam
• Cyber Incidents often follow on other international incidents
• Increasing efforts to influence the democratic process / public opinion
Tools of Information and Influence
• Signals Intelligence (SIGINT): information
from “public” sources
• Espionage: gathering of private or classified
information, including through human
intelligence (HUMINT)
• Propaganda: non-objective information,
often misleading, to publicize a viewpoint
• Diplomacy: managing international relations
through designated representatives
• Soft power: exertion of economic or cultural
influence
• Hard power: economic or military coercion
Cyber Infrastructure and National Security
• Cyber infrastructure is essential to every aspect of
• The national and international economy
• Military systems and national defense
• Cultural exchange, speech, and private association
• Most critical cyber infrastructure is privately owned
• “Code” layer is open by design
• Live cyber threat maps:
• https://www.fireeye.com/cyber-map/threat-map.html
• Side note: 12/2020 attack on FireEye
• https://cybermap.kaspersky.com/
March 15, 2018 CERT Report
April 3, 2018 News Report
“A cyber attack that hobbled the electronic communication system used
by a major U.S. pipeline network . . . .” (Bloomberg News)
February 2021 – Florida
Water Treatment Plant
• Plant operator noticed someone was controlling his
screen
• Hacker adjusted level of sodium hydroxide (lye) which
is used in small amounts to regulate water PH.
• COTS Remote Access Tool (RAT) used (remote
workers)
• All computers used same password for remote access
• Computers connected to Internet with no firewall
• Computers at facility also used 32-bit version of
Windows 7
SolarWinds
2020 U.S. Cyberspace Solarium Commission
Report
• Operationalize Cybersecurity Collaboration with the Private Sector. Unlike
in other physical domains, in cyberspace the government is often not the
primary actor. It must support and enable the private sector. The
government must build and communicate a better understanding of
threats, with the specific aim of informing private-sector security
operations, directing government operational efforts to counter malicious
cyber activities, and ensuring better common situational awareness for
collaborative action with the private sector. While recognizing that private-
sector entities have primary responsibility for the defense and security of
their networks, the U.S. government must bring to bear its unique
authorities, resources, and intelligence capabilities to support these actors
in their defensive efforts.
2020 U.S. Cyberspace Solarium Commission
Report
• Preserve and Employ the Military Instrument of National
Power. Future crises and conflicts will almost certainly contain a cyber
component. In this environment, the United States must defend
forward to limit malign adversary behavior below the level of armed
attack, deter conflict, and, if necessary, prevail employing the full
spectrum of its capabilities. Conventional weapons and nuclear
capabilities require cybersecurity and resilience to ensure that the
United States preserves credible deterrence and the full range of
military response options. Across the spectrum from competition to
crisis and conflict, the United States must ensure that it has sufficient
cyber forces to accomplish strategic objectives through cyberspace.
International Law for Cybersecurity
•There is no international cybersecurity
treaty
•International law of war may apply
Legal Frameworks: War, Espionage, and
Domestic Law
• International Law
• Conduct of War: UN Convention
• Espionage: unclear
• Maybe covered by some human rights norms
• Maybe covered by some aspects of customary international law
• But here, “everybody does it” matters
• Domestic Law of Foreign Nations
• Espionage activities are usually crimes, but seldom prosecuted even if
attribution / extradition is possible
Cyber Arms Control?
• Difficult Because:
• It is difficult to measure the relative strength of states in cyberspace;
• There is uncertainty regarding the military effects of cyber
technology;
• The challenges of monitoring compliance; and
• Difficulties with enforcement.
From: Borghard and Lonergan, Why are
There No Cyber Arms Control
Agreements, CFR January 16, 2018
Group Work
• Should some framework
analogous to the WPR be adopted
for cyber operations? What kind
of details should it include? How
would you address the kinds of
Constitutional issues raised by the
WPR?
• Should the international
community adopt a cyber arms
control treaty? What limits should
it contain? If such a treaty were
adopted, should the U.S. accede
to it?
WPR Framework
Congress: Power to
Declare War; Power of
the Purse
President: Commander-in-Chief
WPR
Hostilities short of declared
war:
• Notify Congress
• Forces must be
withdrawn after 60 days
if Congress does not
issue an AUMF
Constitutional Issues with WPR
• Congress’ power to enact (N&P?)
• Separation of Powers – President’s inherent power to employ military
short of war
• Legislative Veto
Kenneth Geers
Group Work
• Should some framework
analogous to the WPR be adopted
for cyber operations? What kind
of details should it include? How
would you address the kinds of
Constitutional issues raised by the
WPR?
• Should the international
community adopt a cyber arms
control treaty? What limits should
it contain? If such a treaty were
adopted, should the U.S. accede
to it?
Jamil Jaffer
• Group Presentations
• Looking Ahead
Wrap Up

More Related Content

What's hot

Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityCareer Communications Group
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...CODE BLUE
 
Tallinn manual 2.0 Prof. Michael Schmitt
Tallinn manual 2.0   Prof. Michael SchmittTallinn manual 2.0   Prof. Michael Schmitt
Tallinn manual 2.0 Prof. Michael SchmittJeffreyCarr7
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationCharles Mok
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)Pukhraj Singh
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentInternet Law Center
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
 
Commission on Wartime Contracting in Iraq and Afghanistan
Commission on Wartime Contracting in Iraq and AfghanistanCommission on Wartime Contracting in Iraq and Afghanistan
Commission on Wartime Contracting in Iraq and Afghanistanjddurso
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacyblogzilla
 

What's hot (20)

Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National Priority
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Tallinn manual 2.0 Prof. Michael Schmitt
Tallinn manual 2.0   Prof. Michael SchmittTallinn manual 2.0   Prof. Michael Schmitt
Tallinn manual 2.0 Prof. Michael Schmitt
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Commission on Wartime Contracting in Iraq and Afghanistan
Commission on Wartime Contracting in Iraq and AfghanistanCommission on Wartime Contracting in Iraq and Afghanistan
Commission on Wartime Contracting in Iraq and Afghanistan
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to Cybersecurity Law and Policy Summit One Agenda

An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of GovernmentsRobbie Mitchell
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Revisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurityRevisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurityMaarten Van Horenbeeck
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsLeonardo
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsAllan Cytryn
 
2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...Ethan S. Burger
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghPukhraj Singh
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer wormSumaiya Ismail
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Jack Whitsitt
 

Similar to Cybersecurity Law and Policy Summit One Agenda (20)

An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Revisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurityRevisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurity
 
Case study 11
Case study 11Case study 11
Case study 11
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
 
2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
 

More from David Opderbeck

IXPs and Competition Policy
IXPs and Competition PolicyIXPs and Competition Policy
IXPs and Competition PolicyDavid Opderbeck
 
Contact Tracing Apps and Privacy: The German Experience
Contact Tracing Apps and Privacy: The German ExperienceContact Tracing Apps and Privacy: The German Experience
Contact Tracing Apps and Privacy: The German ExperienceDavid Opderbeck
 
Artificial Rights and Virtue
Artificial Rights and VirtueArtificial Rights and Virtue
Artificial Rights and VirtueDavid Opderbeck
 
Cybersecurity Skills: Email Tracing and Legal Process
Cybersecurity Skills:  Email Tracing and Legal ProcessCybersecurity Skills:  Email Tracing and Legal Process
Cybersecurity Skills: Email Tracing and Legal ProcessDavid Opderbeck
 

More from David Opderbeck (7)

AI and Privacy
AI and PrivacyAI and Privacy
AI and Privacy
 
IXPs and Competition Policy
IXPs and Competition PolicyIXPs and Competition Policy
IXPs and Competition Policy
 
Contact Tracing Apps and Privacy: The German Experience
Contact Tracing Apps and Privacy: The German ExperienceContact Tracing Apps and Privacy: The German Experience
Contact Tracing Apps and Privacy: The German Experience
 
Artificial Rights and Virtue
Artificial Rights and VirtueArtificial Rights and Virtue
Artificial Rights and Virtue
 
Google v. Oracle
Google v. OracleGoogle v. Oracle
Google v. Oracle
 
Cybersecurity Skills: Email Tracing and Legal Process
Cybersecurity Skills:  Email Tracing and Legal ProcessCybersecurity Skills:  Email Tracing and Legal Process
Cybersecurity Skills: Email Tracing and Legal Process
 
Skillsclass2a
Skillsclass2aSkillsclass2a
Skillsclass2a
 

Recently uploaded

Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 

Recently uploaded (20)

Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 

Cybersecurity Law and Policy Summit One Agenda

  • 1. Cybersecurity Law and Policy Summit One Spring 2021 Prof. David Opderbeck © 2020 - 2021 David W. Opderbeck Creative Commons Attribution / Share-Alike
  • 2. Introduction Block Activity 1:15 – 2:15 Intro, Lecture 2:15-2:30 Break 2:30-3:00 Group Work Set Up 3:00 – 4:00 Kenneth Geers 4:00 – 4:15 Break 4:15 – 5:00 Group Work 5:00 – 6:00 Jamil Jaffer 6:00 – 6:15 Break 6:15 – 7:15 Group Work Reports; Preview Upcoming Weeks
  • 3. •“[W]herever there is historical tension in the ‘real world’, there is now parallel tension in cyberspace.” – Kenneth Geers
  • 4. Dynamics of Cyber Incidents • After the Cold War, a new East vs. West: Russia, China – and North Korea and Iran – vs. the U.S. • Some activity in other Asian countries: India, Vietnam • Cyber Incidents often follow on other international incidents • Increasing efforts to influence the democratic process / public opinion
  • 5. Tools of Information and Influence • Signals Intelligence (SIGINT): information from “public” sources • Espionage: gathering of private or classified information, including through human intelligence (HUMINT) • Propaganda: non-objective information, often misleading, to publicize a viewpoint • Diplomacy: managing international relations through designated representatives • Soft power: exertion of economic or cultural influence • Hard power: economic or military coercion
  • 6. Cyber Infrastructure and National Security • Cyber infrastructure is essential to every aspect of • The national and international economy • Military systems and national defense • Cultural exchange, speech, and private association • Most critical cyber infrastructure is privately owned • “Code” layer is open by design
  • 7. • Live cyber threat maps: • https://www.fireeye.com/cyber-map/threat-map.html • Side note: 12/2020 attack on FireEye • https://cybermap.kaspersky.com/
  • 8.
  • 9. March 15, 2018 CERT Report
  • 10. April 3, 2018 News Report “A cyber attack that hobbled the electronic communication system used by a major U.S. pipeline network . . . .” (Bloomberg News)
  • 11. February 2021 – Florida Water Treatment Plant • Plant operator noticed someone was controlling his screen • Hacker adjusted level of sodium hydroxide (lye) which is used in small amounts to regulate water PH. • COTS Remote Access Tool (RAT) used (remote workers) • All computers used same password for remote access • Computers connected to Internet with no firewall • Computers at facility also used 32-bit version of Windows 7
  • 13. 2020 U.S. Cyberspace Solarium Commission Report • Operationalize Cybersecurity Collaboration with the Private Sector. Unlike in other physical domains, in cyberspace the government is often not the primary actor. It must support and enable the private sector. The government must build and communicate a better understanding of threats, with the specific aim of informing private-sector security operations, directing government operational efforts to counter malicious cyber activities, and ensuring better common situational awareness for collaborative action with the private sector. While recognizing that private- sector entities have primary responsibility for the defense and security of their networks, the U.S. government must bring to bear its unique authorities, resources, and intelligence capabilities to support these actors in their defensive efforts.
  • 14. 2020 U.S. Cyberspace Solarium Commission Report • Preserve and Employ the Military Instrument of National Power. Future crises and conflicts will almost certainly contain a cyber component. In this environment, the United States must defend forward to limit malign adversary behavior below the level of armed attack, deter conflict, and, if necessary, prevail employing the full spectrum of its capabilities. Conventional weapons and nuclear capabilities require cybersecurity and resilience to ensure that the United States preserves credible deterrence and the full range of military response options. Across the spectrum from competition to crisis and conflict, the United States must ensure that it has sufficient cyber forces to accomplish strategic objectives through cyberspace.
  • 15. International Law for Cybersecurity •There is no international cybersecurity treaty •International law of war may apply
  • 16. Legal Frameworks: War, Espionage, and Domestic Law • International Law • Conduct of War: UN Convention • Espionage: unclear • Maybe covered by some human rights norms • Maybe covered by some aspects of customary international law • But here, “everybody does it” matters • Domestic Law of Foreign Nations • Espionage activities are usually crimes, but seldom prosecuted even if attribution / extradition is possible
  • 17. Cyber Arms Control? • Difficult Because: • It is difficult to measure the relative strength of states in cyberspace; • There is uncertainty regarding the military effects of cyber technology; • The challenges of monitoring compliance; and • Difficulties with enforcement. From: Borghard and Lonergan, Why are There No Cyber Arms Control Agreements, CFR January 16, 2018
  • 18.
  • 19. Group Work • Should some framework analogous to the WPR be adopted for cyber operations? What kind of details should it include? How would you address the kinds of Constitutional issues raised by the WPR? • Should the international community adopt a cyber arms control treaty? What limits should it contain? If such a treaty were adopted, should the U.S. accede to it?
  • 20. WPR Framework Congress: Power to Declare War; Power of the Purse President: Commander-in-Chief WPR Hostilities short of declared war: • Notify Congress • Forces must be withdrawn after 60 days if Congress does not issue an AUMF Constitutional Issues with WPR • Congress’ power to enact (N&P?) • Separation of Powers – President’s inherent power to employ military short of war • Legislative Veto
  • 22.
  • 23. Group Work • Should some framework analogous to the WPR be adopted for cyber operations? What kind of details should it include? How would you address the kinds of Constitutional issues raised by the WPR? • Should the international community adopt a cyber arms control treaty? What limits should it contain? If such a treaty were adopted, should the U.S. accede to it?
  • 24.