SlideShare a Scribd company logo
Cybersecurity Law and Policy
Summit One
Spring 2021
Prof. David Opderbeck
© 2020 - 2021 David W. Opderbeck
Creative Commons Attribution / Share-Alike
Introduction
Block Activity
1:15 – 2:15 Intro, Lecture
2:15-2:30 Break
2:30-3:00 Group Work Set Up
3:00 – 4:00 Kenneth Geers
4:00 – 4:15 Break
4:15 – 5:00 Group Work
5:00 – 6:00 Jamil Jaffer
6:00 – 6:15 Break
6:15 – 7:15 Group Work Reports; Preview Upcoming
Weeks
•“[W]herever there is historical
tension in the ‘real world’, there is
now parallel tension in cyberspace.”
– Kenneth Geers
Dynamics of Cyber Incidents
• After the Cold War, a new East vs. West: Russia, China – and North
Korea and Iran – vs. the U.S.
• Some activity in other Asian countries: India, Vietnam
• Cyber Incidents often follow on other international incidents
• Increasing efforts to influence the democratic process / public opinion
Tools of Information and Influence
• Signals Intelligence (SIGINT): information
from “public” sources
• Espionage: gathering of private or classified
information, including through human
intelligence (HUMINT)
• Propaganda: non-objective information,
often misleading, to publicize a viewpoint
• Diplomacy: managing international relations
through designated representatives
• Soft power: exertion of economic or cultural
influence
• Hard power: economic or military coercion
Cyber Infrastructure and National Security
• Cyber infrastructure is essential to every aspect of
• The national and international economy
• Military systems and national defense
• Cultural exchange, speech, and private association
• Most critical cyber infrastructure is privately owned
• “Code” layer is open by design
• Live cyber threat maps:
• https://www.fireeye.com/cyber-map/threat-map.html
• Side note: 12/2020 attack on FireEye
• https://cybermap.kaspersky.com/
March 15, 2018 CERT Report
April 3, 2018 News Report
“A cyber attack that hobbled the electronic communication system used
by a major U.S. pipeline network . . . .” (Bloomberg News)
February 2021 – Florida
Water Treatment Plant
• Plant operator noticed someone was controlling his
screen
• Hacker adjusted level of sodium hydroxide (lye) which
is used in small amounts to regulate water PH.
• COTS Remote Access Tool (RAT) used (remote
workers)
• All computers used same password for remote access
• Computers connected to Internet with no firewall
• Computers at facility also used 32-bit version of
Windows 7
SolarWinds
2020 U.S. Cyberspace Solarium Commission
Report
• Operationalize Cybersecurity Collaboration with the Private Sector. Unlike
in other physical domains, in cyberspace the government is often not the
primary actor. It must support and enable the private sector. The
government must build and communicate a better understanding of
threats, with the specific aim of informing private-sector security
operations, directing government operational efforts to counter malicious
cyber activities, and ensuring better common situational awareness for
collaborative action with the private sector. While recognizing that private-
sector entities have primary responsibility for the defense and security of
their networks, the U.S. government must bring to bear its unique
authorities, resources, and intelligence capabilities to support these actors
in their defensive efforts.
2020 U.S. Cyberspace Solarium Commission
Report
• Preserve and Employ the Military Instrument of National
Power. Future crises and conflicts will almost certainly contain a cyber
component. In this environment, the United States must defend
forward to limit malign adversary behavior below the level of armed
attack, deter conflict, and, if necessary, prevail employing the full
spectrum of its capabilities. Conventional weapons and nuclear
capabilities require cybersecurity and resilience to ensure that the
United States preserves credible deterrence and the full range of
military response options. Across the spectrum from competition to
crisis and conflict, the United States must ensure that it has sufficient
cyber forces to accomplish strategic objectives through cyberspace.
International Law for Cybersecurity
•There is no international cybersecurity
treaty
•International law of war may apply
Legal Frameworks: War, Espionage, and
Domestic Law
• International Law
• Conduct of War: UN Convention
• Espionage: unclear
• Maybe covered by some human rights norms
• Maybe covered by some aspects of customary international law
• But here, “everybody does it” matters
• Domestic Law of Foreign Nations
• Espionage activities are usually crimes, but seldom prosecuted even if
attribution / extradition is possible
Cyber Arms Control?
• Difficult Because:
• It is difficult to measure the relative strength of states in cyberspace;
• There is uncertainty regarding the military effects of cyber
technology;
• The challenges of monitoring compliance; and
• Difficulties with enforcement.
From: Borghard and Lonergan, Why are
There No Cyber Arms Control
Agreements, CFR January 16, 2018
Group Work
• Should some framework
analogous to the WPR be adopted
for cyber operations? What kind
of details should it include? How
would you address the kinds of
Constitutional issues raised by the
WPR?
• Should the international
community adopt a cyber arms
control treaty? What limits should
it contain? If such a treaty were
adopted, should the U.S. accede
to it?
WPR Framework
Congress: Power to
Declare War; Power of
the Purse
President: Commander-in-Chief
WPR
Hostilities short of declared
war:
• Notify Congress
• Forces must be
withdrawn after 60 days
if Congress does not
issue an AUMF
Constitutional Issues with WPR
• Congress’ power to enact (N&P?)
• Separation of Powers – President’s inherent power to employ military
short of war
• Legislative Veto
Kenneth Geers
Group Work
• Should some framework
analogous to the WPR be adopted
for cyber operations? What kind
of details should it include? How
would you address the kinds of
Constitutional issues raised by the
WPR?
• Should the international
community adopt a cyber arms
control treaty? What limits should
it contain? If such a treaty were
adopted, should the U.S. accede
to it?
Jamil Jaffer
• Group Presentations
• Looking Ahead
Wrap Up

More Related Content

What's hot

Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National Priority
Career Communications Group
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
Sameer Paradia
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
Jamie Moore
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
CODE BLUE
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
OCTF Industry Engagement
 
Tallinn manual 2.0 Prof. Michael Schmitt
Tallinn manual 2.0   Prof. Michael SchmittTallinn manual 2.0   Prof. Michael Schmitt
Tallinn manual 2.0 Prof. Michael Schmitt
JeffreyCarr7
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
Charles Mok
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
Pukhraj Singh
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
ideaflashed
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
Talwant Singh
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
Internet Law Center
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
Dr David Probert
 
Commission on Wartime Contracting in Iraq and Afghanistan
Commission on Wartime Contracting in Iraq and AfghanistanCommission on Wartime Contracting in Iraq and Afghanistan
Commission on Wartime Contracting in Iraq and Afghanistan
jddurso
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
Amit Anand
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
blogzilla
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Abhay Vijay
 

What's hot (20)

Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National Priority
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Tallinn manual 2.0 Prof. Michael Schmitt
Tallinn manual 2.0   Prof. Michael SchmittTallinn manual 2.0   Prof. Michael Schmitt
Tallinn manual 2.0 Prof. Michael Schmitt
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Commission on Wartime Contracting in Iraq and Afghanistan
Commission on Wartime Contracting in Iraq and AfghanistanCommission on Wartime Contracting in Iraq and Afghanistan
Commission on Wartime Contracting in Iraq and Afghanistan
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to Cybersecurity Law and Policy II Slides for First Summit Meeting

An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
Robbie Mitchell
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
Brian K. Dickard
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
Boston Global Forum
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014
 
Revisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurityRevisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurity
Maarten Van Horenbeeck
 
Case study 11
Case study 11Case study 11
Case study 11
khaled alsaeh
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
Enrique J Cordero
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
Leonardo
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
Allan Cytryn
 
2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...
Ethan S. Burger
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Pukhraj Singh
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
Sumaiya Ismail
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
Fidelis Cybersecurity
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
Gaurav Singh
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
Boston Global Forum
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
Jack Whitsitt
 

Similar to Cybersecurity Law and Policy II Slides for First Summit Meeting (20)

An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Revisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurityRevisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurity
 
Case study 11
Case study 11Case study 11
Case study 11
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
 
2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
 

More from David Opderbeck

AI and Privacy
AI and PrivacyAI and Privacy
AI and Privacy
David Opderbeck
 
IXPs and Competition Policy
IXPs and Competition PolicyIXPs and Competition Policy
IXPs and Competition Policy
David Opderbeck
 
Contact Tracing Apps and Privacy: The German Experience
Contact Tracing Apps and Privacy: The German ExperienceContact Tracing Apps and Privacy: The German Experience
Contact Tracing Apps and Privacy: The German Experience
David Opderbeck
 
Artificial Rights and Virtue
Artificial Rights and VirtueArtificial Rights and Virtue
Artificial Rights and Virtue
David Opderbeck
 
Google v. Oracle
Google v. OracleGoogle v. Oracle
Google v. Oracle
David Opderbeck
 
Cybersecurity Skills: Email Tracing and Legal Process
Cybersecurity Skills:  Email Tracing and Legal ProcessCybersecurity Skills:  Email Tracing and Legal Process
Cybersecurity Skills: Email Tracing and Legal Process
David Opderbeck
 
Skillsclass2a
Skillsclass2aSkillsclass2a
Skillsclass2a
David Opderbeck
 

More from David Opderbeck (7)

AI and Privacy
AI and PrivacyAI and Privacy
AI and Privacy
 
IXPs and Competition Policy
IXPs and Competition PolicyIXPs and Competition Policy
IXPs and Competition Policy
 
Contact Tracing Apps and Privacy: The German Experience
Contact Tracing Apps and Privacy: The German ExperienceContact Tracing Apps and Privacy: The German Experience
Contact Tracing Apps and Privacy: The German Experience
 
Artificial Rights and Virtue
Artificial Rights and VirtueArtificial Rights and Virtue
Artificial Rights and Virtue
 
Google v. Oracle
Google v. OracleGoogle v. Oracle
Google v. Oracle
 
Cybersecurity Skills: Email Tracing and Legal Process
Cybersecurity Skills:  Email Tracing and Legal ProcessCybersecurity Skills:  Email Tracing and Legal Process
Cybersecurity Skills: Email Tracing and Legal Process
 
Skillsclass2a
Skillsclass2aSkillsclass2a
Skillsclass2a
 

Recently uploaded

Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
USDAReapgrants.com
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 

Recently uploaded (20)

Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 

Cybersecurity Law and Policy II Slides for First Summit Meeting

  • 1. Cybersecurity Law and Policy Summit One Spring 2021 Prof. David Opderbeck © 2020 - 2021 David W. Opderbeck Creative Commons Attribution / Share-Alike
  • 2. Introduction Block Activity 1:15 – 2:15 Intro, Lecture 2:15-2:30 Break 2:30-3:00 Group Work Set Up 3:00 – 4:00 Kenneth Geers 4:00 – 4:15 Break 4:15 – 5:00 Group Work 5:00 – 6:00 Jamil Jaffer 6:00 – 6:15 Break 6:15 – 7:15 Group Work Reports; Preview Upcoming Weeks
  • 3. •“[W]herever there is historical tension in the ‘real world’, there is now parallel tension in cyberspace.” – Kenneth Geers
  • 4. Dynamics of Cyber Incidents • After the Cold War, a new East vs. West: Russia, China – and North Korea and Iran – vs. the U.S. • Some activity in other Asian countries: India, Vietnam • Cyber Incidents often follow on other international incidents • Increasing efforts to influence the democratic process / public opinion
  • 5. Tools of Information and Influence • Signals Intelligence (SIGINT): information from “public” sources • Espionage: gathering of private or classified information, including through human intelligence (HUMINT) • Propaganda: non-objective information, often misleading, to publicize a viewpoint • Diplomacy: managing international relations through designated representatives • Soft power: exertion of economic or cultural influence • Hard power: economic or military coercion
  • 6. Cyber Infrastructure and National Security • Cyber infrastructure is essential to every aspect of • The national and international economy • Military systems and national defense • Cultural exchange, speech, and private association • Most critical cyber infrastructure is privately owned • “Code” layer is open by design
  • 7. • Live cyber threat maps: • https://www.fireeye.com/cyber-map/threat-map.html • Side note: 12/2020 attack on FireEye • https://cybermap.kaspersky.com/
  • 8.
  • 9. March 15, 2018 CERT Report
  • 10. April 3, 2018 News Report “A cyber attack that hobbled the electronic communication system used by a major U.S. pipeline network . . . .” (Bloomberg News)
  • 11. February 2021 – Florida Water Treatment Plant • Plant operator noticed someone was controlling his screen • Hacker adjusted level of sodium hydroxide (lye) which is used in small amounts to regulate water PH. • COTS Remote Access Tool (RAT) used (remote workers) • All computers used same password for remote access • Computers connected to Internet with no firewall • Computers at facility also used 32-bit version of Windows 7
  • 13. 2020 U.S. Cyberspace Solarium Commission Report • Operationalize Cybersecurity Collaboration with the Private Sector. Unlike in other physical domains, in cyberspace the government is often not the primary actor. It must support and enable the private sector. The government must build and communicate a better understanding of threats, with the specific aim of informing private-sector security operations, directing government operational efforts to counter malicious cyber activities, and ensuring better common situational awareness for collaborative action with the private sector. While recognizing that private- sector entities have primary responsibility for the defense and security of their networks, the U.S. government must bring to bear its unique authorities, resources, and intelligence capabilities to support these actors in their defensive efforts.
  • 14. 2020 U.S. Cyberspace Solarium Commission Report • Preserve and Employ the Military Instrument of National Power. Future crises and conflicts will almost certainly contain a cyber component. In this environment, the United States must defend forward to limit malign adversary behavior below the level of armed attack, deter conflict, and, if necessary, prevail employing the full spectrum of its capabilities. Conventional weapons and nuclear capabilities require cybersecurity and resilience to ensure that the United States preserves credible deterrence and the full range of military response options. Across the spectrum from competition to crisis and conflict, the United States must ensure that it has sufficient cyber forces to accomplish strategic objectives through cyberspace.
  • 15. International Law for Cybersecurity •There is no international cybersecurity treaty •International law of war may apply
  • 16. Legal Frameworks: War, Espionage, and Domestic Law • International Law • Conduct of War: UN Convention • Espionage: unclear • Maybe covered by some human rights norms • Maybe covered by some aspects of customary international law • But here, “everybody does it” matters • Domestic Law of Foreign Nations • Espionage activities are usually crimes, but seldom prosecuted even if attribution / extradition is possible
  • 17. Cyber Arms Control? • Difficult Because: • It is difficult to measure the relative strength of states in cyberspace; • There is uncertainty regarding the military effects of cyber technology; • The challenges of monitoring compliance; and • Difficulties with enforcement. From: Borghard and Lonergan, Why are There No Cyber Arms Control Agreements, CFR January 16, 2018
  • 18.
  • 19. Group Work • Should some framework analogous to the WPR be adopted for cyber operations? What kind of details should it include? How would you address the kinds of Constitutional issues raised by the WPR? • Should the international community adopt a cyber arms control treaty? What limits should it contain? If such a treaty were adopted, should the U.S. accede to it?
  • 20. WPR Framework Congress: Power to Declare War; Power of the Purse President: Commander-in-Chief WPR Hostilities short of declared war: • Notify Congress • Forces must be withdrawn after 60 days if Congress does not issue an AUMF Constitutional Issues with WPR • Congress’ power to enact (N&P?) • Separation of Powers – President’s inherent power to employ military short of war • Legislative Veto
  • 22.
  • 23. Group Work • Should some framework analogous to the WPR be adopted for cyber operations? What kind of details should it include? How would you address the kinds of Constitutional issues raised by the WPR? • Should the international community adopt a cyber arms control treaty? What limits should it contain? If such a treaty were adopted, should the U.S. accede to it?
  • 24.