SlideShare a Scribd company logo
Cyber-crime, Cyber Terrorism,
and Electronic Espionage:
David Willson
Attorney at Law
CISSP, Security +
Titan Info Security Group
Has a Cyber War Already
Happened?
Property of Titan Info Security Group
Disclaimer
• This briefing is not an answer to ALL
questions, but instead poses some issues
to think about and hopefully puts the
issues in a more clear perspective.
• Most of the issues discussed continue to
be discussed in international circles as no
one has been able to come to a clear and
concise solution or conclusion.
Property of Titan Info Security Group
When does a cyber attack
cross the line from hacking,
cyber crime, or electronic
espionage and become an
ACT of WAR??
So, where do we draw the
line?
Property of Titan Info Security Group
A Crippling Cyber Attack Would
Be 'Act of War' - Leon Panetta
See video here:
http://www.youtube.com/watch?v=17FIA7qoyy0
Property of Titan Info Security Group
Defining Cyber War
DoD: Cyberattack on U.S. could warrant
deadly response
(Unidentified military officials speaking with
The Wall Street Journal)
“If you shut down our power grid, maybe we
will put a missile down one of your
smokestacks, . . . .”
(Chris Carroll, Stars and Stripes, May 2011)
Headlines!
EstoniaGeorgia
North
Korea Google
RSA
STUXNET/
OLYMPIC
GOLD
Flame
Property of Titan Info Security Group
Recent Headlines!!
Digital Spies: The Alarming
Rise of Electronic Espionage
“Foreign agents are stealing stealth
technology, hacking heads of state,
and sabotaging American companies.
And while many of these attacks are
traced to China, electronic espionage
is an accelerating scourge that knows
no national boundaries.”
(Adam Piore, Popular Science, Jan. 24, 2012)
Property of Titan Info Security Group
Recent Headlines!!
Operation Shady RAT
By Dmitri Alperovitch, Vice President, Threat
Research, McAfee
An investigation of targeted
intrusions into more than 70 global
companies, governments, and non-
profit organizations during the last
five years
Property of Titan Info Security Group
Recent Headlines!!
U.S.
Cyber-spying by China and Russia a
threat
“Billions of dollars of trade secrets,
technology and intellectual property are
being siphoned each year from the
computer systems of U.S. government
agencies, corporations and research
institutions to benefit the economies of
China and other countries,” the Office of
the National Counterintelligence
Executive said.
(By Ellen Nakashima, Washington Post, Nov. 4, 2011)
Property of Titan Info Security Group
Recent Headlines!!
Hack at Illinois Water Plant
Shows Vulnerabilities in Critical
Infrastructure
Allegedly, hackers based in
Russia were able to remotely
shut down a water pump at a
facility near Springfield.
(Sue Marquette Poremba Nov 21,
2011- Reuters)
Property of Titan Info Security Group
Recent Warnings!!
• Utilities
• Oil Companies
• National Infrastructure
• F35 Joint Strike Fighter
Property of Titan Info Security Group
Cyber Pearl Harbor?
Eric Rosenbach, Deputy Assistant
Secretary of Defense for Cyber
Policy:
“A catastrophic cyberwar is
important to prepare for, but an
unlikely scenario. Stealing data
important to the nation’s economic
security, meanwhile, is occurring
here and now!”
(National Defense July 2012)
Property of Titan Info Security Group
LINGO
Cyber
War
Act of War/
Use of Force/
Armed Attack
Electronic
Espionage
Cyber
Attack
Property of Titan Info Security Group
LAW
Geneva
Convention
Anticipatory
Self-Defense
Customary
Int’l Law
Hague
Convention
UN
Charter
Art. 51
Self-Defense
Property of Titan Info Security Group
Use of Force v. Armed Attack
• Use of Force: in response a nation may
use lesser or equal means as compared to
the original use of force (probably would
not allow a kinetic response to a cyber
attack considered a “use of force”)
• Armed Attack: allows the attacked nation
to respond with a proportional response
(if cyber attack is considered an “armed
attack,” the attacked nation can likely
respond with a kinetic attack)
Property of Titan Info Security Group
Use of Force v. Armed Attack
• Issue: When does a cyber-attack equal
an “armed attack?”
• Theory: Any cyber-attack that may have
the same result as a kinetic attack
would likely be classified as an “armed
attack”
Property of Titan Info Security Group
Is this electronic espionage or an
act of war?
• Defacing your adversary’s website? (Happened)
• Blocking their Internet access to the outside
world? (Happened)
• Stealing their military secrets? (Happened)
• Planting logic bombs in critical infrastructure?
– What about in defense hardware and software:
communication satellites, missile defense, etc.
– (Has it happened??? Some say yes!!)
Property of Titan Info Security Group
Is this electronic espionage or an
act of war?
• Disrupting an adversary’s financial structure?
• Erasing an adversary’s critical data?
• What about disrupting or even altering GPS?
• How about “challenging our ability to operate
freely in the cyber commons?”
Property of Titan Info Security Group
Is this electronic espionage or an
act of war?
• How about disrupting or setting back
your adversaries nuclear weapons
program, or what they say is just nuclear
power??
Property of Titan Info Security Group
Do We Need a Response?
• Dubai: The US will face a “teeth-
breaking” response if it continues to
carry out cyber attacks against Iran, an
Iranian official said Wed.
• “If the Americans’ futile cyber attacks
don’t stop, it will face a teeth-breaking
response,” . . . . (Iranian Students News
Agency)
Property of Titan Info Security Group
Do We Have a War?
• If a tree falls in the woods and no is
there does it make a sound?
• If one nation attacks and the other does
not respond do we have a war?
Property of Titan Info Security Group
Critical Piece
• Do you know who is attacking you?
• Attribution (can you fire back
blindly?)
• “Sum of All Fears” (See movie trailer
here: http://www.youtube.com/watch?v=8GPu-oZ4p64
• In this movie, terrorists made it appear that Russia detonated
a nuclear weapon in Baltimore. This deception almost led to
the US and Russia launching nuclear attacks on one another.
Deception in cyberspace is much easier.
Property of Titan Info Security Group
What About
Precedence?
In the 90’s a Russian professor
declared that Russia considers
information operations (the term
used at the time) to be akin to a
nuclear attack and retains the right to
respond with a nuclear strike.
Property of Titan Info Security Group
Recap
1. Has a cyber war already occurred?
2. Can we draw a clear line?
3. What factors must inevitably be considered?
a. Attribution
b. Escalation
c. Setting precedence
Property of Titan Info Security Group
Recap
Stuxnet/Code Yellow
Act of War/
Use of Force/
Armed Attack??
Property of Titan Info Security Group
Use of Force v. Armed Attack
• Use of Force: I would argue that most
of what we see in the news that is
labeled a “cyber-attack” or “cyber war”
could be considered a “use of force,”
thus allowing the aggrieved nation to
respond in kind.
• Question: is the use of Stuxnet then
considered a “use of force?” Yes
• How about an “Armed Attack?” This
question is yet to be answered!!
Property of Titan Info Security Group
What will it Take?
No single incident
Combination of attacks
Rise to level of do or die or
economic Armageddon!
Property of Titan Info Security Group
Questions/Comments?
David Willson
Attorney at Law
CISSP, Security +
Titan Info Security Group
719-648-4176
david@titaninfosecuritygroup.com
www.titaninfosecuritygroup.com
Or TEXT the Words
“Titansecurity” to 50500
Property of Titan Info Security Group

More Related Content

What's hot

BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
Pukhraj Singh
 
Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...
AFCEA International
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
AFCEA International
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
Bilal Ali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
 
Balancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and SecurityBalancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and Security
evolutionaryit
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
tnwac
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
Sameer Paradia
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Cain Ransbottyn
 
CSFI Stuxnet Report
CSFI Stuxnet ReportCSFI Stuxnet Report
CSFI Stuxnet Report
Amr Ali
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Sai praveen Seva
 
New internet
New internetNew internet
New internet
Santosh Khadsare
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
Pierluigi Paganini
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
Onwadee18
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
Jarno Limnéll
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
EC-Council
 

What's hot (19)

BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
 
Balancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and SecurityBalancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
CSFI Stuxnet Report
CSFI Stuxnet ReportCSFI Stuxnet Report
CSFI Stuxnet Report
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
New internet
New internetNew internet
New internet
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 

Viewers also liked

Indian Diplomacy At Work
Indian Diplomacy At WorkIndian Diplomacy At Work
Indian Diplomacy At Work
Ministry of External Affairs, India
 
Diplomacy and diplomatic event b/w pak & inda
Diplomacy and diplomatic event b/w pak & indaDiplomacy and diplomatic event b/w pak & inda
Diplomacy and diplomatic event b/w pak & inda
fakharsargaana
 
Data hiding - metodologie e strumenti open source
Data hiding - metodologie e strumenti open sourceData hiding - metodologie e strumenti open source
Data hiding - metodologie e strumenti open sourceMarco Ferrigno
 
Bb prezi
Bb preziBb prezi
Bb prezi
Bruno Bertocchi
 
YChevalier Prior Case Listv2
YChevalier Prior Case Listv2YChevalier Prior Case Listv2
YChevalier Prior Case Listv2
Yvette Chevalier, Esq.
 
Rsa europe 2012 active defense-hack back lecture
Rsa europe 2012   active defense-hack back lectureRsa europe 2012   active defense-hack back lecture
Rsa europe 2012 active defense-hack back lecture
David Willson, Attorney, CISSP, Security +
 
YChevalier Resume 2015v2
YChevalier Resume 2015v2YChevalier Resume 2015v2
YChevalier Resume 2015v2
Yvette Chevalier, Esq.
 
Correos electronicos
Correos electronicosCorreos electronicos
Correos electronicos
0271998
 
evaluacion del tercer parcial
evaluacion del tercer parcialevaluacion del tercer parcial
evaluacion del tercer parcial
0271998
 
Redes sociales
Redes socialesRedes sociales
Redes sociales
0271998
 
Si greferat constr_geom
Si greferat constr_geomSi greferat constr_geom
Si greferat constr_geom
Valeriu Licu
 
sonya ware electronic technician 1
sonya ware electronic technician 1sonya ware electronic technician 1
sonya ware electronic technician 1
Sonya Ware
 
Final Assessment Report
Final Assessment ReportFinal Assessment Report
Final Assessment Report
Chad Warrick
 
160511 バス列(内部向け10分)
160511 バス列(内部向け10分)160511 バス列(内部向け10分)
160511 バス列(内部向け10分)
隆 司
 
ABell2015
ABell2015ABell2015
ABell2015
Mia Campbell
 
Karya Tulis Ilmiah
Karya Tulis IlmiahKarya Tulis Ilmiah
Karya Tulis Ilmiah
Dwi Anita
 
physics
physicsphysics
Bag awal
Bag awal Bag awal
Bag awal
Dwi Anita
 
bus network ppt by pearl patel
bus network ppt by pearl patelbus network ppt by pearl patel
bus network ppt by pearl patel
patel12300
 

Viewers also liked (20)

Indian Diplomacy At Work
Indian Diplomacy At WorkIndian Diplomacy At Work
Indian Diplomacy At Work
 
Diplomacy and diplomatic event b/w pak & inda
Diplomacy and diplomatic event b/w pak & indaDiplomacy and diplomatic event b/w pak & inda
Diplomacy and diplomatic event b/w pak & inda
 
Data hiding - metodologie e strumenti open source
Data hiding - metodologie e strumenti open sourceData hiding - metodologie e strumenti open source
Data hiding - metodologie e strumenti open source
 
Bb prezi
Bb preziBb prezi
Bb prezi
 
YChevalier Prior Case Listv2
YChevalier Prior Case Listv2YChevalier Prior Case Listv2
YChevalier Prior Case Listv2
 
Rsa europe 2012 active defense-hack back lecture
Rsa europe 2012   active defense-hack back lectureRsa europe 2012   active defense-hack back lecture
Rsa europe 2012 active defense-hack back lecture
 
YChevalier Resume 2015v2
YChevalier Resume 2015v2YChevalier Resume 2015v2
YChevalier Resume 2015v2
 
Correos electronicos
Correos electronicosCorreos electronicos
Correos electronicos
 
evaluacion del tercer parcial
evaluacion del tercer parcialevaluacion del tercer parcial
evaluacion del tercer parcial
 
T3 1
T3 1T3 1
T3 1
 
Redes sociales
Redes socialesRedes sociales
Redes sociales
 
Si greferat constr_geom
Si greferat constr_geomSi greferat constr_geom
Si greferat constr_geom
 
sonya ware electronic technician 1
sonya ware electronic technician 1sonya ware electronic technician 1
sonya ware electronic technician 1
 
Final Assessment Report
Final Assessment ReportFinal Assessment Report
Final Assessment Report
 
160511 バス列(内部向け10分)
160511 バス列(内部向け10分)160511 バス列(内部向け10分)
160511 バス列(内部向け10分)
 
ABell2015
ABell2015ABell2015
ABell2015
 
Karya Tulis Ilmiah
Karya Tulis IlmiahKarya Tulis Ilmiah
Karya Tulis Ilmiah
 
physics
physicsphysics
physics
 
Bag awal
Bag awal Bag awal
Bag awal
 
bus network ppt by pearl patel
bus network ppt by pearl patelbus network ppt by pearl patel
bus network ppt by pearl patel
 

Similar to Is the us engaged in a cyber war

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
Brett L. Scott
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
Mehdi Poustchi Amin
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
Jamie Moore
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
OCTF Industry Engagement
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
EnclaveSecurity
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
whmillerjr
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
mariaidga
 
Cyber Threats
Cyber ThreatsCyber Threats
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
AFCEA International
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Jeremiah Grossman
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Bill Hagestad II
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
Richard Stiennon
 
Cyber war
Cyber warCyber war
Cyber war
Praveen
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
Brian T. O'Hara CISA, CISM, CRISC, CCSP, CISSP
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
blogzilla
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
blogzilla
 

Similar to Is the us engaged in a cyber war (20)

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
 
Cyber war
Cyber warCyber war
Cyber war
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 

Recently uploaded

Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
15e6o6u
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
seoglobal20
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
Parsons Behle & Latimer
 

Recently uploaded (20)

Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
 

Is the us engaged in a cyber war

  • 1. Cyber-crime, Cyber Terrorism, and Electronic Espionage: David Willson Attorney at Law CISSP, Security + Titan Info Security Group Has a Cyber War Already Happened? Property of Titan Info Security Group
  • 2. Disclaimer • This briefing is not an answer to ALL questions, but instead poses some issues to think about and hopefully puts the issues in a more clear perspective. • Most of the issues discussed continue to be discussed in international circles as no one has been able to come to a clear and concise solution or conclusion. Property of Titan Info Security Group
  • 3. When does a cyber attack cross the line from hacking, cyber crime, or electronic espionage and become an ACT of WAR?? So, where do we draw the line? Property of Titan Info Security Group
  • 4. A Crippling Cyber Attack Would Be 'Act of War' - Leon Panetta See video here: http://www.youtube.com/watch?v=17FIA7qoyy0 Property of Titan Info Security Group
  • 5. Defining Cyber War DoD: Cyberattack on U.S. could warrant deadly response (Unidentified military officials speaking with The Wall Street Journal) “If you shut down our power grid, maybe we will put a missile down one of your smokestacks, . . . .” (Chris Carroll, Stars and Stripes, May 2011)
  • 7. Recent Headlines!! Digital Spies: The Alarming Rise of Electronic Espionage “Foreign agents are stealing stealth technology, hacking heads of state, and sabotaging American companies. And while many of these attacks are traced to China, electronic espionage is an accelerating scourge that knows no national boundaries.” (Adam Piore, Popular Science, Jan. 24, 2012) Property of Titan Info Security Group
  • 8. Recent Headlines!! Operation Shady RAT By Dmitri Alperovitch, Vice President, Threat Research, McAfee An investigation of targeted intrusions into more than 70 global companies, governments, and non- profit organizations during the last five years Property of Titan Info Security Group
  • 9. Recent Headlines!! U.S. Cyber-spying by China and Russia a threat “Billions of dollars of trade secrets, technology and intellectual property are being siphoned each year from the computer systems of U.S. government agencies, corporations and research institutions to benefit the economies of China and other countries,” the Office of the National Counterintelligence Executive said. (By Ellen Nakashima, Washington Post, Nov. 4, 2011) Property of Titan Info Security Group
  • 10. Recent Headlines!! Hack at Illinois Water Plant Shows Vulnerabilities in Critical Infrastructure Allegedly, hackers based in Russia were able to remotely shut down a water pump at a facility near Springfield. (Sue Marquette Poremba Nov 21, 2011- Reuters) Property of Titan Info Security Group
  • 11. Recent Warnings!! • Utilities • Oil Companies • National Infrastructure • F35 Joint Strike Fighter Property of Titan Info Security Group
  • 12. Cyber Pearl Harbor? Eric Rosenbach, Deputy Assistant Secretary of Defense for Cyber Policy: “A catastrophic cyberwar is important to prepare for, but an unlikely scenario. Stealing data important to the nation’s economic security, meanwhile, is occurring here and now!” (National Defense July 2012) Property of Titan Info Security Group
  • 13. LINGO Cyber War Act of War/ Use of Force/ Armed Attack Electronic Espionage Cyber Attack Property of Titan Info Security Group
  • 15. Use of Force v. Armed Attack • Use of Force: in response a nation may use lesser or equal means as compared to the original use of force (probably would not allow a kinetic response to a cyber attack considered a “use of force”) • Armed Attack: allows the attacked nation to respond with a proportional response (if cyber attack is considered an “armed attack,” the attacked nation can likely respond with a kinetic attack) Property of Titan Info Security Group
  • 16. Use of Force v. Armed Attack • Issue: When does a cyber-attack equal an “armed attack?” • Theory: Any cyber-attack that may have the same result as a kinetic attack would likely be classified as an “armed attack” Property of Titan Info Security Group
  • 17. Is this electronic espionage or an act of war? • Defacing your adversary’s website? (Happened) • Blocking their Internet access to the outside world? (Happened) • Stealing their military secrets? (Happened) • Planting logic bombs in critical infrastructure? – What about in defense hardware and software: communication satellites, missile defense, etc. – (Has it happened??? Some say yes!!) Property of Titan Info Security Group
  • 18. Is this electronic espionage or an act of war? • Disrupting an adversary’s financial structure? • Erasing an adversary’s critical data? • What about disrupting or even altering GPS? • How about “challenging our ability to operate freely in the cyber commons?” Property of Titan Info Security Group
  • 19. Is this electronic espionage or an act of war? • How about disrupting or setting back your adversaries nuclear weapons program, or what they say is just nuclear power?? Property of Titan Info Security Group
  • 20. Do We Need a Response? • Dubai: The US will face a “teeth- breaking” response if it continues to carry out cyber attacks against Iran, an Iranian official said Wed. • “If the Americans’ futile cyber attacks don’t stop, it will face a teeth-breaking response,” . . . . (Iranian Students News Agency) Property of Titan Info Security Group
  • 21. Do We Have a War? • If a tree falls in the woods and no is there does it make a sound? • If one nation attacks and the other does not respond do we have a war? Property of Titan Info Security Group
  • 22. Critical Piece • Do you know who is attacking you? • Attribution (can you fire back blindly?) • “Sum of All Fears” (See movie trailer here: http://www.youtube.com/watch?v=8GPu-oZ4p64 • In this movie, terrorists made it appear that Russia detonated a nuclear weapon in Baltimore. This deception almost led to the US and Russia launching nuclear attacks on one another. Deception in cyberspace is much easier. Property of Titan Info Security Group
  • 23. What About Precedence? In the 90’s a Russian professor declared that Russia considers information operations (the term used at the time) to be akin to a nuclear attack and retains the right to respond with a nuclear strike. Property of Titan Info Security Group
  • 24. Recap 1. Has a cyber war already occurred? 2. Can we draw a clear line? 3. What factors must inevitably be considered? a. Attribution b. Escalation c. Setting precedence Property of Titan Info Security Group
  • 25. Recap Stuxnet/Code Yellow Act of War/ Use of Force/ Armed Attack?? Property of Titan Info Security Group
  • 26. Use of Force v. Armed Attack • Use of Force: I would argue that most of what we see in the news that is labeled a “cyber-attack” or “cyber war” could be considered a “use of force,” thus allowing the aggrieved nation to respond in kind. • Question: is the use of Stuxnet then considered a “use of force?” Yes • How about an “Armed Attack?” This question is yet to be answered!! Property of Titan Info Security Group
  • 27. What will it Take? No single incident Combination of attacks Rise to level of do or die or economic Armageddon! Property of Titan Info Security Group
  • 28. Questions/Comments? David Willson Attorney at Law CISSP, Security + Titan Info Security Group 719-648-4176 david@titaninfosecuritygroup.com www.titaninfosecuritygroup.com Or TEXT the Words “Titansecurity” to 50500 Property of Titan Info Security Group