E N D
Nature of Cyberspace • Cyberspace: (DoD) “A global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the internet, telecommunications networks, computer systems, and embedded processors and controllers.” Source: Joint Pub 3-12 • However… • Manmade domain/ever changing/privately owned • Virtual • Programming code and protocols define rules of the domain • Environment/TTPs evolve at net speed OF INTERNET TRAFFIC PER DAY (2011); GROWING 60%PER YEAR EMAILS PER DAY HOURS OF VOIP PER DAY 675 265 13 MILLION BILLION PETABYTES Success in this domain means being smarter, more creative, faster,and stealthier than our opponent.
Environment: Exponential Rate of Change UNCLASSIFIED 6.4 Billion 2012 1 Billion Users, 2012 Library of Congress = 10 Terabytes 34% 2010 At best transmission line speed: 1998 = 16.5 days 2013 = .00008 seconds 634 Million 5.3 Billion 5 Billion 2008 28% 255 Million 4 Billion Facebook Launch, 2004 2.3 Billion 2000 20% 740 Million 187 Million Worldwide cell subscribers 5% 758 Million 15.6 Million World population on the Internet 10 Billion Mobile Devices Projected by 2016 (1.4 per person on the planet) 42 Million Number of websites Transistors per microchip UNCLASSIFIED
THREAT ACTORS THREAT ACTORS THREAT VECTORS FOREIGN INTELLIGENCE Supply Chain Vulnerability Negligent Users HACKTIVISTS Wireless Access Points CRIMINAL ELEMENTS Removable media TERRORIST ACTS Insider Threats
A Disturbing TrendThe Threat is Evolving Exploitation Disruption Destruction
5 Key Challenges in Cyber • USCYBERCOM Mission • Defend the Nation • CCMD Support • GIG Ops and Defense Ends Command & Control Authorities, ROE, Policy Ways &KeyChallenges Trained & Ready Situational Awareness Defensible Architecture Materiel, Technology, Facilities, Engagement Means
UNCLASSIFIED U.S. Federal Cybersecurity Operations Team National Roles and Responsibilities AGREED March 5, 2013 * DoD DHS DOJ/FBI • Investigate, attribute, disrupt and prosecute cyber crimes • Lead domestic national security operations • Conduct domestic collection, analysis, and dissemination of cyber threat intelligence • Support the national protection, prevention, mitigation of, and recovery from cyber incidents • Coordinate cyber threat investigations • Defend the nation from attack • Gather foreign cyber threat intelligence and determine attribution • Secure national security and military systems • Support the national protection, prevention, mitigation of, and recovery from cyber incidents • Investigate cyber crimes under military jurisdiction • Coordinate the national protection, prevention, mitigation of, and recovery from cyber incidents • Disseminate domestic cyber threat and vulnerability analysis • Protect critical infrastructure • Secure federal civilian systems • Investigate cyber crimes under DHS’s jurisdiction US Government Departments and Agencies DoD LEAD FOR National Defense DOJ/FBI LEAD FOR Investigation and Enforcement DHS LEAD FOR Protection SHARED SITUATIONAL AWARENESS ENABLING INTEGRATED OPERATIONAL ACTIONS NPPD, USSS, ICE USCYBERCOM, NSA,DISA, DC3 FBI, NSD, CRM, USAO INTELLIGENCE COMMUNITY: Cyber Threat Intelligence & Attribution PROTECT | PREVENT | MITIGATE | RESPOND | RECOVER Global Cyberspace Coordinate with Public, Private, and International Partners * Note: Nothing in this chart alters existing DOJ, DHS, and DoD roles, responsibilities, or authorities
Partnerships: Team Cyber & International engagements Network Vulnerabilities Are Not Solely a US Problem • Shared Situational Awareness • Agile Tipping and Cueing • Integrated Defensive & Offensive Capabilities • Synchronized Command & Control 10 1/28/2013 4:37 PM
Government Industry Academia Cyber South Carolina
Cyber South Carolina Cyber Protection and Awareness Cyber Relevance Leverages Economic Engagement and Opportunity Synergy of Effort and Capabilities Between Government/Industry/Academia
Russian Gang Said to Amass More Than a Billion Stolen Internet Credentials Aug 2014 South Carolina Cyber Partners The Cyber solution