240 likes | 259 Views
Presentation at the Symposium “Threats from the Net” New asymmetric threats in modern information societies Tallinn February 29, 2008. Dir. Lars D. Nicander, Center for Asymmetric Threat Studies, Swedish National Defence College. Terrorism Studies. IO Studies. Intelligence Studies.
E N D
Presentation at the Symposium “Threats from the Net”New asymmetric threats in modern information societiesTallinnFebruary 29, 2008 Dir. Lars D. Nicander, Center for Asymmetric Threat Studies, Swedish National Defence College
Terrorism Studies IO Studies Intelligence Studies Dr. Magnus Ranstorp Dr. Greg Treverton (+ Wilhelm Agrell) Dr. Dan Kuehl Synergy Asymmetric Threats
The Swedish Concept of IO* Information operations are joint and coordinated measures in peace, crises and war in support of political or military goals by affecting or using information and information systems owned by the opponents or other foreign parties. This can be done by using own information and information systems, which also at the same time must be protected. One important feature is to affect the processing of decisions and decision making. There are both offensive and defensive information operations, which are carried out in political, economic and military relations. Examples of information operations are information warfare, media manipulation, psychological warfare and intelligence operations. Defensive information operations are joint and coordinated measures in peace, crises and war regarding policy, operations, personnel and technology to protect and defend information, information systems and the ability for rational decision making. *MoTIC-bill 99/00:86
IO/IW Synergy Strategic/Economic Environment Joint Operations IO/ IW Information, Intelligence Perceptions Information Systems, Infosec
Defensive Information Operations (IO-D)/ Defensive Information Warfare (IW-D) Critical Infrastructure Protection Information Assurance Taxonomy
The Asymmetric Character Classes Coalitions Coalitions III Nations Nations II Organisations Organisations Individuals Individuals I
The Dilemmas • Anonymous attacks • How to detect an attack? • Who is at the other end? • A teenage hacker? • A corporation/organisation? • A nation? • Mix of these? • What is an Act of War in Cyberspace?
Continuity of gov. (incl. media comm.) • Power • Telecom/ISP • Financial systems • ATC CIIP Critical Information Infrastructure Protection
Cyber/Information Terrorism • Aum Shinryko • E-Jihad 2000-2001 • Arrest of an AQ-hacker in US • Al-Qaida IPB vs California • ATC – Boston and Schipol • Proliferation of DEW-weapons?
Cell (d) the most difficult to detect and counter Critical Infrastructure Threat Matrix Target Infrastructure Threat Matrix Physical Digital (b) IRA attack plan on London Power Grids, July 1996 (a) Conventional Terrorism (Oklahoma City Bombing) Physical Tool (c) Spoof (or HPM) Air Traffic Control to crash plane (d) “Pure” Cyber Terrorism (Trojan horse in public switched networks) EM(DEW + digital)
A scenario • Airbus over Schipol or LAX • DEW or ”can-bomb” • TV-camera or ”celluar-camera” 9/11-effect…!
International law (”use of force”) etc International Co-operation, Regimes etc Management issues (”bending pipes”) Three Challenges International tasks • Domestic tasks
Some examples • Conflict between East Timor and Indonesia in the end of 1997-99 • The website (the ”.tp”-domain) of the East Timor independence movement located in Ireland was ”shot down” 990119. Indonesian Intelligence service suspected. • “e-Jihad” 2000-2001 • Attack on the Israeli Land Register Authority routed over Berlin and London • Estonia Spring 2007 • Who´s law applies? • What are the ROE`s for governments and LEA?
Collective Security in Cyberspace • There are no borders in Cyberspace! • A cyber-intrusion could be routed from country A through country B, C and D before it ends up in country E. • How can we trace back these intrusions? • Today: International Law Enforcement or private initiatives (FIRST etc) • Tomorrow: ”Fishwebs” between national CERT:s for tracing intrusions back in real time?
Country A Country B Country C Country D Country E Building “fishwebs” in Cyberspace Country Z Country Y UN, ITU etc Country X
How to get an IA outreach? • Closed technical and other arrangements (Five-eyes etc) has limited relevance when IT-attacks could pass through 192 countries • Global approach needed • How to deny “safe havens”? • What kind of incentives (“sticks and carrots”)? • Could the Stanford Treaty be a model?
International law (”use of force”) etc International Co-operation, Regimes etc Management issues (”bending pipes”) Three Challenges International tasks • Domestic tasks
Conclusions of the Estonian case for Crisis Management • Enhancement of the security policy toolbox? • A state actor (with big resources) can act through cyber attacks and still conceal it's involvement. • Cyber attacks can be used in several ways: • As an add-on to economic sanctions or other non-miltary means of power projection (The Estonia Case) • As a force multiplier (taking out emergency systems after bomb attacks) • To improve preparedness and contingency planning in this area there is a need for: • Operational experience (More of Red Team exercises to detect critical vulnerabilities i societal networks, a GovCERT working 24/7 etc) • Cooperation – between agencies, private-public and international
Swedish IO and International Law* The use of cyber-weapons to attack information systems does not constitute violence in terms of international law but it may nevertheless contravene international law. At the same time it should be possible to make use of such weapons within the provision of the UN Charter (Article 41) – given an appropriate UN Resolution and consequent legal mandate – in order to uphold sanctions or for other conflict prevention measures even though this has hitherto not happened.A more flexible arsenal of non-violent measures of this type would be in line with traditional Swedish policy in this field. Another legal question is how, using measures permitted under international law, it is possible to bring to book, for example, terrorists who make use of such weapons.An international review of the provision of international law would be of interest to Sweden, with regard both to cyber-attacks perpetrated by states or individuals and to the possibility of using such a weapon as an instrument of sanction enforcement. *Parliament Decision 1999 (99/00:30)
ConclusionAreas of international co-operation • Doctrines concerning use of IO/IW under UN or other international legal auspices (international operations, upholding sanctions etc.) • Principles of building Regimes for defensive actions taken in Cyberspace (tracing, counterhacking etc.)
Q&A www.fhs.se/cats