SlideShare a Scribd company logo
1 of 9
1
USA CCoE & FT Gordon UMT: World Class Religious Support!
AFCEA TECHNET:
“The Ethics of
Cyberspace Warfare”
CH (COL) Timothy S. Mallard, Ph.D.
27 August 2015
Augusta, GA
//UNCLASS//
2
USA CCoE & FT Gordon UMT: World Class Religious Support!
• Context Review
• Reviewing the Just War Construct
• Case Studies: PLA Unit 61398, APT 28, Bureau 121
• Trends and the Way Ahead
• Question and Answer
• Summary
Agenda
3
USA CCoE & FT Gordon UMT: World Class Religious Support!
Attack – An offensive task that destroys or defeats enemy forces, seizes and secures terrain, or
both. (ADRP 3-90) See also defeat, deliberate attack, demonstration, destroy; feint, offensive
operations, raid, secure, seize, spoiling attack. (ADRP 1-02, 2 FEB 2015)
Attack the Network Operations — Lethal and nonlethal actions and operations against networks
conducted continuously and simultaneously at multiple levels (tactical, operational, and strategic)
that capitalize on or create key vulnerabilities and disrupt activities to eliminate the enemy’s ability
to function in order to enable success of the operation or campaign. Also called AtN operations.
(JP 3-15.1 as per JP 1-02, 8 NOV 2010)
Complex Catastrophe — Any natural or man-made incident, including cyberspace attack,
power grid failure, and terrorism, which results in cascading failures of multiple,
interdependent, critical, life-sustaining infrastructure sectors and caused extraordinary
levels of mass casualties, damage, or disruption severely affecting the population,
environment, economy, public health, national morale, response efforts, and/or
government functions. (DepSecDef Memo OSD001185-13 as per JP 1-02, 8 NOV 2010)
Cyberspace Superiority — The degree of dominance in cyberspace by one force that permits the
secure, reliable conduct of operations by that force, and its related land, air, maritime, and space
forces at a given time and place without prohibitive interference by an
adversary. (JP 3-12 as per JP 1-02, 8 NOV 2010)
Context—Definitions
4
USA CCoE & FT Gordon UMT: World Class Religious Support!
Context
The Need for Ethically-trained Cyberspace Warriors:
“…the increasingly blurry lines between cyber criminal and APT tools and
tactics further muddies questions of actor intent and the potential fallout.
Chalk it up to attackers’ denial and deception, uneven law enforcement,
and Byzantine ties between corrupt government agents and the criminal
underground.
In this hazy state of affairs, unraveling attackers’ intents and motives can
guide your response. Case in point: the Russia-based threat group
collecting intelligence for a sponsor government is deploying crimeware
tools that give it remote access to elements of U.S. critical infrastructure.
The group may use common crimeware, but treating these attacks as a
run-of-the-mill cyber crime would be a mistake.”
M-Trends 2015 Threat Report
Pg. 22
5
USA CCoE & FT Gordon UMT: World Class Religious Support!
Seven Basic Criteria:
• Just Cause
• Right Authority
• Public Declaration
• Right Intent
• Proportional Means
• Last Resort
• Reasonable Hope of Success
• NOTE: Additional Four Contemporary Criteria—Non-combatant Immunity; Use of Minimum Force Necessary; Ethical
Treatment of E.P.W.s; Prohibition Against Inhumane Means or Tactics
1. Saint Augustine, City of God, ed. Etienne Gibson and trans. Gerald G. Walsh, et. al. (New York: Image Books, 1958), 327-328, 446-447, and 452-453.
2. Saint Thomas Aquinas, “Summa Theologiae IIaIIae,” in R.W. Dyson, ed., Aquinas: Political Writings (Cambridge: University Press, 2002), 241.
3. Martin Cook, “Ethical Issues in War: An Overview,” in The U.S. Army War College Guide to National Security Issues, Vol. II: National Security Policy and Strategy, ed. J. Boone Bartholomees, 217-227 (Carlisle, PA: Strategic Studies Institute, 2012).
4. Hugo Grotius, On the Law of War and Peace (Whitefish, MT: Kessinger Publishing, 2004), Book III, Chs. 1-22.
5. James T. Bretzke, SJ, Handbook of Roman Catholic Moral Terms (Washington, DC: Georgetown University Press, 2013), 127.
The Just War Tradition
6
USA CCoE & FT Gordon UMT: World Class Religious Support!
Case Studies
Some Considerations:
• A Cyberspace Event Occurred But Is It An Attack? Is that
Attack then also an Act of War?
• Is This a State-on-State or a Sub-State Attack (vice Cyber
Crime, Espionage, etc.)?
• Is This Covert or Overt (a Public Declaration)?
• What Is the Intent or Purpose of the Attack (e.g. Does the
Event Constitute a Complex Catastrophe?)
• What is a Proportional Response?
• Is That Response a Last Resort?
• Does the Response Offer a Reasonable Hope of Success
(e.g. status quo ante or return to peace)?
• NOTE: Additional Four Contemporary Criteria—Non-combatant Immunity; Use of Minimum Force Necessary; Ethical
Treatment of E.P.W.s; Prohibition Against Inhumane Means or Tactics
7
USA CCoE & FT Gordon UMT: World Class Religious Support!
Trends and Possibilities:
• JWT Provides an Analytical Framework for Guiding Conduct of Cyberspace
Warfare
• State-on-State is the Future but Sub-state Actors Will Remain the Most
Immediately Dangerous
• Values + Interests + Aims Will Guide National Actions
• Coalition Partners Must Work to Understand Applicable National Laws,
Authorities, Interests, and ROE
• International Cyberspace Warfare Coalitions: Allied Cooperation Agreements
(EX: Australia, India, and ROK)
• ICANN Will Remain Neutral but Certain Nations will Augur for State-Controlled
Internet (EX: PRC, Turkey, Russia, etc.)
• Response Threshold: Cyber Attack w/Lethal Effects (Tactical, Operational, or
Strategic in Nature)
• Seams: 1.) Cyber Attack Combined w/CBRNE and/or; 2.) Trans-state Cyber
Alliances (EX: PLA + PDRK + RUS)
• Critical Question Will Remain: What is Our (Or Our Enemy’s) Endstate?
The Way Ahead
8
USA CCoE & FT Gordon UMT: World Class Religious Support!
Professional Discussion
Question and Answer
9
USA CCoE & FT Gordon UMT: World Class Religious Support!
Summary
RE Bureau 121:
“Earlier this year, South Korea's Hydro & Nuclear Power Company suffered
a mass data breach, with hackers demanding money to prevent further
leaks. South Korea again pointed the finger at Pyongyang, although others
noted that asking for a ransom wasn't typical of North Korea's approach in
other attributed attacks.
Prof Kim (Heung-Kwang) told me that Bureau 121 is looking to emulate
Stuxnet, an attack on Iran, reportedly originating from the US and Israel,
that was successful in damaging nuclear centrifuges. Doing so would be a
major escalation in North Korea's capability - moving from attacking
computer networks to instead harming infrastructure.”
David Lee, BBC Online
29 May 2015
http://www.bbc.com/news/technology-32925503

More Related Content

What's hot

Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceJarno Limnéll
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingDavid Opderbeck
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for CyberwarfareAurin Sheikh
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013Tom "Blad" Lindblad
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...IPPAI
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckJarno Limnéll
 

What's hot (20)

Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for Cyberwarfare
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality Check
 

Viewers also liked

Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins ResumePaul Mullins
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Jorge Sebastiao
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)Valeriu Margescu
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502Bill Hagestad II
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsMikko Jakonen
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...AFCEA International
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Jorge Sebastiao
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Ulrich Janßen
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)TBSS Group
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015AFCEA International
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015AFCEA International
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving TheatreRadware
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operationsClifford Stone
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015AFCEA International
 

Viewers also liked (20)

HA10 – Task 1
HA10 – Task 1HA10 – Task 1
HA10 – Task 1
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015
 
ISIS and Cyber Terrorism
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber Terrorism
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
 

Similar to Cyber Ethics: TechNet Augusta 2015

UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGLillian Ekwosi-Egbulem
 
Lecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power CompetitionLecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power CompetitionStanford University
 
Cyberpower and National SecurityRelated titles.docx
  Cyberpower and     National SecurityRelated titles.docx  Cyberpower and     National SecurityRelated titles.docx
Cyberpower and National SecurityRelated titles.docxaryan532920
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Mark Raduenzel
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedSusanaFurman449
 
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docxrhetttrevannion
 
Enhanced Warfighters: Risk, Ethics, and Policy
Enhanced Warfighters: Risk, Ethics, and PolicyEnhanced Warfighters: Risk, Ethics, and Policy
Enhanced Warfighters: Risk, Ethics, and PolicyIlya Klabukov
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
Cyber CapabilitiesExampleIT 298 BohmanJanuary 6th, 2014.docx
Cyber CapabilitiesExampleIT 298  BohmanJanuary 6th, 2014.docxCyber CapabilitiesExampleIT 298  BohmanJanuary 6th, 2014.docx
Cyber CapabilitiesExampleIT 298 BohmanJanuary 6th, 2014.docxfaithxdunce63732
 
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...Mansoor Faridi, CISA
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slidesdondiw
 
"Cross domain” deterrence, escalation geometries and the morphing of strategy
"Cross domain” deterrence, escalation geometries and the morphing of strategy"Cross domain” deterrence, escalation geometries and the morphing of strategy
"Cross domain” deterrence, escalation geometries and the morphing of strategyLawrence Livermore National Laboratory
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarStanford University
 
Pendall Ebo National Power
Pendall Ebo National PowerPendall Ebo National Power
Pendall Ebo National Powerpendalld
 

Similar to Cyber Ethics: TechNet Augusta 2015 (20)

UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
 
Lecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power CompetitionLecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power Competition
 
Cyberpower and National SecurityRelated titles.docx
  Cyberpower and     National SecurityRelated titles.docx  Cyberpower and     National SecurityRelated titles.docx
Cyberpower and National SecurityRelated titles.docx
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
 
Kurnava+Book+Review (1)
Kurnava+Book+Review (1)Kurnava+Book+Review (1)
Kurnava+Book+Review (1)
 
Exp r35
Exp r35Exp r35
Exp r35
 
Cyberware
CyberwareCyberware
Cyberware
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
 
Presd1 17
Presd1 17Presd1 17
Presd1 17
 
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
 
Enhanced Warfighters: Risk, Ethics, and Policy
Enhanced Warfighters: Risk, Ethics, and PolicyEnhanced Warfighters: Risk, Ethics, and Policy
Enhanced Warfighters: Risk, Ethics, and Policy
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
Cyber CapabilitiesExampleIT 298 BohmanJanuary 6th, 2014.docx
Cyber CapabilitiesExampleIT 298  BohmanJanuary 6th, 2014.docxCyber CapabilitiesExampleIT 298  BohmanJanuary 6th, 2014.docx
Cyber CapabilitiesExampleIT 298 BohmanJanuary 6th, 2014.docx
 
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
 
Viewgraphs
ViewgraphsViewgraphs
Viewgraphs
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
"Cross domain” deterrence, escalation geometries and the morphing of strategy
"Cross domain” deterrence, escalation geometries and the morphing of strategy"Cross domain” deterrence, escalation geometries and the morphing of strategy
"Cross domain” deterrence, escalation geometries and the morphing of strategy
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern War
 
Pendall Ebo National Power
Pendall Ebo National PowerPendall Ebo National Power
Pendall Ebo National Power
 

More from AFCEA International

AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA International
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015AFCEA International
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015AFCEA International
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...AFCEA International
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...AFCEA International
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015AFCEA International
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015AFCEA International
 
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015AFCEA International
 
Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015AFCEA International
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015AFCEA International
 

More from AFCEA International (20)

William Halal
William HalalWilliam Halal
William Halal
 
Steve Rieber
Steve RieberSteve Rieber
Steve Rieber
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Bob Gourley
Bob GourleyBob Gourley
Bob Gourley
 
Ben Gibson
Ben GibsonBen Gibson
Ben Gibson
 
Joseph Witt
Joseph WittJoseph Witt
Joseph Witt
 
Lin Wells
Lin WellsLin Wells
Lin Wells
 
Tod Levitt
Tod LevittTod Levitt
Tod Levitt
 
Major Steven Nielson
Major Steven NielsonMajor Steven Nielson
Major Steven Nielson
 
Lt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, JrLt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, Jr
 
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015
 
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
 
Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
 

Recently uploaded

Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfCharlynTorres1
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...narwatsonia7
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxTechSoupConnectLondo
 
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalorenarwatsonia7
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdfilocosnortegovph
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...narwatsonia7
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Sonam Pathan
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Angels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxAngels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxLizelle Coombs
 
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...ResolutionFoundation
 

Recently uploaded (20)

Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptx
 
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Angels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxAngels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptx
 
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
 

Cyber Ethics: TechNet Augusta 2015

  • 1. 1 USA CCoE & FT Gordon UMT: World Class Religious Support! AFCEA TECHNET: “The Ethics of Cyberspace Warfare” CH (COL) Timothy S. Mallard, Ph.D. 27 August 2015 Augusta, GA //UNCLASS//
  • 2. 2 USA CCoE & FT Gordon UMT: World Class Religious Support! • Context Review • Reviewing the Just War Construct • Case Studies: PLA Unit 61398, APT 28, Bureau 121 • Trends and the Way Ahead • Question and Answer • Summary Agenda
  • 3. 3 USA CCoE & FT Gordon UMT: World Class Religious Support! Attack – An offensive task that destroys or defeats enemy forces, seizes and secures terrain, or both. (ADRP 3-90) See also defeat, deliberate attack, demonstration, destroy; feint, offensive operations, raid, secure, seize, spoiling attack. (ADRP 1-02, 2 FEB 2015) Attack the Network Operations — Lethal and nonlethal actions and operations against networks conducted continuously and simultaneously at multiple levels (tactical, operational, and strategic) that capitalize on or create key vulnerabilities and disrupt activities to eliminate the enemy’s ability to function in order to enable success of the operation or campaign. Also called AtN operations. (JP 3-15.1 as per JP 1-02, 8 NOV 2010) Complex Catastrophe — Any natural or man-made incident, including cyberspace attack, power grid failure, and terrorism, which results in cascading failures of multiple, interdependent, critical, life-sustaining infrastructure sectors and caused extraordinary levels of mass casualties, damage, or disruption severely affecting the population, environment, economy, public health, national morale, response efforts, and/or government functions. (DepSecDef Memo OSD001185-13 as per JP 1-02, 8 NOV 2010) Cyberspace Superiority — The degree of dominance in cyberspace by one force that permits the secure, reliable conduct of operations by that force, and its related land, air, maritime, and space forces at a given time and place without prohibitive interference by an adversary. (JP 3-12 as per JP 1-02, 8 NOV 2010) Context—Definitions
  • 4. 4 USA CCoE & FT Gordon UMT: World Class Religious Support! Context The Need for Ethically-trained Cyberspace Warriors: “…the increasingly blurry lines between cyber criminal and APT tools and tactics further muddies questions of actor intent and the potential fallout. Chalk it up to attackers’ denial and deception, uneven law enforcement, and Byzantine ties between corrupt government agents and the criminal underground. In this hazy state of affairs, unraveling attackers’ intents and motives can guide your response. Case in point: the Russia-based threat group collecting intelligence for a sponsor government is deploying crimeware tools that give it remote access to elements of U.S. critical infrastructure. The group may use common crimeware, but treating these attacks as a run-of-the-mill cyber crime would be a mistake.” M-Trends 2015 Threat Report Pg. 22
  • 5. 5 USA CCoE & FT Gordon UMT: World Class Religious Support! Seven Basic Criteria: • Just Cause • Right Authority • Public Declaration • Right Intent • Proportional Means • Last Resort • Reasonable Hope of Success • NOTE: Additional Four Contemporary Criteria—Non-combatant Immunity; Use of Minimum Force Necessary; Ethical Treatment of E.P.W.s; Prohibition Against Inhumane Means or Tactics 1. Saint Augustine, City of God, ed. Etienne Gibson and trans. Gerald G. Walsh, et. al. (New York: Image Books, 1958), 327-328, 446-447, and 452-453. 2. Saint Thomas Aquinas, “Summa Theologiae IIaIIae,” in R.W. Dyson, ed., Aquinas: Political Writings (Cambridge: University Press, 2002), 241. 3. Martin Cook, “Ethical Issues in War: An Overview,” in The U.S. Army War College Guide to National Security Issues, Vol. II: National Security Policy and Strategy, ed. J. Boone Bartholomees, 217-227 (Carlisle, PA: Strategic Studies Institute, 2012). 4. Hugo Grotius, On the Law of War and Peace (Whitefish, MT: Kessinger Publishing, 2004), Book III, Chs. 1-22. 5. James T. Bretzke, SJ, Handbook of Roman Catholic Moral Terms (Washington, DC: Georgetown University Press, 2013), 127. The Just War Tradition
  • 6. 6 USA CCoE & FT Gordon UMT: World Class Religious Support! Case Studies Some Considerations: • A Cyberspace Event Occurred But Is It An Attack? Is that Attack then also an Act of War? • Is This a State-on-State or a Sub-State Attack (vice Cyber Crime, Espionage, etc.)? • Is This Covert or Overt (a Public Declaration)? • What Is the Intent or Purpose of the Attack (e.g. Does the Event Constitute a Complex Catastrophe?) • What is a Proportional Response? • Is That Response a Last Resort? • Does the Response Offer a Reasonable Hope of Success (e.g. status quo ante or return to peace)? • NOTE: Additional Four Contemporary Criteria—Non-combatant Immunity; Use of Minimum Force Necessary; Ethical Treatment of E.P.W.s; Prohibition Against Inhumane Means or Tactics
  • 7. 7 USA CCoE & FT Gordon UMT: World Class Religious Support! Trends and Possibilities: • JWT Provides an Analytical Framework for Guiding Conduct of Cyberspace Warfare • State-on-State is the Future but Sub-state Actors Will Remain the Most Immediately Dangerous • Values + Interests + Aims Will Guide National Actions • Coalition Partners Must Work to Understand Applicable National Laws, Authorities, Interests, and ROE • International Cyberspace Warfare Coalitions: Allied Cooperation Agreements (EX: Australia, India, and ROK) • ICANN Will Remain Neutral but Certain Nations will Augur for State-Controlled Internet (EX: PRC, Turkey, Russia, etc.) • Response Threshold: Cyber Attack w/Lethal Effects (Tactical, Operational, or Strategic in Nature) • Seams: 1.) Cyber Attack Combined w/CBRNE and/or; 2.) Trans-state Cyber Alliances (EX: PLA + PDRK + RUS) • Critical Question Will Remain: What is Our (Or Our Enemy’s) Endstate? The Way Ahead
  • 8. 8 USA CCoE & FT Gordon UMT: World Class Religious Support! Professional Discussion Question and Answer
  • 9. 9 USA CCoE & FT Gordon UMT: World Class Religious Support! Summary RE Bureau 121: “Earlier this year, South Korea's Hydro & Nuclear Power Company suffered a mass data breach, with hackers demanding money to prevent further leaks. South Korea again pointed the finger at Pyongyang, although others noted that asking for a ransom wasn't typical of North Korea's approach in other attributed attacks. Prof Kim (Heung-Kwang) told me that Bureau 121 is looking to emulate Stuxnet, an attack on Iran, reportedly originating from the US and Israel, that was successful in damaging nuclear centrifuges. Doing so would be a major escalation in North Korea's capability - moving from attacking computer networks to instead harming infrastructure.” David Lee, BBC Online 29 May 2015 http://www.bbc.com/news/technology-32925503