SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
1
USA CCoE & FT Gordon UMT: World Class Religious Support!
AFCEA TECHNET:
“The Ethics of
Cyberspace Warfare”
CH (COL) Timothy S. Mallard, Ph.D.
27 August 2015
Augusta, GA
//UNCLASS//
2
USA CCoE & FT Gordon UMT: World Class Religious Support!
• Context Review
• Reviewing the Just War Construct
• Case Studies: PLA Unit 61398, APT 28, Bureau 121
• Trends and the Way Ahead
• Question and Answer
• Summary
Agenda
3
USA CCoE & FT Gordon UMT: World Class Religious Support!
Attack – An offensive task that destroys or defeats enemy forces, seizes and secures terrain, or
both. (ADRP 3-90) See also defeat, deliberate attack, demonstration, destroy; feint, offensive
operations, raid, secure, seize, spoiling attack. (ADRP 1-02, 2 FEB 2015)
Attack the Network Operations — Lethal and nonlethal actions and operations against networks
conducted continuously and simultaneously at multiple levels (tactical, operational, and strategic)
that capitalize on or create key vulnerabilities and disrupt activities to eliminate the enemy’s ability
to function in order to enable success of the operation or campaign. Also called AtN operations.
(JP 3-15.1 as per JP 1-02, 8 NOV 2010)
Complex Catastrophe — Any natural or man-made incident, including cyberspace attack,
power grid failure, and terrorism, which results in cascading failures of multiple,
interdependent, critical, life-sustaining infrastructure sectors and caused extraordinary
levels of mass casualties, damage, or disruption severely affecting the population,
environment, economy, public health, national morale, response efforts, and/or
government functions. (DepSecDef Memo OSD001185-13 as per JP 1-02, 8 NOV 2010)
Cyberspace Superiority — The degree of dominance in cyberspace by one force that permits the
secure, reliable conduct of operations by that force, and its related land, air, maritime, and space
forces at a given time and place without prohibitive interference by an
adversary. (JP 3-12 as per JP 1-02, 8 NOV 2010)
Context—Definitions
4
USA CCoE & FT Gordon UMT: World Class Religious Support!
Context
The Need for Ethically-trained Cyberspace Warriors:
“…the increasingly blurry lines between cyber criminal and APT tools and
tactics further muddies questions of actor intent and the potential fallout.
Chalk it up to attackers’ denial and deception, uneven law enforcement,
and Byzantine ties between corrupt government agents and the criminal
underground.
In this hazy state of affairs, unraveling attackers’ intents and motives can
guide your response. Case in point: the Russia-based threat group
collecting intelligence for a sponsor government is deploying crimeware
tools that give it remote access to elements of U.S. critical infrastructure.
The group may use common crimeware, but treating these attacks as a
run-of-the-mill cyber crime would be a mistake.”
M-Trends 2015 Threat Report
Pg. 22
5
USA CCoE & FT Gordon UMT: World Class Religious Support!
Seven Basic Criteria:
• Just Cause
• Right Authority
• Public Declaration
• Right Intent
• Proportional Means
• Last Resort
• Reasonable Hope of Success
• NOTE: Additional Four Contemporary Criteria—Non-combatant Immunity; Use of Minimum Force Necessary; Ethical
Treatment of E.P.W.s; Prohibition Against Inhumane Means or Tactics
1. Saint Augustine, City of God, ed. Etienne Gibson and trans. Gerald G. Walsh, et. al. (New York: Image Books, 1958), 327-328, 446-447, and 452-453.
2. Saint Thomas Aquinas, “Summa Theologiae IIaIIae,” in R.W. Dyson, ed., Aquinas: Political Writings (Cambridge: University Press, 2002), 241.
3. Martin Cook, “Ethical Issues in War: An Overview,” in The U.S. Army War College Guide to National Security Issues, Vol. II: National Security Policy and Strategy, ed. J. Boone Bartholomees, 217-227 (Carlisle, PA: Strategic Studies Institute, 2012).
4. Hugo Grotius, On the Law of War and Peace (Whitefish, MT: Kessinger Publishing, 2004), Book III, Chs. 1-22.
5. James T. Bretzke, SJ, Handbook of Roman Catholic Moral Terms (Washington, DC: Georgetown University Press, 2013), 127.
The Just War Tradition
6
USA CCoE & FT Gordon UMT: World Class Religious Support!
Case Studies
Some Considerations:
• A Cyberspace Event Occurred But Is It An Attack? Is that
Attack then also an Act of War?
• Is This a State-on-State or a Sub-State Attack (vice Cyber
Crime, Espionage, etc.)?
• Is This Covert or Overt (a Public Declaration)?
• What Is the Intent or Purpose of the Attack (e.g. Does the
Event Constitute a Complex Catastrophe?)
• What is a Proportional Response?
• Is That Response a Last Resort?
• Does the Response Offer a Reasonable Hope of Success
(e.g. status quo ante or return to peace)?
• NOTE: Additional Four Contemporary Criteria—Non-combatant Immunity; Use of Minimum Force Necessary; Ethical
Treatment of E.P.W.s; Prohibition Against Inhumane Means or Tactics
7
USA CCoE & FT Gordon UMT: World Class Religious Support!
Trends and Possibilities:
• JWT Provides an Analytical Framework for Guiding Conduct of Cyberspace
Warfare
• State-on-State is the Future but Sub-state Actors Will Remain the Most
Immediately Dangerous
• Values + Interests + Aims Will Guide National Actions
• Coalition Partners Must Work to Understand Applicable National Laws,
Authorities, Interests, and ROE
• International Cyberspace Warfare Coalitions: Allied Cooperation Agreements
(EX: Australia, India, and ROK)
• ICANN Will Remain Neutral but Certain Nations will Augur for State-Controlled
Internet (EX: PRC, Turkey, Russia, etc.)
• Response Threshold: Cyber Attack w/Lethal Effects (Tactical, Operational, or
Strategic in Nature)
• Seams: 1.) Cyber Attack Combined w/CBRNE and/or; 2.) Trans-state Cyber
Alliances (EX: PLA + PDRK + RUS)
• Critical Question Will Remain: What is Our (Or Our Enemy’s) Endstate?
The Way Ahead
8
USA CCoE & FT Gordon UMT: World Class Religious Support!
Professional Discussion
Question and Answer
9
USA CCoE & FT Gordon UMT: World Class Religious Support!
Summary
RE Bureau 121:
“Earlier this year, South Korea's Hydro & Nuclear Power Company suffered
a mass data breach, with hackers demanding money to prevent further
leaks. South Korea again pointed the finger at Pyongyang, although others
noted that asking for a ransom wasn't typical of North Korea's approach in
other attributed attacks.
Prof Kim (Heung-Kwang) told me that Bureau 121 is looking to emulate
Stuxnet, an attack on Iran, reportedly originating from the US and Israel,
that was successful in damaging nuclear centrifuges. Doing so would be a
major escalation in North Korea's capability - moving from attacking
computer networks to instead harming infrastructure.”
David Lee, BBC Online
29 May 2015
http://www.bbc.com/news/technology-32925503

Mais conteúdo relacionado

Mais procurados

Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceJarno Limnéll
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingDavid Opderbeck
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for CyberwarfareAurin Sheikh
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013Tom "Blad" Lindblad
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...IPPAI
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckJarno Limnéll
 

Mais procurados (20)

Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for Cyberwarfare
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality Check
 

Destaque

Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins ResumePaul Mullins
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Jorge Sebastiao
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)Valeriu Margescu
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502Bill Hagestad II
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsMikko Jakonen
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...AFCEA International
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Jorge Sebastiao
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Ulrich Janßen
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)TBSS Group
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015AFCEA International
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015AFCEA International
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving TheatreRadware
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operationsClifford Stone
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015AFCEA International
 

Destaque (20)

HA10 – Task 1
HA10 – Task 1HA10 – Task 1
HA10 – Task 1
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015
 
ISIS and Cyber Terrorism
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber Terrorism
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
 

Semelhante a Cyber Ethics: TechNet Augusta 2015

UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGLillian Ekwosi-Egbulem
 
Lecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power CompetitionLecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power CompetitionStanford University
 
Cyberpower and National SecurityRelated titles.docx
  Cyberpower and     National SecurityRelated titles.docx  Cyberpower and     National SecurityRelated titles.docx
Cyberpower and National SecurityRelated titles.docxaryan532920
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Mark Raduenzel
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedSusanaFurman449
 
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docxrhetttrevannion
 
Enhanced Warfighters: Risk, Ethics, and Policy
Enhanced Warfighters: Risk, Ethics, and PolicyEnhanced Warfighters: Risk, Ethics, and Policy
Enhanced Warfighters: Risk, Ethics, and PolicyIlya Klabukov
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
Cyber CapabilitiesExampleIT 298 BohmanJanuary 6th, 2014.docx
Cyber CapabilitiesExampleIT 298  BohmanJanuary 6th, 2014.docxCyber CapabilitiesExampleIT 298  BohmanJanuary 6th, 2014.docx
Cyber CapabilitiesExampleIT 298 BohmanJanuary 6th, 2014.docxfaithxdunce63732
 
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...Mansoor Faridi, CISA
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slidesdondiw
 
"Cross domain” deterrence, escalation geometries and the morphing of strategy
"Cross domain” deterrence, escalation geometries and the morphing of strategy"Cross domain” deterrence, escalation geometries and the morphing of strategy
"Cross domain” deterrence, escalation geometries and the morphing of strategyLawrence Livermore National Laboratory
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarStanford University
 
Pendall Ebo National Power
Pendall Ebo National PowerPendall Ebo National Power
Pendall Ebo National Powerpendalld
 

Semelhante a Cyber Ethics: TechNet Augusta 2015 (20)

UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
 
Lecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power CompetitionLecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power Competition
 
Cyberpower and National SecurityRelated titles.docx
  Cyberpower and     National SecurityRelated titles.docx  Cyberpower and     National SecurityRelated titles.docx
Cyberpower and National SecurityRelated titles.docx
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
 
Kurnava+Book+Review (1)
Kurnava+Book+Review (1)Kurnava+Book+Review (1)
Kurnava+Book+Review (1)
 
Exp r35
Exp r35Exp r35
Exp r35
 
Cyberware
CyberwareCyberware
Cyberware
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
 
Presd1 17
Presd1 17Presd1 17
Presd1 17
 
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
 
Enhanced Warfighters: Risk, Ethics, and Policy
Enhanced Warfighters: Risk, Ethics, and PolicyEnhanced Warfighters: Risk, Ethics, and Policy
Enhanced Warfighters: Risk, Ethics, and Policy
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
Cyber CapabilitiesExampleIT 298 BohmanJanuary 6th, 2014.docx
Cyber CapabilitiesExampleIT 298  BohmanJanuary 6th, 2014.docxCyber CapabilitiesExampleIT 298  BohmanJanuary 6th, 2014.docx
Cyber CapabilitiesExampleIT 298 BohmanJanuary 6th, 2014.docx
 
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
 
Viewgraphs
ViewgraphsViewgraphs
Viewgraphs
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
"Cross domain” deterrence, escalation geometries and the morphing of strategy
"Cross domain” deterrence, escalation geometries and the morphing of strategy"Cross domain” deterrence, escalation geometries and the morphing of strategy
"Cross domain” deterrence, escalation geometries and the morphing of strategy
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern War
 
Pendall Ebo National Power
Pendall Ebo National PowerPendall Ebo National Power
Pendall Ebo National Power
 

Mais de AFCEA International

AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA International
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015AFCEA International
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015AFCEA International
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...AFCEA International
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...AFCEA International
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015AFCEA International
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015AFCEA International
 
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015AFCEA International
 
Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015AFCEA International
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015AFCEA International
 

Mais de AFCEA International (20)

William Halal
William HalalWilliam Halal
William Halal
 
Steve Rieber
Steve RieberSteve Rieber
Steve Rieber
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Bob Gourley
Bob GourleyBob Gourley
Bob Gourley
 
Ben Gibson
Ben GibsonBen Gibson
Ben Gibson
 
Joseph Witt
Joseph WittJoseph Witt
Joseph Witt
 
Lin Wells
Lin WellsLin Wells
Lin Wells
 
Tod Levitt
Tod LevittTod Levitt
Tod Levitt
 
Major Steven Nielson
Major Steven NielsonMajor Steven Nielson
Major Steven Nielson
 
Lt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, JrLt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, Jr
 
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015
 
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
 
Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
 

Último

Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...
Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...
Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...Amil baba
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdfilocosnortegovph
 
2024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 232024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 23JSchaus & Associates
 
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOMAIRIEORGERUS
 
23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programme23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programmeChristina Parmionova
 
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...MartMantilla1
 
NO1 Certified Best vashikaran specialist in UK USA UAE London Dubai Canada Am...
NO1 Certified Best vashikaran specialist in UK USA UAE London Dubai Canada Am...NO1 Certified Best vashikaran specialist in UK USA UAE London Dubai Canada Am...
NO1 Certified Best vashikaran specialist in UK USA UAE London Dubai Canada Am...Amil Baba Dawood bangali
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxjennysansano2
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Christina Parmionova
 
Digital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical ImplicationsDigital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical ImplicationsBeat Estermann
 
2024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 242024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 24JSchaus & Associates
 
UN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportUN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportEnergy for One World
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...ResolutionFoundation
 
Canadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfCanadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfAndrew Griffith
 
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.Christina Parmionova
 
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.Christina Parmionova
 
Pope Francis Teaching: Dignitas Infinita- On Human Dignity
Pope Francis Teaching: Dignitas Infinita- On Human DignityPope Francis Teaching: Dignitas Infinita- On Human Dignity
Pope Francis Teaching: Dignitas Infinita- On Human DignityEnergy for One World
 
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATIONGOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATIONShivamShukla147857
 
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptx
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptxPETTY CASH FUND - GOVERNMENT ACCOUNTING.pptx
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptxCrisAnnBusilan
 

Último (20)

Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...
Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...
Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf
 
2024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 232024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 23
 
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
 
23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programme23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programme
 
Housing For All - Fair Housing Choice Report
Housing For All - Fair Housing Choice ReportHousing For All - Fair Housing Choice Report
Housing For All - Fair Housing Choice Report
 
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...
 
NO1 Certified Best vashikaran specialist in UK USA UAE London Dubai Canada Am...
NO1 Certified Best vashikaran specialist in UK USA UAE London Dubai Canada Am...NO1 Certified Best vashikaran specialist in UK USA UAE London Dubai Canada Am...
NO1 Certified Best vashikaran specialist in UK USA UAE London Dubai Canada Am...
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptx
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.
 
Digital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical ImplicationsDigital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical Implications
 
2024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 242024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 24
 
UN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportUN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 Report
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...
 
Canadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfCanadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdf
 
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
 
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
 
Pope Francis Teaching: Dignitas Infinita- On Human Dignity
Pope Francis Teaching: Dignitas Infinita- On Human DignityPope Francis Teaching: Dignitas Infinita- On Human Dignity
Pope Francis Teaching: Dignitas Infinita- On Human Dignity
 
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATIONGOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
 
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptx
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptxPETTY CASH FUND - GOVERNMENT ACCOUNTING.pptx
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptx
 

Cyber Ethics: TechNet Augusta 2015

  • 1. 1 USA CCoE & FT Gordon UMT: World Class Religious Support! AFCEA TECHNET: “The Ethics of Cyberspace Warfare” CH (COL) Timothy S. Mallard, Ph.D. 27 August 2015 Augusta, GA //UNCLASS//
  • 2. 2 USA CCoE & FT Gordon UMT: World Class Religious Support! • Context Review • Reviewing the Just War Construct • Case Studies: PLA Unit 61398, APT 28, Bureau 121 • Trends and the Way Ahead • Question and Answer • Summary Agenda
  • 3. 3 USA CCoE & FT Gordon UMT: World Class Religious Support! Attack – An offensive task that destroys or defeats enemy forces, seizes and secures terrain, or both. (ADRP 3-90) See also defeat, deliberate attack, demonstration, destroy; feint, offensive operations, raid, secure, seize, spoiling attack. (ADRP 1-02, 2 FEB 2015) Attack the Network Operations — Lethal and nonlethal actions and operations against networks conducted continuously and simultaneously at multiple levels (tactical, operational, and strategic) that capitalize on or create key vulnerabilities and disrupt activities to eliminate the enemy’s ability to function in order to enable success of the operation or campaign. Also called AtN operations. (JP 3-15.1 as per JP 1-02, 8 NOV 2010) Complex Catastrophe — Any natural or man-made incident, including cyberspace attack, power grid failure, and terrorism, which results in cascading failures of multiple, interdependent, critical, life-sustaining infrastructure sectors and caused extraordinary levels of mass casualties, damage, or disruption severely affecting the population, environment, economy, public health, national morale, response efforts, and/or government functions. (DepSecDef Memo OSD001185-13 as per JP 1-02, 8 NOV 2010) Cyberspace Superiority — The degree of dominance in cyberspace by one force that permits the secure, reliable conduct of operations by that force, and its related land, air, maritime, and space forces at a given time and place without prohibitive interference by an adversary. (JP 3-12 as per JP 1-02, 8 NOV 2010) Context—Definitions
  • 4. 4 USA CCoE & FT Gordon UMT: World Class Religious Support! Context The Need for Ethically-trained Cyberspace Warriors: “…the increasingly blurry lines between cyber criminal and APT tools and tactics further muddies questions of actor intent and the potential fallout. Chalk it up to attackers’ denial and deception, uneven law enforcement, and Byzantine ties between corrupt government agents and the criminal underground. In this hazy state of affairs, unraveling attackers’ intents and motives can guide your response. Case in point: the Russia-based threat group collecting intelligence for a sponsor government is deploying crimeware tools that give it remote access to elements of U.S. critical infrastructure. The group may use common crimeware, but treating these attacks as a run-of-the-mill cyber crime would be a mistake.” M-Trends 2015 Threat Report Pg. 22
  • 5. 5 USA CCoE & FT Gordon UMT: World Class Religious Support! Seven Basic Criteria: • Just Cause • Right Authority • Public Declaration • Right Intent • Proportional Means • Last Resort • Reasonable Hope of Success • NOTE: Additional Four Contemporary Criteria—Non-combatant Immunity; Use of Minimum Force Necessary; Ethical Treatment of E.P.W.s; Prohibition Against Inhumane Means or Tactics 1. Saint Augustine, City of God, ed. Etienne Gibson and trans. Gerald G. Walsh, et. al. (New York: Image Books, 1958), 327-328, 446-447, and 452-453. 2. Saint Thomas Aquinas, “Summa Theologiae IIaIIae,” in R.W. Dyson, ed., Aquinas: Political Writings (Cambridge: University Press, 2002), 241. 3. Martin Cook, “Ethical Issues in War: An Overview,” in The U.S. Army War College Guide to National Security Issues, Vol. II: National Security Policy and Strategy, ed. J. Boone Bartholomees, 217-227 (Carlisle, PA: Strategic Studies Institute, 2012). 4. Hugo Grotius, On the Law of War and Peace (Whitefish, MT: Kessinger Publishing, 2004), Book III, Chs. 1-22. 5. James T. Bretzke, SJ, Handbook of Roman Catholic Moral Terms (Washington, DC: Georgetown University Press, 2013), 127. The Just War Tradition
  • 6. 6 USA CCoE & FT Gordon UMT: World Class Religious Support! Case Studies Some Considerations: • A Cyberspace Event Occurred But Is It An Attack? Is that Attack then also an Act of War? • Is This a State-on-State or a Sub-State Attack (vice Cyber Crime, Espionage, etc.)? • Is This Covert or Overt (a Public Declaration)? • What Is the Intent or Purpose of the Attack (e.g. Does the Event Constitute a Complex Catastrophe?) • What is a Proportional Response? • Is That Response a Last Resort? • Does the Response Offer a Reasonable Hope of Success (e.g. status quo ante or return to peace)? • NOTE: Additional Four Contemporary Criteria—Non-combatant Immunity; Use of Minimum Force Necessary; Ethical Treatment of E.P.W.s; Prohibition Against Inhumane Means or Tactics
  • 7. 7 USA CCoE & FT Gordon UMT: World Class Religious Support! Trends and Possibilities: • JWT Provides an Analytical Framework for Guiding Conduct of Cyberspace Warfare • State-on-State is the Future but Sub-state Actors Will Remain the Most Immediately Dangerous • Values + Interests + Aims Will Guide National Actions • Coalition Partners Must Work to Understand Applicable National Laws, Authorities, Interests, and ROE • International Cyberspace Warfare Coalitions: Allied Cooperation Agreements (EX: Australia, India, and ROK) • ICANN Will Remain Neutral but Certain Nations will Augur for State-Controlled Internet (EX: PRC, Turkey, Russia, etc.) • Response Threshold: Cyber Attack w/Lethal Effects (Tactical, Operational, or Strategic in Nature) • Seams: 1.) Cyber Attack Combined w/CBRNE and/or; 2.) Trans-state Cyber Alliances (EX: PLA + PDRK + RUS) • Critical Question Will Remain: What is Our (Or Our Enemy’s) Endstate? The Way Ahead
  • 8. 8 USA CCoE & FT Gordon UMT: World Class Religious Support! Professional Discussion Question and Answer
  • 9. 9 USA CCoE & FT Gordon UMT: World Class Religious Support! Summary RE Bureau 121: “Earlier this year, South Korea's Hydro & Nuclear Power Company suffered a mass data breach, with hackers demanding money to prevent further leaks. South Korea again pointed the finger at Pyongyang, although others noted that asking for a ransom wasn't typical of North Korea's approach in other attributed attacks. Prof Kim (Heung-Kwang) told me that Bureau 121 is looking to emulate Stuxnet, an attack on Iran, reportedly originating from the US and Israel, that was successful in damaging nuclear centrifuges. Doing so would be a major escalation in North Korea's capability - moving from attacking computer networks to instead harming infrastructure.” David Lee, BBC Online 29 May 2015 http://www.bbc.com/news/technology-32925503