2007 Aurora Test
• Cyberwarfare is generally state-on-state action equivalent to an armed attack or use of force in cyberspace that may trigger a military response with a proportional kinetic use of force. • Cyberterrorism can be considered “the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.” • Cybercrime includes unauthorized network breaches and theft of intellectual property and other data; it can be financially motivated, and response is typically the jurisdiction of law enforcement agencies. • Cyberactivism is when individuals perform cyberattacks for pleasure, philosophical, political, or other nonmonetary reasons
Saudi-Aramco 2012 • In August 2012 a series of cyberattacks were directed against Saudi Aramco, the world’s largest oil and gas producer. • The destructive attacks compromised 30,000 computers and the code was apparently designed to disrupt or halt oil production. • Numerous groups, some with links to nations with objectives counter to Saudi Arabia, have claimed credit for this incident.
IEEE Spectrum, Feb 2013
Russia v. Ukraine 2015-2016
Destructive malware attacks == Cyberwar ? • WannaCry (2017) • $4B-$8B • NotPetya (2017) • $10B • Most devastating cyberattack (so far) • Ransomware (2018+) • Atlanta $10M Mike McQuade
Full detail: https://csis-prod.s3.amazonaws.com/s3fs-public/ 190904_Significant_Cyber_Events_List.pdf CSIS Technology Policy Program | Source: CSIS & Hackmageddon
Hackmageddon Statistics September 2020
Smith’s proposed "Digital Geneva Convention" requirements 1. No targeting of tech companies, private sector, or critical infrastructure. 2. Assist private-sector e ff orts to detect, contain, respond to, and recover from events. 3. Report vulnerabilities to vendors rather than stockpile, sell, or exploit them. 4. Exercise restraint in developing cyberweapons and ensure that any developed are limited, precise, and not reusable. 5. Commit nonproliferation activities to cyberweapons. 6. Limit o ff ensive operations to avoid a mass event. Microsoft President Brad Smith's RSA 2017 Keynote
Lawmakers worldwide want to "do something" They need to ensure any new policies/regulations are CREME - y : C ooperative – they work together, rather than interfere with each other R elevant – addressing a problem that really matters E nforceable – preventing violations or enabling detection and prosecution of violators M eaningful – addressing the identified problem in an e ff ective manner E mpowering – encouraging a culture of security
Recommend
More recommend