cyberwar how worried should we be
play

Cyberwar: How Worried Should We Be? Austin ISSA Dr. Bill Young - PowerPoint PPT Presentation

Cyberwar: How Worried Should We Be? Austin ISSA Dr. Bill Young Department of Computer Science University of Texas at Austin Last updated: May 8, 2013 at 17:09 Dr. Bill Young: 1 Austin ISSA, May 9, 2013 From the Headlines Pentagon accuses


  1. Cyberwar: How Worried Should We Be? Austin ISSA Dr. Bill Young Department of Computer Science University of Texas at Austin Last updated: May 8, 2013 at 17:09 Dr. Bill Young: 1 Austin ISSA, May 9, 2013

  2. From the Headlines Pentagon accuses China of trying to hack US defence networks , The Guardian, 5/7/13 China is using espionage to acquire technology to fuel its military modernisation, the Pentagon has said, for the first time accusing the Chinese of trying to break into US defence computer networks and prompting a firm denial from Beijing. “The US government continued to be targeted for (cyber) intrusions, some of which appear to be attributable directly to the Chinese government and military,” [the report] says, adding that the main purpose of the hacking is to gain information to benefit defence industries, military planners and government leaders. Dr. Bill Young: 2 Austin ISSA, May 9, 2013

  3. From the Headlines House Intel Chair Mike Rogers Calls Chinese Cyber Attacks Unprecedented , ABC News, 2/24/13 House Intelligence Committee Chair Mike Rogers, R-Mich., said it was “beyond a shadow of a doubt” that the Chinese government and military is behind growing cyber attacks against the United States, saying “we are losing” the war to prevent the attacks. “It is unprecedented,” Rogers added. “This has never happened in the history of the world, where one nation steals the intellectual property to re-purpose it—to illegally compete against the country.” Dr. Bill Young: 3 Austin ISSA, May 9, 2013

  4. From the Headlines Cyber security in 2013: How vulnerable to attack is US now? , Christian Science Monitor, 1/9/13 The phalanx of cyberthreats aimed squarely at Americans’ livelihood became startlingly clear in 2012 and appears poised to proliferate in 2013 and beyond as government officials, corporate leaders, security experts, and ordinary citizens scramble to devise protections from attackers in cyberspace. Dr. Bill Young: 4 Austin ISSA, May 9, 2013

  5. From the Headlines U.S. Not Ready for Cyberwar Hostile Attackers Could Launch , The Daily Beast, 2/21/13 If the nightmare scenario becomes suddenly real ... If hackers shut down much of the electrical grid and the rest of the critical infrastructure goes with it ... If we are plunged into chaos and suffer more physical destruction than 50 monster hurricanes and economic damage that dwarfs the Great Depression ... Then we will wonder why we failed to guard against what outgoing Defense Secretary Leon Panetta has termed a “cyber-Pearl Harbor.” Dr. Bill Young: 5 Austin ISSA, May 9, 2013

  6. CyberSecurity: An Existential Threat? Cyberattacks an ’Existential Threat’ TO U.S., FBI Says , Computerworld, 3/24/10 A top FBI official warned today that many cyber-adversaries of the U.S. have the ability to access virtually any computer system, posing a risk that’s so great it could “challenge our country’s very existence.” According to Steven Chabinsky, deputy assistant director of the FBI’s cyber division: “The cyber threat can be an existential threat—meaning it can challenge our country’s very existence, or significantly alter our nation’s potential,” Chabinsky said. “How we rise to the cybersecurity challenge will determine whether our nation’s best days are ahead of us or behind us.” Dr. Bill Young: 6 Austin ISSA, May 9, 2013

  7. Question for All of Us If cyberattacks are a credible threat to the very existence of our nation, why aren’t we at war? Or are we? Are we currently engaged in a Cyber War? Or is this talk about Cyber War merely hype and exaggeration? Dr. Bill Young: 7 Austin ISSA, May 9, 2013

  8. It’s a Dangerous World “More than 5.5 billion attempted attacks were identified in 2011, an increase of 81% over 2010, with an unprecedented 403 million unique malware variants that year, a 41% leap.” (Symantec Internet Security Threat Report, 2012) Once PCs are infected they tend to stay infected. The median length of infection is 300 days. (www.insecureaboutsecurity.com, 10/19/2009) The Privacy Right’s Clearinghouse’s Chronology of Data Breaches (January, 2012) estimates conservatively that more than half a billion sensitive records have been breached since 2005. The Ponemon Institute estimates that the approximate current cost per record compromised is around $318. Dr. Bill Young: 8 Austin ISSA, May 9, 2013

  9. Some Notable Cyber Campaigns First Persian Gulf War (1991): Iraq’s command and control infrastructure is targeted. Radar and missile control network is fragmented and sections of radar coverage are taken offline without central control being aware of the outage. Estonia (2007): Cyberattacks disabled the websites of government ministries, political parties, newspapers, banks, and companies. Russia was suspected of launching the attack. Georgia (2008): Russia attacked the nation of Georgia in a dispute over the province of South Ossetia. In addition to the military attack, a concerted cyber DoS attack shut down much of Georgia’s ability to communicate with the external world. Dr. Bill Young: 9 Austin ISSA, May 9, 2013

  10. Cyber Attacks on the U.S. Moonlight Maze: (1998) traced to Russia, exfiltrated many megabytes of defense-related data, including classified naval codes and info on missile guidance systems. Titan Rain: (2003) probably Chinese, exfiltrated an estimated 10-20 terabytes of data on U.S. systems. Operation Aurora: (2009) probably Chinese, gained access and possibly modified code repositories at high tech, security and defense contractor companies. Dr. Bill Young: 10 Austin ISSA, May 9, 2013

  11. Greatest Transfer of Wealth in History In July, 2012, Gen. Keith Alexander, director of NSA and U.S. Cyber Command, referred to intellectual property loss via cyber espionage as the greatest transfer of wealth in history. “Symantec placed the cost of IP theft to the United States companies in $250 billion a year, global cybercrime at $114 billion annually ($388 billion when you factor in downtime), and McAfee estimates that $1 trillion was spent globally under remediation. And that’s our future disappearing in front of us.” Dr. Bill Young: 11 Austin ISSA, May 9, 2013

  12. But Is It War? Cyber warfare involves “actions by a nation-state to penetrate another nation’s computers or networks for the purpose of causing damage or disruption.” (Richard Clarke and Robert Knake) This definition raises as many questions as it answers. Is “warfare” even a useful term in this context? Can a non-state entity engage in warfare? Which computers or networks really matter? Which actions should qualify as acts of war? Why can’t we defend ourselves? Dr. Bill Young: 12 Austin ISSA, May 9, 2013

  13. Is “Cyberwar” the Wrong Concept? Howard Schmidt, the new cybersecurity czar for the Obama administration, has a short answer for the drumbeat of rhetoric claiming the United States is caught up in a cyberwar that it is losing. “There is no cyberwar. I think that is a terrible metaphor and I think that is a terrible concept,” Schmidt said. “There are no winners in that environment.” (Wired, 3/4/10) Dr. Bill Young: 13 Austin ISSA, May 9, 2013

  14. Is “Cyberwar” a Dangerous Concept? Security guru Bruce Schneier, in an interview with Search Security (4/9/13) said: “My real fear is less the attacks from China and more the increase in rhetoric on both sides that is fueling a cyber arms race. We are definitely not at war. The whole cyberwar metaphor is dangerous. Right now we are seeing cyber espionage. But when you call it ’war’ you evoke a particular mindset and a particular set of solutions present themselves.” Dr. Bill Young: 14 Austin ISSA, May 9, 2013

  15. Is “Cyberwar” a Dangerous Concept? The cyberwar rhetoric is dangerous. Its practitioners are artists of exaggeration, who seem to think spinning tall tales is the only way to make bureaucracies move in the right direction. ... Not only does it promote unnecessary fear, it feeds the forces of parochial nationalism and militarism undermining a communications system that has arguably done more to connect the world’s citizens than the last 50 years of diplomacy. (Ryan Singel review of Clarke and Knake in Wired, 4/22/10) Dr. Bill Young: 15 Austin ISSA, May 9, 2013

  16. Espionage, Yes—War, Not so Much What we are seeing is “Cyber espionage” on a massive scale. But espionage has never been considered an act of war. You’re probably thinking: Forget espionage–what about Cyber Pearl Harbor? What about attacks on critical infrastructure? Dr. Bill Young: 16 Austin ISSA, May 9, 2013

  17. Critical Infrastructure Credible security experts suggest that a successful widespread attack on U.S. computing infrastructure could largely shut down the U.S. economy for up to 6 months. It is estimated that the destruction from a single wave of cyber attacks on U.S. critical infrastructures could exceed $700 billion USD—the equivalent of 50 major hurricanes hitting U.S. soil at once. (Source: US Cyber Consequences Unit, July 2007) Dr. Bill Young: 17 Austin ISSA, May 9, 2013

  18. What’s the Risk? The U.S. is more dependent on advanced technology than any other society on earth. Much of U.S. critical infrastructure is remotely accessible. The openness of U.S. society means critical information about facilities (and their vulnerabilities) is widely available. Other nation states have much more control over their national communication infrastructure. Technology advances rapidly but remains riddled with vulnerabilities. Dr. Bill Young: 18 Austin ISSA, May 9, 2013

Recommend


More recommend