cyber conflicts - time for reality check

69
. McAfee Confidential . Jarno Limnéll | Director of Cyber Security Professor of Cyber Security in Aalto University Doctor of Military Science Twitter: @JarnoLim Cyber Conflicts – Time for Reality Check

Upload: jarno-limnell

Post on 08-Jun-2015

257 views

Category:

Technology


2 download

DESCRIPTION

It is time for reality check in Cyber Conflicts and Cyber Warfare.

TRANSCRIPT

Page 1: Cyber Conflicts - Time for Reality Check

.

McAfee Confidential

.

Jarno Limnéll | Director of Cyber SecurityProfessor of Cyber Security in Aalto UniversityDoctor of Military ScienceTwitter: @JarnoLim

Cyber Conflicts – Time for Reality Check

Page 2: Cyber Conflicts - Time for Reality Check

“We are about three warm meals away from anarchy/revolution?”

Page 3: Cyber Conflicts - Time for Reality Check

Security FEELING

RESILIENCEREALITY

Page 4: Cyber Conflicts - Time for Reality Check

FEELING: HOW (SECURE) DO WE FEEL?

Page 5: Cyber Conflicts - Time for Reality Check
Page 6: Cyber Conflicts - Time for Reality Check

?

REALITY: HOW THINGS REALLY ARE?

Page 7: Cyber Conflicts - Time for Reality Check

SECURITY ENVIRONMENT – PHYSICAL AND DIGITAL

– IS MORE UNCERTAIN, DYNAMIC AND MORE DEMANDING THAN EVER

Page 8: Cyber Conflicts - Time for Reality Check

RESILIENCE: HOW WE WITHSTAND PHYSICALLY AND MENTALLY INSECURITY – HOW DO WE VALUE OUR SECURITY?

Page 9: Cyber Conflicts - Time for Reality Check

Complete security is a myth,Known – Unknown threats

Instead of (only) building walls,”Defense in depth”

Page 10: Cyber Conflicts - Time for Reality Check

Ability to change and resilience

create security.

Not constancy.

Page 11: Cyber Conflicts - Time for Reality Check

Security under the Cyber Dome

The Digital world is effecting everywhere

Page 12: Cyber Conflicts - Time for Reality Check

Everybody and everything is becoming CONNECTED

Dependence

Page 13: Cyber Conflicts - Time for Reality Check
Page 14: Cyber Conflicts - Time for Reality Check

14

THE DIGITAL WORLD OF BITSDIGITAL AND PHYSICAL BLUR

Page 15: Cyber Conflicts - Time for Reality Check
Page 16: Cyber Conflicts - Time for Reality Check

Returning back to “typewriters age”?No. But security is taken (hopefully) more serious.

Page 17: Cyber Conflicts - Time for Reality Check

The digital world is everywhere.

So must be Security. Like whisked egg in the cake.

Page 18: Cyber Conflicts - Time for Reality Check

There is no issue so important in security – which remains so poorly understood…

Page 19: Cyber Conflicts - Time for Reality Check

Cybersecurity is primarily a strategic issue

GU

IDA

NCE

Page 20: Cyber Conflicts - Time for Reality Check

The importance of combining technological and strategic thinking

- both are needed in order to have

comprehensive approach to cybersecurity,its threats and solutions

Page 21: Cyber Conflicts - Time for Reality Check

Cyber conflict?

Page 22: Cyber Conflicts - Time for Reality Check

“Cyberwar” should be used carefully…

…not separated from the context of War

Page 23: Cyber Conflicts - Time for Reality Check

Cyber is already and will be an element of all crisis we’re going to see in the future

Page 24: Cyber Conflicts - Time for Reality Check

"Every age has its own kind of war, its own limiting conditions and its own peculiar preconceptions.”Carl von Clausewitz

Continuation of politics by other means,

incl. cyber means in ”policy toolbox”

Page 25: Cyber Conflicts - Time for Reality Check

IN THE SHADOWS,3 levels of cyber activities

Lower level cyber activitiesDigital information “war”Strategic cyber attacks

Page 26: Cyber Conflicts - Time for Reality Check

US Department of Defense’s

3 types of Cyber threats:

Page 27: Cyber Conflicts - Time for Reality Check

27

Lack of precedents, Cyber playbook is pretty empty (at the moment)

Page 28: Cyber Conflicts - Time for Reality Check

THE FIFTH DOMAIN or penetrating all levels and dimensions?

LAND SEA

SPACEAIR

CYBER

Page 29: Cyber Conflicts - Time for Reality Check

Cyber needs to be considered as part of broader military strategy

Page 30: Cyber Conflicts - Time for Reality Check

Strategic challenges

How integrate Cyber to other military operations and broader concept?

Outsourcing Cyber attacks – how to respond?

The problem of attribution – who is your enemy?

Page 31: Cyber Conflicts - Time for Reality Check

NATO – Cyber – Article 5

Page 32: Cyber Conflicts - Time for Reality Check

Threat,Resources

Page 33: Cyber Conflicts - Time for Reality Check

1. Cyberattacks, cyber-espionage2. Counterintelligence3. Terrorism4. WMD Profiliferation5. Counterspace

Page 34: Cyber Conflicts - Time for Reality Check

DefenseNews Leadership Poll,January 2014

Page 35: Cyber Conflicts - Time for Reality Check

Threat evaluationWHO (actor/condition) produces the threat?

WHY (motivation)?How serious is the IMPACT?

Page 36: Cyber Conflicts - Time for Reality Check

Cyber arms raceAccelerating

Page 37: Cyber Conflicts - Time for Reality Check
Page 38: Cyber Conflicts - Time for Reality Check

NOT ONLY NATION-STATES

There are 20 to 30 cybercrime groups that have nation-state level capacity

Page 39: Cyber Conflicts - Time for Reality Check

“You are the cyber-war agents and get yourself

ready for such war wholeheartedly.”

Iran's Supreme Leader Ayatollah Ali Khamenei

“Cyber will soon be revealed to be the biggest

revolution in warfare, more than gunpowder and the utilization of air power

in the last century.”Major General Aviv Kochavi, IDF

Page 40: Cyber Conflicts - Time for Reality Check

“We don't need more tanks, we need the latest in cyber

warfare.”

UK Prime Minister David Cameron

“U.S. Cyber Command will number more than 6,000 people by 2016, making it

one of the largest such forces in the world.”

US Secretary of Defense Chuck Hagel

Page 41: Cyber Conflicts - Time for Reality Check

The world is moving towards a greater strategic

use of cyber to persuade adversaries to

change their behavior.

Capability and will.

Page 42: Cyber Conflicts - Time for Reality Check

What restraints the use of strategic cyber capabilities?

Unpredictable side-effectsDo not expose capabilitiesPossible escalation

Page 43: Cyber Conflicts - Time for Reality Check

Resources are needed, but in cyber big brains are more important than big brawn…

Page 44: Cyber Conflicts - Time for Reality Check

“007, I can do more damage on my laptop, sitting in my pajamas, before my first cup of

Earl Grey than you can do a year in the field.”

“Q” on the movie: “007 Skyfall”

Page 45: Cyber Conflicts - Time for Reality Check

5 Strategic Trendsto Follow

Page 46: Cyber Conflicts - Time for Reality Check

1The Role of

Cyber Espionage

Page 47: Cyber Conflicts - Time for Reality Check

WHO’S SPYING ON WHOM?

Page 48: Cyber Conflicts - Time for Reality Check

Does intelligence collection or cyber reconnaissance become an act of war?

Page 49: Cyber Conflicts - Time for Reality Check

2Measuring

Cyber Capabilities

Page 50: Cyber Conflicts - Time for Reality Check

Level of Cyber capabilities?

SUSPICION

Page 51: Cyber Conflicts - Time for Reality Check

Digital dependence - DefensiveInformational - Intelligence

Offensive capabilitiesResilience (physical, mental)

R&D and innovation capabilitiesDoctrine, Policy

A country’s cyber military strength can be judged by six capabilities:

Page 52: Cyber Conflicts - Time for Reality Check
Page 53: Cyber Conflicts - Time for Reality Check

3Grey area

Page 54: Cyber Conflicts - Time for Reality Check

Beginning – End

Our side – Their side

Military – Civilian

Involved – Not-involved

Win – Lose

Violence – Non-violence

Hardware – Software

Page 55: Cyber Conflicts - Time for Reality Check

4Cyber

Deterrence

Page 56: Cyber Conflicts - Time for Reality Check

ELEMENTS OF CYBER

DETERRENCE

RESILIENCEATTRIBUTION

OFFENSE

Page 57: Cyber Conflicts - Time for Reality Check

Countries will expose offensive cyber capabilities more openly – because of deterrence

Page 58: Cyber Conflicts - Time for Reality Check

5Cyber Peace

Page 59: Cyber Conflicts - Time for Reality Check

THE TREND IS OFFENSIVE

The main question is not how to get rid of it but how to live with it!

Page 60: Cyber Conflicts - Time for Reality Check

The most important question in (cyber) security?

Page 61: Cyber Conflicts - Time for Reality Check

TRUST

Page 62: Cyber Conflicts - Time for Reality Check

On the road to distrust?

1990 1995 2000 2005 2010 2015 2020

Internetbecomes a mass

phenomenon

WEB 2.0is born

JOURNEY FROM THE WORLD OF ATOMS TO THE WORLD OF BITS

We are hereWe choose eitherLEADERSHIP or CRISIS…

2014

The zone of distrust

The zone of trust

Familiar, accepted normsOld norms are adjusted to cope with the “brave new world”

The need for new norms and ways of thinking

Page 63: Cyber Conflicts - Time for Reality Check

Are we the last generation to take joy from the global

Internet?

The internet has changed the way we change our

world

Page 64: Cyber Conflicts - Time for Reality Check

Security - Privacy

Page 65: Cyber Conflicts - Time for Reality Check
Page 66: Cyber Conflicts - Time for Reality Check

CYBER SECURITY IS BECOMING MORE PERSONAL

Page 67: Cyber Conflicts - Time for Reality Check

67

It is a right to get work email on a personally owned device

Page 68: Cyber Conflicts - Time for Reality Check

What is already out there?

Page 69: Cyber Conflicts - Time for Reality Check

THANK YOU!

[email protected]