SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Cyber Conflict and
Geopolitics
Great Decisions 2019
https://www.TNWAC.org
Email: PatRyan@TNWAC.org
LCDR Patrick Ryan, USN (Retired)
President, Tennessee World Affairs Council
Cell: 931-261-2353
Presentation Available: http://www.slideshare.net/TNWAC
Cyber Stuff – Definition of Terms
• Cyberwar - The use of computer technology
to disrupt the activities of a state or
organization, especially the deliberate
attacking of information systems for
strategic or military purposes.
• ‘cyberwar is asymmetric, which means it
benefits lesser military powers as much as
military goliaths’
• Conventional usage – more broad, umbrella
term for a variety of activities
• Measures and Countermeasures
Geo Politics and Pivots
• Andres Article – “Cyber Conflict and
Geopolitics”
• Mahan – the “Periphery,” maritime
dominance
• Mackinder – the “Hearthland,”
continental lines of communications
• Rise and fall of great powers
• Cyber as a paradigm shift or a tool of
power competition?
U.S. Cyber
• 1988 – The “Morris” worm debuts
• 1990s – Growing recognition of Cyber threats
• 2013 – Executive Order – Improving Critical
Infrastructure Cybersecurity
• 2014 -- Cyber National Mission Force created at
NSA / Cyber Command – “to direct, synchronize,
and coordinate cyberspace planning and
operations to defend and advance national
interests in collaboration with domestic and
international partners.”
• 2018 – Cybersecurity and Infrastructure Security
Act
Great Power Competition - Russia
• Russian Federation
• Economy – Declining; GDP of Italy
• Military – Modernizing, Strategic
Nuclear Peer
• Political – Uncertain
• Intentions – “Near Abroad”; Disrupt
West
Great Power Competition - China
• People’s Republic of China
• Economy – Soaring
• Military – Rising, Prospective Peer
Competitor
• Political – Solidification of Communist
Party Rule
• Intentions – Global Superpower
Challenger
Case Study: Estonia
• Three-week wave of massive cyber attacks by
Russia against Estonia in 2007 in response to
removal of Soviet soldier statue in Tallinn (”Bronze
Night”).
• Disabled web sites of government ministries,
political parties, newspapers, banks and
companies.
• First case of state vs state cyberwar.
• NATO dispatched cyber experts, but NATO doctrine
did not define cyber attacks as military action, so
no invocation of Article V.
• Resulted in creation of the “data embassy” – data
stored abroad.
Case Study: Russia
Election / Social “Meddling”
• Long history of US-Russian / Russian-US influence
operations
• 2016 Election Cycle
• Oct 2016 – Intel Community – charged Russia
• Jan 2017 – Intel Community – aimed to assist Trump
• July 2017 – US indicts 12 GRU officers
• Russian Aims
• Harm Clinton Campaign
• Aid Trump Campaign
• Increase political discord
• Response – Special Counsel, Congress, POTUS
Ambivalence
• Impact on 2018, 2020 ???
GRU – Main Intelligence Directorate of the Russian General (Military) Staff)
Case Study: China/Office of Personnel
Management
• Chinese hackers attacked OPM in 2014-15
• Compromised 21.5 million government employees,
applicants
• 30-years of information including SSNs, fingerprint
data, banking info, assignments, training history
and other personal data
• Sensitive data on officials, military, diplomats, and
others = compromise
• FBI arrested Shanghai based “GoldSun” in 2017
for developing the malware used against OPM
and private firms
Case Study: China / Huawei
• Chinese Govt relationship with Huawei – subsidies /
ties
• International attraction of Huawei gear = $$$
• International attraction of Huawei gear – China’s heavy
hand
• Australia bans Huawei gear – China cuts coal orders
• African Union HQ – Huawei gear sending daily reports
to Shanghai
• US 23 Indictments Against Huawei – T-Mobile IP theft
Case Study: Huawei
“As a global company, Huawei is dedicated to
closely collaborating, innovating and establishing
international standards with other global
organisations to ensure that the integrity and
security of the networked solutions and services
we provide meets or exceeds the needs of our
customers and provides the assurance confidence
required by their own customers.”
www.Huawei.com – “About Huawei, CyberSecurity
Case Study: Huawei
“Overall, the (UK) Oversight Board can only
provide limited assurance that all risks to UK
national security from Huawei’s involvement in
the UK’s critical networks can be sufficiently
mitigated long-term. “
UK Oversight Board Report to the National Security Advisor
March 2019
Putin, Rogers said, “has clearly come to the conclusion that there’s little
price to pay here and that therefore ‘I can continue this activity.’”
”The Perfect Weapon” by David Sanger
In early 2018, when asked by the Senate Armed Services
Committee how the National Security Agency and the US Cyber
Command were dealing with the most naked use of cyberpower
against American democratic institutions, Adm Michael S. Rogers,
then coming to the end of his term as commander of both
organizations, admitted that neither President Obama nor
President Trump had given him the authority to respond.
Going Forward – “Release the EO!”
• Ideally, an EO would be part of a larger strategy for managing risk with the
next generation of network technologies. The elements of a strategy
should include:
• Close partnerships with the countries that share the assessment of the risk
of using Huawei and the need to act to address it.
• Robust security standards for telecommunications equipment and supply
chains (noting that some European customers of Huawei may try to dilute
standards to ensure that Huawei has continued access to their markets).
• Foreign assistance to encourage developing countries not to buy Huawei.
We will not match Chinese subsidies, but we can reduce the financial
burden of a ban.
• Support for Western telecom infrastructure companies for research and
development.
Prescription for an Executive Order
• Research on how to securely communicate over international networks
that contain Huawei equipment, since many African and Middle Eastern
companies already use Huawei.
• Formal bans (either complete or partial) on the purchase and use of
Huawei technology.
• An EO on telecom supply chain security that clearly lays out U.S. policy.
• A long-term engagement strategy with China to bring its behavior into
conformity with international norms for trade and security. China is not
going away. It will always be powerful and the United States, working with
its partners, must encourage and require change.
James Andrew Lewis , Center for Strategic and International Studies
International Cybersecurity Norms
• UN proposed treaty to limit the use of cyber attack and cyber
weapons – 1998
• Distrust made efforts unworkable but led to effort for ‘confidence
building’ and nonbinding measures
• 2010 report of the 2nd UN Group of Governmental Experts in the field
of Telecommunications in the Context of International Security (UN
GGE)
• Building “Norms”
Working Toward International Consensus
• 2013 GGE identified foundational norms that embedded
cybersecurity in the existing framework of international relations and
law.
• the applicability of the principles of state sovereignty to cyberspace;
• the centrality of international law and the UN Charter for governing state
behavior; and
• the need to respect the rights set forth in the Universal Declaration of Human
Rights and other international instruments.
Where Are We?
• Cyber Agreements
• Pause button
• Effectiveness, compliance?
• Geo Political Competition
• China and Russia (and US) will continue to
use Cyber when in their own interests
• Other players
Thank You
• Back up your data
• Don’t open suspicious
email attachments
• Use VPNs in public
WiFi spaces (or don’t
connect)

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityJasonTrinhNguyenTruo
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity AssessmentDoreen Loeber
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatMotorola Solutions
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attack6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attackCPA Australia
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
Cyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the CorporateCyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the CorporateAlbert Hui
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud ComputingKeet Sugathadasa
 

Was ist angesagt? (20)

Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber security
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
Cloud security
Cloud security Cloud security
Cloud security
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attack6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attack
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Cyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the CorporateCyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the Corporate
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Threat landscape 4.0
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0
 
Critical infrastructure
Critical infrastructureCritical infrastructure
Critical infrastructure
 

Ähnlich wie Cyberwar and Geopolitics

Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckCyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckRajeev Chauhan
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaMurray Security Services
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingDavid Opderbeck
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of GovernmentsRobbie Mitchell
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityCareer Communications Group
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infrasimisterchristen
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghPukhraj Singh
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)Pukhraj Singh
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentInternet Law Center
 

Ähnlich wie Cyberwar and Geopolitics (20)

Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckCyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National Priority
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 

Mehr von tnwac

TNWAC WorldQuest Dec 21 Practice Match - Topics 6-10
TNWAC WorldQuest Dec 21 Practice Match - Topics 6-10TNWAC WorldQuest Dec 21 Practice Match - Topics 6-10
TNWAC WorldQuest Dec 21 Practice Match - Topics 6-10tnwac
 
TNWAC WorldQuest Dec 21 Practice Match - Topics 1-5
TNWAC WorldQuest Dec 21 Practice Match - Topics 1-5TNWAC WorldQuest Dec 21 Practice Match - Topics 1-5
TNWAC WorldQuest Dec 21 Practice Match - Topics 1-5tnwac
 
TNWAC Brief - Ver 1
TNWAC Brief - Ver 1TNWAC Brief - Ver 1
TNWAC Brief - Ver 1tnwac
 
TNWAC Orientation
TNWAC OrientationTNWAC Orientation
TNWAC Orientationtnwac
 
Academic WorldQuest - 2019 Brief to MNPS Teachers
Academic WorldQuest - 2019 Brief to MNPS TeachersAcademic WorldQuest - 2019 Brief to MNPS Teachers
Academic WorldQuest - 2019 Brief to MNPS Teacherstnwac
 
Global Dialogue Aug 28
Global Dialogue Aug 28Global Dialogue Aug 28
Global Dialogue Aug 28tnwac
 
MNPS Social Studies In Service
MNPS Social Studies In ServiceMNPS Social Studies In Service
MNPS Social Studies In Servicetnwac
 
The TNWAC Story - March 2019
The TNWAC Story - March 2019The TNWAC Story - March 2019
The TNWAC Story - March 2019tnwac
 
Britain and Brexit
Britain and BrexitBritain and Brexit
Britain and Brexittnwac
 
TNWAC: WORLDQUEST PRACTICE ROUNDS 8-10
TNWAC: WORLDQUEST PRACTICE ROUNDS 8-10TNWAC: WORLDQUEST PRACTICE ROUNDS 8-10
TNWAC: WORLDQUEST PRACTICE ROUNDS 8-10tnwac
 
TNWAC: WORLDQUEST PRACTICE ROUNDS 5-7
TNWAC: WORLDQUEST PRACTICE ROUNDS 5-7TNWAC: WORLDQUEST PRACTICE ROUNDS 5-7
TNWAC: WORLDQUEST PRACTICE ROUNDS 5-7tnwac
 
TNWAC: WORLDQUEST PRACTICE ROUNDS 1-4
TNWAC: WORLDQUEST PRACTICE ROUNDS 1-4TNWAC: WORLDQUEST PRACTICE ROUNDS 1-4
TNWAC: WORLDQUEST PRACTICE ROUNDS 1-4tnwac
 
2018 Elections and Cyber Security
2018 Elections and Cyber Security2018 Elections and Cyber Security
2018 Elections and Cyber Securitytnwac
 
Iran
Iran Iran
Iran tnwac
 
Refugees and Migrants
Refugees and MigrantsRefugees and Migrants
Refugees and Migrantstnwac
 
Understanding Russia and Its Relationship with the West
Understanding Russia and Its Relationship with the WestUnderstanding Russia and Its Relationship with the West
Understanding Russia and Its Relationship with the Westtnwac
 
180305 rotary
180305 rotary180305 rotary
180305 rotarytnwac
 
TNWAC Academic WorldQuest December 2017 Practice Match
TNWAC Academic WorldQuest December 2017 Practice MatchTNWAC Academic WorldQuest December 2017 Practice Match
TNWAC Academic WorldQuest December 2017 Practice Matchtnwac
 
Korea Brief Sep 27, 2017
Korea Brief Sep 27, 2017Korea Brief Sep 27, 2017
Korea Brief Sep 27, 2017tnwac
 
Tennessee World Affairs Council Brief - Metro Nashville Schools
Tennessee World Affairs Council Brief - Metro Nashville SchoolsTennessee World Affairs Council Brief - Metro Nashville Schools
Tennessee World Affairs Council Brief - Metro Nashville Schoolstnwac
 

Mehr von tnwac (20)

TNWAC WorldQuest Dec 21 Practice Match - Topics 6-10
TNWAC WorldQuest Dec 21 Practice Match - Topics 6-10TNWAC WorldQuest Dec 21 Practice Match - Topics 6-10
TNWAC WorldQuest Dec 21 Practice Match - Topics 6-10
 
TNWAC WorldQuest Dec 21 Practice Match - Topics 1-5
TNWAC WorldQuest Dec 21 Practice Match - Topics 1-5TNWAC WorldQuest Dec 21 Practice Match - Topics 1-5
TNWAC WorldQuest Dec 21 Practice Match - Topics 1-5
 
TNWAC Brief - Ver 1
TNWAC Brief - Ver 1TNWAC Brief - Ver 1
TNWAC Brief - Ver 1
 
TNWAC Orientation
TNWAC OrientationTNWAC Orientation
TNWAC Orientation
 
Academic WorldQuest - 2019 Brief to MNPS Teachers
Academic WorldQuest - 2019 Brief to MNPS TeachersAcademic WorldQuest - 2019 Brief to MNPS Teachers
Academic WorldQuest - 2019 Brief to MNPS Teachers
 
Global Dialogue Aug 28
Global Dialogue Aug 28Global Dialogue Aug 28
Global Dialogue Aug 28
 
MNPS Social Studies In Service
MNPS Social Studies In ServiceMNPS Social Studies In Service
MNPS Social Studies In Service
 
The TNWAC Story - March 2019
The TNWAC Story - March 2019The TNWAC Story - March 2019
The TNWAC Story - March 2019
 
Britain and Brexit
Britain and BrexitBritain and Brexit
Britain and Brexit
 
TNWAC: WORLDQUEST PRACTICE ROUNDS 8-10
TNWAC: WORLDQUEST PRACTICE ROUNDS 8-10TNWAC: WORLDQUEST PRACTICE ROUNDS 8-10
TNWAC: WORLDQUEST PRACTICE ROUNDS 8-10
 
TNWAC: WORLDQUEST PRACTICE ROUNDS 5-7
TNWAC: WORLDQUEST PRACTICE ROUNDS 5-7TNWAC: WORLDQUEST PRACTICE ROUNDS 5-7
TNWAC: WORLDQUEST PRACTICE ROUNDS 5-7
 
TNWAC: WORLDQUEST PRACTICE ROUNDS 1-4
TNWAC: WORLDQUEST PRACTICE ROUNDS 1-4TNWAC: WORLDQUEST PRACTICE ROUNDS 1-4
TNWAC: WORLDQUEST PRACTICE ROUNDS 1-4
 
2018 Elections and Cyber Security
2018 Elections and Cyber Security2018 Elections and Cyber Security
2018 Elections and Cyber Security
 
Iran
Iran Iran
Iran
 
Refugees and Migrants
Refugees and MigrantsRefugees and Migrants
Refugees and Migrants
 
Understanding Russia and Its Relationship with the West
Understanding Russia and Its Relationship with the WestUnderstanding Russia and Its Relationship with the West
Understanding Russia and Its Relationship with the West
 
180305 rotary
180305 rotary180305 rotary
180305 rotary
 
TNWAC Academic WorldQuest December 2017 Practice Match
TNWAC Academic WorldQuest December 2017 Practice MatchTNWAC Academic WorldQuest December 2017 Practice Match
TNWAC Academic WorldQuest December 2017 Practice Match
 
Korea Brief Sep 27, 2017
Korea Brief Sep 27, 2017Korea Brief Sep 27, 2017
Korea Brief Sep 27, 2017
 
Tennessee World Affairs Council Brief - Metro Nashville Schools
Tennessee World Affairs Council Brief - Metro Nashville SchoolsTennessee World Affairs Council Brief - Metro Nashville Schools
Tennessee World Affairs Council Brief - Metro Nashville Schools
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Kürzlich hochgeladen (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Cyberwar and Geopolitics

  • 2. https://www.TNWAC.org Email: PatRyan@TNWAC.org LCDR Patrick Ryan, USN (Retired) President, Tennessee World Affairs Council Cell: 931-261-2353 Presentation Available: http://www.slideshare.net/TNWAC
  • 3. Cyber Stuff – Definition of Terms • Cyberwar - The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. • ‘cyberwar is asymmetric, which means it benefits lesser military powers as much as military goliaths’ • Conventional usage – more broad, umbrella term for a variety of activities • Measures and Countermeasures
  • 4. Geo Politics and Pivots • Andres Article – “Cyber Conflict and Geopolitics” • Mahan – the “Periphery,” maritime dominance • Mackinder – the “Hearthland,” continental lines of communications • Rise and fall of great powers • Cyber as a paradigm shift or a tool of power competition?
  • 5. U.S. Cyber • 1988 – The “Morris” worm debuts • 1990s – Growing recognition of Cyber threats • 2013 – Executive Order – Improving Critical Infrastructure Cybersecurity • 2014 -- Cyber National Mission Force created at NSA / Cyber Command – “to direct, synchronize, and coordinate cyberspace planning and operations to defend and advance national interests in collaboration with domestic and international partners.” • 2018 – Cybersecurity and Infrastructure Security Act
  • 6. Great Power Competition - Russia • Russian Federation • Economy – Declining; GDP of Italy • Military – Modernizing, Strategic Nuclear Peer • Political – Uncertain • Intentions – “Near Abroad”; Disrupt West
  • 7. Great Power Competition - China • People’s Republic of China • Economy – Soaring • Military – Rising, Prospective Peer Competitor • Political – Solidification of Communist Party Rule • Intentions – Global Superpower Challenger
  • 8. Case Study: Estonia • Three-week wave of massive cyber attacks by Russia against Estonia in 2007 in response to removal of Soviet soldier statue in Tallinn (”Bronze Night”). • Disabled web sites of government ministries, political parties, newspapers, banks and companies. • First case of state vs state cyberwar. • NATO dispatched cyber experts, but NATO doctrine did not define cyber attacks as military action, so no invocation of Article V. • Resulted in creation of the “data embassy” – data stored abroad.
  • 9. Case Study: Russia Election / Social “Meddling” • Long history of US-Russian / Russian-US influence operations • 2016 Election Cycle • Oct 2016 – Intel Community – charged Russia • Jan 2017 – Intel Community – aimed to assist Trump • July 2017 – US indicts 12 GRU officers • Russian Aims • Harm Clinton Campaign • Aid Trump Campaign • Increase political discord • Response – Special Counsel, Congress, POTUS Ambivalence • Impact on 2018, 2020 ??? GRU – Main Intelligence Directorate of the Russian General (Military) Staff)
  • 10. Case Study: China/Office of Personnel Management • Chinese hackers attacked OPM in 2014-15 • Compromised 21.5 million government employees, applicants • 30-years of information including SSNs, fingerprint data, banking info, assignments, training history and other personal data • Sensitive data on officials, military, diplomats, and others = compromise • FBI arrested Shanghai based “GoldSun” in 2017 for developing the malware used against OPM and private firms
  • 11. Case Study: China / Huawei • Chinese Govt relationship with Huawei – subsidies / ties • International attraction of Huawei gear = $$$ • International attraction of Huawei gear – China’s heavy hand • Australia bans Huawei gear – China cuts coal orders • African Union HQ – Huawei gear sending daily reports to Shanghai • US 23 Indictments Against Huawei – T-Mobile IP theft
  • 12. Case Study: Huawei “As a global company, Huawei is dedicated to closely collaborating, innovating and establishing international standards with other global organisations to ensure that the integrity and security of the networked solutions and services we provide meets or exceeds the needs of our customers and provides the assurance confidence required by their own customers.” www.Huawei.com – “About Huawei, CyberSecurity
  • 13. Case Study: Huawei “Overall, the (UK) Oversight Board can only provide limited assurance that all risks to UK national security from Huawei’s involvement in the UK’s critical networks can be sufficiently mitigated long-term. “ UK Oversight Board Report to the National Security Advisor March 2019
  • 14. Putin, Rogers said, “has clearly come to the conclusion that there’s little price to pay here and that therefore ‘I can continue this activity.’” ”The Perfect Weapon” by David Sanger In early 2018, when asked by the Senate Armed Services Committee how the National Security Agency and the US Cyber Command were dealing with the most naked use of cyberpower against American democratic institutions, Adm Michael S. Rogers, then coming to the end of his term as commander of both organizations, admitted that neither President Obama nor President Trump had given him the authority to respond.
  • 15. Going Forward – “Release the EO!” • Ideally, an EO would be part of a larger strategy for managing risk with the next generation of network technologies. The elements of a strategy should include: • Close partnerships with the countries that share the assessment of the risk of using Huawei and the need to act to address it. • Robust security standards for telecommunications equipment and supply chains (noting that some European customers of Huawei may try to dilute standards to ensure that Huawei has continued access to their markets). • Foreign assistance to encourage developing countries not to buy Huawei. We will not match Chinese subsidies, but we can reduce the financial burden of a ban. • Support for Western telecom infrastructure companies for research and development.
  • 16. Prescription for an Executive Order • Research on how to securely communicate over international networks that contain Huawei equipment, since many African and Middle Eastern companies already use Huawei. • Formal bans (either complete or partial) on the purchase and use of Huawei technology. • An EO on telecom supply chain security that clearly lays out U.S. policy. • A long-term engagement strategy with China to bring its behavior into conformity with international norms for trade and security. China is not going away. It will always be powerful and the United States, working with its partners, must encourage and require change. James Andrew Lewis , Center for Strategic and International Studies
  • 17. International Cybersecurity Norms • UN proposed treaty to limit the use of cyber attack and cyber weapons – 1998 • Distrust made efforts unworkable but led to effort for ‘confidence building’ and nonbinding measures • 2010 report of the 2nd UN Group of Governmental Experts in the field of Telecommunications in the Context of International Security (UN GGE) • Building “Norms”
  • 18. Working Toward International Consensus • 2013 GGE identified foundational norms that embedded cybersecurity in the existing framework of international relations and law. • the applicability of the principles of state sovereignty to cyberspace; • the centrality of international law and the UN Charter for governing state behavior; and • the need to respect the rights set forth in the Universal Declaration of Human Rights and other international instruments.
  • 19. Where Are We? • Cyber Agreements • Pause button • Effectiveness, compliance? • Geo Political Competition • China and Russia (and US) will continue to use Cyber when in their own interests • Other players
  • 20. Thank You • Back up your data • Don’t open suspicious email attachments • Use VPNs in public WiFi spaces (or don’t connect)