Cyber-Enabled Economic Warfare: an Evolving Challenge

Total Page:16

File Type:pdf, Size:1020Kb

Cyber-Enabled Economic Warfare: an Evolving Challenge Cyber-Enabled Economic Warfare: An Evolving Challenge Edited by August 2015 Samantha F. Ravich, Ph.D. Research Report Cyber-Enabled Economic Warfare: An Evolving Challenge A Research Report Edited by Samantha F. Ravich, Ph.D. © 2015 Hudson Institute, Inc. All rights reserved. For more information about obtaining additional copies of this or other Hudson Institute publications, please visit Hudson’s website, www.hudson.org ABOUT HUDSON INSTITUTE Hudson Institute is an independent research organization promoting new ideas for the advancement of global security, prosperity and freedom. Founded in 1961 by strategist Herman Kahn, Hudson Institute challenges conventional thinking and helps manage strategic transitions to the future through interdisciplinary studies in defense, international relations, economics, health care, technology, culture, and law. Hudson seeks to guide public policy makers and global leaders in government and business through a vigorous program of publications, conferences, policy briefings and recommendations. Visit www.hudson.org for more information. Hudson Institute 1015 15th Street, N.W. Sixth Floor Washington, D.C. 20005 P: 202.974.2400 [email protected] www.hudson.org TABLE OF CONTENTS ACKNOWLEDGMENTS ………………………………………………………………………………………………..……………………4 INTRODUCTION Cyber-Enabled Economic Warfare: An Evolving Challenge by Samantha F. Ravich .……………………………………………………………………..………………………………..5 CHAPTER 1 Cyber-Enabled ‘Swift’ Warfare: Power, Blowback, and Hardening American Defenses by Mark Dubowitz and Annie Fixler ……………………………………………………………..………………..……14 CHAPTER 2 Cyber-Enabled Economic Warfare and State Actors by Abe Shulsky …………………………………………………………………………………………..……………………..49 CHAPTER 3 Intellectual Property Piracy as Economic Privateering by Michael Hsieh ………………………………………………………………………………..….…..…….……….………73 CHAPTER 4 The Cyber Financial Wars on the Horizon: The Convergence of Financial and Cyber Warfare and the Need for a 21st Century National Security Response by Juan C. Zarate ………………………………………………………………………………………………………………93 CHAPTER 5 Threats to Critical Infrastructure and the Transportation Sector by Tiffany Rad ………………………………………………………………………………………………..………………..121 CHAPTER 6 Conclusions by Samantha F. Ravich ………………………………………………………………………..…………….……………..147 ABOUT THE AUTHORS ……………………………………………………………………………………………..…………..………172 ACKNOWLEDGMENTS It is always interesting to note how an intellectual pursuit moves from some random musings to more structured thought to an eventual written product that seeks to ask and answer the questions raised at the beginning. For this work, the origin goes back nearly twenty years ago to a discussion with Marin Strmecki of the Smith Richardson Foundation about the intersection of economics and national security. That conversation waxed and waned over the years but never really ended. Over the last few years, however, our discussion once again picked up in intensity as we noticed with alarm the increasing scale and scope of cyberattacks on financial and economic institutions around the world. Marin encouraged me to start thinking in a more structured way about cyber-enabled economic warfare and this project was born. The support of Marin, Nadia Schadlow, and the Smith Richardson Foundation was instrumental for this project’s success. My goal for this work was never to write the definitive text on cyber-enabled economic warfare. It was to help energize a much broader conversation about the threats the U.S. and our allies are now facing from a range of hostile actors seeking to undermine critical economic assets and systems in order to cause harm to a target state’s security capabilities. I also hoped it would serve as a clarion call to energize the U.S. government to create both the strategy and the capabilities needed to confront this menace. Each of the authors I recruited for this volume—Abe Shulsky, Mark Dubowitz, Annie Fixler, Michael Hsieh, Juan Zarate, and Tiffany Rad—bring a particular knowledge base to the problem set and I hope that each will use their chapter as a launching pad for continued work in the area. I thank each of them for their hard work, dedication to the topic, and forbearance with my questions, comments, and editorial process. In addition, I thank Jeffrey Cooper, Drew Lomax, Doug Feith, Karen Evans, Terry Boston, Michael Madon, Michael Schrage, Charles Wolf, Kevin Gates, Lewis Libby, Ken Weinstein, Emily Goldman, Andrew May, Laurence Zuriff, and Chris Rodriguez for attending the working seminar at Hudson Institute where the other authors and I presented and defended our theses. The seminar participants were critical in helping us hone our thinking. I thank the fine people at Hudson Institute, including but not limited to Joel Scanlon, for shepherding this project from proposal to publication. Finally, I thank my husband Richard Brahm, whose guidance and intellectual rigor helped make this work a reality. 4 INTRODUCTION Cyber-Enabled Economic Warfare: An Evolving Challenge By Samantha F. Ravich Project Rationale Economic aggression against adversarial social groups is probably as old as societies’ discoveries of economically productive activities: the economic success of some societies inevitably became intertwined with adversarial relations with others. As societies evolved and inevitably clashed, economic aggression tactics evolved as well. For example, historically notable blockades that were intended to cause economic harm include those imposed by the Athenians against the island of Aegina during the Peloponnesian War; by Fatimid Caliphate against the Kingdom of Jerusalem during the Crusader-Muslim wars; by French and Flemish nobles’ against the island of Cadsand, which triggered the Hundred Years War; by Napoleon’s “Continental System,” which closed European ports to British trade in the early nineteenth century; and by the Soviet Union against Berlin at the start of the Cold War. Today there is a common arsenal for economic warfare consisting of many long established techniques to weaken an adversary through actions—some legal and some not—aimed at economic targets. Examples include trade embargoes, blacklists, blockades, sanctions, tariff and/or quota discrimination, sabotage of economic targets, preclusive purchase of scarce critical resources, freezing of capital assets, counterfeiting, suspension of aid, restrictions on investment and other capital flows, and expropriation. These practices are all well established, and a considerable body of literature exists on them as well. It has also become increasingly common since the initial rise of European nations in the fifteenth and sixteenth centuries for individual nations to utilize economic warfare strategies as vital elements within their Great Power rivalries. England’s attempt to weaken its rebellious American colonies by blockading their ports in the mid-eighteenth century is one example.1 Napoleon’s attempt to blockade British trade with Europe in the early nineteenth century, mentioned above, is another.2 Germany and Great Britain each pursued sophisticated and complex economic warfare strategies during World War I.3 Great Britain created a Ministry of Economic Warfare prior to World War II to help plan and implement its strategies leading up to, and during, the war.4 The U.S. created a similar department prior to WWII,5 implementing a multi-dimensional economic warfare strategy against the Japanese in particular.6 Both the Soviet Union and the United States attempted to implement economic warfare strategies to weaken the other during the Cold War.7 With the advent in recent decades of the information age and its accompanying ‘virtual’ world of ‘cyberspace,’ something new has developed in the realm of economic warfare: the 5 potential for use of cyber-enabled attack methods to cause an adversary economic harm that is far disproportionate to the size or resources of the attacker. Examples of malicious cyber- enabled actions against economic targets include cybercrime (such as cyber fraud against banking and payment platforms), cyberespionage (such as trade secret and intellectual property theft), cybersabotage (such as the malware attack on the Saudi Aramco oil company in 2012), and cyberterrorism (attacks involving the convergence of cyberspace and terrorism that cause violence against persons or property and generate fear—so far mostly theoretical, although the recent North Korean sponsored cyberattack on Sony Pictures Entertainment began to cross that line with the threats that followed the attack). With the information technology revolution having already contributed to growth in annual U.S. gross domestic product by approximately two trillion dollars and with a high percentage of U.S. economic activity now dependent upon information technology and internet connectivity,8 the potential economic stakes are quite high. Numerous pieces of the puzzle have already received considerable attention. During the last few years, the U.S. government has reported on numerous large-scale cyber operations aimed at U.S. businesses, banks, and critical infrastructure.9 General Keith Alexander of NSA/Cyber Command has described this hacking as the "greatest transfer of wealth in history."10 FBI Director Robert Mueller testified in January 2012 that the “threats from cyberespionage, computer crime, and attacks on critical infrastructure will surpass terrorism as the number one threat facing the United States.”11 In October 2012, Defense Secretary Leon Panetta warned that the U.S. faces a rising threat of a “cyber-Pearl Harbor”
Recommended publications
  • Country of Origin Information Report Syria June 2021
    Country of origin information report Syria June 2021 Page 1 of 102 Country of origin information report Syria | June 2021 Publication details City The Hague Assembled by Country of Origin Information Reports Section (DAF/AB) Disclaimer: The Dutch version of this report is leading. The Ministry of Foreign Affairs of the Netherlands cannot be held accountable for misinterpretations based on the English version of the report. Page 2 of 102 Country of origin information report Syria | June 2021 Table of contents Publication details ............................................................................................2 Table of contents ..........................................................................................3 Introduction ....................................................................................................5 1 Political and security situation .................................................................... 6 1.1 Political and administrative developments ...........................................................6 1.1.1 Government-held areas ....................................................................................6 1.1.2 Areas not under government control. ............................................................... 11 1.1.3 COVID-19 ..................................................................................................... 13 1.2 Armed groups ............................................................................................... 13 1.2.1 Government forces .......................................................................................
    [Show full text]
  • Officials Say Flynn Discussed Sanctions
    Officials say Flynn discussed sanctions The Washington Post February 10, 2017 Friday, Met 2 Edition Copyright 2017 The Washington Post All Rights Reserved Distribution: Every Zone Section: A-SECTION; Pg. A08 Length: 1971 words Byline: Greg Miller;Adam Entous;Ellen Nakashima Body Talks with Russia envoy said to have occurred before Trump took office National security adviser Michael Flynn privately discussed U.S. sanctions against Russia with that country's ambassador to the United States during the month before President Trump took office, contrary to public assertions by Trump officials, current and former U.S. officials said. Flynn's communications with Russian Ambassador Sergey Kislyak were interpreted by some senior U.S. officials as an inappropriate and potentially illegal signal to the Kremlin that it could expect a reprieve from sanctions that were being imposed by the Obama administration in late December to punish Russia for its alleged interference in the 2016 election. Flynn on Wednesday denied that he had discussed sanctions with Kislyak. Asked in an interview whether he had ever done so, he twice said, "No." On Thursday, Flynn, through his spokesman, backed away from the denial. The spokesman said Flynn "indicated that while he had no recollection of discussing sanctions, he couldn't be certain that the topic never came up." Officials said this week that the FBI is continuing to examine Flynn's communications with Kislyak. Several officials emphasized that while sanctions were discussed, they did not see evidence that Flynn had an intent to convey an explicit promise to take action after the inauguration. Flynn's contacts with the ambassador attracted attention within the Obama administration because of the timing.
    [Show full text]
  • 2020 Sonicwall Cyber Threat Report
    2020 SONICWALL CYBER THREAT REPORT sonicwall.com I @sonicwall TABLE OF CONTENTS 3 A NOTE FROM BILL 4 CYBERCRIMINAL INC. 11 2019 GLOBAL CYBERATTACK TRENDS 12 INSIDE THE SONICWALL CAPTURE LABS THREAT NETWORK 13 KEY FINDINGS FROM 2019 13 SECURITY ADVANCES 14 CRIMINAL ADVANCES 15 FASTER IDENTIFICATION OF ‘NEVER-BEFORE-SEEN’ MALWARE 16 TOP 10 CVES EXPLOITED IN 2019 19 ADVANCEMENTS IN DEEP MEMORY INSPECTION 23 MOMENTUM OF PERIMETER-LESS SECURITY 24 PHISHING DOWN FOR THIRD STRAIGHT YEAR 25 CRYPTOJACKING CRUMBLES 27 RANSOMWARE TARGETS STATE, PROVINCIAL & LOCAL GOVERNMENTS 31 FILELESS MALWARE SPIKES IN Q3 32 ENCRYPTED THREATS GROWING CONSISTENTLY 34 IOT ATTACK VOLUME RISING 35 WEB APP ATTACKS DOUBLE IN 2019 37 PREPARING FOR WHAT’S NEXT 38 ABOUT SONICWALL 2 A NOTE FROM BILL The boundaries of your digital empire are In response, SonicWall and our Capture Labs limitless. What was once a finite and threat research team work tirelessly to arm defendable space is now a boundless organizations, enterprises, governments and territory — a vast, sprawling footprint of businesses with actionable threat devices, apps, appliances, servers, intelligence to stay ahead in the global cyber networks, clouds and users. arms race. For the cybercriminals, it’s more lawless And part of that dedication starts now with than ever. Despite the best intentions of the 2020 SonicWall Cyber Threat Report, government agencies, law enforcement and which provides critical threat intelligence to oversight groups, the current cyber threat help you better understand how landscape is more agile than ever before. cybercriminals think — and be fully prepared for what they’ll do next.
    [Show full text]
  • Biting Into Forbidden Fruit
    Biting into the forbidden fruit Lessons from trusting Javascript crypto Krzysztof Kotowicz, OWASP Appsec EU, June 2014 About me • Web security researcher • HTML5 • UI redressing • browser extensions • crypto • I was a Penetration Tester @ Cure53 • Information Security Engineer @ Google Disclaimer: “My opinions are mine. Not Google’s”. Disclaimer: All the vulns are fixed or have been publicly disclosed in the past. Introduction JS crypto history • Javascript Cryptography Considered Harmful http://matasano.com/articles/javascript- cryptography/ • Final post on Javascript crypto http://rdist.root.org/2010/11/29/final-post-on- javascript-crypto/ JS crypto history • Implicit trust in the server to deliver the code • SSL/TLS is needed anyway • Any XSS can circumvent the code • Poor library quality • Poor crypto support • No secure keystore • JS crypto is doomed to fail Doomed to fail? Multiple crypto primitives libraries, symmetric & asymmetric encryption, TLS implementation, a few OpenPGP implementations, and a lot of user applications built upon them. Plus custom crypto protocols. https://crypto.cat/ https://www.mailvelope.com/ http://openpgpjs.org/ JS crypto is a fact • Understand it • Look at the code • Find the vulnerabilities • Analyze them • Understand the limitations and workarounds • Answer the question: can it be safe? JS crypto vulns in the wild • Language issues • Caused by a flaw of the language • Web platform issues • Cased by the web • Other standard bugs • out of scope for this presentation Language issues Language issues matter
    [Show full text]
  • Analyse De Maliciels Sur Android Par L'analyse De La Mémoire Vive
    Analyse de maliciels sur Android par l’analyse de la mémoire vive Mémoire Bernard Lebel Maîtrise en informatique Maître ès sciences (M. Sc.) Québec, Canada © Bernard Lebel, 2018 Analyse de maliciels sur Android par l’analyse de la mémoire vive Mémoire Bernard Lebel Sous la direction de: Mohamed Mejri, directeur de recherche Résumé Les plateformes mobiles font partie intégrante du quotidien. Leur flexibilité a permis aux développeurs d’applications d’y proposer des applications de toutes sortes : productivité, jeux, messageries, etc. Devenues des outils connectés d’agrégation d’informations personnelles et professionnelles, ces plateformes sont perçues comme un écosystème lucratif par les concepteurs de maliciels. Android est un système d’exploitation libre de Google visant le marché des appareils mobiles et est l’une des cibles de ces attaques, en partie grâce à la popularité de celui- ci. Dans la mesure où les maliciels Android constituent une menace pour les consommateurs, il est essentiel que la recherche visant l’analyse de maliciels s’intéresse spécifiquement à cette plateforme mobile. Le travail réalisé dans le cadre de cette maîtrise s’est intéressé à cette problématique, et plus spécifiquement par l’analyse de la mémoire vive. À cette fin, il a fallu s’intéresser aux tendances actuelles en matière de maliciels sur Android et les approches d’analyses statiques et dynamiques présentes dans la littérature. Il a été, par la suite, proposé d’explorer l’analyse de la mémoire vive appliquée à l’analyse de maliciels comme un complément aux approches actuelles. Afin de démontrer l’intérêt de l’approche pour la plateforme Android, une étude de cas a été réalisée où un maliciel expérimental a été conçu pour exprimer les comportements malicieux problématiques pour la plupart des approches relevées dans la littérature.
    [Show full text]
  • Internet Security Threat Report Volume 24 | February 2019
    ISTRInternet Security Threat Report Volume 24 | February 2019 THE DOCUMENT IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENT. THE INFORMATION CONTAINED IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. INFORMATION OBTAINED FROM THIRD PARTY SOURCES IS BELIEVED TO BE RELIABLE, BUT IS IN NO WAY GUARANTEED. SECURITY PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT (“CONTROLLED ITEMS”) ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER FOR YOU TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT SUCH CONTROLLED ITEMS. TABLE OF CONTENTS 1 2 3 BIG NUMBERS YEAR-IN-REVIEW FACTS AND FIGURES METHODOLOGY Formjacking Messaging Cryptojacking Malware Ransomware Mobile Living off the land Web attacks and supply chain attacks Targeted attacks Targeted attacks IoT Cloud Underground economy IoT Election interference MALICIOUS
    [Show full text]
  • Introduction
    NOTES Introduction 1. Robert Kagan to George Packer. Cited in Packer’s The Assassin’s Gate: America In Iraq (Faber and Faber, London, 2006): 38. 2. Stefan Halper and Jonathan Clarke, America Alone: The Neoconservatives and the Global Order (Cambridge University Press, Cambridge, 2004): 9. 3. Critiques of the war on terror and its origins include Gary Dorrien, Imperial Designs: Neoconservatism and the New Pax Americana (Routledge, New York and London, 2004); Francis Fukuyama, After the Neocons: America At the Crossroads (Profile Books, London, 2006); Ira Chernus, Monsters to Destroy: The Neoconservative War on Terror and Sin (Paradigm Publishers, Boulder, CO and London, 2006); and Jacob Heilbrunn, They Knew They Were Right: The Rise of the Neocons (Doubleday, New York, 2008). 4. A report of the PNAC, Rebuilding America’s Defenses: Strategy, Forces and Resources for a New Century, September 2000: 76. URL: http:// www.newamericancentury.org/RebuildingAmericasDefenses.pdf (15 January 2009). 5. On the first generation on Cold War neoconservatives, which has been covered far more extensively than the second, see Gary Dorrien, The Neoconservative Mind: Politics, Culture and the War of Ideology (Temple University Press, Philadelphia, 1993); Peter Steinfels, The Neoconservatives: The Men Who Are Changing America’s Politics (Simon and Schuster, New York, 1979); Murray Friedman, The Neoconservative Revolution: Jewish Intellectuals and the Shaping of Public Policy (Cambridge University Press, New York, 2005); Murray Friedman ed. Commentary in American Life (Temple University Press, Philadelphia, 2005); Mark Gerson, The Neoconservative Vision: From the Cold War to the Culture Wars (Madison Books, Lanham MD; New York; Oxford, 1997); and Maria Ryan, “Neoconservative Intellectuals and the Limitations of Governing: The Reagan Administration and the Demise of the Cold War,” Comparative American Studies, Vol.
    [Show full text]
  • “Hacktivists” Strike Back
    SECUrITY AGENCE FRANCE-PRESSE Supporters of Wikileaks founder Julian Assange “Hacktivists” Strike Back wear Guy Fawkes masks Cyber attacks on financial institutions serve as they demonstrate against his arrest in as a warning sign Amsterdam in December 2010. The “Hacktivist” in december 2010, the websites of international financial services gi- group “Anonymous” has ants Visa, Mastercard and PayPal were temporarily shut down, victims adopted the Guy Fawkes of a coordinated cyber attack dubbed Operation Payback by its per- image as its public face. petrators. “Hacktivists” who support wikileaks and its founder Julian assange attacked after the companies terminated service and disabled donations to the website. The economic impact of the attack remains unclear and the tar- geted companies denied suffering consequential losses. but the attackers, using the names “anon” and “anonymous,” demonstrated the ability of cyber attacks to infiltrate and damage businesses and government agencies. A modern form of protest Amazon, the online retailer that hosted Anonymous didn’t protest by chanting slogans Wikileaks on its servers, was the first to pull out. or waving signs — it struck against Wikileaks’ Visa, MasterCard and PayPal soon followed, perceived enemies in the spirit of the virtual essentially crippling Wikileaks’ ability to accept world they share. Wikileaks, whose raison d'être is donations that support publishing efforts. The exposing classified or confidential government cyber attacks started soon after. or corporate information, is under pressure When Anonymous staged its attack in the vir- from the United States and other governments tual world, it used a favorite weapon of the cyber after leaking more than 250,000 U.S.
    [Show full text]
  • Getting to Yes with China in Cyberspace
    Getting to Yes with China in Cyberspace Scott Warren Harold, Martin C. Libicki, Astrid Stuth Cevallos C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/rr1335 Library of Congress Cataloging-in-Publication Data ISBN: 978-0-8330-9249-6 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark Cover Image: US President Barack Obama (R) checks hands with Chinese president Xi Jinping after a press conference in the Rose Garden of the White House September 25, 2015 in Washington, DC. President Obama is welcoming President Jinping during a state arrival ceremony. Photo by Olivier Douliery/ABACA (Sipa via AP Images). Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors.
    [Show full text]
  • Warfare in a Fragile World: Military Impact on the Human Environment
    Recent Slprt•• books World Armaments and Disarmament: SIPRI Yearbook 1979 World Armaments and Disarmament: SIPRI Yearbooks 1968-1979, Cumulative Index Nuclear Energy and Nuclear Weapon Proliferation Other related •• 8lprt books Ecological Consequences of the Second Ihdochina War Weapons of Mass Destruction and the Environment Publish~d on behalf of SIPRI by Taylor & Francis Ltd 10-14 Macklin Street London WC2B 5NF Distributed in the USA by Crane, Russak & Company Inc 3 East 44th Street New York NY 10017 USA and in Scandinavia by Almqvist & WikseH International PO Box 62 S-101 20 Stockholm Sweden For a complete list of SIPRI publications write to SIPRI Sveavagen 166 , S-113 46 Stockholm Sweden Stoekholol International Peace Research Institute Warfare in a Fragile World Military Impact onthe Human Environment Stockholm International Peace Research Institute SIPRI is an independent institute for research into problems of peace and conflict, especially those of disarmament and arms regulation. It was established in 1966 to commemorate Sweden's 150 years of unbroken peace. The Institute is financed by the Swedish Parliament. The staff, the Governing Board and the Scientific Council are international. As a consultative body, the Scientific Council is not responsible for the views expressed in the publications of the Institute. Governing Board Dr Rolf Bjornerstedt, Chairman (Sweden) Professor Robert Neild, Vice-Chairman (United Kingdom) Mr Tim Greve (Norway) Academician Ivan M£ilek (Czechoslovakia) Professor Leo Mates (Yugoslavia) Professor
    [Show full text]
  • The Vulnerabilities of Developed States to Economic Cyber Warfare
    Working Paper The Vulnerabilities of Developed States to Economic Cyber Warfare Paul Cornish Head, International Security Programme and Carrington Professor of International Security, Chatham House June 2011 The views expressed in this document are the sole responsibility of the author(s) and do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author and Chatham House should be credited, preferably with the date of the publication. Working Paper: The Vulnerabilities of Developed States to Economic Cyber Warfare INTRODUCTION The central features of the ‘cybered’ world of the early 21st century are the interconnectedness of global communications, information and economic infrastructures and the dependence upon those infrastructures in order to govern, to do business or simply to live. There are a number of observations to be made of this world. First, it is still evolving. Economically developed societies are becoming ever more closely connected within themselves and with other, technologically advanced societies, and all are becoming increasingly dependent upon the rapid and reliable transmission of ideas, information and data. Second, where interconnectedness and dependency are not managed and mitigated by some form of security procedure, reversionary mode or redundancy system, then the result can only be a complex and vitally important communications system which is nevertheless vulnerable to information theft, financial electronic crime, malicious attack or infrastructure breakdown.
    [Show full text]
  • View/Open (13.5MB)
    Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 ContemporaryIssues in International Security and Strategic Studies Volume 1 Edited by James Bindenagel, Matthias Herdegen and Karl Kaiser Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 James Bindenagel /Matthias Herdegen / Karl Kaiser (eds.) International Securityinthe 21st Century Germany’s International Responsibility With 2figures V&Runipress Bonn UniversityPress Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available online: http://dnb.d-nb.de. ISSN 2513-1591 ISBN 978-3-7370-0762-7 You can find alternative editions of this book and additional material on our website: www.v-r.de Publications of Bonn University Press are published by V& R unipress GmbH. 2017, V&R unipress GmbH, Robert-Bosch-Breite 6, 37079 Gçttingen, Germany / www.v-r.de This publication is licensed under a Creative Commons Attribution-Non Commercial- No Derivatives 4.0 International license, at DOI 10.14220/9783737007627. For a copy of this license go to http://creativecommons.org/licenses/by-nc-nd/4.0/. Any use in cases
    [Show full text]