EU Preparedness and Responses to Chemical, Biological, Radiological and Nuclear (CBRN) Threats

Total Page:16

File Type:pdf, Size:1020Kb

EU Preparedness and Responses to Chemical, Biological, Radiological and Nuclear (CBRN) Threats STUDY Requested by the SEDE Subcommittee EU preparedness and responses to Chemical, Biological, Radiological and Nuclear (CBRN) threats Authors: Alexandra RIMPLER-SCHMID, Ralf TRAPP, Sarah LEONARD, Christian KAUNERT, Yves DUBUCQ, Claude LEFEBVRE, Hanna MOHN EN European Parliament Coordinator: Policy Department for External Relations Directorate General for External Policies of the Union DIRECTORATE-GENERAL FOR EXTERNAL POLICIES POLICY DEPARTMENT STUDY EU preparedness and responses to Chemical, Biological, Radiological and Nuclear (CBRN) threats ABSTRACT This study on ‘EU preparedness and responses to Chemical, Biological, Radiological and Nuclear (CBRN) threats’ was requested by the European Parliament’s (EP) Subcommittee on Security and Defence (SEDE) in the context of, but not limited to, the ongoing COVID- 19 pandemic. Building on reports and expert input, this study first provides an update of the current level of each of the C, B, R and N threat elements, including the type of actor from which such threats might stem. It furthermore takes stock of the existing preparedness and response mechanisms and matches these against the updated threat landscape to determine the current state of play of the EU’s response tools and its remaining gaps where improvement may be needed. The study puts forward a number of recommendations on specific issues. The core of the recommendations builds on using a ‘Team Europe’ approach to create and maintain a strong task force based response capacity, with additional authority and competence given by EU Member States to the EU. This would enable the EU to better support and manage an EU-wide crisis response in the CBRN field in a timely and effective manner. EP/EXPO/SEDE/FWC/2019-01/Lot4/R/04 EN July 2021 - PE 653.645 © European Union, 2021 Policy Department, Directorate-General for External Policies AUTHORS • Alexandra RIMPLER-SCHMID (Ecorys; project leader and coordinator), • Dr Ralf TRAPP (International Disarmament Consultant), • Professor Sarah LEONARD (University of the West of England), • Professor Christian KAUNERT (University of South Wales), • Yves DUBUCQ (Director of the International CBRNE Institute, CEO Sphynx Development & Consultancy Former Comdr of the JCBRNC (Joint CBRN Centre) Belgium), • Colonel (r) Claude LEFEBVRE (Expert consultant in CBRN defence technologies), • Hanna MOHN (Ecorys) Consultations on draft and final paper: Joanna SMĘTEK (Ecorys) and Rachel BEERMAN (Ecorys) Research Assistance: Sebastiaan OLISLAGERS (Ecorys) PROJECT COORDINATOR (CONTRACTOR) • ECORYS POLSKA This paper was requested by the European Parliament's Subcommittee on Security & Defence (SEDE). The content of this document is the sole responsibility of the authors, and any opinions expressed herein do not necessarily represent the official position of the European Parliament. CONTACTS IN THE EUROPEAN PARLIAMENT • Coordination: Jérôme LEGRAND, Policy Department for External Policies • Editorial assistants: Eva ASPLUND, Daniela ADORNA DIAZ Feedback is welcome. Please write to [email protected] To obtain copies, please send a request to [email protected] VERSION The original English-language manuscript was completed on 12 July 2021. COPYRIGHT Brussels © European Union, 2021 Reproduction and translation for non-commercial purposes are authorised, provided the source is acknowledged and the European Parliament is given prior notice and sent a copy. @Cover image used under licence from Adobe Stock. This paper will be published in the European Parliament's online database, 'Think tank' ISBN: 978-92-846-8359-8 (pdf) ISBN: 978-92-846-8358-1 (paper) doi:10.2861/857738 (pdf) doi:10.2861/50408 (paper) Catalogue number: QA-02-21-905-EN-N (pdf) Catalogue number: QA-02-21-905-EN-C (paper) EU preparedness and responses to Chemical, Biological, Radiological and Nuclear (CBRN) threats Table of contents List of Tables and Figures 7 List of Boxes 7 List of Abbreviations 7 Glossary 12 Executive Summary 16 1 Introduction 19 1.1 Objectives and scope 19 1.2 Methodological approach 19 1.3 Structure of the study 19 2 Context and relevance of the study 20 2.1 Background on CBRN 20 2.2 EU competences and activities 23 2.2.1 EU Competences 23 2.2.2 EU legislation and initiatives 23 2.2.3 CBRN link to counter-terrorism 24 2.2.4 European Parliament 25 2.3 Relevant geopolitical context 26 2.3.1 Revival of US multilateralism 26 2.3.2 Growing foreign assertiveness 26 2.3.3 Instability in the Middle East 27 2.3.4 Brexit 27 2.4 COVID-19 28 3 Findings of recent studies 30 3.1 Topics discussed in previous studies and reports 30 3.1.1 Focus on types of CBRN threats and threat actors 30 3.1.2 EU Member States’ preparedness 30 3.1.3 EU Support to EU Member States 32 3.1.4 Learning from COVID-19 34 3.1.5 EU priorities in a post-COVID-19 world 35 3 Policy Department, Directorate-General for External Policies 3.2 Recommendations provided in previous studies and reports 35 4 Update on the CBRN threat landscape 36 4.1 International regimes against CBRN weapons 36 4.1.1 Treaty on the Non-Proliferation of Nuclear Weapons 36 4.1.2 The Chemical Weapons Convention 37 4.1.3 4.1.3 The Biological and Toxin Weapons Convention 37 4.2 CBRN threats from state actors 38 4.2.1 A concerning trend: the weakening of the international regimes against CBRN weapons 38 4.2.2 State actors of particular concern 41 4.3 CBRN threats from non-state actors 48 4.3.1 Incentives and disincentives for terrorists to acquire CBRN weapons 48 4.3.2 Past instances of CBRN terrorist plots 49 4.3.3 Assessment of the current threat of CBRN terrorism in Europe50 4.3.4 Looking towards the future: the possible impact of emerging technologies 54 4.4 Conclusion 56 5 State of play of the EU's preparedness regarding CBRN threats 57 5.1 Legal and organisational framework for EU actions 57 5.1.1 Recent experiences with EU preparedness and response against a CBRN crisis: COVID-19 59 5.2 Available Response Tools of the EU and its Member States 60 5.2.1 EU Member States capabilities 60 5.2.2 The 2017 CBRN Action Plan 62 5.2.3 Common Security and Defence Policy (CSDP) 65 5.2.4 Collaboration with NATO 68 5.2.5 Law enforcement 69 5.2.6 Common Foreign and Security Policy (CFSP) 70 5.2.7 Union Civil Protection Mechanism (UCPM) 75 5.2.8 International Collaborations: UN and relevant associated International Organisations 76 5.2.9 Relationships with the Research Community and the Private Sector 77 4 EU preparedness and responses to Chemical, Biological, Radiological and Nuclear (CBRN) threats 5.2.10 Engagement with Populations / Civil Society 78 5.2.11 Other EU tools 79 5.3 Previously Identified Gaps in the EU's response 80 5.4 Relation to the Updated Threat Landscape 83 6 Conclusions and recommendations for reinforcing the EU's preparedness 84 6.1 EU and international level cooperation and agreements 84 6.1.1 Ensuring that the CBRN CoE Initiative becomes a genuine EU flagship programme 84 6.1.2 Ensuring strategic coordination between priorities adopted and projects implemented under the CBRN CoE Initiative and the actions supported by the EU under CFSP Council Decisions. 85 6.1.3 Revitalising the partnership with the United States 85 6.1.4 Working towards a revival of the Joint Comprehensive Plan of Action with Iran 86 6.1.5 Supporting sanctions against the violations of the international regimes against CBRN weapons 86 6.1.6 Forging deeper cooperation with NATO 86 6.1.7 Contributing to the implementation of an eventual agreement on the denuclearisation of the Korean Peninsula 87 6.2 EU Preparedness 87 6.2.1 Reviewing the lessons from the EU response to the COVID-19 pandemic, the chemical weapons use in Syria and incidents and threats of CBRN agents being used by non-state actors in European countries 87 6.2.2 Setting up an EU CBRN Centre of Excellence 88 6.2.3 Linking CBRN preparedness to other cross-cutting issues 89 6.2.4 Introducing overarching crisis situation legislation 89 6.2.5 Strengthening the response capacity to CBRN incidents through building up indigenous production capacities for protective equipment 90 Annex I Bibliography 92 Annex II List of interviewed individuals 100 Annex III Overview of relevant EP discussions on CBRN 101 5 Policy Department, Directorate-General for External Policies Annex IV Overview of recent studies on CBRN commissioned by the European Parliament 103 Annex V CFCP actions in the area of WMD non-proliferation and disarmament 104 Annex VI CBRN Threat Matrix 107 6 EU preparedness and responses to Chemical, Biological, Radiological and Nuclear (CBRN) threats List of Tables and Figures Figure 2.1 The EU policy landscape with regard to CBRN preparedness and response ......................................24 Figure 3.1 Threat and preparedness scores in selected countries and regions ......................................................31 Figure 4.1 The weakening of the international regimes against CBRN weapons ..................................................39 Table 5.1 Recommendations on the CBRN CoE from the Court of Auditors' 2018 special report ...................73 Table II.1 List of interviewed individuals ............................................................................................................................ 100 Table II.2 List of individuals from whom written responses were received .......................................................... 100 Table III.1 Overview of relevant EP discussions on CBRN ............................................................................................. 101 Table IV.1
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Integrated Helicopter Survivability
    Cranfield University Nicholas G. Law Integrated Helicopter Survivability Aeromechanical Systems Group Cranfield Defence and Security PhD DSTL/PUB36228 Cranfield University Cranfield Defence and Security Aeromechanical Systems Group PhD 2011 Nicholas G. Law Integrated Helicopter Survivability Supervisor: Prof. Kevin Knowles May 2011 © Crown copyright 2011. Published with the permission of the Defence Science and Technology Laboratory on behalf of the Controller of HMSO. DISCLAIMER Any views expressed are those of the author and do not necessarily represent those of Dstl, MOD or any other UK government department. ABSTRACT A high level of survivability is important to protect military personnel and equipment and is central to UK defence policy. Integrated Survivability is the systems engineering methodology to achieve optimum survivability at an affordable cost, enabling a mission to be completed successfully in the face of a hostile environment. “Integrated Helicopter Survivability” is an emerging discipline that is applying this systems engineering approach within the helicopter domain. Philosophically the overall survivability objective is ‘zero attrition’, even though this is unobtainable in practice. The research question was: “How can helicopter survivability be assessed in an integrated way so that the best possible level of survivability can be achieved within the constraints and how will the associated methods support the acquisition process?” The research found that principles from safety management could be applied to the survivability problem, in particular reducing survivability risk to as low as reasonably practicable (ALARP). A survivability assessment process was developed to support this approach and was linked into the military helicopter life cycle. This process positioned the survivability assessment methods and associated input data derivation activities.
    [Show full text]
  • National Drug Threat Assessment 2004: Threat Matrix
    National Drug Threat Assessment 2004: Threat Matrix Seized Primary Markets Wholesale Retail Source Transit Entry Points Key Illicit Drug en route/within and Principal Price Range Price Range Retailers Projections Locations Countries into U.S. Developments U.S. in 2002 Suppliers in the U.S. in the U.S. Foreign: Colombia, 101,877.8 kg Mexico, Central SWB states (Texas, Atlanta: Mexican, Dominican $10,000-$38,000 per kg $20-$200 per gram African American and DEA Cocaine Signature Potential worldwide cocaine Peru, Bolivia (352,000 kg reportedly American countries, California, Arizona, Chicago: Mexican, Colombian, (powder) (powder) Hispanic criminal groups Program data indicate production will likely decrease Domestic: None available to U.S. markets) Caribbean island nations New Mexico), Dominican $5-$100 per rock (crack) and street gangs; that average wholesale slightly due to increases in Miami/S Florida, Houston: Mexican, Colombian Caucasian local cocaine purity may be eradication and coca spray New York Los Angeles: Mexican, independent dealers; increasing after previous operations as well as a Cocaine Colombian Dominican, Haitian, decreases each year resumption of the Airbridge Miami: Colombian Jamaican, Mexican, between 1999 and 2002. Denial Program. This may New York: Colombian, Mexican, Native American, and result in a decrease in Dominican (also Jamaican, Puerto Rican criminal cocaine availability in the Puerto Rican, and Traditional groups United States. Organized Crime groups) Foreign: Mexico and, 2,512.6 kg Mexican: Direct from
    [Show full text]
  • Report of the Working Group on Marine Mammal Ecology (WGMME)
    ICES WGMME REPORT 2015 ICES ADVISORY COMMITTEE ICES CM 2015/ACOM:25 Report of the Working Group on Marine Mammal Ecology (WGMME) 9–12 February 2015 London, UK International Council for the Exploration of the Sea Conseil International pour l’Exploration de la Mer H. C. Andersens Boulevard 44–46 DK-1553 Copenhagen V Denmark Telephone (+45) 33 38 67 00 Telefax (+45) 33 93 42 15 www.ices.dk [email protected] Recommended format for purposes of citation: ICES. 2015. Report of the Working Group on Marine Mammal Ecology (WGMME), 9– 12 February 2015, London, UK. ICES CM 2015/ACOM:25. 114 pp. For permission to reproduce material from this publication, please apply to the Gen- eral Secretary. The document is a report of an Expert Group under the auspices of the International Council for the Exploration of the Sea and does not necessarily represent the views of the Council. © 2015 International Council for the Exploration of the Sea ICES WGMME REPORT 2015 | i Contents Executive summary ................................................................................................................ 1 1 Introduction .................................................................................................................... 3 2 Terms of Reference 2015 ............................................................................................... 4 3 ToR a: Review and report on any new information on population abundance, population/stock structure and management frameworks for marine mammals ....................................................................................................
    [Show full text]
  • STRATEGIC MANAGEMENT Edited by Dr
    /DCOM506 Edited by: Dr. Anand Thakur STRATEGIC MANAGEMENT Edited By Dr. Anand Thakur Printed by EXCEL BOOKS PRIVATE LIMITED A-45, Naraina, Phase-I, New Delhi-110028 for Lovely Professional University Phagwara SYLLABUS Objectives: Development and reinforcement of a general management point of view-the capacity to view the firm from an overall perspective, in the context of its environment. Development of an understanding of fundamental concepts in strategic management: the role of the general manager, the levels and components of strategy, competitive analysis, and organizational evolution. Development of those skills and knowledge peculiar to general management and the general manager's job that have not been covered in previous functional courses. Synthesis of the knowledge gained in previous courses and understand- ing what part of that knowledge is useful to general managers. DCOM506 Strategic Management Sr. No. Description 1. Nature of Strategic Management, Dimensions, benefits and risks. The strategic management process. 2. Strategy formulation. Business vision and mission, Importance, Characteristics and components. Evaluating mission statements. 3. The External Assessment, Porters five force analysis. Industry and competitive analysis. The Global Environment, competitive strategies for firms in global markets. 4. The Internal Assessment: SWOT Analysis, strategy and culture. Value Chain Analysis. Resource based view of the firm. Benchmarking. 5. Strategies in Action: The balanced scorecard, types of strategies, Integrative, Intensive, Diversification strategies, defensive strategies, Porters Generic Strategies. 6. Strategy analysis and choice: Business level strategies. Cost leadership, Differentiation, Speed and market focus. Multi business strategy: BCG matrix, GE Nine Cell matrix. Limitations of portfolio approaches. The Parenting framework. 7. Strategy Implementation: Short term objectives, functional tactics.
    [Show full text]
  • Terrorism in Afghanistan: a Joint Threat Assessment
    Terrorism in Afghanistan: A Joint Threat Assessment Terrorism in Afghanistan: A Joint Threat Assessment Introduction 7 Chapter I: Afghanistan’s Security Situation and Peace Process: Comparing U.S. and Russian Perspectives (Barnett R. Rubin) 9 Chapter II: Militant Terrorist Groups in, and Connected to, Afghanistan (Ekaterina Stepanova and Javid Ahmad) 24 Chapter III: Afghanistan in the Regional Security Interplay Context (Andrey Kazantsev and Thomas F. Lynch III) 41 Major Findings and Conclusions 67 Appendix A: Protecting Afghanistan’s Borders: U.S. and Russia to Lead in a Regional Counterterrorism Effort (George Gavrilis) 72 Appendix B: Arms Supplies for Afghan Militants and Terrorists (Vadim Kozyulin) 75 Appendix C: Terrorism Financing: Understanding Afghanistan’s Specifics (Konstantin Sorokin and Vladimir Ivanov) 79 Acronyms 83 Terrorism in Afghanistan Joint U.S.-Russia Working Group on Counterterrorism in Afghanistan Working Group Experts: Javid Ahmad1 Senior Fellow, Atlantic Council Sher Jan Ahmadzai Director, Center for Afghanistan Studies, University of Nebraska at Omaha Robert Finn Former Ambassador of the United States to Afghanistan George Gavrilis Fellow, Center for Democracy, Toleration, and Religion, University of California, Berkeley Andrey Kazantsev Director, Center for Central Asian and Afghan Studies, Moscow State Institute of International Relations (MGIMO University) Kirill Koktysh Associate Professor, Moscow State Institute of International Relations (MGIMO University) Member, Expert Council, State Duma Committee of Nationalities Mikhail Konarovsky Former Ambassador of the Russian Federation to Afghanistan Col. (Ret.) Oleg V. Kulakov* Professor of Area Studies, Military University, Ministry of Defence of the Russian Federation Vadim Kozyulin Member, PIR Center Executive Board Researcher, Diplomatic Academy, Ministry of Foreign Affairs of the Russian Federation Thomas F.
    [Show full text]
  • Maritime Security in the Middle East and North Africa: a Strategic Assessment
    MARITIME SECURITY IN THE MIDDLE EAST AND NORTH AFRICA: A STRATEGIC ASSESSMENT By Robert M. Shelala II Research Analyst, Burke Chair in Strategy Anthony H. Cordesman Arleigh A. Burke Chair in Strategy [email protected] Table of Contents Executive Summary ........................................................................................................................ 3 Chapter I – A Brief Introduction to Maritime Security .................................................................. 4 Chapter II – The Suez Canal and the Growing Threat of Egyptian Terrorism ............................... 6 Background on the Canal ............................................................................................................ 6 The Threat of Terrorism .............................................................................................................. 8 Egyptian Maritime Security Capabilities .................................................................................. 13 Recommendations for Securing the Suez Canal ....................................................................... 17 Chapter III – The Gulf and Threats From Iran ............................................................................. 20 A Brief Introduction to the Gulf ................................................................................................ 20 Regional Tensions and Iranian Threats to Gulf Security .......................................................... 22 Escalation Drivers in Iranian Strategic Calculus......................................................................
    [Show full text]
  • Information Security Risk Assessment
    Entry Information Security Risk Assessment Ievgeniia Kuzminykh 1,* , Bogdan Ghita 2 , Volodymyr Sokolov 3 and Taimur Bakhshi 4 1 Department of Informatics, King’s College London, London WC2R 2ND, UK 2 School of Engineering, Computing and Mathematics, University of Plymouth, Plymouth PL4 8AA, UK; [email protected] 3 Department of Information and Cyber Security, Borys Grinchenko Kyiv University, 04212 Kyiv, Ukraine; [email protected] 4 Center for Information Management and Cyber Security, Foundation for Advancement of Science & Technology, Lahore 54770, Pakistan; [email protected] * Correspondence: [email protected] Definition: Information security risk assessment is an important part of enterprises’ management practices that helps to identify, quantify, and prioritize risks against criteria for risk acceptance and objectives relevant to the organization. Risk management refers to a process that consists of identification, management, and elimination or reduction of the likelihood of events that can negatively affect the resources of the information system to reduce security risks that potentially have the ability to affect the information system, subject to an acceptable cost of protection means that contain a risk analysis, analysis of the “cost-effectiveness” parameter, and selection, construction, and testing of the security subsystem, as well as the study of all aspects of security. Keywords: information risk management; security risk assessment; risk classification; OCTAVE; CRAMM; RiskWatch; fuzzy logic Citation: Kuzminykh, I.; Ghita, B.; Sokolov, V.; Bakhshi, T. Information 1. Introduction Security Risk Assessment. Over time, the complexity of information systems is increasing, and, therefore, the Encyclopedia 2021, 1, 602–617. https:// issues of information security are becoming increasingly important for any organization.
    [Show full text]
  • Cyber Security Assessment Netherlands Security Assessment Cyber
    CSAN-4 Cyber Security Assessment Netherlands Cyber Cyber Security Assessment Netherlands CSAN-4 Cyber Security Assessment Netherlands 4CSAN-4 1 2 National Cyber Security Centre The National Cyber Security Centre (NCSC), in collaboration with the business community, government bodies and scientists, is working to increase the ability of Dutch society to defend itself in the digital domain. The NCSC supports the central government and organisations in fulfilling an essential function for society by providing expertise and advice, response to threats and enhancing crisis management. In addition, the NCSC provides information and advice to citizens, the government and the business community relating to awareness and prevention. This means that the NCSC constitutes the central reporting and information point for IT threats and security incidents. The NCSC is part of the Cyber Security Department of the National Coordinator for Security and Counterterrorism [Nationaal Coördinator Terrorismebestrijding en Veiligheid] (NCTV). Collaboration and sources In drawing up this report the NCSC gratefully made use of information provided by the following parties: » The various ministries » MIVD (Military Intelligence and Security Service) » DefCERT (Defence Computer Emergency Response Team) » AIVD (General Intelligence and Security Service) » Team High Tech Crime, Dutch National Police » Public Prosecution Service » Tax and Customs Administration » Members from ISAC (Information Sharing and Analysis Center) » NCTV (National Coordinator for Security and Counterterrorism) » Scientific institutions » Universities » Experts in the field of cyber security Their contributions, the substantive reviews as well as publicly accessible sources, a survey, information from the vital sectors and analyses from the NCSC together, have made valuable contributions to the substantive quality of this assessment.
    [Show full text]
  • SECURING CYBERSPACE a New Domain for National Security
    SECURING CYBERSPACE A New Domain for National Security FOREWORD BY JOSEPH S. NYE & BRENT SCOWCROFT EDITED BY NICHOLAS BURNS & JONATHON PRICE Copyright © 2012 by The Aspen Institute The Aspen Institute One Dupont Circle, N.W. Suite 700 Washington, DC 20036 Published in the United States of America in 2012 by The Aspen Institute All rights reserved Printed in the United States of America ISBN: 0-89843-562-5 Wye Publication Number: 12/001 Cover Design by: Steve Johnson Interior Layout by: Sogand Sepassi aspen strategy group CO-CHAIRMEN Graham Allison Director, Belfer Center Joseph S. Nye, Jr. John F. Kennedy School of Government University Distinguished Service Professor Harvard University John F. Kennedy School of Government Harvard University Zoë Baird Budinger President Brent Scowcroft Markle Foundation President The Scowcroft Group, Inc. Samuel R. Berger Chair Albright Stonebridge Group DIRECTOR Stephen E. Biegun Nicholas Burns Vice President Professor of the Practice of Diplomacy Ford Motor Company and International Politics John F. Kennedy School of Government Robert D. Blackwill Harvard University Henry A. Kissinger Senior Fellow for U.S. Foreign Policy Council on Foreign Relations DEPUTY DIRECTOR Eliot Cohen Jonathon Price Professor Deputy Director Johns Hopkins SAIS Aspen Strategy Group Susan Collins Senator ASSOCIATE DIRECTOR United States Senate Jennifer Jun Richard Cooper Associate Director Professor Aspen Strategy Group Harvard University Richard Danzig Chairman MEMBERS Center for a New American Security Madeleine Albright John Deutch Chair Institute Professor Albright Stonebridge Group Massachusetts Institute of Technology Richard Falkenrath Richard G. Lugar Principal Senator The Chertoff Group United States Senate Peter Feaver Leo Mackay Professor Vice President Duke University Ethics & Business Conduct Lockheed Martin Corporation Dianne Feinstein Senator Jessica T.
    [Show full text]
  • Cyber Threats, Harsh Environment and the European High North (EHN)
    Michigan Technological University Digital Commons @ Michigan Tech Michigan Tech Publications 3-2019 Cyber threats, harsh environment and the European High North (EHN) in a human security and multi-level regulatory global dimension: Which framework applicable to critical infrastructures under “Exceptionally critical infrastructure conditions” (ECIC)? Sandra Cassotta Roman Sidortsov Christer Pursiainen Michael Evan Goodsite Follow this and additional works at: https://digitalcommons.mtu.edu/michigantech-p Part of the Social and Behavioral Sciences Commons Follow this and additional works at: https://digitalcommons.mtu.edu/michigantech-p Part of the Social and Behavioral Sciences Commons Beijing Law Review, 2019, 10, 317-360 http://www.scirp.org/journal/blr ISSN Online: 2159-4635 ISSN Print: 2159-4627 Cyber Threats, Harsh Environment and the European High North (EHN) in a Human Security and Multi-Level Regulatory Global Dimension: Which Framework Applicable to Critical Infrastructures under “Exceptionally Critical Infrastructure Conditions” (ECIC)? Sandra Cassotta1,2,3,4,5,6, Roman Sidortsov7, Christer Pursiainen8, Michael Evan Goodsite9 1Department of Law, Aalborg University, Aalborg, Denmark 2Western Sydney University (WSU), Sydney, Australia 3The Sustainable College Bruges (SCB), Bruges, Belgium 4The Institute for Security and Development Policy (ISDP), Stockholm, Sweden 5The Intergovernmental Panel on Climate Change (IPCC) on Polar Issues and Governance (2017-20), United Nations (UN) 6The International Economic Crime and Cybercrime Research Centre (IEEC) at Aalborg University, Aalborg, Denmark 7Energy Policy Department of Social Sciences, Michigan Technological University, Houghton, Michigan, USA 8Societal Safety and Environment, Department of Engineering and Safety, UiT, The Arctic University of Norway, Tromsø, Norway 9Australian School of Petroleum, School of Civil, Environmental and Mining Engineering, The University of Adelaide, Adelaide, Australia How to cite this paper: Cassotta, S., Si- Abstract dortsov, R., Pursiainen, C., & Goodsite, M.
    [Show full text]
  • Building a Launchpad for Impactful Satellite Cyber-Security Research
    SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research James Pavur Ivan Martinovic Oxford University Oxford University [email protected] [email protected] Abstract—As the space industry approaches a period of rapid astrophysics. Academics in each domain have made valuable change, securing both emerging and legacy satellite missions will discoveries, but contributions in one field are easily overlooked become vital. However, space technology has been largely over- by researchers with a narrow focus on their own. looked by the systems security community. This systematization of knowledge paper seeks to understand why this is the case and This paper offers a cross-disciplinary synthesis of progress to offer a starting point for technical security researchers seeking to date on space systems security. The paper begins by impactful contributions beyond the Earth’s mesosphere. presenting a unified matrix of existing threat models - linking The paper begins with a cross-disciplinary synthesis of relevant attackers, vulnerabilities and motivations drawn from dozens threat models from a diverse array of fields, ranging from legal of prior studies. Underpinning this effort is an exhaustive and policy studies to aerospace engineering. This is presented as a “threat matrix toolbox” which security researchers may historical timeline of satellite hacking incidents, where our leverage to motivate technical research into given attack vectors own archival research is added to prior contributions from Fritz and defenses. We subsequently apply this model to an original and Manulis et al. [1], [2]. The combination of this historical chronology of more than 100 significant satellite hacking incidents analysis and threat modeling framework offers a useful aid spanning the previous 60 years.
    [Show full text]