Archived Content Information Archivée Dans Le
Total Page:16
File Type:pdf, Size:1020Kb
Archived Content Information identified as archived on the Web is for reference, research or record-keeping purposes. It has not been altered or updated after the date of archiving. Web pages that are archived on the Web are not subject to the Government of Canada Web Standards. As per the Communications Policy of the Government of Canada, you can request alternate formats on the "Contact Us" page. Information archivée dans le Web Information archivée dans le Web à des fins de consultation, de recherche ou de tenue de documents. Cette dernière n’a aucunement été modifiée ni mise à jour depuis sa date de mise en archive. Les pages archivées dans le Web ne sont pas assujetties aux normes qui s’appliquent aux sites Web du gouvernement du Canada. Conformément à la Politique de communication du gouvernement du Canada, vous pouvez demander de recevoir cette information dans tout autre format de rechange à la page « Contactez-nous ». CANADIAN FORCES COLLEGE / COLLÈGE DES FORCES CANADIENNES JCSP 35 / PCEMI 35 MASTER OF DEFENCE STUDIES RESEARCH PROJECT EVALUATING CANADA’S CYBER SEMANTIC GAP By /par LCol/lcol Francis Castonguay This paper was written by a student La présente étude a été rédigée par un attending the Canadian Forces College stagiaire du Collège des Forces in fulfilment of one of the requirements canadiennes pour satisfaire à l'une des of the Course of Studies. The paper is a exigences du cours. L'étude est un scholastic document, and thus contains document qui se rapporte au cours et facts and opinions, which the author contient donc des faits et des opinions alone considered appropriate and que seul l'auteur considère appropriés et correct for the subject. It does not convenables au sujet. Elle ne reflète pas necessarily reflect the policy or the nécessairement la politique ou l'opinion opinion of any agency, including the d'un organisme quelconque, y compris le Government of Canada and the gouvernement du Canada et le ministère Canadian Department of National de la Défense nationale du Canada. Il Defence. This paper may not be est défendu de diffuser, de citer ou de released, quoted or copied, except with reproduire cette étude sans la the express permission of the Canadian permission expresse du ministère de la Department of National Defence. Défense nationale. Abstract This dissertation examines the Cyber environment from a Canadian perspective and argues that the Canadian Forces (CF) must deliver the Cyber Operations capabilities required to support the Canada First Defence Strategy (CFDS). In evaluating Canada’s Cyber semantic gap, a comprehensive overview of the Cyber environment is outlined, including a detailed discussion of terminology and doctrinal issues, computer network operations, the threats, vulnerabilities, risks and trends relating to public infrastructure, the military, businesses and individuals. In assessing the roles and responsibilities across the various Government of Canada (GC) departments, a historical perspective is given of the progress since the publishing of the 2004 National Security Policy. The slow start in establishing clear governance structures, developing policies and implementing effective proactive solutions to the Cyber threat in Canada is shown to have a new sense of urgency for the GC. Related to policy difficulties, the operational and criminal legal issues highlight the complexities and immaturity of understanding of the Cyber environment and its regulation. The Canadian Forces Network Operations Centre (CFNOC) role and mandate is clearly outlined as a valuable and essential capability for the GC as a national Computer Network Defence (CND), Computer Network Exploitation (CNE) and Computer Network Attack (CNA) capability. However, additional resources will be required to fully execute its mandate of proactive Cyber Operations as required by the CFDS. Table of Contents CHAPTER I – INTRODUCTION................................................................................................... 1 CHAPTER II - THE CYBER ENVIRONMENT.......................................................................... 11 Terminology......................................................................................................................... 11 Defining the Cyber Environment......................................................................................... 14 Cyber Operations ................................................................................................................. 18 Threats, Vulnerabilities and Risk......................................................................................... 22 Trends .................................................................................................................................. 23 Public and Private Critical Infrastructure............................................................................. 26 Classification ....................................................................................................................... 31 Military Mandates and Missions.......................................................................................... 31 Businesses............................................................................................................................ 33 Individuals ........................................................................................................................... 36 Cyber Environment Summary ............................................................................................. 37 CHAPTER III - DETERMINING WHO HAS RESPONSIBILITY FOR CNO........................... 39 Integrated Security Strategy................................................................................................. 40 GC Cyber Security Initiatives since 2004............................................................................ 46 Proactive Defence Proposal ................................................................................................. 48 The Meaning of Proactive.................................................................................................... 50 Legal Issues.......................................................................................................................... 56 The Role of National Defence ............................................................................................. 67 The Role of Industry ............................................................................................................74 Responsibility Summary...................................................................................................... 79 CHAPTER IV -POTENTIAL CNO CONTRIBUTIONS TO MEET THE CFDS MISSIONS.... 81 1. Domestic and Continental Operations ............................................................................. 82 2. Major International Events .............................................................................................. 83 3. Response to a Major Terrorist Attack.............................................................................. 84 4. Support to Civilian Authorities........................................................................................ 85 5. Lead or Conduct a Major International Operation........................................................... 86 6. Deploy in Response to Crises for Short Periods.............................................................. 86 CFDS Sustainment Issues.................................................................................................... 87 Cyber Training..................................................................................................................... 89 Institutional Inertia............................................................................................................... 91 Interoperability..................................................................................................................... 92 CFDS Summary................................................................................................................... 94 CHAPTER VI – CONCLUSION .................................................................................................. 95 Bibliography .................................................................................................................................. 97 1 In the old days, people robbed stagecoaches and knocked off armoured trucks. Now they're knocking off servers. ~Richard Power Some people can hack it, others can't. ~Author Unknown CHAPTER I – INTRODUCTION The advent of networked devices in the fabric of modern society dates back only two decades.1 Prior to this, technology grew in relatively independent streams that did not mix until modems and packet-switching protocols (TCP/IP & OSI) entered the scene commercially in the early 1990’s.2 This innovation connected standalone computers into networks that piggy-backed onto the extensive and reliable 100 year old circuit-switched telephone networks. Since this initial marriage of technologies, information technology and telecommunications have reached a new level of integration and are now collectively called Information and Communications Technology (ICT). In fact, they have fused to such an extent that it created a 180 degree shift from the initial paradigm of voice-only to data-only networks. Computer networks have proliferated globally to such a degree that they no longer rely upon modems or telephone lines to operate. Telephone appliances have even transformed