10Th International Conference on Cyber Conflict Cycon X: Maximising Effects

Total Page:16

File Type:pdf, Size:1020Kb

10Th International Conference on Cyber Conflict Cycon X: Maximising Effects 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, or for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström, (Eds.) 2018 © NATO CCD COE Publications NATO CCD COE Publications LEGAL NOTICE: This publication contains the opinions of the respective authors only. They do not Filtri tee 12, 10132 Tallinn, Estonia necessarily reflect the policy or the opinion of NATO Phone: +372 717 6800 CCD COE, NATO, or any agency or any government. NATO CCD COE may not be held responsible for Fax: +372 717 6308 any loss or harm arising from the use of information E-mail: [email protected] contained in this book and is not responsible for the Web: www.ccdcoe.org content of the external sources, including external websites referenced in this publication. Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu Cover design: AKU NATO COOPERATIVE CYBER DEFENCE CENTRE OF ExcELLENCE The NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) is a NATO- accredited cyber defence hub focusing on research, training and exercises. It represents a community of currently 21 nations providing a 360-degree look at cyber defence, with expertise in the areas of technology, strategy, operations and law. The heart of the Centre is a diverse group of international experts from military, government and industry backgrounds. The CCD COE is home to the Tallinn Manual 2.0, the most comprehensive guide on how International Law applies to cyber operations. The Centre also organises the world’s largest and most complex international live-fire cyber defence exercise, Locked Shields. Another highlight of the Centre is the International Conference on Cyber Conflict, CyCon, a unique event joining key experts and decision-makers of the global cyber defence community in Tallinn every spring. As of January 2018 CCD COE is responsible for identifying and coordinating education and training solutions in the field of cyber defence operations for all NATO bodies across the Alliance. The Centre is staffed and financed by its member nations - Austria, Belgium, the Czech Republic, Estonia, Finland, France, Germany, Greece, Hungary, Italy, Latvia, Lithuania, the Netherlands, Poland, Portugal, Slovakia, Spain, Sweden, Turkey, the United Kingdom and the United States. NATO-accredited centres of excellence are not part of the NATO Command Structure. CYCON 2018 SPONSORS TABLE OF CONTENTS Introduction 1 Rethinking the Data Wheel: Automating Open-Access, 9 Public Data on Cyber Conflict Christopher Whyte, Brandon Valeriano, Benjamin Jensen, Ryan Maness The Cyber Deterrence Problem 31 Aaron F. Brantly Offensive Cyber Capabilities: To What Ends? 55 Max Smeets, Herbert S. Lin Understanding and Countering Cyber Coercion 73 Quentin E. Hodgson Targeting Technology: Mapping Military 89 Offensive Network Operations Daniel Moore Drawing Inferences from Cyber Espionage 109 Martin C. Libicki The Topography of Cyberspace and 123 Its Consequences for Operations Brad Bigelow Net Neutrality in the Context of Cyber Warfare 139 Kim Hartmann, Keir Giles The Cyber Decade: Cyber Defence at a X-ing Point 159 Robert Koch, Mario Golling Aladdin’s Lamp: The Theft and 187 Re-weaponization of Malicious Code Kārlis Podiņš, Kenneth Geers Cyber Law and Espionage Law as Communicating Vessels 203 Asaf Lubin Internet Intermediaries and Counter-Terrorism: 227 Between Self-Regulation and Outsourcing Law Enforcement Krisztina Huszti-Orban From Grey Zone to Customary International Law: 245 How Adopting the Precautionary Principle May Help Crystallize the Due Diligence Principle in Cyberspace Peter Z. Stockburger Pressing Pause: A New Approach for International 263 Cybersecurity Norm Development Cedric Sabbah Developing Collaborative and Cohesive 283 Cybersecurity Legal Principles Jeff Kosseff Utilizing Air Traffic Communications for OSINT on 299 State and Government Aircraft Martin Strohmeier, Matthew Smith, Daniel Moser, Matthias Schäfer, Vincent Lenders, Ivan Martinovic FeedRank: A Tamper-resistant Method for the Ranking 321 of Cyber Threat Intelligence Feeds Roland Meier, Cornelia Scherrer, David Gugelmann, Vincent Lenders, Laurent Vanbever HTTP Security Headers Analysis of Top One Million Websites 345 Artūrs Lavrenovs, F. Jesús Rubio Melón On the Effectiveness of Machine and 371 Deep Learning for Cyber Security Giovanni Apruzzese, Michele Colajanni, Luca Ferretti, Alessandro Guido, Mirco Marchetti Screen Watermarking for Data Theft 391 Investigation and Attribution David Gugelmann, David Sommer, Vincent Lenders, Markus Happe, Laurent Vanbever Neural Network and Blockchain Based Technique 409 for Cyber Threat Intelligence and Situational Awareness Roman Graf, Ross King Mission-Focused Cyber Situational 427 Understanding via Graph Analytics Steven Noel, Paul D. Rowe, Stephen Purdy, Michael Limiero, Travis Lu, Will Mathews Biographies 449 INTRODUCTION CyCon X is the tenth iteration of the annual International Conference on Cyber Conflict, organised by the NATO Cooperative Cyber Defence Centre of Excellence and taking place in Tallinn from 29 May to 1 June 2018. Over the years, CyCon has become a world-recognised conference addressing cyber conflict and security from the perspectives of technology, strategy, operations, law, and policy. We are always glad to see our friends in Tallinn again – a number of them have been involved with CyCon since its origins a decade ago – and we also welcome newcomers, who can discover the cyber debates and ‘white night’ walks in Tallinn’s Old Town. We are proud to offer them all the opportunity to meet and learn something new from each other. If CyCon has been able to contribute to interdisciplinary understanding of cyber conflict and security throughout the years, then it has achieved its main goal. CyCon X’s core topic is ‘Maximising Effects’. Since the very beginning, cyberspace has provided unparalleled opportunities to achieve effects in new and novel ways. Today, cyberspace provides a technological platform and an environment for diverse actors, with both good and bad motivations, to influence everyone and everything. Maximising effects in the cyber realm is important for business, media, governments and military, and even private users. However, how will this be achieved and what will the consequences be? How will AI, machine learning and big data help to maximise effects in cyberspace? How will international law develop in light of the serious effects of state-sponsored operations that may or may not be hard to attribute? The effects generated through cyberspace, including new instabilities and vulnerabilities, will require new policies, legal frameworks and technological solutions to maximise security. In response to the Call for Papers in June 2017, almost 200 abstracts were submitted in October. After a careful selection and peer review by the Academic Review Committee, this book contains 22 articles whose authors were invited to present at the conference. Christopher Whyte, Brandon Valeriano, Benjamin Jensen, and Ryan Maness describe the prospects for open-source, public data collection for cyber security events and present an initial data collection and analysis of interstate cyber conflict incidents involving the United States. Aaron F. Brantly examines the applicability of deterrence in the digital age and for digital tools, based on examples from both within and beyond cyberspace. Max Smeets and Herbert S. Lin aim to explain if (and how) offensive cyber capabilities have the potential to change the role of military power and argue that these capabilities can alter the manner in which states use their military power strategically. Quentin E. Hodgson seeks to develop an understanding of how 1 states use cyber capabilities to coerce others for political objectives and examines the use of cyber operations by North Korea and Russia in recent years as part of their broader strategies. Daniel Moore argues that military offensive network operations can be usefully cast into a two-part taxonomy: event-based attacks and presence- based attacks – these two types offer different solutions, encompass varying risks, and may require different resources to accomplish. Martin C. Libicki shows how cyber espionage between state adversaries can ‘alter the balance of a confrontation’ and ‘shape the inferences that the other side draws about one’s intentions’ in cyberspace. Brad Bigelow suggests that ‘cyberspace’ as a label for a domain should not be confused with the individual networks – some interconnected
Recommended publications
  • 2018 Annual Report
    2018 Annual Report Main part June 2019 ŠKODA AUTO VYSOKÁ ŠKOLA o.p.s. 2018 Annual Report Title: 2018 Annual Report Authors: Mgr. Petr Šulc et al. Publisher: ŠKODA AUTO VYSOKÁ ŠKOLA o.p.s. Na Karmeli 1457 293 01 Mladá Boleslav tel.:+420 326 823 024 www.savs.cz Number of pages: 66 Edition: 1st edition This publication was not edited or reviewed. ISBN: 978-80-87042-74-8 2 ŠKODA AUTO VYSOKÁ ŠKOLA o.p.s. 2018 Annual Report Contents 1 Introduction .............................................................................................................................. 5 1.1 Basic information about the higher education institution ......................................................... 5 1.2 Representation of the private higher education institution in Czech higher education institutions 10 1.3 Vision of ŠKODA AUTO University and its strategic objectives ............................................ 10 1.4 Changes in internal regulations in 2018 ................................................................................ 11 1.5 Provision of information under Section 18 of the Act 106/1999 Coll., on Free Access to Information ............................................................................................................................. 11 2 Study programmes, organisation of studies and educational activities ................................. 12 2.1 Accredited study programmes ............................................................................................... 12 2.2 Accredited study programmes in a foreign language
    [Show full text]
  • MATTHEW EBDEN AUS @Mattebden @Mattebdentennis @Matt Ebden
    MATTHEW EBDEN AUS @mattebden @mattebdentennis @matt_ebden BORN: 26 November 1987, Durban, South Africa HEIGHT / WEIGHT: 1.88m (6'2") / 80kg (176lbs) RESIDENCE: Perth, Australia PLAYS: Right-handed · Two-handed backhand CAREER W-L: 68-106 CAREER PRIZE MONEY: $2,932,255 CAREER W-L VS. TOP 10: 3-9 HIGHEST ATP RANKING: 39 (22 October 2018) CAREER 5TH-SET RECORD: 2-3 HIGHEST ATP DOUBLES RANKING: 57 (25 June 2012) 2018 HIGHLIGHTS CAREER FINALIST (1): 2017 (1): Newport > Idols growing up were Stefan PRIZE MONEY: $961,714 (G). Edberg and Andre Agassi. W-L: 19-22 (singles), 10-16 (doubles) CAREER DOUBLES TITLES (4). FINALIST (1). > Hobbies are going to the beach, SINGLES SF (2): ’s-Hertogenbosch, surfing, movies and computer Atlanta PERSONAL games. Enjoys collecting QF (3): Halle, Chengdu, Shanghai > Began playing tennis at age 5 watches and studying with his family in South Africa. horology. CAREER HIGHLIGHTS > Moved to Australia at age 12. > If he wasn't a tennis player, he > Achieved career-high No. 39 on > Went to high school at would probably be a lawyer. 22 October 2018 following prestigious Hale School in > Enrolled at University of personal-best 19th win of Perth. Western Australia to pursue a season. Broke into Top 50 on 16 > Father, Charles, is a chief law/commerce degree, but July 2018 after reaching financial officer and played deferred to play pro tennis. Wimbledon 3R. Rose 600+ spots state cricket and tennis in > Favourite sports team is the from No. 695 to No. 76 in 2017. South Africa; mother, Ann, is a Wallabies (Rugby Union).
    [Show full text]
  • Cyber Law and Espionage Law As Communicating Vessels
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
    [Show full text]
  • PWTORCH NEWSLETTER • PAGE 2 Www
    ISSUE #1255 - MAY 26, 2012 TOP FIVE STORIES OF THE WEEK PPV ROUNDTABLE (1) Raw expanding to three hours on July 23 (2) Impact going live every week this summer (3) Flair parting ways with TNA, WWE bound WWE OVER THE LIMIT (4) Raw going “interactive” with weekly voting Staff Scores & Reviews (5) Laurinaitis pins Cena after Show turns heel Pat McNeill, columnist (6.5): The main problem with WWE Over The Limit? The main event went over the limit of what we’ll accept from WWE. You can argue that there was no reason to book John Cena against John Laurinaitis on a pay-per-view, and you’d be right. RawHEA eDLxINpE AaNnALYdSsIS to thrhoeurse, a nhd uosuaullyr tsher e’Js eunoulgyh re2de3eming But on top of that, there was no reason to book content to make it worth the investment. But Cena versus Laurinaitis to go as long as any other three hours? Three hours of lousy content is By Wade Keller, editor major pay-per-view match. And there was no enough that next time viewers might just tune in reason for Cena to drag the match out. It didn’t fit If you follow an industry long enough, you’re for a just an hour instead of the usual two and the storyline. And it made John Cena look like a bound to see some bad decisions being made. certainly not commit to all three. Or they might chump. or like The Stinger, when Big Show turned Some are worse than others, but it’s rare when pick their segments, watching the predictably heel for the umpteenth time and cost him the you think you might be seeing the Worst newsmaking segments at the start of each hour match.
    [Show full text]
  • The Formation of Subjectivity in Mexican American Life Narratives
    University of New Mexico UNM Digital Repository American Studies ETDs Electronic Theses and Dissertations 2-9-2011 Ghostly I(s)/Eyes: The orF mation of Subjectivity in Mexican American Life Narratives Patricia Marie Perea Follow this and additional works at: https://digitalrepository.unm.edu/amst_etds Recommended Citation Perea, Patricia Marie. "Ghostly I(s)/Eyes: The orF mation of Subjectivity in Mexican American Life Narratives." (2011). https://digitalrepository.unm.edu/amst_etds/34 This Dissertation is brought to you for free and open access by the Electronic Theses and Dissertations at UNM Digital Repository. It has been accepted for inclusion in American Studies ETDs by an authorized administrator of UNM Digital Repository. For more information, please contact [email protected]. i ii © 2010, Patricia Marie Perea iii DEDICATION por mi familia The smell of cedar can break the feed yard. Some days I smell nothing until she opens her chest. Her polished nails click against tarnished metal Cleek! Then the creek of the hinge and the memories open, naked and total. There. A satin ribbon curled around a ringlet of baby fine hair. And there. A red and white tassel, its threads thick and tangled. Look here. She picks up a newspaper clipping, irons out the wrinkles between her hands. I kept this. We remember this. It is ours. iv ACKNOWLEDGMENTS Until quite recently, I did not know how many years ago this dissertation began. It did not begin with my first day in the Ph.D. program at the University of New Mexico in 2000. Nor did it begin with my first day as a graduate student at the University of Texas at Austin in 1997.
    [Show full text]
  • Twodee's Shadowrun Storytime, Including but Not Limited to the Full Chapter 15 and Chapters 21 and 21.5
    1 TwoDee’s Shadowrun Storytime Written by TwoDee Edited and Compiled by Jarboot!!j4xjG8Gxyo4 Further Edited and Compiled by Impatient Asshole Anon What follows is arguably the best series of storytime threads ever created. If you're any sort of fan of Shadowrun—whether you're a new GM, newbie player, or even a veteran—this prose will really help flesh out what sort of fun you can have with the system and setting. It's nearly 400 pages and about 130,000 words, so download this to read on your phone/laptop/ebook/commlink, because this will take a while. I'm Jarboot, a fellow fa/tg/uy and Shadowrun fan. Someone suggested that someone make a compilation of this story for easier reading, so I figured I could do it. Editing is minimal, but I fixed a lot of spelling and general syntax error, most of which were mentioned by TwoDee in a post following the original. There are some little Jackpoint-esque comments from other people from the threads included in the document, which are differentiated by a green color and indented text. I may have included a picture or two in there, too. Also, 2D likes to do some foreshadowing at some points, so keep track of the greentexted dates if you feel confused. All these threads (except number 3, which you can search for using some of the other tags) can be found by searching for the “shadowrun storytime” tag on the /tg/ archive. Jarboot is an extremely helpful fa/tg/uy, but this particular Anon is an impatient asshole who wanted a fully updated version of TwoDee's Shadowrun Storytime, including but not limited to the full Chapter 15 and Chapters 21 and 21.5.
    [Show full text]
  • Global Gas Security Review 2018 Foreword
    Global Gas Security Review Meeting Challenges in a Fast Changing Market 2018 Global Gas Security Review Meeting Challenges in a Fast Changing Market 2018 INTERNATIONAL ENERGY AGENCY The IEA examines the full spectrum of energy issues including oil, gas and coal supply and demand, renewable energy technologies, electricity markets, energy efficiency, access to energy, demand side management and much more. Through its work, the IEA advocates policies that will enhance the reliability, affordability and sustainability of energy in its 30 member countries, 7 association countries and beyond. The four main areas of IEA focus are: n Energy Security: Promoting diversity, efficiency, flexibility and reliability for all fuels and energy sources; n Economic Development: Supporting free markets to foster economic growth and eliminate energy poverty; n Environmental Awareness: Analysing policy options to offset the impact of energy production and use on the environment, especially for tackling climate change and air pollution; and n Engagement Worldwide: Working closely with association and partner countries, especially major emerging economies, to find solutions to shared energy and environmental IEA member countries: concerns. Australia Austria Belgium Canada Czech Republic Denmark Estonia Finland France Germany Greece Secure Hungary Sustainable Ireland Together Italy Japan Korea Luxembourg Mexico Netherlands New Zealand Norway Poland Portugal Slovak Republic © OECD/IEA, 2018 Spain International Energy Agency Sweden Website: www.iea.org Switzerland Turkey United Kingdom United States Please note that this publication is subject to specific restrictions The European Commission that limit its use and distribution. The terms and conditions are also participates in available online at www.iea.org/t&c/ the work of the IEA.
    [Show full text]
  • Cyber-Attacks to Critical Energy Infrastructure
    Cyber-attacks to critical energy infrastructure and management issues: overview of selected cases Tomas Plėta, Manuela Tvaronavičienė, Silvia Casa, Konstantin Agafonov To cite this version: Tomas Plėta, Manuela Tvaronavičienė, Silvia Casa, Konstantin Agafonov. Cyber-attacks to critical en- ergy infrastructure and management issues: overview of selected cases. Insights into Regional Develop- ment, Entrepreneurship and Sustainability Center, 2020, 2 (3), pp.703 - 715. 10.9770/ird.2020.2.3(7). hal-03271856 HAL Id: hal-03271856 https://hal.archives-ouvertes.fr/hal-03271856 Submitted on 27 Jun 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. INSIGHTS INTO REGIONAL DEVELOPMENT ISSN 2669-0195 (online) http://jssidoi.org/IRD/ 2020 Volume 2 Number 3 (September) http://doi.org/10.9770/IRD.2020.2.3(7) Publisher http://jssidoi.org/esc/home CYBER-ATTACKS TO CRITICAL ENERGY INFRASTRUCTURE AND MANAGEMENT ISSUES: OVERVIEW OF SELECTED CASES* Tomas Plėta ¹, Manuela Tvaronavičienė ², Silvia Della Casa ³, Konstantin Agafonov 4 1,2 Vilnius Gediminas Technical University, Saulėtekio al. 11, LT-10223 Vilnius, Lithuania 2General Jonas Zemaitis Military Academy of Lithuania, Šilo 5a, LT-10322, Vilnius, Lithuania 3Daugavpils University, Parades Str. 1-421, Daugavpils, LV-5401, 3 NATO Energy Security Center Of Excellence, Šilo g.
    [Show full text]
  • Strategic Culture and Cyber Strategy
    University of Central Florida STARS Honors Undergraduate Theses UCF Theses and Dissertations 2021 Strategic Culture and Cyber Strategy Andrew S. Olejarski University of Central Florida Part of the Political Science Commons Find similar works at: https://stars.library.ucf.edu/honorstheses University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by the UCF Theses and Dissertations at STARS. It has been accepted for inclusion in Honors Undergraduate Theses by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Olejarski, Andrew S., "Strategic Culture and Cyber Strategy" (2021). Honors Undergraduate Theses. 877. https://stars.library.ucf.edu/honorstheses/877 STRATEGIC CULTURE AND CYBER STRATEGY by ANDREW S. OLEJARSKI A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Political Science in the College of Sciences and in the Burnett Honors College at the University of Central Florida Orlando, Florida Spring 2021 Thesis Chair: Ted Reynolds, Ph.D. ABSTRACT The intent of this paper is to explore the relationship between strategic culture theory and how it interacts with war-parallel usage of cyber methods. Cyber methods, at times incorrectly classified as “cyberwarfare”, as a means of statecraft are becoming increasingly prevalent, and developing an understanding of how states use them, particularly during conflicts, would be a great boon to the field of security studies. Strategic culture theory, an international relations theory focusing on the relationship between culture and strategy, may be an effective means to analyze conflict-parallel use of cyber methods.
    [Show full text]
  • Bdo Invitational Ranking System - Alphabetical - 2017-2018 Men + Women
    BDO INVITATIONAL RANKING SYSTEM - ALPHABETICAL - 2017-2018 MEN + WOMEN Abbreviations [C] Denotes 2016-2017 Ranking Category - none yet confirmed for 2017-2018 ? No record found of comparable Event in final listings of 2016-2017 ADC Awaiting Date Confirmation ACAF Awaiting completed Application Form EC Event Confirmed No Date Year Tournament MEN WOMEN Status Location 1 Oct-21 2017 Alan King Memorial C C EC New Zealand 2 Aug-12 2018 Antwerp Masters B B EC Belgium 3 Sep-15 2018 Auckland Open D D EC New Zealand 4 Oct 21 - 22 2017 Australian Grand Masters B B EC Australia 5 Oct-15 2017 Australian Masters B B EC Australia 6 Jun 22 - 24 2018 Austrian Open Vienna D D EC Austria 7 Sep-22 2018 BDO British Classic Singles A B EC England 8 Sep-23 2018 BDO British Open Singles A+ B EC England 9 Jul 6 - 7 2018 BDO Gateway International Open A A EC Wales 10 May 26 - 28 2018 Belfry Open B B EC Belgium 11 Aug-05 2018 Belgium Masters B B EC Belgium 12 Aug-04 2018 Belgium Open B B EC Belgium 13 Oct 27 - 29 2017 Bob Jones Memorial D D EC Canada 14 May 26 - 28 2018 Bruges Open A A EC Belgium 15 Apr-15 2018 Bulls German Masters B B EC Germany 16 Apr-14 2018 Bulls German Open A B EC Germany 17 Feb 9 - 11 2018 Camellia Classic ACAF Canada 18 Jun 15 - 17 2018 Canadian Open B B EC Canada 19 Feb-04 2018 Canterbury Classic D D EC New Zealand 20 Jun-03 2018 Canterbury Open D D EC New Zealand 21 Sep-08 2018 Catalonia Open C C EC Catalonia 22 Apr 20 - 22 2018 Charlotte Open D D EC USA 23 Jun 22 - 24 2018 Cherry Bomb International D D EC USA 24 May 4 - 6 2018 Cleveland
    [Show full text]
  • Combating Ransomware Chapter Title 1
    IST Combating Ransomware Chapter Title 1 Combating Ransomware A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force Prepared by the Institute for Security and Technology IST Combating Ransomware Chapter Title 2 Contents A Note from RTF Co-Chairs 3-4 Executive Summary 5-6 Introduction 7-19 Ransomware as a National Security Threat 8 Understanding Ransomware 11 Ransom Payments 12 Cyber Insurance and Ransomware 13 The Role of Cryptocurrency 14 A Global Challenge 15 The Threat Actors 16 Existing Efforts to Mitigate Ransomware Attacks 18 A Comprehensive Framework for Action: 19-48 Key Recommendations from the Ransomware Task Force Goal 1: Deter ransomware attacks through a nationally and internationally coordinated, comprehensive strategy 21 Goal 2: Disrupt the ransomware business model and decrease criminal profits 28 Goal 3: Help organizations prepare for ransomware attacks 35 Goal 4: Respond to ransomware attacks more effectively 42 A Note on Prohibiting Ransom Payments 49-50 Conclusion 51 Summary of Recommendations 52-54 Acknowledgments 55-56 Appendices 57-72 Appendix A: Cyber Insurance 58-61 Appendix B: The Cryptocurrency Payment Process 62-67 Appendix C: Proposed Framework for a Public-Private Operational Ransomware Campaign 68-72 Glossary 73-76 Endnotes 77-81 Short cut: To go directly to each section in the PDF please click on the section title in the Contents. This report is published under a 4.0 International Creative Commons License (see terms here). IST Combating Ransomware A Note from the RTF Co-Chairs 3 A Note from the RTF Co-Chairs We are honored to present this report from the Ransomware Task Force.
    [Show full text]
  • A Report on Attackers in the Energy Industry CONTENTS
    The state of the station A report on attackers in the energy industry CONTENTS Introduction 3 Outmoded and out there 4 Changing the game 4 The names 5 The profiles 5 Two groups, one spillover 9 A plethora of opportunity 10 Attack targets and the reasons behind them 10 The ‘How’ 11 Investigating and naming 12 Still succeeding 12 Mitigating 13 Conclusions 15 THE STATE OF THE STATION 2 INTRODUCTION Interconnected systems in the energy industry increase cyber vulnerabilities, with cyber attacks often going undetected for some time. Malicious actors are increasingly targeting critical infrastructure (CNI) sites and distribution facilities for energy, and cyber attacks have real-world effects. As energy companies save costs against the backdrop of a lower oil price, consolidating operations can weaken business resilience and redundancy levels. This gives rise to new, single critical points of failure, with any disruption across the supply chain potentially having increased consequences. Cyber attacks using individual vulnerabilities and exploits have, and always will be directed against the vast number of Programmable Logic Controllers (PLCs) in existence. However, connecting Industrial Control Systems (ICS) to the Internet and enterprise business networks is increasing. These factors, plus fewer backups in place with an increased dependency on fewer facilities, are only part of the picture. OUTMODED AND OUT THERE Many Operational Technology (OT) components connection was usual. Cyber security was not a have built-in remote operation capabilities, but are realistic threat when they were manufactured, and partly or entirely lacking in security protocols such legacy protocols and systems never had built-in as authentication.
    [Show full text]