CPC Outreach Journal #918

Total Page:16

File Type:pdf, Size:1020Kb

CPC Outreach Journal #918 Issue No. 918, 24 June 2011 Articles & Other Documents: Featured Article: Pentagon Gets Cyberwar Guidelines 1. Amano Invited to Visit Iran’s Nuclear Sites 2. Saudi Arabia May Use Economic Clout to Squeeze Iran: Prince 3. Ahmadinejad Insists Iran Not Seeking Nuclear Bomb 4. Concrete Result Needed for Any Iran Visit: IAEA Chief 5. N. Korea could Test-Launch Missile at New Launch Site this Year: Expert 6. Spy Chief Says Policy Failures Dealt Blow to N. Korea's Heir Apparent 7. China Says No Cyber Warfare with U.S. 8. N.K. May Have Grid-Disabling Nuke 9. 'Proliferation Could Lead to Pyongyang’s Demise' 10. Obama Extends National Emergency Against N. Korea 11. India will get Russian N-Sub by December 12. Progressive Steps Needed to De-legitimise N-Weapons: PM 13. Pakistan’s Nuclear Arsenal Not at Risk, Says Blake 14. Nuclear Experts Killed in Russia Plane Crash Helped Design Iran Facility 15. Chavez's Odd Silence Raises Questions 16. Pentagon Gets Cyberwar Guidelines 17. Senate Bill Echoes House Questions about Obama's Nuclear Strategy 18. No Early-Intercept Defense 19. AFGSC to Renew Conventional Capabilities 20. Nuclear Terrorism Can Cause another Fukushima: Expert 21. S. Korea Does Not Need Nuclear Weapons ― Yet 22. Mind Your Own Nukes Please! 23. All Signs Say Iran Is Racing toward a Nuclear Bomb Welcome to the CPC Outreach Journal. As part of USAF Counterproliferation Center’s mission to counter weapons of mass destruction through education and research, we’re providing our government and civilian community a source for timely counterproliferation information. This information includes articles, papers and other documents addressing issues pertinent to US military response options for dealing with chemical, biological, radiological, and nuclear (CBRN) threats and countermeasures. It’s our hope this information resource will help enhance your counterproliferation issue awareness. Established in 1998, the USAF/CPC provides education and research to present and future leaders of the Air Force, as well as to members of other branches of the armed services and Department of Defense. Our purpose is to help those agencies better prepare to counter the threat from weapons of mass destruction. Please feel free to visit our web site at http://cpc.au.af.mil/ for in-depth information and specific points of contact. The following articles, papers or documents do not necessarily reflect official endorsement of the United States Air Force, Department of Defense, or other US government agencies. Reproduction for private use or commercial gain is subject to original copyright restrictions. All rights are reserved. Issue No. 918, 24 June 2011 The following articles, papers or documents do not necessarily reflect official endorsement of the United States Air Force, Department of Defense, or other US government agencies. Reproduction for private use or commercial gain is subject to original copyright restrictions. All rights are reserved. United States Air Force Counterproliferation Research & Education | Maxwell AFB, Montgomery AL | Phone: 334.953.7538 | Fax: 334.953.7530 Tehran Times – Iran Wednesday, June 22, 2011 Amano Invited to Visit Iran’s Nuclear Sites Tehran Times Political Desk TEHRAN - Atomic Energy Organization of Iran Director Fereydoun Abbasi Davani has said that he has invited IAEA Director General Yukiya Amano to visit Iran’ nuclear facilities. Abbasi Davani made the announcement after a meeting with Amano in Vienna on Tuesday on the sidelines of a five-day Ministerial Conference on Nuclear Safety, which opened on June 20. Abbasi Davani said that he invited Amano “and his colleagues to come to visit anywhere they like in all our nuclear installations,” Reuters reported. He also said that he had held “very good” and “transparent” talks with Amano. According to Reuters, Iran’s nuclear chief said that the two sides pledged to resolve problems through more dialogue in future but did not give any details on what was discussed. “We don’t have a difference of view,” he stated. On January 15 and January 16, 2011, diplomats from Egypt, Cuba, Syria, Algeria, Venezuela, Oman, and the Arab League visited the Natanz enrichment facility and the Arak heavy water reactor in response to Iran’s invitation. Some members of the UN Security Council and the European Union had also been invited but decided not to send representatives. The main bone of contention between Tehran and the West is Iran’s uranium enrichment program. Iran says all its nuclear activities are totally peaceful, and, as an IAEA member and an NPT signatory, it has the legal right to produce nuclear fuel for its research reactors and nuclear power plants. http://www.tehrantimes.com/Index_view.asp?code=242864 (Return to Articles and Documents List) International Business Times Saudi Arabia May Use Economic Clout to Squeeze Iran: Prince June 22, 2011 Saudi Arabia may be forced to use its oil policy and enormous economic clout as a way to foil Iran’s nuclear power program and regional ambitions, according to a report in The Wall Street Journal. Saudi Prince Turki al-Faisal reportedly told a private group of British and American servicemen at an airbase in England that "Iran is very vulnerable in the oil sector, and it is there that more could be done to squeeze the current government," Turki, a former Saudi ambassador to the U.S. and U.K. as well as the former chief of Saudi intelligence, currently holds no official position in Riyadh. Saudi Arabia is greatly concerned by Iran on many levels. Tehran, a Shia Muslim power, is seeking to expand its influence in the Mid-East, putting it face to face against the Saudis, who are ruled by a Sunny Muslim elite. For example, the Iranians have repeatedly condemned the Sunni rulers of Bahrain who have cracked down brutally on protesters (most of whom are part of that nation’s Shia majority); while the Saudis have steadfastly supported and aided the Bahrain royal family. Issue No. 918, 24 June 2011 United States Air Force Counterproliferation Research & Education | Maxwell AFB, Montgomery AL | Phone: 334.953.7538 | Fax: 334.953.7530 According to WSJ, Turki also told that assembly that Tehran’s "meddling and destabilizing efforts in countries with Shiite majorities, such as Iraq and Bahrain, as well as those countries with significant Shiite communities…must come to an end. Saudi Arabia will oppose any and all of Iran's actions in other countries because it is Saudi Arabia's position that Iran has no right to meddle in other nations' internal affairs." The Saudis believe that Iran is supporting the anti-government movements in both Bahrain and Yemen (two of Saudi Arabia’s next door neighbors). The Saudis are also worried about Iranian support of the Hezbollah in Lebanon – Hezbollah is on the verge of taking a majority position in Beirut’s cabinet. Even within OPEC, the Saudis have urged other members to raise output in order to lower global oil prices, while Iran has strongly resisted this decision. Turki reportedly said that the Saudis can easily compensate for lower reduction in oil production by Iran, adding that Tehran’s economy and finances would be paralyzed by falling oil exports. "To put this into perspective, Saudi Arabia has so much [spare] production capacity -- nearly 4 million barrels [per] day -- that we could almost instantly replace all of Iran's oil production," the prince said. Perhaps of greater concern to Riyadh is Iran’s incipient nuclear program (which Tehran claims is being developed only for peaceful purposes). Turki said: "It is in our interest that Iran does not develop a nuclear weapon, for their doing so would compel Saudi Arabia, whose foreign relations are now so fully measured and well assessed, to pursue policies that could lead to untold and possibly dramatic consequences.” The Saudi will also seek to challenge Iranian influence in Iraq (a Shia-majority country). "There are people and groups in Iraq that are, as much as they deny it, completely beholden to Iran, and that is not only unacceptable, but it is bad for the future of an ethnically and religiously diverse country," Turki said. http://www.ibtimes.com/articles/167646/20110622/saudi-arabia-iran-prince-turki-tehran-opec.htm (Return to Articles and Documents List) Space Daily.com Ahmadinejad Insists Iran Not Seeking Nuclear Bomb By Staff Writers Tehran, Agence France-Presse (AFP) June 23, 2011 Hardline President Mahmoud Ahmadinejad insisted Thursday that Iran is not seeking to build an atom bomb but defiantly added that should it decide to do so "no one can do a damn thing." "When we say we do not want to make bomb it means we do not want to," Ahmadinejad was quoted by the state television website as saying. "If we want to make a bomb we are not afraid of anyone and we are not afraid to announce it, no one can do a damn thing," he said during a ceremony inaugurating a sewage treatment plant in southern Tehran. Iranian officials have staunchly denied Western suspicions that Tehran's nuclear enrichment programme is masking a drive for atomic weapons. Parliamentary speaker Ali Larijani last year reiterated the denial by quoting a previous fatwa by supreme leader Ayatollah Ali Khamenei, who has the final say in the Islamic republic's affairs, which said "using weapons of mass destruction, including nuclear (arms) is haram (forbidden)." Issue No. 918, 24 June 2011 United States Air Force Counterproliferation Research & Education | Maxwell AFB, Montgomery AL | Phone: 334.953.7538 | Fax: 334.953.7530 Ahmadinejad's comments come two weeks after the chief of Iranian atomic organisation Fereydoon Abbasi Davani announced plans to triple Tehran's capacity to enrich uranium to 20 percent level in a move Washington deemed "provocative." Despite being targeted by four sets of UN Security Council sanctions over its refusal to suspend uranium enrichment, Iran remains adamant that it will push ahead with its nuclear enrichment programme.
Recommended publications
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Deterrence Theory in the Cyber-Century Lessons from a State-Of-The-Art Literature Review
    Working Paper Research Division EU/Europe Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Annegret Bendiek, Tobias Metzger Deterrence theory in the cyber-century Lessons from a state-of-the-art literature review SWP Working Papers are online publications of SWP’s research divisions which have not been formally reviewed by the Institute. Ludwigkirchplatz 3−4 10719 Berlin Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org Working Paper RD EU/Europe, 2015/ 02, May 2015 [email protected] SWP Berlin Table of Contents List of Figures 1 List of Abbreviations 2 Introduction 3 In theory – Deterrence theory and cyberspace 4 Deterrence-by-retaliation and deterrence-by-denial 6 In practice – Suitability of cyber: lessons and implications 7 Key challenges: Credibility and capability to display and use force 7 How to deter? Deterrence-by-denial and deterrence-by- retaliation 9 Determining the type of defence 9 Adding offence to the equation 10 When and whom to deter? Immediate vs. general deterrence and the challenge of attribution 10 What to deter? Narrow vs. broad deterrence 12 For whom? Central vs. extended deterrence 13 Conclusion and outlook 14 Annex 16 Glossary 16 List of References 17 List of Figures Figure 1: Limits to retaliation in cyberspace .................. 9 Figure 2: A possible model of escalation ....................... 11 Figure 3: EEAS figure on a possible inter-ministry division of labour ................................................................. 15 Figure 4: Risk assessment
    [Show full text]
  • Cyberattack Attribution
    CYBERATTACK ATTRIBUTION A BLUEPRINT FOR PRIVATE SECTOR LEADERSHIP RESEARCH FELLOWS SENIOR RESEARCH FELLOWS Justin Collins Allison Anderson Cameron Evans Stacia Lee Chris Kim Kayley Knopf FACULTY LEAD Selma Sadzak Jessica Beyer Nicholas Steele Julia Summers Alison Wendler This report is a product of the Applied Research Program in the Henry M. Jackson School of International Studies at the University of Washington. The Applied Research Program matches teams of top-achieving Jackson School students with private and public sector organizations seeking dynamic, impactful, and internationally-minded analyses to support their strategic and operational objectives. For more information about the Applied Research Program please contact us at [email protected]. Executive Summary After three decades of development, adoption, and innovation, the Internet stands at the core of modern society. The same network that connects family and friends across the world similarly ties together all aspects of daily life, from the functioning of the global economy to the operation of governments. The digitization of daily life is the defining feature of the 21st century. While the pervasiveness of Internet-enabled technology brings significant benefits, it also brings serious threats—not only to our economy and safety, but also to our trust in computer systems.1 The Internet is central to modern life, yet major state-sponsored cyberattacks persist in disrupting Internet access and function. These attacks undermine faith in government and public trust in democratic institutions. Attribution attempts to date have been unable to deter states from building malicious code for even greater destructive capabilities. In response, we propose the formation of an attribution organization based on international private sector coordination.
    [Show full text]
  • The Resiliency Compass: Navigating Global Value Chain Disruption in an Age of Uncertainty
    In Collaboration with Kearney The Resiliency Compass: Navigating Global Value Chain Disruption in an Age of Uncertainty WHITE PAPER JULY 2021 Images: Getty Images, Unsplash Contents Foreword 3 Executive summary 4 1 Disruption drives a rethink 5 2 Resilience in action 8 2.1 Getting to grips with disruption 8 2.2 Introducing the resiliency compass 8 2.3 Who are the resilience leaders? 10 3 Setting the right course with the resiliency compass 11 4 Call for action: global coordination for the long term 14 Methodology 15 Contributors 16 Acknowledgements 17 Endnotes 19 © 2021 World Economic Forum. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, including photocopying and recording, or by any information storage and retrieval system. The Resiliency Compass: Navigating Global Value Chain Disruption in an Age of Uncertainty 2 July 2021 The Resiliency Compass: Navigating Global Value Chain Disruption in an Age of Uncertainty Foreword Unlocking the future of cooperation, resilience and prosperity for global value chains. Francisco Betti Per Kristian Hong Head of Shaping the Future of Managing Director and Advanced Manufacturing and Partner, Strategic Operations Production, Member of the and World Economic Forum Executive Committee, World Relationship Lead, Kearney Economic Forum COVID-19 has kept manufacturing companies systems if both the global economy and companies beyond busy for many months and the challenges are to successfully navigate future disruptions that are far from over, from ensuring safety and may affect global value chains. security on the shop floor and facing supply and demand disruptions to accelerating digital In 2020, the World Economic Forum, in transformation and reskilling to build resilience.
    [Show full text]
  • International Security in Cyberspace: New Models for Reducing Risk Write a Description
    Arms Control and International Security Papers Volume I I Number 20 October 20, 2020 International Security in Cyberspace: New Models for Reducing Risk by Christopher A. Ford The Arms Control and International Security Papers are produced by the Office of the Under Secretary of State for Arms Control and International Security in order to make U.S. State Department policy analysis available in an electronically-accessible format compatible with "social distancing" during the COVID-19 crisis. Arms Control and International Security Papers Volume I, Number 20 I October 20, 2020 International Security in Cyberspace: New Models for Reducing Risk International Security in Cyberspace: New Models for Reducing Risk by Christopher A. Ford1 In this ACIS Paper, Assistant Secretary Ford recounts the evolution of U.S. cyberspace security diplomacy over the last several years, describing the difficulty of making traditional "arms control" concepts work in this novel domain, but emphasizing the valuable contributions nonetheless already being made through the articulation of voluntary, nonbinding norms of responsible state behavior and a shift to a more explicitly deterrence-focused cyberspace security policy. In this ever more Internet-connected age, it is no challenge of enormous magnitude, and one to which surprise that cyber threats continue to increase. The the non-authoritarian world is still only in the early more indispensable such connectivity is for commerce, stages of mounting effective responses. communications, and innumerable aspects of daily life, the more that malicious actors see opportunities to Success in meeting these challenges requires a steal (or hold hostage) the information lifeblood of our whole-of-government response, and such a broad contemporary economy, or otherwise to profit response is indeed underway pursuant to the broad malevolently from modern dependencies.
    [Show full text]
  • The Ethics of Cyberwarfare Randall R
    This article was downloaded by: [University of Pennsylvania] On: 28 February 2013, At: 08:22 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Journal of Military Ethics Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/smil20 The Ethics of Cyberwarfare Randall R. Dipert a a SUNY (State University of New York) at Buffalo, NY, USA Version of record first published: 16 Dec 2010. To cite this article: Randall R. Dipert (2010): The Ethics of Cyberwarfare, Journal of Military Ethics, 9:4, 384-410 To link to this article: http://dx.doi.org/10.1080/15027570.2010.536404 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/terms-and- conditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae, and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. Journal of Military Ethics, Vol. 9, No. 4, 384Á410, 2010 The Ethics of Cyberwarfare RANDALL R.
    [Show full text]
  • Cyberattack and the Use of Force in International Law
    Beijing Law Review, 2021, 12, 631-649 https://www.scirp.org/journal/blr ISSN Online: 2159-4635 ISSN Print: 2159-4627 Cyberattack and the Use of Force in International Law Joseph N. Madubuike-Ekwe Department of Public Law, Faculty of Law, Benson Idahosa University, Benin City, Nigeria How to cite this paper: Madubuike-Ekwe, Abstract J. N. (2021). Cyberattack and the Use of Force in International Law. Beijing Law This article examines how the existing law of armed conflict may be applied Review, 12, 631-649. or adapted to meet the challenges posed by cyber-attacks. It begins with a de- https://doi.org/10.4236/blr.2021.122034 finition of cyber-attacks, cyberexploitation and cyberespionage and their dif- Received: September 11, 2020 ferences. The article discusses how cyber-attacks are regulated by the existing Accepted: June 19, 2021 body of laws such as the United Nations Charter, International humanitarian Published: June 22, 2021 Law (IHL), international treaties and domestic laws. It notes that the existing law addresses only a small fraction of potential cyber-attacks. IHL, for exam- Copyright © 2021 by author(s) and Scientific Research Publishing Inc. ple, provides a useful framework for a very small number of cyber-attack that This work is licensed under the Creative amounts to an armed attack or that take place within the context of armed Commons Attribution International conflict. The article concludes that, since cyber-attacks are global in nature, License (CC BY 4.0). there is need for a new international legal framework to more effectively deal http://creativecommons.org/licenses/by/4.0/ with the challenges posed by cyber-attacks.
    [Show full text]
  • Safeguarding Against Cyberattack in an Increasingly Digital World
    Safeguarding against cyberattack in an increasingly digital world As part of its strategic partnership with Viva Technology, McKinsey & Company is publishing a series of articles looking at seven areas of technology that are potentially the most disruptive: Quantum computing, Cybersecurity, Connectivity & 5G, Cloud computing, AI, Digital ID, and Biotechnologies; as well as two major shifts for society: Future of work and Digital ecosystems. June 2020 Safeguarding against cyberattack in an increasingly digital world The threat of cyberattack is universal. Factors such as digitization, greater use of online services and a rapid rise in working from home have all increased cyber risk. But there are things businesses can do to safeguard their organizations. By Jim Boehm, James Kaplan, and Wolf Richter All industries face the threat of cyberattack. According to a prior McKinsey survey, 75 percent of experts, across many industries, consider cyberrisk to be a top concern.1 Until recently, financial firms were the primary targets. Risks for banks arise from diverse factors including vulnerabilities to fraud and financial crime inherent in automation and digitization; massive growth in transaction volumes; and greater integration of financial systems within countries and internationally. Today, due to digitization and automation, the threat is universal. Added to this, the recent COVID-19 pandemic has intensified the danger of cyberattack, across all industries. Changes in working conditions have made it harder for companies to maintain security. Large-scale adoption of work-from-home technologies, heightened activity on customer-facing networks, and greater use of online services all present fresh openings, which cyber attackers have been quick to exploit.
    [Show full text]
  • Applying Traditional Jurisdictional Frameworks to a Modern Threat
    PROSECUTING CYBERTERRORISTS: APPLYING TRADITIONAL JURISDICTIONAL FRAMEWORKS TO A MODERN THREAT Paul N. Stockton* & Michele Golabek-Goldman** The United States faces a growing risk of cyberterrorism against its finan- cial system, electric power grid, and other critical infrastructure sectors. Senior U.S. policymakers note that building U.S. capacity to prosecute cyberterrorists could play a key role in deterring and disrupting such attacks. To facilitate pros- ecution, the federal government is bolstering its technical expertise to attribute attacks to those who perpetrate them, even when, as is increasingly the case, the perpetrators exploit computers in dozens of nations to strike U.S. infrastructure. Relatively little attention has been paid, however, to another prerequisite for prosecuting cyberterrorists: that of building a legal framework that can bring those who attack from abroad to justice. The best approach to prosecuting cyberterrorists striking from abroad is to add extraterritorial application to current domestic criminal laws bearing on cyberattack. Yet, scholars have barely begun to explore how the United States can best justify such extraterritorial extension under international law and assert a legitimate claim of prescriptive jurisdiction when a terrorist hijacks thousands of computers across the globe. Still less attention has been paid to the question of how to resolve the conflicting claims of national jurisdiction that such attacks would likely engender. This Article argues that the protective principle—which predicates prescrip- tive jurisdiction on whether a nation suffered a fundamental security threat— should govern cyberterrorist prosecutions. To support this argument, the Article examines the full range of principles on which States could claim prescriptive ju- risdiction and assesses their strengths and weaknesses for extending extraterrito- rial application of U.S.
    [Show full text]
  • NIAC Water Sector Resilience Final Report and Recommendations Ii TABLE of CONTENTS
    ABOUT THE NIAC The National Infrastructure Advisory Council (NIAC) provides the President of the United States with advice on the security and resilience of the critical infrastructure sectors and their functional systems, physical assets, and cyber networks. These critical infrastructure sectors span the U.S. economy and include the Water; Chemical; Commercial Facilities; Communications; Critical Manufacturing; Dams; Defense Industrial Base; Emergency Services; Energy; Financial Services; Food and Agriculture; Government Facilities; Healthcare and Public Health; Information Technology; Nuclear Reactors, Materials, and Waste; and Transportation Systems Sectors. The NIAC also advises the lead Federal agencies that have critical infrastructure responsibilities. Specifically, the Council has been charged with making recommendations to: • Enhance the partnership of the public and private sectors in securing and enhancing the security and resilience of critical infrastructure and their functional systems, physical assets, and cyber networks, and provide reports on this issue to the President through the Secretary of Homeland Security, as appropriate. • Propose and develop ways to encourage private industry to perform periodic risk assessments and implement risk-reduction programs. • Monitor the development and operations of critical infrastructure sector coordinating councils and their information-sharing mechanisms, and provide recommendations to the President through the Secretary of Homeland Security on how these organizations can best foster improved cooperation among the sectors, the U.S. Department of Homeland Security, and other Federal Government entities. • Report to the President through the Secretary of Homeland Security, who shall ensure appropriate coordination with the Assistant to the President for Homeland Security and Counterterrorism, the Assistant to the President for Economic Policy, and the Assistant to the President for National Security Affairs.
    [Show full text]
  • Playing War Games to Prepare for a Cyberattack
    8 Feature article Kate Miller Playing war games to prepare for a cyberattack A poor response can be far more damaging than the attack itself. Tucker Bailey, “Can it happen to us?” All over the world, tech­ attackers seek to cover their tracks. Organized­ James Kaplan, and nology executives have been fielding this question crime rings engaging in cyberfraud have no Allen Weinberg from boards of directors and CEOs in the wake interest in letting their targets know they have of highly publicized cyberattacks on large, been infiltrated. well­respected companies and public institutions. We believe that boards and senior business “Yes” is the only honest answer at a time when leaders should be asking the technology team ever more value is migrating online, when a different question—namely, “Are we ready business strategies require more open and to respond to a cyberattack?” interconnected technology environments, when attackers have always­expanding capa­ An ill­thought­out response can be far more bilities, and when attacks take advantage of damaging than the attack itself. Whether limited security awareness among employees customers cancel their accounts in the wake and customers. In fact, it may already have of a successful cyberattack depends as much happened to you—but you may not know it. on the quality of a company’s communications as on the gravity of the breach. How much Although political “hacktivists” such as Anony­ value is destroyed by the loss of sensitive mous and LulzSec certainly delight in announc­ business plans depends on the ability to adjust ing their exploits to the world and causing embar­ tactics quickly.
    [Show full text]