Cybersecurity: Next Steps to Protect Our Critical Infrastructure

Total Page:16

File Type:pdf, Size:1020Kb

Cybersecurity: Next Steps to Protect Our Critical Infrastructure S. HRG. 111–667 CYBERSECURITY: NEXT STEPS TO PROTECT OUR CRITICAL INFRASTRUCTURE HEARING BEFORE THE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED STATES SENATE ONE HUNDRED ELEVENTH CONGRESS SECOND SESSION FEBRUARY 23, 2010 Printed for the use of the Committee on Commerce, Science, and Transportation ( U.S. GOVERNMENT PRINTING OFFICE 57–888 PDF WASHINGTON : 2010 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Nov 24 2008 14:15 Nov 04, 2010 Jkt 057888 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 S:\WPSHR\GPO\DOCS\57888.TXT SCOM1 PsN: JACKIE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION ONE HUNDRED ELEVENTH CONGRESS SECOND SESSION JOHN D. ROCKEFELLER IV, West Virginia, Chairman DANIEL K. INOUYE, Hawaii KAY BAILEY HUTCHISON, Texas, Ranking JOHN F. KERRY, Massachusetts OLYMPIA J. SNOWE, Maine BYRON L. DORGAN, North Dakota JOHN ENSIGN, Nevada BARBARA BOXER, California JIM DEMINT, South Carolina BILL NELSON, Florida JOHN THUNE, South Dakota MARIA CANTWELL, Washington ROGER F. WICKER, Mississippi FRANK R. LAUTENBERG, New Jersey GEORGE S. LEMIEUX, Florida MARK PRYOR, Arkansas JOHNNY ISAKSON, Georgia CLAIRE MCCASKILL, Missouri DAVID VITTER, Louisiana AMY KLOBUCHAR, Minnesota SAM BROWNBACK, Kansas TOM UDALL, New Mexico MIKE JOHANNS, Nebraska MARK WARNER, Virginia MARK BEGICH, Alaska ELLEN L. DONESKI, Staff Director JAMES REID, Deputy Staff Director BRUCE H. ANDREWS, General Counsel ANN BEGEMAN, Acting Republican Staff Director BRIAN M. HENDRICKS, Republican General Counsel NICK ROSSI, Republican Chief Counsel (II) VerDate Nov 24 2008 14:15 Nov 04, 2010 Jkt 057888 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 S:\WPSHR\GPO\DOCS\57888.TXT SCOM1 PsN: JACKIE C O N T E N T S Page Hearing held on February 23, 2010 ....................................................................... 1 Statement of Senator Rockefeller ........................................................................... 1 Statement of Senator Snowe ................................................................................... 3 Prepared statement .......................................................................................... 5 Statement of Senator Ensign .................................................................................. 36 Statement of Senator Pryor .................................................................................... 38 Statement of Senator Begich .................................................................................. 41 Statement of Senator Klobuchar ............................................................................ 43 Statement of Senator Thune ................................................................................... 47 WITNESSES Vice Admiral Michael McConnell, USN (Retired), Executive Vice President, National Security Business, Booz Allen Hamilton ............................................ 7 Prepared statement .......................................................................................... 10 James A. Lewis, Director and Senior Fellow, Technology and Public Policy Program, Center for Strategic and International Studies ................................ 12 Prepared statement .......................................................................................... 14 Scott Borg, Director and Chief Economist, U.S. Cyber Consequences Unit ....... 17 Prepared statement .......................................................................................... 19 Mary Ann Davidson, Chief Security Officer, Oracle Corporation ........................ 21 Prepared statement .......................................................................................... 23 James Arden ‘‘Jamie’’ Barnett, Jr., Rear Admiral, USN (Retired), Chief, Pub- lic Safety and Homeland Security Bureau, FCC ............................................... 27 Prepared statement .......................................................................................... 29 APPENDIX Hon. Tom Udall, U.S. Senator from New Mexico, prepared statement .............. 55 Written questions submitted by Vice Admiral Michael McConnell to: Hon. John D. Rockefeller IV ............................................................................ 55 Hon. Tom Udall ................................................................................................ 55 Response to written questions submitted by Dr. James A. Lewis to: Hon. John D. Rockefeller IV ............................................................................ 56 Hon. Tom Udall ................................................................................................ 57 Hon. John Ensign ............................................................................................. 57 Response to written questions submitted by Hon. John D. Rockefeller IV to Scott Borg ......................................................................................................... 58 Response to written questions submitted by Mary Ann Davidson to: Hon. John D. Rockefeller IV ............................................................................ 60 Hon. Tom Udall ................................................................................................ 62 Hon. John Ensign ............................................................................................. 72 Response to written questions submitted by Rear Admiral James Barnett, Jr. to: Hon. John D. Rockefeller IV ............................................................................ 75 Hon. John Ensign ............................................................................................. 77 (III) VerDate Nov 24 2008 14:15 Nov 04, 2010 Jkt 057888 PO 00000 Frm 00003 Fmt 5904 Sfmt 5904 S:\WPSHR\GPO\DOCS\57888.TXT SCOM1 PsN: JACKIE VerDate Nov 24 2008 14:15 Nov 04, 2010 Jkt 057888 PO 00000 Frm 00004 Fmt 5904 Sfmt 5904 S:\WPSHR\GPO\DOCS\57888.TXT SCOM1 PsN: JACKIE CYBERSECURITY: NEXT STEPS TO PROTECT OUR CRITICAL INFRASTRUCTURE TUESDAY, FEBRUARY 23, 2010 U.S. SENATE, COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION, Washington, DC. The Committee met, pursuant to notice, at 2:40 p.m. in room SR–253, Russell Senate Office Building, Hon. John D. Rockefeller IV, Chairman of the Committee, presiding. OPENING STATEMENT OF HON. JOHN D. ROCKEFELLER IV, U.S. SENATOR FROM WEST VIRGINIA The CHAIRMAN. Welcome, all. And this hearing will come to order. And members will be coming in. Before I give my opening statement, I just want to make sure that everybody knows who is testifying. And Vice Admiral Michael McConnell, U.S. Navy, Retired, Executive Vice President of Na- tional Security Business, Booz Allen Hamilton. He and I have done a lot of work together, including on FISA, other matters. Dr. James Lewis, Director and Senior Fellow, Technology and Public Policy Program Center for Strategic and International Studies. And Dr. Lewis is there, working on his computer, I think. Mr. Scott Borg, Director and Chief Economist, U.S. Cyber Consequences Unit. And Rear Admiral James Arden Barnett, Jr., Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission. I’m really glad about that. And Ms. Mary Ann Davidson, Chief Se- curity Officer, Oracle Corporation. So, you’re going to have some at- tention focused on you today. This Nation—is it OK if I proceed? OK. This Nation and its citi- zens depend enormously on communication technologies in so in- credibly many ways every single day. Vast network expansions have transformed virtually every aspect of our lives: education, healthcare, how businesses grow, don’t grow, function, and the de- velopment of an interconnected, more democratic conversation. Our government, our economy, our very lives rely on technology that connects millions of people around the world in real time and all the time. And yet, these powerful networks also carry great risks which people, for the most part, don’t understand—understandably don’t understand—but are going to have to come to understand. In recent years, hackers have attacked numerous Federal agen- cies, key media outlets, large companies across the private sector, targeting intellectual property, stealing valuable information vital to our national and economic security. (1) VerDate Nov 24 2008 14:15 Nov 04, 2010 Jkt 057888 PO 00000 Frm 00005 Fmt 6633 Sfmt 6633 S:\WPSHR\GPO\DOCS\57888.TXT SCOM1 PsN: JACKIE 2 What was it? An article I read in the paper, somebody from DOD says, ‘‘We’re getting attacked every day, all day, 7 days a week.’’ And that’s what they do. And these attacks are coming with in- creasing regularity and increasing sophistication. A major cyber at- tack could shut down our Nation’s most critical infrastructure: our power grid, telecommunications, financial services; you just think of it, and they can do it—the basic foundations on which our com- munities and families have been built, in terms of all of their lives and who are trying to have a future. So, this hearing is a next step in examining the important action we should be taking right now, as a government and as a national economy, to harden our defenses and safeguard critical infrastruc- ture against a major cyber attack. Having said that they’re hap- pening all the time, that would seem to be out of order, but, you know, it needs—both need to be said. Now, I understand it’s no secret that cybersecurity is one of my top securities;
Recommended publications
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Download Thesis
    This electronic thesis or dissertation has been downloaded from the King’s Research Portal at https://kclpure.kcl.ac.uk/portal/ Cyber security and the politics of time Stevens, Timothy Charles Awarding institution: King's College London The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without proper acknowledgement. END USER LICENCE AGREEMENT Unless another licence is stated on the immediately following page this work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International licence. https://creativecommons.org/licenses/by-nc-nd/4.0/ You are free to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work). Non Commercial: You may not use this work for commercial purposes. No Derivative Works - You may not alter, transform, or build upon this work. Any of these conditions can be waived if you receive permission from the author. Your fair dealings and other rights are in no way affected by the above. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 25. Sep. 2021 1 ] Cyber Security and the Politics of Time Timothy Charles Stevens Thesis submitted in accordance with the requirements for the degree of Doctor of Philosophy King’s College London Department of War Studies November 2013 2 Abstract Time is an under-represented topic in security studies and International Relations (IR).
    [Show full text]
  • Beyond Cyber Doom
    No. 11-01 January 2011 WORKING PAPER BEYOND CYBER-DOOM: Cyberattack Scenarios and the Evidence of History By Sean Lawson The ideas presented in this research are the author’s and do not represent official positions of the Mercatus Center at George Mason University. 1 Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History Sean Lawson, Ph.D. Department of Communication University of Utah “[T]hese war games are about the real effects of a cyberwar . about causing chaos in our streets at home due to sudden crashes in our critical infrastructure through manipulation of our banking, transportation, utilities, communications, and other critical infrastructure industries. These are all real scenarios.” (Patterson, 2010b) “In seeking a prudent policy, the difficulty for decision-makers is to navigate the rocky shoals between hysterical doomsday scenarios and uninformed complacency.” (Cavelty, 2007: 144) Introduction Recently, news media and policy makers in the United States have turned their attention to prospective threats to and through an ethereal and ubiquitous technological domain referred to as “cyberspace.” “Cybersecurity” threats include attacks on critical infrastructures like power, water, transportation, and communication systems launched via cyberspace, but also terrorist use of the Internet, mobile phones, and other information and communication technologies (ICTs) for fundraising, recruiting, organizing, and carrying out attacks (Deibert & Rohozinski, 2010). Frustration over a perceived lack of public and policy maker attention to these threats, combined with a belief that “exaggeration” and “appeals to emotions like fear can be more compelling than a rational discussion of strategy” (Lewis, 2010: 4), a number of cybersecurity proponents have deployed what one scholar has called “cyber-doom scenarios” (Cavelty, 2007: 2).
    [Show full text]
  • Cyber Threats to National Security
    DEALING WITH TODAY’S ASYMMETRIC THREAT Cyber Threats to National Security S YMPOSIUM F IVE Keeping the Nation’s Industrial Base Safe From Cyber Threats The Asymmetric Threat website (asymmetricthreat.net) includes downloadable reports from all symposia in both series and serves as a knowledge network to advance the dialogue on national and global security, presenting resources and original research, and providing a forum for review and discussion of pertinent themes and events. S ERIES O NE S ERIES T WO UNCLASSIFIED Cyber Threats to National Security Symposium Five: Keeping the Nation’s Industrial Base Safe From Cyber Threats This document is intended only as a summary of the personal remarks made by participants at the March 1, 2011 symposium, “Keeping the Nation’s Industrial Base Safe From Cyber Threats,” held at the Carnegie Institution for Science, Washington, D.C., and co-sponsored by CACI International Inc (CACI), the U.S. Naval Institute (USNI), and the Center for Security Policy (CSP). It is published as a public service. It does not necessarily reflect the views of CACI, USNI, CSP, the U.S. government, or their officers and employees. The pro bono Asymmetric Threat symposia series was started in 2008 to contribute to the national discourse on the topic of asymmetric threats facing the United States. CACI and the National Defense University sponsored Symposium One in the series, and CACI and USNI sponsored Symposia Two and Three. With Symposium Four, also sponsored by CACI and USNI, a new Asymmetric Threat series was initiated focusing on Cyber Threats. With new sponsor CSP,“Keeping the Nation’s Industrial Base Safe From Cyber Threats” is the fifth symposium in the Asymmetric Threat series and the second in the Cyber Threat series.
    [Show full text]
  • Cyber Security—2010 Hearings Committee On
    S. Hrg. 111–1103 CYBER SECURITY—2010 HEARINGS BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ONE HUNDRED ELEVENTH CONGRESS SECOND SESSION JUNE 15, 2010 PROTECTING CYBERSPACE AS A NATIONAL ASSET: COMPREHENSIVE LEGISLATION FOR THE 21ST CENTURY NOVEMBER 17, 2010 SECURING CRITICAL INFRASTRUCTURE IN THE AGE OF STUXNET Available via the World Wide Web: http://www.fdsys.gov/ Printed for the use of the Committee on Homeland Security and Governmental Affairs ( U.S. GOVERNMENT PRINTING OFFICE 58–034 PDF WASHINGTON : 2011 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Nov 24 2008 14:00 Nov 14, 2011 Jkt 058034 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 P:\DOCS\58034.TXT SAFFAIRS PsN: PAT COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS JOSEPH I. LIEBERMAN, Connecticut, Chairman CARL LEVIN, Michigan SUSAN M. COLLINS, Maine DANIEL K. AKAKA, Hawaii TOM COBURN, Oklahoma THOMAS R. CARPER, Delaware SCOTT P. BROWN, Massachusetts MARK L. PRYOR, Arkansas JOHN MCCAIN, Arizona MARY L. LANDRIEU, Louisiana GEORGE V. VOINOVICH, Ohio CLAIRE MCCASKILL, Missouri JOHN ENSIGN, Nevada JON TESTER, Montana LINDSEY GRAHAM, South Carolina ROLAND W. BURRIS, Illinois EDWARD E. KAUFMAN, Delaware * CHRISTOPHER A. COONS, Delaware * MICHAEL L. ALEXANDER, Staff Director DEBORAH P. PARKINSON, Senior Professional Staff Member ADAM R, SEDGEWICK, Professional Staff Member BRANDON L. MILHORN, Minority Staff Director and Chief Counsel ROBERT L. STRAYER, Minority Director of Homeland Security Affairs DEVIN F.
    [Show full text]
  • Simulated Crisis Shows Potential Gaps in U.S. Cyber Defenses 18 February 2010, by Bob Drogin
    Simulated crisis shows potential gaps in U.S. cyber defenses 18 February 2010, By Bob Drogin The crisis began when college basketball fans Katrina struck in 2005. "The biggest danger," he downloaded a free March Madness application to declared, "is if we're ineffective." their smart phones. The app hid spyware that stole passwords, intercepted e-mails and created havoc. Panelists brought verisimilitude to their roles. Stewart Baker, former general counsel of the Soon 60 million cell phones were dead. The National Security Agency, said he would urge the Internet crashed and commerce collapsed. White White House to shut down cell phone networks House aides discussed declaring martial law. even if no law specifically allows it. That formed some of the doomsday scenario when "We will be criticized if we don't do everything we 10 former White House advisers and other top can," Baker said. "We can straighten out the (legal) officials met Tuesday in a rare public cyber war- authorities over time." game designed to highlight the potential vulnerability of the nation's digital infrastructure to Francis Fragos Townsend, who served as attack. counterterrorism adviser in the Bush White House, called for rationing of gasoline and other supplies if The results were hardly reassuring. necessary. "We're in uncharted territory here," was the most John Negroponte, who spent most of his career as common refrain during a three-hour simulated a diplomat before becoming the first director of crisis meeting of the National Security Council, the national intelligence, urged a diplomatic approach. crux of the Cyber Shockwave exercise.
    [Show full text]
  • The Cyber-Doom Effect: the Impact of Fear Appeals in the US Cyber Security Debate
    2016 8th International Conference on Cyber Conflict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profit or non-commercial Cyber Power purposes is granted providing that copies bear this notice and a full citation on the N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. 2016 © NATO CCD COE Publications, Tallinn The Cyber-Doom Effect: The Impact of Fear Appeals in the US Cyber Security Debate Sean T. Lawson Haoran Yu Department of Communication Department of Communication University of Utah University of Utah Salt Lake City, Utah, USA Salt Lake City, Utah, USA [email protected] Sara K. Yeo Ethan Greene Department of Communication Department of Communication University of Utah University of Utah Salt Lake City, Utah, USA Salt Lake City, Utah, USA [email protected] Abstract: In the US cyber security debate, observers have noted there is a tendency for policymakers, military leaders, and media, among others, to use frightening ‘cyber-doom scenarios’ when making the case for action on cyber security (Dunn Cavelty, 2008, p. 2). Some have conjectured that these fictional cyber-doom scenarios, which exemplify ‘fear appeals’ in communication research, have the potential to undermine productive debate aimed at addressing genuine cyber security challenges (Valeriano and Ryan, 2015, pp. 7, 196). Yet, few have directly investigated the impacts of such rhetoric. Here, we assess the impact of cyber-doom scenarios by contextualising them within existing scholarship on the impact of fear appeals, a well-studied phenomenon in communication science.
    [Show full text]
  • Cyber-Attacks and the Exploitable Imperfections of International Law
    Cyber-Attacks and the Exploitable Imperfections of International Law Cyber-Attacks and the Exploitable Imperfections of International Law By Yaroslav Radziwill LEIDEN | BOSTON Library of Congress Cataloging-in-Publication Data Radziwill, Yaroslav, author. Cyber-attacks and the exploitable imperfection of international law / by Yaroslav Radziwill. pages cm Based on author’s thesis (doctoral — University of Warwick, 2014) issued under title: Cyber-attacks and international law : imperfections of a stagnant legal regime. Includes bibliographical references and index. ISBN 978-90-04-29833-0 (hardback : alk. paper) — ISBN 978-90-04-29830-9 (e-book) 1. Information warfare (International law) 2. Cyberspace operations (Military science) I. Title. KZ6718.R33 2015 341.6’3—dc23 2015023019 This publication has been typeset in the multilingual “Brill” typeface. With over 5,100 characters covering Latin, ipa, Greek, and Cyrillic, this typeface is especially suitable for use in the humanities. For more information, please see brill.com/brill-typeface. isbn 978-90-04-29833-0 (hardback) isbn 978-90-04-29830-9 (e-book) Copyright 2015 by Koninklijke Brill nv, Leiden, The Netherlands. Koninklijke Brill NV incorporates the imprints Brill, Brill Hes & De Graaf, Brill Nijhoff, Brill Rodopi and Hotei Publishing. All rights reserved. No part of this publication may be reproduced, translated, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission from the publisher. Authorization to photocopy items for internal or personal use is granted by Koninklijke Brill nv provided that the appropriate fees are paid directly to The Copyright Clearance Center, 222 Rosewood Drive, Suite 910, Danvers, ma 01923, usa.
    [Show full text]
  • The Decision to Attack: Military and Intelligence
    THE DECISION TO ATTACK: MILITARY AND INTELLIGENCE CYBER DECISION-MAKING by AARON FRANKLIN BRANTLY (Under the Direction of Loch K. Johnson) ABSTRACT The debate over the importance of cyber has resulted in the consideration of a new domain of operation vital to national security. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. Much of the literature on cyber has focused on defining what cyber is. This dissertation examines how states decide to employ cyber in military and intelligence operations against other states. The research question this work seeks to answer is: do states rationally decide to employ cyber in military and intelligence operations against other states? This work contextualizes broader cyber decision-making processes into a systematic expected utility - rational choice approach to provide a mathematical understanding behind the use of cyber weapons at the state level. INDEX WORDS: Cyber, Intelligence, National Security, Decision-Making THE DECISION TO ATTACK: MILITARY AND INTELLIGENCE CYBER DECISION-MAKING by AARON FRANKLIN BRANTLY B.A., Queens University of Charlotte, 2004 M.P.P., The American University, 2008 A Dissertation Submitted to the Graduate Faculty of the University of Georgia in Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY ATHENS, GEORGIA 2012 © 2012 AARON FRANKLIN BRANTLY All Rights Reserved THE DECISION TO ATTACK: MILITARY AND INTELLIGENCE CYBER DECISION-MAKING by AARON FRANKLIN BRANTLY Major Professor: Loch K. Johnson Committee: Jeffrey Berejikian Han S. Park Michael Warner Christopher Bronk Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia December 2012 iv DEDICATION I dedicate this work to my wife and best friend Nataliya.
    [Show full text]
  • Crisis and Escalation in Cyberspace
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Project AIR FORCE View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Crisis and Escalation in Cyberspace Martin C. Libicki Prepared for the United States Air Force Approved for public release; distribution unlimited PROJECT AIR FORCE The research described in this report was sponsored by the United States Air Force under Contract FA7014-06-C-0001.
    [Show full text]
  • Cyber Meltdown
    ® Copyrighted material Cyber Meltdown.indd 1 4/19/11 4:04 PM Except where noted, Scripture quotations are from The Holy Bible, English Standard Version, copy- right © 2001 by Crossway Bibles, a division of Good News Publishers. Used by permission. All rights reserved. Verses marked nasb are taken from the New American Standard Bible®, © 1960, 1962, 1963, 1968, 1971, 1972, 1973, 1975, 1977, 1995 by The Lockman Foundation. Used by permission. (www.Lock man.org) Verses marked niv are taken from the Holy Bible, New International Version®, NIV®. Copyright © 1973, 1978, 1984, 2011 by Biblica, Inc.™ Used by permission of Zondervan. All rights reserved worldwide. Cover by Dugan Design Group, Bloomington, Minnesota Cover photos © Argus, Alx / Fotolia CYBER MELTDOWN Copyright © 2011 by Ron Rhodes Published by Harvest House Publishers Eugene, Oregon 97402 www.harvesthousepublishers.com Library of Congress Cataloging-in-Publication Data Rhodes, Ron. Cyber meltdown / Ron Rhodes. p. cm. Includes bibliographical references. ISBN 978-0-7369-4417-5 (pbk.) ISBN 987-0-7369-4423-6 (eBook) 1. Bible—Prophecies—Cyberterrorism. 2. Cyberterrorism—Biblical teaching. 3. Bible— Prophecies—End of the world. 4. End of the world—Biblical teaching. I. Title. BS649.C83R46 2011 236'.9—dc22 2010052597 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, mechanical, digital, photocopy, recording, or any other—except for brief quotations in printed reviews, without the prior permission of the publisher. Printed in the United States of America 11 12 13 14 15 16 17 18 19 / LB-SK / 10 9 8 7 6 5 4 3 2 1 Copyrighted material Cyber Meltdown.indd 2 4/19/11 4:04 PM CONTENTS Introduction: Technologies That Amaze ...................
    [Show full text]
  • Can Lessons from the Nuclear Experience Provide Answers in Cyberspace?
    CYBER WEAPONS AND NUCLEAR OPTIONS: CAN LESSONS FROM THE NUCLEAR EXPERIENCE PROVIDE ANSWERS IN CYBERSPACE? GEORGETOWN UNIVERSITY A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF HONORS IN SCIENCE, TECHNOLOGY, & INTERNATIONAL AFFAIRS, EDMUND A. WALSH SCHOOL OF FOREIGN SERVICE, GEORGETOWN UNIVERSITY, SPRING 2013. JAYANT GANDHI – CLASS OF 2013 THESIS ADVISOR: PROFESSOR MATTHEW KROENIG 1 2 ABSTRACT Cyber security is one of the latest hot button issues to affect the national security of states across the world. The new technology has yet to be readily placed in any established military doctrine, but there has been a clear preference of how strategists and policy makers desire to treat cyber weapons. Nuclear weapons, and more specifically nuclear deterrence, represent one of the greatest policy issues of the 20 th century with regards to international security. The success of deterrence in preventing not only the use of nuclear weapons, but also the outbreak of war between the major nuclear powers is seen as a major triumph. Modern policy makers look at this success and seek to emulate it in the cyber realm. This has caused the necessary comparison of cyber weapons to nuclear weapons to be made over and over. Arguments have been made on both sides as to whether or not cyber deterrence is possible, but little time has been spent looking at the basis of this discussion: are cyber and nuclear technologies comparable? This paper goes through the early histories of each technology and explores their technical characteristics in order to fully understand the foundations of this analogy.
    [Show full text]