IAC-Council-Cyber

ASIPSS                   
Center For
NonProliferation

Home
Nuclear
Biological
Chemical
Missile
Conventional
SALW
Cyber
Space
Resources

Cyber Warfare


Given the obscure nature of cyber activities it is difficult to ascertain the true scope of cybercrime and cybersecurity in an ever globalized world. What is becoming clear is the vulnerabilities groups, organizations, and key state infrastructures face from hacker groups. Governments are realizing that this new digital arena will become an increasingly likely place where more and more crimes of sabotage will take place from other states. Hackers have a wide variety of targets and for a wide array of different purposes. Groups who hack individuals for the purposes of identity theft, obtaining banking and financial information or recent more notorious crimes such as the Equifax breach where the information of millions of people were breached. The FBI and the Department of Justice are investigating whether hacker groups funded by the Russian government were the ones responsible for hacking the Democratic National Convention and releasing thousands of emails in order to diminish the chances that Hillary Clinton would win the election in order to help her opponent.

 

This new battleground is still considered a gray area by the US government and they have not tackled in a serious legislative way. This is partly because the US government is not yet sure on how far they want to employ these strategies themselves and want to test its limits, its strength and weaknesses, and its legality. The real threat from cyber in the coming years will stem from the dangers of hackers attacking key infrastructure such as power and electrical systems. These issues will require serious effort and a high allocation of resources to tackle in this ever connected world. 

Counter Proliferation Efforts



Army network modernization efforts spearheaded by new Cross-Functional Teams

Kailyn Ribble -- April 9, 2018
Abstract: One of the top priorities for the US Army is modernizing the network used by multiple sources. The new network needs to be accessible but resilient to cyber attacks, but also changeable as the future of technology must come into consideration as well. “The network should incorporate electronic warfare; resilient, secure, and interoperable hardware; software and Read More

U.S. Army Cyber Command: 1st Information Operations Command

Kailyn Ribble -- April 9, 2018
Abstract: The 1st IOC is comprised of 7 different elements, teams and support each trained to aid the United States military on a different aspect of cyber information and resources. This is breakdown of those elements. 1st Information Operations Command (Land) 1st Information Operations (IO) Command is the Army’s only Active Component Information Operations organization. A Read More

U.S. charges, sanctions Iranians for global cyber attacks on behalf of Tehran

Rawa Aziz -- April 6, 2018 (1 comments)
Dustin Volz Analysis: The US is becoming more vocal and public about its counter cybersecurity efforts as it is demonstrating to its adversaries that any cyber criminal activity will be met with swift consequence. WASHINGTON (Reuters) – The United States on Friday charged and sanctioned nine Iranians and an Iranian company for attempting to hack Read More

News Release: DHS S&T Awards $750K to InferLink to Enhance Search Functionality of IMPACT Cybersecurity Research Database

Rawa Aziz -- April 6, 2018
Release Date: January 16, 2018 For Immediate Release DHS S&T Press Office, (202) 254-2385 WASHINGTON—The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded a $750,000 contract to El Segundo, California-based InferLink Corporation to develop an advanced search functionality for the Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) cybersecurity research portal. The Read More

H.R. 3359 “Cybersecurity and Infrastructure Security Agency Act of 2017”

Kailyn Ribble -- March 28, 2018
Summary: “This bill amends the Homeland Security Act of 2002 to redesignate the Department of Homeland Security’s (DHS’s) National Protection and Programs Directorate as the Cybersecurity and Infrastructure Security Agency (CISA) to be headed by a Director of National Cybersecurity and Infrastructure Security to lead national efforts to protect and enhance the security and resilience Read More

Military Officials Testify on Cybersecurity on Capitol Hill

Rawa Aziz -- March 26, 2018
By Terri Moon Cronk and Marine Corps Sgt. David StatenDoD News, Defense Media Activity WASHINGTON, March 14, 2018 — The military service chiefs of cybersecurity see an upward trend in the capacity, capabilities, sophistication and persistence of cyber threats against military networks, Navy Vice Adm. Michael M. Gilday, the commander of U.S. Fleet Cyber Command and U.S. Read More

Global Cybersecurity Index

Kailyn Ribble -- March 13, 2018
Global Cybersecurity Index Summary: Billions of people use the internet every day, and increasingly the internet has become critical for everyday life. Just as in the real world, the cyber world is exposed to imminent threats. These threats can come in the form of emails or cyber espionage. “The scale of cybercrime makes it critical Read More

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Kailyn Ribble -- February 12, 2018
Executive Order on Strengthening Federal Cybersecurity Networks (2017) EXECUTIVE ORDER – – – – – – – STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, and to protect American innovation and values, it is Read More

News Release: DHS S&T Awards $5.6M to Improve Cybersecurity Research

Rawa Aziz -- February 11, 2018
https://www.dhs.gov/science-and-technology/news/2018/02/08/news-release-dhs-st-awards-56m-improve-cybersecurity-research Release Date: February 8, 2018 For Immediate Release DHS S&T Press Office, (202) 254-2385 WASHINGTON—The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) awarded a total of $5,643,466 across seven organizations to develop new tools to arm researchers with the latest insight and an increased collection of cybersecurity incident data to understand and counter Read More

The Development of Cyber Norms at the United Nations Ends in Deadlock. Now What?

Kailyn Ribble -- February 6, 2018
https://www.cfr.org/blog/development-cyber-norms-united-nations-ends-deadlock-now-what The prospects of developing norms of state behavior in cyberspace have been looking positively bleak recently. The Lazarus Group, which appears to have ties to North Korea, is suspected of being behind the WannaCry ransomware attacks that spread to 150 countries and hobbled the UK’s National Health Service. Russian hackers have been named as the culprits Read More

Proliferation Challenges



U.S. charges, sanctions Iranians for global cyber attacks on behalf of Tehran

Rawa Aziz -- April 6, 2018 (1 comments)
Dustin Volz Analysis: The US is becoming more vocal and public about its counter cybersecurity efforts as it is demonstrating to its adversaries that any cyber criminal activity will be met with swift consequence. WASHINGTON (Reuters) – The United States on Friday charged and sanctioned nine Iranians and an Iranian company for attempting to hack Read More

2017 – A Year in Review of Cybersecurity Developments: Lessons Learned in Healthcare and Beyond

Rawa Aziz -- April 6, 2018
2017 – A Year in Review of Cybersecurity Developments: Lessons Learned in Healthcare and Beyond December 28, 2017 by Lee Kim, JD, CISSP, CIPP/US, FHIMSS, director, privacy and security, HIMSS North America Summary: While cybersecurity is not for the faint of heart, we all can do our part by raising awareness and taking action. As I Read More

This is how Cambridge Analytica’s Facebook targeting model really worked — according to the person who built it

Rawa Aziz -- April 2, 2018
Analysis: The dangers of these trends are becoming more and more acute as ordinary people and lawmakers are becoming increasingly aware of just how vulnerable our Democracy can be. The role of social media and the manipulation of their data to achieve political ends by third party groups needs to be addressed in a variety Read More

Half of all countries aware but lacking national plan on cybersecurity, UN agency reports

Kailyn Ribble -- March 26, 2018 (1 comments)
Abstract: Most governments consider cybersecurity and digital risks of high priority. Knowing this, only half of all countries have a comprehensive cybersecurity plan. As of this report, only 38% of countries had a cybersecurity strategy and 12 % were in the process of developing one. Half of all countries aware but lacking national plan on Read More

The Comprehensive National Cybersecurity Initiative

Kailyn Ribble -- February 26, 2018
Analysis: While this Obama Era Policy Review is somewhat dated, it demonstrates a key reason that international cyber policy/rules/norms are going to be difficult to achieve. Placing international rules and regulations on something as new and evolving as the internet poses several interest problems. As stated in class, the technology is so new and unknown Read More

What the US Military Can Teach Everyone Else About Cyber Security

Rawa Aziz -- February 26, 2018 (1 comments)
Hint: it’s all about “resilience.” I have something potentially wildly unpopular to suggest: If you work for or run an organization that deals with human beings and the data that goes with them, and if you are concerned about the security of that data, look to the Defense Department for a solution. The federal government, which Read More

CEA Report: The Cost of Malicious Cyber Activity to the U.S. Economy

Rawa Aziz -- February 18, 2018
February 16, 2018 Today, the Council of Economic Advisers (CEA) released a report detailing the economic costs of malicious cyber activity on the U.S. economy. Please see below for the executive summary and read the full report here. This report examines the substantial economic costs that malicious cyber activity imposes on the U.S. economy. Cyber threats are Read More

ASiPSS Homepage   |   About ASiPSS International Arms Control     |   US Foreign Policy      |   National Security     |   International Negotiation     |   Peace Building Advanced Strategies in Political Science Simulations is a creation of:
ASiPSS' Centers and Forums are student-managed projects; researchers are encouraged to verify sources before publication. Martin S. Widzer and A. Scott DuPree; Copyright © 2021.