Upload
jarno-limnell
View
456
Download
1
Embed Size (px)
Citation preview
Security Concerns and International Relations
21.6.2016
Jarno LimnéllProfessor, Cybersecurity, Aalto UniversityVP, Cybersecurity, Insta Group Ltd.Doctor of Military Science@JarnoLim
“World Security Chess”
Security ConcernsIn Global Chess Board
“Cyberattack is perceived as the risk of highest concern in eight economies: Estonia, Germany, Japan, Malaysia, the Netherlands, Singapore, Switzerland, and the United States.”
Imp
act
Likelihood
MigrationClimate Change
Cyber threatsTerrorism
Inter-state conflict…
Kyberturvallisuuden kokonaisuus
11
11
Digital (cyber)security integral part today´s security:- Dependence increases and
- More sophisticated capabilities being developed.
Kyberturvallisuuden kokonaisuus
12
12
The speed and suddenness of technological breakthroughs –
Unknown risks
Security Paradigm 2016
New Normal in Security:
Speed of ChangeUnpredictable Instability
Digital-Physical Complexity
Blurring lines between zones of war and peace
Beginning – End
Our side – Their side
Military – Civilian
Involved – Not-involved
Win – Lose
Violence – Non-violence
Dichotomies are blurring
SECURITY INSECURITY
NATO agreed (14.6.2016) to make cyber operations part of its war domain, along with air, sea and land operations.
“Cyber attack can trigger Article 5.”
Cyber is an element in all crisis and wars
Evolution – not revolution
Cybersabotage has begun to emerge in conflicts
according to new details from an extensive
investigation into the hack, they were
skilled and stealthy strategists who
carefully planned their assault over many
months, first doing reconnaissance to
study the networks and siphon operator
credentials, then launching a synchronized
assault in a well
Coordinated December 2015 attack on the Ukrainian electrical grid was clearly an attack on critical national infrastructure.
“Cyberattack on German steel plant caused significant damage”
KINETIC CYBER
“A cyber attack on the French television network TV5 Monde”
FALSE FLAG ATTACKS
“The Dukes: 7 Years of Russian Cyber-Espionage”
STRATEGIC CYBER ESPIONAGE “Hackers breach the Warsaw Stock Exchange”
CRITICAL INFRASTRUCTURE
States are testing the boundaries of the cyberbattlefield.
Innovations and Ethics
Technology has allowed ISIS to create its terror network with all kinds of efficiencies.
ISIS is active…- Youtube- Twitter- Telegram- sendvid.com- dailymotion.com- Google drive (drive.google.com)- thevid.net- my.mail.ru- yadi.sk- Onedrive (onedrive.live.com)- mega.nz- userscloud.com- 3rbup.com- mediafire.com- archive.org
Perhaps most frighteningly, the group’s
"I have given the Cyber Command in the counter-ISIL fight really its first wartime assignment."
Security needs innovative solutions
Security needs cooperation
Security needs strategic commitment
Humankind may change more in next 30 yearsthan past 300 years.
Not what machines and computers can do –what we are letting them to do.
Humanity 2.0. The importance of Digital Ethics.
“It is not the strongest species that survive, nor the most intelligent, but the ones responsive to change.” - Charles Darwin
@JarnoLim