Sie sind auf Seite 1von 25

ICTs in Military Economics Seminar on Military Economy Fouad Chehab School for Military

Dr. Mona El Achkar Jabbour President of LITA

Founder of the Pan Arab observatory for cyber security


Professor of Law - Lebanese University 21st June 2013 Maj_aj@hotmail.com

Gn Thomas 24 November 1936


The ultimate aim of military economy is the safeguarding of the nation

Is not :
1- a form of economy 2- an expression of untried ideas 3- a one-sided affair of military interests

It is:
1- the designation indicating the direction for the economic activity of all citizens 2- It is a political concept 3- it expresses the expediency of all happenings in the economic sphere for the interest of the life of the State 4- the expression of the highest idealistic attitude towards the State.

Assessing National power

Military element is essential to assess the relative strength of a nation

Quantitative and qualitative variables in the military stenght equation : manpower, equipements, leadership, training, and morale

Todays national security environement exceeds the traditional boundaries

Information society: integral risk exposure


Administration Decision making Business Development Weapons Operations

The actual situation

"Everything attached to a network can be hacked and everything is being attached to a network, Rod A. Beckstrom, President and CEO of the (ICANN):

Modern Strategy
Information and Cyber Attacks play a large role

Defending the cyber space is a concern Developement of cyber warfare capabilities and doctrines Military cyber Capabilities on the path of Airplanes importance

Technology in warfare

Operations concept Field battle


Targets

bits instead of bombs

Cyber attack are:

non violent

relatively low cost

hard to track

Liam O'Murchu, manager of operations for Symantec Security Response

"The next time we want to go to war, maybe we wouldn't even need to bomb a country, We could just, turn off its power."

The new cyber arms race


Informatics at heart of The future war

Destroying critical infrastructure Disabling military networks

Military Arsenal
Intelligent arms

Remote control and stand off systems


Administration of logistics Robot Military information systems Unmanned military systems Use of Nano technology Smart ammunition

Use of civil application like Google Earth

cyber-security world summit 2010


crashing power grids, stalled air control towers, hospital infrastructure being rendered useless, and national defenses being susceptible to outside attack. New technologies such as cloud computing, social networking, and the proliferation of mobile devices have also resulted in an increase of cyber attacks.

cyber-security world summit 2010

The summit focused on seven sectors: Information and Communications Technology Financial Services Essential Governmental Services Energy Transportation National Security Media

The big message: Increasing Risks

the World Economic Forum in 2012

in the next 10 years Incidents and attacks are on the rise.

a 10% likelihood of a major Critical Information Infrastructure breakdown with possible economic damages of over $250 billion.

cyber security cannot be left to the technical people.

It is a matter for board levels.

Cyber warfare has begun!


Viruses (stuxnet, Chamon, flame, mini flame, Gauss, )
3 D strategy approach: limit risks, explore capabilities, enforce ability of rapid answer to emergencies

Parasethesie

Cyber security: central topic

New tool for politics, espionage and military

Military spending and internet connectivity indicate Cyber capabilities

policies and organizations determine how they organized to deal with cyber security

Some keeps the traditional approach

Some states include cyberwarfare in their military planning and organization.

traditional approach to cybersecurity


computer security or law enforcement civilian agencies charged with internal security missions national Computer Emergency Response Team (CERT) responsibility of science ministries creating specialized units within the national police.

Military Doctrine
Use of cyber capabilities in :

- reconnaissance, information operations, the disruption of critical networks and services - cyberattacks, and as a complement to electronic warfare and information operations. - link cyberwarfare capabilities with existing electronic warfare planning. area of expanded attention: increasing of mobile, cloud computing and wireless access points

Cyber space: the fifth domain of warfare


United States: creation of a cybercommand in 2009. Argentina, Estonia, France, Brazil, India, Canada, China, the Democratic Peoples Republic of Korea, Denmark, Germany, India, Iran, the Republic of Korea, Switzerland, Israel followed

cyberwarfare : unavoidable element in any discussion of international security.

Cyber Security : the budget


"We must...confront new dangers, like cyber attacks, that threaten our nations infrastructure, businesses and people," President Barack Obama wrote in the introductory budget message, released April 10. "The budget supports the expansion of government-wide efforts to counter the full scope of cyber threats, and strengthens our ability to collaborate with State and local governments, our partners overseas and the private sector to improve our overall cybersecurity."

Digital Agenda: European Commission supports research on Cyber security For the period 2007-2013, the European Commission has spent about 350 million in cyber security research; from 2013 to 2020, 400 million is earmarked to support key enabling & industrial technologies such as cyber security, privacy and trust technologies, and an additional 450 million is earmarked for 'Secure Societies' research which includes aspects of cybersecurity.

Cyber Security
Cyber security is a global problem which requires a global response.

Awareness is not enough.

investment and action are required

The public sector has to provide incentives to companies to invest more in security and to be transparent regarding threats and incidents.

Resilience
actions stepping up the fight against cybercrime

exploring synergies between the civilian and the military dimension.

initiatives aiming at strengthening the external cyber security policy

Resilience
Create a National Cyber commandement

Instaure the obligations to adopt NIS risk management measures

report significant incidents to national authorities, to new sectors which are vital for our economy and society (energy, transport, banking, healthcare, key Internet companies).

Questions?

Das könnte Ihnen auch gefallen