Module 8 - US Initiatives Flashcards

1
Q

Cyber War in US

A
  • US military strategy: cyber attack same as traditional act of war
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two Positions by Administration

A

Howard Schmidt, White House Cyber Czar (March 2010) - there is no cyber war.

Michael McConnell (former directory of national intelligence) (2010) testified to Congress that country was already in the midst of cyber war and was losing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

US Shift of Focus

A

2009 - US believed should be a greater focus on cyber crime and not “cyber war”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Five Pillars Framework

A

Developed after cyber security review of 2008 USB flash drive malware

1) To recognize that the new domain for warfare is cyberspace similar to the other elements in the battle space.
2) Proactive defenses as opposed to passive defense
3) Provide critical infrastructure protection
4) Use of collective defense, which provides early detection and incorporation into the cyber warfare defense structure
5) Maintain and enhance the advantage of technological change, incl. improved computer literacy and increasing artificial intelligence capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Overlapping US Military Authority

A

Orgs with Cyber warfare missions:

  • Army
  • Navy
  • Air Force
  • US Strategic Command -> US Cyber Command (31 Oct 2010)
  • NSA (defend military networks)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

US Federal Laws (7 areas)

A
United States Code
Computer Fraud and Abuse Act of 1984
Cyber Security Enhancement Act
Patriot Act
Homeland Security Act
FISMA
Electronic Communications Privacy Act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

US Code Regarding Cyber War

A
  • Title 50 - intelligence/counter intelligence
  • Title 10 - War - what makes combatant
  • Title 18 - DOJ
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

US Computer Fraud and Abuse Act of 1984

A

Addresses fraud and related activities in conjunction with computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

US Cyber Security Enhancement Act

A

Service Providers can disclose the contents of communications to federal, state, or local entities in the event the provider has a good faith belief there is an emergency (death or serious injury)
- changed privacy substantially (snooping can be authorized)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

US Patriot Act

A

allowed US government to observe certain traffic of individuals without standard wiretap laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Homeland Security Act

A

Voluntary release of content of communications to agencies beyond law enforcement. (threat of serious harm)
- enables DHS to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FISMA

A

Requires Privacy Impact Assessments of IT systems that contain PII (Risk management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Electronic Communications Privacy Act

A

Protects wire, oral, and electronic communications while the communications are being made, are in transit, and are stored on computers. (in effect until others override)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

US Law Still Unclear

A

Question of actors, war vs espionage, data circumnavigating the globe, military involvement?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

US CyberWar Examples

A

Olympic Games
- Stuxnet

Flame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Olympic Games

A

America’s first sustained use of cyberweapons

  • Started by Bush, Accelerated by Obama
  • Target: Iran’s nuclear enrichment facilities
  • Became public in summer 2010 due to programming error that allowed it to escape.
17
Q

Stuxnet

A
  • Part of Olympic Games
  • Worm
  • discovered in June 2010
  • spreads via Windows, targets Siemens SCADA systems
18
Q

Flame

A

aka Flamer, Skywiper

  • Discovered May 2012
  • Data-mining virus that penetrated high-ranking Iranian officials
  • Code at least 5 yrs old (Post claims NSA, CIA, and Israeli military)
  • US says not part of Olympic Games.
19
Q

Pres. Policy Directory 20

A
  • Signed mid-October 2012
  • updated 2003 Directive
  • Allows military to be more aggressive in stopping cyber attacks against gov and private computers
  • Classified doc
  • DoD modify rules of engagement.
  • Army announced plans to develop cyber warfare capabilities incl offensive
20
Q

US Five Point plan (theft of trade secrets)

A
  • Announced February 2013 (after Mandiant’s report on China)
  • Collaboration btw fed agencies
    NIST (commerce, DoD, DHS, DoJ, DoS, Treasury, ODNI, Office of US Trade Representative
  1. Focusing diplomatic efforts to protect trade secrets overseas
  2. Promoting voluntary best practices by private industry
  3. Enhancing domestic law enforcement operations
  4. Improving domestic legislation
  5. Promoting public awareness and stakeholder outreach.