Security Concerns and International Relations

Post on 13-Apr-2017

454 views 1 download

Transcript of Security Concerns and International Relations

Security Concerns and International Relations

21.6.2016

Jarno LimnéllProfessor, Cybersecurity, Aalto UniversityVP, Cybersecurity, Insta Group Ltd.Doctor of Military Science@JarnoLim

“World Security Chess”

Security ConcernsIn Global Chess Board

“Cyberattack is perceived as the risk of highest concern in eight economies: Estonia, Germany, Japan, Malaysia, the Netherlands, Singapore, Switzerland, and the United States.”

Imp

act

Likelihood

MigrationClimate Change

Cyber threatsTerrorism

Inter-state conflict…

Kyberturvallisuuden kokonaisuus

11

11

Digital (cyber)security integral part today´s security:- Dependence increases and

- More sophisticated capabilities being developed.

Kyberturvallisuuden kokonaisuus

12

12

The speed and suddenness of technological breakthroughs –

Unknown risks

Security Paradigm 2016

New Normal in Security:

Speed of ChangeUnpredictable Instability

Digital-Physical Complexity

Blurring lines between zones of war and peace

Beginning – End

Our side – Their side

Military – Civilian

Involved – Not-involved

Win – Lose

Violence – Non-violence

Dichotomies are blurring

SECURITY INSECURITY

NATO agreed (14.6.2016) to make cyber operations part of its war domain, along with air, sea and land operations.

“Cyber attack can trigger Article 5.”

Cyber is an element in all crisis and wars

Evolution – not revolution

Cybersabotage has begun to emerge in conflicts

according to new details from an extensive

investigation into the hack, they were

skilled and stealthy strategists who

carefully planned their assault over many

months, first doing reconnaissance to

study the networks and siphon operator

credentials, then launching a synchronized

assault in a well

Coordinated December 2015 attack on the Ukrainian electrical grid was clearly an attack on critical national infrastructure.

“Cyberattack on German steel plant caused significant damage”

KINETIC CYBER

“A cyber attack on the French television network TV5 Monde”

FALSE FLAG ATTACKS

“The Dukes: 7 Years of Russian Cyber-Espionage”

STRATEGIC CYBER ESPIONAGE “Hackers breach the Warsaw Stock Exchange”

CRITICAL INFRASTRUCTURE

States are testing the boundaries of the cyberbattlefield.

Innovations and Ethics

Technology has allowed ISIS to create its terror network with all kinds of efficiencies.

ISIS is active…- Youtube- Twitter- Telegram- sendvid.com- dailymotion.com- Google drive (drive.google.com)- thevid.net- my.mail.ru- yadi.sk- Onedrive (onedrive.live.com)- mega.nz- userscloud.com- 3rbup.com- mediafire.com- archive.org

Perhaps most frighteningly, the group’s

"I have given the Cyber Command in the counter-ISIL fight really its first wartime assignment."

Security needs innovative solutions

Security needs cooperation

Security needs strategic commitment

Humankind may change more in next 30 yearsthan past 300 years.

Not what machines and computers can do –what we are letting them to do.

Humanity 2.0. The importance of Digital Ethics.

“It is not the strongest species that survive, nor the most intelligent, but the ones responsive to change.” - Charles Darwin

@JarnoLim