South Carolina Cyber Nature of Cyberspace 675 PETABYTES OF INTERNET TRAFFIC PER DAY (2011); GROWING 60% PER YEAR 265 BILLION EMAILS PER DAY 13 MILLION HOURS OF VOIP PER DAY • Cyberspace: (DoD) “A global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the internet, telecommunications networks, computer systems, and embedded processors and controllers.” Source: Joint Pub 3-12 • However… – – – – Manmade domain/ever changing/privately owned Virtual Programming code and protocols define rules of the domain Environment/TTPs evolve at net speed Success in this domain means being smarter, more creative, faster, and stealthier than our opponent. 1/28/2013 4:37 4 UNCLASSIFIED Environment: Exponential Rate of Change 2012 1 Billion Users, 2012 Library of Congress = 10 Terabytes At best transmission line speed: 1998 = 16.5 days 2013 = .00008 seconds 2010 2008 Facebook Launch, 2004 2000 10 Billion Mobile Devices Projected by 2016 (1.4 per person on the planet) UNCLASSIFIED 5 THREAT ACTORS FOREIGN INTELLIGENCE SUPPLY CHAIN VULNERABILITY NEGLIGENT USERS HACKTIVISTS WIRELESS ACCESS POINTS CRIMINAL ELEMENTS REMOVABLE MEDIA TERRORIST ACTS INSIDER THREATS A Disturbing Trend The Threat is Evolving 7 5 Key Challenges in Cyber Ends USCYBERCOM Mission 1. Defend the Nation 2. CCMD Support 3. GIG Ops and Defense Ways & Key Challenges Command & Control Trained & Ready Means Authorities, ROE, Policy Situational Awareness Defensible Architecture Materiel, Technology, Facilities, Engagement 1/28/2013 4:37 8 UNCLASSIFIED AGREED March 5, 2013 U.S. Federal Cybersecurity Operations Team National Roles and Responsibilities* US Government Departments and Agencies • Investigate, attribute, disrupt and prosecute cyber crimes • Lead domestic national security operations • Conduct domestic collection, analysis, and dissemination of cyber threat intelligence • Support the national protection, prevention, mitigation of, and recovery from cyber incidents • Coordinate cyber threat investigations DOJ/FBI LEAD FOR Investigation and Enforcement FBI, NSD, CRM, USAO Global Cyberspace DoD DHS DOJ/FBI • Coordinate the national protection, prevention, mitigation of, and recovery from cyber incidents • Disseminate domestic cyber threat and vulnerability analysis • Protect critical infrastructure • Secure federal civilian systems • Investigate cyber crimes under DHS’s jurisdiction DHS LEAD FOR Protection NPPD, USSS, ICE • Defend the nation from attack • Gather foreign cyber threat intelligence and determine attribution • Secure national security and military systems • Support the national protection, prevention, mitigation of, and recovery from cyber incidents • Investigate cyber crimes under military jurisdiction DoD LEAD FOR National Defense USCYBERCOM, NSA, DISA, DC3 Coordinate with Public, Private, and International Partners * Note: Nothing in this chart alters existing DOJ, DHS, and DoD roles, responsibilities, or authorities Partnerships: Team Cyber & International engagements Network Vulnerabilities Are Not Solely a US Problem • Shared Situational Awareness • Agile Tipping and Cueing • Integrated Defensive & Offensive Capabilities • Synchronized Command & Control 1/28/2013 PM 1/28/2013 4:37 4:37 PM 10 Cyber Partnering Framework What other proactive partners are doing Government Industry Academia Cyber South Carolina Cyber South Carolina Cyber Protection and Awareness Leverages Economic Engagement and Opportunity Cyber Relevance Synergy of Effort and Capabilities Between Government/Industry/Academia Russian Gang Said to Amass More Than a Billion Stolen Internet Credentials Aug 2014 Industry South Carolina Cyber Partners The Cyber solution Academia Government Questions? 17