Cybersecurity
Paragraphs

The July Workshop on Protecting and Assuring Critical National Infrastructure focused on three specific areas: international and legal issues relating to the control of network misuse and government roles for securing the infrastructure; economic factors, including market responses to the threat and to protection measures; and directions for future tools research in forensics, modeling, and simulation that will enhance understanding of system robustness, vulnerabilities, and security.

In addition to this agenda, the Workshop addressed the nature of public-private partnerships that could serve to coordinate the separate infrastructure protection efforts of each.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Number
0-935371-48-6
Paragraphs

In July 1996, President Clinton established the Commission on Critical Infrastructure Protection, with a charter to designate critical infrastructures and assess their vulnerabilities, to recommend a comprehensive national policy and implementation strategy for protecting those infrastructures from physical and cyber threats, and to propose statutory or regulatory actions to effect the recommended remedies. The charter gives examples of critical infrastructures (telecommunications, electrical power systems, gas and oil storage and transportation, banking and finance, transportation, water supply systems, emergency services, and continuity of government), and also notes the types of cyber threats of concern (electronic, radio-frequency, or computer-based attacks on the information or communications components that control critical infrastructures).

Some of the critical infrastructures are owned or controlled by the government, and hence the government can, in principle, harden and restructure these systems and control access to achieve a greater degree of robustness. However, the President's executive order recognizes that many of the critical infrastructures are developed, owned, operated, or used by the private sector and that government and private sector cooperation will be required to define acceptable measures for the adequate protection and assurance of continued operation of these infrastructures.

The Stanford Center for International Security and Arms Control (CISAC), as part of its ongoing Program on Information Technology and National Security, and the Center for Global Security Research (CGSR) of the Lawrence Livermore National Laboratory (LLNL) are conducting workshops to examine many of the issues connected with the work of the Commission. In addition to the questions of vulnerabilities, threats, and possible remedies, we discuss the impact on the marketplace of possible protective actions, cost in terms of capital and functionality, legal constraints, and the probable need for international cooperation.

The first of these jointly sponsored workshops was held March 10-11, 1997, and included participation by members and staff of the Presidential Commission; the Stanford community; the information technology industry; and by security specialists at infrastructure organizations, research companies, and the national laboratories. The results of this two-day meeting are summarized in the following report.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Number
0-935371-47-8
Paragraphs

The discussion begins with a conceptual framework for addressing the protection of infrastructure systems subject to attacks on their information subsystems. This includes treating the types of infrastructure systems, possible strategies for their protection, and the nature and scale of the attack. Three components of a protection strategy are identified: preventing attacks, limiting the damage in an attack, and ensuring rapid reconstitution of the target system following an attack. The paper concludes with a discussion of public and private responsibilities for infrastructure protection and the identification of a number of areas where public initiatives might be effective. These are ordered roughly in terms of the cost and difficulty of implementation. In addressing the subject, the analysis is from the perspective of minimizing government intervention in privately owned infrastructure systems.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

The development of "information warfare" presents international legal issues that will complicate nations' efforts both to execute and to respond to certain information warfare attacks, specifically those using computers, telecommunications, or networks to attack adversary information systems. Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law govern the effects of those actions. Nevertheless, the novelty of certain information warfare techniques may remove them from application of established legal categories. Furthermore, the ability of signals to travel across international networks, and affect systems in distant countries, conflicts with the long-standing principle of national, territorial sovereignty.

All Publications button
1
Publication Type
Policy Briefs
Publication Date
Journal Publisher
IIS
Authors
Number
0-935371-44-3
Paragraphs

Information warfare is a relatively new rubric, which is receiving increasing attention within the United States from both the government and the general population. Recent studies and Congressional hearings have discussed the vulnerability of the U.S. civil infrastructure to information sabotage, perpetrated by both state and non-state actors. Most recently, President Clinton established the President's Commission on Critical Infrastructure Protection to identify vulnerabilities in the nation's overall infrastructure and to recommend policy actions to reduce them. One of the areas that the Commission will investigate is the nation's information infrastructure. For instance, the armed services foresee new uses for digital systems to enhance military capabilities, but they also recognize the growing U.S. vulnerability that might be exploited with the techniques of information warfare.

The existence of softer and perhaps more critical homeland targets is creating interest in information warfare at a strategic level. That interest has two very different themes: new weapons the United States might use against an adversary and, in the hands of others, new threats to U.S. civil information-system-dependent infrastructure. The latter, the defensive concern, is currently receiving the larger measure of public attention.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

This paper reports the results of a study of the special export control regime for high-performance computers. The history and purpose of this export control regime are reviewed, and a framework for analysis is established, which can be used to test the basic premises on which the control regime rests and to suggest viable control thresholds. The fact that the export of certain computer systems cannot be effectively controlled is established, and the limits of controllability are defined. U.S. government applications for high-performance computers are reviewed with respect to the requirement for and criticality of such computing for national security. Finally, judgments are made as to the levels of control that are possible, and the desirability and feasibility of maintaining Such controls. Near- and intermediate-term problems that may erode the liability of the basic premises underlying high-performance computer export controls are identified.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Subscribe to Cybersecurity