teisipäev, 5. juuni 2012

2012 - CCDCOE - 4th - conference - Law & Policy Track and the Technical Track. Cyber Conflict) 5-8 June 2012




4th International Conference on Cyber Conflict

International Conference on Cyber Conflict is NATO CCD COE’s annual conference and the next one will be held on
June 5-8, 2012 in Tallinn, Estonia.
For the fourth year in a row the NATO Cooperative Cyber Defence Centre of Excellence invites experts from government, military, academia and the private sector to Tallinn to discuss recent trends in cyber security.
In 2012 the conference will focus on military and paramilitary activities in cyberspace. This topic will be explored from the political, legal and technical perspectives within two parallel tracks: the Law & Policy Track and the Technical Track.

https://web.archive.org/web/20120222100632/http://www.ccdcoe.org/cycon
https://web.archive.org/web/20120224170737/http://ccdcoe.org/cycon/

 February 2012

Registration opens for CyCon 2012

CyCon 2012 is the fourth annual International Conference on Cyber Conflict taking place in Tallinn, Estonia on 5-8 June this year. The conference, which is organised by the NATO Cooperative Cyber Defence Centre of Excellence, will focus on military and paramilitary activities in cyberspace. CyCon registration is now open (www.cycon.org/reg) and the Early Bird rate of €421 will apply for participants who sign up before 1 April.

The conference is targeted to experts from the government, military, academic and private sectors and the main topic will be explored from the political, legal and technical perspectives within two parallel tracks: the Law & Policy Track and the Technical Track. Additionally three different workshops and a Strategy Breakout Session will be offered.
The Law & Policy Track will focus on the challenges that cyberspace currently presents to legal and policy practitioners and academics. It will offer relatively short but intensive presentations, followed by moderated panel discussions providing the audience with an opportunity for active participation through questions, comments and statements. Confirmed speakers for this track include Prof. Dr Michael N. Schmitt (Chairman of the International Law Department, United States Naval War College), Prof. Dr Wolff Heintschel von Heinegg (European University Viadrina), Jason Healey (Atlantic Council, Head of the Cyber Statecraft Initiative) and Michele Markoff (Senior Policy Advisor in the Office of the Coordinator for Cyber Issues, United States Department of State).
The Technical Track will be exploring the practical side of cyber conflict, cyber attack and cyber weapons. The track will contain a mix of practitioner and researcher presentations and discussions. Confirmed speakers for this track include Latif Ladid (IPv6 Forum), Prof. Thomas Chen (Swansea University), Felix Lindner (Recurity Labs), Martin J. Muench (Gamma International), Ilias Chantzos (Symantec) and Florian Walther (Chaos Computer Club).
The Strategy Breakout Session will explore cyber conflict, cyber weapons and cyber attacks from the conceptual perspective. The session talks will be based on research papers that aim to explain the current situation as well as propose new approaches for the future.
The conference will feature three workshops on 5 June, two of which will be conducted in cooperation with the Cyber Security Forum Initiative (CSFI). Introduction to Computers and Networks” (CSFI) is targeted at non-technical experts who would like to have a deeper understanding of the technical side of cyber. Malware Analysis Workshop” (CFSI) is targeted at computer forensics investigators (law enforcement), incident responders, malware analysts and cyber commands. The audience will be given the understanding, tools and processes necessary to conduct malware analysis and produce reports which can endure legal scrutiny and serve as evidence. There will also be a special workshop for the members of media and its goal is to give journalists an introduction to some of the conference topics and current hot cyber issues in the world. Additionally, this workshop will allow them to have an extensive Q&A with the top speakers of the conference.
The conference registration fee is €495 and the government fee is €195. An Early Bird rate of €421 applies for participants who register before 1 April at www.cycon.org/reg. The fee covers the conference proceedings, all meals during the conference and all social networking events. Discounts apply to students, CSFI members and NATO CCD COE partner organisations, who should contact logistics.cycon-at-ccdcoe.org for information on how to apply for the discount. Journalists wishing to participate the conference are kindly asked to contact kristiina.pennar-at-ccdcoe.org for accreditation.
NATO Cooperative Cyber Defence Centre of Excellence is one of many NATO Centres of Excellence. Its mission is to enhance the capability, cooperation and information sharing among NATO, its member nations and partners in cyber defence by virtue of education, research and development, lessons learned and consultation.
For additional information:
Kristiina Pennar
Public Relations
+372 717 6811

16 May 2012

CyCon 2012 is fully booked

The conference is fully booked and registration is no longer available. Media representatives please turn to kristiina.pennar-at-ccdcoe.org for accreditation.




Introduction to Computers and Networks Workshop


Christopher Taylorr
Don EijndhovenKeren ElazariRoger KuhnPaul de Souza

This workshop is targeted at non-technical experts who would like to have a deeper understanding of the technical side of cyber. Laptops are not required for this workshop.

The workshop is conducted in cooperation with the Cyber Security Forum Initiative (CSFI).

9:00-11:00 Internet and Internet Communication PresentersRoger Kuhn (CSFI) and Don Eijndhoven (CEO Argent Consulting/CSFI) During this session, the architecture and the main components of the Internet will be described. Terms like “router”, “data packet”, “Tier 1 ISP” or “bit” will be explained. Further, it will be shown how information is passed through the Internet. The audience will also be provided information on possibilities and limits of blocking Internet communication at the “borders” of a State.

11:00-11:30 Coffee Break
11:30-12:30 Network Monitoring Technologies to Identify Cyber Threats
Presenters: Paul de Souza (CSFI) and Keren Elazari (VERINT)The evolving cyber threat landscape has demonstrated in recent years the gap between the level of security and visibility afforded by classic IT Security solutions and the obvious need for powerful and comprehensive data gathering mechanisms and analysis methods to enable investigation of cyber attacks. Accordingly, more and more security organizations worldwide are looking into employing further analytics and forensic technologies at an ever increasing scale. These technologies include: Network forensics, deep packet inspection (DPI), full packet capture, net flow analysis, traffic intelligence, cyber intelligence, network analysis & visibility (NAV) , advanced HIPS and NIDS & next generation firewalls. In the workshop, we will present in brief & examine some of the available technologies and methods, and explain how they can be utilized in order to investigate and analyze sophisticated cyber attacks.

12:30-14:30 Lunch

14:30-15:30 Botnets Presenter: Jeff Bardin (Treadstone 71) 
The audience will be provided the information of what botnets are and how they are set up. The main criminal areas of the usage of botnets will be shown. Additionally, cases of main “real-life” botnets as well as their take-down by law enforcement authorities will be presented. This will include the explanation of the possibilities of monitoring, taking-over and taking-down of botnets.

15:30-16:30 Computer Emergency Response Teams (CERTs) Presenter: Christopher Taylor (Cytech)
The nature and working area of CERTs will be presented. Especially, it will be shown what measures CERTs usually use in order to monitor and protect a computer network. In this context, also the potential need and actual extend of national, bi-lateral and international (e.g. FIRST) cooperation between CERTs will be explained. This will include a general description of the information which of the exchange would be desirable.


Malware Workshop:
Michael Theuerzeit


4th International Conference on Cyber Conflict will be held in the centre of Tallinn in the charming art deco building of the Estonian Drama Theatre. This beautiful building presents the oldest theatre house in Estonia, dating back to 1910




Joint Sessions
Dr Myriam Dunn Cavelty
Dr Forrest Hare
H.E. Toomas Hendrik Ilves
Martin J. Muench
Dr Rain Ottis
Dr Mariarosaria Taddeo
Gerhard Stöhr
MG Jaap Willemse


Law & Policy Speakers
Dr Louise Arimatsu
Captain Geneviève Bernatchez
Dr William Boothby
Dr Robin Geiß
Jason Healey
Dr Wolff Heintschel von Heinegg
Dr Gleider I Hernández
Alexander Klimburg
Dr Itamara Lochard
Dr Nils Melzer
MAJ (Adv.) Nadav Minkovsky
Dinah PoKempner
Jody Prescott
Dr Michael N. Schmitt
Heli Tiirmaa-Klaar
Sean Watts
Dr Katharina Ziolkowski
Pedro Zwahlen

Tech Speakers
Rush Carskadden
Ilias Chantoz
Thomas M. Chen
Mario Golling
Diego Fernandez-Vazquez
Kim Hartmann
Harsha K. Kalutarage
Assaf Keren
Robert Koch
Dr Latif Ladid
Hillar Leoste
Felix Lindner
Hiro Onishi
Daniel Plohmann
Steve Purser
Enn Tyugu
Florian Walther
Sean Zadig


Strategy Speakers
Major Scott D. Applegate
Jeff Bardin
Jeffrey Caton
Jon Espenschied
Robert Fanelli
Dr Kenneth Geers
Keir Giles
Prof. Samuel Liles
Birgy Lorenz
MG (Ret) Harold Moulton
Timothy L. Thomas
LtCol Patrice Tromparent


Cyber Attack Scenario Discussion
Colonel Timothy J. Evans
David Ferbrache
Susan Lee
Jaan Priisalu
David J. Smith
Megan Stifel
Trent R. Teyema


Agenda

 

Day 0, 5 June

Last updated on 4 June
TimeEvent
8:00-9:00
Registration
Drama Theatre
9:00-12:30 Malware Analysis Workshop
Drama Theatre
Media WorkshopDrama Theatre 
12:30-13:30
Lunch
13:30-16:30Workshop continuesWorkshop continues
19:00-
22:00
Ice BreakerRestaurant Number 9Dresscode: smart casual (tie optional)

Day 16 June

TimeLaw & Policy TrackTechnical TrackStrategy Breakout SessionTime
8:00-9:00Registration, Drama Theatre
8:00-9:00
9:00-9:10Opening Remarks
COL Ilmar Tamm, Director of the NATO CCD COE
9:00-9:10
9:10-9:50Keynote AddressMG Jaap Willemse
NATO ACT, Assistant Chief of Staff Command, Control, Communication, Intelligence (ACOS C4I)
9:10-9:50
9:50-10:00Administrative RemarksDr Rain Ottis & Dr Katharina ZiolkowskiNATO CCD COE
9:50-10:00
Setting the Scene
10:00-10:30
New Technologies and the Applicability of the Law of Armed Conflict - A History Overview 
Gerhard Stöhr
German Armed Forces Command and Staff College
10:00-10:30
10:30-11:00The Future of Cyber ConflictDr Rain Ottis, NATO CCD COE
10:30-11:00
11:00-11:30Coffee Break
11:00-11:30
Territorial Sovereignty versus Boundlessness of Cyberspace
Military Operations in Cyberspace

11:30-11:50
Legal Implications of Territorial Sovereignty in CyberspaceProf. Dr Wolff Heintschel von Heinegg
European University Viadrina, Professor of Law, Germany
Applying Traditional Military Principles to Cyber Warfare
Dr Samuel Liles
Associate Professor, National Defense University / iCollege Dulles
11:30-12:00
11:50-12:10
National Sovereignty in Cyberspace
Major (Adv.) Nadav Minkovsky
The Military Advocate General´s Corps, International Law Department, Head of Strategic Section, Israel
Internet as a Critical Infrastructure - A Framework for the Measurement of Maturity and Awareness in the Cyber Sphere
Assaf Keren
Product Manager, Cyber Security, Verint Systems, Inc.
Co-author: Keren Elazari
12:00-12:30
12:10-12:30
Impact of Cyberspace on Human Rights and Democracy
Dinah PoKempner
Human Rights Watch, General Counsel, USA
12:30- 13:00
Impact of Cyberspace on Diplomatic Relations
Minister Pedro Zwahlen
Federal Department of Foreign Affairs, Deputy Head of Division for Security Policy and Crisis Management, Head of International Security Section, Switzerland
Natural Privacy Preservation Protocol for Electronic Mail
Dipl.-Inf. Kim Hartmann
Institute for Electronics, Signal Processing and Communications, Otto-von-Guericke University
Co-author: Dipl.-Inf. Christoph Steup
The Principle of Maneuver in Cyber Operations
Major Scott D. Applegate
US Army / Volgenau School of Information Technology and Engineering, George Mason University
12:30-13:00
13:00-14:00
Lunch
Attribution in Cyber Security
14:00-14:30
Panel Discussion
Attribution - why is it hard?
Florian Walther
Independent IT-Security Specialist
Countering the Offensive Advantage in Cyberspace: An Integrated Defensive Strategy
TBD
14:00-14:30
14:30-15:00
Sensing for Suspicion at Scale: A Bayesian Approach for Cyber Conflict Attribution and Reasoning
Harsha K. Kalutarage
Digital Security and Forensics (SaFe) Research Group, Department of Computing, Faculty of Engineering and Computing, Coventry University
Co-authors: Siraj A. Shaikh, Qin Zhou, Anne E. James
14:30-15:00
15:00-
15:30
Coffee Break
The Notion of Battlefield and the Laws of Neutrality
Internet Security
15:30-
15:50
Notion of Battlefield and "Preparation of Battlefield" 
CAPT (N) Geneviève Bernatchez Canadian Armed Forces, Deputy Judge Advocate General - Operational and International Law, Canada
Preparing a Military Cyber Attack
Felix Lindner (FX)
Head of Recurity Labs
Thinking About Cyberspace
MG (Ret) Harold "Punch" Moulton
Strategic Consultant, CSFI
15:30-16:00
15:50-16:10
Law of Neutrality in Cyberspace
Prof. Dr Wolff Heintschel von Heinegg
European University Viadrina, Professor of Law, Germany
Panel discussion - Military Operations in Cyberspace
Iran and Cyber 
Jeff Bardin
Chief Intelligence Officer, Treadstone71
16:00-16:45
16:10-16:30Neutrality and Cyberspace - Political Considerations
Jason Healey
Atlantic Council, Director of the Cyber Statecraft Initiative, USA
16:30-17:30Panel DiscussionPanel discussion16:45-17:30
18:00
Buses leave from the Nordic Hotel Forum for the ICT Demo Centre Tour
18:00
19:00
Tallinn City Tour (starts at the Nordic Hotel Forum)
19:00
22:30Tallinn City Tour (starts at the Nordic Hotel Forum)
22:30

Day 27 June

TimeLaw & Policy TrackTechnical TrackStrategy Breakout SessionTime
8:00-9:00Registration, Drama Theatre
8:00-9:00
9:00-9:10
Administrative remarksDr Rain Ottis & Dr Katharina ZiolkowskiNATO CCD COE
9:00-9:10
Attribution & Accountability in Cyberspace
9:10-10:10Operational and Legal Aspects of Remote Monitoring Solutions (TECH DEMO)
Martin J. Muench
Managing Director, Gamma International GmbH, Germany
9:10-10:10
10:10-10:30The Significance of Attribution to Cyberspace Coercion: A Political Perspective 
Dr Forrest Hare
Georgetown University, Center for Peace and Security Studies, Adjunct Professor, USA
10:10-10:30
10:30-10:40Short Break
10:30-10:40
Attribution & Accountability in Cyberspace


10:40-11:00
Safe Haven Theory and Possible Reactions to "Cyber Attacks" Committed by Non-State Actors
Heli Tiirmaa-Klaar
European Union, European External Action Service, Conflict Prevention and Security Policy Directorate, Cyber Security Policy Advisor
Challenges and way ahead for cooperative distributed Cyber Defense training and experimentation
Frédéric Dreier
Head Cyber Threat Analysis, Swiss Armed Forces
10:40-11:00
11:00-11:30
Coffee Break
11:00-11:30
Models and Tools of Integrated Cyber Security
11:30-11:50
Cyber Conflict and State Responsibility 
Dr Gleider I Hernàndez
Durham University, Lecturer in Law, UK
Russia's Public Stance on Cyber/Information Warfare
Keir Giles
Director, Conflict Studies Research Centre
11:30-12:00
11:50-12:30
Panel Discussion
Collaborative Scenarios for Sharing Information within Trust Relationships
Diego Fernandez-Vazquez
Co-authors: Oscar Pastor Acosta, Emily E. Reid, Chris Spirito, Sarah A. Brown
French Cyberdefence Policy
Lieutenant Colonel Patrice Tromparent
French Ministry of Defence, Delegation for Strategic Affairs, Defence Policy Department
12:00-12:30
Armed Attack
12:30-13:00
Armed Attack - Legal Perspective
Prof. Michael N. Schmitt
U.S. Naval War College, Chairman of the International Law Department, USA
The Role of COTS Products in High Security Systems
Robert Koch
Universität der Bundeswehr München
Co-author: Gabi Dreo Rodosek
Socially Engineered Commoners as Cyber Warriors - Estonian Future or Present? 
Birgy Lorenz
Tallinn University
Co-author: Kaido Kikkas
12:30-13:00

13:00-14:00Lunch
New Paradigms in Cyber Security
14:00-14:30Strategies for International Cyberspace StabilityDr. Itamara Lochard
Senior Researcher, International Security Studies, The Fletcher School of Law & Diplomacy, USA
Command and Control of Cyber Weapons
Enn Tyugu
NATO CCD COE / Institute of Cybernetics of Tallinn University of Technology
The Art of Cyber War
Dr Kenneth Geers
Cyber Subject Matter Expert, NCIS
14:00-14:30
14:30-15:15

Panel Discussion
Paradigm Change of Vehicle Cyber Security
Hiro Onishi
Alpine Electronics Research of America
The Three Faces of the Cyber Dragon
Timothy L. Thomas
Foreign Military Studies Office
14:30-15:15
15:15-15:45Coffee Break
Actors in Cyber Conflict
Cyber Espionage
15:45-16:05
Actors and Attribution in Cyber-Conflict 
Alexander Klimburg
Austrian Institute for International Affairs, Fellow and Senior Adviser, Austria
Cyber Espionage Toolkits
Hillar Leoste
Shadowserver Foundation
Threat Behavior: Attackers & Patterns
Jon Espenschied
Microsoft
15:45-16:15
16:05-16:25
The Notion of Combatancy in Cyber Warfare 
Prof. Sean Watts
Creighton University, Associate Professor of Law, USA
Operation Ghost Click
Sean Zadig
NASA OIG Computer Crimes Division
Panel discussion16:15-16:45
16:25-16:45
Direct Participation in Hostilities 
Jody Prescott
The U.S. Military Academy at West Point, Department of Law, Center for the Rule of Law, Senior Fellow, USA
16:45-17:30
Panel Discussion
Panel discussion - Cyber Espionage and Intelligence16:45-17:30
18:30
Buses leave from Nordic Hotel Forum and Radisson Blu for the Dinner
18:30

Day 38 June

Time
Law & Policy Track
Technical TrackStrategy Breakout SessionTime
8:00-9:00Registration, Drama Theatre
8:00-9:00
Targeting in Cyberspace
Cyber Attack Case Studies
9:00-9:20
The Notion of an "Attack"
(Art. 49 AP I) 

Prof. Michael N. Schmitt
U.S. Naval War College, Chairman of the International Law Department, USA
A Case Study of the Miner Botnet
Daniel Plohmann
Cyber Defence Research Group, Fraunhofer FKIE
Co-author: Elmar Gerhards-Padilla 
Cyber Attack Scenario Discussion: Hacker? Criminal? Hactivist Group?
Nation State? 


Panel members: Megan Stifel, Trent Teyema, David Smith, Sue Lee, Jaan Priisalu, David Ferbrache

Moderator: Colonel Timothy Evans
9:00-9:40
9:20-9:40
Precautions in Attack
Dr William Boothby, Royal Air Force (Ret.), UK
9:40-10:00
Military Targets and Civilian Objects in Cyberspace
Dr Nils Melzer
Geneva Academy for Humanitarian Law and Human Rights, Swiss Chair for International Humanitarian Law, Switzerland
A Cyber Attack Case Study
Ilias Chantzos
Senior Director, Government Affairs, Symantec
9:40-10:10
10:00-10:40Panel DiscussionAttack Trends in Present Computer Networks
Mario Golling
Faculty of Computer Science, Universität der Bundeswehr München Co-authors: Robert Koch, Björn Stelte
10:10-10:40
10:40-11:10Coffe Break
10:40-11:10
Identifying Possible "Gaps"Security Intelligence Modeling
11:10-11:30Acts Short of Armed Attack and Low Intensity Conflicts in Cyberspace 
Prof. Dr Robin Geiß
University of Potsdam, Professor of Law, Germany
A Game Theoretic View of Stuxnet and Its Implications 
Prof. Thomas M. Chen
College of Engineering, Swansea University
Panel discussion on the Cyber Attack Scenario
11:10-11:50
11:30-11:50A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations 
Dr Louise Arimatsu
The Royal Institute of International Affairs, International Law Programme, Associate Fellow, UK
11:50-12:10Manual on the International Law Applicable to Cyber Warfare
Prof. Michael N. Schmitt
U.S. Naval War College, Chairman of the International Law Department, USA
Security Intelligence Operations
Rush Carskadden
Manager, Threat Defense Strategy
Cisco
11:50-12:30
12:10-12:30Is There a Need for New Law for Cyberspace? 
Dr Katharina Ziolkowski
NATO CCD COE
12:30-12:50Short Break
12:30-12:50
12:50-13:30Address of the President of the Republic of Estonia
H.E. Toomas Hendrik Ilves
12:50-13:30
13:30-14:30Lunch
13:30-14:30
Interdisciplinary Aspects
14:30-15:00Ethics of Cyber Warfare
Dr Mariarosaria Taddeo
University of Hertfordshire, Department of Philosophy, School of Humanities, Marie Curie Fellow / University of Oxford, Information Ethics Group (IEG), Senior Research Associate, UK
14:30-15:00
15:00-15:30The Militarisation of Cyberspace: Why Less May be Better
Dr Myriam Dunn Cavelty
Swiss Federal Institute of Technology, Centre for Security Studies, Head of the New Risk & Resilience Research Group, Switzerland
15:00-15:30
Closing Ceremony
15:30-15:45Concluding Remarks & Farewell 
COL Ilmar Tamm, Dr Rain Ottis, Dr Katharina Ziolkowski
NATO CCD COE
15:30-15:45
16:00Buses leave from the Nordic Hotel Forum for the ICT Demo Centre Tour
16:00




https://web.archive.org/web/20120704101210/http://ccdcoe.org/cycon/agenda2012.html








kolmapäev, 16. mai 2012

2012 - CCDCOE - Locked_Shields - Tallinn_Manual

Conference:



Conference & Workshops

One of the main goals of the work of the Centre is to enhance information sharing among NATO, NATO nations and partners in cyber defence. One of the means of doing this is to organise different information sharing and gathering events such as conferences and workshops.

Conferences

The Centre has been organising conferences each year to bring together experts from different disciplines and discuss recent trends in cyber security. With the exception of 2009, when the Centre held two different conferences, the event is always a mixture of law, policy, strategy and technical talks. Last conference, CyCon 2012, was held in June 2012 and next one is due in June 2013.

Workshops

Workshops are organised based on our Program of Work and the on demand if the project would benefit from this. So far have done joint workshops with ENISA, NCIRC and ACT. On our current agenda is a series of workshops, sponsored by NATO Science for Peace and Security Programme, which will give vital input to the “National Cyber Security Framework Manual". The manual will support both NATO member and non-member states in their approach to cybersecurity.

26 March 2012

International Cyber Defence Exercise Locked Shields 2012 Begins Today

NATO Cooperative Cyber Defence Centre of Excellence in cooperation with its partners is organising an international cyber defence exercise from 26th to 28th of March. The goal of the exercise is to support the Multinational Experiment 7, train IT specialist and legal experts, and learn from the activities of the teams.
“Centre’s main objective is to enhance the cyber defence capability of NATO and its partners and exercises such as this are invaluable for training the specialists’ skills and cooperation,” commented Director of the Centre, Colonel Ilmar Tamm. “I am very pleased that we have found good partners such as the Estonian Cyber Defence League to work with and I can only hope that this cooperation will continue for the next exercises as well.”
According to the exercise scenario, the Blue Teams represent small telecommunications companies which fall under cyber attacks. Blue Teams, distributed all over Europe, are expected to defend and secure their networks by technical means, but also to be capable of providing adequate information to the media, to report observations and detected incidents to CERT, to write summaries to the management in order to assess the impact of attacks to the business and to respond to requests from clients and users.
There will be one Red Team, whose objective is to provide equally balanced attacks against all Blue Team networks. To measure the success of different defence strategies and tactics, efforts of Blue Teams are assessed on a predefined scale.
The Blue Teams consist of experts and specialists from governmental organisations, military units, CERT teams and private sector companies. There will be Blue Teams from Switzerland, Germany, Spain, Finland, Italy, NATO (NCIRC), Slovakia and combined teams from Germany-Austria and Denmark-Norway-Sweden. The core of the Red Team is composed of specialists and volunteers from Finland and Estonia, with additional contributors from Germany, Latvia, Italy and NCIRC.
Locked Shields, named after an ancient defence tactics, is not a first technical exercise organised by the Centre. Last one, nicknamed Baltic Cyber Shield, was organised in May 2010 in cooperation with Sweden and Estonian Cyber Defence League. The Centre also contributes to the NATO Cyber Defence Exercise (Cyber Coalition) by helping to plan, develop, and execute the exercise.
NATO Cooperative Cyber Defence Centre of Excellence is one of many NATO Centres of Excellence. Its mission is to enhance the capability, cooperation and information sharing among NATO, its member nations and partners in cyber defence by virtue of education, research and development, lessons learned and consultation.
Additional information:
Kristiina Pennar
Public Relations
+372 717 6811
NATO Cooperative Cyber Defence Centre of Excellence


03 September 2012

Draft of the Tallinn Manual Published Online

The long awaited Tallinn Manual on the International Law Applicable to Cyber Warfare is now available for reading and research on our web page.  The Manual is forthcoming in both paper and electronic format from Cambridge University Press (© Cambridge University Press 2013). 
The Tallinn Manual, written at the invitation of the Centre by an independent ‘International Group of Experts’, is the result of a three-year effort to examine how extant international law norms apply to this ‘new’ form of warfare. It is therefore essential to understand that the Tallinn Manual is not an official document, but the product of a group of independent experts acting solely in their personal capacity.  It does not represent the views of the Centre, its Sponsoring Nations, or NATO, nor is it meant to reflect NATO doctrine. 
The Manual pays particular attention to the jus ad bellum, the international law governing the resort to force by States as an instrument of their national policy, and the jus in bello, the international law regulating the conduct of armed conflict (also labelled the law of war, the law of armed conflict, or international humanitarian law).  Related bodies of international law, such as the law of State responsibility and the law of the sea, are dealt within the context of these topics. As such, the Tallinn Manual only focuses on the existing law and its interpretation in the cyber context – it does not propose or aim to contribute to the discussions on norms of behaviour, codes of conduct or confidence building measures.
The prospective users of the Tallinn Manual are government legal advisers to Ministries of Defence, Foreign Affairs, Interior and Justice; legal advisers to military forces and intelligence agencies; academics and graduate students in law, government and security studies; general counsel for defence industry; think tanks; consultancies; and law firms. The Tallinn Manual is designed to be accessible to lawyers with basic knowledge of international law.
NATO Cooperative Cyber Defence Centre of Excellence is one of many NATO Centres of Excellence. Its mission is to enhance the capability, cooperation and information sharing among NATO, its member nations and partners in cyber defence by virtue of education, research and development, lessons learned and consultation.
Additional information:
Kristiina Pennar
Public Relations
+372 7176 811
https://web.archive.org/web/20130121091154/http://ccdcoe.org/379.html



16 May 2012

CyCon 2012 is fully booked

The conference is fully booked and registration is no longer available. Media representatives please turn to kristiina.pennar-at-ccdcoe.org for accreditation.
https://web.archive.org/web/20130121091458/http://ccdcoe.org/340.html

05 June 2012

Experts gather in Tallinn for the conference on cyber conflict

400 experts from all over the world gather in Tallinn, Estonia from 6-8 June for the fourth International Conference on Cyber Conflict (CyCon) organised by the NATO Cooperative Cyber Defence Centre of Excellence. The conference topic, Military and Paramilitary Activities in Cyberspace, is disserted from the aspects of law and policy, strategy and technology.
The topic of the fourth conference was chosen to reflect the ever-changing nature of cyberspace. “The number of cyber conflicts keeps rising and it is important to understand who the actors in these events are, how to classify these events and participants, and how to interpret such events,” commented Colonel Ilmar Tamm, Director of the NATO Cooperative Cyber Defence Centre of Excellence. “One of the aims of our conferences is to bring together people from different areas and give them more insight to the other aspects of cyber,” he added.
Speakers and participants come from a wide range of disciplines, from law professors to politicians, from IT experts to strategists. Among the speakers in Law & Policy Track are Professor Dr Wolff Heintschel von Heinegg who will talk about territorial sovereignty and neutrality in cyberspace, Michael N. Schmitt who will talk about the meaning of an armed attack in cyberspace, and Jason Healey who will talk about the political considerations in regard of neutrality and cyberspace. Technical Track will contain a mix of practitioner and researcher presentations and discussions, among them Professor Thomas M. Chen’s “A Game Theoretic View of Stuxnet and Its Implications”, Felix Lindner’s “Preparing a Military Cyber Attack” and Ilias Chantzos’ “Cyber Attack Case Study”. Strategy Breakout Session will view the cyber conflict from the conceptual perspective and among the speakers are Dr Samuel Liles (“Applying Traditional Military Principles to Cyber Warfare”), Jeff Bardin (“Iran and Cyber”) and Timothy L. Thomas (“The Three Faces of the Cyber Dragon”). On Friday, a high level cyber attack scenario discussion will take place where a round of experts walks the listeners through the key points of a realistic cyber attack scenario.
The conference main event takes place from 6-8 June, but one day earlier on 5 June, number of workshops takes place. The workshops vary from introductory course in computers and networks, designed especially for law and policy experts, to advanced malware analysis aimed at computer forensics investigators and incident responders.
CyCon 2012 is supported by IEEE, Cisco, Gamma International and Microsoft.
NATO Cooperative Cyber Defence Centre of Excellence is one of many NATO Centres of Excellence. Its mission is to enhance the capability, cooperation and information sharing among NATO, its member nations and partners in cyber defence by virtue of education, research and development, lessons learned and consultation.

Additional information:
Kristiina Pennar
Public Relations
+372 7176 811
https://web.archive.org/web/20130104161443/http://www.ccdcoe.org/343.html


08 June 2012

CyCon brought together 400 experts of law, IT and policy

CyCon 2012, a cyber conflict conference organised by the NATO Cooperative Cyber Defence Centre of Excellence brought together 400 participants from 39 countries. The event stretched over 4 days with the workshops on the conference pre-day and the main event taking place from 6-8 June.
Opening speeches on the first day by MG Jaap Willemse from NATO ACT and Dr Rain Ottis from NATO CCD COE raised questions about offensive capabilities in cyberspace and the future of cyber conflict. Both speakers agreed that nations need red team capability to test the resiliency of their networks and organisations in a non-conventional situation. Later talks by Frédéric Dreier and Kenneth Geers confirmed the necessity since technical exercises need strong red teams to do feasible attacks against the blue teams.
Forrest Hare took a novel approach to attribution and deterrence in his speech. He suggested that in the end, attribution is a political decision not a legal concept and moreover, attribution is not always required to coerce the adversary. Technical Track also devoted fair amount of time to the attribution issue. Attribution is hard because of the nature of attacks, which tend to have several stages and the whole attack is spread over a long period of time. It is of no help either that the Internet is governed by multiple jurisdictions so international cooperation is necessary but often lacking.
Another key issue in the realm of cyber security is the transition to IPv6 which was extensively covered by Dr Latif Ladid. More and more technology gets connected to the Internet and new addressing system has to be used. This, on the other hand, brings about many new vulnerabilities and the need for increased competence in device and network designers and managers.
Technical Track also bounced news and ideas on case studies on botnets and a cyber attack case study by Symantec. Mario Golling from the Munich University summarised key trends in computer network attacks based on regular research. He emphasised that while sophistication of malware is rising, attackers need less skills to perform malicious activities. New developments that pose risks to computer security include the rise of number of smartphones, cloud computing and encryption tools used by the attackers.
Law and Policy Track covered a wide array of questions, discussing the threshold and intensity of a cyber conflict, if and when is it appropriate to exercise the Law of Armed Conflict, what is an armed attack in cyberspace, under which circumstances can a cyber attack trigger lawful self-defence measures. Professor Michael N. Schmitt introduced the work done by a group of experts with a goal to develop authoritative reference on the international law applicable to cyber conflict. The Tallinn Manual or Manual on International Law Applicable to Cyber Warfare will be published in 2013.

Professor Schmitt also gave his overview of the notion of an attack. Some of the key points he stressed was the idea that even an attack that includes delayed effects is an attack and that severity of consequences is always the key. At the same time, the notion of status of the target as the key is slowly fading away.
Popular talks in the Strategy Breakout Session discussed cyber defence through a conventional military prism, raising questions on the effects, persistence and target attributes of cyber attacks. An informative talk on cyber capabilities in Iran by Jeff Bardin packed the room full of conference participants to receive an introduction to different groups in Iran involved in hacking activities, training and education and covert operations. Keir Giles' great talk on Russia's stance on information warfare was another highlight of the session. One of his main conclusions was that the ideas floated by Russia in international information sphere are essentially not new but are increasingly being followed by a significant number of like-minded nations.
Last day in the Strategy Breakout Session a tabletop exercise, orchestrated by Colonel Timothy Evans from the Maryland National Guard, took place. The exercise featured a number of distinguished experts and practitioners on cyber security, (inter)national security and law. Thefictitious scenario included cooperation between intelligence agencies and law enforcement agencies, international cooperation among like-minded and not so like-minded countries, attribution, internal and international crisis communication and public-private partnership.
In one of the final talks of the conference, President of Estonia Toomas Hendrik Ilves expressed his pleasure over the fact that Estonia is no longer a lone voice in discussing cyber security at the international level as there are capitals stressing the importance of the issue all over the world. However, there seems to be a lack of strategic awareness in Brussels - NATO and EU seem to be lagging behind their member states
CyCon 2012 was supported by IEEE, Cisco, Gamma International and Microsoft.
CyCon 2013 will concentrate on automated decision making systems. The call for papers will be announced in autumn 2012.
Additional information:
Kristiina Pennar
Public Relations
+372 7176 811
https://web.archive.org/web/20130121091009/http://ccdcoe.org/344.html

16 July 2012



Change of Command

On Friday, the Centre bid goodbye to its Director of four years, Colonel Ilmar Tamm, and welcomed Colonel Artur Suzik who is the Director of the Centre as of 16 July 2012.
Colonel Tamm, who has led the Centre since its establishment in 2008, noted during the Change of Command ceremony that it has been an invaluable experience to grow and learn alongside with the Centre. “Every organisation’s success and sustainability is defined by its people and team spirit. It has been my honour and privilege to work with each and every one of you because you are what makes this Centre excellent. I hope to keep ties with you also in the future. I wish to Colonel Artur Suzik good luck and ask you to support him like you have supported me during my command tour at the Centre.”
Colonel Artur Suzik, whose last assignment was as the Chief of J6 in Estonian Defence Forces, greeted his new staff and expressed his admiration for the work done by his predecessor. “The Centre has grown from the idea proposed years back into a fully functioning one. From my experience of the past years as J6 and the Chairman of the Centre Steering Committee I know that the Centre’s support to the sponsoring nations, NATO and partners in the area of cyber defence has been phenomenal. It is very fascinating to now join the Centre and see the work done from the inside and to be able to command the Centre for the next years.”
The leaving Director handed over the flag of the Centre to the new Director and planted an oak tree to mark his command at the Centre.




CyCon

The Centre has been organising conferences each year to bring together experts from different disciplines and discuss recent trends in cyber security. With the exception of 2009, when the Centre held two different conferences, the event is always a mixture of law, policy, strategy and technical talks.
Next CyCon will take place 4-7 June 2013. The conference will focus on the technical, strategic and legal implications of using automatic methods to manage cyber conflicts. The conference will be organized along two tracks: a Strategic Track and a Technical Track. Legal aspects will be incorporated in these two tracks.
Short overview of the previous conferences can be found here.

03 January 2013 CyCon 2012 Proceedings Available for Download
18 December 2012 Christmas Greeting
07 December 2012 National Cyber Security Framework Manual Published
06 December 2012 Conficker Study Published
21 November 2012 Article Style Guide Published for CyCon 2013
06 November 2012 DSACEUR Visits the Centre
05 November 2012 Botnet Study Published
27 September 2012 Call for Papers Announced for CyCon 2013
03 September 2012 Draft of the Tallinn Manual Published Online
13 August 2012 Workshop on National Cyber Security Framework
16 July 2012 Change of Command
26 June 2012 Cyber Defence Awareness e-course now available
08 June 2012 CyCon brought together 400 experts of law, IT and policy
05 June 2012 Experts gather in Tallinn for the conference on cyber conflict
23 May 2012 Locked Shields video published
16 May 2012 CyCon 2012 is fully booked
05 April 2012 The Netherlands joins the Centre
02 April 2012 Last free slots for the training courses
26 March 2012 International Cyber Defence Exercise Locked Shields 2012 Begins Today
27 February 2012 Registration opens for CyCon 2012
23 January 2012 ICCC Proceedings Available for Download
19 January 2012 NATO Secretary General Visits the Centre
20 December 2011 Christmas Greeting
05 December 2011 CyCon Abstract Submission Date Changed