Vanguard Magazine

Vanguard Oct/Nov Digital Edition

Preserving capacity, General Tom Lawson, Chief of the Defence Staff, Keys to Canadian SAR

Issue link: http://vanguardcanada.uberflip.com/i/89342

Contents of this Issue

Navigation

Page 5 of 47

S SIT REP Simulating opportunities in the next fl eet Canada's National Shipbuilding Procurement Strategy represents an oppor- tunity for the modeling, simulation and gaming industries. And Halifax is well positioned to capitalize. Thanks to a robust fi lm industry, a large concentration of universities and colleges, including specialized technical programs attracting international stu- dents, and a wealth of military subject matter experts across all services, Hali- fax boasts an ideal environment, according to members of an industry panel at DEFSEC Atlantic 2012 in September. Carl Daniels of Bluedrop, Glen Copeland of Lockheed Martin Canada and Mike Johnston of TeamSpace suggested M&S industries could see signifi cant new business as the training requirements for the new fl eets emerge. The American Littoral Combat Ship, they noted, generated over $300 million in M&S related training tenders. The region has no shortage of technical talent. Copeland said that when Lock- heed Martin won the Halifax-class modernization program, "we cleaned out a couple years of university graduates to staff a new offi ce." But Lockheed also had to attract outside expertise for team leads. Modeling and simulation has more than proved its worth, becoming a staple in operations, training, capability development and experimentation, R&D and acquisition. In a panel on military M&S, Brad O'Connell of ANSYS noted that physics-based M&S is now vital for best-in-class companies and has delivered the U.S. Department of Defense a return of 700-1300% for every dollar invested. LCol Dave Boyer of the army's Directorate of Land Requirements said that, with Taking the cyber offensive There was a time when being hacked was a reason for shame, a sign that your cyber security infrastructure was insuffi cient. Today, if you have not been hacked, it's probably a sign you have nothing worth stealing. But if infi ltration is considered by some to be the new normal, how then to strike back? It was a question raised by Dmitri Alperovitch, a former ex- ecutive with McAfee and the co-founder of security start-up CrowdStrike, in a presentation to the third annual Privacy, Access and Security Congress in Ottawa. Alperovitch said the current approach of defence in depth has largely failed. Attacks have become more targeted and sophisticated, negating the old adage about simply needing a better security system than the next door a generation of soldiers now training in a simulated environment, all future ve- hicles and weapon systems "will be integrated into live simulation." Both panels suggested the next wave will likely take advantage of mobile devices, with implications for both individual and collective training, though Copeland said the ability to process data across national training networks would have to improve. "That's the next level we need to hit with respect to the technology." neighbour. "We were focusing on the wrong problem," he said, looking at the bullet and not the shooter, and building defences to stop specifi c types of bullets. His answer is to "raise the cost" to the adversaries. That does not neces- sarily mean hacking back. It could involve misdirection and deception with respect to your most sensitive data, outing known hackers (even states) and opening the door to legal action and international sanctions, or working with law enforcement and telecommunications companies to restrict ac- cess. "Every day our territory is violated yet all we do is intercept and escort [them] out," he said. Not everyone is comfortable with that approach. Robert Dick, the director general of the National Cyber Security Directorate at Public Safety Canada, noted that cyber offense means different things to different people, and a counter attack could quickly escalate. Dean Turner of Symantec said "cau- tion is the watch word" when it comes to cyber offense, suggesting cyber responses "can have a kinetic effect." He argued for a better understanding of the data in your system and where it is going, as well as improved training and processes. Both the Communications Security Establishment and Public Safety would seem to agree. Better training to ensure sound cyber hygiene should deal with 80 percent of potential breaches, a message that is being reinforced during national cyber security month in October. Still, there is growing debate about cyber offense. Last month, the NATO Cooperative Cyber Defence Centre of Excellence released a draft of the Tal- linn Manual on the International Law Applicable to Cyber Warfare, which at- tempts for the fi rst time to distinguish between cyber war and cyber crime, and establish some international rules of engagement in cyberspace. And Harold Koh, the U.S. State Department's chief legal adviser, speaking at Dean Turner Robert Dick 6 OCTOBER/NOVEMBER 2012 www.vanguardcanada.com a conference hosted by U.S. Cyber Command in September, said U.S. govern- ment policy would now consider certain cyber attacks a "use of force" under international law. Just what the response might be remains uncertain.

Articles in this issue

Links on this page

view archives of Vanguard Magazine - Vanguard Oct/Nov Digital Edition