{"id":228,"date":"2012-11-23T00:00:00","date_gmt":"2012-11-23T00:00:00","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/"},"modified":"2024-07-24T20:38:01","modified_gmt":"2024-07-24T20:38:01","slug":"incubator-of-catastrophe","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/","title":{"rendered":"Incubator of Catastrophe"},"content":{"rendered":"\n<p>The current leaderless geopolitical and environmental state of the world is the theme of Ian Bremmer\u2019s new book <em>Every Nation for Itself: Winners and Losers in a G-Zero World\u00a0<\/em><em>(<\/em><em>2012<\/em><em>)<\/em><em>.<\/em> Bremmer starts by defining the G-7 college of nations which, after the 2008 global financial crisis morphed into the G-20.\u00a0 Although much ado was made about the potential of the G-20, Bremmer\u2019s key point is that the reduced standing of the U.S. in the global policy arena leaves an unfilled leadership gap in trade and security policy that the G-20 is not yet able to fill.\u00a0 The G-20, comprised of the U.S., Canada, Mexico, Brazil, Argentina, Britain, Germany, France, Italy, Russia, Japan, China, Indonesia, South Korea, India, Australia, Turkey, Saudi Arabia, South Africa and the EU was an accommodation to the new global balance of power that has emerged in the early 21<sup>st<\/sup> Century.\u00a0 But as a tool for global leadership it is too unwieldy with too many diverse ideological frameworks that also have competing policy and commercial interests.\u00a0 This leaves us adrift in the ocean of social and political change like what we have witnessed over the past four years; what he characterizes as the G-Zero world.<\/p>\n<p>In the book Bremmer carefully outlines who the winners and losers may be as we move forward into the future in such areas as nuclear weapons policy, climate change, regional and global trade and cybersecurity.\u00a0 He also outlines who the various national players may be as pivot states, rouges with friends, adapters, protectors, and cheaters.\u00a0 He also illustrates how important both the U.S. and China are as the two largest economies that are intricately intertwined economically, but diametrically opposed philosophically.\u00a0 He presents a series of scenarios of possible futures calling upon recent political events that may or may not develop to support how each scenario plays out.<\/p>\n<p>All in all, it is a fascinating and enjoyable excursion into the world of \u201cwhat if.\u201d\u00a0 Going in the reader should have a good grasp of geography and current events to fully appreciate the nuances he delivers as he jumps back and forth in time and space.\u00a0 For my purpose in this essay, the jumping off point is how his model of the G-Zero leaderless world, could play itself out in cyberspace as we approach the upcoming International Telecommunications Union (ITU) vote to be held in December, 2012 in <a href=\"http:\/\/www.itu.int\/en\/wcit-12\/Pages\/default.aspx\">Dubai<\/a>.<\/p>\n<p><strong>The Future of the Internet<\/strong><\/p>\n<p>This event which I wrote about in a previous article on the challenge to the authority of the Internet Corporation for Assigned Names and Numbers (ICANN) is likely to be one of the most important events of 2012, and yet it is barely reported on in the mainstream press.\u00a0 The ICANN, a multi-stakeholder, multinational non-profit organization originally established by the U.S. Department of Commerce (DOC) administers the top-level domain authority and the root servers for the Internet.\u00a0 Since the global expansion of the Internet has far exceeded the wildest imaginations of the original purveyors and many countries now depend on the efficient communications benefits it offers, a battle for the management of the Internet backbone\u2019s root authority is now underway.\u00a0 Russia, China and Brazil are reported to be three countries pushing for transferring this authority from the ICANN to the ITU, an agency of the United Nations (UN).\u00a0 The vote on this matter will be held in less than a month.<\/p>\n<p><strong>The Great Distorter<\/strong><\/p>\n<p>Leading spokespersons on both sides of the debate have made strong arguments. \u00a0\u00a0On the one hand, the ITU is an international body and is, therefore, not subject to the political agenda of one powerful nation (i.e., the U.S.).\u00a0 And, they contend, since the Internet is now a global public good it makes sense that governance should be in the hands of a multinational body.\u00a0 Besides, the world of the Internet is being overwhelmed by the traffic of cybercriminals and hacktivists that are using this public resource for nefarious purposes.\u00a0 More control by national governments is in order to maintain the resource for beneficial commerce, trade, and governance, so they argue.<\/p>\n<p>On the other hand, others argue, the ICANN is a multi-stakeholder body and, therefore allows private sector and non-governmental organizations (NGOs) to sit at the table as equals with state actors.\u00a0 It, therefore, reflects the new reality of the modern world whereby unrepresented but important constituencies can have a voice. Further, they argue that bureaucratic actions by slow-moving, politically-sensitized nation states cannot possibly keep up with the pace of technological change necessary to make good decisions about Internet governance.\u00a0 And, the potential for corruption, the great distorter, will artificially dictate winners and losers through market distortions that have nothing to do with the original intent of the Internet (i.e., as a tool for the freedom of expression).\u00a0 It is feared that the machinations of political horse-trading will be expressed more fully in the context of ITU governance and the efficiencies gained in market advances and technological innovations will be stalled.\u00a0 More importantly to civil liberties advocates the use of the Internet as a tool for oppression and control is seen as a dangerous shift for the future of mankind.<\/p>\n<p><strong>Anonymity and Cybercrime<\/strong><\/p>\n<p><strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>The arguments of those that advocate for a more civil, less criminal, cyberspace have not gone unnoticed by those in power within the U.S.\u00a0 Bills before the U.S. Congress to reduce our own vulnerabilities to activities of state-sponsored or private action cyber-terrorism are stalled due to political infighting.\u00a0 The Obama Administration in seeking to forestall a tragic \u201ccyber Pearl Harbor\u201d as Secretary of Defense Panetta characterized it has issued a secret directive and has floated a <a title=\"Draft White House EO on Cyber Security\" href=\"http:\/\/sedonacyberlink.com\/wp-content\/uploads\/2012\/11\/White-House-Draft-Executive-Order-Publicly-Circulating-Copy-11-1-12.pdf\">draft Executive Order<\/a> (EO) to protect the U.S.\u2019s critical infrastructure.<\/p>\n<p>Critics of the draft EO, especially those supporting voluntary private action by companies deemed to be subject to the definition of \u201c<a href=\"http:\/\/www.dhs.gov\/critical-infrastructure-sectors\">critical infrastructure<\/a>\u201d fear that the U.S. government is going too far in mandating incident reporting and data collection activities.\u00a0 Other critics, especially those who are concerned about the loss of anonymity online and the prospect of an Orwellian \u201cBig Brother\u201d are concerned that the civil liberties of ordinary citizens will be infringed upon.\u00a0 Some seem to be more concerned about the U.S. national agenda and the actions of the Executive Branch than the 800 pound international Gorilla staring them in the face with the prospect of a loss of top-level domain name authority and root server governance to the ITU.<\/p>\n<p>The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in cyberspace present the greatest test of the G-Zero concept that Bremmer proposes (Verizon RISK Team, 2012).\u00a0 The U.S.\u2019s global leadership in establishing the ICANN structure as a multi-stakeholder entity is a prime example of \u201cleading from behind\u201d as Bremmer documents in his book.\u00a0 The question now becomes how to slow the progress of cyber-criminal activity without stalling the progress of technological innovation and\/or infringing on civil rights and liberties. Although tough for the 18 industry sectors detailed in the National Infrastructure Protection Plan (<a title=\"NIPP\" href=\"http:\/\/www.dhs.gov\/national-infrastructure-protection-plan\">NIPP<\/a>) increased information sharing as proposed in the EO is the first step in a unified and coordinated approach to dealing with organized cyber criminal activity and the cyber\u00a0espionage efforts of state actors.<\/p>\n<p>I\u2019m willing to place my bets on solutions that emerge from a healthy mixture of private, public and NGO action in ICANN and the Internet Engineering Task Force (IETF) rather than the bureaucracy of the ITU. \u00a0In my view, ITU governance of the Internet backbone would be an incubator of catastrophe and would speed the world toward the G-Zero scenario that Bremmer outlines.<\/p>\n<p><strong>References<\/strong><strong>:<\/strong><\/p>\n<p>Bremmer, I. (2012). <em>Every Nation for Itself: Winners and Losers in a G-Zero World<\/em>. New York, NY: Portfolio\/Penguin.<\/p>\n<p>Verizon RISK Team. (2012). <em>Verizon data breach investigations report<\/em>: Verizon.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in cyberspace present a great test in a leaderless, G-Zero world.  <\/p>\n","protected":false},"author":2,"featured_media":3687,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[54,27],"tags":[163,164,165,166,167,168,169,170,171,172,173,174,175,176],"class_list":["post-228","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-policy","tag-balance-of-power","tag-commercial-interests","tag-cyber-policy","tag-g-20","tag-g-zero","tag-global-balance","tag-global-financial-crisis","tag-global-leadership","tag-global-policy","tag-icann","tag-itu","tag-leadership-gap","tag-nuclear-weapons-policy","tag-policy-arena"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in cyberspace present a great test in a leaderless, G-Zero world.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Incubator of Catastrophe - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in cyberspace present a great test in a leaderless, G-Zero world.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2012-11-23T00:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-07-24T20:38:01+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Incubator of Catastrophe - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in cyberspace present a great test in a leaderless, G-Zero world.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#blogposting\",\"name\":\"Incubator of Catastrophe - CTIN\",\"headline\":\"Incubator of Catastrophe\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2012\\\/11\\\/CircuitBoardBlue.png\",\"width\":1629,\"height\":693,\"caption\":\"Blue circuit board\"},\"datePublished\":\"2012-11-23T00:00:00+00:00\",\"dateModified\":\"2024-07-24T20:38:01+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#webpage\"},\"articleSection\":\"CyberSecurity, Policy, balance of power, commercial interests, cyber policy, G-20, G-Zero, global balance, global financial crisis, global leadership, global policy, ICANN, ITU, leadership gap, nuclear weapons policy, policy arena\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"position\":3,\"name\":\"CyberSecurity\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"position\":4,\"name\":\"Policy\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#listItem\",\"name\":\"Incubator of Catastrophe\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#listItem\",\"position\":5,\"name\":\"Incubator of Catastrophe\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/\",\"name\":\"Incubator of Catastrophe - CTIN\",\"description\":\"The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in cyberspace present a great test in a leaderless, G-Zero world.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2012\\\/11\\\/CircuitBoardBlue.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#mainImage\",\"width\":1629,\"height\":693,\"caption\":\"Blue circuit board\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/11\\\/23\\\/incubator-of-catastrophe\\\/#mainImage\"},\"datePublished\":\"2012-11-23T00:00:00+00:00\",\"dateModified\":\"2024-07-24T20:38:01+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Incubator of Catastrophe - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Incubator of Catastrophe - CTIN","description":"The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in cyberspace present a great test in a leaderless, G-Zero world.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#blogposting","name":"Incubator of Catastrophe - CTIN","headline":"Incubator of Catastrophe","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2012\/11\/CircuitBoardBlue.png","width":1629,"height":693,"caption":"Blue circuit board"},"datePublished":"2012-11-23T00:00:00+00:00","dateModified":"2024-07-24T20:38:01+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#webpage"},"articleSection":"CyberSecurity, Policy, balance of power, commercial interests, cyber policy, G-20, G-Zero, global balance, global financial crisis, global leadership, global policy, ICANN, ITU, leadership gap, nuclear weapons policy, policy arena"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","position":3,"name":"CyberSecurity","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","position":4,"name":"Policy","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#listItem","name":"Incubator of Catastrophe"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#listItem","position":5,"name":"Incubator of Catastrophe","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/","name":"Incubator of Catastrophe - CTIN","description":"The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in cyberspace present a great test in a leaderless, G-Zero world.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2012\/11\/CircuitBoardBlue.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#mainImage","width":1629,"height":693,"caption":"Blue circuit board"},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/#mainImage"},"datePublished":"2012-11-23T00:00:00+00:00","dateModified":"2024-07-24T20:38:01+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Incubator of Catastrophe - CTIN","og:description":"The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in cyberspace present a great test in a leaderless, G-Zero world.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2012-11-23T00:00:00+00:00","article:modified_time":"2024-07-24T20:38:01+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Incubator of Catastrophe - CTIN","twitter:description":"The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in cyberspace present a great test in a leaderless, G-Zero world.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"228","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:26:10","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2021-08-07 21:52:25","updated":"2025-08-25 22:26:10"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/\" title=\"CyberSecurity\">CyberSecurity<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/\" title=\"Policy\">Policy<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tIncubator of Catastrophe\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"CyberSecurity","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/"},{"label":"Policy","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/"},{"label":"Incubator of Catastrophe","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/11\/23\/incubator-of-catastrophe\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=228"}],"version-history":[{"count":3,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/228\/revisions"}],"predecessor-version":[{"id":4893,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/228\/revisions\/4893"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/3687"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}