/
1 `1 Hacking and Information Warfare 1 `1 Hacking and Information Warfare

1 `1 Hacking and Information Warfare - PowerPoint Presentation

payton
payton . @payton
Follow
66 views
Uploaded On 2023-06-26

1 `1 Hacking and Information Warfare - PPT Presentation

2 Overview Information Warriors Who Are They What Do They Do Types of Threat PsyOps Civil Affairs Electronic Warfare HackersCrackers Cyber Terror Defenders 3 References httpwwwcertorg ID: 1003778

warfare information state crime information warfare crime state organized www network military terrorism operations cyber computer site http national

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "1 `1 Hacking and Information Warfare" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

1. 1`1Hacking and Information Warfare

2. 2OverviewInformation WarriorsWho Are TheyWhat Do They DoTypes of ThreatPsyOpsCivil AffairsElectronic WarfareHackers/CrackersCyber TerrorDefenders

3. 3Referenceshttp://www.cert.orgInfoWar: http://www.iwar.org.uk/index.htmhttp://infowar.freeservers.com/index.htmlhttp://www.nmrc.org/links/Culture: http://www.eff.org/pub/Net_culture/Terrorism: http://www.terrorism.com/terrorism/links.shtmlBooks :Sterling - The Hacker CrackdownStoll - The Cuckoo’s EggHoneynet Project – Know Your EnemySchneier – Beyond Fear

4. 4Information WarriorsInformation Warfare much more than Computer Network Operations (CNO)Psychological OperationsCivil AffairsElectronic Warfare OpsComputer WarriorsCounter-IW Specialists (Defenders)

5. 5Threats National SecurityCritical National InfrastructureCyber-Warfare/Computer Network Operations Cyber CrimeOrganized CrimeIdentity TheftExtortionFraud Non-State ActorsTerroristsPolitical Activists

6. 6ThreatsNation States Information Warfare is recognized as a part of military strategy and doctrine around the worldThe study and practice of military usage of Information Warfare is taught in military academies and educational facilities

7. 7ThreatsOrganized CrimeUtilized Information Warfare in various forms for centuriesExtortion is a form of Information WarfareNew technologies breed new criminalsTechnology creates trans-national criminal organizationsIn certain nations, the lines between state actions and organized crime can be blurred

8. 8Transnational Organized CrimeOrganizedcrimeHacktivismInsidercrimeHackers/CrackersCyber-crime

9. 9Example -Transnational Organized Crime Individual crime may be difficult to differentiate from organized crime:Distribution and Coordination tools Mass exploitation methods Organized crime exploits Information technologiesEnhanced efficiencies – on-line management of illegal gambling schemes Intelligence tool for risk management – Cali organization in 1995 had state of the art equipment Force multiplier – GPS for sea drops New channels and new targets for crime

10. 10ThreatsNon-State ActorsTerroristsHacktivistsSometimes different sides of the same pageAs with organized crime, sometimes the lines between state and non-state actors is blurred

11. 11Example - Hacker to Terrorism?Defaced Health-care web site in India "This site has been hacked by ISI (Kashmir is ours), we want a hospital in Kashmir" and signed by Mujahideen-ul-dawatLinked to G-Force PakistanGlobal Hactivism linked to Mid-East conflictInformation Warfare successfully utilized in Chiapas conflict with Mexican gov’t

12. 12Examples - Cyber-IntifadaProlonged campaignPalestinian hackers/web defacersTargeting Israeli and Israel-supporting organizationsLow innovation levelCounter-campaignsPublicityCounter-hacking: 2xS.co.ilRecent resurgence?

13. 13The WarriorsSociology of warriorsMoraleVigilance vs. assumed invulnerabilityOrganization Motivation of warriorsAccountability vs. anarchyDelayed vs. immediate gratificationInternal vs. external gratification Preparation of warriors TrainingTool selectionIntelligenceStrategy

14. 14The WarriorsPsychological Operations WarriorsSpecialize in using information warfare to change an enemy’s state of mindPropaganda (Not limited to PsyOps)Non-threateningThreateningComputer Network OperationsGoal is to eliminate confidenceImpacts decision-making and C2

15. 15The WarriorsCivil AffairsWinning the Hearts and Minds!Essential to military operationsUtilizes Information Warfare strategies to calm and utilize populationsSpecialists must understand subtleties of language and cultureResearch begins long before the battleOperations last long after the battle is won

16. 16The WarriorsElectronic Warfare OpsGoal is to utilize electronic information infrastructure against your enemyInformation lost or modifiedMake the enemy blind, deaf, and dumbRestrict or control electronic information sources

17. 17The WarriorsComputer WarriorsComputer Network OperationsOffensive attacks against enemy information/computer networksUtilization of sophisticated attack tools and malwareNewest form of Information WarfarePrinciples are the same

18. 18Attack Sophistication vs.Intruder Technical KnowledgeHighLowpassword guessingself-replicating codepassword crackingexploiting known vulnerabilitiesdisabling auditsback doorshijacking sessionssweeperssnifferspacket spoofingGUIautomated probes/scansdenial of servicewww attacksToolsAttackersIntruderKnowledgeAttackSophistication“stealth” / advanced scanning techniquesburglariesnetwork mgmt. diagnosticsdistributedattack toolsCross site scriptingStagedattackTime

19. 19Examples – Response Time to CNOConficker 2009?

20. 20Cyber TerrorismCyberterror is still emerging No verified example of cyber terror attack to date Evolving threat Integrating critical missions with general Internet Increasing damage/speed of attacks Continued vulnerability of off-the-shelf softwareMuch confusion of descriptions and definitionsTechnology widely viewed as critical weakness of Western nations

21. Next WeekStrategy: Defensive and Offensive21