2 Overview Information Warriors Who Are They What Do They Do Types of Threat PsyOps Civil Affairs Electronic Warfare HackersCrackers Cyber Terror Defenders 3 References httpwwwcertorg ID: 1003778
Download Presentation The PPT/PDF document "1 `1 Hacking and Information Warfare" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
1. 1`1Hacking and Information Warfare
2. 2OverviewInformation WarriorsWho Are TheyWhat Do They DoTypes of ThreatPsyOpsCivil AffairsElectronic WarfareHackers/CrackersCyber TerrorDefenders
3. 3Referenceshttp://www.cert.orgInfoWar: http://www.iwar.org.uk/index.htmhttp://infowar.freeservers.com/index.htmlhttp://www.nmrc.org/links/Culture: http://www.eff.org/pub/Net_culture/Terrorism: http://www.terrorism.com/terrorism/links.shtmlBooks :Sterling - The Hacker CrackdownStoll - The Cuckoo’s EggHoneynet Project – Know Your EnemySchneier – Beyond Fear
4. 4Information WarriorsInformation Warfare much more than Computer Network Operations (CNO)Psychological OperationsCivil AffairsElectronic Warfare OpsComputer WarriorsCounter-IW Specialists (Defenders)
5. 5Threats National SecurityCritical National InfrastructureCyber-Warfare/Computer Network Operations Cyber CrimeOrganized CrimeIdentity TheftExtortionFraud Non-State ActorsTerroristsPolitical Activists
6. 6ThreatsNation States Information Warfare is recognized as a part of military strategy and doctrine around the worldThe study and practice of military usage of Information Warfare is taught in military academies and educational facilities
7. 7ThreatsOrganized CrimeUtilized Information Warfare in various forms for centuriesExtortion is a form of Information WarfareNew technologies breed new criminalsTechnology creates trans-national criminal organizationsIn certain nations, the lines between state actions and organized crime can be blurred
8. 8Transnational Organized CrimeOrganizedcrimeHacktivismInsidercrimeHackers/CrackersCyber-crime
9. 9Example -Transnational Organized Crime Individual crime may be difficult to differentiate from organized crime:Distribution and Coordination tools Mass exploitation methods Organized crime exploits Information technologiesEnhanced efficiencies – on-line management of illegal gambling schemes Intelligence tool for risk management – Cali organization in 1995 had state of the art equipment Force multiplier – GPS for sea drops New channels and new targets for crime
10. 10ThreatsNon-State ActorsTerroristsHacktivistsSometimes different sides of the same pageAs with organized crime, sometimes the lines between state and non-state actors is blurred
11. 11Example - Hacker to Terrorism?Defaced Health-care web site in India "This site has been hacked by ISI (Kashmir is ours), we want a hospital in Kashmir" and signed by Mujahideen-ul-dawatLinked to G-Force PakistanGlobal Hactivism linked to Mid-East conflictInformation Warfare successfully utilized in Chiapas conflict with Mexican gov’t
12. 12Examples - Cyber-IntifadaProlonged campaignPalestinian hackers/web defacersTargeting Israeli and Israel-supporting organizationsLow innovation levelCounter-campaignsPublicityCounter-hacking: 2xS.co.ilRecent resurgence?
13. 13The WarriorsSociology of warriorsMoraleVigilance vs. assumed invulnerabilityOrganization Motivation of warriorsAccountability vs. anarchyDelayed vs. immediate gratificationInternal vs. external gratification Preparation of warriors TrainingTool selectionIntelligenceStrategy
14. 14The WarriorsPsychological Operations WarriorsSpecialize in using information warfare to change an enemy’s state of mindPropaganda (Not limited to PsyOps)Non-threateningThreateningComputer Network OperationsGoal is to eliminate confidenceImpacts decision-making and C2
15. 15The WarriorsCivil AffairsWinning the Hearts and Minds!Essential to military operationsUtilizes Information Warfare strategies to calm and utilize populationsSpecialists must understand subtleties of language and cultureResearch begins long before the battleOperations last long after the battle is won
16. 16The WarriorsElectronic Warfare OpsGoal is to utilize electronic information infrastructure against your enemyInformation lost or modifiedMake the enemy blind, deaf, and dumbRestrict or control electronic information sources
17. 17The WarriorsComputer WarriorsComputer Network OperationsOffensive attacks against enemy information/computer networksUtilization of sophisticated attack tools and malwareNewest form of Information WarfarePrinciples are the same
18. 18Attack Sophistication vs.Intruder Technical KnowledgeHighLowpassword guessingself-replicating codepassword crackingexploiting known vulnerabilitiesdisabling auditsback doorshijacking sessionssweeperssnifferspacket spoofingGUIautomated probes/scansdenial of servicewww attacksToolsAttackersIntruderKnowledgeAttackSophistication“stealth” / advanced scanning techniquesburglariesnetwork mgmt. diagnosticsdistributedattack toolsCross site scriptingStagedattackTime
19. 19Examples – Response Time to CNOConficker 2009?
20. 20Cyber TerrorismCyberterror is still emerging No verified example of cyber terror attack to date Evolving threat Integrating critical missions with general Internet Increasing damage/speed of attacks Continued vulnerability of off-the-shelf softwareMuch confusion of descriptions and definitionsTechnology widely viewed as critical weakness of Western nations
21. Next WeekStrategy: Defensive and Offensive21