Cyber-Warfare Analyzed by: Josh Burleson Brian Epp Chrissy Miller Martin Vanis “Cyber attacks…is not in any way comparable to weapons of mass destruction.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

By Kathryn DuFresne. WHAT are computer ethics? Computer Ethics is a branch of practical philosophy which deals with how computing professionals should.
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
Iran, the Persian Gulf and American Security. WHY DO WE CARE ABOUT IRAN?
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Brian Connett, LCDR, USN US NAVAL ACADEMY
Computer Crimes Chapter 9. Definition  Illegal act that involves a computer system or computer-related system  Telephone, microwave, satellite telecommunications.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Cyberterrorism. Critical Infrastructure Vulnerability.
Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.
Computer Security Fundamentals
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions May 16, 2015 DRAFT1.
Protection of Classified Information & Cyber Security
South Carolina Cyber.
Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Information Warfare Theory of Information Warfare
Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network.
Police Service of Northern Ireland Detective Chief Inspector Douglas Grant MSc PSNI Cyber Crime Centre.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
Network Security of The United States of America By: Jeffery T. Pelletier.
DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.
Cyber-Warfare: The Future is Now!
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Marine Industry Day 2015 Sector Command Center (24 hours): (504) National Response Center: Website:
Scenario A devastating cyber attack has been launched against the United States, injecting viruses that have effectively shut down the U.S. power grid.
Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©
Information Warfare Playgrounds to Battlegrounds.
Cyber Warfare Case Study: Estonia
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
Spy v. Spy: Espionage, 1947-Present Dr. David R Smith Ohio Northern University.
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Threat context TLP WHITE Cyber security panel
What is Network and Security Research? Network and Security Research, or Information Communication Technology (ICT) Research involves: the collection,
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Hurdles in implementation of cyber security in India.
CYBER WARFARE What is it and what does the future hold?
MA “International Relations, Global Economy and Strategic Analysis” COURSE OUTLINE.
Information Warfare Playgrounds to Battlegrounds.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Governments don’t Understand Cyber Warfare. We Need Hackers.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
International Conflict & Cyber Security
International Terrorism: Defined
Cyber Security Zafar Sadik
DoD Cyberspace Workforce Definitions
FYE Cybersecurity Dr. X.
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
United States Coast Guard
DoD Cyberspace Workforce Definitions
Presidential Approaches to Cybersecurity
Final Project Part 1: Paper and Storyboard
Evolution Of Cybersecurity
Dominic DeSoto, Jay Jackson IA 455 Oct. 23, 2017
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
CYBER RISKS IN SECURITIES SERVICES
Presentation transcript:

Cyber-Warfare Analyzed by: Josh Burleson Brian Epp Chrissy Miller Martin Vanis “Cyber attacks…is not in any way comparable to weapons of mass destruction. What a lot of people call them is “weapons of mass annoyance.” If your power goes out for a couple of hours, if somebody draws a mustache on Attorney Gen. Ashcroft’s face on his website, it’s annoying. It’s irritating. But it’s not a weapon of mass destruction. The same is true for this” - James Lewis, 2003, Director of the Center for Strategic and International Studies

Introduction to Cyber-Warfare Cyberwar Leveraging the internet for political, military, and economic espionage activities Cyberwarfare Politically motivated hacking to conduct sabotage and espionage Dangers Lack of agreed upon definitions make preparation, defense, and response in the face of ‘attack’ difficult The more developed a State is, the more dependent it is on the Internet Internet is essential to every modern State

Cyber-Space – The Final Frontier Considered the newest domain of warfare Civilian vs. Civilian (Cyber-Crime) Civilian vs. State State vs. Civilian State vs. State

Civilian Hackers Their threat-level ranges based on malicious intent Cyber-crime, not Cyber Warfare Crime may be a step or signify the potential for individual hackers/collective hacktivists to participate in Warfare Documented Cases 1970: MOD (Masters of Deception) 2010: Spanish Investigators arrested 3 individuals responsible for BotNet infection of more than ½ of Fortune 1000 companies and > 40 major banks

“While media coverage focuses on the most high-profile hacks or defacements, this current cyber- campaign is a War of a Thousand Cuts…” -Jeffrey Carr Inside Cyber Warfare Cyber War between Sunni vs. Shiite

Neo, The Matrix Has You “Anonymous” Hacktivists No central authority/hierarchy Sheer size and capability poses threat Capability, Opportunity, Intent… “not your personal army” Civilian vs. State can be far more dangerous than the petty annoyances that “Anonymous” may engage in Operation Cast Lead (Israeli vs. Arabic Hackers)

State vs. Civilian

Internet Policing “The U.S. reserves the right… to respond to serious cyber attacks with an appropriate proportional an justified military response.” – DepSecDef Lynn,Inside Cyber Warfare p.273 International law makes response difficult and sensitive Asset-seizing, monitoring Foreign espionage vs. Sensitive personnel GhostNet U.S. Intelligence Community highly suspects GhostNet to be Chinese government

The Bombs Bursting in… Binary? State – State Some state-sponsored organizations that engage civilians can also engage states; the difficulty being the “return address problem” Ambiguity halts any linkage between state and non-state actor sponsorship; therefore forbidding war based on international law State vs. Iran (StuxNet) Either Israel or U.S. implanted a worm in Iranian nuclear-facilities United States vs. Libya U.S. discussed using cyber-attacks to cripple Libyan infrastructure

Evolution of War Most Dangerous Cyber Attacks Modernized countries are most vulnerable to these attacks The Need to Evolve For security to be more effective, offensive advancements necessitate defensive advancements Over last 5 years, 650% increase in security breaches...USGAO Report to Congressional Committees

Game Theory Matrix Attack~Attack US Construct Defense_+_+ _ + US ~ Construct Defense + _ Status 0 0 Quo European Commission estimates a 10-20% probability that in the next 10 years IT industry will experience a major breakdown resulting in a global economic cost exceeding $250B NSA requested $5.2B to construct USCYBERCOM “ to meet the NSA’s continually evolving requirements….”

“The [Center for Strategic and International Studies Commission’s] three major findings are: (1) cybersecurity is now a major national security problem for the United States; (2) decisions and actions must respect privacy and civil liberties; and (3) only a comprehensive national security strategy that embraces both the national and international aspects of cybersecurity will make us more secure.” -Securing Cyberspace for the 44 th Presidency: A Report of the CSIS Commission on Cybersecurity for the 44 th Presidency