Information Warfare - 11 Introduction and Preparing for Attacks
Information Warfare - 12 Purpose of the Course This course is concerned with strategy and tactics as applied to the defense of information. The focus of the course is defending computer networks and hosts against attack, including both recognition and response to attacks.
Information Warfare - 13 Texts Know Your Enemy, Honeynet Project (Enemy) The Art of War, Sun Tzu (Griffith Translation), or use text from Internet: (Sun)
Information Warfare - 14 Grading 20% (each) two graded homeworks 60% Final Paper (Topic related to Information Warfare, Submit paragraph-length proposal by 4/20) Joint work to understand allowed Work for submission is to be individual unless otherwise approved
Information Warfare - 15 Preparing for Conflict Sun Tzu said: The art of war is of vital importance to the State. It is a matter of life and death, a road either to safety or to ruin. Hence it is a subject of inquiry which can on no account be neglected. Why information warfare?
Information Warfare - 16 Information Warfare “Information warfare is the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary's information, information-based processes, information systems, and computer-based networks while protecting one's own. Such actions are designed to achieve advantages over military or business adversaries.” Dr. Ivan Goldberg
Information Warfare - 17 The Theory: Models C2 / Counter C2 Five Pillars ObserveAct Plan Evaluate ConcealFrustrate Misdirect Confuse Security DeceptionDestructionPsychological Warfare Command and Control
Information Warfare - 18 Aspects of Conflict Moral Law Heaven Earth Commander Method and Discipline
Information Warfare - 19 Moral Law Tau Morale or Purpose Attractiveness or Charisma of Leaders or of Purpose
Information Warfare Heaven Times and Seasons Occasion Weather Pacing and Scheduling of attack
Information Warfare Earth The battlefield The network –Services –Defenses –Users/Clients –Defenders/Administrators
Information Warfare Commander Personality Skills Preparation Motivation Reward
Information Warfare Method and Discipline Tools Procedures / Strategy Care in application / Reserves Preparation Assessment Follow-up
Information Warfare Circumstances Attack-aiding circumstances –Defender inattention –Window of vulnerability –Instability Attack-inhibiting circumstances –Instability –Defender focus –Distraction
Information Warfare Examples of Information Warfare Zapatista Information Strike India/Pakistan Kashmir Cyber Conflict Stuxnet device-control Strike Copyright infringement legal maneuvers Phishing / Sting operations
Information Warfare Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.”
Information Warfare Deception in Information Warfare Concealing intent of attack Concealing extent of attack Concealing methods of attack Concealing methods of defense Concealing objects of attack
Information Warfare Facing the Enemy “Hold out baits to entice the enemy. Feign disorder and crush him. If he is secure at all points, be prepared for him. If he is in superior strength, avoid him. If you opponent is of choleric temper, seek to irritate him. Pretend to be weak, that he may grow arrogant. If he is taking his ease, give him no rest. If his forces are united, separate them. Attack him where he is unprepared, appear where you are not expected. These military devices, leading to victory, must not be divulged beforehand.”