INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.

Slides:



Advertisements
Similar presentations
Air Force Doctrine Document 2-5.1: Electronic Warfare
Advertisements

® Iraq Intel/InfoOps Assessment & Summary of Joint Lessons Learned Robert David Steele Updated 24 October 2003.
Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Physical Attack IW-140 College of Aerospace Doctrine, Research, and Education.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
Overview An emerging challenge A belated response Debating the alternatives – Air-Sea Battle – A distant blockade – Maritime denial Conclusions.
Sensors and location technologies – the front end of ISR
Defense Daily Open Architecture Summit EMS Panel
Introduction to Information Operations Attaché Corps- SEP 09
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview.
Electronic Warfare Counter-measures
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Information Warfare Theory of Information Warfare
INFORMATION WARFARE Information is not a new component to conflict. The Information Age, however, has ushered in extraordinary improvements in collection,
TLO 2: Action: Plan operational security. Intermediate-level training.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Information Warfare - 11 Introduction and Preparing for Attacks.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Handling Security Incidents
Chapter 16 Electronic and Information Warfare. Basics Electronic Attack Deception Soft Kill/Hard Kill Electronic protection Electronic Support.
Cyber-Warfare: The Future is Now!
C4ISR and Information Warfare
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
CSCE 727 Strategic Information Warfare. National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Warfare Playgrounds to Battlegrounds.
Information Systems Security Operations Security Domain #9.
Information Warfare Midterm Overview. Lectures Covered Everything until (including) March 2 nd Reading: – All lecture slides – Denning book: Chapters.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
C4ISR and Information Warfare Naval Weapons Systems.
Malicious Code as Weapon Malicious Code as Weapon.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Chap1: Is there a Security Problem in Computing?.
UNCLASSIFIED//FOR OFFICIAL USE ONLY National Reconnaissance Office Overview UNCLASSIFIED//FOR OFFICIAL USE ONLY.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Engaging the Adversary as a Viable Response to Network Intrusion Sylvain P. Leblanc & G. Scott Knight Royal Military College of Canada PST 05 Workshop.
Information Warfare Playgrounds to Battlegrounds.
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
Warfare Communities of the Fleet and Marine Forces
By CPT Robert L. Crabtree
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
1. Definition : Malicious code refers to a program that is covertly inserted into another program with the intent to Malicious activities. 2.
WARFARE COMMUNITIES OF THE FLEET AND MARINE FORCES.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
What is Cyber Security Cyber War Cyber Power?
“Existing world order is being redefined.” Henry Kissinger Jan 2015
The Russian Way of War TEFOR G-27
Panel Discussion: C4I Solutions for Combating
Securing Information Systems
Electronic Warfare.
Home Internet Vulnerabilities
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Presentation transcript:

INFORMATION WARFARE

What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications networks and to destroy, neutralise or exploit the enemy’s similar capabilities within the physical, information and cognitive domains.” Maj. Gen. Brazzoli “All actions taken to defend the military’s information-based processes, information systems and communications networks and to destroy, neutralise or exploit the enemy’s similar capabilities within the physical, information and cognitive domains.” Maj. Gen. Brazzoli – SANDF Vision 2020 “Offensive and defensive operations against information resources of a "win- lose" nature. It is conducted because information resources have value to people. Offensive operations aim to increase this value for the offence while decreasing it for the defence. Defensive operations seek to counter potential losses in value.” Dorothy Denning – Information Warfare & Security

What is Information Warfare? Winn Schwartau: Class I: Personal IW Class II: Corporate IW Class III: Global IW Cronin & Crawford: Personal IW Corporate / economic IW Community / social IW ■ □ ■ ■ □ □ □ □ ■

Information Warfare Functional areas

Information operations construct Intelligence, Surveillance & Reconnaissance (ISR) Precision Navigating & Positioning Other Information Collection and Dissemination Activities GainExploit PSYOPs EW Military Deception Physical Attack Information Attack Information Assurance OPSEC TRANSEC Counter Intelligence Counter PSYOP Electronic Protection Counter Deception AttackDefend Adapted from US Air Force

Stage 6: Reconstruction Stage 5: Combat (Precision and Info Weapons, EW) Stage 4: Military Posturing (Deception) Stage 3: Economic Pressure (Economic Information Warfare) Stage 2: Diplomatic Pressure (PSYOPS, Perception Management) Stage 1: Intelligence Gathering (Protection, Exploitation, Hacker War) Pre-HostilitiesPost-Hostilities Stages of Information warfare Adapted from (Jones, Kovacich & Luzwick, 2002)

Information Warfare Threats – US Air Force Compromise Deception/ Corruption Denial/ Loss Destruction Malicious Code System Intrusion Psychological Ops Intel Collection Technology Transfer Software Bugs Malicious Code System Intrusion Military Deception Spoofing Imitation Malicious Code System Intrusion Lasers Physical Attack EMP Virus Insertion System Overload Radio Frequency Jamming Malicious Code Bombs Directed Energy Weapons Lasers Physical Attack EMP Biological & Chemical Warfare Information Warfare threats

Electronic Support Electronic Attack Electronic Protection Electronic Warfare Ew vs nw

Computer Network Support Computer Network Attack Computer Network Defence Network Warfare Ew vs nw

EWNW Disrupt / Deny / Destroy Radio Frequency Jamming Anti-Radiation Missile Low Observability Technology Denial of Service Attack Physical Destruction Delete Information Firewalls Exploit Signals Intelligence Communications Intelligence Electronic Intelligence Identification Friend of Foe Sniffers Scanners Backdoors Intrusion Detection Systems Corrupt Chaff Flares Low Observability Technology Honey pots Honey nets Root-kits Malware

1. Identify Target 2. Identify GII & NII Interfaces 3. Research Nation’s Systems & Networks 4. Gather Intelligence Information 5. Identify Vulnerabilities 6. Covertly Probe & Test for Traps & Responses 7. Enter System, Locate & Transmit Sensitive Information to Safe Location 8. Probe for Other Systems and Networks 9. Probe Systems and Networks for Additional Information 10. Set Logic Bombs, Trap Doors, Delete Intrusion Evidence; Leave System 11. Search for Additional Target Systems and Networks; Repeat Steps Attack Systems and Networks During Conflict Network Warfare Attack Process Adapted from (Jones, Kovacich & Luzwick, 2002) Network warfare Attack

Network warfare defence Intrusions past first line of defence Defensive response Attack mounted Penetration detected Recovery Offensive response Threats VulnerabilityImpact Recovery & response Keep more attacks out: -Earlier and more accurate attack predictors -Fewer access points -Fewer weaknesses Reduce mission impact & damage: -Make defensive response earlier -Work-arounds -Resilient ConOps Continue operations -Real time information recovery and system reconfiguration -Deceive BDA Defence-in-Depth adds layers of defence & recovery at each stage Adapted from (Jones, Kovacich & Luzwick, 2002)

Critical infrastructure protection I nformation security protects corporate information and systems. What happens if the computers control infrastructure? Australian sewerage incident VIDEO: K1l9A&NR=1 K1l9A&NR=1

Incidents Solar Sunrise (1998) Moonlight Maze (1999)Russia? Titan Rain ( )China? Vodafone Greece ( ) Estonia (2007)Russia? Georgia (2008)Russia? Korea (2009) Twitter (2009) GhostNet ( )China? GhostNet 2.0 ( )China? Aurora/Google ( )China?

Media & web info wars NATO vs Serbia Afghanistan Gulf War 2 Wikileaks Israel / Palestine India / Pakistan Other Moldova Urumqi (China) Iran

Role of Whitehats / ethical hackers Computer Network Support: Penetration / vulnerability testing “Intelligence” & awareness support Information security / assurance

Future Information Warfare Mobile IW? Smartphones are mini-computers without the security Combining threats & vulnerabilities of internet, wireless & cell phones 4.1 billion mobile endpoints expected by 2014 ( Quantum computing?