CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!
CYBER SECURITYCYBER SECURITY Warfare v. espionage? State AND non-state actors Russian-Georgia War (2008) – Estonia removing the statue radical Islamic clerics in Britain “in a matter of time you will see attacks on the stock market”
RESPONSES Why are cyber attacks so difficult to deal with? What interests are at play? What actors are involved? Is cyber security a “new” threat?
NOTHING NEW UNDER THE SUNNOTHING NEW UNDER THE SUN Sources of power; economic wealth, military forces, ideas, and information Speed of communication WWII Allies broke German and Japanese codes 2003 Invasion of Iraq – Text messages Quantity of information – Accessibility becomes important
DIFFICULTIES Often unreported – Don’t want to frighten stockholders – unaware Actors are hard to track Expensive Offensive advantage
TYPES OF CYBER ATTACKSTYPES OF CYBER ATTACKS Botnet – Denial of service attack (DDOS) – Botmaster/botherder – Spam (please send me $$$ so I can repay you) “packet sniffers” – Data blocks = packages – Tracking those data for specific things (ex. passowords) – Argentinian guy breaking into DOD Naval Research Lab “IP Spoofing” – Not really at the IP address you think you are Worms/viruses – Trojan Horse
CYBERCRIME 2000 “ILOVEYOU” – Undergrad thesis project in Philippines – 45 million CPUs, $10B – Never charged with a crime TJ Maxx lost $130 M – Attacks from US, Ukraine, Belarus, Estonia, China 2010 US, UK, Ukraine – Zeus- getting bank account passwords ~$70M Almost all cyber crime are transnational
CYBER-ESPIONAGE NATO HQ attacked ~100X per day Moonlight Maze (US v. Russia 1999), Titan Rain (US v. China ~10 terabytes of data 2003) – These computers weren’t connected to the internet – “air gap” for US military = SIPRNET – Thumb drives/physical help to jump gap PRC as perpetrator
ARTICLE DISCUSSIONARTICLE DISCUSSION
MICHAEL ANTI (ZHAO JING)MICHAEL ANTI (ZHAO JING) ks/michael_anti_behind_ the_great_firewall_of_chi na.html (18 min. ) ks/michael_anti_behind_ the_great_firewall_of_chi na.html China’s internet policy is both international and domestic What are the outcomes of these policies? What kind of power is displayed in his story?
CYBER-TERRORISM How is the internet useful for terrorists? Communication Gathering information Money raising Attacking networks Is the internet a “good” place for a terrorist attack? Importance of spectacle?
CYBER WARCYBER WAR 1981, Soviet KGB “Farewell” started working for the French – US fed him bad technology intel Soviets were building a huge pipeline for natural gas – CIA tampered with it – Boom Does attribution matter when we talk about war?
WHAT TO DO?WHAT TO DO? How do you attack this security threat? Domestic efforts International efforts – Dual use technologies – Easy to hide – Privacy rights/ intellectual property rights