Download presentation
Presentation is loading. Please wait.
Published byNorah McKinney Modified over 9 years ago
1
Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011
2
Terrorism - FBI “The unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”
3
Terrorism - DOD “The unlawful use of, or threatened use, of force or violence against individuals or property, to coerce and intimidate governments or societies, often to achieve political, religious or ideological objectives”
4
Terrorism - DOS “Premeditated, politically motivated violence perpetrated against noncombatant targets by sub national groups or clandestine agents”
5
FBI - Terrorism Descriptions Domestic or Foreign “Depending on the origin, base, and objectives of the terrorist organization.” Terrorist Activities Incident “A violent act or an act dangerous to human life, in violation of the criminal laws of the United States, or of any state, to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” Prevention “A documented instance in which a violent act by a known or suspected terrorist group or individual with the means and a proven propensity for violence is successfully interdicted through investigative activity.” Domestic or Foreign “Depending on the origin, base, and objectives of the terrorist organization.” Terrorist Activities Incident “A violent act or an act dangerous to human life, in violation of the criminal laws of the United States, or of any state, to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” Prevention “A documented instance in which a violent act by a known or suspected terrorist group or individual with the means and a proven propensity for violence is successfully interdicted through investigative activity.”
6
More on Terrorism Political in nature Smaller weaker group vs. larger group No legitimate means of protest Violence against civilians Symbolic targets Designed to provoke response Aimed at larger audience Political in nature Smaller weaker group vs. larger group No legitimate means of protest Violence against civilians Symbolic targets Designed to provoke response Aimed at larger audience
7
What Makes a Terrorist? A disaffected individual An enabling group A legitimizing ideology A disaffected individual An enabling group A legitimizing ideology
8
Terrorist Goals Leadership Long-term goals Political change Leadership Long-term goals Political change Followers Short-term goals Revenge Renown Reaction
9
Terrorism Matrix People (or groups) Locations (of perpetrators, facilitators, victims) Methods/modes of action Tools Targets Affiliations Motivations People (or groups) Locations (of perpetrators, facilitators, victims) Methods/modes of action Tools Targets Affiliations Motivations
10
Terrorism Matrix I
11
Cyber Terrorism "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents” FBI "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents” FBI
12
Is Cyber Terrorism Really Terrorism?
13
Terrorist Matrix II
14
Worst Cyber Terrorism Attack to Date September 11, 2001
15
Cyber Terrorism - Dynamics Three types of attacks Physical Conventional Weapons Syntactic Malware Semantic More subtle approach Errors & unpredictable results Attack user’s confidence in the system Three types of attacks Physical Conventional Weapons Syntactic Malware Semantic More subtle approach Errors & unpredictable results Attack user’s confidence in the system
16
Cyber Terrorism - Steps Reconnaissance Gain detailed information about target Social engineering, dumpster diving Scanning Determine targets computer software & network organization Gaining access Take over the target Stolen passwords, network vulnerabilities Reconnaissance Gain detailed information about target Social engineering, dumpster diving Scanning Determine targets computer software & network organization Gaining access Take over the target Stolen passwords, network vulnerabilities
17
Cyber Terrorism - Steps cont. Maintaining access Allow further access Rootkits and backdoors Covering tracks Maintain control Gather further intelligence Maintaining access Allow further access Rootkits and backdoors Covering tracks Maintain control Gather further intelligence
18
Cyber Terrorism - Potential Effects Targets Water supplies Electrical power supplies Emergency services Telecommunications systems Transportation systems Banking & financial systems Government Targets Water supplies Electrical power supplies Emergency services Telecommunications systems Transportation systems Banking & financial systems Government
19
Countering Cyber Terrorism Raise security levels in the private sectors Communication & coordination systems in the private sector Communication & coordination systems in government Establish emergency response plans Promote research & development Add & revise legislation Promote international cooperation Raise security levels in the private sectors Communication & coordination systems in the private sector Communication & coordination systems in government Establish emergency response plans Promote research & development Add & revise legislation Promote international cooperation
20
How Terrorist Use the Internet Propaganda Recruitment Information storage Communications Funding Propaganda Recruitment Information storage Communications Funding
21
Terrorist Web Sites
22
Google Maps
23
Cyberwarfare “The use of computers and the Internet in conducting warfare in cyberspace”
24
AttackTarget CategoryTarget Sub-CategoryAttacker* Siberian Pipeline Explosion ResourcesPhysical DamageUnited States Kosovo WarResourcesDisruptionUnited States Moonlight MazeDataEspionage (Intelligence) Russia Hainan Spy PlaneResourcesDisruptionChina Titan Rain (China)DataEspionage (Intelligence) China EstoniaResourcesDisruptionRussia Israel vs. Syrian Missile Defense ResourcesDisruptionIsrael South Ossetia War (Georgia) ResourcesDisruptionRussia Israel vs. HamasResourcesDisruptionIsrael & Hamas GhostNetDataEspionage (Intelligence) China North KoreaResourcesDisruptionNorth Korea Operation AuroraDataEspionage (Intellectual Property) China Stuxnet Worm (Iran)ResourcesPhysical DamageIsrael (U. S.)
25
Cyberwarfare Questions Will we know who did it? Can retaliators hold assets at risk? Can they do so repeatedly? Can cyberattacks disarm cyberattackers? Will third parties stay out of the way? Might retaliation send the wrong message? Can states set thresholds for response? Can escalation be avoided? Will we know who did it? Can retaliators hold assets at risk? Can they do so repeatedly? Can cyberattacks disarm cyberattackers? Will third parties stay out of the way? Might retaliation send the wrong message? Can states set thresholds for response? Can escalation be avoided?
26
Most likely use of cyber terrorism, and cyber warfare In tandem with a physical attack.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.