Cyber-warfare/terrorism - bimun

murmerlastΠολεοδομικά Έργα

16 Νοε 2013 (πριν από 3 χρόνια και 7 μήνες)

79 εμφανίσεις

CYBER
-
WARFARE/TERRORISM

“Our foes have extended the fields
of battle


from physical space to

cyberspace.”


P
resident Clinton, 22 May

1998

András Ádám, 2012.

Definitions


Information warfare


Collect tactical informations


Spread propaganda, disinformation


psychological


Undermine opposing force’s information gathering



Hijacking

or
jamming

transmissions (radio, TV)


Spoof or disable communciation networks


Economical intervention (stock exchanges)


Delay logistic networks




Denning’s Description: (
Dorothy Denning
, expert)

“Information warfare consists of offensive and defensive
o
perations

against information resources of a ‘win
-
lose’ nature.”



“Information warfare is about operations that target or exploit
information resources.”

Definitions


Cyber warfare


a form of information warfare



politically motivated hacking
to conduct sabotage

and
espionage




actions by a nation
-
state to penetrate another nation's
computers or networks for the purposes of causing
damage or disruption.
” /Richard A. Clarke 2010/


Motvation:
military
-
political, civil, private sector


Incidents:

U.S water pump (2011), drone controls
(2011), CBI (Central Bureau of Investigation, India)


Cybercrime:

economic motivations


Cyber Warfare Depth

It is just general, even Conventional Warfare can
reach social levels, but even economic is not usual.

Offensice Cyber Warfare Operations

Defensive Cyber Warfare Operations

Definitions


Cyberterrorism



the use of Internet based attacks in terrorist activities



Narrow definition: traditional terrorism


attacks
against property or lives (physical, real
-
world harm)


Broad definition:
"The premeditated use of disruptive
activities, or the threat thereof, against computers
and/or networks, with the intention to cause harm or
further social, ideological, religious, political or similar
objectives. Or to intimidate any person in furtherance
of such objectives.„


Does it exist at all?


Cyberterrorism


=/= Internet and terrorism!


That is only their presence on the Internet


Cyberterrorism is a part of it, a way how they use it


3 levels:


Simple


Unstructured


Advanced


Structured


Complex


Coordinated


Anonimity


Speed of development


“the use of computer network tools to shut down critical
national infrastructures (e.g., energy, transportation,
government operations) or to coerce or intimidate a
government or civilian population.”

/CSIS/

The 3 levels

Weapons


EMP and HERF


Electromagnetic Pulse (EMP), High
-
Energy Radio Frequency
(HERF)


destroy computers, erase data


HERF is not permanent, EMP is


Heat, mechanical, electrical energy


Viruses, malicious codes, trojans and worms


“Two decades ago, an expert warned about Internet
agents, including bots (robots), Web crawlers, Web
spiders, and Web
scutters
, software apps that traverse
the Internet while undertaking repetitive tasks, such as
retrieving linked pages, specified words or phrases, or
e
-
mail addresses.”


Cyber attacks and International Law



Governments and critical infrastructures rely increasingly on
network computing technologies and are thus ever more
vulnerable to cyber
-
attacks. Responding to such attacks
-

whether through diplomatic or economic sanctions, cyber
-
counterattack, or physical force
-

raises legal questions.
International customary law is not yet fully formed on this issue,
but the UN Charter and the laws of armed conflict establish
certain baseline rules. Countries with a stake in evolving legal
standards for the use of force in information operations should
be prepared to make hard choices. Such countries should aim
not only to preserve their own security, but also to set legal
precedents that balance the need to use a new kind of force
against the considerable, untested risks of doing so.



Conclusion


Developing technology seems to be too fast


Attackers are always a step ahead


Anonimity helps it improving and spreading


Increasing use of the Internet


it will affect civilians


National and local defense


No mutual international reaction


Not even clear definitions yet


Sources


Andy O’Donell’s collection of links:


http://netsecurity.about.com/od/newsandeditorial1/u/
Fight
-
Cybercrime.htm#s3


CYBER WARFARE/CYBER TERRORISM

by

Lieutenant
Colonel Timothy F. O’Hara

-

United States Army


Wikipedia entries: Cyber warfare, Information warfare,
Cyber terrorism, Terrorism and Internet


NATO on Cyberterrorism:


http://www.nato.int/structur/library/bibref/cyberterro
rism.pdf

Thank you
for your
attention!