160 likes | 393 Views
Cyber-warfare/terrorism. “Our foes have extended the fields of battle – from physical space to cyberspace.” P resident Clinton, 22 May 1998. András Ádám, 2012. Definitions. Information warfare Collect tactical informations Spread propaganda, disinformation psychological
E N D
Cyber-warfare/terrorism “Our foes have extended the fields of battle – from physical space tocyberspace.” President Clinton, 22 May 1998 András Ádám, 2012.
Definitions • Information warfare • Collect tactical informations • Spread propaganda, disinformation psychological • Undermine opposing force’s information gathering • Hijacking or jamming transmissions (radio, TV) • Spoof or disable communciation networks • Economical intervention (stock exchanges) • Delay logistic networks • „Denning’s Description: (Dorothy Denning, expert) “Information warfare consists of offensive and defensive operationsagainst information resources of a ‘win-lose’ nature.” “Information warfare is about operations that target or exploit information resources.”
Definitions • Cyber warfare – a form of information warfare • „politically motivated hacking to conduct sabotage and espionage” • „actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.” /Richard A. Clarke 2010/ • Motvation: military-political, civil, private sector • Incidents: U.S water pump (2011), drone controls (2011), CBI (Central Bureau of Investigation, India) • Cybercrime: economic motivations
Cyber Warfare Depth It is just general, even Conventional Warfare can reach social levels, but even economic is not usual.
Definitions • Cyberterrorism • „the use of Internet based attacks in terrorist activities” • Narrow definition: traditional terrorism – attacks against property or lives (physical, real-world harm) • Broad definition: "The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.„ • Does it exist at all?
Cyberterrorism • =/= Internet and terrorism! • That is only their presence on the Internet • Cyberterrorism is a part of it, a way how they use it • 3 levels: • Simple – Unstructured • Advanced – Structured • Complex – Coordinated • Anonimity • Speed of development • “the use of computer network tools to shut down critical national infrastructures (e.g., energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” /CSIS/
Weapons • EMP and HERF • Electromagnetic Pulse (EMP), High-Energy Radio Frequency (HERF) destroy computers, erase data • HERF is not permanent, EMP is • Heat, mechanical, electrical energy • Viruses, malicious codes, trojans and worms • “Two decades ago, an expert warned about Internet agents, including bots (robots), Web crawlers, Web spiders, and Web scutters, software apps that traverse the Internet while undertaking repetitive tasks, such as retrieving linked pages, specified words or phrases, or e-mail addresses.”
Cyber attacks and International Law • „Governments and critical infrastructures rely increasingly on network computing technologies and are thus ever more vulnerable to cyber-attacks. Responding to such attacks - whether through diplomatic or economic sanctions, cyber-counterattack, or physical force - raises legal questions. International customary law is not yet fully formed on this issue, but the UN Charter and the laws of armed conflict establish certain baseline rules. Countries with a stake in evolving legal standards for the use of force in information operations should be prepared to make hard choices. Such countries should aim not only to preserve their own security, but also to set legal precedents that balance the need to use a new kind of force against the considerable, untested risks of doing so.”
Conclusion • Developing technology seems to be too fast • Attackers are always a step ahead • Anonimity helps it improving and spreading • Increasing use of the Internet it will affect civilians • National and local defense • No mutual international reaction • Not even clear definitions yet
Sources • Andy O’Donell’s collection of links: http://netsecurity.about.com/od/newsandeditorial1/u/Fight-Cybercrime.htm#s3 • CYBER WARFARE/CYBER TERRORISMbyLieutenant Colonel Timothy F. O’Hara - United States Army • Wikipedia entries: Cyber warfare, Information warfare, Cyber terrorism, Terrorism and Internet • NATO on Cyberterrorism: http://www.nato.int/structur/library/bibref/cyberterrorism.pdf