1 / 14

Cyber-warfare/terrorism

Cyber-warfare/terrorism. “Our foes have extended the fields of battle – from physical space to cyberspace.” P resident Clinton, 22 May 1998. András Ádám, 2012. Definitions. Information warfare Collect tactical informations Spread propaganda, disinformation  psychological

rafer
Download Presentation

Cyber-warfare/terrorism

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber-warfare/terrorism “Our foes have extended the fields of battle – from physical space tocyberspace.” President Clinton, 22 May 1998 András Ádám, 2012.

  2. Definitions • Information warfare • Collect tactical informations • Spread propaganda, disinformation  psychological • Undermine opposing force’s information gathering • Hijacking or jamming transmissions (radio, TV) • Spoof or disable communciation networks • Economical intervention (stock exchanges) • Delay logistic networks • „Denning’s Description: (Dorothy Denning, expert) “Information warfare consists of offensive and defensive operationsagainst information resources of a ‘win-lose’ nature.”    “Information warfare is about operations that target or exploit information resources.”

  3. Definitions • Cyber warfare – a form of information warfare • „politically motivated hacking to conduct sabotage and espionage” • „actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.” /Richard A. Clarke 2010/ • Motvation: military-political, civil, private sector • Incidents: U.S water pump (2011), drone controls (2011), CBI (Central Bureau of Investigation, India) • Cybercrime: economic motivations

  4. Cyber Warfare Depth It is just general, even Conventional Warfare can reach social levels, but even economic is not usual.

  5. Offensice Cyber Warfare Operations

  6. Defensive Cyber Warfare Operations

  7. Definitions • Cyberterrorism • „the use of Internet based attacks in terrorist activities” • Narrow definition: traditional terrorism – attacks against property or lives (physical, real-world harm) • Broad definition: "The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.„ • Does it exist at all?

  8. Cyberterrorism • =/= Internet and terrorism! • That is only their presence on the Internet • Cyberterrorism is a part of it, a way how they use it • 3 levels: • Simple – Unstructured • Advanced – Structured • Complex – Coordinated • Anonimity • Speed of development • “the use of computer network tools to shut down critical national infrastructures (e.g., energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” /CSIS/

  9. The 3 levels

  10. Weapons • EMP and HERF • Electromagnetic Pulse (EMP), High-Energy Radio Frequency (HERF)  destroy computers, erase data • HERF is not permanent, EMP is • Heat, mechanical, electrical energy • Viruses, malicious codes, trojans and worms • “Two decades ago, an expert warned about Internet agents, including bots (robots), Web crawlers, Web spiders, and Web scutters, software apps that traverse the Internet while undertaking repetitive tasks, such as retrieving linked pages, specified words or phrases, or e-mail addresses.”

  11. Cyber attacks and International Law • „Governments and critical infrastructures rely increasingly on network computing technologies and are thus ever more vulnerable to cyber-attacks. Responding to such attacks - whether through diplomatic or economic sanctions, cyber-counterattack, or physical force - raises legal questions. International customary law is not yet fully formed on this issue, but the UN Charter and the laws of armed conflict establish certain baseline rules. Countries with a stake in evolving legal standards for the use of force in information operations should be prepared to make hard choices. Such countries should aim not only to preserve their own security, but also to set legal precedents that balance the need to use a new kind of force against the considerable, untested risks of doing so.”

  12. Conclusion • Developing technology seems to be too fast • Attackers are always a step ahead • Anonimity helps it improving and spreading • Increasing use of the Internet  it will affect civilians • National and local defense • No mutual international reaction • Not even clear definitions yet

  13. Sources • Andy O’Donell’s collection of links: http://netsecurity.about.com/od/newsandeditorial1/u/Fight-Cybercrime.htm#s3 • CYBER WARFARE/CYBER TERRORISMbyLieutenant Colonel Timothy F. O’Hara - United States Army • Wikipedia entries: Cyber warfare, Information warfare, Cyber terrorism, Terrorism and Internet • NATO on Cyberterrorism: http://www.nato.int/structur/library/bibref/cyberterrorism.pdf

  14. Thank you for your attention!

More Related