1 / 10

Information Warfare

Information Warfare. By Garrison Hunter & Chris Cassidy. Introduction. Information warfare was invented by Cesar during his reign. He invented the Cipher. He would send his strategic plans to lords or generals encoded with his Cipher and they would have the decryption key.

river
Download Presentation

Information Warfare

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Warfare By Garrison Hunter & Chris Cassidy

  2. Introduction • Information warfare was invented by Cesar during his reign. He invented the Cipher. He would send his strategic plans to lords or generals encoded with his Cipher and they would have the decryption key. • Other devices of encryption created since then are the Cryptex and the Scytale.

  3. Encryption Methods • Codes are encrypted using programs called ciphers that can do a number of things like: • Scrambling letters with others in alphabet. • Replacing them with numbers. • Using phrases as keys for letters meanings.

  4. Information Warfare Today • United States has NSA (National Security Agency) and DOD (Department of Defense) as main cyber warfare branches of government. • Decrypt and capture enemy intelligence and safeguard operatives and other intelligence.

  5. Cyber Terrorism • Identity theft, cracking, creating viruses and the like are all forms of cyber terrorism. • Al Qaeda is training computer terrorists. Its cost effective, they can be educated over here and operate anywhere in the world effectively. • Examples:2003 operatives were caught with laptops containing intelligence on power grid and hydroelectric dam schematics.

  6. Al Qaeda • Laptops seized after Al Qaeda operatives were captured in 2003. Laptops contained sensitive material about SCADA systems. • Training people to be competent with computers is cost effective. • Many of their operatives get educated in the United States and either go home or get employed in the U.S. where they can do the most damage. • Khalid Sheikh Mohammed: Studied at University of North Carolina and went back to Qatar and was employed by their Water Ministry. • Student at the University of Idaho was arrested for connections to Al Qaeda. Working on PhD in Cyber Security.

  7. Patriot Act • Allows government to monitor all of your communications if suspected of terrorist acts. • Allows government to check confidential records such as medical, library, and religious without your knowledge or consent.

  8. Identity Theft • Tips for avoiding identity theft: • Use at most only 2 credit cards, • Don’t use a debit card, • Be very careful with your SSN, • Be careful where you shop online, • Don’t use checkbooks, • Don’t give out personal information to people online,

  9. Worms, Viruses and Trojan Horses • Tips for avoiding these: • Avoid pornographic sites, • Avoid clicking on spam e-mails, • Install open source software like Firefox, • Install firewalls on your computer, • Invest in programs like Spyware Stormer or Black Ice. • Examples of current dangerous programs: • PWS-MM Thief, Trojan Horse, steals your computer password. • BackDoor-CMQ!394bbed6, Trojan Horse, installs a backdoor on your computer. • W32/RAHack!7efec6d0, Worm, takes control of remote administration programs by allowing remote access. • W32/HLLP.Philis.bs, Virus, installs password stealing Trojans from various websites.

More Related