Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of Cyber Warfare
Requires little to no physical action Disrupt communications
Cause physical damage History 1997 Worcester, Mass- teenager disrupts air traffic communications 2000 Queensland, Australia- Man hijacks wast water-treatment system, releases raw sewage into streams and parks. 2009- Robert Gates declares cyberspace "fifth domain" of military operations Practical Use Espionage
Sabotage of Key infrastructure Espionage Pentagon systems are probed 250,000 times per hour Department of defense contains 15,000 networks and 7 million devices that are attacked 6 million times per day Memory sticks allow viruses to spread to classified and unclassified systems Botnets 130 billion spam messages are sent per day, Botnets are responsible for 92% Denial of service attacks- causes networks to be unable to function used by cyber vigilantes such as Anonymous Creation Malicious websites
e-mailed links MPack Shadow Nordin Nasiri, 19, gained control of 150,000 computers and sold the botnet, Shadow, for 25,000 euros Stuxnet Symantec estimates dozens of US cases A number of Canadian energy companies infected Complicated virus spread by USB, made to target Iranian centrifuges Industrial targets 2007- Project Aurora 5,000 horsepower diesel engine 2009- nuclear power plant, Mariposa virus infeced 100 computers USB Viruses Control Computers Effect on Commerce Meant to be run "behind brick walls" Analyze data from sensors and send to desktops
Open and shut water pipes
Regulate natural gas flow
Manage chemical production
Run data centers
Manage power plant turbines
Operate commuter trains SHODAN "This means that these delicate [control computers] are potentially reachable from the Internet by malicious and skilled adversaries," Department of Homeland Security paper, 2010. Outdated technology Cyber attacks are causing "the greatest transfer of wealth in history" Keith Alexander, Director of Oversees U.S. Cyber Command Monetary theft Credit card numbers, financial information Intellectual theft Blueprints, research, classified information South Korea Computer systems of 3 TV stations and a number of financial institutions shut down for as long as 7 hours March13, 2013 Saudi Arabia 2012 Saudi Aramco, national oil company,
data on 30,000 computer systems was destroyed "We created a new military command, to conduct a new kind of high-tech war, without public debate, media discussion, serious congressional oversight, academic analysis, or international dialogue." Richard Clarke, presidential adviser and author of Cyber War Obama's pursuit of cyber security "will not include - I repeat, will not include - monitoring private sector networks or internet traffic" Watch and Warn National Cybersecurity and Communications Integration Center (NCCIC) FBI, DOD, NSA 4 other key watch centers run by Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Department of Homeland Security Einstein II system United States Cybersecurity "We're the most vulnerable. We're the most connected. We have the most to lose." Mike McConnell, director of national intelligence 2007-2009 Pentagon Cyber command will add 13 offensive teams by fall 2015 Around the world At least 20 nations have advanced cyberwar programs Germany, Britain, Estonia and Iran More than 100 countries have some "cyberconflict prowess" Multiple nations "have the capability to conduct sustained, high-end cyberattacks against the US," Conclusion Possible: yes
Probable: no "It is unlikely that there will ever be a true cyberwar." Breaks conventional conflict Virtually anyone with money and skill could do it politically motivated hacking to conduct sabotage and espionage Hackers Breaching U.S. Military Systems Attack believed to be perpetrated by Chinese hackers reveals information on 24 military systems including: F-35 Joint Strike Fighters
Black Hawk Helicopters
F/A- 18 Fighter Jets
Aegis Ballistic Missile Defense System At this time the U.S. is poorly equiped to deal with cyber conflict All out Cyber war? U.S. Readyness