Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of Cyber Warfare
Spamhaus vs CyberBunker
The Unknowns vs?
First worm invented
America holds "Eligible Receiver", a cyberwar game with the NSA representing North Korea
Feb., Solar Sunrise, an attack on US DoD, pilfering data from 500 systems. The attacks seem to come from servers around the world.
Information security brought to light by CIA director; US spy chief refers publicly to the threat of a cyber attack for the first time.
Attacks on US government websites, eventually traced to China. Designated Titan Rain and ongoing to present date. 2003
Politically motivated hacking by or against a nation-state to conduct sabotage or espionage
-War of Israel vs. Hezbollah, IDF alleges cyberattacks were carried out by several countries in the Middle East using Russian hackers.
-US announces CYBERCOM*
-Operation Shady RAT begins and hits at least 72 organizations.
April: Estonian ministries, backs and media targeted by Cyber attacks coming from Russian servers, as a reaction to the relocation of the Bronze Soldier of Tallinn.
Sept.: It came to speculation that Israel must have used Cyber warfare to carry out the airstrike on Syria. The Israeli planes were not detected by radar as they passed into Syria.
DoS attacks carried out against Kyrgyz ISPs. During election campaign, the Kyrgyz Central Election Commission website was hacked. Message left: "This site has been hacked by Dream of Estonian organization"
August: Cyberattacks hijack commercial and government websites in Georgia during conflict with Russia
Offensive Cyberspace Operations
A global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. (JP 3-12)
Cyberspace operations intended to project power by the application of force in or through cyberspace. Also called OCO. (JP 3-12)
Any natural or man-made incident,
attack, power grid failure, and terrorism, which results in cascading failures of multiple, interdependent, critical, life-sustaining infrastructure sectors and caused extraordinary levels of mass casualties, damage, or disruption severely affecting the population, environment, economy, public health, national morale, response efforts, and/or government functions. (DepSecDef Memo OSD001185-13)
(as of March 25th, 2013)
is characterized as a violent struggle for domination between nation-states or coalitions and alliances of nation-states...against each other in all physical domains as well as the information environment (which
* 9ec4c12949a4f31474f299058ce2b22a (MD5 Encryption)
"This form of warfare is
violent struggle among state and non-state actors
for legitimacy and influence over the relevant population(s). This form is labeled as irregular in order to highlight its non-Westphalian context. The strategic point of IW is to
gain or maintain control or influence
over, and the support of, a relevant population."
(War) Historian John Keegan
In “A History of Warfare” he divides the evolution of combat into stages: stone, flesh, iron and fire.
"offered that war is a universal phenomenon whose form and scope is defined by the society that wages it."
Historian John Keegan
Does the evolution stop there?
Dependance on Cyberspace
With an increase in cyberspace use greater power is held by fewer individuals.
Stuxnet believed to have been developed by the United States and Israel attack a uranium enrichment facilities in Iran
Arsenal in Cyber Warfare
Blue Boxing Programs
Network Security Scanning Tools
(distributed) denial-of-service attack
Defense Advanced Research Projects Agency (DARPA) initiates research program to investigate technologies for linking computer networks.
SYN Flooding Attacks become popular (type of DoS Attack)
March: Idaho National Laboratories secretly conducts the "Aurora Generator Test"
China vs USA
Israel vs Syria
Georgia vs Russia
USA vs Iran
China vs Google
Anonymous vs MasterCard
TeaMp0isoN vs Panasonic
@DeadMellox vs FxTraders.eu
Kosova Hacker's Security vs
OTE (Greek Telcom company)
(well you know just about everyone they don't agree with) Corporations, Individuals, Groups, Nation States
the European Space Agency
U.S. Air Force
@AnonNyre vs Anonymous
Tunisian Cyber Army vs
First National Bank
Israel vs Iran
China vs India
USA vs Russia
Open internet killing legislation
Software oriented corrections
How does our Cyber society now define war?