Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cyber Warfare

No description
by

Martin Valenzuela

on 10 July 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Warfare

Cyber
Groups
Corporations
Consequence
Nation States
System
Cyber
Caution!
Zombies
Ahead!
Spamhaus vs CyberBunker
Warfare
The Unknowns vs?
First worm invented
1971
1997
America holds "Eligible Receiver", a cyberwar game with the NSA representing North Korea
1973
Feb., Solar Sunrise, an attack on US DoD, pilfering data from 500 systems. The attacks seem to come from servers around the world.
1998
Information security brought to light by CIA director; US spy chief refers publicly to the threat of a cyber attack for the first time.
1998
Attacks on US government websites, eventually traced to China. Designated Titan Rain and ongoing to present date. 2003
2003
Cyber Warfare
History
Current Warfare
Useful Definitions/Terms:
Politically motivated hacking by or against a nation-state to conduct sabotage or espionage
-War of Israel vs. Hezbollah, IDF alleges cyberattacks were carried out by several countries in the Middle East using Russian hackers.
-US announces CYBERCOM*
-Operation Shady RAT begins and hits at least 72 organizations.
April: Estonian ministries, backs and media targeted by Cyber attacks coming from Russian servers, as a reaction to the relocation of the Bronze Soldier of Tallinn.
Sept.: It came to speculation that Israel must have used Cyber warfare to carry out the airstrike on Syria. The Israeli planes were not detected by radar as they passed into Syria.
DoS attacks carried out against Kyrgyz ISPs. During election campaign, the Kyrgyz Central Election Commission website was hacked. Message left: "This site has been hacked by Dream of Estonian organization"
August: Cyberattacks hijack commercial and government websites in Georgia during conflict with Russia
Offensive Cyberspace Operations
Cyberspace
A global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. (JP 3-12)
Cyberspace operations intended to project power by the application of force in or through cyberspace. Also called OCO. (JP 3-12)
Complex Catastrophe
Any natural or man-made incident,
including cyberspace
attack, power grid failure, and terrorism, which results in cascading failures of multiple, interdependent, critical, life-sustaining infrastructure sectors and caused extraordinary levels of mass casualties, damage, or disruption severely affecting the population, environment, economy, public health, national morale, response efforts, and/or government functions. (DepSecDef Memo OSD001185-13)
Traditional warfare
(as of March 25th, 2013)
is characterized as a violent struggle for domination between nation-states or coalitions and alliances of nation-states...against each other in all physical domains as well as the information environment (which
includes

cyberspace
).
* 9ec4c12949a4f31474f299058ce2b22a (MD5 Encryption)
Irregular Warfare
"This form of warfare is
characterized
as a
violent struggle among state and non-state actors
for legitimacy and influence over the relevant population(s). This form is labeled as irregular in order to highlight its non-Westphalian context. The strategic point of IW is to
gain or maintain control or influence
over, and the support of, a relevant population."
(War) Historian John Keegan
Realization:
In “A History of Warfare” he divides the evolution of combat into stages: stone, flesh, iron and fire.
"offered that war is a universal phenomenon whose form and scope is defined by the society that wages it."
Historian John Keegan
Does the evolution stop there?
Dependance on Cyberspace
With an increase in cyberspace use greater power is held by fewer individuals.
2006
2007
2007
2007
Stuxnet believed to have been developed by the United States and Israel attack a uranium enrichment facilities in Iran
2008
2010
Arsenal in Cyber Warfare
-(D)Dos
-Botnets
-Trojans/Viruses/Worms
-Hacking/Phreaking
Password Grabbers
Key Loggers
Blue Boxing Programs
Password Crackers
Network Security Scanning Tools
Packet Sniffing
(distributed) denial-of-service attack
Opte Project
http://opte.org/maps/
Predictions
Error
Defense Advanced Research Projects Agency (DARPA) initiates research program to investigate technologies for linking computer networks.
SYN Flooding Attacks become popular (type of DoS Attack)
March: Idaho National Laboratories secretly conducts the "Aurora Generator Test"
China vs USA
Israel vs Syria
Georgia vs Russia
USA vs Iran
China vs Google
Anonymous vs MasterCard
TeaMp0isoN vs Panasonic
@DeadMellox vs FxTraders.eu
Kosova Hacker's Security vs
OTE (Greek Telcom company)
Israel
Interpol
Ukraine
others
Anonymous vs
(well you know just about everyone they don't agree with) Corporations, Individuals, Groups, Nation States
NASA
the European Space Agency
U.S. Air Force
Harvard University
Many others
@AnonNyre vs Anonymous
RedHack vs
Israel
Turkey
Tunisian Cyber Army vs
USA
Chevron
Oceeneering
First National Bank
Israel vs Iran
China vs India
USA vs Russia
#CS329CyberWar
Pearl Harbor
Open internet killing legislation
Software oriented corrections
Tango Down
How does our Cyber society now define war?
Full transcript