Top Banner
Cyber and Influence Computer Network Operations (CNO) affecting people‘s perception, attitude, or behaviour (C) 2010-11 by LTC U.M. Janßen, NSO/ISTAR
21

Cyber and influence

May 09, 2015

Download

Technology

ULRICH JANSSEN

Presentation on the extent to what operations in cyberspace potentially influence people's perception, attitude, or behaviour.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber and influence

Cyber and Influence

Computer Network Operations (CNO) affecting people‘s perception, attitude, or

behaviour

(C) 2010-11 by LTC U.M. Janßen, NSO/ISTAR

Page 2: Cyber and influence

Cyber SpaceCyber War

Cyber TerrorismCyber Security

Cyber LawCyber – Hype???

Page 3: Cyber and influence

Cyber Space• the electronic medium of computer networks, in which

online communication takes place.• the dynamic realization of electromagnetic energy

through the application of communication and control technology.

• a global domain that allows an interdependent network of information technology infrastructures (ITI), telecommunications networks, computer processing systems, integrated sensors, system control networks, embedded processors and controllers common to global control and communications across the electro-magnetic environment.

• a social experience, individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on …

(Wikipedia)

Page 4: Cyber and influence

Understanding the Environment

Internet Continues to Develop• Social Networking – Facebook, Myspace,

Bebo, LinkedIn etc• New Media - uTube, Blogs, Twitter, Wiki• Real Worlds – Google Streetview/Earth• Virtual Worlds – 2nd Life, WoWarcraft• Communications – Skype, Bittorrent• Mobile Devices – Blackberry, iPhone

Hardware (PC, Laptop, Server)

Firmware (Microcode, BIOS)

Operating System (Windows, MacOS)

Application (Explorer, Word, Excel)

Plugins (Java, Active X, Flash, Viewers)

Applets & Objects (Java Code, Images etc)

Content (Web Pages, Email etc)

1.97 Billion Users – more than 1/3 of global pop

Impact on almost every facet of modern life – with growing in importance!

Page 5: Cyber and influence

Actors

Cyber War Agencies/Commands

Hacker Community(Individuals / Groups)

Industry

Intelligence

Agencies Research

Labs

Law Enforcement Agencies

CriminalsTerrorists

Page 6: Cyber and influence

Cyber Threat

Low High

High

Low

PossibleDamage

Probability of an event

2000

2005

2010

InsiderCriminals

IndustrialEspionage

Terrorists

Governmental

CriticalInfrastructure

Threat is a function of intent

(will) to act, understanding of the situation, and

capabilities to enforce will.

Threat is a function of intent

(will) to act, understanding of the situation, and

capabilities to enforce will.

Page 7: Cyber and influence

Current threats - TTP• Caused by increased access• Disclosure of information• Corruption of information• Denial of service• Theft of resources• Loss of credit or reputation• Cyber Crime• Spam• Bulletproof Hosting• Malware• …?

Page 8: Cyber and influence

Increased access

Social Engineering

War Driving

Tapping Fibre Optical Cable

Scanning and Sniffing

Page 9: Cyber and influence

Disclosure of information

Keylogging

Printer - Copying

„Liechtensteining“

Spying

Page 10: Cyber and influence

Denial of Service

DDoS

Buffer Overflow

Cable separation

Bounce Mail

Page 11: Cyber and influence

Denial of ServiceSabotage

Page 13: Cyber and influence

Loss of Credit or Reputation

Example:Maximilian

Example:Maximilian

Page 14: Cyber and influence

Cyber CrimeSpectrum of Options

Phishing Malware

DoS/DDoSSPAM

ChildPorn Games

Page 15: Cyber and influence

SPAM-Mail without content

SPAM

Page 16: Cyber and influence

Manipulated Security Software

Page 17: Cyber and influence

Cyber & Social Media

• Social activity vs. Cyber Ops / CNO– Observe, monitor– Act– Attribution

• Cyber mobbing / bullying– Use connectivity to blame your colleague /

boss … a government– Submit exposing photos, videos– Promulgate private information– Isolate … “De-friend”

Page 18: Cyber and influence

Cyber & Military

• Ops affecting INFOSEC– Availability, confidentiality, integrity of information

• IKM– Information gathering, processing, managing,

sharing

• NNEC– Information sharing, exchanging– Data links, sensors, effectors– COP– Enabling rather than Cyber Ops weapon system

Page 19: Cyber and influence

NATO & Cyber Ops• Policy & Doctrine

– Neither NATO Policy or Doctrine on CNO, nor allied “body” to deal with the issue

– CNO = CNE x CND x CAN– COMSEC, INFOSEC, X-SEC– Cyber Crime … Law Enforcement Task / legal concerns

• Common Defence– NCIRC– CCOE for Cyber Defence– Protection of EEFI and critical infrastructures

• Capability Development– Some nations have… national caveats– Undesired effects, BDA, loosing control– Cyber INTEL needed!

Page 20: Cyber and influence

SummaryCNO affecting people’s perception,

attitude, or behaviour• Perception of the threat = f(W, U, C)• Attitude to be connected• Continue to use cyber• Virtual Battlefield in Cyber War• Cyber Attack against Estonia• Cyber Activities in RUS ./. GEO Conflict 2008• Conclusion

Page 21: Cyber and influence

Cyber and Influence

Computer Network Operations (CNO) affecting people‘s perception, attitude, or

behaviour

(C) 2010-11 by LTC U.M. Janßen, NSO/ISTAR