INFORMATION WARFARE Part 3: Theory. Advanced Course in Engineering 2005 Cyber Security Boot Camp Air Force Research Laboratory Information Directorate, Rome, NY M. E. Kabay, PhD, CISSP - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Information Warfare and Security (1999). ACM Press (ISBN 0-201-43303-6).
Offensive information warfare operations alter availability and integrity of information resourcesBenefit of offense & detriment to defenseOffense acquires greater access to infoDefense loses all or partial access to infoIntegrity of information diminished
Digital “photographs” may not be photographsAudio “recordings” may not be recordingsLog files may be fictionOpinion polls may be nonsenseElection results may be fixedConspiracy theories may be trueReferences may be nonexistentFacts may be illusory (see article “Junk Science”)History may be recreation
Information Warfare: Chaos on the Electronic Superhighway (1996.05)Winn Schwartau, The Security Awareness Co.OverviewMilitary Model Must Reflect Changes in
What Is War?Physical attacks are no longer the only basis
for defining acts of warWhat will military and civil response be to
concerted attack on civilian / industrial infrastructure?taking down the banksinterfering with air-traffic controldamaging productivity of major industries
Attacks on US government & military agencies began 1999.03
Serbian hackersRetaliation for war against SerbsAs NATO bombing began in Serbia"Black Hand" hacker group"Serbian Angel" hackersWhite house Web site defaced
Taiwan Research InstituteGird itself against information warfare
People's Republic China Elements IW:
disruption critical infrastructure disruption military C3I opsmisinformation campaigns damage economic activity lower morale on island before initiating
Institute for Security Intelligence's Center for Technology Terrorism & Jane's Publications
War-game simulation (did not really hack) IRS primary targetFalse information, denial of serviceHack into IRS audit systemSend out millions audit & tax-due noticesTap into immigration control (Dept State) to
issue visas to known terroristsCreate fake documents — IRS investigating
personal lives members CongressLeak fakes to media + send fake compromising
Richard Clarke tells Senate Judiciary Committee of plans for retaliation (2002.02)
White House Technology Advisor says that cyberattack would be met “in any appropriate way: through covert action, through military action, any one of the tools available to the president.”*
In 2003.02, President Bush signed an order authorizing development of guidelines on unilateral or retaliatory cyberattacks against foreign computers and networks
*Question: HOW DO YOU KNOW FOR SURE WHO IS ATTACKING YOU?
U.S. Strategic Command (Stratcom) will focus on computer network attack (2003.02)
Stratcom now in charge of global command, control, communications, computer, intelligence, surveillance and reconnaissance (C4ISR) capabilities
“All pieces of the enemy's system of systems that are valid military targets [are] on the table as we go about war planning.”
“…Unimportant whether we take out a computer center with a bomb or a denial-of-service program. If it's critical to the enemy and we go to war, it will be in our sights.”
Cyberattack Implications StudiedCyberterror impact, defense under scrutiny
(2004.08)Coordinated cyberattack against U.S. could
topple parts of Internet, silence communications and commerce,paralyze federal agencies and businessesdisrupt $M in financial transactions, hang up air traffic control systems, deny access to emergency 911 services, shut down water supplies and interrupt power supplies to millions of homes
More than 2 dozen countries have “asymmetrical warfare” strategies
North Korea has trained more than 500 computer hackers capable of launching cyber warfare against the United States, South Korea's defense ministry says. In a report to the National Assembly's National Defense Committee, the ministry said that hackers from North Korea were among the best in the world.
Cyberterrorism a possibility in two years (2004.10)
Cyberterrorism could become a reality in 2006, a leading UK information security expert has said. Speaking at the SC Magazine Conference in London on Thursday, October 21, director of information security for Royal Mail David Lacey said that that the world would witness cyberterrorism within two years. Lacey said, “there is a lot of consistency in research that shows many of the real risks won't come to a crescendo until then. We know a lot about some of the trends coming. Real terrorists have not had the capability to carry out threats. But that will change as the stakes get higher.“
Personnel in the military's new cyberdefense organization hope to operate a new command center by late spring. The facility will include new hardware and software to help workers of the Joint Task Force-Global Network Operations (JTF-GNO) operate, manage and defend the military's 10 computer networks. "It will be a state-of-the-art facility," said Army Brig. Gen. Dennis Via, deputy commander of the JTF-GNO. He spoke Wednesday, February 23 at the Department of Defense Global Information Grid Enterprise Services conference held by the Association for Enterprise Integration, an industry trade group. The opening of the new command center coincides with JTF-GNO becoming fully operational.
Chinese Cyberwar From South America? U.S. officials warn of Chinese intelligence and
cyberwarfare roles in Latin America (2005.04)
U.S. officials … warned about Chinese intentions to establish an intelligence and cyberwarfare beachhead in the [S. America]. Roger Noriega, assistant secretary of state for Latin America, and Rogelio Pardo−Maurer, the top Defense Department official for the Western Hemisphere, testified before a House panel [and] said China's interests in Latin America were mostly on the economic side, but warned that Beijing could also have an intelligence agenda as it increased trade with Latin America. Pardo−Maurer said that “we need to be alert to rapidly advancing Chinese capabilities, particularly in the fields of intelligence, communications and cyberwarfare, and their possible application in the region.”