The Cyber Wars BRIAN ABDO. Geopolitical Agendas  Upswing in hacking with governmental agendas.  Their purpose is to discover information from the targeted.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Communism in China and the Korean War. Nationalists versus Communists (civil war), NationalistsCommunists -led by Chiang Kai-shek -ruled in.
The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.
Cyber Security and the Global Business Environment Jeremy Schaar:)
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
Rob Gaston 04/04/2013 CIS 150. Cyber Warfare  U.S. government security expert Richard A. Clarke, Cyber War (May 2010): "cyber warfare" is "actions by.
Computer Security Fundamentals
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
Network Security of The United States of America By: Jeffery T. Pelletier.
2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.
UNIT  After WWII, Japan came under the sole control of the U.S.  General MacArthur in charge of reconstruction  New constitution (May 1947) set.
Cracking down on international cyberterrorism
Korean and Vietnam Wars Unit #4 International Conflict.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Martin Nacevski III-3. The Korean War was a military conflict between the Republic of Korea (supported by the UN) and North Korea (supported by the People’s.
Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©
Foreign and Defense Policymaking Chapter 20. American Foreign Policy: Instruments, Actors, and Policymakers  Instruments of Foreign Policy  Military.
Citizenship Issues C.I.4 U.S. Domestic and Foreign Policy Students are able to: 4.2 Describe U.S. foreign policy. Students may indicate this by: – Defining.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Dealing with North Korea America’s Options. Threats from North Korea Direct nuclear attack on US forces or allies Sale of nuclear and missile technologies.
Opening Assignment What could happen if the US got involved in a total war with one of the USSR’s allies? How could this possibly be avoided?
Foreign & Defense Policies. Discussion Questions:  Why do you think the Founders intentionally divided responsibility for foreign affairs between president.
CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!
Final Exam Review The Cold War Chapter 18 Mr. Homan, American Cultures, NPHS.
Understanding the Threats of and Defenses Against Cyber Warfare.
CYBER WARFARE What is it and what does the future hold?
Types of Government. What kind of Governments are there? What do you think of when you hear the word government?
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
NATO was first founded after World War II ended. At that time, large numbers of Soviet troops remained in Eastern Europe as occupation forces. Governments.
Can North Korea Build More Nuclear Weapons?. A North Korean People’s Army naval unit tests a new type of anti-ship cruise missile in this undated photo.
Security Mindset Lesson Introduction Why is cyber security important?
BACKGROUND ON ATOMIC WEAPONRY. WHAT IS AN ATOM BOMB? “A general name given to any weapon in which the explosion results from the energy released by a.
April 27 th  Learning Target  I can understand the threat of nuclear proliferation.  Opener  Name all the countries you can think of that have nuclear.
Chapter 17: Foreign Policy and National Defense Section 2.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
THE COLD WAR HEATS UP Unit 11 – Topic 2. Agenda W 4/13 A – Th 4/14 B  Take a handout of today’s notes, the Marshall Plan handout, and the Korean War.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Current State of Cyber Security and How to Defend Your Data.
Governments don’t Understand Cyber Warfare. We Need Hackers.
The Cuban Missile Crisis October 14 – October 28, 1962.
Chinese Civil War & Korean War. Chinese Civil War Chiang Kai-shek Chiang Kai-shek Unified the Nationalists in southern China Unified the Nationalists.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
Paul A. Strassmann New Canaan Mens Club – January 9, 2015.
Sino*-Japanese War * “Sino” refers to China.
Nation State Actors Lex Dunlap.
International Conflict & Cyber Security
Foreign Policy GOVT Module 16.
 Korean War: (1950 – 1953) After WWII, the US and USSR agree to a temporary division of Korea along the 38th parallel (line of latitude) and allied occupation.
The Korean War The Forgotten War.
Introduction to International Relations
Cold War Era (Part I) Page 26
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
White Hat vs. Black Hat White Hat Black Hat
Cybersecurity Samuel Mizener Kings High School, Computer Science, 9th
Foreign Policy; a brief introduction
Chapter 17: Vocabulary and Notes
The Global Challenges of Cybersecurity and Digital Terrorism
Assessing Deterrence Options for Cyberweapons
CYBERSPACE: CAN FRAGMENTATION BE STOPPED
Foreign Policy: Protecting the American Way
Types of Government.
Foreign and Defense Policymaking
What IS ?.
Military Influence of the USA
Third Geneva Convention (1949)
7th Grade Civics Miss Smith *pgs
Chapter 17: Foreign Policy and National Defense Section 2
Foreign and Defense Policymaking
The Pentagon ate your pie.
Presentation transcript:

The Cyber Wars BRIAN ABDO

Geopolitical Agendas  Upswing in hacking with governmental agendas.  Their purpose is to discover information from the targeted defender that the agency that is funding the operation would find useful while damaging the defender.  Specifically, information and actions that would benefit nation or rogue states through the proliferation of ideas or force.

Current Trends  61,000 Cyber-Security breaches in 2014  $300 billion dollar cost, in damages, per year  Russia uses “Troll Armies” to spam disinformation.  This was predominately used during the Ukrainian Civil War.  China is responsible for > 70% of corporate intellectual property theft  Quote from two former Pentagon officials  “Chinese computer spied raided the databanks of almost every major U.S. defense contractor and made off with some of the country’s most closely guarded technological secrets.” (2013)

Political Evolution  Governments are starting to use hacking as a tool for heavy-handed political leaning  North Korea (Presumed)  Sony Picture hack  Desired compromising data while exposing vulnerabilities in order to destroy public image to force the removal of a movie it is assumed Kim Jong Un, and others in the communist party, wanted banned from circulation due to the political implications of the movie’s plot.  BRICS World Bank  Some have concluded that the United States implemented an A.I. that crippled China’s stock market in response to the announcement that China would be funding a “rival” world bank. China (presumed) hacked the NYSE and American Airlines.

Non-Government Geopolitical Hacking  Anonymous  Target ISIS for political and moral reasons after the Paris attacks.  Ghost Security  Remove ISIS political messages online as to remove possible recruits from recruiters.  Collected data on members of ISIS  Collaborated with U.S. government (according to one source)

Prediction of Cyber Wars  On the basis of geopolitical ideals, states, terrorists, or hacking groups will begin (have already begun) to target infrastructural designs.  As it stands, nations states have shown that this is already in the works as a tactic to enforce heavy handed politics.  If the Iran Nuclear Deal failed diplomatic means and the tension resulted in a military conflict, there was a cyber warfare plan in place to cripple Iran’s military and infrastructure including disabling communication, power and air defense.  It seemed to be, according to the article, a popular back-up plan as the end result would be less costly than “a full-scale war.”  Other organizations might not be as judicious and, thus, the predicted threat of cyber war.

Sources  for-2016.html for-2016.html    nyse-united-airlines/ nyse-united-airlines/  goldberg goldberg  government-deeply-stupid government-deeply-stupid   planned-if-iran-nuclear-negotiations-failed.html?_r=0 planned-if-iran-nuclear-negotiations-failed.html?_r=0