CYBER SKIRMISHES By Zubair Khan.

Slides:



Advertisements
Similar presentations
Chapter 2 Digital Terrorism.
Advertisements

Do you remember this? Is BARC being brought under the defence ministry? If that happens, there'll be a lot of restrictions. I have doubts if the explosion.
ZUBAIR KHAN CYBER SKIRMISHES By Zubair Khan. ZUBAIR KHAN Introducing Cyber Warfare.
Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.
Information Warfare Theory of Information Warfare
SS7H2 The student will analyze continuity and change in Southwest Asia (Middle East) leading to the 21st century. d. Explain U.S. presence and interest.
Network Security of The United States of America By: Jeffery T. Pelletier.
Review for Quest War on Terrorism War in Iraq. War on Terrorism September 11, 2001 – terrorist attacks on United States blamed on Al Qaeda Al Qaeda terrorist.
Chapter Eighteen: Foreign Policy and National Security 1.
1 James Johnson September 15, 2004 University of Phoenix On-Line EDTC 560 Applications of Multimedia and Web Page Design Instructor: Eli Collins-Brown.
Agenda. Review How has technological change affected the global environment in the recent past?
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
 Both developed and developing nations of the world are faced with social, economic, and cultural problems brought about by inequities.  Some groups.
Cyber crime & Security Prepared by : Rughani Zarana.
Middle East Fundamentalism.  1.What are the roots of modern Islamic Fundamentalism? 2.What was the United States’ response to global terrorism? 3.What.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Important Events in World History Post WWII ****THE MIDDLE EAST****
THE WAR ON TERRORISM Sec Pages September 11, 2001 Prime suspect, Osama bin Laden Muslim – someone who believed in and practices the religion.
1 Terrorism in the Modern World Vocabulary terms.
10 th American History Unit III- U.S. Foreign Policy World War II - Today Nixon-Bush #9 George Bush’s Foreign Policy.
Information Warfare Playgrounds to Battlegrounds.
Unit Nine Lesson Three. Analyze how the United States responded to changes in the global economy. Assess the foreign policy goals and actions of the Clinton.
Copyright 2006 Prentice Hall Prentice Hall PoliticalScienceInteractive Magleby et al. Government by the People Chapter 20 Special Topic The War on Terrorism.
Information Warfare Playgrounds to Battlegrounds.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
THE TERRORIST CHALLENGE September 11. The terrible events of September 11, 2001, “changed everything.”
Globalization (SOL 16c & d & 12b). Globalization Worldwide exchange of culture, business, & ideas Worldwide exchange of culture, business, & ideas Created.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Today’s Issues: The US and Canada Ch. 8 Intro to Geography.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Do-First Review Foreign Policy Notes. IE: 4 Major Reasons for US Involvement in affairs of other countries 1)Why does the United States get involved in.
U.S. NATIONAL CYBERSECURITY BY: SEIF ABOU NAR. WHY ARE WE TALKING ABOUT CYBERSECURITY? Attacks received the attention of president Clinton and Attorney.
TERRORISM.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Chapter 16 Terrorism and National Security.
Warm-up: What is foreign policy?
Topics in Today's World #3b: Conflict in the Middle East & the U.S.A.
International Terrorism: Defined
Unit 9.
Review for Quest War on Terrorism War in Iraq
SS7H2 Describe how land and religion are reasons for continuing conflicts in the Middle East. d. Explain U.S. presence and interest in Southwest Asia;
Middle East Relations And Terrorism
Terrorism Part II.
Threats to World Security Chapter 33 Section 3.
CONFLICTS IN THE MIDDLE EAST TEST TOMORROW
Panel Discussion: C4I Solutions for Combating
Terrorism Strikes the United States
Contemporary Global Issues

SW Asia – Unit 2 Review.
Middle East History Vocabulary
AP Human Geography Political Organization of Space Unit
Political Geography.
Southwest Asia The Middle East
“Today’s Issues” The United States and Canada
AP Human Geography Political Organization of Space Unit
Objectives Analyze how the United States responded to changes in the global economy. Assess the foreign policy goals and actions of the Clinton administration.
Global Politics and Economics in the 1990s
Objectives Analyze how the United States responded to changes in the global economy. Assess the foreign policy goals and actions of the Clinton administration.
Political Geography.
Challenges and Successes in the Zambian ICT Security Sector
© Students of History -
Objectives Analyze how the United States responded to changes in the global economy. Assess the foreign policy goals and actions of the Clinton administration.
Political Geography.
4/27/2019 Cyberwar Fiction, Facts, and the Future of Arms Control Ralf Bendrath, Berlin FoG:IS Forschungsgruppe Research Group on the Informationsgesellschaft.
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
SS7H2 Describe how land and religion are reasons for continuing conflicts in the Middle East. d. Explain U.S. presence and interest in Southwest Asia;
The Modern World.
Lecture 29 HUM111 Pakistan Studies.
Presentation transcript:

CYBER SKIRMISHES By Zubair Khan

Introducing Cyber Warfare

". . . attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy's army without fighting is the true pinnacle of excellence."

Is Cyber Warfare Best Strategy?

Highly Anonymous Deniability Low expenditure on R&D

Outsourcing and Globalization of Warfare No Command Difficult to identify private or state sponsored hacking. Citizens of other regions and countries can also volunteer.

Cyber Targets Military Networks Government Systems and Websites Ecommerce and Financial Institutes Telecommunication Companies Others

Psychology of Modern Warfare and Hacking For Fun (31.4%) Want to be best defacer (17.2%) No reason Specified (14.7%) Political Reasons (11.8%) Patriotism (10.9%) As a challenge (10.8%) Revenge (3.3%)

Cyber Weapons Software Based Weapons Hardware Based Weapons Availability Capability Hardware Based Weapons Cost of Manufacturing

Cyber Battleground of Palestine And Israel

History 28th September 2000 – Israeli teenage hackers attacked Hezbollah and Hamas websites in Lebanon. Call for Cyber Jihad from Palestine

The Middle East Cyber War Elite Hackers around 100 How Elite Hackers work? Volunteers around 1200 How Volunteers work?

Targets in Middle East Conflict Pro-Israeli Attacks Extremist Websites Government Websites Pro-Palestinian Attacks Israeli official Websites Media, technology, financial and telecommunication corporations

Middle East Cyber War- A Global Cyber War

Israeli Hackers Mossad Wizel Israel Hackers Unite Israeli Internet Underground Small Mistake Analyzer ViRii

Targets of Israeli Hackers Government Systems Palestinian National Authority HAMAS Hizballah VISA

Sysnet

Tactics and Strategy of Israeli Hackers Registering websites with misspellings Hamas.com to hamas.org Propaganda Others

Counter Attack Pro-Palestinians hacked more than 50 websites. Paralyzed Israel’s email system for days many times Israel’s e-commerce websites

Israel: Cyber Target Extensive targets Israel losing the cyber war Hackers of all Arab countries combined

Pro-Palestinian Hackers G-Force Pakistan Dr. Nuker Pakistani Hackerz Club Arab Hackers Xegypt Arab Hax0rs Al-Muhajiroun

Palestinian Targets Israeli Army Israeli Central Bank Bank of Israel Israel’s Educational Institutes Government System AT&T TA Stock Exchange

Cyber Battleground of Iran And USA

Development Process Threat to USA Effects Caused Capabilities of Persian Hackers Strategies Globalize War

Cyber Battleground of China, Cuba And USA

How Cuba is better than USA in Cyber Warfare?

Bejucal Base 1100 engineers, computer scientists, technicians, staff Three groups of antennas/satellites. General USA telecommunications Pre Designated phones and computers Voice recognition capacity Ability to interfere USA computer networks

Paseo Transmission and reception of radio waves Ability to interfere radio telecommunications in USA, mainly in airports and strategic places.

Cojimar Electronic Complex Research Department Main focus High Radio Frequency

Wajay Electronic Base Weather Change Research Radio Interference More than 100 very high antennas

Chinese in Cuba Mutual Understanding Trade Cooperation Financial Support Strategic Location

Cyber Battleground of India And Pakistan

History First cyber attack: May 1998 Reason: Pokhran 2 Nuclear Tests Target: Bhabha Atomic Research Centre, India Responsible Group: Milworm Disclosure of sensitive mails regarding nuclear tests Website Defaced

“Is BARC being brought under the defence ministry “Is BARC being brought under the defence ministry? If that happens, there'll be a lot of restrictions. I have doubts if the explosion was successful. That place is full of idiots, including Chidu. I know them inside out. I'm sure those morons aren't capable of anything. Must have exploded some RDX and are now claiming to have exploded the bomb for political gains. Biku is jumping about here and newspapers report some VECC scientists have contributed to the nuclear tests. He has asked for special security. The clown has got two bodyguards. Security has been tightened at the institute.”

Major Targets of Pakistani Hackers Gujrat Government Ministry of External Affairs India Gandhi Centre for Atomic Research India Online Bazaar Indian National IT Promotion India Today Nuclear Science Centre Telecommunication companies

Stats of Indian Defacements Total number of defacements recorded – 780 co.in - 115 defacements - 14.74% gov.in - 29 defacements - 3.72% net.in - 23 defacements - 2.95% org.in - 15 defacements - 1.92% nic.in - 45 defacements - 5.77% ac.in - 33 defacements - 4.23% ernet.in - 56 defacements - 7.18% res.in - 20 defacements - 2.56% .com - 398 defacements - 51.03% .net - 18 defacements - 2.31% .org - 25 defacements - 3.21% .edu - 2 defacements - 0.26%

Gujrat Government Website

India Gandhi Centre for Atomic Research

Top 5 Pakistani Attackers AIC - 166 defacements - 21.28% GForce Pakistan - 116 defacements - 14.87% Silver Lords - 101 defacements - 12.95% WFD - 59 defacements - 7.56% ISOTK - 17 defacements - 2.18%

Formation of Pakistani Hacker Groups and their Strategies GForce Pakistan Silver Lords Pakistan Hacker Club

Objectives of Pakistani Hackers Target websites with a huge domestic audience To bring attention to violence in Kashmir Middle East conflict

Indians in Action Paralyzed Pakistani government sites for more than two months in 2003. Yaha-series viruses Damaged about 150 Pakistani websites in two days and erasing files from the hard disks of more than 3,000 corporate computers. Severe damage to Pakistan Internet Exchange and ecommerce

Cricket and Indian Hacking

Indian Hackers Indian Snakes Hindustan Hackers Association (H2O) Roxx of Calcutta Cobra Hindustan Hackers Association (H2O) Indian Hackers Club Indian Spy

Strategy of Indian Hackers Using Denial of Service Attacks as their primary weapon

India Pakistan State-Sponsored Hacking and Warfare

What FBI hates more than Osama Bin Laden?

Capabilities and interests of Al Qaeda Training Process Khalid Sheikh Mohammed PhD Cyber Security Reconnaissance of critical infrastructures Communications and Cryptography techniques Cyber Propaganda Call for Jihad How Bin Laden is better than NSA in Tech

Capabilities and interests of Al Qaeda Big Damage……less investment High Anonymity

Al Qaeda’s Cryptography Cryptography Techniques and methods used Example

Cyber Attacks on Al-Qaeda by US Bin Laden’s Financial Network Damage to Financial Network of Bin Laden by U.S Hackers Calls Interception Decrypting Messages Avenues for US hackers by Al Qaeda

What makes Cyber War as important as Nuclear War for USA?

Future of Al Qaeda’s Cyber Warfare

Cyber Defence Strategies

Hacking affecting Military Operations Before Fighting Example of Department of Defence During Fighting Example of Gulf War

Influencing Foreign Policy

Can hacking cause real war?

ECHELON/Project 415 Global network of computers that automatically search through millions of intercepted messages for pre-programmed keywords or fax, telex and e-mail addresses.

ECHELON ECHELON Dictionaries ECHELON Working UKUSA System

Agencies in UKUSA System National Security Agency (NSA) Government Communications Headquarters, UK (GCHQ) Defence Signals Directorate, Australia (DSD)

Agencies in UKUSA System Government Communications Security Bureau, New Zealand (GCSB) Communication Security Establishment, Canada (CSE)

Revolution in Military Affairs And C4i Psychological Operations Military Deception Operations Security Computer Network Operations Electronic Warfare

Cyber Terrorism and Propaganda

The Abu Ghraib Prison Photos

Example of Powerful Cyber Propaganda The propagation of Abu Ghraib photos on internet did a severe damage to political interests of American Government.

The Future of Warfare

References http://zone-h.org/en/stats (ZONE-H Statistics) http://www.netforcuba.org/FeatureSection-EN/NewThr.htm (Net For Cuba) http://ctp.iccas.miami.edu/FOCUS_Web/Issue58.htm (Focus on Cuba) http://www.findarticles.com/p/articles/mi_m0PBZ/is_2_83/ai_106732244/pg_3 (Palestine Israel Cyber War) http://journalism.uts.edu.au/subjects/oj1/oj1_a2002/internetactivisminasia/india2.html (Indo-Pakistan Cyber war) http://www.srijith.net/indiacracked/stats/index.shtml (Project India Cracked Statistics) http://www.attrition.org/mirror/attrition/2000/08/26/gujarat.gov.in/ (Gujrat Government Defaced Mirror)

References http://www.attrition.org/mirror/attrition/2001/01/02/igcar.ernet.in/ (India Gandhi Centre Defaced Mirror) http://pakcert.org/defaced/www.sysnet.com.pk.html (Sysnet Defaced Mirror) http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/vulnerable/alqaeda.html (Frontline Cyber war) http://www.newsmax.com/archives/articles/2001/2/8/221142.shtml (US war on Bin Laden) http://www.fas.org/irp/program/process/echelon.htm (ECHELON) http://www.antiwar.com/news/?articleid=2444 (Photos of Abu Ghraib)

QUESTIONS?