Do you remember this? Is BARC being brought under the defence ministry? If that happens, there'll be a lot of restrictions. I have doubts if the explosion.

Slides:



Advertisements
Similar presentations
On-line media tools for strategic communications purposes When using media tools for communication we try to use the latest technologies such us blogging,
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Information Warfare and Internet Resources. Andrianova Maria Igorevna Saratov State University, Sociology Department, 4 year student.
ZUBAIR KHAN CYBER SKIRMISHES By Zubair Khan. ZUBAIR KHAN Introducing Cyber Warfare.
Computer Security Fundamentals
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
CYBER CRIME& SECUIRITY
Reach – Engage – Convert - Analyze. To be an innovative internet company. Realty fact is a highly innovative and emerging Internet technology company.
0ictQATAR October 13, 2008 Qatar’s ICT Statistical Information Areas Tariq Gulrez.
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
Network Security of The United States of America By: Jeffery T. Pelletier.
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
New media for outreach New media and you. 77% of active internet users regularly read blogs Twitter has 20 million new users every month Facebook has.
Mehnaaz Asad IB2-3. Why do they use the Internet?  Easy access to the Internet's resources  Little or no regulation, censorship, or other forms of government.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
WELCOME! University Library Services. 3 Libraries & Online Business Computing Education (Primary) Engineering Law Media Psychology Tourism Design Fine.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Digital Campaigning for Activists Sharing for change...
Online communications for development Nick Scott 26 November 2008.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Chapter Eleven Crisis Communications and Public Relations Messages McGraw-Hill/Irwin Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Knowing Your Facebook From Your Flickr Dan O’ Neill – -
Tablet Camp 2015 Resource Guide for Students at Klein ISD 1:1 Campuses.
Information Warfare Playgrounds to Battlegrounds.
Moodle (Course Management Systems). Blogs In this Lecture, we’ll cover how to use blogs, blog capablilities and efficive blog practices.
© Crown copyright Met Office Dissemination of warnings and forecasts – social networks 29 th November 2012 Sarah Davies, Met Office.
Finding Credible Sources
Do pictures always give truthful information? Can publishing it be hurtful??
Use of Electronic and Internet advertising options Standard 3.4.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Ed Tech Action Network Michael R Porter Eastern Upper Peninsula I.S.D.
Social Media’s Effect on India Group 3. Indian Social Media India has one of the fastest growing Internet markets in the world. The youth, who utilize.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
GIJ08 What happened to journalism after 9/11? For additional information:
Definition The mass media are diversified communication technologies that reach a large audience by means of mass communication Examples include radio,
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Topic 5: Basic Security.
Are you a Digital Native?
Information Warfare Playgrounds to Battlegrounds.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Integrating social media into PR Strategies by K Srinivasan Chairman, Prime Point Foundation & Editor in Chief, PreSense (Emagazine) Chennai, India 13.
Agenda A brief introduction to COI –The work of COI Digital Media Industry update Consumers – changing / evolving Briefing / planning / integrating digital.
Social Media Roundup Google+: The basics. Social Media RoundupAgenda This week’s Social Media Roundup examines Google+ and its impact on the social media.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Contribution of a statistical organisation to social media DWG, Anne Nuka Head of Marketing and Dissemination Department.
Press and Public Relations Office Process Management of information for the press Management of public relations Audience of the Office Mass media Specialized.
Information Security: Current Threats Marc Scarborough Information Security Officer
The Claromentis Digital Workplace An Introduction
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Communication Technology and Society STS 322 Lecture 5 Cyberactivisim Huriye Aygören.
Sarah Manuel Final Presentation MCO435-Social Media.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Making Sense of New Media Sue Fidler 26th April 2007.
Social Networking in Politics Alejandro Mandujano.
Freelance Journalist, Editor & Digital Media Strategist.
CountrySTAT.
Social Media Attacks.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Media Advocacy.
Topic 5: Online Communities Press F5 to view!
CYBER SKIRMISHES By Zubair Khan.
CountrySTAT.
CountrySTAT.
Use of Electronic and Internet advertising options
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (
cyber safety class :- Xi Chapter no. :- 17
Presentation transcript:

Do you remember this? Is BARC being brought under the defence ministry? If that happens, there'll be a lot of restrictions. I have doubts if the explosion was successful. That place is full of idiots, including Chidu. I know them inside out. I'm sure those morons aren't capable of anything. Must have exploded some RDX and are now claiming to have exploded the bomb for political gains. Biku is jumping about here and newspapers report some VECC scientists have contributed to the nuclear tests. He has asked for special security. The clown has got two bodyguards. Security has been tightened at the institute. A sample of data stolen from BARC, released by Milworm: A Pakistani Hacker Group

Internet The fifth dimension

e-psyc ops The internet Psychological War By:- P. Chacko Joseph Frontier India Defence & Strategic News Service

Cyber Space is now is now taken for granted. and chat are no longer primary internet traffic drivers, but it’s research and information that prompts people to log on to the net more often. A 32 % active users of the internet in India used the internet as the primary source for information and research in 2006, up from just 20 per cent in Internet And Mobile Association of India, 2006

Is Internet Psychology Warfare Relevant to India?

Examples of cyber warfare on India Internet web page defaced after the BARC web server was hacked by milworm a pakistani hacker group soon after the 1998 “Shakti” Nuclear Tests. Defence Journal of Pakistan maligning Indian Defence research projects. BBC and western media documenting internal social, economic and military problems. IAF dwindling pilots issue was brought out by BBC. Pakistani and Chinese use of wikipedia and other sources to change the history of wars and relations with India. Indian web sites including "Frontier India Journal" getting hacked by Pakistani hackers.

Examples of cyber warfare on India Psychological manipulation through the media including internet by Indian import lobby and foreign subversive groups. Pakistani, communist and terrorist groups using social networking sites like "Orkut" to defame India and to promote themselves. Pakistanis using internet to promote mis-information against India on kashmir. Indian Army website on Jammu and Kashmir was hacked in 2000 back by Pakistani hackers. They had floated false information about human rights violations by the Indian defence forces on the Army's websites. Pakistan Hacker Club and MoS were responsible. In a cyber attack in 2000, suspected to be the handiwork of Pakistan’s ISI, the homepage of 70-year-old Indian Statistical Institute was hacked here in an abortive bid to erase vital data. "Our organization's name is ISI. And no other organisation can exist with this name."

IN Indian websites were attacked

The Internet has a global-reach. It is a cost-effective platform for dissemination of a message, rumor, lie and inside information Psychological operations or PSYOPS is an indirect use of information warfare methods to deceive, shape and influence the behavior and attitude of the targeted audience.

Common cyber war practices Telecommunication disruption Denial of Service attacks Propaganda and defamation

Some basic examples propaganda Impersonation Self-serving news items, commissioned ones Hacking

e-Terrorism Terrorist merge raw brutality with digital propaganda. Internet allows terrorist to disseminate information to a larger audience which was once the monopoly of state and trans national news channels.

Indian Internet warfare examples Operation Vijay: During Operation Vijay, India responded pro- actively to Pakistan’s disinformation campaign. Indian Army’s official website and some additional Kargil-based websites were quickly spruced up to disseminate the truth about Kargil. As Pakistan continued to deny its Army’s role in Kargil, Indian websites quietly uploaded scanned images of identity cards, ration cards and mess bills recovered from captured Pakistani soldiers. In 2003 pro-Indian hackers had launched a "cyber revenge" by spreading the Yaha worm aimed Distributed Denial of Service attacks (DDoS). Aero Nautical Development website on LCA updates

Indian official Cyber Warriors Indian Computer Emergency Response Team (CERT-In)

Indian un official e-Warriors Age Profile: 14 – 36 years Education : 10+2 to Post Graduates Hangouts : Forums & Blogs Reason : Defence and equipment news (Refer Slide 4 “ and chat are no longer primary internet traffic drivers, but it’s research and information that prompts people to log on to the net more often.”)

Web 2.0 Blogs, Forums and Amateur Websites have become primary drivers of opinion’s. Primary news sources are now increasingly relying on the web 2.0 for news and opinions. Experts using web 2.0 to collect, disseminate and debate. This presentation was possible due to web 2.0

Wrapping it up Psyc-ops is now an option before war and diplomacy. The evolution of online PSYOPS is on its way and is actively utilized by both adversaries, and everyone in between. As India grows in international stature, we need to explain our foreign, economic and defence policies directly to foreign audience. Internet is the most efficient, cost effective and persuasive medium available to us. It Is Now UP To US

Thank You (note: This presentation has been edited, this is not the full version of the total presentation)