Cyber Warfare Case Study: Estonia

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
DoS Attacks ..by Aleksei Zaitsenkov.
Cyberspace - A Global Battlespace? Joel Ebrahimi Solutions Architect Bivio Networks, Inc.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Cyber Conflict Research Rain Ottis UNCLASSIFIED.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Information Security Overview in the Israeli E-Government April 2010 Ministry of Finance – Accountant General E-government Division.
Rob Gaston 04/04/2013 CIS 150. Cyber Warfare  U.S. government security expert Richard A. Clarke, Cyber War (May 2010): "cyber warfare" is "actions by.
Assessing Actions Along the Spectrum of Cyberspace Operations
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions May 16, 2015 DRAFT1.
Cyber-Warfare Analyzed by: Josh Burleson Brian Epp Chrissy Miller Martin Vanis “Cyber attacks…is not in any way comparable to weapons of mass destruction.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
The Cyber Dimension of Warfare Col (Ret) Vasili Gogoladze, Georgia, Col (Ret) Vasili Gogoladze, Georgia, Former Director of GSCIA of Georgia Russian Aggression.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Chinese Civil War Resumes Main Idea: Chinese Communists defeated Nationalist forces and two separate Chinas emerge.
Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Network Security of The United States of America By: Jeffery T. Pelletier.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
(Geneva, Switzerland, September 2014)
Cyber-Warfare: The Future is Now!
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
 Officially known as Republic of Estonia.  Located at Baltic Region of Northern Europe.  Territory covers 45,227 km².  Capital is Tallinn.  Democratic.
A sophisticated Malware Arpit Singh CPSC 420
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©
Information Warfare Playgrounds to Battlegrounds.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Cyber Security Nevada Businesses Overview June, 2014.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
Challenges Opportunities en threats for cybercrime fighters John van Krieken LLM MMO Datum 9 oktober 2009.
Threat context TLP WHITE Cyber security panel
CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Hurdles in implementation of cyber security in India.
CyberPatriot: Introduction to Cyber Security 9/10/10 Joshua White Director of CyOON R&D Everis Inc (315)
CYBER WARFARE What is it and what does the future hold?
Information Warfare Playgrounds to Battlegrounds.
Ayman Irziqat Katarzyna Kosarska Sergio Pradel 1.
Estonian Action and Response Plan: Russian Interference European Security Consulting Group Taylor Brown, Viola Meyerweissflog, Marc Barnett and Benedikt.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Governments don’t Understand Cyber Warfare. We Need Hackers.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Nation State Actors Lex Dunlap.
International Conflict & Cyber Security
Cyberwar Becomes a Reality
Challenges We Face On the Internet
Homeland Security v. Homeland Defense: The Big Gap
Who should be responsible for risks to basic Internet infrastructure?
Securing Information Systems
Cyber Security Challenges
Dominic DeSoto, Jay Jackson IA 455 Oct. 23, 2017
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Presentation transcript:

Cyber Warfare Case Study: Estonia Jill Wiebke April 5, 2012

What is Cyber Warfare? Cyber warfare “is a combination of computer network attack and defense and special technical operations” (IEEE) 8 Principles: Lack of physical limitations Identity & privileges Kinetic effects Dual use Stealth Infrastructure control Mutability & inconsistency Information as operational environment Lack of physical limitations: the effectiveness of the attack has nothing to do with where in the world it originates Kinetic effects: an act of cyber warfare must have kinetic effects (electricity, water, change minds of decision-makers) – otherwise it is meaningless Stealth: hiding in cyberspace is/may be easier than in reality; hide evidence in data streams Mutability & inconsistency: cyberspace is imperfect, inconsistent, things may not happen the same way twice; unreliable – a step in an attack may not always work, or attacks not expected to succeed do Identity & privileges: everything is controlled by people (cyberspace is artificial, created by humans); goal of most attacks is to steal identity and privs of the entity that has the ability to perform the action the attacker wants to perform Dual use: attackers and defenders use same tools (vulnerability scanners, packet captures, etc.) Infrastructure control: whoever controls the part of cyberspace used by the opponent also control the opponent Information as operational environment: communication connections, network maps, etc. is the operational environment (as opposed to terrain, weather, etc. for kinetic warfare)

Things to Consider… Malicious cyber activity: crime, espionage, terrorism, attacks, warfare Classifications are made by intentions of perpetrator and effect of the act Definition of cyber attack is inconsistent “Easy” to change levels during an attack – difficult to determine the severity of the attack before it has ended Some say cyber attacks are a combo of cyber terrorism and cyber warfare, some say it should be its own cyber malicious event

Case Study: Estonia Baltic territory Capital: Tallinn Independence in 1918 Forced into the USSR in 1940 Regained freedom in 1991, Russian troops left in 1994 Joined UN in 2001, and NATO and EU in 2004 Known as an “e-society,” paperless government, electronic voting, etc.

Attacks on Estonia Who: That’s the real question, isn’t it? What: Distributed denial of service (DDoS) attacks on government, banks, corporate websites; website defacement When: April 27, 2009 – May 18, 2007 Where: Estonia Why: Another good question… How: Well-known attack types, but “unparalleled in size;” hundreds of thousands of attack computers http://www.industrialdefender.com/general_downloads/news_industry/2008.04.29_cyber_attacks_p1.pdf Rain Ottis, Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia

Attack Progression April 27: Estonian government websites shut down from traffic, defaced April 30: Estonia began blocking Web addresses ending in .ru Increased attack sophistication; targets now included media websites attacked by botnets 1 million computers were unwittingly employed to deploy botnets in US, China, Vietnam, Egypt, Peru May 1: Estonian ISPs under attack May 9: Russian victory in WWII – new wave of attacks at Russian midnight May 10: Banks are attacked http://msl1.mit.edu/furdlog/docs/washpost/2007-05-19_washpost_estonia_cyberattacked.pdf

Details Estonia had just decided to relocate a Soviet WWII memorial Large, well-organized, well-targeted attacks – not spontaneous – began hours after the memorial was relocated Malicious traffic indicated political motivation and Russian language background Instructions for attacking websites were posted in Russian language forums including when, what, and how to attack Did not accuse Russian government (not enough evidence), but attacks are believed to have originated in Moscow IP addresses of attackers belong to Russian presidential administration Russian officials denied any involvement; IPs could have been spoofed

Effects of the Attacks One person has been convicted – student in Estonia organized a DDoS attack on the website of an Estonian political party NATO enhanced its “cyber-war capabilities” Created a “cyber defense research center in Tallinn in 2008” Cyber Command – Full Operating Capability on Oct 31, 2010 http://www.msnbc.msn.com/id/31801246/ns/technology_and_science-security/t/look-estonias-cyber-attack/#.T3Mt7NmGWW9 http://www.stratcom.mil/factsheets/cyber_command/

Other Cyber Attack Examples Georgia DDOS attacks coincided with Russian invasion in August 2008 Stuxnet Worm that targets industrial control systems Infected Iranian nuclear facilities Titan Rain Suspected Chinese attacks on the US since 2003 “Nearly disrupted power on the West Coast” Security breaches at defense contracting companies (Duke article) http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5634434 Mention Anonymous

Magnitude of Cyber Warfare Attribution Nation-state actors Non-state actors “Hired guns” Trails end at an ISP New territory – no rules/standards Legal territory issues International laws do not exist yet Crime of Aggression definition Impacts Non-state actors: individuals or groups like Anonymous, learn online Independent companies for hire to conduct cyber attacks -> large copyright holders (Sony & Universal) hire independent companies to direct cyber attacks (DDOS) against people using file sharing software that is suspected to be sharing their copyrighted material. Could be done also be governments ISP trail: attacker may be ISP subscriber, or attack may have been routed through the ISP International laws: Territory: No geographic limitations, packets sent from point A to point B may not take the same route; example: during Georgian attacks, many Georgian websites moved to US servers. The server was in the US, but the “cyberspace” belonged to Georgia

Glimpse at Cyber Warfare Future The US heavily relies on cyber networks, so a cyber attack could be highly detrimental Physical impacts Disable water purification systems Turn of electricity Misrouting planes/trains Opening dams Melting nuclear reactors Communication network impacts Stock market manipulations Wireless Internet access outages Duke article

Why SAs Should Care Cyber attacks are increasing in threats, frequency, and intensity Targets range from government entities, banks, corporations, to private businesses We are the “cyber warriors” and “network ninjas” that will be dealing with the effects of cyber warfare

References https://www.cia.gov/library/publications/the-world-factbook/geos/en.html http://www.state.gov/r/pa/ei/bgn/5377.htm http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5634434 http://www.stratcom.mil/factsheets/cyber_command/ https://docs.google.com/a/utulsa.edu/file/d/0B7yq33Gize8yNjEzNDkxMGMtOWMyNS00ZDJhLTg4MDUtZDUwODQ2YjQwOTIw/edit?pli=1 http://www.industrialdefender.com/general_downloads/news_industry/2008.04.29_cyber_attacks_p1.pdf http://www.getgogator.com/News/Content/Articles/Malware/The%20Evolution%20of%20Cyber%20Warfare.pdf msl1.mit.edu/furdlog/docs/washpost/2007-05-19_washpost_estonia_cyberattacked.pdf http://www.msnbc.msn.com/id/31801246/ns/technology_and_science-security/t/look-estonias-cyber-attack/#.T3Mt7NmGWW9 ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6029360&tag=1 http://www.law.duke.edu/journals/dltr/articles/2010dltr003.html