Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Vulnerabilities & Criminal Activity

Similar presentations


Presentation on theme: "Internet Vulnerabilities & Criminal Activity"— Presentation transcript:

1 Internet Vulnerabilities & Criminal Activity
14.1 Cyber Terrorism and Cyber Warfare May 10, 2010

2 Terrorism - FBI “The unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” Definitions based n responsibilities of groups

3 Terrorism - DOD “The unlawful use of, or threatened use, of force or violence against individuals or property, to coerce and intimidate governments or societies, often to achieve political, religious or ideological objectives”

4 Terrorism - DOS “Premeditated, politically motivated violence perpetrated against noncombatant targets by sub national groups or clandestine agents”

5 FBI - Terrorism Descriptions
Domestic or Foreign “Depending on the origin, base, and objectives of the terrorist organization.” Terrorist Activities Incident “A violent act or an act dangerous to human life, in violation of the criminal laws of the United States, or of any state, to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” Prevention “A documented instance in which a violent act by a known or suspected terrorist group or individual with the means and a proven propensity for violence is successfully interdicted through investigative activity.” l Domestic terrorism refers to activities that involve acts dangerous to human life that are a violation of the criminal laws of the United States or of any state; appear to be intended to intimidate or coerce a civilian population; to influence the policy of a government by mass destruction, assassination, or kidnapping; and occur primarily within the territorial jurisdiction of the United States. [18 U.S.C. 、 2331(5)]・ International terrorism involves violent acts or acts dangerous to human life that are a violation of the criminal laws of the United States or any state, or that would be a criminal violation if committed within the jurisdiction of the United States or any state. These acts appear to be intended to intimidate or coerce a civilian population; influence the policy of a government by intimidation or coercion; or affect the conduct of a government by mass destruction, assassination or kidnapping and occur primarily outside the territorial jurisdiction of the United States or transcend national boundaries in terms of the means by which they are accomplished, the persons they appear intended to intimidate or coerce, or the locale in which their perpetrators operate or seek asylum. [18 U.S.C. 、 2331(1)]

6 More on Terrorism Political in nature
Smaller weaker group vs. larger group No legitimate means of protest Violence against civilians Symbolic targets Designed to provoke response Aimed at larger audience

7 What Makes a Terrorist? A disaffected individual An enabling group
A legitimizing ideology

8 Terrorist Goals Leadership Followers Long-term goals Political change
Short-term goals Revenge Renown Reaction

9 Terrorism Matrix People (or groups)
Locations (of perpetrators, facilitators, victims) Methods/modes of action Tools Targets Affiliations Motivations Elements of Terrorist Act

10 Terrorism Matrix I Both groups fit definition of terrorists

11 Cyber Terrorism "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents” FBI Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss would be examples. Serious attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not. The concept of ‘pure’ cyberterrorism — that is, terrorism activities that are carried out entirely (or primarily) — in the virtual world What would thiws look like.

12 Is Cyber Terrorism Really Terrorism?
Question involves violence - is it possible to have violence strictly with a computer attack? Why are we at risk? Dependence on computers

13 Terrorist Matrix II Note changes in matrix when the computer is added
In this model, not all of the elements are congruent with functional tasks assigned to given agencies. Thus, ‘terrorism’ can take place within these same groups that is not within the scope of investigation, etc.

14 Worst Cyber Terrorism Attack to Date
September 11, 2001 Was it really cyber terrorism?

15 Cyber Terrorism - Dynamics
Three types of attacks Physical Conventional Weapons Syntactic Malware Semantic More subtle approach Errors & unpredictable results Attack user’s confidence in the system

16 Cyber Terrorism - Steps
Reconnaissance Gain detailed information about target Social engineering, dumpster diving Scanning Determine targets computer software & network organization Gaining access Take over the target Stolen passwords, network vulnerabilities

17 Cyber Terrorism - Steps cont.
Maintaining access Allow further access Rootkits and backdoors Covering tracks Maintain control Gather further intelligence

18 Cyber Terrorism - Potential Effects
Targets Water supplies Electrical power supplies Emergency services Telecommunications systems Transportation systems Banking & financial systems Government

19 Countering Cyber Terrorism
Raise security levels in the private sectors Communication & coordination systems in the private sector Communication & coordination systems in government Establish emergency response plans Promote research & development Add & revise legislation Promote international cooperation

20 How Terrorist Use the Internet
Propaganda Recruitment Information storage Communications Funding Computer is used for support purposes 9/11 terrorists bought plane tickets online ================ Terrorism as theater - web’s good for assisting in that

21 Terrorist Web Sites

22 Google Maps

23 Cyberwarfare “The use of computers and the Internet in conducting warfare in cyberspace” Nation state as opposed to terrorist group

24 Possible Cyberwarfare Attacks
April Estonia (Russia) US government agencies (??) July Georgia (Russia) June Iran (Internal) July US and South Korea (??) "In 2007 we probably had our electronic Pearl Harbor. It was an espionage Pearl Harbor," Lewis said. "Some unknown foreign power, and honestly, we don't know who it is, broke into the Department of Defense, to the Department of State, the Department of Commerce, probably the Department of Energy, probably NASA. They broke into all of the high tech agencies, all of the military agencies, and downloaded terabytes of information."

25 Cyberwarfare Questions
Will we know who did it? Can retaliators hold assets at risk? Can they do so repeatedly? Can cyberattacks disarm cyberattackers? Will third parties stay out of the way? Might retaliation send the wrong message? Can states set thresholds for response? Can escalation be avoided?

26 Most likely use of cyber terrorism, and cyber warfare
In tandem with a physical attack.


Download ppt "Internet Vulnerabilities & Criminal Activity"

Similar presentations


Ads by Google