Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011.

Similar presentations


Presentation on theme: "Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011."— Presentation transcript:

1 Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

2 Terrorism - FBI “The unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”

3 Terrorism - DOD “The unlawful use of, or threatened use, of force or violence against individuals or property, to coerce and intimidate governments or societies, often to achieve political, religious or ideological objectives”

4 Terrorism - DOS “Premeditated, politically motivated violence perpetrated against noncombatant targets by sub national groups or clandestine agents”

5 FBI - Terrorism Descriptions  Domestic or Foreign  “Depending on the origin, base, and objectives of the terrorist organization.”  Terrorist Activities  Incident  “A violent act or an act dangerous to human life, in violation of the criminal laws of the United States, or of any state, to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”  Prevention  “A documented instance in which a violent act by a known or suspected terrorist group or individual with the means and a proven propensity for violence is successfully interdicted through investigative activity.”  Domestic or Foreign  “Depending on the origin, base, and objectives of the terrorist organization.”  Terrorist Activities  Incident  “A violent act or an act dangerous to human life, in violation of the criminal laws of the United States, or of any state, to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”  Prevention  “A documented instance in which a violent act by a known or suspected terrorist group or individual with the means and a proven propensity for violence is successfully interdicted through investigative activity.”

6 More on Terrorism  Political in nature  Smaller weaker group vs. larger group  No legitimate means of protest  Violence against civilians  Symbolic targets  Designed to provoke response  Aimed at larger audience  Political in nature  Smaller weaker group vs. larger group  No legitimate means of protest  Violence against civilians  Symbolic targets  Designed to provoke response  Aimed at larger audience

7 What Makes a Terrorist?  A disaffected individual  An enabling group  A legitimizing ideology  A disaffected individual  An enabling group  A legitimizing ideology

8 Terrorist Goals  Leadership  Long-term goals  Political change  Leadership  Long-term goals  Political change  Followers  Short-term goals  Revenge  Renown  Reaction

9 Terrorism Matrix  People (or groups)  Locations (of perpetrators, facilitators, victims)  Methods/modes of action  Tools  Targets  Affiliations  Motivations  People (or groups)  Locations (of perpetrators, facilitators, victims)  Methods/modes of action  Tools  Targets  Affiliations  Motivations

10 Terrorism Matrix I

11 Cyber Terrorism "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents” FBI "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents” FBI

12 Is Cyber Terrorism Really Terrorism?

13 Terrorist Matrix II

14 Worst Cyber Terrorism Attack to Date September 11, 2001

15 Cyber Terrorism - Dynamics  Three types of attacks  Physical  Conventional Weapons  Syntactic  Malware  Semantic  More subtle approach  Errors & unpredictable results  Attack user’s confidence in the system  Three types of attacks  Physical  Conventional Weapons  Syntactic  Malware  Semantic  More subtle approach  Errors & unpredictable results  Attack user’s confidence in the system

16 Cyber Terrorism - Steps  Reconnaissance  Gain detailed information about target  Social engineering, dumpster diving  Scanning  Determine targets computer software & network organization  Gaining access  Take over the target  Stolen passwords, network vulnerabilities  Reconnaissance  Gain detailed information about target  Social engineering, dumpster diving  Scanning  Determine targets computer software & network organization  Gaining access  Take over the target  Stolen passwords, network vulnerabilities

17 Cyber Terrorism - Steps cont.  Maintaining access  Allow further access  Rootkits and backdoors  Covering tracks  Maintain control  Gather further intelligence  Maintaining access  Allow further access  Rootkits and backdoors  Covering tracks  Maintain control  Gather further intelligence

18 Cyber Terrorism - Potential Effects  Targets  Water supplies  Electrical power supplies  Emergency services  Telecommunications systems  Transportation systems  Banking & financial systems  Government  Targets  Water supplies  Electrical power supplies  Emergency services  Telecommunications systems  Transportation systems  Banking & financial systems  Government

19 Countering Cyber Terrorism  Raise security levels in the private sectors  Communication & coordination systems in the private sector  Communication & coordination systems in government  Establish emergency response plans  Promote research & development  Add & revise legislation  Promote international cooperation  Raise security levels in the private sectors  Communication & coordination systems in the private sector  Communication & coordination systems in government  Establish emergency response plans  Promote research & development  Add & revise legislation  Promote international cooperation

20 How Terrorist Use the Internet  Propaganda  Recruitment  Information storage  Communications  Funding  Propaganda  Recruitment  Information storage  Communications  Funding

21 Terrorist Web Sites

22 Google Maps

23 Cyberwarfare “The use of computers and the Internet in conducting warfare in cyberspace”

24 AttackTarget CategoryTarget Sub-CategoryAttacker* Siberian Pipeline Explosion ResourcesPhysical DamageUnited States Kosovo WarResourcesDisruptionUnited States Moonlight MazeDataEspionage (Intelligence) Russia Hainan Spy PlaneResourcesDisruptionChina Titan Rain (China)DataEspionage (Intelligence) China EstoniaResourcesDisruptionRussia Israel vs. Syrian Missile Defense ResourcesDisruptionIsrael South Ossetia War (Georgia) ResourcesDisruptionRussia Israel vs. HamasResourcesDisruptionIsrael & Hamas GhostNetDataEspionage (Intelligence) China North KoreaResourcesDisruptionNorth Korea Operation AuroraDataEspionage (Intellectual Property) China Stuxnet Worm (Iran)ResourcesPhysical DamageIsrael (U. S.)

25 Cyberwarfare Questions  Will we know who did it?  Can retaliators hold assets at risk?  Can they do so repeatedly?  Can cyberattacks disarm cyberattackers?  Will third parties stay out of the way?  Might retaliation send the wrong message?  Can states set thresholds for response?  Can escalation be avoided?  Will we know who did it?  Can retaliators hold assets at risk?  Can they do so repeatedly?  Can cyberattacks disarm cyberattackers?  Will third parties stay out of the way?  Might retaliation send the wrong message?  Can states set thresholds for response?  Can escalation be avoided?

26 Most likely use of cyber terrorism, and cyber warfare In tandem with a physical attack.


Download ppt "Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011."

Similar presentations


Ads by Google