warriors tjs

21
7/25/2019 Warriors Tjs http://slidepdf.com/reader/full/warriors-tjs 1/21 1`1 Hacking and Information Warfare

Upload: fugitiev

Post on 01-Mar-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 1/21

1`1

Hacking and Information

Warfare

Page 2: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 2/21

2

Overview

Information Warriors Who Are They What Do They Do

Types of Threat

PsyOps ivi! Affairs "!ectronic Warfare Hackers#rackers y$er Terror  Defenders

Page 3: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 3/21

%

&eferences

http'##www(cert(org

InfoWar'

  http'##www(iwar(org()k#inde*(htm

http'##infowar(freeservers(com#inde*(htm!http'##www(nmrc(org#!inks#

)!t)re' http'##www(eff(org#p)$#+et,c)!t)re#

Terrorism' http'##www(terrorism(com#terrorism#!inks(shtm!

-ooks '.ter!ing / The Hacker rackdown

.to!! / The )ckoo0s "gg

Honeynet Proect 3now 4o)r "nemy

.chneier -eyond 5ear 

Page 4: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 4/21

6

Information Warriors

Information Warfare m)ch more than

omp)ter +etwork Operations 7+O8 Psycho!ogica! Operations ivi! Affairs

"!ectronic Warfare Ops

omp)ter Warriors o)nter/IW .pecia!ists 7Defenders8

Page 5: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 5/21

9

Threats

 National Security Critical National

Infrastructure

Cyber-Warfare/Computer

Network Operations

 Cyber Crime Organized Crime

Identity Teft

!"tortion

#raud

 Non-State $ctors Terrorists

%olitical $cti&ists

Page 6: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 6/21

:

Threats

+ation .tates Information Warfare is

recogni;ed as a part of mi!itary

strategy and doctrine aro)nd thewor!d

The st)dy and practice of

mi!itary )sage of Information

Warfare is ta)ght in mi!itaryacademies and ed)cationa!

faci!ities

Page 7: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 7/21

<

Threats

Organi;ed rime =ti!i;ed Information Warfare in

vario)s forms for cent)ries

"*tortion is a form of InformationWarfare

+ew techno!ogies $reed newcrimina!s

Techno!ogy creates trans/nationa!

crimina! organi;ations In certain nations> the !ines

$etween state actions andorgani;ed crime can $e $!)rred

Page 8: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 8/21

?

Transnationa! Organi;ed

rime

Organized

crime

Hacktivism

Insider 

crime

Hackers/

Crackers

Cyber-crime

Page 9: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 9/21

@

"*amp!e /Transnationa! Organi;ed

rime 

Individ)a! crime may $e diffic)!t to differentiate fromorgani;ed crime'

Distri$)tion and oordination too!s

ass e*p!oitation methodsOrgani;ed crime e*p!oits Information techno!ogies

"nhanced efficiencies on/!ine management ofi!!ega! gam$!ing schemes

Inte!!igence too! for risk management a!iorgani;ation in 1@@9 had state of the art eB)ipment 5orce m)!tip!ier CP. for sea drops

+ew channe!s and new targets for crime

Page 10: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 10/21

1

Threats

+on/.tate Actors Terrorists

Hacktivists .ometimes different sides

of the same page  As with organi;ed crime>

sometimes the !ines$etween state and non/state actors is $!)rred

Page 11: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 11/21

11

"*amp!e / Hacker to

TerrorismE

Defaced Hea!th/care we$ site inIndia FThis site has $een hacked $y I.I

73ashmir is o)rs8> we want a hospita!

in 3ashmirF and signed $y)ahideen/)!/dawat

Ginked to C/5orce Pakistan

C!o$a! Hactivism !inked to id/

"ast conf!ict Information Warfare s)ccessf)!!y

)ti!i;ed in hiapas conf!ict withe*ican gov0t

Page 12: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 12/21

12

"*amp!es / y$er/Intifada

Pro!onged campaign Pa!estinian hackers#we$ defacers

Targeting Israe!i and Israe!/s)pportingorgani;ations

Gow innovation !eve!

o)nter/campaigns P)$!icity o)nter/hacking' 2*.(co(i!

&ecent res)rgenceE

Page 13: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 13/21

1%

The Warriors

.ocio!ogy of warriors ora!e

igi!ance vs( ass)med inv)!nera$i!ity

Organi;ation

 otivation of warriors Acco)nta$i!ity vs( anarchy

De!ayed vs( immediate gratification

Interna! vs( e*terna! gratification

 Preparation of warriors Training

Too! se!ection

Inte!!igence

.trategy

Page 14: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 14/21

16

The Warriors

Psycho!ogica! Operations

Warriors .pecia!i;e in )sing information

warfare to change an enemy0sstate of mind Propaganda 7+ot !imited to PsyOps8

+on/threatening

Threatening

omp)ter +etwork Operations Coa! is to e!iminate confidence

Impacts decision/making and 2

Page 15: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 15/21

19

The Warriors

ivi! Affairs Winning the Hearts and inds

"ssentia! to mi!itary operations

=ti!i;es Information Warfarestrategies to ca!m and )ti!i;e

pop)!ations

.pecia!ists m)st )nderstand

s)$t!eties of !ang)age and c)!t)re

&esearch $egins !ong $efore the$att!e

Operations !ast !ong after the

$att!e is won

Page 16: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 16/21

1:

The Warriors

"!ectronic Warfare Ops Coa! is to )ti!i;e e!ectronic

information infrastr)ct)reagainst yo)r enemy Information !ost or modified

ake the enemy $!ind> deaf>

and d)m$

&estrict or contro!e!ectronic information

so)rces

Page 17: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 17/21

1<

The Warriors

omp)ter Warriors omp)ter +etwork

Operations Offensive attacks against

enemyinformation#comp)ternetworks

=ti!i;ation of sophisticatedattack too!s and ma!ware

+ewest form ofInformation Warfare Princip!es are the same

Page 18: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 18/21

1?

Attack Sophistication vs.Intruder Technical Knowledge

'ig

(owpassword guessing

self-replicating code

password cracking

e"ploiting known &ulnerabilities

disabling audits

back doors

i)acking

sessions

sweepers

sniffers

packet spoofing

*+Iautomated probes/scans

denial of ser&ice

www attacks

Tools

$ttackers

Intruder 

,nowledge

$ttack

Sopistication

stealt. / ad&anced

scanning tecniues

burglaries

network mgmt0 diagnostics

distributed

attack tools

Cross site scripting

Staged

attack

Time

Page 19: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 19/21

1@

"*amp!es &esponse Time to

+O

onficker 2@E

Page 20: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 20/21

2

y$er Terrorism

y$erterror is sti!! emerging  +o verified e*amp!e of cy$er terror attack to

date  "vo!ving threat  Integrating critica! missions with genera!

Internet  Increasing damage#speed of attacks  ontin)ed v)!nera$i!ity of off/the/she!f software

)ch conf)sion of descriptions anddefinitions Techno!ogy wide!y viewed as critica!

weakness of Western nations

Page 21: Warriors Tjs

7/25/2019 Warriors Tjs

http://slidepdf.com/reader/full/warriors-tjs 21/21

+e*t Week

.trategy' Defensive and Offensive

21