Hacking and Information Warfare
description
Transcript of Hacking and Information Warfare
![Page 1: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/1.jpg)
1`1
Hacking and Information Warfare
![Page 2: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/2.jpg)
2
Overview
Information Warriors Who Are They What Do They Do
Types of Threat PsyOps Civil Affairs Electronic Warfare Hackers/Crackers Cyber Terror Defenders
![Page 3: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/3.jpg)
3
References
http://www.cert.orgInfoWar:
http://www.iwar.org.uk/index.htmhttp://infowar.freeservers.com/index.htmlhttp://www.nmrc.org/links/
Culture: http://www.eff.org/pub/Net_culture/Terrorism: http://www.terrorism.com/terrorism/links.shtml
Books :Sterling - The Hacker CrackdownStoll - The Cuckoo’s EggHoneynet Project – Know Your EnemySchneier – Beyond Fear
![Page 4: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/4.jpg)
4
Information Warriors
Information Warfare much more than Computer Network Operations (CNO) Psychological Operations Civil Affairs Electronic Warfare Ops Computer Warriors Counter-IW Specialists (Defenders)
![Page 5: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/5.jpg)
5
Threats National Security
Critical National Infrastructure
Cyber-Warfare/Computer Network Operations
Cyber Crime Organized Crime Identity Theft Extortion Fraud
Non-State Actors Terrorists Political Activists
![Page 6: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/6.jpg)
6
Threats
Nation States Information Warfare is
recognized as a part of military strategy and doctrine around the world
The study and practice of military usage of Information Warfare is taught in military academies and educational facilities
![Page 7: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/7.jpg)
7
Threats
Organized Crime Utilized Information Warfare in
various forms for centuries Extortion is a form of Information
Warfare New technologies breed new
criminals Technology creates trans-national
criminal organizations In certain nations, the lines
between state actions and organized crime can be blurred
![Page 8: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/8.jpg)
8
Transnational Organized Crime
Organizedcrime
Hacktivism
Insidercrime
Hackers/Crackers
Cyber-crime
![Page 9: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/9.jpg)
9
Example -Transnational Organized Crime
Individual crime may be difficult to differentiate from organized crime:
Distribution and Coordination tools Mass exploitation methods
Organized crime exploits Information technologies Enhanced efficiencies – on-line management of
illegal gambling schemes Intelligence tool for risk management – Cali
organization in 1995 had state of the art equipment Force multiplier – GPS for sea drops
New channels and new targets for crime
![Page 10: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/10.jpg)
10
Threats
Non-State Actors Terrorists Hacktivists
Sometimes different sides of the same page
As with organized crime, sometimes the lines between state and non-state actors is blurred
![Page 11: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/11.jpg)
11
Example - Hacker to Terrorism?
Defaced Health-care web site in India "This site has been hacked by ISI
(Kashmir is ours), we want a hospital in Kashmir" and signed by Mujahideen-ul-dawat
Linked to G-Force Pakistan
Global Hactivism linked to Mid-East conflict
Information Warfare successfully utilized in Chiapas conflict with Mexican gov’t
![Page 12: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/12.jpg)
12
Examples - Cyber-Intifada
Prolonged campaign Palestinian hackers/web defacers Targeting Israeli and Israel-supporting
organizations Low innovation level
Counter-campaigns Publicity Counter-hacking: 2xS.co.il
Recent resurgence?
![Page 13: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/13.jpg)
13
The WarriorsSociology of warriors
Morale Vigilance vs. assumed invulnerability Organization
Motivation of warriors Accountability vs. anarchy Delayed vs. immediate gratification Internal vs. external gratification
Preparation of warriors Training Tool selection Intelligence Strategy
![Page 14: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/14.jpg)
14
The Warriors Psychological Operations
Warriors Specialize in using information
warfare to change an enemy’s state of mind Propaganda (Not limited to PsyOps)
Non-threatening Threatening
Computer Network Operations Goal is to eliminate confidence Impacts decision-making and C2
![Page 15: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/15.jpg)
15
The Warriors
Civil Affairs Winning the Hearts and Minds!
Essential to military operations Utilizes Information Warfare
strategies to calm and utilize populations
Specialists must understand subtleties of language and culture Research begins long before the
battle Operations last long after the
battle is won
![Page 16: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/16.jpg)
16
The Warriors
Electronic Warfare Ops Goal is to utilize electronic
information infrastructure against your enemy Information lost or modified Make the enemy blind, deaf,
and dumb Restrict or control
electronic information sources
![Page 17: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/17.jpg)
17
The Warriors
Computer Warriors Computer Network
Operations Offensive attacks against
enemy information/computer networks
Utilization of sophisticated attack tools and malware
Newest form of Information Warfare Principles are the same
![Page 18: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/18.jpg)
18
Attack Sophistication vs.Intruder Technical Knowledge
High
Low password guessingself-replicating code
password cracking
exploiting known vulnerabilities
disabling auditsback doors
hijacking sessions
sweepers
sniffers
packet spoofing
GUIautomated probes/scans
denial of service
www attacks
Tools
Attackers
IntruderKnowledge
AttackSophistication
“stealth” / advanced scanning techniques
burglaries
network mgmt. diagnostics
distributedattack tools
Cross site scripting
Stagedattack
Time
![Page 19: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/19.jpg)
19
Examples – Response Time to CNO
Conficker 2009?
![Page 20: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/20.jpg)
20
Cyber Terrorism
Cyberterror is still emerging No verified example of cyber terror attack to
date Evolving threat Integrating critical missions with general
Internet Increasing damage/speed of attacks Continued vulnerability of off-the-shelf software
Much confusion of descriptions and definitions
Technology widely viewed as critical weakness of Western nations
![Page 21: Hacking and Information Warfare](https://reader036.fdocuments.net/reader036/viewer/2022081513/56816494550346895dd66a12/html5/thumbnails/21.jpg)
Next Week
Strategy: Defensive and Offensive
21