7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 1/21
1`1
Hacking and Information
Warfare
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 2/21
2
Overview
Information Warriors Who Are They What Do They Do
Types of Threat
PsyOps ivi! Affairs "!ectronic Warfare Hackers#rackers y$er Terror Defenders
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 3/21
%
&eferences
http'##www(cert(org
InfoWar'
http'##www(iwar(org()k#inde*(htm
http'##infowar(freeservers(com#inde*(htm!http'##www(nmrc(org#!inks#
)!t)re' http'##www(eff(org#p)$#+et,c)!t)re#
Terrorism' http'##www(terrorism(com#terrorism#!inks(shtm!
-ooks '.ter!ing / The Hacker rackdown
.to!! / The )ckoo0s "gg
Honeynet Proect 3now 4o)r "nemy
.chneier -eyond 5ear
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 4/21
6
Information Warriors
Information Warfare m)ch more than
omp)ter +etwork Operations 7+O8 Psycho!ogica! Operations ivi! Affairs
"!ectronic Warfare Ops
omp)ter Warriors o)nter/IW .pecia!ists 7Defenders8
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 5/21
9
Threats
National Security Critical National
Infrastructure
Cyber-Warfare/Computer
Network Operations
Cyber Crime Organized Crime
Identity Teft
!"tortion
#raud
Non-State $ctors Terrorists
%olitical $cti&ists
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 6/21
:
Threats
+ation .tates Information Warfare is
recogni;ed as a part of mi!itary
strategy and doctrine aro)nd thewor!d
The st)dy and practice of
mi!itary )sage of Information
Warfare is ta)ght in mi!itaryacademies and ed)cationa!
faci!ities
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 7/21
<
Threats
Organi;ed rime =ti!i;ed Information Warfare in
vario)s forms for cent)ries
"*tortion is a form of InformationWarfare
+ew techno!ogies $reed newcrimina!s
Techno!ogy creates trans/nationa!
crimina! organi;ations In certain nations> the !ines
$etween state actions andorgani;ed crime can $e $!)rred
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 8/21
?
Transnationa! Organi;ed
rime
Organized
crime
Hacktivism
Insider
crime
Hackers/
Crackers
Cyber-crime
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 9/21
@
"*amp!e /Transnationa! Organi;ed
rime
Individ)a! crime may $e diffic)!t to differentiate fromorgani;ed crime'
Distri$)tion and oordination too!s
ass e*p!oitation methodsOrgani;ed crime e*p!oits Information techno!ogies
"nhanced efficiencies on/!ine management ofi!!ega! gam$!ing schemes
Inte!!igence too! for risk management a!iorgani;ation in 1@@9 had state of the art eB)ipment 5orce m)!tip!ier CP. for sea drops
+ew channe!s and new targets for crime
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 10/21
1
Threats
+on/.tate Actors Terrorists
Hacktivists .ometimes different sides
of the same page As with organi;ed crime>
sometimes the !ines$etween state and non/state actors is $!)rred
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 11/21
11
"*amp!e / Hacker to
TerrorismE
Defaced Hea!th/care we$ site inIndia FThis site has $een hacked $y I.I
73ashmir is o)rs8> we want a hospita!
in 3ashmirF and signed $y)ahideen/)!/dawat
Ginked to C/5orce Pakistan
C!o$a! Hactivism !inked to id/
"ast conf!ict Information Warfare s)ccessf)!!y
)ti!i;ed in hiapas conf!ict withe*ican gov0t
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 12/21
12
"*amp!es / y$er/Intifada
Pro!onged campaign Pa!estinian hackers#we$ defacers
Targeting Israe!i and Israe!/s)pportingorgani;ations
Gow innovation !eve!
o)nter/campaigns P)$!icity o)nter/hacking' 2*.(co(i!
&ecent res)rgenceE
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 13/21
1%
The Warriors
.ocio!ogy of warriors ora!e
igi!ance vs( ass)med inv)!nera$i!ity
Organi;ation
otivation of warriors Acco)nta$i!ity vs( anarchy
De!ayed vs( immediate gratification
Interna! vs( e*terna! gratification
Preparation of warriors Training
Too! se!ection
Inte!!igence
.trategy
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 14/21
16
The Warriors
Psycho!ogica! Operations
Warriors .pecia!i;e in )sing information
warfare to change an enemy0sstate of mind Propaganda 7+ot !imited to PsyOps8
+on/threatening
Threatening
omp)ter +etwork Operations Coa! is to e!iminate confidence
Impacts decision/making and 2
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 15/21
19
The Warriors
ivi! Affairs Winning the Hearts and inds
"ssentia! to mi!itary operations
=ti!i;es Information Warfarestrategies to ca!m and )ti!i;e
pop)!ations
.pecia!ists m)st )nderstand
s)$t!eties of !ang)age and c)!t)re
&esearch $egins !ong $efore the$att!e
Operations !ast !ong after the
$att!e is won
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 16/21
1:
The Warriors
"!ectronic Warfare Ops Coa! is to )ti!i;e e!ectronic
information infrastr)ct)reagainst yo)r enemy Information !ost or modified
ake the enemy $!ind> deaf>
and d)m$
&estrict or contro!e!ectronic information
so)rces
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 17/21
1<
The Warriors
omp)ter Warriors omp)ter +etwork
Operations Offensive attacks against
enemyinformation#comp)ternetworks
=ti!i;ation of sophisticatedattack too!s and ma!ware
+ewest form ofInformation Warfare Princip!es are the same
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 18/21
1?
Attack Sophistication vs.Intruder Technical Knowledge
'ig
(owpassword guessing
self-replicating code
password cracking
e"ploiting known &ulnerabilities
disabling audits
back doors
i)acking
sessions
sweepers
sniffers
packet spoofing
*+Iautomated probes/scans
denial of ser&ice
www attacks
Tools
$ttackers
Intruder
,nowledge
$ttack
Sopistication
stealt. / ad&anced
scanning tecniues
burglaries
network mgmt0 diagnostics
distributed
attack tools
Cross site scripting
Staged
attack
Time
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 19/21
1@
"*amp!es &esponse Time to
+O
onficker 2@E
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 20/21
2
y$er Terrorism
y$erterror is sti!! emerging +o verified e*amp!e of cy$er terror attack to
date "vo!ving threat Integrating critica! missions with genera!
Internet Increasing damage#speed of attacks ontin)ed v)!nera$i!ity of off/the/she!f software
)ch conf)sion of descriptions anddefinitions Techno!ogy wide!y viewed as critica!
weakness of Western nations
7/25/2019 Warriors Tjs
http://slidepdf.com/reader/full/warriors-tjs 21/21
+e*t Week
.trategy' Defensive and Offensive
21
Top Related