26
Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011

Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Embed Size (px)

Citation preview

Page 1: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Internet Vulnerabilities & Criminal Activity

Internet Vulnerabilities & Criminal Activity

Cyber Terrorism and Cyber Warfare

November 14, 2011

Cyber Terrorism and Cyber Warfare

November 14, 2011

Page 2: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Terrorism - FBITerrorism - FBI

“The unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any

segment thereof, in furtherance of political or social objectives.”

“The unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any

segment thereof, in furtherance of political or social objectives.”

Page 3: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Terrorism - DODTerrorism - DOD

“The unlawful use of, or threatened use, of force or violence against individuals or

property, to coerce and intimidate governments or societies, often to achieve

political, religious or ideological objectives”

“The unlawful use of, or threatened use, of force or violence against individuals or

property, to coerce and intimidate governments or societies, often to achieve

political, religious or ideological objectives”

Page 4: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Terrorism - DOSTerrorism - DOS

“Premeditated, politically motivated violence perpetrated against

noncombatant targets by sub national groups or clandestine agents”

“Premeditated, politically motivated violence perpetrated against

noncombatant targets by sub national groups or clandestine agents”

Page 5: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

FBI - Terrorism DescriptionsFBI - Terrorism Descriptions

Domestic or Foreign “Depending on the origin, base, and objectives of the

terrorist organization.” Terrorist Activities

Incident “A violent act or an act dangerous to human life, in violation of the

criminal laws of the United States, or of any state, to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”

Prevention “A documented instance in which a violent act by a known or

suspected terrorist group or individual with the means and a proven propensity for violence is successfully interdicted through investigative activity.”

Domestic or Foreign “Depending on the origin, base, and objectives of the

terrorist organization.” Terrorist Activities

Incident “A violent act or an act dangerous to human life, in violation of the

criminal laws of the United States, or of any state, to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”

Prevention “A documented instance in which a violent act by a known or

suspected terrorist group or individual with the means and a proven propensity for violence is successfully interdicted through investigative activity.”

Page 6: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

More on TerrorismMore on Terrorism

Political in nature Smaller weaker group vs. larger group No legitimate means of protest Violence against civilians Symbolic targets Designed to provoke response Aimed at larger audience

Political in nature Smaller weaker group vs. larger group No legitimate means of protest Violence against civilians Symbolic targets Designed to provoke response Aimed at larger audience

Page 7: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

What Makes a Terrorist?What Makes a Terrorist?

A disaffected individual

An enabling group

A legitimizing ideology

A disaffected individual

An enabling group

A legitimizing ideology

Page 8: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Terrorist GoalsTerrorist Goals

Leadership

Long-term goals

Political change

Leadership

Long-term goals

Political change

Followers

Short-term goals

Revenge

Renown

Reaction

Followers

Short-term goals

Revenge

Renown

Reaction

Page 9: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Terrorism MatrixTerrorism Matrix

People (or groups)

Locations (of perpetrators, facilitators, victims)

Methods/modes of action

Tools

Targets

Affiliations

Motivations

People (or groups)

Locations (of perpetrators, facilitators, victims)

Methods/modes of action

Tools

Targets

Affiliations

Motivations

Page 10: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Terrorism Matrix ITerrorism Matrix I

Page 11: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Cyber TerrorismCyber Terrorism

"The premeditated, politically motivated attack against information, computer systems, computer

programs, and data which result in violence against noncombatant targets by sub-national

groups or clandestine agents”

FBI

"The premeditated, politically motivated attack against information, computer systems, computer

programs, and data which result in violence against noncombatant targets by sub-national

groups or clandestine agents”

FBI

Page 12: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Is Cyber Terrorism Really Terrorism?

Is Cyber Terrorism Really Terrorism?

Page 13: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Terrorist Matrix IITerrorist Matrix II

Page 14: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Worst Cyber Terrorism Attack to Date

Worst Cyber Terrorism Attack to Date

September 11, 2001September 11, 2001

Page 15: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Cyber Terrorism - DynamicsCyber Terrorism - Dynamics

Three types of attacks Physical

Conventional Weapons Syntactic

Malware Semantic

More subtle approach Errors & unpredictable results Attack user’s confidence in the system

Three types of attacks Physical

Conventional Weapons Syntactic

Malware Semantic

More subtle approach Errors & unpredictable results Attack user’s confidence in the system

Page 16: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Cyber Terrorism - StepsCyber Terrorism - Steps

Reconnaissance Gain detailed information about target Social engineering, dumpster diving

Scanning Determine targets computer software & network

organization

Gaining access Take over the target Stolen passwords, network vulnerabilities

Reconnaissance Gain detailed information about target Social engineering, dumpster diving

Scanning Determine targets computer software & network

organization

Gaining access Take over the target Stolen passwords, network vulnerabilities

Page 17: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Cyber Terrorism - Steps cont.Cyber Terrorism - Steps cont.

Maintaining access Allow further access Rootkits and backdoors

Covering tracks Maintain control Gather further intelligence

Maintaining access Allow further access Rootkits and backdoors

Covering tracks Maintain control Gather further intelligence

Page 18: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Cyber Terrorism - Potential EffectsCyber Terrorism - Potential Effects

Targets Water supplies Electrical power supplies Emergency services Telecommunications systems Transportation systems Banking & financial systems Government

Targets Water supplies Electrical power supplies Emergency services Telecommunications systems Transportation systems Banking & financial systems Government

Page 19: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Countering Cyber TerrorismCountering Cyber Terrorism

Raise security levels in the private sectors Communication & coordination systems in the

private sector Communication & coordination systems in

government Establish emergency response plans Promote research & development Add & revise legislation Promote international cooperation

Raise security levels in the private sectors Communication & coordination systems in the

private sector Communication & coordination systems in

government Establish emergency response plans Promote research & development Add & revise legislation Promote international cooperation

Page 20: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

How Terrorist Use the InternetHow Terrorist Use the Internet

Propaganda

Recruitment

Information storage

Communications

Funding

Propaganda

Recruitment

Information storage

Communications

Funding

Page 21: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Terrorist Web SitesTerrorist Web Sites

Page 22: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Google MapsGoogle Maps

Page 23: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

CyberwarfareCyberwarfare

“The use of computers and the Internet in conducting warfare in

cyberspace”

“The use of computers and the Internet in conducting warfare in

cyberspace”

Page 24: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Attack Target Category Target Sub-Category Attacker*

Siberian Pipeline Explosion

Resources Physical Damage United States

Kosovo War Resources Disruption United States

Moonlight Maze Data Espionage (Intelligence)

Russia

Hainan Spy Plane Resources Disruption China

Titan Rain (China) Data Espionage (Intelligence)

China

Estonia Resources Disruption Russia

Israel vs. Syrian Missile Defense

Resources Disruption Israel

South Ossetia War (Georgia)

Resources Disruption Russia

Israel vs. Hamas Resources Disruption Israel & Hamas

GhostNet Data Espionage (Intelligence)

China

North Korea Resources Disruption North Korea

Operation Aurora Data Espionage (Intellectual Property)

China

Stuxnet Worm (Iran) Resources Physical Damage Israel (U. S.)

Page 25: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Cyberwarfare QuestionsCyberwarfare Questions

Will we know who did it? Can retaliators hold assets at risk? Can they do so repeatedly? Can cyberattacks disarm cyberattackers? Will third parties stay out of the way? Might retaliation send the wrong message? Can states set thresholds for response? Can escalation be avoided?

Will we know who did it? Can retaliators hold assets at risk? Can they do so repeatedly? Can cyberattacks disarm cyberattackers? Will third parties stay out of the way? Might retaliation send the wrong message? Can states set thresholds for response? Can escalation be avoided?

Page 26: Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011

Most likely use of cyber terrorism, and cyber warfare

Most likely use of cyber terrorism, and cyber warfare

In tandem with a physical attack.In tandem with a physical attack.