Upload
ulrich-janssen
View
567
Download
0
Embed Size (px)
DESCRIPTION
Presentation on the extent to what operations in cyberspace potentially influence people's perception, attitude, or behaviour.
Citation preview
Cyber and Influence
Computer Network Operations (CNO) affecting people‘s perception, attitude, or
behaviour
(C) 2010-11 by LTC U.M. Janßen, NSO/ISTAR
Cyber SpaceCyber War
Cyber TerrorismCyber Security
Cyber LawCyber – Hype???
Cyber Space• the electronic medium of computer networks, in which
online communication takes place.• the dynamic realization of electromagnetic energy
through the application of communication and control technology.
• a global domain that allows an interdependent network of information technology infrastructures (ITI), telecommunications networks, computer processing systems, integrated sensors, system control networks, embedded processors and controllers common to global control and communications across the electro-magnetic environment.
• a social experience, individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on …
(Wikipedia)
Understanding the Environment
Internet Continues to Develop• Social Networking – Facebook, Myspace,
Bebo, LinkedIn etc• New Media - uTube, Blogs, Twitter, Wiki• Real Worlds – Google Streetview/Earth• Virtual Worlds – 2nd Life, WoWarcraft• Communications – Skype, Bittorrent• Mobile Devices – Blackberry, iPhone
Hardware (PC, Laptop, Server)
Firmware (Microcode, BIOS)
Operating System (Windows, MacOS)
Application (Explorer, Word, Excel)
Plugins (Java, Active X, Flash, Viewers)
Applets & Objects (Java Code, Images etc)
Content (Web Pages, Email etc)
1.97 Billion Users – more than 1/3 of global pop
Impact on almost every facet of modern life – with growing in importance!
Actors
Cyber War Agencies/Commands
Hacker Community(Individuals / Groups)
Industry
Intelligence
Agencies Research
Labs
Law Enforcement Agencies
CriminalsTerrorists
Cyber Threat
Low High
High
Low
PossibleDamage
Probability of an event
2000
2005
2010
InsiderCriminals
IndustrialEspionage
Terrorists
Governmental
CriticalInfrastructure
Threat is a function of intent
(will) to act, understanding of the situation, and
capabilities to enforce will.
Threat is a function of intent
(will) to act, understanding of the situation, and
capabilities to enforce will.
Current threats - TTP• Caused by increased access• Disclosure of information• Corruption of information• Denial of service• Theft of resources• Loss of credit or reputation• Cyber Crime• Spam• Bulletproof Hosting• Malware• …?
Increased access
Social Engineering
War Driving
Tapping Fibre Optical Cable
Scanning and Sniffing
Disclosure of information
Keylogging
Printer - Copying
„Liechtensteining“
Spying
Denial of Service
DDoS
Buffer Overflow
Cable separation
Bounce Mail
Denial of ServiceSabotage
Theft of resources
Vietnam Cable Theft
Hardware Theft
Software & Media Theft
Loss of Credit or Reputation
Example:Maximilian
Example:Maximilian
Cyber CrimeSpectrum of Options
Phishing Malware
DoS/DDoSSPAM
ChildPorn Games
SPAM-Mail without content
SPAM
Manipulated Security Software
Cyber & Social Media
• Social activity vs. Cyber Ops / CNO– Observe, monitor– Act– Attribution
• Cyber mobbing / bullying– Use connectivity to blame your colleague /
boss … a government– Submit exposing photos, videos– Promulgate private information– Isolate … “De-friend”
Cyber & Military
• Ops affecting INFOSEC– Availability, confidentiality, integrity of information
• IKM– Information gathering, processing, managing,
sharing
• NNEC– Information sharing, exchanging– Data links, sensors, effectors– COP– Enabling rather than Cyber Ops weapon system
NATO & Cyber Ops• Policy & Doctrine
– Neither NATO Policy or Doctrine on CNO, nor allied “body” to deal with the issue
– CNO = CNE x CND x CAN– COMSEC, INFOSEC, X-SEC– Cyber Crime … Law Enforcement Task / legal concerns
• Common Defence– NCIRC– CCOE for Cyber Defence– Protection of EEFI and critical infrastructures
• Capability Development– Some nations have… national caveats– Undesired effects, BDA, loosing control– Cyber INTEL needed!
SummaryCNO affecting people’s perception,
attitude, or behaviour• Perception of the threat = f(W, U, C)• Attitude to be connected• Continue to use cyber• Virtual Battlefield in Cyber War• Cyber Attack against Estonia• Cyber Activities in RUS ./. GEO Conflict 2008• Conclusion
Cyber and Influence
Computer Network Operations (CNO) affecting people‘s perception, attitude, or
behaviour
(C) 2010-11 by LTC U.M. Janßen, NSO/ISTAR