Lecture 7: Cyber and Space Flashcards

1
Q

Cybergeddon

A

Cybergeddon refers to a catastrophic, widespread cyberattack that disrupts critical infrastructure, economies, and global security, causing massive and potentially irreversible damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cyber security

A

not isolated anymore, Human societies going through sea change in communications.
Stakeholders include businesses, government agencies, civil society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyber Deterrence

A

Cyber Deterrence
- Refers to the use of cyber operations to deter actions in other domains or prevent adversary cyber operations.
- Involves using cyber punishment, defensive activities, and retaliatory actions to raise the costs of adversary attacks, as well as using non-cyber threats to deter cyber-attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cyberspace

A

“Global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyber War

A

“hostile actions in cyberspace that have effects that amplify or are equivalent to major kinetic violence”
* Utilized by state and non-state actors: Hamas, Isis, against Israel etc.
* Involves direct attacks in cyberspace that are not necessarily aimed at military forces per se, but are directed at opponents digitally enabled systems in general
* Usually launched in tandem with conventional military operations (e.g. during Russo-Georgia war)
* Can also be utilized in peacetime (Stuxnet attack causes physical damage in Iranian nuclear centrifuges)
* These types of acts are rare compared to financial crimes, espionage, and information operations (e.g. hybrid or grey zone war) – more than half of all cyber operations are aimed at collecting information or disseminating information
–> gray zone, and not necessarily any form of war.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyber power and non-state actors

A
  • Groups such as ISIS use digital technologies to recruit, train, fundraise and purchase supplies
  • ISIS only able to conduct small-scale denial of service attacks
  • Terrorist attacks produce shock (explosions, casualties) whereas cyber operations take time, money, and technical skill
  • Terrorist groups focus on what is cheap, noticeable and deadly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Russian cyberattacks on Estonia (2007)

A

Russian attacks followed decision by Estonian government to move Soviet-era statue and graves
Cyber campaign over several weeks includes denial of service, attacks on government websites, banks and media organizations
Concurred alongside street protests by ethnic Russians living in Estonia
Estonia does not invoke NATO’s Article 5
After attack Estonia makes major investments in cyberdefense (public and private sector)
–> NATO had not really thought about it before. It invested money in cybersecurity: now leader in building of those technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ukraine’s IT Army

A
  • After 2022 Ukraine emerges as 12th biggest cyber power; Russia ranks third
  • IT Army created on 26 February 2022 as part of Ministry of Digital Transformation
  • Hundreds of thousands of supporters aid Ukraine
  • Manages by a team of senior military and intelligence officers
  • Use distributed denial-of-service attacks and other cyber-attacks against Russia’s digital infrastructure (banks, businesses, government websites)
  • Imposes economic costs on Russian businesses but also places limits on some civilian targets (e.g. hospitals)
  • Ukraine cybersecurity supported by firms such as Microsoft, Google, and Amazon
    Ukraine developed a lot and got a lot of help. They created an IT army: 300,000 supporters around the world in support of Ukraine and securing their banks and businesses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does North Korea use cyber operations?

A

North Korea’s 7,000-strong cyber army conducts ransomware attacks, bank heists, and espionage to fund its nuclear and missile programs, raising an estimated $2 billion by 2019.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1967 Outer Space Treaty

A

The 1967 Outer Space Treaty was an agreement between the US and Soviet Union (SU), along with other nations, to prevent the placement of nuclear weapons in outer space and ensure space would be used for peaceful purposes. It also prohibited military bases or installations on celestial bodies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Military use of space

A
  • US first uses satellites in Vietnam war
  • Maintains three space programs (NASA civil space; National Reconnaissance Office spy satellites, military satellites for communications, navigation, early warning)
  • Satellite reconnaissance completely changes nuclear (and international) landscape – provides stability in arms race, facilitates arms control, reduces fear of sneak attack
  • Become more central to warfighting during 1991 Gulf War, especially to enable communications and GPS guided precision strikes
  • Key Trend: Anti-satellite weapons + massive growth in commercial use of space (and military reliance on private sector satellites)
  • China 2007 ASAT test, Russia 2021 ASAT test
  • But so many commercial satellites this may negate effectiveness of ASAT systems
  • Low Earth Orbit satellites more likely targets but cause significant debris
  • Attacks on ground-based systems instead
  • To go after Geostationary Earth Orbit nuclear command and control satellites would risk nuclear escalation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ukraine war and satellites

A

Commercial satellite imaging offers vital intelligence to Ukraine.
Starlink satellites provide connectivity for the Ukrainian military, supporting drone strikes.
Satellites are essential for gathering intelligence and making progress against Russian forces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

´´here to save the day´´

A
  • Space security is not only looking down to earth from space!
  • Also need to think about protecting earth from asteroids and comets (Near Earth Objects)
  • Not only nuclear war and climate change can produce extinction level effects!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Starfish Prime (1962)

A

A 1.45 megaton nuclear test detonated 280 miles above sea level, generating an Electromagnetic Pulse (EMP) that affected Hawaii and damaged one-third of satellites in orbit at the time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What was Reagan’s Strategic Defense Initiative (SDI) and its impact?

A

The SDI, initiated in 1983, was a missile defense program aimed at protecting the U.S. from nuclear missile attacks using land and space-based systems. Reagan’s refusal to abandon it during arms control talks likely delayed the end of the Cold War and prevented deeper nuclear weapons reductions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is AI used in the Russia-Ukraine War?

A

AI is used by Ukraine for geolocation and analysis of open-source data (e.g., social media) to identify Russian forces and movements. Neural networks analyze drone footage and satellite imagery to provide faster intelligence. Private companies assist by visualizing positions and assessing battlefield damage. AI also enhances Ukrainian cyber defense by enabling quick distribution of protective software. Russia is developing AI for analysis and data gathering but hasn’t deployed it effectively yet.

16
Q

What role did AI play in the May 2021 Israel-Gaza conflict?

A

In the May 2021 conflict, Israel’s military, the IDF, used AI tools to identify and target Hamas. The AI sped up the intelligence analysis and decision-making processes, allowing hundreds of strikes to be approved weekly. The Lavender system ranked individuals based on data to assist in targeting decisions, significantly reducing the time previously needed for review. However, the use of AI raised concerns due to potential issues with faulty data and algorithms.