Module 1 & 2 Flashcards
Guiding military principle of cyber warfare
Ultimate goal of an offensive doctrine is the planning of and subsequent execution of an effective cyber “ first strike” against the enemy.
US Cyber Attacks
First Gulf War US eliminated Iraq’s ability to communicate. Sig. Due to other nation’s notice.
Cyber warfare motivations
Political Social Financial / economic Religious Act of self-preservation
4 roles of IT systems in cyber warfare
Medium
Source of information
Target of an attack
Source of an attack
IT systems as the medium
Disseminate information used in attacks and terrorist activities (kinetic or cyber)
Provide training
Tools (emails, forums, social networking)
IT systems as source of info
Steal sensitive information
Perform reconnaissance (cyber profiling)
Witness to an attack (logs)
Open source intelligence (osint)
IT Systems as target
Steal sensitive info (financial, trade secrets, government info, military info)
Attack other systems to disrupt communication
Take systems offline
Cyber vandalism / web site defacement
IT systems as attack source
Direct attacks from criminals
Bot nets
Infected websites used to drop payloads
Drive behind Russian programs
Response to an aggressive development of a US information warfare program.
Russia: Prior to “information strike” the following should occur:
Targets should be ID’d
Enemy access to external info should be denied
Credit and monetary circulation should be disrupted
Populace subjected to psychological operation – incl disinformation and propaganda
Russia: Doctrine of Information Security
09/2000
Objectives:
Protect strategically important info
Protect against deleterious foreign information
Inculcate in the people patriotism and values
First authoritative summary of Russia’s view on information security in the public, government, and military sectors and plan for future development.
Russia: Military doctrine
July 2000
Vladimir Putin
Discussed hostile information operations conducted through either technological or psychological means.
China attack 1998
3000 hackers
China Hacker Emergency Meeting Center
Against Indonesia government websites
Outrage at anti-Chinese riots in Indonesia
China attack - 1999
Chinese Red Hacker Alliance
NATO jet accidentally bombed Chinese embassy in Belgrade, Yugoslavia
Against US government websites
China - 2001
Chinese fighter jet collided with US military aircraft over South China Sea
80000 hackers
Self-defense cyber war against US aggression