Q1 NATIONALS Flashcards
Ukrainian power network
- cyber attack in 2015
- caused power outages for several hours
- “ransom ware” –software designed to block user’s access to data, sometimes by encrypting it– infection that affected many hospitals in the U.K. I’m late 2016
Examples of hacking US
Theft data on the F-35 joint strike fighter, the F-22 raptor fighter jet, and the MV-22 osprey
How does hacking the US help opponents
- Reduces cost
- accelerates their weapon systems development programs
- undermines US military, technological, and commercial advantage
What are the psychological consequences of cypher threats
Distort perceptions of the targeted victim and other audiences through the anonymous delivery of manipulative content that seeks to gain influence or foment confusion distrust
Information taken through cyber espionage can be leaked intact or selectively altered in content
For example Russian actors have seeded falsified information into social media and news feeds and websites in order to sow downy and confusion, erode father in democratic institutions, and attempt to protest western governments as inherently corrupted or dysfunctional
China-Us bilateral joint statement
In 2014 china and us made a joint statement, affirming that no country should conduct or support cyber-enabled theft of intellectual property with the intent of providing competitive advantages to companies or commercial sectors
Cyber warfare
As of late 2016 more than 30 nations are developing offensive cyber attack capability
Russia
Poses a major threat to US government military, diplomatic, commercial, -‘d critical infrastructure
Russian intelligence actors have masqueraded as third parties, hiding behind false online personals design to cause the victims to misattribute the source of the attack
China
Beijing continues to conduct cyber espionage against the US Government, our allies and US companies
Terrorist
Terri sit groups- Al-Qa’ida, hizballah, HAMA, and Islamic state of Iraq and the Levant– continue to use the internet to collect intelligence, coordinate operations, raise fund, spread propaganda, and invite action.
Groups like the Taliban also use internet-based technology for similar purposes
Cyber threats
Cyber threats has become increasingly diverse, sophisticated, and dangerous