1 / 26

Internet Vulnerabilities & Criminal Activity

Internet Vulnerabilities & Criminal Activity. Cyber Terrorism and Cyber Warfare November 14, 2011. Terrorism - FBI.

cmedina
Download Presentation

Internet Vulnerabilities & Criminal Activity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011

  2. Terrorism - FBI “The unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”

  3. Terrorism - DOD “The unlawful use of, or threatened use, of force or violence against individuals or property, to coerce and intimidate governments or societies, often to achieve political, religious or ideological objectives”

  4. Terrorism - DOS “Premeditated, politically motivated violence perpetrated against noncombatant targets by sub national groups or clandestine agents”

  5. FBI - Terrorism Descriptions • Domestic or Foreign • “Depending on the origin, base, and objectives of the terrorist organization.” • Terrorist Activities • Incident • “A violent act or an act dangerous to human life, in violation of the criminal laws of the United States, or of any state, to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” • Prevention • “A documented instance in which a violent act by a known or suspected terrorist group or individual with the means and a proven propensity for violence is successfully interdicted through investigative activity.”

  6. More on Terrorism • Political in nature • Smaller weaker group vs. larger group • No legitimate means of protest • Violence against civilians • Symbolic targets • Designed to provoke response • Aimed at larger audience

  7. What Makes a Terrorist? • A disaffected individual • An enabling group • A legitimizing ideology

  8. Leadership Long-term goals Political change Followers Short-term goals Revenge Renown Reaction Terrorist Goals

  9. Terrorism Matrix • People (or groups) • Locations (of perpetrators, facilitators, victims) • Methods/modes of action • Tools • Targets • Affiliations • Motivations

  10. Terrorism Matrix I

  11. Cyber Terrorism "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents” FBI

  12. Is Cyber Terrorism Really Terrorism?

  13. Terrorist Matrix II

  14. Worst Cyber Terrorism Attack to Date September 11, 2001

  15. Cyber Terrorism - Dynamics • Three types of attacks • Physical • Conventional Weapons • Syntactic • Malware • Semantic • More subtle approach • Errors & unpredictable results • Attack user’s confidence in the system

  16. Cyber Terrorism - Steps • Reconnaissance • Gain detailed information about target • Social engineering, dumpster diving • Scanning • Determine targets computer software & network organization • Gaining access • Take over the target • Stolen passwords, network vulnerabilities

  17. Cyber Terrorism - Steps cont. • Maintaining access • Allow further access • Rootkits and backdoors • Covering tracks • Maintain control • Gather further intelligence

  18. Cyber Terrorism - Potential Effects • Targets • Water supplies • Electrical power supplies • Emergency services • Telecommunications systems • Transportation systems • Banking & financial systems • Government

  19. Countering Cyber Terrorism • Raise security levels in the private sectors • Communication & coordination systems in the private sector • Communication & coordination systems in government • Establish emergency response plans • Promote research & development • Add & revise legislation • Promote international cooperation

  20. How Terrorist Use the Internet • Propaganda • Recruitment • Information storage • Communications • Funding

  21. Terrorist Web Sites

  22. Google Maps

  23. Cyberwarfare “The use of computers and the Internet in conducting warfare in cyberspace”

  24. Cyberwarfare Questions • Will we know who did it? • Can retaliators hold assets at risk? • Can they do so repeatedly? • Can cyberattacks disarm cyberattackers? • Will third parties stay out of the way? • Might retaliation send the wrong message? • Can states set thresholds for response? • Can escalation be avoided?

  25. Most likely use of cyber terrorism, and cyber warfare In tandem with a physical attack.

More Related