1 / 11

Elements of Threat - Challenges for Visualisation

Elements of Threat - Challenges for Visualisation. Barry Horne Visualisation N/X Penn State University 11 March 2003.

yitro
Download Presentation

Elements of Threat - Challenges for Visualisation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Elements of Threat - Challenges for Visualisation Barry Horne Visualisation N/X Penn State University 11 March 2003

  2. “Winston Wiley Deputy Director, CIA in 1998 discussed a number of generic threats. He suggests that the most direct threats will probably come from terrorism, and will include attacks against information systems such as critical infrastructure systems.” • (However, international disputes with nation states and non-state actors such as pressure groups cannot be ruled out.) • Transnational Threats to NATO in 2010. Winston Wiley. Deputy Director, CIA 10 February 1998. http://www.cia.gov/cia/di/speeches/index.html

  3. Critical National Infrastructure • Telecommunications • Financial Institutions • Utilities • Transport Infrastructure • Health Services • Emergency Services • Large Commercial complexes • Critical Technologies/Manufacture • Government Buildings • Military Installations • Law Enforcement organisations

  4. Threat Actors • Nation State • Insider • Terrorist • Investigative Agency • Criminal • Commercial Groups • Pressure Group • Hacker

  5. Some Characteristics of Conflict in the Information Age • The growth in asymmetric adversaries and non-state actors (empowered small agents) • Freely available easy to use technology • The globalization of information systems, financial markets and economies, and the media • Geographical borders irrelevant • Freely available massive data sets

  6. Where do attacks/intrusions originate?

  7. You can never be sure….. • Eligible Receiver ‘97 • Demonstration of hostile penetration of CNI and DOD • Solar Sunrise ‘98 • Systematic intrusions to DOD at time of tension in Gulf by Californian juveniles and Israeli ‘mentor’ • Moonlight Maze ‘98 - Wake Up Call! • Large scale intrusions eventually traced back to dial-up Internet connections near Moscow • “We are in the middle of a cyber war” - Dr Hamre, Dep Sec Def

  8. Level playing field • Equity in intelligence (David Hall) • Massive amounts of quality data available freely on Internet from official sources • Non-attributable information gathering • Anonymous browsing • Internet café

  9. What’s available in the Internet Candy Store? • Utilities • Transport systems • Personal data • Maps • Imagery • Economic data • … and much more! • And it’s all FREE! (No audit trail)

  10. Anomalous behaviour? • How to detect intelligence gathering on the Internet? • Anomalous behaviour = • Terrorist gathering information? • Or • High school student geography project?

More Related