SlideShare a Scribd company logo
1 of 21
Cyber and Influence
  Computer Network Operations (CNO)
affecting people‘s perception, attitude, or
                behaviour


      (C) 2010-11 by LTC U.M. Janßen, NSO/ISTAR
Cyber Space
  Cyber War
Cyber Terrorism
 Cyber Security
  Cyber Law
Cyber – Hype???
Cyber Space
• the electronic medium of computer networks, in which
  online communication takes place.
• the dynamic realization of electromagnetic energy
  through the application of communication and control
  technology.
• a global domain that allows an interdependent network
  of information technology infrastructures (ITI),
  telecommunications networks, computer processing
  systems, integrated sensors, system control networks,
  embedded processors and controllers common to
  global control and communications across the electro-
  magnetic environment.
• a social experience, individuals can interact, exchange
  ideas, share information, provide social support,
  conduct business, direct actions, create artistic media,
  play games, engage in political discussion, and so on …
                                                    (Wikipedia)
Understanding the Environment




1.97 Billion Users – more than 1/3 of global pop
                                                    Internet Continues to Develop
            Content (Web Pages, Email etc)          • Social Networking – Facebook, Myspace,
       Applets & Objects (Java Code, Images etc)        Bebo, LinkedIn etc
         Plugins (Java, Active X, Flash, Viewers)   • New Media - uTube, Blogs, Twitter, Wiki
           Application (Explorer, Word, Excel)      • Real Worlds – Google Streetview/Earth
          Operating System (Windows, MacOS)
                                                    • Virtual Worlds – 2nd Life, WoWarcraft
              Firmware (Microcode, BIOS)
                                                    • Communications – Skype, Bittorrent
             Hardware (PC, Laptop, Server)
                                                    • Mobile Devices – Blackberry, iPhone

        Impact on almost every facet of modern life – with growing in importance!
Actors



      Cyber War
  Agencies/Commands                                   Law Enforcement
                                  Industry
                                                         Agencies




             Hacker Community          Intelligence
Criminals    (Individuals / Groups)                        Research
                                        Agencies
Terrorists                                                   Labs
Cyber Threat                                        Threat is a
                                                                              function of intent
                                                                                 (will) to act,
   High                                                                      understanding of
                                                                             the situation, and
                                                                                capabilities to
                   Governmental
                                                                                 enforce will.
                                                               2010

                                  Critical
Possible
                              Infrastructure       2005
Damage
                 Terrorists
                                  2000



                                               Industrial
                                               Espionage
                                                                 Criminals           Insider
  Low

           Low                       Probability of an event          High
Current threats - TTP
•   Caused by increased access
•   Disclosure of information
•   Corruption of information
•   Denial of service
•   Theft of resources
•   Loss of credit or reputation
•   Cyber Crime
•   Spam
•   Bulletproof Hosting
•   Malware
•   …?
Increased access


                        Social Engineering


         War Driving




Tapping Fibre Optical Cable

                    Scanning and Sniffing
Disclosure of information




Keylogging

                 Printer - Copying




        Spying


                      „Liechtensteining“
Denial of Service
                      DDoS



Bounce Mail



    Buffer Overflow



                      Cable separation
Denial of Service
    Sabotage
Theft of resources



   Hardware Theft




             Software & Media Theft


Vietnam Cable Theft
Loss of Credit or Reputation

                       Example:
                       Maximilian
Cyber Crime
               Spectrum of Options

   Phishing                    Malware




                                         DoS/
SPAM                                     DDoS



       Child
                               Games
       Porn
SPAM



SPAM-Mail without content
Manipulated Security Software
Cyber & Social Media
• Social activity vs. Cyber Ops / CNO
  – Observe, monitor
  – Act
  – Attribution
• Cyber mobbing / bullying
  – Use connectivity to blame your colleague /
    boss … a government
  – Submit exposing photos, videos
  – Promulgate private information
  – Isolate … “De-friend”
Cyber & Military
• Ops affecting INFOSEC
  – Availability, confidentiality, integrity of information
• IKM
  – Information gathering, processing, managing,
    sharing
• NNEC
  –   Information sharing, exchanging
  –   Data links, sensors, effectors
  –   COP
  –   Enabling rather than Cyber Ops weapon system
NATO & Cyber Ops
• Policy & Doctrine
  – Neither NATO Policy or Doctrine on CNO, nor allied “body”
    to deal with the issue
  – CNO = CNE x CND x CAN
  – COMSEC, INFOSEC, X-SEC
  – Cyber Crime … Law Enforcement Task / legal concerns
• Common Defence
  – NCIRC
  – CCOE for Cyber Defence
  – Protection of EEFI and critical infrastructures
• Capability Development
  – Some nations have… national caveats
  – Undesired effects, BDA, loosing control
  – Cyber INTEL needed!
Summary
CNO affecting people’s perception,
 attitude, or behaviour
                               f
• Perception of the threat = (W, U, C)
•   Attitude to be connected
•   Continue to use cyber
•   Virtual Battlefield in Cyber War
•   Cyber Attack against Estonia
•   Cyber Activities in RUS ./. GEO Conflict 2008
•   Conclusion
Cyber and Influence
  Computer Network Operations (CNO)
affecting people‘s perception, attitude, or
                behaviour


      (C) 2010-11 by LTC U.M. Janßen, NSO/ISTAR

More Related Content

What's hot

Cyberspace
CyberspaceCyberspace
CyberspaceG Prachi
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - pptJincy24
 
Role of Social Media in Emergency Situations
Role of Social Media in Emergency SituationsRole of Social Media in Emergency Situations
Role of Social Media in Emergency SituationsEsri
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectorsLove Steven
 
Session 2 - Finding Things Out
Session 2 - Finding Things OutSession 2 - Finding Things Out
Session 2 - Finding Things OutMiles Berry
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Eddan Katz
 
2012 May Agency : Insight Presentation: "How SoLoMo is Empowering Consumers, ...
2012 May Agency : Insight Presentation: "How SoLoMo is Empowering Consumers, ...2012 May Agency : Insight Presentation: "How SoLoMo is Empowering Consumers, ...
2012 May Agency : Insight Presentation: "How SoLoMo is Empowering Consumers, ...iMedia Connection
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
Social networking
Social networkingSocial networking
Social networkingvatsaanadi
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 

What's hot (20)

Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Piracy
PiracyPiracy
Piracy
 
Piracy
PiracyPiracy
Piracy
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Ethics piracy
Ethics piracyEthics piracy
Ethics piracy
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - ppt
 
Digital
DigitalDigital
Digital
 
Role of Social Media in Emergency Situations
Role of Social Media in Emergency SituationsRole of Social Media in Emergency Situations
Role of Social Media in Emergency Situations
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
Session 2 - Finding Things Out
Session 2 - Finding Things OutSession 2 - Finding Things Out
Session 2 - Finding Things Out
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009
 
Policy Challenges Around Digital Copyright
Policy Challenges Around Digital CopyrightPolicy Challenges Around Digital Copyright
Policy Challenges Around Digital Copyright
 
2012 May Agency : Insight Presentation: "How SoLoMo is Empowering Consumers, ...
2012 May Agency : Insight Presentation: "How SoLoMo is Empowering Consumers, ...2012 May Agency : Insight Presentation: "How SoLoMo is Empowering Consumers, ...
2012 May Agency : Insight Presentation: "How SoLoMo is Empowering Consumers, ...
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Social networking
Social networkingSocial networking
Social networking
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 

Similar to How CNO Can Affect People's Perceptions and Behaviors

עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתעומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתDr. Anat Klumel
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010Vicky Shah
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle BH
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...IT Arena
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Security B-Sides
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
Trend Micro - is your cloud secure
Trend Micro - is your cloud secureTrend Micro - is your cloud secure
Trend Micro - is your cloud secureKappa Data
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Cyber crime trends in 2013
Cyber crime trends in 2013 Cyber crime trends in 2013
Cyber crime trends in 2013 The eCore Group
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 

Similar to How CNO Can Affect People's Perceptions and Behaviors (20)

Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015
 
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתעומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Trend Micro - is your cloud secure
Trend Micro - is your cloud secureTrend Micro - is your cloud secure
Trend Micro - is your cloud secure
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Public Private Partnership - Combating CyberCrime
Public Private Partnership - Combating CyberCrime Public Private Partnership - Combating CyberCrime
Public Private Partnership - Combating CyberCrime
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Cyber crime trends in 2013
Cyber crime trends in 2013 Cyber crime trends in 2013
Cyber crime trends in 2013
 
F2C12: Vint Cerf
F2C12: Vint CerfF2C12: Vint Cerf
F2C12: Vint Cerf
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 

More from Ulrich Janßen

Social Media in countering x- border threats (Dec15)
Social Media in countering x- border threats (Dec15)Social Media in countering x- border threats (Dec15)
Social Media in countering x- border threats (Dec15)Ulrich Janßen
 
3CP - Comprehensive Crisis Communications Planning (Nov15)
3CP - Comprehensive Crisis Communications Planning (Nov15)3CP - Comprehensive Crisis Communications Planning (Nov15)
3CP - Comprehensive Crisis Communications Planning (Nov15)Ulrich Janßen
 
Turning vision into_impact_(icc)
Turning vision into_impact_(icc)Turning vision into_impact_(icc)
Turning vision into_impact_(icc)Ulrich Janßen
 
Turning vision into impact June 2013
Turning vision into impact   June 2013Turning vision into impact   June 2013
Turning vision into impact June 2013Ulrich Janßen
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Ulrich Janßen
 
Narrative Workshop June 2013
Narrative Workshop June 2013Narrative Workshop June 2013
Narrative Workshop June 2013Ulrich Janßen
 
Social media for the Military
Social media for the MilitarySocial media for the Military
Social media for the MilitaryUlrich Janßen
 
Integrating info ops in operational level planning (no backup slides)
Integrating info ops in operational level planning (no backup slides)Integrating info ops in operational level planning (no backup slides)
Integrating info ops in operational level planning (no backup slides)Ulrich Janßen
 

More from Ulrich Janßen (8)

Social Media in countering x- border threats (Dec15)
Social Media in countering x- border threats (Dec15)Social Media in countering x- border threats (Dec15)
Social Media in countering x- border threats (Dec15)
 
3CP - Comprehensive Crisis Communications Planning (Nov15)
3CP - Comprehensive Crisis Communications Planning (Nov15)3CP - Comprehensive Crisis Communications Planning (Nov15)
3CP - Comprehensive Crisis Communications Planning (Nov15)
 
Turning vision into_impact_(icc)
Turning vision into_impact_(icc)Turning vision into_impact_(icc)
Turning vision into_impact_(icc)
 
Turning vision into impact June 2013
Turning vision into impact   June 2013Turning vision into impact   June 2013
Turning vision into impact June 2013
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013
 
Narrative Workshop June 2013
Narrative Workshop June 2013Narrative Workshop June 2013
Narrative Workshop June 2013
 
Social media for the Military
Social media for the MilitarySocial media for the Military
Social media for the Military
 
Integrating info ops in operational level planning (no backup slides)
Integrating info ops in operational level planning (no backup slides)Integrating info ops in operational level planning (no backup slides)
Integrating info ops in operational level planning (no backup slides)
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

How CNO Can Affect People's Perceptions and Behaviors

  • 1. Cyber and Influence Computer Network Operations (CNO) affecting people‘s perception, attitude, or behaviour (C) 2010-11 by LTC U.M. Janßen, NSO/ISTAR
  • 2. Cyber Space Cyber War Cyber Terrorism Cyber Security Cyber Law Cyber – Hype???
  • 3. Cyber Space • the electronic medium of computer networks, in which online communication takes place. • the dynamic realization of electromagnetic energy through the application of communication and control technology. • a global domain that allows an interdependent network of information technology infrastructures (ITI), telecommunications networks, computer processing systems, integrated sensors, system control networks, embedded processors and controllers common to global control and communications across the electro- magnetic environment. • a social experience, individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on … (Wikipedia)
  • 4. Understanding the Environment 1.97 Billion Users – more than 1/3 of global pop Internet Continues to Develop Content (Web Pages, Email etc) • Social Networking – Facebook, Myspace, Applets & Objects (Java Code, Images etc) Bebo, LinkedIn etc Plugins (Java, Active X, Flash, Viewers) • New Media - uTube, Blogs, Twitter, Wiki Application (Explorer, Word, Excel) • Real Worlds – Google Streetview/Earth Operating System (Windows, MacOS) • Virtual Worlds – 2nd Life, WoWarcraft Firmware (Microcode, BIOS) • Communications – Skype, Bittorrent Hardware (PC, Laptop, Server) • Mobile Devices – Blackberry, iPhone Impact on almost every facet of modern life – with growing in importance!
  • 5. Actors Cyber War Agencies/Commands Law Enforcement Industry Agencies Hacker Community Intelligence Criminals (Individuals / Groups) Research Agencies Terrorists Labs
  • 6. Cyber Threat Threat is a function of intent (will) to act, High understanding of the situation, and capabilities to Governmental enforce will. 2010 Critical Possible Infrastructure 2005 Damage Terrorists 2000 Industrial Espionage Criminals Insider Low Low Probability of an event High
  • 7. Current threats - TTP • Caused by increased access • Disclosure of information • Corruption of information • Denial of service • Theft of resources • Loss of credit or reputation • Cyber Crime • Spam • Bulletproof Hosting • Malware • …?
  • 8. Increased access Social Engineering War Driving Tapping Fibre Optical Cable Scanning and Sniffing
  • 9. Disclosure of information Keylogging Printer - Copying Spying „Liechtensteining“
  • 10. Denial of Service DDoS Bounce Mail Buffer Overflow Cable separation
  • 11. Denial of Service Sabotage
  • 12. Theft of resources Hardware Theft Software & Media Theft Vietnam Cable Theft
  • 13. Loss of Credit or Reputation Example: Maximilian
  • 14. Cyber Crime Spectrum of Options Phishing Malware DoS/ SPAM DDoS Child Games Porn
  • 17. Cyber & Social Media • Social activity vs. Cyber Ops / CNO – Observe, monitor – Act – Attribution • Cyber mobbing / bullying – Use connectivity to blame your colleague / boss … a government – Submit exposing photos, videos – Promulgate private information – Isolate … “De-friend”
  • 18. Cyber & Military • Ops affecting INFOSEC – Availability, confidentiality, integrity of information • IKM – Information gathering, processing, managing, sharing • NNEC – Information sharing, exchanging – Data links, sensors, effectors – COP – Enabling rather than Cyber Ops weapon system
  • 19. NATO & Cyber Ops • Policy & Doctrine – Neither NATO Policy or Doctrine on CNO, nor allied “body” to deal with the issue – CNO = CNE x CND x CAN – COMSEC, INFOSEC, X-SEC – Cyber Crime … Law Enforcement Task / legal concerns • Common Defence – NCIRC – CCOE for Cyber Defence – Protection of EEFI and critical infrastructures • Capability Development – Some nations have… national caveats – Undesired effects, BDA, loosing control – Cyber INTEL needed!
  • 20. Summary CNO affecting people’s perception, attitude, or behaviour f • Perception of the threat = (W, U, C) • Attitude to be connected • Continue to use cyber • Virtual Battlefield in Cyber War • Cyber Attack against Estonia • Cyber Activities in RUS ./. GEO Conflict 2008 • Conclusion
  • 21. Cyber and Influence Computer Network Operations (CNO) affecting people‘s perception, attitude, or behaviour (C) 2010-11 by LTC U.M. Janßen, NSO/ISTAR