SlideShare una empresa de Scribd logo
1 de 16
Stuck in the Middle
         February 2009

          Jason Healey
  Cyber Conflict Studies Association
          Cyberconflict.org




            Yes I'm stuck in the middle with you,
          And I'm wondering what it is I should do,
       It's so hard to keep this smile from my face,
        Losing control, yeah, I'm all over the place,
       Clowns to the left of me, Jokers to the right,
          Here I am, stuck in the middle with you.

               From “Stuck in the Middle”
                 Stealers Wheel, 1972
Page 2

    About Cyber Conflict Studies Association

                        Goal: begin a cross-discipline study of
                     implications of strategic conflict in cyberspace

•   Symposium at Georgetown University last February: Can a cyber conflict be deterred? Lessons from
    Estonia
•   Previous symposia have been on law and cyber conflict, attribution of attacks, arms control, and
    visualization of cyber conflict, and deterrence of cyber conflict
•   Online “Journal of Cyber Conflict Studies”
•   Membership from government, academia, industry. Includes James Mulvenon, Paul Kurtz, Greg
    Rattray, Dorothy Denning, others
•   Sponsored by Norwich University
Page 3

Agenda




          • Why “Stuck in the Middle”
            • How can it happen?
         • How can you see it coming?
             • What can you do?
           • The Sleep Deprivers…
Page 4

 Why “Stuck in the Middle” ?

• We are all defending our own corners of cyberspace
   – But could be stuck in something larger


• Can be caught because of a protest
   – World Economic Forum in 2002


• Or as part of a war
   – No, of course it won’t happen
   – But what will you do when it does?
Page 5

    “Hactivists,” “Patriotic Hackers” and the Big Boys

• Relation of physical and cyber troubles
     –   Easier to cross borders with your protest in cyberspace
     –   Less likely to be caught
     –   Easy to organize
     –   Anonymity means increased chances of bad behavior

•   Why did “Hacking = art”
•   Who started “patriotic hacking”?
•   Who is meanest?
•   What nations are best at harnessing it?

• None of this is “cyberterror”
Page 6

 You may be targeted because of

• Bum luck
  – “Kosovo is Serbia” in 2000
  – Caught in the middle: Manchester United,
    Adidas, viagra.com, jamesbond.com

• The sector you are part of?
   – Caught in the middle: Finance, firebombings
     and beagles
       Secondary and tertiary targeting


          Are they just random hackers, or are they organized?
                      Is another company behind it?
                         Is another nation behind it?
Page 7

 Secondary and Tertiary Targeting

• "If you support or raise funds for any company
  connected with Huntingdon Life Sciences we will track
  you down, come for you and destroy your property with
  fire.“
   – Animal Liberation Front (source:   wikipedia, accessed 7 November 2008)



• The physical dimension
   – Yacht club
   – Protests at insurers, shareholders, market makers
   – Executives targeted, attacked, property firebombed


• The cyber dimension:
   – Email and DoS campaigns
   – Skip’s neighbors
Page 8

 You may be targeted because of

• A group you are associated with?
  – Caught in the middle? AIPAC

• Choices of your company?
  – Caught in the middle? Carrefour




          Are they just random hackers, or are they organized?
                      Is another company behind it?
                         Is another nation behind it?
Page 9

 You may be targeted because of

  "KFC's license is from America, an important Israeli ally. In consuming US products, it means
     that we give financial contributions to Israel's military strikes on the Palestinian people"
                          Indonesian protest coordinator, January 2009
                        (Source: Hill and Associates from AFP, CAN, Viva News)



• Perceived actions of your country?
   – Serbia, EP-3.
            Caught in the middle? The poorly protected…
    – Japan in 2001: history books from South Korea, visit
      to Yasukuni
            Caught in the middle? The poorly protected…
    – Who moved my statue?
            Caught in the middle? The whole online country




                   Are they just random hackers, or are they organized?
                               Is another company behind it?
                                  Is another nation behind it?
Page 10

 You may be targeted because of

• A real, no-kidding war

  – How could this happen here?

  – Unless you can make hard, unpalatable
    choices you may be in the middle




          Are they just random hackers, or are they organized?
                      Is another company behind it?
                         Is another nation behind it?
Page 11

 This region is hactivist central

• Long history of patriotic hacking in Asia
   –   India  Pakistan
   –   China   Taiwan
   –   China   Japan
   –   South Korea   Japan
   –   China   United States
   –   China   Olympic, Tibet protesters


• The “China Ceiling”
Page 12

 How to see it coming

• Rule #1: Cyber follows, never precedes the
  physical

• Rarely ever broken (so far)

• You should find traces of this online with a good
  search process
Page 13

 How to see it coming

• Are you involved in an area likely to draw activists:
   –   Israel/Palestine
   –   China/Tibet and China/Taiwan
   –   Russia/Baltics, Russia/Georgia
   –   Serbia
   –   Olympics
   –   Environmental
   –   Finance and globalization


• Play “what if” on your CSR and business decisions

• Develop your indicators
Page 14

      How to see it coming

  • Your indicators, rate them 1 to 5
  • As these get checked off, consider yourself warned.
    Attacks are getting closer:

                  • Are activists mentioning our company or related
                  topics?
                  • Are there physical protests affecting our sector
                  or related businesses?
  Increasing
specificity and
                    • For example, other companies in the same
 likelihood of      line, other globalizing firms, or other Olympic
 you’re being
    attacked        sponsors
                  • Are there cyber protest attacks related to our
                  business?
                  • Are there cyber protest attacks against our
                  sector?
                  • Are there physical protests against our
                  company?
                  • Are we being specifically mentioned for cyber
Page 15

 What to do if you’re targeted?

• What to do if you’re a target depends on which category
  you fall in to
   – Bum-luck attacks are best for you as neither sophisticated nor
     persistent
   – Sector attacks will keep coming back
        But will hit your competitors too, ha ha
   – Company-specific attacks may be short, but very intense
        In rare cases (n=1?) they will be with you forever
         Country-specific may also be short, but has the worst
         consequences


Are your standard defenses good enough?
   – WEF attacks of 2002
Page 16

The Sleep Deprivers


             • The old big things:
                      – Olympics
                       – Taiwan


            • The new big things:
                       – Russia?
                – Collapsing Economies
                        – Food?

Más contenido relacionado

Similar a Cyber Conflict

Action to empathy
Action to empathyAction to empathy
Action to empathylmittler
 
Going Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online VideoGoing Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online VideoArik Abel
 
Adventures in 21st Century Organizational Design
Adventures in 21st Century Organizational DesignAdventures in 21st Century Organizational Design
Adventures in 21st Century Organizational DesignTraction Software
 
Crisis Communication in the Digital Age
 Crisis Communication in the Digital Age Crisis Communication in the Digital Age
Crisis Communication in the Digital AgeJane Jordan-Meier
 
WH @ IEA2014
WH @ IEA2014WH @ IEA2014
WH @ IEA2014GRAPE
 
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC HuangDiversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC HuangXena Crystal LC Huang
 
UHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering InnovationUHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering InnovationChris Osborn
 
No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019Webflow
 
Hello, i'm from the internet
Hello, i'm from the internetHello, i'm from the internet
Hello, i'm from the internetAditya Anupkumar
 
Media Codes and Conventions: Audience
Media Codes and Conventions: AudienceMedia Codes and Conventions: Audience
Media Codes and Conventions: Audiencehanaa_m
 
Science fiction audiences
Science fiction audiencesScience fiction audiences
Science fiction audiencesshaniajay
 
Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business Innovation Forum Publishing
 
How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...YPFP
 
Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101James Redmond
 
Tips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crisesTips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crisesIsobar Australia
 

Similar a Cyber Conflict (20)

Action to empathy
Action to empathyAction to empathy
Action to empathy
 
Going Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online VideoGoing Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online Video
 
Adventures in 21st Century Organizational Design
Adventures in 21st Century Organizational DesignAdventures in 21st Century Organizational Design
Adventures in 21st Century Organizational Design
 
Kony2012
Kony2012Kony2012
Kony2012
 
Crisis Communication in the Digital Age
 Crisis Communication in the Digital Age Crisis Communication in the Digital Age
Crisis Communication in the Digital Age
 
You can't have COIN without Cultural Awareness
You can't have COIN without Cultural AwarenessYou can't have COIN without Cultural Awareness
You can't have COIN without Cultural Awareness
 
WH @ IEA2014
WH @ IEA2014WH @ IEA2014
WH @ IEA2014
 
The Path to Healing
The Path to HealingThe Path to Healing
The Path to Healing
 
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC HuangDiversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC Huang
 
UHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering InnovationUHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering Innovation
 
No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019
 
Hello, i'm from the internet
Hello, i'm from the internetHello, i'm from the internet
Hello, i'm from the internet
 
Epilepsy action
Epilepsy actionEpilepsy action
Epilepsy action
 
Media Codes and Conventions: Audience
Media Codes and Conventions: AudienceMedia Codes and Conventions: Audience
Media Codes and Conventions: Audience
 
Science fiction audiences
Science fiction audiencesScience fiction audiences
Science fiction audiences
 
Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business
 
How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...
 
1. goldsmiths short course the attention economy - 13th february
1. goldsmiths short course   the attention economy - 13th february1. goldsmiths short course   the attention economy - 13th february
1. goldsmiths short course the attention economy - 13th february
 
Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101
 
Tips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crisesTips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crises
 

Más de Enterprise Security Risk Management

Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantEnterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantEnterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Enterprise Security Risk Management
 

Más de Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Último

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 

Último (20)

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

Cyber Conflict

  • 1. Stuck in the Middle February 2009 Jason Healey Cyber Conflict Studies Association Cyberconflict.org Yes I'm stuck in the middle with you, And I'm wondering what it is I should do, It's so hard to keep this smile from my face, Losing control, yeah, I'm all over the place, Clowns to the left of me, Jokers to the right, Here I am, stuck in the middle with you. From “Stuck in the Middle” Stealers Wheel, 1972
  • 2. Page 2 About Cyber Conflict Studies Association Goal: begin a cross-discipline study of implications of strategic conflict in cyberspace • Symposium at Georgetown University last February: Can a cyber conflict be deterred? Lessons from Estonia • Previous symposia have been on law and cyber conflict, attribution of attacks, arms control, and visualization of cyber conflict, and deterrence of cyber conflict • Online “Journal of Cyber Conflict Studies” • Membership from government, academia, industry. Includes James Mulvenon, Paul Kurtz, Greg Rattray, Dorothy Denning, others • Sponsored by Norwich University
  • 3. Page 3 Agenda • Why “Stuck in the Middle” • How can it happen? • How can you see it coming? • What can you do? • The Sleep Deprivers…
  • 4. Page 4 Why “Stuck in the Middle” ? • We are all defending our own corners of cyberspace – But could be stuck in something larger • Can be caught because of a protest – World Economic Forum in 2002 • Or as part of a war – No, of course it won’t happen – But what will you do when it does?
  • 5. Page 5 “Hactivists,” “Patriotic Hackers” and the Big Boys • Relation of physical and cyber troubles – Easier to cross borders with your protest in cyberspace – Less likely to be caught – Easy to organize – Anonymity means increased chances of bad behavior • Why did “Hacking = art” • Who started “patriotic hacking”? • Who is meanest? • What nations are best at harnessing it? • None of this is “cyberterror”
  • 6. Page 6 You may be targeted because of • Bum luck – “Kosovo is Serbia” in 2000 – Caught in the middle: Manchester United, Adidas, viagra.com, jamesbond.com • The sector you are part of? – Caught in the middle: Finance, firebombings and beagles Secondary and tertiary targeting Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 7. Page 7 Secondary and Tertiary Targeting • "If you support or raise funds for any company connected with Huntingdon Life Sciences we will track you down, come for you and destroy your property with fire.“ – Animal Liberation Front (source: wikipedia, accessed 7 November 2008) • The physical dimension – Yacht club – Protests at insurers, shareholders, market makers – Executives targeted, attacked, property firebombed • The cyber dimension: – Email and DoS campaigns – Skip’s neighbors
  • 8. Page 8 You may be targeted because of • A group you are associated with? – Caught in the middle? AIPAC • Choices of your company? – Caught in the middle? Carrefour Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 9. Page 9 You may be targeted because of "KFC's license is from America, an important Israeli ally. In consuming US products, it means that we give financial contributions to Israel's military strikes on the Palestinian people" Indonesian protest coordinator, January 2009 (Source: Hill and Associates from AFP, CAN, Viva News) • Perceived actions of your country? – Serbia, EP-3. Caught in the middle? The poorly protected… – Japan in 2001: history books from South Korea, visit to Yasukuni Caught in the middle? The poorly protected… – Who moved my statue? Caught in the middle? The whole online country Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 10. Page 10 You may be targeted because of • A real, no-kidding war – How could this happen here? – Unless you can make hard, unpalatable choices you may be in the middle Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 11. Page 11 This region is hactivist central • Long history of patriotic hacking in Asia – India Pakistan – China Taiwan – China Japan – South Korea Japan – China United States – China Olympic, Tibet protesters • The “China Ceiling”
  • 12. Page 12 How to see it coming • Rule #1: Cyber follows, never precedes the physical • Rarely ever broken (so far) • You should find traces of this online with a good search process
  • 13. Page 13 How to see it coming • Are you involved in an area likely to draw activists: – Israel/Palestine – China/Tibet and China/Taiwan – Russia/Baltics, Russia/Georgia – Serbia – Olympics – Environmental – Finance and globalization • Play “what if” on your CSR and business decisions • Develop your indicators
  • 14. Page 14 How to see it coming • Your indicators, rate them 1 to 5 • As these get checked off, consider yourself warned. Attacks are getting closer: • Are activists mentioning our company or related topics? • Are there physical protests affecting our sector or related businesses? Increasing specificity and • For example, other companies in the same likelihood of line, other globalizing firms, or other Olympic you’re being attacked sponsors • Are there cyber protest attacks related to our business? • Are there cyber protest attacks against our sector? • Are there physical protests against our company? • Are we being specifically mentioned for cyber
  • 15. Page 15 What to do if you’re targeted? • What to do if you’re a target depends on which category you fall in to – Bum-luck attacks are best for you as neither sophisticated nor persistent – Sector attacks will keep coming back But will hit your competitors too, ha ha – Company-specific attacks may be short, but very intense In rare cases (n=1?) they will be with you forever Country-specific may also be short, but has the worst consequences Are your standard defenses good enough? – WEF attacks of 2002
  • 16. Page 16 The Sleep Deprivers • The old big things: – Olympics – Taiwan • The new big things: – Russia? – Collapsing Economies – Food?