SlideShare una empresa de Scribd logo
1 de 6
Cyber Café Mini Presentation
Virtual to Material & Back Again
A start at looking at virtual contention
  and how it relates to “real” contention
• Focus: Politically Motivated DDOS attacks
• Education and repression are a dangerous mix
  and make such attacks more likely
  – And we are controlling for wealth and internet
    penetration
• Another interesting finding
• No relation to violent contention in a country
  BUT such attacks are related to nonviolent
  contention
Collecting data and looking at
        connections and discourse
• Social scientists have made headway on predicting
  terrorist behavior – if we have data
   – Need info on terrorists’ characteristics and their networks
• Comp sci can contribute through text processing to
  structured data and modeling
   – Event coding
   – Entity discover
   – Organizational & network data
Appendix
What spaces need to be addressed?

Space of Activity              Example
Strategic communication –      •   Beheading video (1)
   public diplomacy            •   Bin Laden video (2)
                               •   alneda.com, (3)
Tactical communication -       •   Google maps (4)
   Cyberplanning (Thomas)      •   steganography (5)
                               •   18/11/ 2001 Nimda virus (6)
Cyber to cyber (large efforts  •   DDoS attack on Estonia (7)
  going on with this- not main •   the Oak Ridge National Laboratory attack
  focus)                           12/7/07 (8)
                               •   Slammer Worm infiltration of Ohio Nuclear
                                   plant - Attack industrial control systems (9)
Cyber to corporeal             •   Bring down air traffic radars (10)
                               •   Destruction of equipment needed to connect
Corporeal to cyber                 to cyber and media world (11)

Más contenido relacionado

La actualidad más candente

Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityShiva Bissessar
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due DiligenceShiva Bissessar
 
Security Concerns and International Relations
Security Concerns and International RelationsSecurity Concerns and International Relations
Security Concerns and International RelationsJarno Limnéll
 
Group7midterm 200404081547
Group7midterm 200404081547Group7midterm 200404081547
Group7midterm 200404081547Rodel Septimo
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementBill Bode
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpointlydneat
 
Sharing Geospatial Intelligence and Services
Sharing Geospatial Intelligence and ServicesSharing Geospatial Intelligence and Services
Sharing Geospatial Intelligence and ServicesGovCloud Network
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipmalvin050
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.Rushabh Shah
 
Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Alexandra Deschamps-Sonsino
 
Dissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen BergerDissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen BergerUNICORNS IN TECH
 
The Future Started Yesterday: The Top Ten Computer and IT Trends
The Future Started Yesterday: The Top Ten Computer and IT TrendsThe Future Started Yesterday: The Top Ten Computer and IT Trends
The Future Started Yesterday: The Top Ten Computer and IT TrendsCareer Communications Group
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 

La actualidad más candente (19)

Privacy vs Security
Privacy vs SecurityPrivacy vs Security
Privacy vs Security
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
Security Concerns and International Relations
Security Concerns and International RelationsSecurity Concerns and International Relations
Security Concerns and International Relations
 
Group7midterm 200404081547
Group7midterm 200404081547Group7midterm 200404081547
Group7midterm 200404081547
 
Group 7 (midterm)
Group 7 (midterm)Group 7 (midterm)
Group 7 (midterm)
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Sharing Geospatial Intelligence and Services
Sharing Geospatial Intelligence and ServicesSharing Geospatial Intelligence and Services
Sharing Geospatial Intelligence and Services
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...
 
Dissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen BergerDissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen Berger
 
The Future Started Yesterday: The Top Ten Computer and IT Trends
The Future Started Yesterday: The Top Ten Computer and IT TrendsThe Future Started Yesterday: The Top Ten Computer and IT Trends
The Future Started Yesterday: The Top Ten Computer and IT Trends
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 

Destacado

Dan Boneh - SaTC Cyber Cafe
Dan Boneh - SaTC Cyber CafeDan Boneh - SaTC Cyber Cafe
Dan Boneh - SaTC Cyber CafeAmy Lenzo
 
Stefan Savage Cyber Cafe
Stefan Savage Cyber CafeStefan Savage Cyber Cafe
Stefan Savage Cyber CafeAmy Lenzo
 
Peter Muhlberger - SaTC Cyber Cafe
Peter Muhlberger - SaTC Cyber CafePeter Muhlberger - SaTC Cyber Cafe
Peter Muhlberger - SaTC Cyber CafeAmy Lenzo
 
SaTC Cyber Cafe Jeremy Epstein
SaTC Cyber Cafe  Jeremy EpsteinSaTC Cyber Cafe  Jeremy Epstein
SaTC Cyber Cafe Jeremy EpsteinAmy Lenzo
 
Lorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & SecurityLorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & SecurityAmy Lenzo
 
Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"Shamsee Mustafa
 
Cyber Cafe 2011
Cyber Cafe 2011Cyber Cafe 2011
Cyber Cafe 2011Cchea Ihap
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
Kirabo cyber cafe business plan
Kirabo cyber cafe business planKirabo cyber cafe business plan
Kirabo cyber cafe business planKisakye Stephen
 
How to set up an internet café
How to set up an internet caféHow to set up an internet café
How to set up an internet caféGener Luis Morada
 
Equipments In An Internet Cafe
Equipments In An Internet CafeEquipments In An Internet Cafe
Equipments In An Internet CafeGener Luis Morada
 
A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementsvrohith 9
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesGener Luis Morada
 
Materials Handling Ppt
Materials Handling PptMaterials Handling Ppt
Materials Handling PptColleen True
 

Destacado (20)

Dan Boneh - SaTC Cyber Cafe
Dan Boneh - SaTC Cyber CafeDan Boneh - SaTC Cyber Cafe
Dan Boneh - SaTC Cyber Cafe
 
Stefan Savage Cyber Cafe
Stefan Savage Cyber CafeStefan Savage Cyber Cafe
Stefan Savage Cyber Cafe
 
Peter Muhlberger - SaTC Cyber Cafe
Peter Muhlberger - SaTC Cyber CafePeter Muhlberger - SaTC Cyber Cafe
Peter Muhlberger - SaTC Cyber Cafe
 
SaTC Cyber Cafe Jeremy Epstein
SaTC Cyber Cafe  Jeremy EpsteinSaTC Cyber Cafe  Jeremy Epstein
SaTC Cyber Cafe Jeremy Epstein
 
Lorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & SecurityLorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & Security
 
Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"
 
Cyber Cafe 2011
Cyber Cafe 2011Cyber Cafe 2011
Cyber Cafe 2011
 
Kristian on cyber safety
Kristian on cyber safetyKristian on cyber safety
Kristian on cyber safety
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
Kirabo cyber cafe business plan
Kirabo cyber cafe business planKirabo cyber cafe business plan
Kirabo cyber cafe business plan
 
How to set up an internet café
How to set up an internet caféHow to set up an internet café
How to set up an internet café
 
Equipments In An Internet Cafe
Equipments In An Internet CafeEquipments In An Internet Cafe
Equipments In An Internet Cafe
 
Meganet Cyber Cafe
Meganet Cyber CafeMeganet Cyber Cafe
Meganet Cyber Cafe
 
A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe management
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Internet cafe feasibility study
Internet cafe feasibility studyInternet cafe feasibility study
Internet cafe feasibility study
 
My Internet Cafe
My Internet CafeMy Internet Cafe
My Internet Cafe
 
Internet Cafe Introduction
Internet Cafe IntroductionInternet Cafe Introduction
Internet Cafe Introduction
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business Philippines
 
Materials Handling Ppt
Materials Handling PptMaterials Handling Ppt
Materials Handling Ppt
 

Similar a Asal and Rethemeyer - Cyber Cafe

Robin Hoods And Criminals
Robin Hoods And CriminalsRobin Hoods And Criminals
Robin Hoods And CriminalsZiv Ichilov
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
The New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st centuryThe New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st centuryJonathan Francis Roscoe
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityarel shane
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksRadware
 
funsec_ch02A.pdf
funsec_ch02A.pdffunsec_ch02A.pdf
funsec_ch02A.pdfvietvo683
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 

Similar a Asal and Rethemeyer - Cyber Cafe (20)

Robin Hoods And Criminals
Robin Hoods And CriminalsRobin Hoods And Criminals
Robin Hoods And Criminals
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
The New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st centuryThe New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st century
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber and influence
Cyber and influenceCyber and influence
Cyber and influence
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-Attacks
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Cyber War
Cyber WarCyber War
Cyber War
 
funsec_ch02A.pdf
funsec_ch02A.pdffunsec_ch02A.pdf
funsec_ch02A.pdf
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 

Más de Amy Lenzo

Graphics session 6
Graphics session 6Graphics session 6
Graphics session 6Amy Lenzo
 
Visual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective IntelligenceVisual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective IntelligenceAmy Lenzo
 
Transforming Social Fields
Transforming Social FieldsTransforming Social Fields
Transforming Social FieldsAmy Lenzo
 
Wisdom emerging
Wisdom emergingWisdom emerging
Wisdom emergingAmy Lenzo
 
Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2Amy Lenzo
 
Participant list
Participant listParticipant list
Participant listAmy Lenzo
 
Level One Online - SlideShow1
Level One Online - SlideShow1Level One Online - SlideShow1
Level One Online - SlideShow1Amy Lenzo
 
The World Café Conversation
The World Café ConversationThe World Café Conversation
The World Café ConversationAmy Lenzo
 

Más de Amy Lenzo (9)

Graphics session 6
Graphics session 6Graphics session 6
Graphics session 6
 
Visual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective IntelligenceVisual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective Intelligence
 
Transforming Social Fields
Transforming Social FieldsTransforming Social Fields
Transforming Social Fields
 
Wisdom emerging
Wisdom emergingWisdom emerging
Wisdom emerging
 
Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2
 
Participant list
Participant listParticipant list
Participant list
 
Level One Online - SlideShow1
Level One Online - SlideShow1Level One Online - SlideShow1
Level One Online - SlideShow1
 
Just Water
Just WaterJust Water
Just Water
 
The World Café Conversation
The World Café ConversationThe World Café Conversation
The World Café Conversation
 

Asal and Rethemeyer - Cyber Cafe

  • 1. Cyber Café Mini Presentation
  • 2. Virtual to Material & Back Again
  • 3. A start at looking at virtual contention and how it relates to “real” contention • Focus: Politically Motivated DDOS attacks • Education and repression are a dangerous mix and make such attacks more likely – And we are controlling for wealth and internet penetration • Another interesting finding • No relation to violent contention in a country BUT such attacks are related to nonviolent contention
  • 4. Collecting data and looking at connections and discourse • Social scientists have made headway on predicting terrorist behavior – if we have data – Need info on terrorists’ characteristics and their networks • Comp sci can contribute through text processing to structured data and modeling – Event coding – Entity discover – Organizational & network data
  • 6. What spaces need to be addressed? Space of Activity Example Strategic communication – • Beheading video (1) public diplomacy • Bin Laden video (2) • alneda.com, (3) Tactical communication - • Google maps (4) Cyberplanning (Thomas) • steganography (5) • 18/11/ 2001 Nimda virus (6) Cyber to cyber (large efforts • DDoS attack on Estonia (7) going on with this- not main • the Oak Ridge National Laboratory attack focus) 12/7/07 (8) • Slammer Worm infiltration of Ohio Nuclear plant - Attack industrial control systems (9) Cyber to corporeal • Bring down air traffic radars (10) • Destruction of equipment needed to connect Corporeal to cyber to cyber and media world (11)