SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Cyberterrorism
Dr Ian Brown, OII
(with thanks to Lilian Edwards)
Outline
  Definitions - vandalism, crime, terrorism

  and war
 The insecurity of the Internet and how to
  fix it
 The proportionality of state responses to
  terrorist Internet use
Cyber graffiti
    Tipping Point report

    found that in 8 years to
    2007, >100k domains
    defaced
    Sometimes politically

    motivated - c.f. UN site
    12/8/07:
    “HACKED BY KEREM125 M0STED AND
       GSY
    THAT IS CYBERPROTEST
    HEY ]SRAIL AND USA
    DONT KILL CHILDREN AND OTHER
       PEOPLE
    PEACE FOR EVER
    NO WAR”
Cyber fraud
  Phishing (Symantec found 166,248

  unique messages 2H 2006)
 Denial of Service extortion (Symantec
  found 6m bots 2H 2006)
 The organised criminal economy (custom
  virus writers, bot herders, mules, dupes);
  identities for sale $14-$18
Digital Pearl Harbour
  Exercise conducted by US Naval War

  College & Gartner July 2002
 3-day simulated attack on CNI with
  attackers given $200m, 5 years planning,
  access to state-level intelligence
 Local, temporary attacks could be
  successful; sustained, national attacks
  would not
Cyber terror
    “Terrorists get better returns from much simpler

    methods such as car bombs. Cyberterror is too
    low key: not enough dead bodies result, and
    attacks are too complex to plan and execute.”
    (Bird 2006)
    Reality is use for communications, research

    (CBNR info poor - Stenersen 2007),
    propaganda, recruitment and belonging (Labi
    2006 and Shahar 2007), tactical intel (US Army
    2005)
Cyber war
  Disabling Critical National Infrastructure

  (Estonia, May 2007)
 For political/military/economic espionage
  (China, widely publicised 2007)
Estonia May 2007
    Attacks on Estonian finance, media and govt

    websites by Russian-linked groups.
    “Complexity and coordination was new… series

    of attacks with careful timing using different
    techniques and specific targets” (NATO)
    Arbor Networks monitored 128 distinct attacks,

    with 10 lasting over 10 hours and reaching
    90Mbps
China TITAN RAIN
    Incursions into DoD, German chancellory, Whitehall,

    NASA, Lockheed Martin…
    “Chinese attackers are using custom Trojan horse

    software targeted at specific government offices, and it
    is just walking through standard defences. Many
    government offices don’t even know yet that they are
    leaking information. 99% of cases are probably still not
    known.” (NATO)
    “Intrusion detection systems react to obvious signatures

    such as lots of traffic from one IP address – so onion
    routing and botnets are used to disguise the origin of
    intrusions.” (Sommer)
Fixing Internet insecurity
  Incentives are key: for more secure

  software, networks and banks (House of
  Lords, 2007)
 CNI must be very firmly separated from
  public Internet
 Limits to use of COTS software?
Proportionality of state
responses
  Lawful access

 Data retention
 “Glorification” of terrorism
References
    Juliette Bird (2006) Terrorist Use of the Internet, The Second International

    Scientific Conference on Security and Countering Terrorism Issues, Moscow State
    University Institute for Information Security Issues, October 2006.
    Nadya Labi (2006) Jihad 2.0, Atlantic Monthly pp.102—107, July/August 2006.


    Chief Judge Stein Schjolberg (2007) Terrorism in Cyberspace - Myth or reality?

    June 2007. Available at http://www.cybercrimelaw.net/1-2007.html
    Yael Shahar (2007) The Internet as a Tool for Counter-Terrorism, Patrolling and

    Controlling Cyberspace, Garmisch-Partenkirchen, April 2007.
    Anne Stenersen (2007) Chem-bio cyber-class – Assessing jihadist chemical and

    biological weapons, Jane’s Intelligence Review, 1 September 2007.
    US Army (2005) Army Regulation 530–1, Operations Security (OPSEC), 19 April

    2007.

Más contenido relacionado

La actualidad más candente

Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
MarioEliseo3
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
ClubHack
 

La actualidad más candente (18)

Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
CYBER
CYBERCYBER
CYBER
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
The Global Implications of Intellectual Property (IP) Theft
The Global Implications of Intellectual Property (IP) TheftThe Global Implications of Intellectual Property (IP) Theft
The Global Implications of Intellectual Property (IP) Theft
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 

Similar a Cyberterrorism

News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
captsbtyagi
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
cowinhelen
 

Similar a Cyberterrorism (20)

Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09
 
Exp r35
Exp r35Exp r35
Exp r35
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
 
Surviving Cyber War
Surviving Cyber WarSurviving Cyber War
Surviving Cyber War
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cyber war
Cyber warCyber war
Cyber war
 
Polinter09
Polinter09Polinter09
Polinter09
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 

Más de blogzilla

Más de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cyberterrorism

  • 2. (with thanks to Lilian Edwards)
  • 3. Outline Definitions - vandalism, crime, terrorism  and war  The insecurity of the Internet and how to fix it  The proportionality of state responses to terrorist Internet use
  • 4. Cyber graffiti Tipping Point report  found that in 8 years to 2007, >100k domains defaced Sometimes politically  motivated - c.f. UN site 12/8/07: “HACKED BY KEREM125 M0STED AND GSY THAT IS CYBERPROTEST HEY ]SRAIL AND USA DONT KILL CHILDREN AND OTHER PEOPLE PEACE FOR EVER NO WAR”
  • 5. Cyber fraud Phishing (Symantec found 166,248  unique messages 2H 2006)  Denial of Service extortion (Symantec found 6m bots 2H 2006)  The organised criminal economy (custom virus writers, bot herders, mules, dupes); identities for sale $14-$18
  • 6. Digital Pearl Harbour Exercise conducted by US Naval War  College & Gartner July 2002  3-day simulated attack on CNI with attackers given $200m, 5 years planning, access to state-level intelligence  Local, temporary attacks could be successful; sustained, national attacks would not
  • 7. Cyber terror “Terrorists get better returns from much simpler  methods such as car bombs. Cyberterror is too low key: not enough dead bodies result, and attacks are too complex to plan and execute.” (Bird 2006) Reality is use for communications, research  (CBNR info poor - Stenersen 2007), propaganda, recruitment and belonging (Labi 2006 and Shahar 2007), tactical intel (US Army 2005)
  • 8. Cyber war Disabling Critical National Infrastructure  (Estonia, May 2007)  For political/military/economic espionage (China, widely publicised 2007)
  • 9. Estonia May 2007 Attacks on Estonian finance, media and govt  websites by Russian-linked groups. “Complexity and coordination was new… series  of attacks with careful timing using different techniques and specific targets” (NATO) Arbor Networks monitored 128 distinct attacks,  with 10 lasting over 10 hours and reaching 90Mbps
  • 10. China TITAN RAIN Incursions into DoD, German chancellory, Whitehall,  NASA, Lockheed Martin… “Chinese attackers are using custom Trojan horse  software targeted at specific government offices, and it is just walking through standard defences. Many government offices don’t even know yet that they are leaking information. 99% of cases are probably still not known.” (NATO) “Intrusion detection systems react to obvious signatures  such as lots of traffic from one IP address – so onion routing and botnets are used to disguise the origin of intrusions.” (Sommer)
  • 11. Fixing Internet insecurity Incentives are key: for more secure  software, networks and banks (House of Lords, 2007)  CNI must be very firmly separated from public Internet  Limits to use of COTS software?
  • 12. Proportionality of state responses Lawful access   Data retention  “Glorification” of terrorism
  • 13. References Juliette Bird (2006) Terrorist Use of the Internet, The Second International  Scientific Conference on Security and Countering Terrorism Issues, Moscow State University Institute for Information Security Issues, October 2006. Nadya Labi (2006) Jihad 2.0, Atlantic Monthly pp.102—107, July/August 2006.  Chief Judge Stein Schjolberg (2007) Terrorism in Cyberspace - Myth or reality?  June 2007. Available at http://www.cybercrimelaw.net/1-2007.html Yael Shahar (2007) The Internet as a Tool for Counter-Terrorism, Patrolling and  Controlling Cyberspace, Garmisch-Partenkirchen, April 2007. Anne Stenersen (2007) Chem-bio cyber-class – Assessing jihadist chemical and  biological weapons, Jane’s Intelligence Review, 1 September 2007. US Army (2005) Army Regulation 530–1, Operations Security (OPSEC), 19 April  2007.