Cyberwarfare 💥

Introduction

The Era of Smart Weapons

Cyberwar

Multidisciplinary approach

American Businessman scenario

Israeli Insurgence used for strategic communication in 2006

Cyberwar between Georgia and Russia in 2008

DDoS (Distributed Denial of Service) attacks from both sides

Iran Fuel Enrichment program in 2009, USB drive "Stuxnet" destroyed physical Uranium towers in the compound

Tunisian government hacked in 2010

Authors

Paulo Shakarian

Jana Shakarian

Andrew Ruef

What is Cyberwar

Clausewitz’s definition of war

“an extension of policy (or politics) by other means.” AND “an extension of policy (or politics) by actions taken in cyber-space.”

RESOLVED: Cyber war is an extension of policy by actions taken in cyber space by state or nonstate actors that either constitute a serious threat to a nation’s security or are conducted in response to a perceived threat against a nation’s security.

Is Cyberwar a credible threat?

Cyber-operations can help with military missions such as intelligence gathering and information exchange

U.S.A starts to innovate cyber-weapons such as BIG DOG to reduce American casualties in due conflict from enemy states

Smart weapons (Lethal Autonomous Robotic Weaponry - LARWs)

Inability to resist terrorism and guerilla disputes

U.S used Microelectronic techs for Persian Gulf War, Kosovo and Afghanistan.

2003: Middle East combats

American and British forces used advanced LARWs such as unmanned aerial vehicles (UAVs), Tomahawk missiles, laser munitions, predator drones, and the Pentagon internet in washington to override war communications.

Sky Eye

"New military internet will coordinate military operations and provide US commanders with intelligence about their enemies' movements in battle"

American Way of War: Speed, Accuracy, Precision and Stealth

Reduce Casualties

Systems of Systems

Vulnerable to high-tech retaliation in the form of cyberwar

Limit destructiveness

Middle age analogy

9/11 example

Power vacuum: No man's zone is internet

"Fifth domain" after land, sea, air, and space.

Both Obama and Clinton's administration have preventive measures

"Hacking, virus writing, and crashing data information systems - as well as defending against enemy hackers and virus writers - may become core military skills important as the ability to shoot." - Article Author

Obama declares digital infrastructure to be national assets

Information dominance

Web War One Attacked Estonia in 2007

Global Regimes plots such attacks leading to internet chaos, NSA and Department of Defense proved incapable from.

Individuals has the ability to penetrate valued secure sites

New Weapon in the hands of terrorists

Many experts once had disagreed with cyber war posing a serious risk to national security.

Coined the term "Weapons of mass annoyance"

Cyber-events changed this perception from past tragedies

West Point U.S Military carried out cyber-trainings

Attribution, Deception and Intelligence

Origin

  1. Where (from what IP address) the software came from (origin)?
  1. How, when, and by whom was the software constructed (structure)?
  1. What was the software designed to do (purpose)?

Structure

Purpose

Surveillance

Intelligence

Reconnaissance