Cyberwarfare 💥
Introduction
The Era of Smart Weapons
Cyberwar
Multidisciplinary approach
American Businessman scenario
Israeli Insurgence used for strategic communication in 2006
Cyberwar between Georgia and Russia in 2008
DDoS (Distributed Denial of Service) attacks from both sides
Iran Fuel Enrichment program in 2009, USB drive "Stuxnet" destroyed physical Uranium towers in the compound
Tunisian government hacked in 2010
Authors
Paulo Shakarian
Jana Shakarian
Andrew Ruef
What is Cyberwar
Clausewitz’s definition of war
“an extension of policy (or politics) by other means.” AND “an extension of policy (or politics) by actions taken in cyber-space.”
RESOLVED: Cyber war is an extension of policy by actions taken in cyber space by state or nonstate actors that either constitute a serious threat to a nation’s security or are conducted in response to a perceived threat against a nation’s security.
Is Cyberwar a credible threat?
Cyber-operations can help with military missions such as intelligence gathering and information exchange
U.S.A starts to innovate cyber-weapons such as BIG DOG to reduce American casualties in due conflict from enemy states
Smart weapons (Lethal Autonomous Robotic Weaponry - LARWs)
Inability to resist terrorism and guerilla disputes
U.S used Microelectronic techs for Persian Gulf War, Kosovo and Afghanistan.
2003: Middle East combats
American and British forces used advanced LARWs such as unmanned aerial vehicles (UAVs), Tomahawk missiles, laser munitions, predator drones, and the Pentagon internet in washington to override war communications.
Sky Eye
"New military internet will coordinate military operations and provide US commanders with intelligence about their enemies' movements in battle"
American Way of War: Speed, Accuracy, Precision and Stealth
Reduce Casualties
Systems of Systems
Vulnerable to high-tech retaliation in the form of cyberwar
Limit destructiveness
Middle age analogy
9/11 example
Power vacuum: No man's zone is internet
"Fifth domain" after land, sea, air, and space.
Both Obama and Clinton's administration have preventive measures
"Hacking, virus writing, and crashing data information systems - as well as defending against enemy hackers and virus writers - may become core military skills important as the ability to shoot." - Article Author
Obama declares digital infrastructure to be national assets
Information dominance
Web War One Attacked Estonia in 2007
Global Regimes plots such attacks leading to internet chaos, NSA and Department of Defense proved incapable from.
Individuals has the ability to penetrate valued secure sites
New Weapon in the hands of terrorists
Many experts once had disagreed with cyber war posing a serious risk to national security.
Coined the term "Weapons of mass annoyance"
Cyber-events changed this perception from past tragedies
West Point U.S Military carried out cyber-trainings
Attribution, Deception and Intelligence
Origin
- Where (from what IP address) the software came from (origin)?
- How, when, and by whom was the software constructed (structure)?
- What was the software designed to do (purpose)?
Structure
Purpose
Surveillance
Intelligence
Reconnaissance