▪ is the use of computers and the Internet in
conducting warfare in cyberspace.
▪ protecting information and information systems from unauthorized
access, use, disclosure, disruption, modification or destruction.
What you are searching for
What web pages you visit
What blogs you read – Google Reader
Your financial information – AdSense /
Strength / Popularity of your website –
Google Analytics / Google Page Creator
6. Who and what you’re emailing –
7. What’s on your PC – Google Desktop
8. Your research paper, bills, etc. –
uploading documents to Google
9. Your schedule – Google Calendar
10. Your social network and interests –
(Orkut, Facebook, Digg)
11. When you’re going to get the flu – Google
12. Where you and your friends are – Google
Latitude / Google Maps
13. What you’re watching on You Tube –
Google owns You Tube
14. What and where you study – Google
Books, Scholar, and University
15. Everything you’re looking at online –
16. Your problems – searching Google
17. Your medical issues – Google Health
18. Your home address – Google
Maps, AdSense, or Checkout
19. Mobile number – SM, Google
Mobile, and Gmail
20. How your voice sounds – Google Talk
21. What you, your friends and family look
like and do – Picasa
22. Everything you do online – Google Secure
Access encrypts your data
23. What you want to buy and have bought –
product search and catalog
24. What you business is about – Adwords
share information with Google
25. What’s important to you – Google Alerts
Against Video Privacy Act?
Every video on You Tube, the judge required
Google to turn over to Viacom the login name of
every user who had watched it and the address
of their computer (IP)
Viacom claims information will be safeguarded
and will be used only to press charges against
Google ($1 billion copyright suit)
Public afraid of information being used against
Identity Theft / Stalker / Target Ads
Activities / Interests
150 million users
Businesses can look at your Facebook
Check privacy settings
Doomsday April 1st?
Conficker is a computer worm that exploits
the weaknesses in Microsoft’s Windows
12 million machines infected with software
code that will connect the infected machine
it controls to a powerful computer known as
Microsoft announces a $250,000 reward for
information leading to the capture of the
“Perhaps the most obvious frightening aspect of
Conficker is its clear potential to do harm.
Perhaps in the best case, Conficker may be
used as sustained and profitable platform for
massive Internet fraud and theft. In the worst
case, Conficker could be turned into a powerful
offensive weapon for performing concerted
information warfare attacks that could disrupt
not just countries, but the Internet itself.”
Research Director at SRI International
The term cyber-warfare has many manifestations, ranging
between website vandalism, iWar (information
warfare), to destroying a country's critical infrastructure!
Large dependency on information platforms linked to the
internet. Such as power
grids, water, fuel, communications, and public
transportation. They are all vulnerable to a cyber attack.
An example that highlights this is the Russian-Georgian war in 2008.
Cyber Warfare still a relatively new type of war. Most
of the research is based on “potential-harm”.
▪ Jordan's’ Techno power:
Those involved in cyber warfare have a vast amount of techno power. As
these “hackers” can destroy a country from inside out in a short time, and
with complete anonymity. The true manifestation of “power”. Or they can
manipulate any corporation, steal money, the limits are endless. They can
access anythign connected to cyber space.
▪ Marvin’s Experts:
The experts that can engage in cyber warfare are put above all others in
the realm of the internet.
▪ Because they can.
▪ Can sell skills to terrorist groups or governments for money.
As the Internet becomes more pervasive in all areas of
human endeavor, individuals or groups can use the
anonymity afforded by cyberspace to threaten
citizens, specific groups (i.e. with membership based on
ethnicity or belief), communities and entire
countries, without the inherent threat of capture, injury, or
death to the attacker that being physically present would
Leveraging of a target's computers and
information, particularly via the Internet, to cause
physical, real-world harm or severe disruption of
The targets usually consisted of normal individual
internet users 10 – 15 years ago. Now targets can be
countries, large corporations, etc; as society became
Are only developed countries open to attack?
▪ Yes, the more developed countries are susceptible to cyber warfare.
As most of the foundations of the country and population lie within
the realms of communication based in cyberspace.
▪ Lesser developed countries can be effected just as much. Although
it won’t hit the general population as hard.
Future wars and terrorism will look to manipulate and
target foundations with no losses.
On May 17, 2007 Estonia came under cyber attack. The
Estonian parliament, ministries, banks, and media were
On first week of September 2007, The Pentagon and
various French, German and British government
computers were attacked by hackers of Chinese origin.
The Chinese government denies any involvement
Georgian and Azerbaijani sites were attacked by hackers
during the 2008 South Ossetia War.
The United States had come under attack from computers
and computer networks situated in China and Russia.
Cyber-warfare is still developing. Small attacks have been made
and attempted, but there hasn’t been a “large-scale” cyber war.
Still a war-type of the near future.
The following examples are just potential threats:
Can cripple a country
▪ Inhibit or stop all communication that uses any technological medium
▪ Could take control of power, water, and other necessities
▪ Confidential documents/plans stolen
▪ Total Control over most technological platforms (including nuclear codes and
Cyber warfare in media: (Somewhat possible damages if it were to
occur on a large scale)
▪ Eagle Eye
▪ Die Hard 4