SlideShare a Scribd company logo
1 of 49
  Where Cyber and Military Might Combined for War Fighting Advantage. Paul M. Joyal, Managing Director  Public Safety and Homeland Security The Brave New World of the 5 Day War
Russian Views on Electronic and Information Warfare ā€œ The growing role of information-technology is rapidly lowering the barrier between war and peace.ā€  Mary C. FitzGerald www.nationalstrategies.com
Briefing ,[object Object],[object Object],[object Object],[object Object],ā€œ Warfare has indeed shifted from being a duel of strike systems to being a duel of information systemsā€
Russian analysts Yevgeniy Korotchenko and  Nikolay Plotnikov conclude in 1993: We are now seeing a tendency toward a shift in the center of gravity away from traditional methods of force and the means of combat toward non-traditional methods, including information.  Their impact is imperceptible and appears gradually. ... Thus today information and information technologies are becoming a real weapon.  A weapon not just in a metaphoric sense but in a direct sense as well
Two Aspects of Parity and Defense Sufficiency  (1993) Russian Admiral V.S. Pirumov   "... that a war's main objective is shifting away from seizure of the opponent's territory and moving towards neutralizing his political or military-economic potential - eliminating a competitor - and ensuring the victor's supremacy in the political arena or in raw materials and sales markets.
General Viktor Samsonov, Chief of the Russian General Staff stated 23 Dec 96 The high effectiveness of ā€˜information warfareā€™ systems, in combination with highly accurate weapons and ā€˜non-military means of influenceā€™ makes it possible to disorganize the system of state administration, hit strategically important installations and groupings of forces, and affect the mentality and moral spirit of the population. In other words, the effect of using these means is comparable with the damage resulting from the effect of weapons of mass destruction.
Developments to this doctrinal understanding have evolved in the 90ā€™s with the dynamism of the information era ,[object Object],[object Object]
Information age technologies have created a new cyberspace environment in which to conduct warfare. Russia's response to the information age highlights the potential for challenges to the existing military balance and global security. This was brought vividly home during the 5 Day Russian Georgian War. Countries around the globe are increasingly vulnerable to information warfare  as cyberspace and social networking increases, dependence expands. The gap between the emerging information age environment and the doctrine, capabilities and strategies for defending against and prosecuting information warfare  are now being globally confronted.
Tectonic shift in military affairs:  6 th  Generation warfare will change the laws of combat and the principles of military science ,[object Object],[object Object]
Nature of Information Warfare ,[object Object],[object Object],[object Object],[object Object]
Information Warfare ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computerization of Information Warfare ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Russian intelligence services have a history of employing hackers against the United States . ,[object Object],[object Object]
Russian FSB continues to employ hackers ,[object Object],[object Object]
Psychological Operations and Information Warfare ,[object Object],[object Object],[object Object]
Reflexive Control of the enemy is the goal of PYSOPS and A/M ,[object Object],[object Object],[object Object],[object Object]
CYBERWAR The New ā€œActive Measureā€ ,[object Object],[object Object],[object Object]
Russian cyber warfare doctrine also addresses the optimum time to strike.  Prior to an ā€œinformation strikeā€, all targets should be identified (including enemy information systems), enemy access to external information should be denied, credit and monetary circulation should be disrupted, and the populace should be subjected to a massive psychological operation--including disinformation and propaganda.
In preparation for conflict, computer networks and databases are penetrated before the beginning of combat operations by agent and other methods Micro-organism cultures are introduced that eat away electronic components. The employment of information weapons in the concluding phase of a major regional conflict is similar to their use in peacekeeping operations.
Combined information and military operations are required Estimates have shown that the use of information weapons must be constantly accompanied by the limited use or threat of use of conventional weapons, especially high-precision weapons.
Information Warfare Wrap Up ,[object Object],[object Object],[object Object],[object Object]
Russian-Georgian War ,[object Object],[object Object],[object Object],[object Object]
Information Warfare and Active Measures have a highly developed history in Soviet -Russian Intelligence History Today Russia is no longer constrained by communism. Government, business and criminal groups operate seamlessly.  Intelligence skills have now entered the market place and are used by any number of public and private entities to achieve their ends.  Cyber threats only amplify this muddled reality
The Brave New World of the 5 Day War: Where Cyber and Military Might Combined Presented by Eka   Tkeshelashvili Secretary, National Security Council of Georgia February 6, 2011 , Washington, DC
PLANNING ,[object Object],[object Object],[object Object],February 6, 2011
Letā€™s go back about a decade ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
THE PROBLEM ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The War in Context ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber-attack Details - 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber-attack Details - 2 ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
Conclusions ,[object Object],[object Object],[object Object],February 6, 2011
Commercial Effects of E-Wars   Analysis of Georgia events and related topics . Stephen Spoonamore Partner GSP llc [email_address] Skype: spoonamore 202 351 1883
Where was the Georgian War? This is snapshot of what part of the Internet looked like at a computational perspective near the start of the Georgia War. Yesā€¦it is fuzzyā€¦ So is the web.
More or less hereā€¦ The Green Square (virtually as it were) covers the Caucus . It amounts to apx 0.3% of global IT  Traffic. From a commercial  perspective, it is not  a high priority.
Rewind to the Baltics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In other words thisā€¦ The Green Square Now covers the  Baltics . Who also amount to apx 0.3% of  global IT Traffic.
Became thisā€¦ Green Square covers failures Spilling out of the  Baltics . Impacting nearly  30% of the globes  IP traffic and 20% of the globes  Finance. This sucked.
After the Baltics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Banks now act like a herd. Watch our for lionsā€¦
One dies, Herd survives. Lions eat the weak link (Georgia) while the bank herd goes off to graze.  They are programmed this way as we sit here today.
Banks impact Cell Phones. Average Credit Card usage needs 36 computers to  confirm or process data. Many, perhaps most, EU Cell Phones confirm account validity by piggy-backing on credit system Banks cut of Credit Card settlement systems, none of  those phones linked to it function.
Impact on other credentials. Border credential systems overlap phone networks . IP address blocks for ISPs of attacked banks shut out. Commercial entities within those ISP blocks can not  access ISP or email. ATM network will not function. Travel tickets wont function. Gas Pumps wonā€™t function.
E-War knowns Mo-Fri. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Commercial Responses. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Final Thesis_Bessinger
Final Thesis_BessingerFinal Thesis_Bessinger
Final Thesis_BessingerSam T. Bessinger
Ā 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense David Sweigert
Ā 
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...inventionjournals
Ā 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
Ā 
Methods of Research final
Methods of Research finalMethods of Research final
Methods of Research finalEric Sutton
Ā 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlinJavierski
Ā 
International Law-2
International Law-2International Law-2
International Law-2Erum Khatoon
Ā 
4 g wfinal (2)
4 g wfinal (2)4 g wfinal (2)
4 g wfinal (2)Janos Tomolya
Ā 
The revolution after next
The revolution after nextThe revolution after next
The revolution after nextLex Pit
Ā 
Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016 Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016 DonbassFullAccess
Ā 
Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)cynrx
Ā 
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain RegionNotice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain Regionlegaladvice
Ā 
Terrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoTerrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoAlvin "Flex" Plexico, Ph.D.
Ā 
Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...528Hz TRUTH
Ā 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?Melissa Andrews
Ā 

What's hot (19)

Final Thesis_Bessinger
Final Thesis_BessingerFinal Thesis_Bessinger
Final Thesis_Bessinger
Ā 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
Ā 
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
Ā 
Book studies 63-1-mar2019
Book studies 63-1-mar2019Book studies 63-1-mar2019
Book studies 63-1-mar2019
Ā 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
Ā 
Methods of Research final
Methods of Research finalMethods of Research final
Methods of Research final
Ā 
Bush doctrine for submission 1
Bush doctrine for submission 1Bush doctrine for submission 1
Bush doctrine for submission 1
Ā 
The work-of-a-nation
The work-of-a-nationThe work-of-a-nation
The work-of-a-nation
Ā 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlin
Ā 
International Law-2
International Law-2International Law-2
International Law-2
Ā 
4 g wfinal (2)
4 g wfinal (2)4 g wfinal (2)
4 g wfinal (2)
Ā 
The revolution after next
The revolution after nextThe revolution after next
The revolution after next
Ā 
Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016 Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016
Ā 
Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)
Ā 
Vol3ch03
Vol3ch03Vol3ch03
Vol3ch03
Ā 
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain RegionNotice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
Ā 
Terrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoTerrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. Plexico
Ā 
Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...
Ā 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?
Ā 

Viewers also liked

Relationship between Russia and Georgia
Relationship between Russia and GeorgiaRelationship between Russia and Georgia
Relationship between Russia and GeorgiaIUT Michel de Montaigne
Ā 
The 2008 Russia-Georgia War
The 2008 Russia-Georgia WarThe 2008 Russia-Georgia War
The 2008 Russia-Georgia Warhandman003
Ā 
Media presentation project
Media presentation projectMedia presentation project
Media presentation projectAaronLott
Ā 
Military (2)
Military (2)Military (2)
Military (2)rockopri
Ā 
My presentation on Rising Influence of China
My presentation on Rising Influence of ChinaMy presentation on Rising Influence of China
My presentation on Rising Influence of ChinaJoharyab Baig
Ā 
Arms Control AND Disarmament
Arms Control AND DisarmamentArms Control AND Disarmament
Arms Control AND DisarmamentUltraspectra
Ā 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)Board of Innovation
Ā 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsXPLAIN
Ā 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideCrispy Presentations
Ā 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)Steven Hoober
Ā 
Upworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy
Ā 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureReferralCandy
Ā 
Design Your Career 2018
Design Your Career 2018Design Your Career 2018
Design Your Career 2018Slides That Rock
Ā 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing FailsRand Fishkin
Ā 
The History of SEO
The History of SEOThe History of SEO
The History of SEOHubSpot
Ā 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into MarketingEd Fry
Ā 

Viewers also liked (20)

Relationship between Russia and Georgia
Relationship between Russia and GeorgiaRelationship between Russia and Georgia
Relationship between Russia and Georgia
Ā 
The 2008 Russia-Georgia War
The 2008 Russia-Georgia WarThe 2008 Russia-Georgia War
The 2008 Russia-Georgia War
Ā 
Media presentation project
Media presentation projectMedia presentation project
Media presentation project
Ā 
Military (2)
Military (2)Military (2)
Military (2)
Ā 
Ethical challenges
Ethical challengesEthical challenges
Ethical challenges
Ā 
My presentation on Rising Influence of China
My presentation on Rising Influence of ChinaMy presentation on Rising Influence of China
My presentation on Rising Influence of China
Ā 
Ethics and AI
Ethics and AIEthics and AI
Ethics and AI
Ā 
Arms Control AND Disarmament
Arms Control AND DisarmamentArms Control AND Disarmament
Arms Control AND Disarmament
Ā 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
Ā 
The Minimum Loveable Product
The Minimum Loveable ProductThe Minimum Loveable Product
The Minimum Loveable Product
Ā 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
Ā 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media Sins
Ā 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same Slide
Ā 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)
Ā 
Upworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The Internets
Ā 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From Failure
Ā 
Design Your Career 2018
Design Your Career 2018Design Your Career 2018
Design Your Career 2018
Ā 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing Fails
Ā 
The History of SEO
The History of SEOThe History of SEO
The History of SEO
Ā 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into Marketing
Ā 

Similar to Govsec Georgia 2008 Cyber War

Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacksClifford Stone
Ā 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016cacds_ukraine
Ā 
The Mind Has No Firewall.pdf
The Mind Has No Firewall.pdfThe Mind Has No Firewall.pdf
The Mind Has No Firewall.pdfTeabeAmet
Ā 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
Ā 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseRepentSinner
Ā 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseAnonDownload
Ā 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)pavithra M
Ā 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
Ā 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxoreo10
Ā 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Pranav Gupta
Ā 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxfestockton
Ā 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxalfredai53p
Ā 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxambersalomon88660
Ā 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on TerrorTpeisi Nesby
Ā 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
Ā 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
Ā 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
Ā 
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxfestockton
Ā 

Similar to Govsec Georgia 2008 Cyber War (20)

Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
Ā 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016
Ā 
Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)
Ā 
The Mind Has No Firewall.pdf
The Mind Has No Firewall.pdfThe Mind Has No Firewall.pdf
The Mind Has No Firewall.pdf
Ā 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
Ā 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
Ā 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
Ā 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)
Ā 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
Ā 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
Ā 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
Ā 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism
Ā 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Ā 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Ā 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docx
Ā 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
Ā 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Ā 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
Ā 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Ā 
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
Ā 

Recently uploaded

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
Ā 
B.COM Unit ā€“ 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit ā€“ 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit ā€“ 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit ā€“ 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
Ā 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
Ā 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
Ā 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Trucks in Minnesota
Ā 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
Ā 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
Ā 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptxnandhinijagan9867
Ā 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
Ā 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
Ā 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
Ā 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
Ā 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
Ā 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
Ā 
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...amitlee9823
Ā 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
Ā 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
Ā 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
Ā 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
Ā 

Recently uploaded (20)

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
Ā 
B.COM Unit ā€“ 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit ā€“ 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit ā€“ 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit ā€“ 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
Ā 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Ā 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Ā 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
Ā 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Ā 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
Ā 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptx
Ā 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
Ā 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
Ā 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
Ā 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
Ā 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
Ā 
VVVIP Call Girls In Greater Kailash āž”ļø Delhi āž”ļø 9999965857 šŸš€ No Advance 24HRS...
VVVIP Call Girls In Greater Kailash āž”ļø Delhi āž”ļø 9999965857 šŸš€ No Advance 24HRS...VVVIP Call Girls In Greater Kailash āž”ļø Delhi āž”ļø 9999965857 šŸš€ No Advance 24HRS...
VVVIP Call Girls In Greater Kailash āž”ļø Delhi āž”ļø 9999965857 šŸš€ No Advance 24HRS...
Ā 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
Ā 
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...
Ā 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ā 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
Ā 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Ā 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Ā 

Govsec Georgia 2008 Cyber War

  • 1. Where Cyber and Military Might Combined for War Fighting Advantage. Paul M. Joyal, Managing Director Public Safety and Homeland Security The Brave New World of the 5 Day War
  • 2. Russian Views on Electronic and Information Warfare ā€œ The growing role of information-technology is rapidly lowering the barrier between war and peace.ā€ Mary C. FitzGerald www.nationalstrategies.com
  • 3.
  • 4. Russian analysts Yevgeniy Korotchenko and Nikolay Plotnikov conclude in 1993: We are now seeing a tendency toward a shift in the center of gravity away from traditional methods of force and the means of combat toward non-traditional methods, including information. Their impact is imperceptible and appears gradually. ... Thus today information and information technologies are becoming a real weapon. A weapon not just in a metaphoric sense but in a direct sense as well
  • 5. Two Aspects of Parity and Defense Sufficiency (1993) Russian Admiral V.S. Pirumov "... that a war's main objective is shifting away from seizure of the opponent's territory and moving towards neutralizing his political or military-economic potential - eliminating a competitor - and ensuring the victor's supremacy in the political arena or in raw materials and sales markets.
  • 6. General Viktor Samsonov, Chief of the Russian General Staff stated 23 Dec 96 The high effectiveness of ā€˜information warfareā€™ systems, in combination with highly accurate weapons and ā€˜non-military means of influenceā€™ makes it possible to disorganize the system of state administration, hit strategically important installations and groupings of forces, and affect the mentality and moral spirit of the population. In other words, the effect of using these means is comparable with the damage resulting from the effect of weapons of mass destruction.
  • 7.
  • 8. Information age technologies have created a new cyberspace environment in which to conduct warfare. Russia's response to the information age highlights the potential for challenges to the existing military balance and global security. This was brought vividly home during the 5 Day Russian Georgian War. Countries around the globe are increasingly vulnerable to information warfare as cyberspace and social networking increases, dependence expands. The gap between the emerging information age environment and the doctrine, capabilities and strategies for defending against and prosecuting information warfare are now being globally confronted.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Russian cyber warfare doctrine also addresses the optimum time to strike. Prior to an ā€œinformation strikeā€, all targets should be identified (including enemy information systems), enemy access to external information should be denied, credit and monetary circulation should be disrupted, and the populace should be subjected to a massive psychological operation--including disinformation and propaganda.
  • 19. In preparation for conflict, computer networks and databases are penetrated before the beginning of combat operations by agent and other methods Micro-organism cultures are introduced that eat away electronic components. The employment of information weapons in the concluding phase of a major regional conflict is similar to their use in peacekeeping operations.
  • 20. Combined information and military operations are required Estimates have shown that the use of information weapons must be constantly accompanied by the limited use or threat of use of conventional weapons, especially high-precision weapons.
  • 21.
  • 22.
  • 23. Information Warfare and Active Measures have a highly developed history in Soviet -Russian Intelligence History Today Russia is no longer constrained by communism. Government, business and criminal groups operate seamlessly. Intelligence skills have now entered the market place and are used by any number of public and private entities to achieve their ends. Cyber threats only amplify this muddled reality
  • 24. The Brave New World of the 5 Day War: Where Cyber and Military Might Combined Presented by Eka Tkeshelashvili Secretary, National Security Council of Georgia February 6, 2011 , Washington, DC
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Commercial Effects of E-Wars Analysis of Georgia events and related topics . Stephen Spoonamore Partner GSP llc [email_address] Skype: spoonamore 202 351 1883
  • 37. Where was the Georgian War? This is snapshot of what part of the Internet looked like at a computational perspective near the start of the Georgia War. Yesā€¦it is fuzzyā€¦ So is the web.
  • 38. More or less hereā€¦ The Green Square (virtually as it were) covers the Caucus . It amounts to apx 0.3% of global IT Traffic. From a commercial perspective, it is not a high priority.
  • 39.
  • 40. In other words thisā€¦ The Green Square Now covers the Baltics . Who also amount to apx 0.3% of global IT Traffic.
  • 41. Became thisā€¦ Green Square covers failures Spilling out of the Baltics . Impacting nearly 30% of the globes IP traffic and 20% of the globes Finance. This sucked.
  • 42.
  • 43. Banks now act like a herd. Watch our for lionsā€¦
  • 44. One dies, Herd survives. Lions eat the weak link (Georgia) while the bank herd goes off to graze. They are programmed this way as we sit here today.
  • 45. Banks impact Cell Phones. Average Credit Card usage needs 36 computers to confirm or process data. Many, perhaps most, EU Cell Phones confirm account validity by piggy-backing on credit system Banks cut of Credit Card settlement systems, none of those phones linked to it function.
  • 46. Impact on other credentials. Border credential systems overlap phone networks . IP address blocks for ISPs of attacked banks shut out. Commercial entities within those ISP blocks can not access ISP or email. ATM network will not function. Travel tickets wont function. Gas Pumps wonā€™t function.
  • 47.
  • 48.
  • 49.