SlideShare a Scribd company logo
1 of 25
Download to read offline
Cyber Warfare: Terms, Issues, Laws
and Controversies
Ensar Seker
Objectives
• Introduction
• Cyber Terminology
• Major Players in Cyber Space
• Noticeable Cyber Attacks
• Conclusion
NATO: UNCLASSIFIED 2
Introduction
U.S. Intelligence Community ranked cyber
attacks ahead of;
• Terrorism
• Transnational Organized Crime
• Proliferation of Weapons of Mass Destruction
3
Introduction
4
Introduction
5
LAND SEA AIR SPACE
CYBER
Cyber Terminology
Cyber Space
All of the computer networks in the world and
everything they connected and control.
Cyber Warfare
Actions by a nation state to penetrate another
nation‟s computers or networks for the purpose
of causing damage or disruption.
6
Major Players
in Cyber Space
(UNITED STATES)
7
USCYBERCOM NSA FBI US-CERT
NETCOM 24 AIR FORCE MARFORCYBER CYBERFOR ARCYBER INSCOM
Major Players
in Cyber Space
(UNITED STATES)
The Five Pillars
1 - Recognizing that the new domain for warfare is
cyberspace similar to the other elements in the
battlespace.
2 - Proactive defenses as opposed to passive defense.
3 - Critical infrastructure protection (CIP) to ensure the
protection of critical infrastructure.
4 - The use of collective defense, which would provide
the ability of early detection and to incorporate them into
the cyberwarfare defense structure.
5 - Maintaining and enhancing the advantage of
technological change.
8
Major Players
in Cyber Space
(CHINA)
9
Ministry of Public Security People's Liberation Army
Unit 61398
Ministry of State Security
The National Computer Network Emergency Response Technical Team
/Coordination Center of China
Major Players
in Cyber Space
(CHINA)
• China has developed a communications intelligence
program called „Golden Shield‟ using new and advanced
technologies to gather domestic and foreign intelligence.
• PLA has announced the deployment of another crucial
military team: a cyber security squad. Described as an
“Blue Army”.
• There are too many state-level cyber attacks from China to
United States so those attacks are even named. Titan Rain
is a U.S. code name for Chinese military cyber assaults
against the U.S.
10
Major Players
in Cyber Space
(RUSSIA)
11
Special
Communications
and Information
Service
Federal Agency
of Government
Communications
and Information
Main Intelligence
Agency
Federal
Security Service
Major Players
in Cyber Space
(RUSSIA)
• Russian attacks are much more difficult to detect
since they cover their tracks very well unlike their
counterparts in China.
• Russia holds a broad concept of cyber warfare,
which includes intelligence, counterintelligence,
deceit, disinformation, electronic warfare,
debilitation of communications, degradation of
navigation support, psychological pressure,
degradation of information systems and
propaganda.
12
Major Players
in Cyber Space
(NORTH KOREA)
13
The Korean People's Army – Bureau 121
Major Players
in Cyber Space
(NORTH KOREA)
• North Korea has more than 5,000 hacker
forces based on South Korean‟s reports.
• Bureau 121 concentrates exclusively on digital
warfare.
• Primary intelligence targets are South Korea,
Japan, and the United States.
14
Major Players
in Cyber Space
(The Five Eyes Alliance)
15
National Security
Agency
UNITED STATES
Communications
Security
Establishment
CANADA
Government
Communications
Security Bureau
NEW ZEALAND
Government
Communications
Headquarters
UNITED KINGDOM
Defence Signals
Directorate
AUSTRALIA
Major Players
in Cyber Space
(HACKER GROUPS)
16
Equation Group Tailored Access
Operations
Elderwood Group Fancy Bear Dragonfly
Tarh Andishan
/Ajax
Syrian Electronic
Army
Axiom Hidden LYNX Putter Panda
Noticable Cyber Attacks
(2007 Cyberattacks on Estonia)
• Estonian parliament, banks, ministries,
newspapers and broadcasters‟ network
were attacked amid the country's
disagreement with Russia about the
relocation of the Bronze Soldier of
Tallinn.
• No less than 128 exceptional DDOS
assaults focusing on internet
conventions in Estonia
• Internet traffic expanded from 20,000
packets to more than 4 million packets
for every second.
17
Noticable Cyber Attacks
(2008 Cyberattacks on Georgia)
• The Russian-Georgian War begun
in August of 2008.
• Before any gun was fired, cyber
attacks were already hitting
Georgia.
• 54 websites in Georgia related to
communications, finance, and the
government were targeted
immediately.
• All communication channels were
hacked for preventing Georgian
public to be informed
18
Noticable Cyber Attacks
(2010 Cyberattacks on Myanmar)
• DDOS attacks against to
general election in Burma.
• Before any gun was fired,
cyber attacks This election was
the first that Burma had had in
20 years.
• The attacks were significantly
larger than attacks against
Estonia and Georgia in 2007
and 2008 respectively.
19
Noticable Cyber Attacks
(2010 Cyberattacks on Iran)
• Operation Olympic Games was a
covert and still unacknowledged
campaign of sabotage by means of
cyber disruption, directed at Iranian
nuclear facilities by the United States
and likely Israel.
• Stuxnet and Flame malwares were
developed to target industrial
computer systems and was
responsible for causing substantial
damage to Iran's nuclear program.
• Stuxnet specifically targets
programmable logic controllers
(PLCs).
20
Noticable Cyber Attacks
(2014 Cyberattacks on USA)
• Operation Cleaver was a
cyberwarfare covert operation
targeting critical infrastructure
organizations in the US and
worldwide, allegedly planned
and executed by Iran.
• At least 17 US Electricity
companies‟ systems were
attacked, including four utilities,
where hackers stole data and
gained access to private
networks.
21
Noticable Cyber Attacks
(2016 Cyberattacks on USA)
• U.S. intelligence agencies'
conclusion that Russia tried to
influence the election by hacking
people and institutions, including
Democratic Party bodies.
• Based on the reports, Russian
President Vladimir Putin
supervised his intelligence
agencies' hacking of the U.S.
presidential election and turned it
from a general attempt to discredit
American democracy.
22
Noticable Cyber Attacks
(Cyber Weapons)
23
STUXnet
Great Cannon
DuquFlame Mirai
Wiper
Regin
ShammonTurla Rocra
Conclusion
• Cyber Warfare can obtain greater striking
force when compared to traditional army.
• Depending on the internet and network
systems even more in the future, would make
cyber space more vulnerable to cyber attacks.
• As national security concern, cyber threats
dramatically increase.
24
25

More Related Content

What's hot

The New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st centuryThe New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st centuryJonathan Francis Roscoe
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckCyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckRajeev Chauhan
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030Scott Dickson
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 

What's hot (20)

The New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st centuryThe New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st century
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckCyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 

Similar to Cyberware

Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingDavid Opderbeck
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfBenjamin Ang
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threatsisc2dfw
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
War between Russia and Ukraine in cyber space
War between Russia and Ukraine in cyber spaceWar between Russia and Ukraine in cyber space
War between Russia and Ukraine in cyber spaceuisgslide
 

Similar to Cyberware (20)

Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Exp r35
Exp r35Exp r35
Exp r35
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
OTI Cyber warefare
OTI Cyber warefareOTI Cyber warefare
OTI Cyber warefare
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
War between Russia and Ukraine in cyber space
War between Russia and Ukraine in cyber spaceWar between Russia and Ukraine in cyber space
War between Russia and Ukraine in cyber space
 

Recently uploaded

Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalorenarwatsonia7
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...Suhani Kapoor
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Christina Parmionova
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...ankitnayak356677
 
Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Christina Parmionova
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Ms
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,MsVIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Ms
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Msankitnayak356677
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...Christina Parmionova
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
(怎样办)Sherbrooke毕业证本科/硕士学位证书
(怎样办)Sherbrooke毕业证本科/硕士学位证书(怎样办)Sherbrooke毕业证本科/硕士学位证书
(怎样办)Sherbrooke毕业证本科/硕士学位证书mbetknu
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 

Recently uploaded (20)

Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
 
Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
Model Town (Delhi) 9953330565 Escorts, Call Girls Services
Model Town (Delhi)  9953330565 Escorts, Call Girls ServicesModel Town (Delhi)  9953330565 Escorts, Call Girls Services
Model Town (Delhi) 9953330565 Escorts, Call Girls Services
 
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Ms
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,MsVIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Ms
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Ms
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
(怎样办)Sherbrooke毕业证本科/硕士学位证书
(怎样办)Sherbrooke毕业证本科/硕士学位证书(怎样办)Sherbrooke毕业证本科/硕士学位证书
(怎样办)Sherbrooke毕业证本科/硕士学位证书
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 

Cyberware

  • 1. Cyber Warfare: Terms, Issues, Laws and Controversies Ensar Seker
  • 2. Objectives • Introduction • Cyber Terminology • Major Players in Cyber Space • Noticeable Cyber Attacks • Conclusion NATO: UNCLASSIFIED 2
  • 3. Introduction U.S. Intelligence Community ranked cyber attacks ahead of; • Terrorism • Transnational Organized Crime • Proliferation of Weapons of Mass Destruction 3
  • 6. Cyber Terminology Cyber Space All of the computer networks in the world and everything they connected and control. Cyber Warfare Actions by a nation state to penetrate another nation‟s computers or networks for the purpose of causing damage or disruption. 6
  • 7. Major Players in Cyber Space (UNITED STATES) 7 USCYBERCOM NSA FBI US-CERT NETCOM 24 AIR FORCE MARFORCYBER CYBERFOR ARCYBER INSCOM
  • 8. Major Players in Cyber Space (UNITED STATES) The Five Pillars 1 - Recognizing that the new domain for warfare is cyberspace similar to the other elements in the battlespace. 2 - Proactive defenses as opposed to passive defense. 3 - Critical infrastructure protection (CIP) to ensure the protection of critical infrastructure. 4 - The use of collective defense, which would provide the ability of early detection and to incorporate them into the cyberwarfare defense structure. 5 - Maintaining and enhancing the advantage of technological change. 8
  • 9. Major Players in Cyber Space (CHINA) 9 Ministry of Public Security People's Liberation Army Unit 61398 Ministry of State Security The National Computer Network Emergency Response Technical Team /Coordination Center of China
  • 10. Major Players in Cyber Space (CHINA) • China has developed a communications intelligence program called „Golden Shield‟ using new and advanced technologies to gather domestic and foreign intelligence. • PLA has announced the deployment of another crucial military team: a cyber security squad. Described as an “Blue Army”. • There are too many state-level cyber attacks from China to United States so those attacks are even named. Titan Rain is a U.S. code name for Chinese military cyber assaults against the U.S. 10
  • 11. Major Players in Cyber Space (RUSSIA) 11 Special Communications and Information Service Federal Agency of Government Communications and Information Main Intelligence Agency Federal Security Service
  • 12. Major Players in Cyber Space (RUSSIA) • Russian attacks are much more difficult to detect since they cover their tracks very well unlike their counterparts in China. • Russia holds a broad concept of cyber warfare, which includes intelligence, counterintelligence, deceit, disinformation, electronic warfare, debilitation of communications, degradation of navigation support, psychological pressure, degradation of information systems and propaganda. 12
  • 13. Major Players in Cyber Space (NORTH KOREA) 13 The Korean People's Army – Bureau 121
  • 14. Major Players in Cyber Space (NORTH KOREA) • North Korea has more than 5,000 hacker forces based on South Korean‟s reports. • Bureau 121 concentrates exclusively on digital warfare. • Primary intelligence targets are South Korea, Japan, and the United States. 14
  • 15. Major Players in Cyber Space (The Five Eyes Alliance) 15 National Security Agency UNITED STATES Communications Security Establishment CANADA Government Communications Security Bureau NEW ZEALAND Government Communications Headquarters UNITED KINGDOM Defence Signals Directorate AUSTRALIA
  • 16. Major Players in Cyber Space (HACKER GROUPS) 16 Equation Group Tailored Access Operations Elderwood Group Fancy Bear Dragonfly Tarh Andishan /Ajax Syrian Electronic Army Axiom Hidden LYNX Putter Panda
  • 17. Noticable Cyber Attacks (2007 Cyberattacks on Estonia) • Estonian parliament, banks, ministries, newspapers and broadcasters‟ network were attacked amid the country's disagreement with Russia about the relocation of the Bronze Soldier of Tallinn. • No less than 128 exceptional DDOS assaults focusing on internet conventions in Estonia • Internet traffic expanded from 20,000 packets to more than 4 million packets for every second. 17
  • 18. Noticable Cyber Attacks (2008 Cyberattacks on Georgia) • The Russian-Georgian War begun in August of 2008. • Before any gun was fired, cyber attacks were already hitting Georgia. • 54 websites in Georgia related to communications, finance, and the government were targeted immediately. • All communication channels were hacked for preventing Georgian public to be informed 18
  • 19. Noticable Cyber Attacks (2010 Cyberattacks on Myanmar) • DDOS attacks against to general election in Burma. • Before any gun was fired, cyber attacks This election was the first that Burma had had in 20 years. • The attacks were significantly larger than attacks against Estonia and Georgia in 2007 and 2008 respectively. 19
  • 20. Noticable Cyber Attacks (2010 Cyberattacks on Iran) • Operation Olympic Games was a covert and still unacknowledged campaign of sabotage by means of cyber disruption, directed at Iranian nuclear facilities by the United States and likely Israel. • Stuxnet and Flame malwares were developed to target industrial computer systems and was responsible for causing substantial damage to Iran's nuclear program. • Stuxnet specifically targets programmable logic controllers (PLCs). 20
  • 21. Noticable Cyber Attacks (2014 Cyberattacks on USA) • Operation Cleaver was a cyberwarfare covert operation targeting critical infrastructure organizations in the US and worldwide, allegedly planned and executed by Iran. • At least 17 US Electricity companies‟ systems were attacked, including four utilities, where hackers stole data and gained access to private networks. 21
  • 22. Noticable Cyber Attacks (2016 Cyberattacks on USA) • U.S. intelligence agencies' conclusion that Russia tried to influence the election by hacking people and institutions, including Democratic Party bodies. • Based on the reports, Russian President Vladimir Putin supervised his intelligence agencies' hacking of the U.S. presidential election and turned it from a general attempt to discredit American democracy. 22
  • 23. Noticable Cyber Attacks (Cyber Weapons) 23 STUXnet Great Cannon DuquFlame Mirai Wiper Regin ShammonTurla Rocra
  • 24. Conclusion • Cyber Warfare can obtain greater striking force when compared to traditional army. • Depending on the internet and network systems even more in the future, would make cyber space more vulnerable to cyber attacks. • As national security concern, cyber threats dramatically increase. 24
  • 25. 25