Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cybersecurity, cyber capabilities of some countries, some important cyber attacks in near past, and finally, globally applied cyber warfare law for this attacks.
2. Objectives
• Introduction
• Cyber Terminology
• Major Players in Cyber Space
• Noticeable Cyber Attacks
• Conclusion
NATO: UNCLASSIFIED 2
3. Introduction
U.S. Intelligence Community ranked cyber
attacks ahead of;
• Terrorism
• Transnational Organized Crime
• Proliferation of Weapons of Mass Destruction
3
6. Cyber Terminology
Cyber Space
All of the computer networks in the world and
everything they connected and control.
Cyber Warfare
Actions by a nation state to penetrate another
nation‟s computers or networks for the purpose
of causing damage or disruption.
6
7. Major Players
in Cyber Space
(UNITED STATES)
7
USCYBERCOM NSA FBI US-CERT
NETCOM 24 AIR FORCE MARFORCYBER CYBERFOR ARCYBER INSCOM
8. Major Players
in Cyber Space
(UNITED STATES)
The Five Pillars
1 - Recognizing that the new domain for warfare is
cyberspace similar to the other elements in the
battlespace.
2 - Proactive defenses as opposed to passive defense.
3 - Critical infrastructure protection (CIP) to ensure the
protection of critical infrastructure.
4 - The use of collective defense, which would provide
the ability of early detection and to incorporate them into
the cyberwarfare defense structure.
5 - Maintaining and enhancing the advantage of
technological change.
8
9. Major Players
in Cyber Space
(CHINA)
9
Ministry of Public Security People's Liberation Army
Unit 61398
Ministry of State Security
The National Computer Network Emergency Response Technical Team
/Coordination Center of China
10. Major Players
in Cyber Space
(CHINA)
• China has developed a communications intelligence
program called „Golden Shield‟ using new and advanced
technologies to gather domestic and foreign intelligence.
• PLA has announced the deployment of another crucial
military team: a cyber security squad. Described as an
“Blue Army”.
• There are too many state-level cyber attacks from China to
United States so those attacks are even named. Titan Rain
is a U.S. code name for Chinese military cyber assaults
against the U.S.
10
11. Major Players
in Cyber Space
(RUSSIA)
11
Special
Communications
and Information
Service
Federal Agency
of Government
Communications
and Information
Main Intelligence
Agency
Federal
Security Service
12. Major Players
in Cyber Space
(RUSSIA)
• Russian attacks are much more difficult to detect
since they cover their tracks very well unlike their
counterparts in China.
• Russia holds a broad concept of cyber warfare,
which includes intelligence, counterintelligence,
deceit, disinformation, electronic warfare,
debilitation of communications, degradation of
navigation support, psychological pressure,
degradation of information systems and
propaganda.
12
14. Major Players
in Cyber Space
(NORTH KOREA)
• North Korea has more than 5,000 hacker
forces based on South Korean‟s reports.
• Bureau 121 concentrates exclusively on digital
warfare.
• Primary intelligence targets are South Korea,
Japan, and the United States.
14
15. Major Players
in Cyber Space
(The Five Eyes Alliance)
15
National Security
Agency
UNITED STATES
Communications
Security
Establishment
CANADA
Government
Communications
Security Bureau
NEW ZEALAND
Government
Communications
Headquarters
UNITED KINGDOM
Defence Signals
Directorate
AUSTRALIA
16. Major Players
in Cyber Space
(HACKER GROUPS)
16
Equation Group Tailored Access
Operations
Elderwood Group Fancy Bear Dragonfly
Tarh Andishan
/Ajax
Syrian Electronic
Army
Axiom Hidden LYNX Putter Panda
17. Noticable Cyber Attacks
(2007 Cyberattacks on Estonia)
• Estonian parliament, banks, ministries,
newspapers and broadcasters‟ network
were attacked amid the country's
disagreement with Russia about the
relocation of the Bronze Soldier of
Tallinn.
• No less than 128 exceptional DDOS
assaults focusing on internet
conventions in Estonia
• Internet traffic expanded from 20,000
packets to more than 4 million packets
for every second.
17
18. Noticable Cyber Attacks
(2008 Cyberattacks on Georgia)
• The Russian-Georgian War begun
in August of 2008.
• Before any gun was fired, cyber
attacks were already hitting
Georgia.
• 54 websites in Georgia related to
communications, finance, and the
government were targeted
immediately.
• All communication channels were
hacked for preventing Georgian
public to be informed
18
19. Noticable Cyber Attacks
(2010 Cyberattacks on Myanmar)
• DDOS attacks against to
general election in Burma.
• Before any gun was fired,
cyber attacks This election was
the first that Burma had had in
20 years.
• The attacks were significantly
larger than attacks against
Estonia and Georgia in 2007
and 2008 respectively.
19
20. Noticable Cyber Attacks
(2010 Cyberattacks on Iran)
• Operation Olympic Games was a
covert and still unacknowledged
campaign of sabotage by means of
cyber disruption, directed at Iranian
nuclear facilities by the United States
and likely Israel.
• Stuxnet and Flame malwares were
developed to target industrial
computer systems and was
responsible for causing substantial
damage to Iran's nuclear program.
• Stuxnet specifically targets
programmable logic controllers
(PLCs).
20
21. Noticable Cyber Attacks
(2014 Cyberattacks on USA)
• Operation Cleaver was a
cyberwarfare covert operation
targeting critical infrastructure
organizations in the US and
worldwide, allegedly planned
and executed by Iran.
• At least 17 US Electricity
companies‟ systems were
attacked, including four utilities,
where hackers stole data and
gained access to private
networks.
21
22. Noticable Cyber Attacks
(2016 Cyberattacks on USA)
• U.S. intelligence agencies'
conclusion that Russia tried to
influence the election by hacking
people and institutions, including
Democratic Party bodies.
• Based on the reports, Russian
President Vladimir Putin
supervised his intelligence
agencies' hacking of the U.S.
presidential election and turned it
from a general attempt to discredit
American democracy.
22
24. Conclusion
• Cyber Warfare can obtain greater striking
force when compared to traditional army.
• Depending on the internet and network
systems even more in the future, would make
cyber space more vulnerable to cyber attacks.
• As national security concern, cyber threats
dramatically increase.
24