Cyber warfare capabiliites : A Reality Check

Cyber Security and Cyber Forensics at Cyber Security, IT and Comn
Sep. 19, 2015
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
1 of 40

More Related Content

Slideshows for you

Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
Cyber Warfare -Cyber Warfare -
Cyber Warfare -ideaflashed
About cyber warAbout cyber war
About cyber wareugenvaleriu
Terror And TechnologyTerror And Technology
Terror And Technologypradhansushil
Cyber TerrorismCyber Terrorism
Cyber TerrorismSai praveen Seva
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG

Viewers also liked

Evaluation question 1Evaluation question 1
Evaluation question 1W07ULONGWE
PresentationPresentation
Presentationstoutkm
dene/ders1.pptdene/ders1.ppt
dene/ders1.pptBatın Düz
eTailing India Chennai Conclave 2013 Part 12eTailing India Chennai Conclave 2013 Part 12
eTailing India Chennai Conclave 2013 Part 12eTailing India
eTailing India Chennai Conclave 2013 Part 13eTailing India Chennai Conclave 2013 Part 13
eTailing India Chennai Conclave 2013 Part 13eTailing India
eTailing India Chennai Conclave 2013 Part 9eTailing India Chennai Conclave 2013 Part 9
eTailing India Chennai Conclave 2013 Part 9eTailing India

Similar to Cyber warfare capabiliites : A Reality Check

Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaMurray Security Services
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob

Recently uploaded

购买最新版犹他大学毕业证书原版一模一样购买最新版犹他大学毕业证书原版一模一样
购买最新版犹他大学毕业证书原版一模一样ohyxoa
『加拿大留学生买文凭』′哥伦比亚大学毕业证′学历认证『加拿大留学生买文凭』′哥伦比亚大学毕业证′学历认证
『加拿大留学生买文凭』′哥伦比亚大学毕业证′学历认证abycyww
如何办理西三一大学成绩单改成绩如何办理西三一大学成绩单改成绩
如何办理西三一大学成绩单改成绩yovuyhp
Anubha Raina.pptx NRHM Anubha Raina.pptx NRHM
Anubha Raina.pptx NRHM AnubhaRaina2
密苏里大学圣路易斯分校文凭认证真实留信网认证密苏里大学圣路易斯分校文凭认证真实留信网认证
密苏里大学圣路易斯分校文凭认证真实留信网认证uncesxy
《澳洲留学生文凭证书》出售原版仿制澳洲联邦大学毕业证成绩单《澳洲留学生文凭证书》出售原版仿制澳洲联邦大学毕业证成绩单
《澳洲留学生文凭证书》出售原版仿制澳洲联邦大学毕业证成绩单abycyww

Cyber warfare capabiliites : A Reality Check

  1. Rajeev Chauhan
  2. Confession I am Naive I don’t know the nuances of Cyber World Vocabulary Rajeev Chauhan
  3. CYBER WAR Definition The use of computer technology, most prominently the internet, in order to disrupt, deny or degrade the capabilities of an adversary, to an extent that it cripples its day to day activities Rajeev Chauhan
  4. AIM To degrade the capabilities of an adversary with ultimate goal of coercing adversary for a political purpose, besides hacking into the servers, stealing sensitive information. Rajeev Chauhan
  5. HISTORY 1982 • The Soviet Union planned to steal software from a Canadian company to control its Trans-Siberian Pipeline, • the CIA alters the software to cause the pipeline to explode. 1986 • A hacker tracked to Germany by a researcher in US over a period of 10 months • First recorded case of such investigation 1988 • Morris worm shuts down 10% of internet • First case of conviction for cyber crime 1994 • Computers hacked at the Rome Air Development Center at Griffiss Air Force Base New York by anonymous hacker and sensitive data stolen Rajeev Chauhan
  6. HISTORY 1997 • The NSA conducts a test, known as Eligible Receiver, to assess the vulnerability of government and military computers to a cyberattack 1998 • DoD establishes Joint Task force to defend computer networks 2001 • The worm named Code Red affects computer networks running a Microsoft operating system. Some websites, including the White House site, are disabled. 2003 • Operation Titan Rain : US targeted allegedly by China for stealing info Vulnerable systems . Rajeev Chauhan
  7. HISTORY 2007 • Estonia experiences DoS for 22 days by the hackers believed to be backed by Russian Government. • British and US Government officials alleged that official emails accounts hacked by PLA 2008 • Georgia faces DDoS attack and blames Russia for that. Media Transportation and Government Computer Networks crippled • First case of data stealing through a flash drive using covert program at US base in Middle East. 2009 • Israel Government sites subjected to Spam mail to the tune of 15 million emails per second. Israel blamed Hamas. • 103 country including Indian Government and embassies computers hacked allegedly by China, 2010 • Sensitive information stolen from Ministry of Defence Computers in India, suspect is China • Stuxnet cripples Iranian Nuclear installation. • Pentagon Declares Cyber War as Fifth domain Rajeev Chauhan
  8. HISTORY 2011 • IMF computers hacked , fingers point towards China • Hackers delete hard drives of 30k computers in Saudi oil company. • Military Wing of HAMAS carry out massive DDoS against nine US banks. • U.S. Secretary of Defense Leon Panetta warns that the U.S. must protect itself against a “Cyber Pearl Harbor." 2013 • The New York Times Website shut down for 20 hours by Syrian Electronic Army. 2014 • Chinese hackers had breached the computer network of the Office of Personnel Management in March. • The computer networks of Sony Pictures were hacked, allegedly by North Korea 2015 • The Russian hackers penetrated the email archives of White House and State Dept. officials correspondence with President Barack Obama. Rajeev Chauhan
  9. CYBER WAR • Transition in dimensions of warfare from physical to Cyber space. • Assumed importance as fifth dimension. • Security of cyberspace based on traditional axioms of threats • Affects Confidentiality, Integrity and Availability besides new realm of Data Thefts. Rajeev Chauhan
  10. CYBER WAR • Cyber warfare is closely related to other aspects of cyber threats such as cyber crime, cyber terrorism, cyber espionage and cyber spying. • Cyber war also includes the development and implementation of security strategies to defend against such attack mechanisms. Rajeev Chauhan
  11. CYBER WAR • At least 12 of the world’s 15 largest military powers are currently building cyber warfare programs, according to James Lewis, a cyber security expert at the Center for Strategic and International Studies. • The US has had a major influence on the development of cyberspace by virtue of the fact that much of the initial infrastructure and use was centered in that country and it continues to be a major force in its development and use. Rajeev Chauhan
  12. CYBER WARFARE • Recce • Enum • Foot printing • System hacking/attack – DDos – Trojans/backdoors – Virus/Worms – Session hijacking • Maintain Contact • Remove traces Rajeev Chauhan
  13. CYBER WARFARE CAPABILITIES – China – US – UK – North Korea – Australia – Israel – Iran – Russia – Germany – Netherlands – India • Countries with capabilities to launch Cyber war Rajeev Chauhan
  14. CHINA Rajeev Chauhan
  15. CHINA • Admitted to having a dedicated Cyber War launching capabilities. • According to the cyber security firm Mandiant, the People’s Liberation Army (PLA) has been using an elite cyber warfare unit based in Shanghai to launch hundreds of cyber attacks targeting mainly American. • The unit, officially known as Unit 61398, operates under the PLA’s Second Bureau of the General Staff Department’s (GSD) Third Department. • The PLA’s Unit 61398 is known for its use of zero-day exploits. According to Mandiant, Unit 61398’s informal name was APT1 due to their skill at successfully carrying out advanced persistent threats. Rajeev Chauhan
  16. CHINA • China has “reached out” to people with the necessary cyber skills in the IT sector and academic community to help fill any gaps in state expertise and personnel when needed. • In October 2014, the FBI issued a warning that a Chinese hacking collective known as Axiom has been engaged in a sophisticated campaign to steal valuable data from U.S. government agencies. Rajeev Chauhan
  17. CHINA • Taiwan’s National Security Bureau (NSB) has identified another unit of the GSD’s Third Department that is involved in cyber- activities.(source Taipei Times) • China’s cyber capabilities are organized by a strategy involving “to establish information dominance.” • Information dominance refers to: – taking and maintaining control of an adversary’s access to its own information, and – disrupting the flow of information necessary for “decision-making or combat operations.” Rajeev Chauhan
  18. US Rajeev Chauhan Images: Copyright of respective owners
  19. US • United States Cyber Command (USCYBERCOM) is an armed forces sub-unified command subordinate to United States Strategic Command and centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks. (wiki). • The Army Cyber Command (ARCYBER) is an Army component command for the U.S. Cyber Command: – Army Network Enterprise Technology Command / 9th Army Signal Command – Portions of 1st Information Operations Command (Land) – United States Army Intelligence and Security Command will be under the operational control of ARCYBER for cyber-related actionsRajeev Chauhan
  20. US • Marine Corps Forces Cyberspace Command • Navy Cyber Forces • Twenty-Fourth Air Force with following components – 67th Network Warfare Wing – 688th Information Operations Wing – 689th Combat Communications Wing • United States Tenth Fleet, consisting of – Naval Network Warfare Command – Navy Cyber Defense Operations Command – Naval Information Operation Commands – Combined Task Forces Rajeev Chauhan
  21. US • Cyberwarfare in the United States is the United States Cyber Command's military strategy of Proactive Cyber Defence and the use of cyber warfare as a platform for attack. • The five pillars is the framework for the United States military strategy for cyber warfare. – Cyberspace as new warfare domain – Proactive defense – Critical infra protection – Collective defense – Maintain and enhance the advantage of technological change Rajeev Chauhan
  22. UK GCHQ Rajeev Chauhan
  23. UK • Britain will create a new cyber unit which will be known as the Joint Cyber Reserve.(2013) – will be tasked primarily with defending the UK against cyber attacks – will also have the capability to launch strikes where deemed necessary • Ministry of Defence (MoD) will be looking to employ hundreds of IT experts who will be responsible for defending the nation’s critical data and computer networks. • Cyber defences blocked around 400,000 advanced malicious cyber threats against the government’s secure internet alone Rajeev Chauhan
  24. UK • An Army unit, called the 77th Brigade, is set up to help fight the cyberwars of the future. – Made up from reservists as well as regulars from all three services of the armed forces. – The team is modelled on the Chindits, a specialist unit which fought in Burma during the Second World War. – “clinical cyber strikes” could be used to disable key military assets such as nuclear and chemical weapons, enemy communications and other tools of war. Rajeev Chauhan
  25. GCHQ (Government Communication Head Quarter) • GCHQ is an intelligence and security organisation, working to keep Britain safe and secure in the challenging environment of modern communications • GCHQ strives to ensure that life in the UK isn't compromised through cyber attack or on-line serious crime, employing some of the world's leading experts on Information Security (how do we work). • GCHQ and its sister agencies, MI5 and the Secret Intelligence Service, could not tackle the cyber challenges "at scale" without greater support from the private sector, including the largest US technology companies which dominate the web. Rajeev Chauhan
  26. UK Rajeev Chauhan
  27. NORTH KOREA • Cyber attacks like the one inflicted by the North Korean government on Sony are just the opening skirmishes before the outbreak of a hugely dangerous cyber war that is inevitable. • North Korea has natural cyber-defenses • Why? – it only has about 1,000 IP addresses, – it has only very few computers so its 'terrain' is very defensible. Rajeev Chauhan
  28. AUSTRALIA • Recent references in cooperation with US in spying on Asian countries, especially India. • Australian Signals Directorate with support from the Defence Science and Technology Organisation has developed new cyber offensive capabilities in 2014, to carryout, – DoS – Access, modify and Delete Data remotely – Dissemination of False Information – Penetration of FW protecting Avionics of targets, inserting Trojan Horses • Part of 5-Eye partners....US, UK, Canada, Australia and New Zealand. Rajeev Chauhan
  29. ISRAEL • IDF has announced in June – Establish a Cyber Command within two years. – Includes Military Intelligence and C4I Telecommunications division. • Contribute towards the overall IDF Cyber Potential. • Challenges would be to attain both long range planning and precise execution capabilities at different level with optimal degree of operational flexibility in both offensive and defensive theatre. • DMI’s 8200 signal intelligence unit was handling int collection and offensive missions, whereas C4I directorate was handling cyber defensive missions. Rajeev Chauhan
  30. ISRAEL • Salient points:- – The cyber command will be in charge of both the buildup and operational missions. – DMIs working in cyber space in conjunction with conventional intelligence gathering missions has not contributed to overall operational effectiveness. – Synergy between DMIs intelligence gathering and offensive setup with various cyber units. – Reciprocal data gathering and dissemination amongst other branches. – Maximum operational cooperation and coordination between New Command and other IDF forces and units – Coordination with civilian agencies like National Cyber Bureau and Cyber Authority.Rajeev Chauhan
  31. IRAN • Since November 2010, an organization called “The Cyber Defense Command” has been operating in Iran under the supervision of the country’s “Passive Civil Defense Organization” a subdivision of the Joint Staff of Iranian Armed Forces. • According to a 2014 report by Institute for National Security Studies, Iran is "one of the most active players in the international cyber arena“. • In June 2010, Iran was the victim of a cyber attack when its nuclear facility in Natanz was infiltrated by the cyber- worm ‘Stuxnet’. Thereafter it has learnt a lot and developed a potent cyber warfare capabilities. Rajeev Chauhan
  32. RUSSIA • It has been claimed that Russian security services organized a number of denial of service attacks as a part of their Cyber-warfare against other countries, most notably – 2007 cyber attacks on Estonia – 2008 cyber attacks on South Ossetia, Georgia, and Azerbaijan. • The Russian government had been fostering and financing the Nashi youth organization for more than years. Nashi members were involved in the Estonia cyber attacks of 2007, Georgian govt websites in 2008 and targeted individual Georgian supporters in 2009 Rajeev Chauhan
  33. RUSSIA • Since 2010, Russia like the U.S., China and other countries has made dual use information security research and development a top priority at dozens of top research institutes and universities. • At least twelve institutes provide world-class instruction to their graduates in dual use information security and electronic warfare technologies, who are then hired by the Security Services and Ministry of Defense for offensive and defensive operations. Rajeev Chauhan
  34. NETHERLAND • In the Netherlands Cyber Defense is nationally coordinated by the National Cyber Security Center (NCSC). • The Dutch Ministry of Defense laid out a cyber strategy in 2011. • The first focus is to improve the cyber defense handled by the Joint IT branch (JIVC). • Joint Sigint Cyber Unit (JSCU) has been setup with an aim to improve intel operations in the Netherlands (including the military intel organization MIVD) • The Ministry of Defense has set up an offensive cyber force, called Defense Cyber Command (DCC) Rajeev Chauhan
  35. GERMANY • In 2013, Germany admitted the existence of their 60- person Computer Network Operation unit. • The German intelligence agency, BND, announced that his agency had observed up to five attacks a day on government authorities, thought mainly to originate in China. • After Edward Snowden leaked details of the U.S. National Security Agency's cyber surveillance system, Germany announced that the BND would be given an additional budget of 100 million Euros to increase their cyber surveillance capability. Rajeev Chauhan
  36. INDIA: Why? • Cyber Attacks affecting national infrastructure through – Sensitive information leaks….Confidentiality – Malicious programs effecting critical operations and applications like power, communication etc….. – Denial of Services, bringing down critical financial and banking infrastructure….effecting their Availability. • Attack on availability of CII is grave in nature as it has direct impact on national assets and their functioning. • All types of threats to be addressed in any National Cyberspace Protection Policies and Procedures. Rajeev Chauhan
  37. INDIA: Where do we stand? • Indian Cyberspace subjected to frequent attacks by China, Pakistan, US, UK, Bangladesh, Anonymous • Cyber Security Policies …implementation? • Agencies..CERT-IN, NTRO, NCCC(National Cyber Coord Committee), NATGRID, NCIIPC • Potent offensive capabilities • Capability to sustain • Disaster management and continuity plan • Robustness of CII Rajeev Chauhan
  38. • Chinese are focused…are we! • Offensive and Defensive capability…. Rajeev Chauhan
  39. Rajeev Chauhan
  40. References 1. http://strategicstudyindia.blogspot.in/2014/02/cyber-warfare-and- information-security.html 2. http://thediplomat.com/2015/04/chinas-growing-cyberwar-capabilities/ 3. http://bhconsulting.ie/securitywatch/?p=1739 4. http://www.bbc.co.uk/newsbeat/article/31074227/the-internet-is-the- new-frontline-as-uk-sets-up-army-cyber-unit 5. https://en.wikipedia.org/wiki/United_States_Cyber_Command 6. http://www.esecurityplanet.com/network-security/cyber-war-is- hell.html?utm_source=dlvr.it&utm_medium=twitter 7. Australian Defence Review. 8. http://jeffreycarr.blogspot.in/2014/03/russian-cyber-warfare-capabilities- in.html 9. http://www.infoplease.com/world/events/cyberwar-timeline.html Rajeev Chauhan