SlideShare a Scribd company logo
1 of 35
Download to read offline
CHANGING
DOMAINS: THE
CYBER/INFO
REALM
Benjamin Ang (twitter.com/benjaminang)
Senior Fellow, Head Digital Impact Research,
Dy Head Centre of Excellence for National Security
RSIS, NTU
WHAT ARE THE DOMAINS?
LAND : Earth’s
surface ending at the
high-water mark and
overlapping with the
maritime domain in
the landward
segment of the
littorals.
SEA: The oceans,
seas, bays, estuaries,
islands, coastal
areas, and the
airspace above these,
including the littorals.
AIR: The atmosphere,
beginning at the
Earth’s surface,
extending to the
altitude where its
effects upon
operations become
negligible.
SPACE : The area
above the altitude
where atmospheric
effects on airborne
objects become
negligible.
DOD Dictionary of Military and Associated Terms, January 2021, Accessed May 17, 2021
from https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf?ver=2019-05-29-162249-290
CYBER DOMAIN • CYBERSPACE: A global domain
within the information
environment consisting of the
interdependent networks of
information technology
infrastructures and resident data,
including the Internet,
telecommunications networks,
computer systems, and
embedded processors and
controllers.
7/19/2023 Sample Footer Text 3
GOALS OF CYBER
AT TACKS: C, I, A
Confidentiality
Integrity
CIA Triad
Availability
Confidentiality
- Data breach (SingHealth)
- Trade secrets
Integrity
- Software (Solarwinds)
- Nuclear power plant
(Stuxnet)
Availability
- Ransomware or
wiperware (NotPetya)
- DDOS
CYBER INCIDENTS IN ASEAN
• Singapore, 2018
• SingHealth: 1.5 million patients' non-
medical personal data stolen, including PM
• Singapore, 2019
• 2,400 MINDEF/ SAF personnel, by phishing
ST Logistics (3rd party)
• Singapore, 2019
• 14,200 people diagnosed with HIV, taken by
ex-lover of a doctor with access
• Thailand and Vietnam
• Toyota customer data, no details given
• Malaysia, 2017
• 46.2 million mobile subscribers’ data
• Philippines, 2018
• 82,150 customers of Wendy’s
• Philippines, 2019
• 900,000 customers of pawnshop Cebuana
• Thailand, 2018
• 45,000 customers of True Corp mobile
• [source: CSO Online]
CYBER INCIDENTS IN ASEAN IN 2020
Palo Alto State of Cybersecurity Report ASEAN 2022
APTS AND TARGETS IN ASIA
APT Target countries Target entities
FunnyDream (C) Malaysia, Philippines, Thailand,
Vietnam
High-level government
organisations; political parties
Platinum Indonesia, Malaysia, Vietnam Diplomatic and government entities
Cycldek (C) Laos, Philippines, Thailand,
Vietnam
Government, defence, and energy
sectors
HoneyMyte Myanmar, Singapore, Vietnam Government organisations
Finspy Indonesia, Myanmar, Vietnam Individuals
PhantomLance Indonesia, Malaysia, Vietnam Entities
Zebrocy (R) Malaysia, Thailand Entities [source: Kaspersky]
Economic and
Geopolitical
intelligence
gathering
FIRELAND
PROBLEMS: AT TRIBUTION IS HARD
WATERLAND
(not aware)
AIRLAND
INFECTED
INFECTED
We’ve been
cyber-attacked!
Where did it come
from?
The malware
must have
come from
WATERLAND!
FIRELAND
PROBLEM: AT TRIBUTION IS HARD
WATERLAND
(not aware)
AIRLAND
INFECTED
INFECTED
WATERLAND, if you
attacked us, we will take
countermeasures
against you!
We’re
innocent!
Ha ha ha
(evil
laughter)
Source: Md Faizal, G Haciyakupoglu, J Yang, D Leong, YL Teo, B Ang, Countermeasures Against Foreign Interference, RSIS Policy Report
Definition
• Foreign interference
occurs when a
foreign entity (state
or non-state actor),
• with hostile intent,
• takes actions to
deliberately,
covertly and
deceptively
• disrupt the politics
and policies of the
target state
RSIS FRAMEWORK OF INFORMATION,
INFLUENCE, AND INTERFERENCE
RISKS OF FOREIGN
INTERFERENCE:
POLITICAL LEADERS
RISKS OF FOREIGN INTERFERENCE:
RELIGIOUS LEADERS
RISKS OF FALSE INFORMATION:
NARRATIVES THAT DAMAGE COHESION
• “Putin is the man”, “Ukraine war was
US/NATO’s fault”, “US has secret bio-labs
in Ukraine that started pandemic”
• Anti-vax conspiracy theories
e.g., “vaccines contain graphene oxide, are
for population culling / implanting 5G chips
/ Plandemic”
• QAnon – “a cabal of Satanic, cannibalistic
child molesters are operating a global child
sex trafficking ring”
• Gender issues – “LGBTQ activists are
coming for your children”
WHAT LESSONS CAN
WE LEARN FROM
RECENT CYBER/INFO
DOMAIN CONFLICT?
CASE STUDY: RUSSIA V UKRAINE
• Source: Fog of war: how the Ukraine conflict transformed the cyber threat landscape, published
by Google TAG (Threat Analysis Group)
• Overview
• 1. Russian government-backed attackers have engaged in an aggressive, multi-pronged effort to
gain a decisive wartime advantage in cyberspace, often with mixed results.
• 2. Moscow has leveraged the full spectrum of IO – from overt state-backed media to covert
platforms and accounts – to shape public perception of the war.
• 3. The invasion has triggered a notable shift in the Eastern European cybercriminal ecosystem
that will likely have long term implications for both coordination between criminal groups and
the scale of cybercrime worldwide.
1. MULTI-
PRONG CYBER
TACTICS
• Russian government-
backed attackers have
engaged in an aggressive,
multi-pronged effort to
gain a decisive wartime
advantage in cyberspace,
often with mixed results.
7/19/2023 16
MULTI-TACTIC
AND TARGET
• Spear phishing (targeted emails) up 250% in Ukraine,
up 300% in NATO countries in 2022
• Destructive attacks on gov / mil / critical
• Hack and leak (of sensitive info)
• Android apps pretending to be DDOS weapons
7/19/2023 Sample Footer Text 17
MULTI TACTIC
AND TARGET
Media: To plant false information
Energy provider, shipping and trains: To disrupt
Drone manufacturer: To disable weapons
7/19/2023 18
MULTI COUNTRY
Targets included think tanks,
nuclear research labs, NGOs
7/19/2023 19
MULTI-PHASE TIMELINE
2019 – JAN
2022
• Cyber
espionage +
Pre-
positioning
FEB – APR 2022
• Destructive
ops (wipers)
+ Military
invasion
MAY – JUL 2022
• Sustained
targeting
(wipers)
AUG – SEP 2022
• Maintaining
footholds
OCT – DEC 2022
• Renewed
destructive
attacks
(ransomware,
wipers)
7/19/2023 20
Attackers need months
to setup access before
launch attacks, then
they lose access
WHAT LESSONS CAN WE LEARN ABOUT THE
CYBER DOMAIN?
2. FULL SPECTRUM
INFORMATION
OPERATIONS
• Moscow has leveraged the
full spectrum of IO – from
overt state-backed media
to covert platforms and
accounts – to shape public
perception of the war
1. Undermine the Ukrainian
government
2. Fracture international
support for Ukraine; and
3. Maintain domestic
support in Russia for the
war.
7/19/2023 22
> 1,950 CASES
DISRUP TED
TYPES OF INFO OPS
Russian IO focused
on domestic
audiences
• Spikes before
military activity
• Narrative of
“De-Nazification”
IO actors using
overt and covert
methods
• Fake accounts,
news sites,
YouTube
• Telegram groups
• Duplicate sites
Resurgence of
hacktivists
• Linked to Russian
intelligence
PROPAGANDA
DEEPFAKES
CYBER CRIMINALS
INVOLVED
Ransomware gangs leaked Personal
Identification Information (PII) of soldiers
and government officials
7/19/2023 27
WHAT LESSONS CAN WE LEARN ABOUT THE
INFORMATION DOMAIN?
DEFENDING THE CYBER/INFO DOMAIN
• Sources: Defending Ukraine: Early Lessons from
the Cyber War (Microsoft)*
1. Defense against a military invasion now
requires for most countries the ability to
disburse and distribute digital operations and
data assets across borders and into other
countries.
2. Recent advances in cyber threat intelligence
and end-point protection have helped Ukraine
withstand a high percentage of destructive
Russian cyberattacks.
3. As a coalition of countries has come together
to defend Ukraine, Russian intelligence
agencies have stepped up network penetration
and espionage activities targeting allied
governments outside Ukraine.
4. In coordination with these other cyber
activities, Russian agencies are conducting
global cyber-influence operations to support
their war efforts.
5. This calls for a coordinated and
comprehensive strategy to strengthen
defenses against the full range of cyber
destructive, espionage, and influence
operations.
DEFENCE LESSONS, IN DEPTH
Distribute digital
ops and assets
globally
• Attackers bombed
data centres
Good defences can
stop cyberattacks
• Cyber threat
intelligence
• Connected end-point
protection
Allies also need
defence
• NATO countries
• Denmark, Norway,
Finland, Sweden,
Turkey
DEFENCE LESSONS, IN DEPTH
New tools are
needed to stop IO
• AI, new analytics
tools, data sets, and
experts to track and
forecast
Coordinated
response needed
• Governments
• Tech companies
• Civil society
• Academia
PUT TING
STRONTIUM IN
A SINKHOLE
The Strontium group was
targeting Ukrainian institutions,
media organizations, and
government institutions and think
tanks in the United States and the
European Union
Microsoft got court orders 16
times to redirect internet traffic
from Strontium domains into a
‘sinkhole’
7/19/2023 Sample Footer Text 32
MSN, META, TIKTOK BLOCK SPUTNIK
DEFENDING FROM INFO OPS
• Public coverage and exposure
• Clear counter-messages
• Legislation
• Build media and digital literacy
• Work with citizens, influencers
• Detect and expose fake accounts
Active measures
• Work strategically, not reactively
• Build a strong narrative that is more
attractive than the adversary
WHAT LESSONS CAN WE LEARN ABOUT
DEFENDING THE CYBER/INFO DOMAIN?

More Related Content

Similar to Changing Domains - The Cyber Info Realm 2023.pdf

Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copysmita mitra
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docxjessiehampson
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveIvan Sang
 

Similar to Changing Domains - The Cyber Info Realm 2023.pdf (20)

Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
YiR2022-External-Final.pdf
YiR2022-External-Final.pdfYiR2022-External-Final.pdf
YiR2022-External-Final.pdf
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
The red book
The red book  The red book
The red book
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docx
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 

More from Benjamin Ang

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...Benjamin Ang
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Benjamin Ang
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfBenjamin Ang
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfBenjamin Ang
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Benjamin Ang
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfBenjamin Ang
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfBenjamin Ang
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Benjamin Ang
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesBenjamin Ang
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Benjamin Ang
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic viewBenjamin Ang
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Benjamin Ang
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...Benjamin Ang
 

More from Benjamin Ang (20)

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdf
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...
 

Recently uploaded

Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 

Recently uploaded (20)

Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 

Changing Domains - The Cyber Info Realm 2023.pdf

  • 1. CHANGING DOMAINS: THE CYBER/INFO REALM Benjamin Ang (twitter.com/benjaminang) Senior Fellow, Head Digital Impact Research, Dy Head Centre of Excellence for National Security RSIS, NTU
  • 2. WHAT ARE THE DOMAINS? LAND : Earth’s surface ending at the high-water mark and overlapping with the maritime domain in the landward segment of the littorals. SEA: The oceans, seas, bays, estuaries, islands, coastal areas, and the airspace above these, including the littorals. AIR: The atmosphere, beginning at the Earth’s surface, extending to the altitude where its effects upon operations become negligible. SPACE : The area above the altitude where atmospheric effects on airborne objects become negligible. DOD Dictionary of Military and Associated Terms, January 2021, Accessed May 17, 2021 from https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf?ver=2019-05-29-162249-290
  • 3. CYBER DOMAIN • CYBERSPACE: A global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. 7/19/2023 Sample Footer Text 3
  • 4. GOALS OF CYBER AT TACKS: C, I, A Confidentiality Integrity CIA Triad Availability Confidentiality - Data breach (SingHealth) - Trade secrets Integrity - Software (Solarwinds) - Nuclear power plant (Stuxnet) Availability - Ransomware or wiperware (NotPetya) - DDOS
  • 5. CYBER INCIDENTS IN ASEAN • Singapore, 2018 • SingHealth: 1.5 million patients' non- medical personal data stolen, including PM • Singapore, 2019 • 2,400 MINDEF/ SAF personnel, by phishing ST Logistics (3rd party) • Singapore, 2019 • 14,200 people diagnosed with HIV, taken by ex-lover of a doctor with access • Thailand and Vietnam • Toyota customer data, no details given • Malaysia, 2017 • 46.2 million mobile subscribers’ data • Philippines, 2018 • 82,150 customers of Wendy’s • Philippines, 2019 • 900,000 customers of pawnshop Cebuana • Thailand, 2018 • 45,000 customers of True Corp mobile • [source: CSO Online]
  • 6. CYBER INCIDENTS IN ASEAN IN 2020 Palo Alto State of Cybersecurity Report ASEAN 2022
  • 7. APTS AND TARGETS IN ASIA APT Target countries Target entities FunnyDream (C) Malaysia, Philippines, Thailand, Vietnam High-level government organisations; political parties Platinum Indonesia, Malaysia, Vietnam Diplomatic and government entities Cycldek (C) Laos, Philippines, Thailand, Vietnam Government, defence, and energy sectors HoneyMyte Myanmar, Singapore, Vietnam Government organisations Finspy Indonesia, Myanmar, Vietnam Individuals PhantomLance Indonesia, Malaysia, Vietnam Entities Zebrocy (R) Malaysia, Thailand Entities [source: Kaspersky] Economic and Geopolitical intelligence gathering
  • 8. FIRELAND PROBLEMS: AT TRIBUTION IS HARD WATERLAND (not aware) AIRLAND INFECTED INFECTED We’ve been cyber-attacked! Where did it come from? The malware must have come from WATERLAND!
  • 9. FIRELAND PROBLEM: AT TRIBUTION IS HARD WATERLAND (not aware) AIRLAND INFECTED INFECTED WATERLAND, if you attacked us, we will take countermeasures against you! We’re innocent! Ha ha ha (evil laughter)
  • 10. Source: Md Faizal, G Haciyakupoglu, J Yang, D Leong, YL Teo, B Ang, Countermeasures Against Foreign Interference, RSIS Policy Report Definition • Foreign interference occurs when a foreign entity (state or non-state actor), • with hostile intent, • takes actions to deliberately, covertly and deceptively • disrupt the politics and policies of the target state RSIS FRAMEWORK OF INFORMATION, INFLUENCE, AND INTERFERENCE
  • 12. RISKS OF FOREIGN INTERFERENCE: RELIGIOUS LEADERS
  • 13. RISKS OF FALSE INFORMATION: NARRATIVES THAT DAMAGE COHESION • “Putin is the man”, “Ukraine war was US/NATO’s fault”, “US has secret bio-labs in Ukraine that started pandemic” • Anti-vax conspiracy theories e.g., “vaccines contain graphene oxide, are for population culling / implanting 5G chips / Plandemic” • QAnon – “a cabal of Satanic, cannibalistic child molesters are operating a global child sex trafficking ring” • Gender issues – “LGBTQ activists are coming for your children”
  • 14. WHAT LESSONS CAN WE LEARN FROM RECENT CYBER/INFO DOMAIN CONFLICT?
  • 15. CASE STUDY: RUSSIA V UKRAINE • Source: Fog of war: how the Ukraine conflict transformed the cyber threat landscape, published by Google TAG (Threat Analysis Group) • Overview • 1. Russian government-backed attackers have engaged in an aggressive, multi-pronged effort to gain a decisive wartime advantage in cyberspace, often with mixed results. • 2. Moscow has leveraged the full spectrum of IO – from overt state-backed media to covert platforms and accounts – to shape public perception of the war. • 3. The invasion has triggered a notable shift in the Eastern European cybercriminal ecosystem that will likely have long term implications for both coordination between criminal groups and the scale of cybercrime worldwide.
  • 16. 1. MULTI- PRONG CYBER TACTICS • Russian government- backed attackers have engaged in an aggressive, multi-pronged effort to gain a decisive wartime advantage in cyberspace, often with mixed results. 7/19/2023 16
  • 17. MULTI-TACTIC AND TARGET • Spear phishing (targeted emails) up 250% in Ukraine, up 300% in NATO countries in 2022 • Destructive attacks on gov / mil / critical • Hack and leak (of sensitive info) • Android apps pretending to be DDOS weapons 7/19/2023 Sample Footer Text 17
  • 18. MULTI TACTIC AND TARGET Media: To plant false information Energy provider, shipping and trains: To disrupt Drone manufacturer: To disable weapons 7/19/2023 18
  • 19. MULTI COUNTRY Targets included think tanks, nuclear research labs, NGOs 7/19/2023 19
  • 20. MULTI-PHASE TIMELINE 2019 – JAN 2022 • Cyber espionage + Pre- positioning FEB – APR 2022 • Destructive ops (wipers) + Military invasion MAY – JUL 2022 • Sustained targeting (wipers) AUG – SEP 2022 • Maintaining footholds OCT – DEC 2022 • Renewed destructive attacks (ransomware, wipers) 7/19/2023 20 Attackers need months to setup access before launch attacks, then they lose access
  • 21. WHAT LESSONS CAN WE LEARN ABOUT THE CYBER DOMAIN?
  • 22. 2. FULL SPECTRUM INFORMATION OPERATIONS • Moscow has leveraged the full spectrum of IO – from overt state-backed media to covert platforms and accounts – to shape public perception of the war 1. Undermine the Ukrainian government 2. Fracture international support for Ukraine; and 3. Maintain domestic support in Russia for the war. 7/19/2023 22
  • 24. TYPES OF INFO OPS Russian IO focused on domestic audiences • Spikes before military activity • Narrative of “De-Nazification” IO actors using overt and covert methods • Fake accounts, news sites, YouTube • Telegram groups • Duplicate sites Resurgence of hacktivists • Linked to Russian intelligence
  • 27. CYBER CRIMINALS INVOLVED Ransomware gangs leaked Personal Identification Information (PII) of soldiers and government officials 7/19/2023 27
  • 28. WHAT LESSONS CAN WE LEARN ABOUT THE INFORMATION DOMAIN?
  • 29. DEFENDING THE CYBER/INFO DOMAIN • Sources: Defending Ukraine: Early Lessons from the Cyber War (Microsoft)* 1. Defense against a military invasion now requires for most countries the ability to disburse and distribute digital operations and data assets across borders and into other countries. 2. Recent advances in cyber threat intelligence and end-point protection have helped Ukraine withstand a high percentage of destructive Russian cyberattacks. 3. As a coalition of countries has come together to defend Ukraine, Russian intelligence agencies have stepped up network penetration and espionage activities targeting allied governments outside Ukraine. 4. In coordination with these other cyber activities, Russian agencies are conducting global cyber-influence operations to support their war efforts. 5. This calls for a coordinated and comprehensive strategy to strengthen defenses against the full range of cyber destructive, espionage, and influence operations.
  • 30. DEFENCE LESSONS, IN DEPTH Distribute digital ops and assets globally • Attackers bombed data centres Good defences can stop cyberattacks • Cyber threat intelligence • Connected end-point protection Allies also need defence • NATO countries • Denmark, Norway, Finland, Sweden, Turkey
  • 31. DEFENCE LESSONS, IN DEPTH New tools are needed to stop IO • AI, new analytics tools, data sets, and experts to track and forecast Coordinated response needed • Governments • Tech companies • Civil society • Academia
  • 32. PUT TING STRONTIUM IN A SINKHOLE The Strontium group was targeting Ukrainian institutions, media organizations, and government institutions and think tanks in the United States and the European Union Microsoft got court orders 16 times to redirect internet traffic from Strontium domains into a ‘sinkhole’ 7/19/2023 Sample Footer Text 32
  • 33. MSN, META, TIKTOK BLOCK SPUTNIK
  • 34. DEFENDING FROM INFO OPS • Public coverage and exposure • Clear counter-messages • Legislation • Build media and digital literacy • Work with citizens, influencers • Detect and expose fake accounts Active measures • Work strategically, not reactively • Build a strong narrative that is more attractive than the adversary
  • 35. WHAT LESSONS CAN WE LEARN ABOUT DEFENDING THE CYBER/INFO DOMAIN?