The Cyber Warfare Initiative the Good, the Bad, and the Ugly LiveSquare Security www.LiveSquare.com
Overview Cyber Warfare – hype?
Cyber what?
A recent example
The Players
Why Now? The Good
The Bad
The Ugly
What next?
Resources
Cyber Warfare - Hype? ” Moonlight Maze” - 1999 – attributed to Russia
” Titan Rain” - started 2003  Titan Rain hackers gained access to many U.S. computer networks, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA.  China.
Estonia – March 2007, Ukrain – November 2007
Lithuania – June 2008, Georgia – November 2008, Kyrgistan 2008
” GhostNet” – 2008 to present – China, KyLin OS (BSD or ???)
DOD, White House, Congress, Lockheed Martin (F35 fighter)
Dali Lama, Germany, France, India, Australia
Iran
The battle is fought every day.  If you run a network, and do not think you are being attacked...
Cyber What? Cyber Warfare Structured seeking / intercepting / manipulating / destroying of industrial, military, economic, and social data and information systems.
” Everyone is attacking everyone.”
Country vs. Country, Entity vs. Country, Entity vs. Entitiy, Entity vs. Individual Why? Money –  western and eastern countries have publically admitted that data gathered of industrial value is passed to domestic industries.  Acceleration. R & D efficiency, etc. - also a neat way to fund attackers and their toys. Money laundering.
Political / Military –  strategic asset identification.  Intelligence, Target optimization.  Economic pressure and articulation.  Revenge.  Combined kinetic and info attack to paralyze enemy, disinform, weaken, force them to expend resources.
Social –  why are you targeted?  Why did/does Isreal socially map US phone calls?  If you own a business, are in IT, or especially if you operate a security consulting practice why does your web site get visited daily by folks in China?  Why is Identity Theft so huge?  Do you facilitate money laundering?
Cyber war: What to do Disrupt communications – military, business, personal
Disrupt and mix up commercial / financial transactions Steal money – move it away, delete it Use combination of internal and external propaganda sources to confuse / scare population and disorient ”response” entities, limit international response
Cause enemy to expend resources and time on futile tasks
Create crisis of confidence in enemy's currency, leadership,  perceived stability, etc
Modify / Destroy information sources, infrastructure, systems – change reality / history
A Recent Example: Iran ” hacktivisim” Austin Heap – IT guy in SF giving people instructions on how to set-up proxies to defeat state based censorship, then gave how-to do that, then how-to attack Iran's government servers.  87 countries offer proxies.  Thousands of proxies.  Most blocked. Iran fights back and dDOS' his servers.
Twitter – stopped regular maintenance to aid coordination of dissent in Iran.  Aided by State Dept. and a few others.

CWFI Presentation Version 1

  • 1.
    The Cyber WarfareInitiative the Good, the Bad, and the Ugly LiveSquare Security www.LiveSquare.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
    Cyber Warfare -Hype? ” Moonlight Maze” - 1999 – attributed to Russia
  • 12.
    ” Titan Rain”- started 2003 Titan Rain hackers gained access to many U.S. computer networks, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA. China.
  • 13.
    Estonia – March2007, Ukrain – November 2007
  • 14.
    Lithuania – June2008, Georgia – November 2008, Kyrgistan 2008
  • 15.
    ” GhostNet” –2008 to present – China, KyLin OS (BSD or ???)
  • 16.
    DOD, White House,Congress, Lockheed Martin (F35 fighter)
  • 17.
    Dali Lama, Germany,France, India, Australia
  • 18.
  • 19.
    The battle isfought every day. If you run a network, and do not think you are being attacked...
  • 20.
    Cyber What? CyberWarfare Structured seeking / intercepting / manipulating / destroying of industrial, military, economic, and social data and information systems.
  • 21.
    ” Everyone isattacking everyone.”
  • 22.
    Country vs. Country,Entity vs. Country, Entity vs. Entitiy, Entity vs. Individual Why? Money – western and eastern countries have publically admitted that data gathered of industrial value is passed to domestic industries. Acceleration. R & D efficiency, etc. - also a neat way to fund attackers and their toys. Money laundering.
  • 23.
    Political / Military– strategic asset identification. Intelligence, Target optimization. Economic pressure and articulation. Revenge. Combined kinetic and info attack to paralyze enemy, disinform, weaken, force them to expend resources.
  • 24.
    Social – why are you targeted? Why did/does Isreal socially map US phone calls? If you own a business, are in IT, or especially if you operate a security consulting practice why does your web site get visited daily by folks in China? Why is Identity Theft so huge? Do you facilitate money laundering?
  • 25.
    Cyber war: Whatto do Disrupt communications – military, business, personal
  • 26.
    Disrupt and mixup commercial / financial transactions Steal money – move it away, delete it Use combination of internal and external propaganda sources to confuse / scare population and disorient ”response” entities, limit international response
  • 27.
    Cause enemy toexpend resources and time on futile tasks
  • 28.
    Create crisis ofconfidence in enemy's currency, leadership, perceived stability, etc
  • 29.
    Modify / Destroyinformation sources, infrastructure, systems – change reality / history
  • 30.
    A Recent Example:Iran ” hacktivisim” Austin Heap – IT guy in SF giving people instructions on how to set-up proxies to defeat state based censorship, then gave how-to do that, then how-to attack Iran's government servers. 87 countries offer proxies. Thousands of proxies. Most blocked. Iran fights back and dDOS' his servers.
  • 31.
    Twitter – stoppedregular maintenance to aid coordination of dissent in Iran. Aided by State Dept. and a few others.