The document discusses the history of space exploration and satellites, as well as cybersecurity issues. It describes the space race between the US and Soviet Union in the 1950s-60s to launch early satellites and put humans in space. It then discusses different types of satellites and their uses today. The document also examines cyber threats like viruses, worms and hacking, and how these can enable cybercrime and terrorism. It analyzes specific viruses like Stuxnet, Duqu and Flame, and calls for international cooperation to address these growing cyber threats.
There are some not well known risks associated with the program of SETI—the Search for Extra-Terrestrial Intelligence. One of them is the scenario of possible vulnerability from downloading hostile AI with “virus-style” behavior. The proportion of dangerous ET-signals to harmless ones can be dangerously high because of selection effects and evolutionary pressure.
Alexey Turchin was born in Moscow, Russia in 1973. Alexey studied Physics and Art History at Moscow State University and actively participated in the Russian Transhumanist Movement. He has translated many foreign Transhumanist works into Russian, including N. Bostrom and E.Yudkowsky. He is an expert in Global Risks and wrote the book “Structure of the Global Catastrophe: Risks of Human Extinction in the XXI Century,” as well as several articles on the topic. Since 2010, he has worked at Science Longer Life where he is writing a book on futurology.
Risks of program of passive search of extraterrestrial intelligenceavturchin
Downloading description of Alien AI and building it on Earth is existential risks. It depends of distribution of ET in the Universe, speed of space travel and probability of true AI.
There are some not well known risks associated with the program of SETI—the Search for Extra-Terrestrial Intelligence. One of them is the scenario of possible vulnerability from downloading hostile AI with “virus-style” behavior. The proportion of dangerous ET-signals to harmless ones can be dangerously high because of selection effects and evolutionary pressure.
Alexey Turchin was born in Moscow, Russia in 1973. Alexey studied Physics and Art History at Moscow State University and actively participated in the Russian Transhumanist Movement. He has translated many foreign Transhumanist works into Russian, including N. Bostrom and E.Yudkowsky. He is an expert in Global Risks and wrote the book “Structure of the Global Catastrophe: Risks of Human Extinction in the XXI Century,” as well as several articles on the topic. Since 2010, he has worked at Science Longer Life where he is writing a book on futurology.
Risks of program of passive search of extraterrestrial intelligenceavturchin
Downloading description of Alien AI and building it on Earth is existential risks. It depends of distribution of ET in the Universe, speed of space travel and probability of true AI.
A free software implementation of second-generation onion routing that help the user to be anonymous while using the internet so it protect the user’s privacy from being monitored
Some people use it in the wrong way which lead to what is called now “The Darknet” : A black spot in the internet which involve all the criminal activities on the internet such as selling Drugs, fraud, copyright infringement and piracy and so on.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docxtidwellveronique
Cathy Dillon wrote:
1. njRAT targeted Middle East high-level organizations, particularly the government, telecom, and energy sectors. It has the capability to completely take over a victim’s system including: steal browser data, log keystrokes, activate webcams, manipulate registry, etc. njRAT can be spread through the use of USB drives and embedded applications. The executable file named “’authorization.exe” has been embedded using Microsoft Word or PDF files and sent as email attachments to victims. The attack appeared to have originated in Vietnam and the U.K. based on IP addresses although attackers could have spoofed systems originating from these countries to hide their true identity and location (Walker, 2013).
Attackers used obfuscation to avoid detection of the njRAT (Walker, 2013). It was determined that antivirus programs were not set to detect such a threat (General Dynamics, 2013) although these programs provide only limited protection and can only detect known Trojans (GFI, 2011). One method that can be used to detect njRAT since it used obfuscation to avoid detection is SAFE. SAFE is a “static analyzer for executables that detects malicious patterns in executables and is resilient to common obfuscation transformations” (Christodorescu & Jha, 2003). For an effective method of detecting and preventing RAT attacks, “reliable and powerful anti-virus software” that has the latest and up-to-date upgrades should be used. Using anti-spyware application and firewall can also help in detection and prevention of this type of attack (Paine, 2012).
2. Kelly Ann Reisenweber wrote“
To obfuscate is “to make so confused or opaque as to be difficult to perceive or understand” and obfuscation is “the act or an instance of making something obscure, dark, or difficult to understand” (Farlex, 2013). This definition clearly shows a concerted effort to conceal, and in the same instance, to make something difficult to define. Christodorescu and Jha make a straight, forward thinking analogy when they describe malicious code detection as an obfuscation-deobfuscation game in their paper, Static Analysis of Executables to Detect Malicious Patterns.
It is a game in every sense of the word since there is a volley back in forth between two key players: the malicious hackers who work to conceal the payload by hiding it and the security researchers who work to detect specific instances of the malicious code and define the differing versions in an effort to prevent the advancement of the hackers win, thereby ultimately preventing the malicious hacker from reaping the benefits of whatever the malware is designed to do. The deobfucators, the security researchers, job is to determine what the code is affecting, how it is damaging the infected system(s), how to contain it it if is spreading throughout the network and to define the variant specifically enough to update the anti-virus solutions with the new code variation and prevent future use. More simply p ...
Security of WhatsApp 1 Christophe Bassono Su.docxjeffreye3
Security of WhatsApp 1
Christophe Bassono
Summer: Cryptography
Project Proposal
5/21/19
Security of WhatsApp
WhatsApp is an extremely popular mobile messaging service which has over one billion users.
The new feature has been introduced by WhatsApp that messages are the end to end encrypted
which means that no third party can read or hack our messages. Conversation remains between
sender and receiver no one is able to hack other private messages. The photos we send to each
other also end to end encrypted which can only be seen by sender and receiver. WhatsApp now
secures every single call, message, picture, and video we send to others are totally encrypted. It's
mean no third party like police, hackers, and governments can read the messages. Not even
WhatsApp have access to messages, calls, and videos. Super technology has been used to protect
the application. Today WhatsApp has become compulsory in daily life, everyone is using
WhatsApp to share messages and pictures. It has become important in study related works. But in
many countries agencies require to have access to messages and calls to uncover terrorists’ illegal
activities. Agencies can be given the code to have access to messages and calls. WhatsApp has
made easy to connect it with computers which requires a password and code scanning process
every device has its own code no other person can hack it. So it means our messages and phone
calls are the end to end encrypted. WhatsApp also uses part of a security protocol developed by
Open Whisper Systems, a company that owns a fully secure messaging app signal and it’s very
good.
WhatsApp architecture is in good scalability. The Server is designed in Erlang, Code is pushed
every day, SSL socket has been used as the protocol to the WhatsApp pools, double authentication
system has been used to login and technology of system health has been implemented to support
message queue length as users are increasing every day.
The uniqueness of this project stems from the fact that WhatsApp's objective, in accordance with
the proposed project, goes beyond where it has been most used. As previously mentioned,
WhatsApp technology has been applied in the context of crypto-messaging, and very minimal
explorations have been performed outside this practice area. As such, the proposed research will
provide more knowledge on how this WhatsApp approach can be used to protect other messaging
applications and those exposed to the same security threats.
In addition to providing critical information to the researcher and answering the underlying
research questions to achieve the objectives set, the results will be essential for others. To begin
with, the research will be of crucial use to potential users, students and programmers because the
timestamp function can help to evaluate the timing of the encryption used in the messaging
application. This implies that.
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...Maurice Dawson
After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among governments, and how it can affect the freedom, democracy and/or peace. Research has been carried out for the creation of the necessary tools for the countermeasures to all this surveillance. One of the more powerful tools is the Tails system as a complement of The Onion Router (TOR). Even though there are limitations and flaws, the progress has been significant and we are moving in the right direction.
The top sources of virus attacks are highlighted below: Downloadable Programs Cracked Software Email Attachments Internet Booting From CD. 10. Best antivirus software. Norton antivirus. MacAfee virus scan Kaspersky antivirus. 11. Norton antivirus Norton antivirus is a product of Symantec corporation.The top sources of virus attacks are highlighted below: Downloadable Programs Cracked Software Email Attachments Internet Booting From CD. 10. Best antivirus software. Norton antivirus. MacAfee virus scan Kaspersky antivirus. 11. Norton antivirus Norton antivirus is a product of Symantec corporation.
A computer virus is a type of malicious software, or malware, that spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage.
A free software implementation of second-generation onion routing that help the user to be anonymous while using the internet so it protect the user’s privacy from being monitored
Some people use it in the wrong way which lead to what is called now “The Darknet” : A black spot in the internet which involve all the criminal activities on the internet such as selling Drugs, fraud, copyright infringement and piracy and so on.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docxtidwellveronique
Cathy Dillon wrote:
1. njRAT targeted Middle East high-level organizations, particularly the government, telecom, and energy sectors. It has the capability to completely take over a victim’s system including: steal browser data, log keystrokes, activate webcams, manipulate registry, etc. njRAT can be spread through the use of USB drives and embedded applications. The executable file named “’authorization.exe” has been embedded using Microsoft Word or PDF files and sent as email attachments to victims. The attack appeared to have originated in Vietnam and the U.K. based on IP addresses although attackers could have spoofed systems originating from these countries to hide their true identity and location (Walker, 2013).
Attackers used obfuscation to avoid detection of the njRAT (Walker, 2013). It was determined that antivirus programs were not set to detect such a threat (General Dynamics, 2013) although these programs provide only limited protection and can only detect known Trojans (GFI, 2011). One method that can be used to detect njRAT since it used obfuscation to avoid detection is SAFE. SAFE is a “static analyzer for executables that detects malicious patterns in executables and is resilient to common obfuscation transformations” (Christodorescu & Jha, 2003). For an effective method of detecting and preventing RAT attacks, “reliable and powerful anti-virus software” that has the latest and up-to-date upgrades should be used. Using anti-spyware application and firewall can also help in detection and prevention of this type of attack (Paine, 2012).
2. Kelly Ann Reisenweber wrote“
To obfuscate is “to make so confused or opaque as to be difficult to perceive or understand” and obfuscation is “the act or an instance of making something obscure, dark, or difficult to understand” (Farlex, 2013). This definition clearly shows a concerted effort to conceal, and in the same instance, to make something difficult to define. Christodorescu and Jha make a straight, forward thinking analogy when they describe malicious code detection as an obfuscation-deobfuscation game in their paper, Static Analysis of Executables to Detect Malicious Patterns.
It is a game in every sense of the word since there is a volley back in forth between two key players: the malicious hackers who work to conceal the payload by hiding it and the security researchers who work to detect specific instances of the malicious code and define the differing versions in an effort to prevent the advancement of the hackers win, thereby ultimately preventing the malicious hacker from reaping the benefits of whatever the malware is designed to do. The deobfucators, the security researchers, job is to determine what the code is affecting, how it is damaging the infected system(s), how to contain it it if is spreading throughout the network and to define the variant specifically enough to update the anti-virus solutions with the new code variation and prevent future use. More simply p ...
Security of WhatsApp 1 Christophe Bassono Su.docxjeffreye3
Security of WhatsApp 1
Christophe Bassono
Summer: Cryptography
Project Proposal
5/21/19
Security of WhatsApp
WhatsApp is an extremely popular mobile messaging service which has over one billion users.
The new feature has been introduced by WhatsApp that messages are the end to end encrypted
which means that no third party can read or hack our messages. Conversation remains between
sender and receiver no one is able to hack other private messages. The photos we send to each
other also end to end encrypted which can only be seen by sender and receiver. WhatsApp now
secures every single call, message, picture, and video we send to others are totally encrypted. It's
mean no third party like police, hackers, and governments can read the messages. Not even
WhatsApp have access to messages, calls, and videos. Super technology has been used to protect
the application. Today WhatsApp has become compulsory in daily life, everyone is using
WhatsApp to share messages and pictures. It has become important in study related works. But in
many countries agencies require to have access to messages and calls to uncover terrorists’ illegal
activities. Agencies can be given the code to have access to messages and calls. WhatsApp has
made easy to connect it with computers which requires a password and code scanning process
every device has its own code no other person can hack it. So it means our messages and phone
calls are the end to end encrypted. WhatsApp also uses part of a security protocol developed by
Open Whisper Systems, a company that owns a fully secure messaging app signal and it’s very
good.
WhatsApp architecture is in good scalability. The Server is designed in Erlang, Code is pushed
every day, SSL socket has been used as the protocol to the WhatsApp pools, double authentication
system has been used to login and technology of system health has been implemented to support
message queue length as users are increasing every day.
The uniqueness of this project stems from the fact that WhatsApp's objective, in accordance with
the proposed project, goes beyond where it has been most used. As previously mentioned,
WhatsApp technology has been applied in the context of crypto-messaging, and very minimal
explorations have been performed outside this practice area. As such, the proposed research will
provide more knowledge on how this WhatsApp approach can be used to protect other messaging
applications and those exposed to the same security threats.
In addition to providing critical information to the researcher and answering the underlying
research questions to achieve the objectives set, the results will be essential for others. To begin
with, the research will be of crucial use to potential users, students and programmers because the
timestamp function can help to evaluate the timing of the encryption used in the messaging
application. This implies that.
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...Maurice Dawson
After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among governments, and how it can affect the freedom, democracy and/or peace. Research has been carried out for the creation of the necessary tools for the countermeasures to all this surveillance. One of the more powerful tools is the Tails system as a complement of The Onion Router (TOR). Even though there are limitations and flaws, the progress has been significant and we are moving in the right direction.
The top sources of virus attacks are highlighted below: Downloadable Programs Cracked Software Email Attachments Internet Booting From CD. 10. Best antivirus software. Norton antivirus. MacAfee virus scan Kaspersky antivirus. 11. Norton antivirus Norton antivirus is a product of Symantec corporation.The top sources of virus attacks are highlighted below: Downloadable Programs Cracked Software Email Attachments Internet Booting From CD. 10. Best antivirus software. Norton antivirus. MacAfee virus scan Kaspersky antivirus. 11. Norton antivirus Norton antivirus is a product of Symantec corporation.
A computer virus is a type of malicious software, or malware, that spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Intl502.cyberspace, cyber warfare
1. WK 5: SPACE AND CYBERSPACE COLLECTION
Tracey Percifield
INTL502 B004 Sum 12
08/01/2012
Space and Cyberspace
The Soviet Union and the United States were in the race to put the first satellites into orbit, make
the first rockets that could enter into outer space and put the first man on the moon. At the end of
the War World II a German Rocket Scientist named Wernher von Braun and his group of
researchers surrendered to the United States and claimed asylum and became citizens (NASA,
2007). A Jet Propulsion Laboratory opened in Pasadena, California where they begin to work.
They created the first Space Craft, “Bumper WAC” which launched on 24 February 1949 and
reached an altitude of two hundred forty-four feet before crashing back to earth. On 4 October
1957, the Soviet’s successfully launched a satellite called Sputnik I into space that orbited earth
and on 3 November 1957 the Soviet’s launch Sputnik II, (a larger scale of Sputnik I) in which
they loaded onto the satellite craft the first passenger of space; Laika, a dog that was successfully
orbit the earth (NASA, 2007).Explorer I was successfully launched on 31 January 1958 and used
batteries which ended its life on 23 May 1958 and floated around until it started to fall back to
earth. On 31 March 1970 re-entered earth and burned up into the atmosphere. The United States
Navy was successful on 17 March 1958 in launching Vanguard I into space and still remains the
oldest man-made object in space history today (NASA, 2007).
Satellite, by all definitions is anything that is in space and orbits, so therefore, anything orbiting
around a stationary planet is considered a satellite. In aerospace and space exploration a satellite
is a mad-made object that is put up into space to orbit any celestial body. Satellites break down
into categories for the information gathering and provide detail imaging and signal relays. The
biggest satellite that everyone uses, civilian and military are the NAVSTAR GPS Satellite. This
satellite is capable of multi-tasking (US Naval Observation, 2012). It sends and relays signals
with data capabilities of either Standard Positioning Service (SPS) or Precise Positioning Service
(PPS), the unique thing about this satellite, is that it was created by the Department of Defense
and is a military satellite; however, civilians use this satellite more than military does. The
difference between SPS and PPS is the codes, the codes are distinguished from military or
government use verses general codes or SPS that everyone else in the world uses (US Naval
Observation, 2012).
Cyberspace, or the new frontier to terrorist and the circuit of crime, the criminal’s choice of
weapon. Every day millions of individuals all over the world send and receive all different types
of information. In this information individuals do not realize what they are sending contains in
some forms their identity, their personal information and if they understood how sensitive of an
area, maybe they wouldn’t play the internet games. Games can be a hosting site for sucking up
your information, it is a place that is manipulative if you know the language and
1
2. WK 5: SPACE AND CYBERSPACE COLLECTION
knowprogrammable software and how it all relates to cyberspace or the internet than you can
manipulate other software and write programmable viruses or worms. Viruses, Worms and
Trojan Horses are all different and many people do not understand the difference, let alone what
they actually do and are capable of. Viruses are spread through executable files or programs and
attach themselves until you give the human action of opening the attached virus and running it,
most do this and have no idea they have just infected their computer in some way and have
passed it onto other computers waiting and sitting there for you to open the email, or click on a
link (Symantec, 2009). A Worm is much like a virus, except with one exception; it doesn’t need
you to transport it. A Worm can transport itself through programs and replicates itself, for
instance, it can attach and send out emails through your whole and complete email address book
and once it does this it spreads itself and replicates itself more through an entire network till it
reaches servers causing many problems (Symantec, 2009). Finally, Trojan Horsesdo not
reproduce and spread, however, they mimic a program and as the old mythical Trojan Horse,
they make you believe they are friendly and authentic, however, they are not. Instead, once open
they can destroy some of your information or put icons or send out your personal information
back to a host or for criminals to gain access to it. There is a blended blend of Viruses and
Worms which are high tech and create a hole in defense systems and many other systems
(Symantec, 2009).
Understanding the boundaries of the wide world global technology of Cyberspace, understanding
the three most horrible viruses will give you an understanding of Cyber Warfare and the next
generation of Cyber Weaponry.
The International Telecommunication Union is part of the United Nations and located in Geneva,
Switzerland and is responsible for all communication and information technologies and serves as
a buffer between member state countries which consists of one hundred ninety three country
member states. The International Telecommunication Union (ITU) shares ideas in knowledge
and technology in fields of; aeronautical and maritime navigation, radio astronomy, satellite-
based meteorology,broadband Internet, latest-generation wireless technologies, convergence in
fixed-mobile phone, internet access, data, voice, TV broadcasting, next-generation networks and
probably the most important is, terrorism that results from Cyberspace in regards to viruses,
worms, and breaches in security. ITU also helps member states understand the process of Cyber
Terrorism, Cyber Espionage and Cyber Crime in the Virtual World of Cyberspace. The diagram
below shows the course of Cyber Terrorism and how it works and how it is transmitted:
2
3. WK 5: SPACE AND CYBERSPACE COLLECTION
(Gercke, 2011). Understanding how Cyber Terrorism and Cyber Crime occurs helps to
understand the viruses and worms that look for loop holes within programs or weaknesses and
infiltrate through firewalls and other helper programs and/or software and attaches itself to the
main program. When these viruses and/or worms attach itself it can do several damaging things.
If you look by incident reporting and we take the three viruses; Stuxnet, Duqu and Flame and we
examine by incidents and the effects they had on breaches with securities and infiltrating
programmable systems we can determine the impact they have had and the issues and problems
that they have caused (Gercke, 2011).Stuxnet was discovered in June of 2010 and attacks the
Microsoft Windows program and targeted Siemens Industrial software programs. It was one of
the first Malware that specifically spies and subverts industrial systems and also, included a
programmable logic controller or what is known as a “rootkit”, meaning that this sophisticated
worm mimics the program and seeks out to copy information going virtually undetected from
administrators. The next worm to be discovered was Duqu discovered on 1 September 2011 and
was believed to be written or designed by the same author/or authors that created Stuxnet and is
closely related to its function, however, the difference lies in, when it spies and steals the
information it is used in future attacks not present functions and Duqu has unknown capabilities
and unknown use and is still being investigated (Symantec, 2011). The next incident occurs with
the Flame Virus, discovered on May 2012, it is the most highly sophisticated and stealth mode
invader which attacked Iran and other Middle East countries defense programs. This is the
biggest breach in all security at this given time, unlike the two worms, Stuxnet and Duqu, this
virus was almost not discovered and is referred to as Cyber Weapon and is classified as
terrorism. It has been thought to been in existence and out in the field working for at least two
years if not more. This virus has the capability and steals information of data files, conversations,
key code passes, visual data and plans, stored files, addresses, contact information and much
more. The capabilities that “Flame” demonstrates pose threats now and as they do of future
threats. Since, it is not known how much information it has stolen and where and to whom it has
3
4. WK 5: SPACE AND CYBERSPACE COLLECTION
gone to, leaves extreme concerns of how this information will be used and what it will be used
for. The question is asked, should you be concerned and afraid of this virus? The answer is yes,
if it infiltrates more government bases then governments will lose classified information, if it
infiltrates corporations they will risk losing intellectual property and finally, in the private sector,
individuals information will be stolen and used and play a part in the Cyber-Espionage (ITU,
2012). As technology advances we rely on electronic applications and programs to run our needs
of transferring information by internet or the virtual word through Cyberspace, we rely on it to
run interlinking systems that support our global government data bases, interlinks that support
servers and information through the International Telecommunication Union in a wide and
various technologies, and we rely on it to support our countries energy, water, and our daily
lives. We rely on this capability to sustain life that provides our basic and advanced function
needs. The question is then asked, what happens when our intelligence information has been
compromised, breached and our National Defense is weakened and how do we fight back and
counteract this terrorism and espionage? The answer is a complex one involving laws to redefine
computer and information terrorism and espionage via each country and then redefining law or
treaties to establish upholding for punishment globally. As of now, not all countries recognize or
see it as terrorism and/or espionage for Cyber Crime and do not support it, however, some of
these countries systems and defense data bases have been the ones that have been affected by the
three viruses and it’s only at that time do they have a concern and then blame goes out. This is
why ITU a subdivision of the UN, has raised the concern that measures must now be taken
andput into place to counteract this issue so that it is recognized by everyone to ensure
Intelligence Information will be safe. In addition to this countries and governments must use
programs that ensure the safety of information and allows administrators the right to monitor
within the program itself. More programs and/or software should have built in security instead of
relying on security programs and/or software to just do the job of protecting the information. All
organizations that hold treaties with each other that form any kind of reliance must have an
understanding of itself and other country states to defeat this war of Cyberspace. If this doesn’t
happen then the future holds many problems and will create more issues which will result in the
next World War but on a new frontier in the virtual world, Cyberspace and the War on
Intelligence Information (Kamal, 2005).
Satellites and Cyberspace play a huge role in our future, as technology advances, so do we.
Whatever someone makes someone out there is finding a way to counterattack it. It is our jobs,
our mission to understand from many fields and to grow upon the technology that develops. It is
important that we consider options such as the DI2E and other possibilities, our future will
depend on this.
Gercke, M., . International Telecommunication Union. United Nations. UNDERSTANDING
CYBERCRIME:A GUIDE FOR DEVELOPING COUNTRIES. Geneva, Switzerland: United
Nations, 2011. Web. <http://www.itu.int/ITU-
D/cyb/cybersecurity/docs/ITU_Guide_A5_14092011_rev.pdf>.
4
5. WK 5: SPACE AND CYBERSPACE COLLECTION
Kamal, Ahmad. The Law of Cyber-Space an Invotation to the Table of Negotiations. 1. 1.
Geneva 10, Switerland: United Nations Institute for Training and Research, 2005. 1-269.
<http://www.un.int/kamal/thelawofcyberspace/The Law of Cyber-Space.pdf>.
NASA, . "The Early Satellites." Space Science and Technology. NASA US Government, 22
November 2007. Web. 2 Aug 2012. <http://www.nasa.gov/missions/science/f-satellites.html>.
Symantec, . "What is the difference between viruses, worms, and Trojans?." . Symantec
Corporation, 10 January 2009. Web. 2 Aug 2012.
<http://www.symantec.com/business/support/index?page=content&id=TECH98539>.
US Naval Observation, . "USNO NAVSTAR Global Positiong System." NAVSTAR GPS
Operations. US Navy; Department of Defense, 2012. Web. 2 Aug 2012.
<http://tycho.usno.navy.mil/gpsinfo.html>.
5