SlideShare a Scribd company logo
1 of 25
Download to read offline
Cyber Terrorism And
Information Warefare.
Seminar Presentation
By Rohit Raj Sharma
Enrollment : 214510316031
Department : IT-A
Cyber Terrorism and Information Warfare
. Cyber Terrorism and Information Warfare 2
Objectives
■ Explain Cyber Terrorism
■ Understand Information Warfare
■ Understand plausible cyber terrorism
scenarios
■ Appreciate the dangers posed by cyber
terrorism
2
3
Introduction
■ Cyber Terrorism
Cyberterrorism is the convergence of cyberspace and
terrorism. It refers to unlawful attacks and threats of attacks
against computers, networks and the information stored
therein when done to intimidate or coerce a government or
its people in furtherance of political or social objectives.
❑ Simply, the use of computers to launch a
terrorist attack.
❑ Like other forms of terrorism, only the way or
method of the attack has changed.
3
Cyber Terrorism and Information Warfare 4
Introduction (cont.)
■ Cyber Terrorism
■ Significant economic damage
■ Disruptions to communications
■ Disruptions in supply lines
■ General degradation of the national
infrastructure
■ All possible via the Internet
4
5
Introduction (cont.)
■ Cyber Terrorism
➢ MyDoom virus may have been an example.
➢ MyDoom is a very effective worm made to create zombies
out of hundreds of thousands of computers. Hackers could
then use each hijacked terminal to wage a denial of service
(DoS) attack toward a company they identified. In 2004, no
one knew who developed the code.
➢ Our nation can expect to be the target of
serious cyber terrorism.
5
6
Economic Attacks
■ Cyber attacks cause economic damage:
❑ Lost files and records.
❑ Destroyed data.
❑ Stolen credit cards.
❑ Money stolen from accounts.
❑ Time the IT staff spends cleaning up.
6
7
Economic Attacks (cont.)
■ Any organization wanting to do harm could
set up a group with.
❑ Computer security experts.
❑ Programming experts.
❑ Networking experts.
7
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare 8
Economic Attacks (cont.)
■ Team 1 sets up fake e-commerce sites for a
few days:
❑ Harvest credit card numbers, bank account
numbers, and so forth
❑ All numbers posted to the Web anonymously
on a predetermined date
8
9
Economic Attacks (cont.)
■ Team 2 creates a Trojan
❑ Showing business tips or slogans, popular
download with business people
❑ Deletes key system files on a certain date
9
10
Economic Attacks (cont.)
■ Team 3 creates a virus.
❑ A DDoS on key financial Websites, all to take
place on the same predetermined date.
■ Teams 4 and 5 footprint major bank systems.
■ Team 6 prepares to flood the Internet with
false stock tips.
10
11
Military Operations Attacks
■ Attempts to hack into the ultra-secure DoD,
CIA, or NSA systems would be met with
immediate arrest.
■ A successful attack on less secure systems
could also put our country at risk.
❑ Lower-level security systems that protect the
logistics programs
11
12
Military Operations Attacks (cont.)
■ One hack finds that C-141s are routed to a
certain base.
■ Another hack reveals food for 5,000 is
delivered to that base.
■ The final hack shows two brigades have had
leaves canceled.
■ Social engineering puts information together
to reveal size and time of a deployment.
12
13
Military Operations Attacks (cont.)
■ Variations on a theme
❑ Hacker changes the date and destination of
the food and weapons delivery.
❑ Brigades are now at risk.
■ Without food and ammunition
13
14
Military Operations Attacks (cont.)
■ Illustrates the need for high security on all
military systems.
■ There are clearly no “low-priority” security
systems.
14
15
General Attacks
■ Unfocused attacks with no specific target
❑ Sheer volume of these attacks causes
significant economic damage.
❑ IT personnel drop normal projects to combat
general attacks.
❑ E-commerce is virtually unusable.
15
16
Information Warfare
■ Any attempt to manipulate information in
pursuit of a military or political goal:
❑ Use computers to gather information.
❑ Use computers to disseminate propaganda.
16
17
Information Warfare (cont.)
■ Propaganda:
❑ Any group could use what appears to be an
Internet news Website.
❑ Many people believe and repeat what they see
on the Internet.
17
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare 18
Information Warfare (cont.)
■ Information Control
❑ Since World War ll, part of political and military
conflicts
■ Tokyo Rose
■ Radio Free Europe
❑ Language manipulation
■ Innocent civilians killed = collateral damage
■ Starting a war = preemptive action
18
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare 19
Information Warfare (cont.)
■ Information Control
❑ The Internet is an inexpensive vehicle for swaying
public opinion
■ Web sites
■ Postings to discussion groups and bulletin boards
■ Public opinion quickly gains momentum
❑ Closely related to propaganda
19
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare 20
Information Warfare (cont.)
■ Disinformation
❑ Locate false information behind relatively secure
systems, but not secure enough to keep out
enemy.
❑ The work the enemy has to do to acquire the
disinformation will convince them of its value.
20
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare 21
Actual Cases
■ Many influential people do not believe in
cyber warfare.
■ These events appear to contradict them:
❑ The People’s Liberation Army [China] has
formulated an official cyber warfare doctrine.
21
22
Actual Cases (cont.)
■ In Tehran [Iran], the armed forces and
technical universities joined to create
independent cyber R&D centers and train
personnel in IT skills.
■ Tehran seeks to buy IT technical assistance
and training from Russia and India.
22
23
Actual Cases (cont.)
■ Russia’s armed forces have developed a
robust cyber warfare doctrine.
■ Moscow also has a track record of offensive
hacking into Chechen Websites.
■ Available evidence is inadequate to predict
whether Russia’s intelligence services or
armed forces would attack U.S. networks.
23
24
Defense Against Cyber Terrorism
■ Recommendations for preparing for and
protecting against cyber terrorism include
❑ A Manhattan Project-level program
❑ Research and academic programs dedicated
to security
❑ Computer crime treated more seriously
24
25
Defense Against Cyber Terrorism
(cont.)
❑ Every police department must have access
to computer crime specialists.
❑ Security professionals must have a forum
to report and discuss emergencies.
25

More Related Content

Similar to seminarCyberTerrorism.pptx.pdf

54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
Scott Dickson
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
glendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
todd581
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
Eljay Robertson
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 

Similar to seminarCyberTerrorism.pptx.pdf (20)

54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategies
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Cyberware
CyberwareCyberware
Cyberware
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
OK.pdf
OK.pdfOK.pdf
OK.pdf
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 

seminarCyberTerrorism.pptx.pdf

  • 1. Cyber Terrorism And Information Warefare. Seminar Presentation By Rohit Raj Sharma Enrollment : 214510316031 Department : IT-A Cyber Terrorism and Information Warfare
  • 2. . Cyber Terrorism and Information Warfare 2 Objectives ■ Explain Cyber Terrorism ■ Understand Information Warfare ■ Understand plausible cyber terrorism scenarios ■ Appreciate the dangers posed by cyber terrorism 2
  • 3. 3 Introduction ■ Cyber Terrorism Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. ❑ Simply, the use of computers to launch a terrorist attack. ❑ Like other forms of terrorism, only the way or method of the attack has changed. 3
  • 4. Cyber Terrorism and Information Warfare 4 Introduction (cont.) ■ Cyber Terrorism ■ Significant economic damage ■ Disruptions to communications ■ Disruptions in supply lines ■ General degradation of the national infrastructure ■ All possible via the Internet 4
  • 5. 5 Introduction (cont.) ■ Cyber Terrorism ➢ MyDoom virus may have been an example. ➢ MyDoom is a very effective worm made to create zombies out of hundreds of thousands of computers. Hackers could then use each hijacked terminal to wage a denial of service (DoS) attack toward a company they identified. In 2004, no one knew who developed the code. ➢ Our nation can expect to be the target of serious cyber terrorism. 5
  • 6. 6 Economic Attacks ■ Cyber attacks cause economic damage: ❑ Lost files and records. ❑ Destroyed data. ❑ Stolen credit cards. ❑ Money stolen from accounts. ❑ Time the IT staff spends cleaning up. 6
  • 7. 7 Economic Attacks (cont.) ■ Any organization wanting to do harm could set up a group with. ❑ Computer security experts. ❑ Programming experts. ❑ Networking experts. 7
  • 8. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare 8 Economic Attacks (cont.) ■ Team 1 sets up fake e-commerce sites for a few days: ❑ Harvest credit card numbers, bank account numbers, and so forth ❑ All numbers posted to the Web anonymously on a predetermined date 8
  • 9. 9 Economic Attacks (cont.) ■ Team 2 creates a Trojan ❑ Showing business tips or slogans, popular download with business people ❑ Deletes key system files on a certain date 9
  • 10. 10 Economic Attacks (cont.) ■ Team 3 creates a virus. ❑ A DDoS on key financial Websites, all to take place on the same predetermined date. ■ Teams 4 and 5 footprint major bank systems. ■ Team 6 prepares to flood the Internet with false stock tips. 10
  • 11. 11 Military Operations Attacks ■ Attempts to hack into the ultra-secure DoD, CIA, or NSA systems would be met with immediate arrest. ■ A successful attack on less secure systems could also put our country at risk. ❑ Lower-level security systems that protect the logistics programs 11
  • 12. 12 Military Operations Attacks (cont.) ■ One hack finds that C-141s are routed to a certain base. ■ Another hack reveals food for 5,000 is delivered to that base. ■ The final hack shows two brigades have had leaves canceled. ■ Social engineering puts information together to reveal size and time of a deployment. 12
  • 13. 13 Military Operations Attacks (cont.) ■ Variations on a theme ❑ Hacker changes the date and destination of the food and weapons delivery. ❑ Brigades are now at risk. ■ Without food and ammunition 13
  • 14. 14 Military Operations Attacks (cont.) ■ Illustrates the need for high security on all military systems. ■ There are clearly no “low-priority” security systems. 14
  • 15. 15 General Attacks ■ Unfocused attacks with no specific target ❑ Sheer volume of these attacks causes significant economic damage. ❑ IT personnel drop normal projects to combat general attacks. ❑ E-commerce is virtually unusable. 15
  • 16. 16 Information Warfare ■ Any attempt to manipulate information in pursuit of a military or political goal: ❑ Use computers to gather information. ❑ Use computers to disseminate propaganda. 16
  • 17. 17 Information Warfare (cont.) ■ Propaganda: ❑ Any group could use what appears to be an Internet news Website. ❑ Many people believe and repeat what they see on the Internet. 17
  • 18. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare 18 Information Warfare (cont.) ■ Information Control ❑ Since World War ll, part of political and military conflicts ■ Tokyo Rose ■ Radio Free Europe ❑ Language manipulation ■ Innocent civilians killed = collateral damage ■ Starting a war = preemptive action 18
  • 19. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare 19 Information Warfare (cont.) ■ Information Control ❑ The Internet is an inexpensive vehicle for swaying public opinion ■ Web sites ■ Postings to discussion groups and bulletin boards ■ Public opinion quickly gains momentum ❑ Closely related to propaganda 19
  • 20. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare 20 Information Warfare (cont.) ■ Disinformation ❑ Locate false information behind relatively secure systems, but not secure enough to keep out enemy. ❑ The work the enemy has to do to acquire the disinformation will convince them of its value. 20
  • 21. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare 21 Actual Cases ■ Many influential people do not believe in cyber warfare. ■ These events appear to contradict them: ❑ The People’s Liberation Army [China] has formulated an official cyber warfare doctrine. 21
  • 22. 22 Actual Cases (cont.) ■ In Tehran [Iran], the armed forces and technical universities joined to create independent cyber R&D centers and train personnel in IT skills. ■ Tehran seeks to buy IT technical assistance and training from Russia and India. 22
  • 23. 23 Actual Cases (cont.) ■ Russia’s armed forces have developed a robust cyber warfare doctrine. ■ Moscow also has a track record of offensive hacking into Chechen Websites. ■ Available evidence is inadequate to predict whether Russia’s intelligence services or armed forces would attack U.S. networks. 23
  • 24. 24 Defense Against Cyber Terrorism ■ Recommendations for preparing for and protecting against cyber terrorism include ❑ A Manhattan Project-level program ❑ Research and academic programs dedicated to security ❑ Computer crime treated more seriously 24
  • 25. 25 Defense Against Cyber Terrorism (cont.) ❑ Every police department must have access to computer crime specialists. ❑ Security professionals must have a forum to report and discuss emergencies. 25