SlideShare une entreprise Scribd logo
1  sur  49
  Where Cyber and Military Might Combined for War Fighting Advantage. Paul M. Joyal, Managing Director  Public Safety and Homeland Security The Brave New World of the 5 Day War
Russian Views on Electronic and Information Warfare “ The growing role of information-technology is rapidly lowering the barrier between war and peace.”  Mary C. FitzGerald www.nationalstrategies.com
Briefing ,[object Object],[object Object],[object Object],[object Object],“ Warfare has indeed shifted from being a duel of strike systems to being a duel of information systems”
Russian analysts Yevgeniy Korotchenko and  Nikolay Plotnikov conclude in 1993: We are now seeing a tendency toward a shift in the center of gravity away from traditional methods of force and the means of combat toward non-traditional methods, including information.  Their impact is imperceptible and appears gradually. ... Thus today information and information technologies are becoming a real weapon.  A weapon not just in a metaphoric sense but in a direct sense as well
Two Aspects of Parity and Defense Sufficiency  (1993) Russian Admiral V.S. Pirumov   "... that a war's main objective is shifting away from seizure of the opponent's territory and moving towards neutralizing his political or military-economic potential - eliminating a competitor - and ensuring the victor's supremacy in the political arena or in raw materials and sales markets.
General Viktor Samsonov, Chief of the Russian General Staff stated 23 Dec 96 The high effectiveness of ‘information warfare’ systems, in combination with highly accurate weapons and ‘non-military means of influence’ makes it possible to disorganize the system of state administration, hit strategically important installations and groupings of forces, and affect the mentality and moral spirit of the population. In other words, the effect of using these means is comparable with the damage resulting from the effect of weapons of mass destruction.
Developments to this doctrinal understanding have evolved in the 90’s with the dynamism of the information era ,[object Object],[object Object]
Information age technologies have created a new cyberspace environment in which to conduct warfare. Russia's response to the information age highlights the potential for challenges to the existing military balance and global security. This was brought vividly home during the 5 Day Russian Georgian War. Countries around the globe are increasingly vulnerable to information warfare  as cyberspace and social networking increases, dependence expands. The gap between the emerging information age environment and the doctrine, capabilities and strategies for defending against and prosecuting information warfare  are now being globally confronted.
Tectonic shift in military affairs:  6 th  Generation warfare will change the laws of combat and the principles of military science ,[object Object],[object Object]
Nature of Information Warfare ,[object Object],[object Object],[object Object],[object Object]
Information Warfare ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computerization of Information Warfare ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Russian intelligence services have a history of employing hackers against the United States . ,[object Object],[object Object]
Russian FSB continues to employ hackers ,[object Object],[object Object]
Psychological Operations and Information Warfare ,[object Object],[object Object],[object Object]
Reflexive Control of the enemy is the goal of PYSOPS and A/M ,[object Object],[object Object],[object Object],[object Object]
CYBERWAR The New “Active Measure” ,[object Object],[object Object],[object Object]
Russian cyber warfare doctrine also addresses the optimum time to strike.  Prior to an “information strike”, all targets should be identified (including enemy information systems), enemy access to external information should be denied, credit and monetary circulation should be disrupted, and the populace should be subjected to a massive psychological operation--including disinformation and propaganda.
In preparation for conflict, computer networks and databases are penetrated before the beginning of combat operations by agent and other methods Micro-organism cultures are introduced that eat away electronic components. The employment of information weapons in the concluding phase of a major regional conflict is similar to their use in peacekeeping operations.
Combined information and military operations are required Estimates have shown that the use of information weapons must be constantly accompanied by the limited use or threat of use of conventional weapons, especially high-precision weapons.
Information Warfare Wrap Up ,[object Object],[object Object],[object Object],[object Object]
Russian-Georgian War ,[object Object],[object Object],[object Object],[object Object]
Information Warfare and Active Measures have a highly developed history in Soviet -Russian Intelligence History Today Russia is no longer constrained by communism. Government, business and criminal groups operate seamlessly.  Intelligence skills have now entered the market place and are used by any number of public and private entities to achieve their ends.  Cyber threats only amplify this muddled reality
The Brave New World of the 5 Day War: Where Cyber and Military Might Combined Presented by Eka   Tkeshelashvili Secretary, National Security Council of Georgia February 6, 2011 , Washington, DC
PLANNING ,[object Object],[object Object],[object Object],February 6, 2011
Let’s go back about a decade ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
THE PROBLEM ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The War in Context ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber-attack Details - 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber-attack Details - 2 ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
Conclusions ,[object Object],[object Object],[object Object],February 6, 2011
Commercial Effects of E-Wars   Analysis of Georgia events and related topics . Stephen Spoonamore Partner GSP llc [email_address] Skype: spoonamore 202 351 1883
Where was the Georgian War? This is snapshot of what part of the Internet looked like at a computational perspective near the start of the Georgia War. Yes…it is fuzzy… So is the web.
More or less here… The Green Square (virtually as it were) covers the Caucus . It amounts to apx 0.3% of global IT  Traffic. From a commercial  perspective, it is not  a high priority.
Rewind to the Baltics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In other words this… The Green Square Now covers the  Baltics . Who also amount to apx 0.3% of  global IT Traffic.
Became this… Green Square covers failures Spilling out of the  Baltics . Impacting nearly  30% of the globes  IP traffic and 20% of the globes  Finance. This sucked.
After the Baltics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Banks now act like a herd. Watch our for lions…
One dies, Herd survives. Lions eat the weak link (Georgia) while the bank herd goes off to graze.  They are programmed this way as we sit here today.
Banks impact Cell Phones. Average Credit Card usage needs 36 computers to  confirm or process data. Many, perhaps most, EU Cell Phones confirm account validity by piggy-backing on credit system Banks cut of Credit Card settlement systems, none of  those phones linked to it function.
Impact on other credentials. Border credential systems overlap phone networks . IP address blocks for ISPs of attacked banks shut out. Commercial entities within those ISP blocks can not  access ISP or email. ATM network will not function. Travel tickets wont function. Gas Pumps won’t function.
E-War knowns Mo-Fri. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Commercial Responses. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense David Sweigert
 
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...inventionjournals
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
 
Methods of Research final
Methods of Research finalMethods of Research final
Methods of Research finalEric Sutton
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlinJavierski
 
International Law-2
International Law-2International Law-2
International Law-2Erum Khatoon
 
The revolution after next
The revolution after nextThe revolution after next
The revolution after nextLex Pit
 
Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016 Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016 DonbassFullAccess
 
Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)cynrx
 
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain RegionNotice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain Regionlegaladvice
 
Terrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoTerrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoAlvin "Flex" Plexico, Ph.D.
 
Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...528Hz TRUTH
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?Melissa Andrews
 

Tendances (19)

Final Thesis_Bessinger
Final Thesis_BessingerFinal Thesis_Bessinger
Final Thesis_Bessinger
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
 
Book studies 63-1-mar2019
Book studies 63-1-mar2019Book studies 63-1-mar2019
Book studies 63-1-mar2019
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 
Methods of Research final
Methods of Research finalMethods of Research final
Methods of Research final
 
Bush doctrine for submission 1
Bush doctrine for submission 1Bush doctrine for submission 1
Bush doctrine for submission 1
 
The work-of-a-nation
The work-of-a-nationThe work-of-a-nation
The work-of-a-nation
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlin
 
International Law-2
International Law-2International Law-2
International Law-2
 
4 g wfinal (2)
4 g wfinal (2)4 g wfinal (2)
4 g wfinal (2)
 
The revolution after next
The revolution after nextThe revolution after next
The revolution after next
 
Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016 Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016
 
Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)
 
Vol3ch03
Vol3ch03Vol3ch03
Vol3ch03
 
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain RegionNotice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
 
Terrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoTerrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. Plexico
 
Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?
 

En vedette

The 2008 Russia-Georgia War
The 2008 Russia-Georgia WarThe 2008 Russia-Georgia War
The 2008 Russia-Georgia Warhandman003
 
Media presentation project
Media presentation projectMedia presentation project
Media presentation projectAaronLott
 
Military (2)
Military (2)Military (2)
Military (2)rockopri
 
My presentation on Rising Influence of China
My presentation on Rising Influence of ChinaMy presentation on Rising Influence of China
My presentation on Rising Influence of ChinaJoharyab Baig
 
Arms Control AND Disarmament
Arms Control AND DisarmamentArms Control AND Disarmament
Arms Control AND DisarmamentUltraspectra
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)Board of Innovation
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsXPLAIN
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideCrispy Presentations
 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)Steven Hoober
 
Upworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureReferralCandy
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing FailsRand Fishkin
 
The History of SEO
The History of SEOThe History of SEO
The History of SEOHubSpot
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into MarketingEd Fry
 

En vedette (20)

Relationship between Russia and Georgia
Relationship between Russia and GeorgiaRelationship between Russia and Georgia
Relationship between Russia and Georgia
 
The 2008 Russia-Georgia War
The 2008 Russia-Georgia WarThe 2008 Russia-Georgia War
The 2008 Russia-Georgia War
 
Media presentation project
Media presentation projectMedia presentation project
Media presentation project
 
Military (2)
Military (2)Military (2)
Military (2)
 
Ethical challenges
Ethical challengesEthical challenges
Ethical challenges
 
My presentation on Rising Influence of China
My presentation on Rising Influence of ChinaMy presentation on Rising Influence of China
My presentation on Rising Influence of China
 
Ethics and AI
Ethics and AIEthics and AI
Ethics and AI
 
Arms Control AND Disarmament
Arms Control AND DisarmamentArms Control AND Disarmament
Arms Control AND Disarmament
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
The Minimum Loveable Product
The Minimum Loveable ProductThe Minimum Loveable Product
The Minimum Loveable Product
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media Sins
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same Slide
 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)
 
Upworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The Internets
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From Failure
 
Design Your Career 2018
Design Your Career 2018Design Your Career 2018
Design Your Career 2018
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing Fails
 
The History of SEO
The History of SEOThe History of SEO
The History of SEO
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into Marketing
 

Similaire à Govsec Georgia 2008 Cyber War

Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacksClifford Stone
 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016cacds_ukraine
 
The Mind Has No Firewall.pdf
The Mind Has No Firewall.pdfThe Mind Has No Firewall.pdf
The Mind Has No Firewall.pdfTeabeAmet
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseRepentSinner
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseAnonDownload
 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)pavithra M
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxoreo10
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Pranav Gupta
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxfestockton
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxalfredai53p
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxambersalomon88660
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on TerrorTpeisi Nesby
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxfestockton
 

Similaire à Govsec Georgia 2008 Cyber War (20)

Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016
 
Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)
 
The Mind Has No Firewall.pdf
The Mind Has No Firewall.pdfThe Mind Has No Firewall.pdf
The Mind Has No Firewall.pdf
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docx
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docx
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docx
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
 

Dernier

John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 

Dernier (20)

John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 

Govsec Georgia 2008 Cyber War

  • 1. Where Cyber and Military Might Combined for War Fighting Advantage. Paul M. Joyal, Managing Director Public Safety and Homeland Security The Brave New World of the 5 Day War
  • 2. Russian Views on Electronic and Information Warfare “ The growing role of information-technology is rapidly lowering the barrier between war and peace.” Mary C. FitzGerald www.nationalstrategies.com
  • 3.
  • 4. Russian analysts Yevgeniy Korotchenko and Nikolay Plotnikov conclude in 1993: We are now seeing a tendency toward a shift in the center of gravity away from traditional methods of force and the means of combat toward non-traditional methods, including information. Their impact is imperceptible and appears gradually. ... Thus today information and information technologies are becoming a real weapon. A weapon not just in a metaphoric sense but in a direct sense as well
  • 5. Two Aspects of Parity and Defense Sufficiency (1993) Russian Admiral V.S. Pirumov "... that a war's main objective is shifting away from seizure of the opponent's territory and moving towards neutralizing his political or military-economic potential - eliminating a competitor - and ensuring the victor's supremacy in the political arena or in raw materials and sales markets.
  • 6. General Viktor Samsonov, Chief of the Russian General Staff stated 23 Dec 96 The high effectiveness of ‘information warfare’ systems, in combination with highly accurate weapons and ‘non-military means of influence’ makes it possible to disorganize the system of state administration, hit strategically important installations and groupings of forces, and affect the mentality and moral spirit of the population. In other words, the effect of using these means is comparable with the damage resulting from the effect of weapons of mass destruction.
  • 7.
  • 8. Information age technologies have created a new cyberspace environment in which to conduct warfare. Russia's response to the information age highlights the potential for challenges to the existing military balance and global security. This was brought vividly home during the 5 Day Russian Georgian War. Countries around the globe are increasingly vulnerable to information warfare as cyberspace and social networking increases, dependence expands. The gap between the emerging information age environment and the doctrine, capabilities and strategies for defending against and prosecuting information warfare are now being globally confronted.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Russian cyber warfare doctrine also addresses the optimum time to strike. Prior to an “information strike”, all targets should be identified (including enemy information systems), enemy access to external information should be denied, credit and monetary circulation should be disrupted, and the populace should be subjected to a massive psychological operation--including disinformation and propaganda.
  • 19. In preparation for conflict, computer networks and databases are penetrated before the beginning of combat operations by agent and other methods Micro-organism cultures are introduced that eat away electronic components. The employment of information weapons in the concluding phase of a major regional conflict is similar to their use in peacekeeping operations.
  • 20. Combined information and military operations are required Estimates have shown that the use of information weapons must be constantly accompanied by the limited use or threat of use of conventional weapons, especially high-precision weapons.
  • 21.
  • 22.
  • 23. Information Warfare and Active Measures have a highly developed history in Soviet -Russian Intelligence History Today Russia is no longer constrained by communism. Government, business and criminal groups operate seamlessly. Intelligence skills have now entered the market place and are used by any number of public and private entities to achieve their ends. Cyber threats only amplify this muddled reality
  • 24. The Brave New World of the 5 Day War: Where Cyber and Military Might Combined Presented by Eka Tkeshelashvili Secretary, National Security Council of Georgia February 6, 2011 , Washington, DC
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Commercial Effects of E-Wars Analysis of Georgia events and related topics . Stephen Spoonamore Partner GSP llc [email_address] Skype: spoonamore 202 351 1883
  • 37. Where was the Georgian War? This is snapshot of what part of the Internet looked like at a computational perspective near the start of the Georgia War. Yes…it is fuzzy… So is the web.
  • 38. More or less here… The Green Square (virtually as it were) covers the Caucus . It amounts to apx 0.3% of global IT Traffic. From a commercial perspective, it is not a high priority.
  • 39.
  • 40. In other words this… The Green Square Now covers the Baltics . Who also amount to apx 0.3% of global IT Traffic.
  • 41. Became this… Green Square covers failures Spilling out of the Baltics . Impacting nearly 30% of the globes IP traffic and 20% of the globes Finance. This sucked.
  • 42.
  • 43. Banks now act like a herd. Watch our for lions…
  • 44. One dies, Herd survives. Lions eat the weak link (Georgia) while the bank herd goes off to graze. They are programmed this way as we sit here today.
  • 45. Banks impact Cell Phones. Average Credit Card usage needs 36 computers to confirm or process data. Many, perhaps most, EU Cell Phones confirm account validity by piggy-backing on credit system Banks cut of Credit Card settlement systems, none of those phones linked to it function.
  • 46. Impact on other credentials. Border credential systems overlap phone networks . IP address blocks for ISPs of attacked banks shut out. Commercial entities within those ISP blocks can not access ISP or email. ATM network will not function. Travel tickets wont function. Gas Pumps won’t function.
  • 47.
  • 48.
  • 49.