Cyber warfare capabiliites : A Reality Check

Rajeev Chauhan
Rajeev ChauhanCyber Security and Cyber Forensics à Cyber Security, IT and Comn
Rajeev Chauhan
Confession
I am Naive
I don’t know the nuances of Cyber World
Vocabulary
Rajeev Chauhan
CYBER WAR
Definition
The use of computer technology, most prominently the
internet, in order to disrupt, deny or degrade the
capabilities of an adversary, to an extent that it
cripples its day to day activities
Rajeev Chauhan
AIM
To degrade the capabilities of an adversary with
ultimate goal of coercing adversary for a political
purpose, besides hacking into the servers, stealing
sensitive information.
Rajeev Chauhan
HISTORY
1982
• The Soviet Union planned to steal software from a Canadian company to control its Trans-Siberian
Pipeline,
• the CIA alters the software to cause the pipeline to explode.
1986
• A hacker tracked to Germany by a researcher in US over a period of 10 months
• First recorded case of such investigation
1988
• Morris worm shuts down 10% of internet
• First case of conviction for cyber crime
1994
• Computers hacked at the Rome Air Development Center at Griffiss Air Force Base New York by
anonymous hacker and sensitive data stolen
Rajeev Chauhan
HISTORY
1997
• The NSA conducts a test, known as Eligible Receiver, to assess the vulnerability of government and
military computers to a cyberattack
1998
• DoD establishes Joint Task force to defend computer networks
2001
• The worm named Code Red affects computer networks running a Microsoft operating system. Some
websites, including the White House site, are disabled.
2003
• Operation Titan Rain : US targeted allegedly by China for stealing info Vulnerable systems .
Rajeev Chauhan
HISTORY
2007
• Estonia experiences DoS for 22 days by the hackers believed to be backed by Russian Government.
• British and US Government officials alleged that official emails accounts hacked by PLA
2008
• Georgia faces DDoS attack and blames Russia for that. Media Transportation and Government
Computer Networks crippled
• First case of data stealing through a flash drive using covert program at US base in Middle East.
2009
• Israel Government sites subjected to Spam mail to the tune of 15 million emails per second. Israel
blamed Hamas.
• 103 country including Indian Government and embassies computers hacked allegedly by China,
2010
• Sensitive information stolen from Ministry of Defence Computers in India, suspect is China
• Stuxnet cripples Iranian Nuclear installation.
• Pentagon Declares Cyber War as Fifth domain
Rajeev Chauhan
HISTORY
2011
• IMF computers hacked , fingers point towards China
• Hackers delete hard drives of 30k computers in Saudi oil company.
• Military Wing of HAMAS carry out massive DDoS against nine US banks.
• U.S. Secretary of Defense Leon Panetta warns that the U.S. must protect itself against a “Cyber Pearl
Harbor."
2013
• The New York Times Website shut down for 20 hours by Syrian Electronic Army.
2014
• Chinese hackers had breached the computer network of the Office of Personnel Management in March.
• The computer networks of Sony Pictures were hacked, allegedly by North Korea
2015
• The Russian hackers penetrated the email archives of White House and State Dept. officials
correspondence with President Barack Obama.
Rajeev Chauhan
CYBER WAR
• Transition in dimensions of warfare from
physical to Cyber space.
• Assumed importance as fifth dimension.
• Security of cyberspace based on traditional
axioms of threats
• Affects Confidentiality, Integrity and
Availability besides new realm of Data
Thefts.
Rajeev Chauhan
CYBER WAR
• Cyber warfare is closely related to other
aspects of cyber threats such as cyber crime,
cyber terrorism, cyber espionage and cyber
spying.
• Cyber war also includes the development
and implementation of security strategies to
defend against such attack mechanisms.
Rajeev Chauhan
CYBER WAR
• At least 12 of the world’s 15 largest military powers
are currently building cyber warfare programs,
according to James Lewis, a cyber security expert at
the Center for Strategic and International Studies.
• The US has had a major influence on the
development of cyberspace by virtue of the fact that
much of the initial infrastructure and use was
centered in that country and it continues to be a
major force in its development and use.
Rajeev Chauhan
CYBER WARFARE
• Recce
• Enum
• Foot printing
• System hacking/attack
– DDos
– Trojans/backdoors
– Virus/Worms
– Session hijacking
• Maintain Contact
• Remove traces
Rajeev Chauhan
CYBER WARFARE
CAPABILITIES
– China
– US
– UK
– North Korea
– Australia
– Israel
– Iran
– Russia
– Germany
– Netherlands
– India
• Countries with capabilities to launch
Cyber war
Rajeev Chauhan
CHINA
Rajeev Chauhan
CHINA
• Admitted to having a dedicated Cyber War launching
capabilities.
• According to the cyber security firm Mandiant, the People’s
Liberation Army (PLA) has been using an elite cyber warfare
unit based in Shanghai to launch hundreds of cyber attacks
targeting mainly American.
• The unit, officially known as Unit 61398, operates under the
PLA’s Second Bureau of the General Staff Department’s (GSD)
Third Department.
• The PLA’s Unit 61398 is known for its use of zero-day exploits.
According to Mandiant, Unit 61398’s informal name was APT1
due to their skill at successfully carrying out advanced persistent
threats. Rajeev Chauhan
CHINA
• China has “reached out” to people with the
necessary cyber skills in the IT sector and
academic community to help fill any gaps in
state expertise and personnel when needed.
• In October 2014, the FBI issued a warning
that a Chinese hacking collective known as
Axiom has been engaged in a sophisticated
campaign to steal valuable data from U.S.
government agencies.
Rajeev Chauhan
CHINA
• Taiwan’s National Security Bureau (NSB) has
identified another unit of the GSD’s Third
Department that is involved in cyber-
activities.(source Taipei Times)
• China’s cyber capabilities are organized by a
strategy involving “to establish information
dominance.”
• Information dominance refers to:
– taking and maintaining control of an adversary’s access
to its own information, and
– disrupting the flow of information necessary for
“decision-making or combat operations.”
Rajeev Chauhan
US
Rajeev Chauhan
Images: Copyright of respective owners
US
• United States Cyber Command (USCYBERCOM) is
an armed forces sub-unified command subordinate
to United States Strategic Command and centralizes
command of cyberspace operations, organizes existing
cyber resources and synchronizes defense of U.S.
military networks. (wiki).
• The Army Cyber Command (ARCYBER) is an Army
component command for the U.S. Cyber Command:
– Army Network Enterprise Technology Command / 9th
Army Signal Command
– Portions of 1st Information Operations Command (Land)
– United States Army Intelligence and Security
Command will be under the operational control of
ARCYBER for cyber-related actionsRajeev Chauhan
US
• Marine Corps Forces Cyberspace Command
• Navy Cyber Forces
• Twenty-Fourth Air Force with following components
– 67th Network Warfare Wing
– 688th Information Operations Wing
– 689th Combat Communications Wing
• United States Tenth Fleet, consisting of
– Naval Network Warfare Command
– Navy Cyber Defense Operations Command
– Naval Information Operation Commands
– Combined Task Forces Rajeev Chauhan
US
• Cyberwarfare in the United States is the United States
Cyber Command's military strategy of Proactive Cyber
Defence and the use of cyber warfare as a platform for
attack.
• The five pillars is the framework for the United States
military strategy for cyber warfare.
– Cyberspace as new warfare domain
– Proactive defense
– Critical infra protection
– Collective defense
– Maintain and enhance the advantage of technological change
Rajeev Chauhan
UK
GCHQ
Rajeev Chauhan
UK
• Britain will create a new cyber unit which will be known
as the Joint Cyber Reserve.(2013)
– will be tasked primarily with defending the UK against cyber
attacks
– will also have the capability to launch strikes where deemed
necessary
• Ministry of Defence (MoD) will be looking to employ
hundreds of IT experts who will be responsible for
defending the nation’s critical data and computer
networks.
• Cyber defences blocked around 400,000 advanced
malicious cyber threats against the government’s secure
internet alone Rajeev Chauhan
UK
• An Army unit, called the 77th Brigade, is set up to
help fight the cyberwars of the future.
– Made up from reservists as well as regulars from all three
services of the armed forces.
– The team is modelled on the Chindits, a specialist unit
which fought in Burma during the Second World War.
– “clinical cyber strikes” could be used to disable key
military assets such as nuclear and chemical weapons,
enemy communications and other tools of war.
Rajeev Chauhan
GCHQ
(Government Communication Head Quarter)
• GCHQ is an intelligence and security organisation, working to
keep Britain safe and secure in the challenging environment of
modern communications
• GCHQ strives to ensure that life in the UK isn't compromised
through cyber attack or on-line serious crime, employing some
of the world's leading experts on Information Security (how do
we work).
• GCHQ and its sister agencies, MI5 and the Secret Intelligence
Service, could not tackle the cyber challenges "at scale"
without greater support from the private sector, including the
largest US technology companies which dominate the web.
Rajeev Chauhan
UK
Rajeev Chauhan
NORTH KOREA
• Cyber attacks like the one inflicted by the North
Korean government on Sony are just the opening
skirmishes before the outbreak of a hugely
dangerous cyber war that is inevitable.
• North Korea has natural cyber-defenses
• Why?
– it only has about 1,000 IP addresses,
– it has only very few computers so its 'terrain' is very
defensible.
Rajeev Chauhan
AUSTRALIA
• Recent references in cooperation with US in spying on Asian
countries, especially India.
• Australian Signals Directorate with support from the Defence
Science and Technology Organisation has developed new cyber
offensive capabilities in 2014, to carryout,
– DoS
– Access, modify and Delete Data remotely
– Dissemination of False Information
– Penetration of FW protecting Avionics of targets, inserting Trojan
Horses
• Part of 5-Eye partners....US, UK, Canada, Australia and New
Zealand.
Rajeev Chauhan
ISRAEL
• IDF has announced in June
– Establish a Cyber Command within two years.
– Includes Military Intelligence and C4I Telecommunications division.
• Contribute towards the overall IDF Cyber Potential.
• Challenges would be to attain both long range planning and
precise execution capabilities at different level with optimal
degree of operational flexibility in both offensive and defensive
theatre.
• DMI’s 8200 signal intelligence unit was handling int collection
and offensive missions, whereas C4I directorate was handling
cyber defensive missions.
Rajeev Chauhan
ISRAEL
• Salient points:-
– The cyber command will be in charge of both the buildup and
operational missions.
– DMIs working in cyber space in conjunction with conventional
intelligence gathering missions has not contributed to overall
operational effectiveness.
– Synergy between DMIs intelligence gathering and offensive
setup with various cyber units.
– Reciprocal data gathering and dissemination amongst other
branches.
– Maximum operational cooperation and coordination between
New Command and other IDF forces and units
– Coordination with civilian agencies like National Cyber
Bureau and Cyber Authority.Rajeev Chauhan
IRAN
• Since November 2010, an organization called “The Cyber
Defense Command” has been operating in Iran under the
supervision of the country’s “Passive Civil Defense
Organization” a subdivision of the Joint Staff of Iranian
Armed Forces.
• According to a 2014 report by Institute for National
Security Studies, Iran is "one of the most active players in
the international cyber arena“.
• In June 2010, Iran was the victim of a cyber attack when
its nuclear facility in Natanz was infiltrated by the cyber-
worm ‘Stuxnet’. Thereafter it has learnt a lot and
developed a potent cyber warfare capabilities.
Rajeev Chauhan
RUSSIA
• It has been claimed that Russian security services
organized a number of denial of service attacks as a part
of their Cyber-warfare against other countries, most
notably
– 2007 cyber attacks on Estonia
– 2008 cyber attacks on South Ossetia, Georgia, and Azerbaijan.
• The Russian government had been fostering and financing
the Nashi youth organization for more than years. Nashi
members were involved in the Estonia cyber attacks of
2007, Georgian govt websites in 2008 and targeted
individual Georgian supporters in 2009
Rajeev Chauhan
RUSSIA
• Since 2010, Russia like the U.S., China and other
countries has made dual use information security
research and development a top priority at dozens of
top research institutes and universities.
• At least twelve institutes provide world-class
instruction to their graduates in dual use
information security and electronic warfare
technologies, who are then hired by the Security
Services and Ministry of Defense for offensive and
defensive operations.
Rajeev Chauhan
NETHERLAND
• In the Netherlands Cyber Defense is nationally coordinated by the
National Cyber Security Center (NCSC).
• The Dutch Ministry of Defense laid out a cyber strategy in 2011.
• The first focus is to improve the cyber defense handled by the
Joint IT branch (JIVC).
• Joint Sigint Cyber Unit (JSCU) has been setup with an aim to
improve intel operations in the Netherlands (including the
military intel organization MIVD)
• The Ministry of Defense has set up an offensive cyber force,
called Defense Cyber Command (DCC)
Rajeev Chauhan
GERMANY
• In 2013, Germany admitted the existence of their 60-
person Computer Network Operation unit.
• The German intelligence agency, BND, announced that his
agency had observed up to five attacks a day on
government authorities, thought mainly to originate in
China.
• After Edward Snowden leaked details of the U.S. National
Security Agency's cyber surveillance system, Germany
announced that the BND would be given an additional
budget of 100 million Euros to increase their cyber
surveillance capability.
Rajeev Chauhan
INDIA: Why?
• Cyber Attacks affecting national infrastructure through
– Sensitive information leaks….Confidentiality
– Malicious programs effecting critical operations and
applications like power, communication etc…..
– Denial of Services, bringing down critical financial and
banking infrastructure….effecting their Availability.
• Attack on availability of CII is grave in nature as it has
direct impact on national assets and their functioning.
• All types of threats to be addressed in any National
Cyberspace Protection Policies and Procedures.
Rajeev Chauhan
INDIA: Where do we stand?
• Indian Cyberspace subjected to frequent attacks by
China, Pakistan, US, UK, Bangladesh, Anonymous
• Cyber Security Policies …implementation?
• Agencies..CERT-IN, NTRO, NCCC(National Cyber
Coord Committee), NATGRID, NCIIPC
• Potent offensive capabilities
• Capability to sustain
• Disaster management and continuity plan
• Robustness of CII
Rajeev Chauhan
• Chinese are focused…are we!
• Offensive and Defensive capability….
Rajeev Chauhan
Rajeev Chauhan
References
1. http://strategicstudyindia.blogspot.in/2014/02/cyber-warfare-and-
information-security.html
2. http://thediplomat.com/2015/04/chinas-growing-cyberwar-capabilities/
3. http://bhconsulting.ie/securitywatch/?p=1739
4. http://www.bbc.co.uk/newsbeat/article/31074227/the-internet-is-the-
new-frontline-as-uk-sets-up-army-cyber-unit
5. https://en.wikipedia.org/wiki/United_States_Cyber_Command
6. http://www.esecurityplanet.com/network-security/cyber-war-is-
hell.html?utm_source=dlvr.it&utm_medium=twitter
7. Australian Defence Review.
8. http://jeffreycarr.blogspot.in/2014/03/russian-cyber-warfare-capabilities-
in.html
9. http://www.infoplease.com/world/events/cyberwar-timeline.html
Rajeev Chauhan
1 sur 40

Recommandé

Cyberwarfare par
CyberwarfareCyberwarfare
CyberwarfareSpace Defense Newsletter
647 vues16 diapositives
Cyber Warfare - Jamie Reece Moore par
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
1.6K vues17 diapositives
Cyber warfare ss par
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
1.2K vues14 diapositives
Cyber war par
Cyber warCyber war
Cyber warPraveen
1.1K vues38 diapositives
The Role Of Technology In Modern Terrorism par
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
6.3K vues29 diapositives
Cyber warfare Threat to Cyber Security by Prashant Mali par
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
1.6K vues21 diapositives

Contenu connexe

Tendances

Cyber war or business as usual par
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
4.3K vues33 diapositives
Cyber Warfare - par
Cyber Warfare -Cyber Warfare -
Cyber Warfare -ideaflashed
13K vues67 diapositives
About cyber war par
About cyber warAbout cyber war
About cyber wareugenvaleriu
2.3K vues118 diapositives
Terror And Technology par
Terror And TechnologyTerror And Technology
Terror And Technologypradhansushil
8.5K vues83 diapositives
Cyber Terrorism par
Cyber TerrorismCyber Terrorism
Cyber TerrorismSai praveen Seva
6.2K vues27 diapositives
Cyber Warfare vs. Hacking (in English) par
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
5K vues18 diapositives

Tendances(20)

Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014 par Bill Hagestad II
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Bill Hagestad II2.9K vues
Egypt Cloud Day, May2011-- Information Assurance par Egypt Cloud Forum
Egypt Cloud Day, May2011-- Information Assurance Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance
Great Chinese Hack of the United States Government's Personnel Office in 2015 par Dr. Tim Dosemagen
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015
Cyber Terrorism Presentation par merlyna
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna32.6K vues
Shubhrat.presentationfor cybercrime.ppt par Shubhrat Mishra
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
Shubhrat Mishra274 vues
Evolving chinese military cyber doctrine 中国网络战部队 par Bill Hagestad II
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队
Bill Hagestad II1.3K vues
Cyber war a threat to indias homeland security 2015 par Ajay Serohi
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi2.1K vues
Us gov't building hacker army for cyber war yahoo! news par MarioEliseo3
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
MarioEliseo3490 vues
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism par Kislaychd
Ce Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And TerrorismCe Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
Kislaychd708 vues

En vedette

Evaluation question 1 par
Evaluation question 1Evaluation question 1
Evaluation question 1W07ULONGWE
272 vues14 diapositives
Presentation par
PresentationPresentation
Presentationstoutkm
180 vues17 diapositives
dene/ders1.ppt par
dene/ders1.pptdene/ders1.ppt
dene/ders1.pptBatın Düz
245 vues52 diapositives
eTailing India Chennai Conclave 2013 Part 12 par
eTailing India Chennai Conclave 2013 Part 12eTailing India Chennai Conclave 2013 Part 12
eTailing India Chennai Conclave 2013 Part 12eTailing India
367 vues12 diapositives
eTailing India Chennai Conclave 2013 Part 13 par
eTailing India Chennai Conclave 2013 Part 13eTailing India Chennai Conclave 2013 Part 13
eTailing India Chennai Conclave 2013 Part 13eTailing India
358 vues12 diapositives
eTailing India Chennai Conclave 2013 Part 9 par
eTailing India Chennai Conclave 2013 Part 9eTailing India Chennai Conclave 2013 Part 9
eTailing India Chennai Conclave 2013 Part 9eTailing India
247 vues12 diapositives

En vedette(20)

Evaluation question 1 par W07ULONGWE
Evaluation question 1Evaluation question 1
Evaluation question 1
W07ULONGWE272 vues
Presentation par stoutkm
PresentationPresentation
Presentation
stoutkm180 vues
eTailing India Chennai Conclave 2013 Part 12 par eTailing India
eTailing India Chennai Conclave 2013 Part 12eTailing India Chennai Conclave 2013 Part 12
eTailing India Chennai Conclave 2013 Part 12
eTailing India367 vues
eTailing India Chennai Conclave 2013 Part 13 par eTailing India
eTailing India Chennai Conclave 2013 Part 13eTailing India Chennai Conclave 2013 Part 13
eTailing India Chennai Conclave 2013 Part 13
eTailing India358 vues
eTailing India Chennai Conclave 2013 Part 9 par eTailing India
eTailing India Chennai Conclave 2013 Part 9eTailing India Chennai Conclave 2013 Part 9
eTailing India Chennai Conclave 2013 Part 9
eTailing India247 vues
Монетизация интернет-проектов par Oleg Bukatchuk
Монетизация интернет-проектовМонетизация интернет-проектов
Монетизация интернет-проектов
Oleg Bukatchuk826 vues
Dyna Corp : Packaging Solution for eCommerce Companies par eTailing India
Dyna Corp : Packaging Solution for eCommerce CompaniesDyna Corp : Packaging Solution for eCommerce Companies
Dyna Corp : Packaging Solution for eCommerce Companies
eTailing India1.6K vues
Atom Workshop : Payment Solutions For Modern Retail par eTailing India
Atom Workshop : Payment Solutions For Modern Retail Atom Workshop : Payment Solutions For Modern Retail
Atom Workshop : Payment Solutions For Modern Retail
eTailing India670 vues
dene/TIVIACE_turkce.pdf par Batın Düz
dene/TIVIACE_turkce.pdfdene/TIVIACE_turkce.pdf
dene/TIVIACE_turkce.pdf
Batın Düz223 vues
About cci media connecting solutions introduction 2012 par CCIMediaSwitzerland
About cci media connecting solutions   introduction 2012About cci media connecting solutions   introduction 2012
About cci media connecting solutions introduction 2012
Rasheed resumere 2013 par promohazard
Rasheed resumere 2013Rasheed resumere 2013
Rasheed resumere 2013
promohazard395 vues
Experts4you present par seisemeia
Experts4you presentExperts4you present
Experts4you present
seisemeia606 vues
Module 4 par sklarde
Module 4Module 4
Module 4
sklarde154 vues
продвижение в социальных сетях par Oleg Bukatchuk
продвижение в социальных сетяхпродвижение в социальных сетях
продвижение в социальных сетях
Oleg Bukatchuk558 vues
Abdul jawi kepimpinan_kepuasan_pembelajaran par Shinz Cucut
Abdul jawi kepimpinan_kepuasan_pembelajaranAbdul jawi kepimpinan_kepuasan_pembelajaran
Abdul jawi kepimpinan_kepuasan_pembelajaran
Shinz Cucut718 vues

Similaire à Cyber warfare capabiliites : A Reality Check

Cyberwar and Geopolitics par
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
161 vues20 diapositives
Countering the Cyber Espionage Threat from China par
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaMurray Security Services
1.4K vues24 diapositives
Cybersecurity environment in malaysia and the function of internal auditor par
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
203 vues55 diapositives
Event: George Washington University -- National Security Threat Convergence: ... par
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
294 vues29 diapositives
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli... par
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
304 vues7 diapositives
Cyber Wars.pptx par
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptxArjunKumar684595
3 vues47 diapositives

Similaire à Cyber warfare capabiliites : A Reality Check(20)

Cyberwar and Geopolitics par tnwac
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
tnwac161 vues
Cybersecurity environment in malaysia and the function of internal auditor par Khalizan Halid
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
Khalizan Halid203 vues
Event: George Washington University -- National Security Threat Convergence: ... par Chuck Brooks
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks294 vues
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli... par David Sweigert
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
David Sweigert304 vues
Securing Indian Cyberspace Shojan par Shojan Jacob
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
Shojan Jacob984 vues
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber... par Boston Global Forum
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
Cyber security , an Analysis of State Security in Sri Lanka par Evan Pathiratne
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
Evan Pathiratne2.5K vues
Cyber Security, Cyber Warfare par Amit Anand
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
Amit Anand274 vues
Is Cyber-offence the New Cyber-defence? par Jim Geovedi
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
Jim Geovedi6.7K vues
Cyber Security for Oil and Gas par mariaidga
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
mariaidga1.5K vues
Prosecuting Cybercrime and Regulating the Web par Darius Whelan
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
Darius Whelan1.4K vues

Dernier

Helko van den Brom - VSL par
Helko van den Brom - VSLHelko van den Brom - VSL
Helko van den Brom - VSLDutch Power
87 vues18 diapositives
231121 SP slides - PAS workshop November 2023.pdf par
231121 SP slides - PAS workshop November 2023.pdf231121 SP slides - PAS workshop November 2023.pdf
231121 SP slides - PAS workshop November 2023.pdfPAS_Team
158 vues15 diapositives
PB CV v0.3 par
PB CV v0.3PB CV v0.3
PB CV v0.3Pedro Borracha
12 vues16 diapositives
Post-event report intro session-1.docx par
Post-event report intro session-1.docxPost-event report intro session-1.docx
Post-event report intro session-1.docxRohitRathi59
12 vues2 diapositives
Gym Members Community.pptx par
Gym Members Community.pptxGym Members Community.pptx
Gym Members Community.pptxnasserbf1987
7 vues5 diapositives
SOA PPT ON SEA TURTLES.pptx par
SOA PPT ON SEA TURTLES.pptxSOA PPT ON SEA TURTLES.pptx
SOA PPT ON SEA TURTLES.pptxEuniceOseiYeboah
9 vues18 diapositives

Dernier(20)

Helko van den Brom - VSL par Dutch Power
Helko van den Brom - VSLHelko van den Brom - VSL
Helko van den Brom - VSL
Dutch Power87 vues
231121 SP slides - PAS workshop November 2023.pdf par PAS_Team
231121 SP slides - PAS workshop November 2023.pdf231121 SP slides - PAS workshop November 2023.pdf
231121 SP slides - PAS workshop November 2023.pdf
PAS_Team158 vues
Post-event report intro session-1.docx par RohitRathi59
Post-event report intro session-1.docxPost-event report intro session-1.docx
Post-event report intro session-1.docx
RohitRathi5912 vues
Christan van Dorst - Hyteps par Dutch Power
Christan van Dorst - HytepsChristan van Dorst - Hyteps
Christan van Dorst - Hyteps
Dutch Power89 vues
Roozbeh Torkzadeh - TU Eindhoven par Dutch Power
Roozbeh Torkzadeh - TU EindhovenRoozbeh Torkzadeh - TU Eindhoven
Roozbeh Torkzadeh - TU Eindhoven
Dutch Power85 vues
Managing Github via Terrafom.pdf par micharaeck
Managing Github via Terrafom.pdfManaging Github via Terrafom.pdf
Managing Github via Terrafom.pdf
micharaeck5 vues
Synthetic Biology.pptx par ShubNoor4
Synthetic Biology.pptxSynthetic Biology.pptx
Synthetic Biology.pptx
ShubNoor47 vues
OSMC 2023 | Will ChatGPT Take Over My Job? by Philipp Krenn par NETWAYS
OSMC 2023 | Will ChatGPT Take Over My Job? by Philipp KrennOSMC 2023 | Will ChatGPT Take Over My Job? by Philipp Krenn
OSMC 2023 | Will ChatGPT Take Over My Job? by Philipp Krenn
NETWAYS22 vues

Cyber warfare capabiliites : A Reality Check

  • 2. Confession I am Naive I don’t know the nuances of Cyber World Vocabulary Rajeev Chauhan
  • 3. CYBER WAR Definition The use of computer technology, most prominently the internet, in order to disrupt, deny or degrade the capabilities of an adversary, to an extent that it cripples its day to day activities Rajeev Chauhan
  • 4. AIM To degrade the capabilities of an adversary with ultimate goal of coercing adversary for a political purpose, besides hacking into the servers, stealing sensitive information. Rajeev Chauhan
  • 5. HISTORY 1982 • The Soviet Union planned to steal software from a Canadian company to control its Trans-Siberian Pipeline, • the CIA alters the software to cause the pipeline to explode. 1986 • A hacker tracked to Germany by a researcher in US over a period of 10 months • First recorded case of such investigation 1988 • Morris worm shuts down 10% of internet • First case of conviction for cyber crime 1994 • Computers hacked at the Rome Air Development Center at Griffiss Air Force Base New York by anonymous hacker and sensitive data stolen Rajeev Chauhan
  • 6. HISTORY 1997 • The NSA conducts a test, known as Eligible Receiver, to assess the vulnerability of government and military computers to a cyberattack 1998 • DoD establishes Joint Task force to defend computer networks 2001 • The worm named Code Red affects computer networks running a Microsoft operating system. Some websites, including the White House site, are disabled. 2003 • Operation Titan Rain : US targeted allegedly by China for stealing info Vulnerable systems . Rajeev Chauhan
  • 7. HISTORY 2007 • Estonia experiences DoS for 22 days by the hackers believed to be backed by Russian Government. • British and US Government officials alleged that official emails accounts hacked by PLA 2008 • Georgia faces DDoS attack and blames Russia for that. Media Transportation and Government Computer Networks crippled • First case of data stealing through a flash drive using covert program at US base in Middle East. 2009 • Israel Government sites subjected to Spam mail to the tune of 15 million emails per second. Israel blamed Hamas. • 103 country including Indian Government and embassies computers hacked allegedly by China, 2010 • Sensitive information stolen from Ministry of Defence Computers in India, suspect is China • Stuxnet cripples Iranian Nuclear installation. • Pentagon Declares Cyber War as Fifth domain Rajeev Chauhan
  • 8. HISTORY 2011 • IMF computers hacked , fingers point towards China • Hackers delete hard drives of 30k computers in Saudi oil company. • Military Wing of HAMAS carry out massive DDoS against nine US banks. • U.S. Secretary of Defense Leon Panetta warns that the U.S. must protect itself against a “Cyber Pearl Harbor." 2013 • The New York Times Website shut down for 20 hours by Syrian Electronic Army. 2014 • Chinese hackers had breached the computer network of the Office of Personnel Management in March. • The computer networks of Sony Pictures were hacked, allegedly by North Korea 2015 • The Russian hackers penetrated the email archives of White House and State Dept. officials correspondence with President Barack Obama. Rajeev Chauhan
  • 9. CYBER WAR • Transition in dimensions of warfare from physical to Cyber space. • Assumed importance as fifth dimension. • Security of cyberspace based on traditional axioms of threats • Affects Confidentiality, Integrity and Availability besides new realm of Data Thefts. Rajeev Chauhan
  • 10. CYBER WAR • Cyber warfare is closely related to other aspects of cyber threats such as cyber crime, cyber terrorism, cyber espionage and cyber spying. • Cyber war also includes the development and implementation of security strategies to defend against such attack mechanisms. Rajeev Chauhan
  • 11. CYBER WAR • At least 12 of the world’s 15 largest military powers are currently building cyber warfare programs, according to James Lewis, a cyber security expert at the Center for Strategic and International Studies. • The US has had a major influence on the development of cyberspace by virtue of the fact that much of the initial infrastructure and use was centered in that country and it continues to be a major force in its development and use. Rajeev Chauhan
  • 12. CYBER WARFARE • Recce • Enum • Foot printing • System hacking/attack – DDos – Trojans/backdoors – Virus/Worms – Session hijacking • Maintain Contact • Remove traces Rajeev Chauhan
  • 13. CYBER WARFARE CAPABILITIES – China – US – UK – North Korea – Australia – Israel – Iran – Russia – Germany – Netherlands – India • Countries with capabilities to launch Cyber war Rajeev Chauhan
  • 15. CHINA • Admitted to having a dedicated Cyber War launching capabilities. • According to the cyber security firm Mandiant, the People’s Liberation Army (PLA) has been using an elite cyber warfare unit based in Shanghai to launch hundreds of cyber attacks targeting mainly American. • The unit, officially known as Unit 61398, operates under the PLA’s Second Bureau of the General Staff Department’s (GSD) Third Department. • The PLA’s Unit 61398 is known for its use of zero-day exploits. According to Mandiant, Unit 61398’s informal name was APT1 due to their skill at successfully carrying out advanced persistent threats. Rajeev Chauhan
  • 16. CHINA • China has “reached out” to people with the necessary cyber skills in the IT sector and academic community to help fill any gaps in state expertise and personnel when needed. • In October 2014, the FBI issued a warning that a Chinese hacking collective known as Axiom has been engaged in a sophisticated campaign to steal valuable data from U.S. government agencies. Rajeev Chauhan
  • 17. CHINA • Taiwan’s National Security Bureau (NSB) has identified another unit of the GSD’s Third Department that is involved in cyber- activities.(source Taipei Times) • China’s cyber capabilities are organized by a strategy involving “to establish information dominance.” • Information dominance refers to: – taking and maintaining control of an adversary’s access to its own information, and – disrupting the flow of information necessary for “decision-making or combat operations.” Rajeev Chauhan
  • 18. US Rajeev Chauhan Images: Copyright of respective owners
  • 19. US • United States Cyber Command (USCYBERCOM) is an armed forces sub-unified command subordinate to United States Strategic Command and centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks. (wiki). • The Army Cyber Command (ARCYBER) is an Army component command for the U.S. Cyber Command: – Army Network Enterprise Technology Command / 9th Army Signal Command – Portions of 1st Information Operations Command (Land) – United States Army Intelligence and Security Command will be under the operational control of ARCYBER for cyber-related actionsRajeev Chauhan
  • 20. US • Marine Corps Forces Cyberspace Command • Navy Cyber Forces • Twenty-Fourth Air Force with following components – 67th Network Warfare Wing – 688th Information Operations Wing – 689th Combat Communications Wing • United States Tenth Fleet, consisting of – Naval Network Warfare Command – Navy Cyber Defense Operations Command – Naval Information Operation Commands – Combined Task Forces Rajeev Chauhan
  • 21. US • Cyberwarfare in the United States is the United States Cyber Command's military strategy of Proactive Cyber Defence and the use of cyber warfare as a platform for attack. • The five pillars is the framework for the United States military strategy for cyber warfare. – Cyberspace as new warfare domain – Proactive defense – Critical infra protection – Collective defense – Maintain and enhance the advantage of technological change Rajeev Chauhan
  • 23. UK • Britain will create a new cyber unit which will be known as the Joint Cyber Reserve.(2013) – will be tasked primarily with defending the UK against cyber attacks – will also have the capability to launch strikes where deemed necessary • Ministry of Defence (MoD) will be looking to employ hundreds of IT experts who will be responsible for defending the nation’s critical data and computer networks. • Cyber defences blocked around 400,000 advanced malicious cyber threats against the government’s secure internet alone Rajeev Chauhan
  • 24. UK • An Army unit, called the 77th Brigade, is set up to help fight the cyberwars of the future. – Made up from reservists as well as regulars from all three services of the armed forces. – The team is modelled on the Chindits, a specialist unit which fought in Burma during the Second World War. – “clinical cyber strikes” could be used to disable key military assets such as nuclear and chemical weapons, enemy communications and other tools of war. Rajeev Chauhan
  • 25. GCHQ (Government Communication Head Quarter) • GCHQ is an intelligence and security organisation, working to keep Britain safe and secure in the challenging environment of modern communications • GCHQ strives to ensure that life in the UK isn't compromised through cyber attack or on-line serious crime, employing some of the world's leading experts on Information Security (how do we work). • GCHQ and its sister agencies, MI5 and the Secret Intelligence Service, could not tackle the cyber challenges "at scale" without greater support from the private sector, including the largest US technology companies which dominate the web. Rajeev Chauhan
  • 27. NORTH KOREA • Cyber attacks like the one inflicted by the North Korean government on Sony are just the opening skirmishes before the outbreak of a hugely dangerous cyber war that is inevitable. • North Korea has natural cyber-defenses • Why? – it only has about 1,000 IP addresses, – it has only very few computers so its 'terrain' is very defensible. Rajeev Chauhan
  • 28. AUSTRALIA • Recent references in cooperation with US in spying on Asian countries, especially India. • Australian Signals Directorate with support from the Defence Science and Technology Organisation has developed new cyber offensive capabilities in 2014, to carryout, – DoS – Access, modify and Delete Data remotely – Dissemination of False Information – Penetration of FW protecting Avionics of targets, inserting Trojan Horses • Part of 5-Eye partners....US, UK, Canada, Australia and New Zealand. Rajeev Chauhan
  • 29. ISRAEL • IDF has announced in June – Establish a Cyber Command within two years. – Includes Military Intelligence and C4I Telecommunications division. • Contribute towards the overall IDF Cyber Potential. • Challenges would be to attain both long range planning and precise execution capabilities at different level with optimal degree of operational flexibility in both offensive and defensive theatre. • DMI’s 8200 signal intelligence unit was handling int collection and offensive missions, whereas C4I directorate was handling cyber defensive missions. Rajeev Chauhan
  • 30. ISRAEL • Salient points:- – The cyber command will be in charge of both the buildup and operational missions. – DMIs working in cyber space in conjunction with conventional intelligence gathering missions has not contributed to overall operational effectiveness. – Synergy between DMIs intelligence gathering and offensive setup with various cyber units. – Reciprocal data gathering and dissemination amongst other branches. – Maximum operational cooperation and coordination between New Command and other IDF forces and units – Coordination with civilian agencies like National Cyber Bureau and Cyber Authority.Rajeev Chauhan
  • 31. IRAN • Since November 2010, an organization called “The Cyber Defense Command” has been operating in Iran under the supervision of the country’s “Passive Civil Defense Organization” a subdivision of the Joint Staff of Iranian Armed Forces. • According to a 2014 report by Institute for National Security Studies, Iran is "one of the most active players in the international cyber arena“. • In June 2010, Iran was the victim of a cyber attack when its nuclear facility in Natanz was infiltrated by the cyber- worm ‘Stuxnet’. Thereafter it has learnt a lot and developed a potent cyber warfare capabilities. Rajeev Chauhan
  • 32. RUSSIA • It has been claimed that Russian security services organized a number of denial of service attacks as a part of their Cyber-warfare against other countries, most notably – 2007 cyber attacks on Estonia – 2008 cyber attacks on South Ossetia, Georgia, and Azerbaijan. • The Russian government had been fostering and financing the Nashi youth organization for more than years. Nashi members were involved in the Estonia cyber attacks of 2007, Georgian govt websites in 2008 and targeted individual Georgian supporters in 2009 Rajeev Chauhan
  • 33. RUSSIA • Since 2010, Russia like the U.S., China and other countries has made dual use information security research and development a top priority at dozens of top research institutes and universities. • At least twelve institutes provide world-class instruction to their graduates in dual use information security and electronic warfare technologies, who are then hired by the Security Services and Ministry of Defense for offensive and defensive operations. Rajeev Chauhan
  • 34. NETHERLAND • In the Netherlands Cyber Defense is nationally coordinated by the National Cyber Security Center (NCSC). • The Dutch Ministry of Defense laid out a cyber strategy in 2011. • The first focus is to improve the cyber defense handled by the Joint IT branch (JIVC). • Joint Sigint Cyber Unit (JSCU) has been setup with an aim to improve intel operations in the Netherlands (including the military intel organization MIVD) • The Ministry of Defense has set up an offensive cyber force, called Defense Cyber Command (DCC) Rajeev Chauhan
  • 35. GERMANY • In 2013, Germany admitted the existence of their 60- person Computer Network Operation unit. • The German intelligence agency, BND, announced that his agency had observed up to five attacks a day on government authorities, thought mainly to originate in China. • After Edward Snowden leaked details of the U.S. National Security Agency's cyber surveillance system, Germany announced that the BND would be given an additional budget of 100 million Euros to increase their cyber surveillance capability. Rajeev Chauhan
  • 36. INDIA: Why? • Cyber Attacks affecting national infrastructure through – Sensitive information leaks….Confidentiality – Malicious programs effecting critical operations and applications like power, communication etc….. – Denial of Services, bringing down critical financial and banking infrastructure….effecting their Availability. • Attack on availability of CII is grave in nature as it has direct impact on national assets and their functioning. • All types of threats to be addressed in any National Cyberspace Protection Policies and Procedures. Rajeev Chauhan
  • 37. INDIA: Where do we stand? • Indian Cyberspace subjected to frequent attacks by China, Pakistan, US, UK, Bangladesh, Anonymous • Cyber Security Policies …implementation? • Agencies..CERT-IN, NTRO, NCCC(National Cyber Coord Committee), NATGRID, NCIIPC • Potent offensive capabilities • Capability to sustain • Disaster management and continuity plan • Robustness of CII Rajeev Chauhan
  • 38. • Chinese are focused…are we! • Offensive and Defensive capability…. Rajeev Chauhan
  • 40. References 1. http://strategicstudyindia.blogspot.in/2014/02/cyber-warfare-and- information-security.html 2. http://thediplomat.com/2015/04/chinas-growing-cyberwar-capabilities/ 3. http://bhconsulting.ie/securitywatch/?p=1739 4. http://www.bbc.co.uk/newsbeat/article/31074227/the-internet-is-the- new-frontline-as-uk-sets-up-army-cyber-unit 5. https://en.wikipedia.org/wiki/United_States_Cyber_Command 6. http://www.esecurityplanet.com/network-security/cyber-war-is- hell.html?utm_source=dlvr.it&utm_medium=twitter 7. Australian Defence Review. 8. http://jeffreycarr.blogspot.in/2014/03/russian-cyber-warfare-capabilities- in.html 9. http://www.infoplease.com/world/events/cyberwar-timeline.html Rajeev Chauhan