Terrorism online and the change of modus operandi

Similar documents
CYBER SECURITY IN INDIA

Top 5 Data Breaches in 2014

INSIDE. Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Safety & Security: Cyber Security

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

The Strategic Importance, Causes and Consequences of Terrorism

Hackers: Detection and Prevention

Gregg Gerber. Strategic Engagement, Emerging Markets

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Security and Privacy

TUSKEGEE CYBER SECURITY PATH FORWARD

Oil and Gas Industry A Comprehensive Security Risk Management Approach.

Integration of Financial Investigation into Counter Terrorism Strategy

Cyber Adversary Characterization. Know thy enemy!

The Battlefield. critical infrastructure:

Name. September 11, 2001: A Turning Point

CYBER SECURITY IN INDIA'S COUNTER TERRORISM STRATEGY

Computer Networks & Computer Security

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach.

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

EY Cyber Security Hacktics Center of Excellence

Is Penetration Testing recommended for Industrial Control Systems?

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Network Security Threat Matrix May 2004

NATO & Cyber Conflict: Background & Challenges

CHAPTER 10: COMPUTER SECURITY AND RISKS

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Examples of International terrorist attacks since 9/11

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Information Technology Security for Small Business (video script) Descriptive Text for the Visually Impaired August 11, 2009

Cyber Security Awareness. Internet Safety Intro.

Research Note Engaging in Cyber Warfare

Pennsylvania House Veterans Affairs and Emergency Preparedness Public Hearing

Security Threats on National Defense ICT based on IoT

Process Solutions. Staying Ahead of Today s Cyber Threats. White Paper

Cedric Leighton, Colonel, USAF (Ret) Founder & President, Cedric Leighton Associates

Who Are The Enemies? What Can They Do?

Safety and security are simply good business.

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Information Protection in Today s Changing Mobile and Cloud Environments

A Systems Engineering Approach to Developing Cyber Security Professionals

Changes in modus operandi of Islamic State terrorist attacks

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Protecting Organizations from Cyber Attack

Emerging Trends in Malware - Antivirus and Beyond

CYBER THREATS TO NATIONAL SECURITY. SPECIFIC FEATURES AND ACTORS INVOLVED

Covert Operations: Kill Chain Actions using Security Analytics

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

Practical guide for secure Christmas shopping. Navid

WEB ATTACKS AND COUNTERMEASURES

Computer Network Security for ASCs A Panel Discussion to Raise Awareness

The anatomy of an online banking fraud

Espionage and Intelligence. Debra A. Miller, Book Editor

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

A New Obstacle For Cyberinsurance Coverage

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

NCIS Overview. Prevent Terrorism Protect Secrets Reduce Crime

Advanced & Persistent Threat Analysis - I

Internet security: Shutting the doors to keep hackers off your network

WHAT BUSINESSES SHOULD KNOW ABOUT CYBERTERRORISM

E3211. DOT Hazmat Security Awareness. Leader s Guide

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Network Security Foundations

Surviving the Ever Changing Threat Landscape

Nuclear Projection of the United States

Promoting a cyber security culture and demand compliance with minimum security standards;

Emerging risks for internet users

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

WHITE PAPER Security in M2M Communication What is secure enough?

Research Topics in the National Cyber Security Research Agenda

The Hidden Dangers of Public WiFi

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Know the Risks. Protect Yourself. Protect Your Business.

What is Cyber Liability

Penetration Testing Service. By Comsec Information Security Consulting

Project 25 Security Services Overview

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

EXIN Information Security Foundation based on ISO/IEC Sample Exam

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

Keren Elazari Hackers: The Internet s Immune System

Cyber Threat Summit Brochure

FERPA: Data & Transport Security Best Practices

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

AT A HEARING ENTITLED THREATS TO THE HOMELAND

STATE OF CYBER SECURITY IN ETHIOPIA

RMAR Technologies Pvt. Ltd.

Promoting Network Security (A Service Provider Perspective)

Transcription:

Terrorism online and the change of modus operandi 13th ICCRTS C2 for Complex Endeavours Topic 7: Network-Centric Experimentation and Analysis Track 209 June 19th, 2008 Dr Roland Heickerö

Purpose The purpose is to describe the development of new types of electronic and digital threats on the society such as cyber terrorism Insurgent s motives, logic and usage of information warfare means and weapons are discussed

Outline Principles of information warfare Effects of cyber attacks Differences between traditional terrorism & cyber terrorism Actors and antagonists within cyber space Change of cyber terrorism modus operandi; the al-qaeda example Conclusions

Principles of Information Warfare

Assumptions The modern society is getting more and more dependent on electronics, advanced telecommunications, energy supply systems, information/computer networks etc. A cyber attack against these systems will lead to serious consequences for the society, for companies as well as individuals The systems have inherent a number of vulnerabilities and dependencies. For instance, if the power resources are crippled it cause a cascading outage that can cripple the complete ICT system

Information warfare comprise of: Wire tapping Destruction Manipulation Jamming Distortion against networks, information and communication systems as well as the produced information

Information Warfare With Computer Network Operation (CNO) & Electronic Warfare (EW) weapons it is possible to attack critical infrastructure Asymmetrical approach; cheap, cost effective Act anonymously difficult to identify the aggressor Long distance Tools for CNO could be used for protection as well as attacks No rules in digital world, legal implications

Effects of cyber attacks Physical effects: physical destruction of information structures with the consequences that the information system could not be used properly (DOS), to knock out electronics with EW weapons such as EMP Syntax effects: to attack system logic by delaying information and to develop unpredictable behaviors using CNO tools (viruses, trojans, hacking) Semantic effects: to destroy the trust in a system by manipulation, change of information and deception that affect the decision making process

Traditional terrorism & cyber terrorism

Terrorism in general Definition: violence or threat of violence, used and directed in pursuit of, or in service of political aim (Hoffman, 1998) Classification: a) political-ideological b) ethnical-religious c) state sponsored d) criminal driven

Traditional terrorism Logic: Terrorism is based on fear, unpredictable attacks, chock effects, grandiose, asymmetric, mass media attention Means: & methods Suicide bombers, explosives, strive to get weapons for mass destruction, the Internet could be used as a tool for coordination of activities

Cyber terrorism Cyber: Generic term for a number of hostile activities terrorism against critical information infrastructure such as the SCADA system, fear for an electronic Pearl Harbor Logic: Two: opinions Well educated individuals, good knowledge of ITsystems, no suicide bombers but with a politicalreligious cause, media attention is not necessary a goal a) The threat is massive or b) exaggerated, no casualties so far

Actors and antagonists in the cyber space Types: Organizations: Resources: a) script kiddies b) crackers, hackers and hacktivists c) cyber terrorists d) insiders Hierarchical, decentralized, ad-hoc networks autonomous cells etc. Personal, economical and logistical, knowledge in and access to CNO and EW weapons

Resources and means Cyber weapons: logical bombs, worms, viruses, and trojans, EW equipment for monitoring and jamming, EMP pulse weapon, BOT nets used for DOSattacks Actions: Targets: remote, long distance, closed peer-to-peer networks, avoid digital tracking, stegonography, use the Internet for coordination, information seeking, social engineering depends on the objectives and available means and resources, mainly civilian

Actor-target-effect chain actors motives resources targets activities effects antagonists driving forces means objects realizations consequences (organizational structures, risk willingness, ethical/moral limitations) (social, psychological, economical, political) (weapons, economy, methods, logistics, personal) (infrastructure, organizations, individuals, symbols) (planning, realization, disorganization, revision) (physical. syntax, semantic effects immediateindirect)

Information available on the Internet the locations of target objects

Information available on the Internet blueprints describing the target

Information available on the Internet equipment to be used EMP Shock Generators

Information available on the Internet how to purchase and the costs Assembled shock wave generators in choice of 28 vdc or 115 vac Pulse rate 20 per minute - Require emitter antenna. EMP150-150 Joules 15 KV 20 KA...$3495.00 EMP250-250 Joules 25 KV 30 KA...$4795.00 EMP400-400 Joules 40 KV 45 KA...$6495.00 to be ordered at www

Information available on the Internet andbulletin boards discussing security holes, vulnerabilities within computer systems, how to download and use malware, methods on how to conduct hacker activities etc.

Change of cyber terrorism modus operandi; the al-qaeda example

The terror organization enters the cyber arena In matter of time, you will se attacks on the stock market. I would not be surprised if tomorrow, I hear of a big economic collapse because of somebody attacking the main technical systems in big companies e-mail correspondence in 2005 between al-muajirun leader Omar Bakri to a well known al-qaeda sympathizer that hundreds of young men have pledged to him that they were ready to die and that hundreds of Muslims scientist were with him and who would use their knowledge in chemistry, biology and ranging from computer to electronics against infidels Bin Ladin to Hamid Mir, editor of newspaper Ausuf

Strategy and way of working using dispatchers for co-ordinate information gathering about target objects, to synchronize contact people towards hackers & cracker community, method based on piece of a puzzle

al Qaeda top management Example of possible process in order to prepare for a cyber operation Dispatchers Unix Networks Windows Data bases Contact persons Bulletin boards, hacker community @ @ @ @ @ @

al Qaeda top management Information about target object is requested Questions on vulnerabilities and methods how to attack Dispatchers Unix Networks Windows Data bases Sub questions added to contact persons Contact persons Bulletin boards, hacker community @ @ @ @ @ @ Fake usernames, add questions

al Qaeda top management Order a cyber attack! Analysis, suggestion on methods how to attack target object Dispatchers Contact persons Unix Networks Windows Data bases Picture of target system and its vulnerabilities Bulletin boards, hacker community @ @ @ @ @ @ Answers from the boards

Why using dispatchers? + Reduce the own network vulnerabilities + Limit the cyber terror network knowledge of its own size and channels + Reduce damage if counter insurgency authorities discover the network

Conclusions -Terrorism in the cyber arena is a growing problem - In order to reduce danger to the open society from online threats it is important to gain knowledge and to develop strategies for counter actions - The methods has to be adapted to the change of insurgent logic and modus operandi - Co-operation between law enforcement agencies and organizations around the globe is a necessity

Questions?

roland.heickero@foi.se Some pictures are provided by fotolia