cybersecurity write your response papers!| paper drafts due tuesday!write your response papers!|...
TRANSCRIPT
CYBERSECURITYWrite your response papers!| Paper Drafts Due Tuesday!
CYBER SECURITY
• Warfare v. espionage? • State AND non-state actors• Russian-Georgia War
(2008)– Estonia removing the statue
• 2002- radical Islamic clerics in Britain “in a matter of time you will see attacks on the stock market”
RESPONSES
• Why are cyber attacks so difficult to deal with?
• What interests are at play?
• What actors are involved?
• Is cyber security a “new” threat?
NOTHING NEW UNDER THE SUN
• Sources of power; economic wealth, military forces, ideas, and information
• Speed of communication • WWII Allies broke German
and Japanese codes• 2003 Invasion of Iraq
– Text messages
• Quantity of information – Accessibility becomes
important
DIFFICULTIES
• Often unreported – Don’t want to frighten
stockholders– unaware
• Actors are hard to track
• Expensive• Offensive advantage
TYPES OF CYBER ATTACKS• Botnet
– Denial of service attack (DDOS)
– Botmaster/botherder – Spam (please send me $$$ so I
can repay you)
• “packet sniffers”– Data blocks = packages– Tracking those data for specific
things (ex. passowords)– Argentinian guy breaking into
DOD Naval Research Lab
• “IP Spoofing”– Not really at the IP address you
think you are
• Worms/viruses– Trojan Horse
CYBERCRIME
• 2000 “ILOVEYOU”– Undergrad thesis project in
Philippines– 45 million CPUs, $10B– Never charged with a crime
• 2007- TJ Maxx lost $130 M– Attacks from US, Ukraine,
Belarus, Estonia, China
• 2010 US, UK, Ukraine– Zeus- getting bank account
passwords ~$70M
• Almost all cyber crime are transnational
CYBER-ESPIONAGE• NATO HQ attacked ~100X
per day• Moonlight Maze (US v.
Russia 1999), Titan Rain (US v. China ~10 terabytes of data 2003)– These computers weren’t
connected to the internet– “air gap” for US military =
SIPRNET– Thumb drives/physical
help to jump gap
• PRC as perpetrator
ARTICLE DISCUSSION
MICHAEL ANTI (ZHAO JING)
• http://www.ted.com/talks/michael_anti_behind_the_great_firewall_of_china.html (18 min. )
• China’s internet policy is both international and domestic
• What are the outcomes of these policies?
• What kind of power is displayed in his story?
CYBER-TERRORISM
• How is the internet useful for terrorists?
• Communication• Gathering information• Money raising• Attacking networks• Is the internet a “good”
place for a terrorist attack? Importance of spectacle?
CYBER WAR
• 1981, Soviet KGB “Farewell” started working for the French– US fed him bad technology intel
• Soviets were building a huge pipeline for natural gas– CIA tampered with it– Boom
• Does attribution matter when we talk about war?
WHAT TO DO?
• How do you attack this security threat?
• Domestic efforts• International efforts– Dual use technologies– Easy to hide– Privacy rights/
intellectual property rights