understanding and distinguishing among cyber activities dave piscitello vp security and ict...
TRANSCRIPT
understanding and distinguishing among cyber activities
Dave Piscitello
VP Security and ICT Coordination,
ICANN
cy·ber (sībər) adjective
of, relating to, or characteristic of the culture
of computers, information technology, and
virtual reality
this formal definition is often unhelpful when
cyber is used in conjunction with other terms
because it does not provide context
context for cyber activities
MEANS FINANCIALability to finance actions
TECHNOLOGICAL ability to digitally mediate actions
INTELLECTUALability to plan and act (talent)
MOTIVE POLITICAL AIMBUSINESS AIMFINANCIAL GAINNOTORIETY…
OPPORTUNITY
ACCESS TO INTERNETthe digital mediation playing field
closer look at… means• technology and talent for cyber activities must be
financed
– these are cost centers for legitimate or criminal enterprises
• commercial, NGO, or government financing is
largely pay for digital goods, bounties, or open
source (and sweat equity)
• criminal financing encompasses use of stolen or
exploited goods and bartering for digital goods –
credit cards, botnets, software – in an underground
economy
• activism uses open source; hacktivism may use
criminal means
a closer look at… opportunity• the Internet is an open access, common
technology infrastructure
• its power derives from adaptability
• these characteristics serve all actors,
according to their aim
a closer look at… motive
• political aim: everything from controlling,
oppressing, or inciting citizenry to
opposition against suppression of rights
or free speech
• commercial aim: from corporate
espionage to tracking/profiling consumers
cybersecurity body of
practices and
measures to
protect
networks,
computers, and
data from
digitally-
mediated
attacks
https://www.flickr.com/photos/splorp/
cyberattackan “online” or
digitally
mediated attack
against digital or
physical world
assets or
infrastructures
1100 1110 01111010 1101 0000 1010 0100 0111 1111
0111 1101 0000 1010 1010 0100 01111010 1111 1121
1100 1110 1010 0111 110 1101 0000 1010 1010 1010
1100 1010 1110 0111 1101 0000 1010 0100 0111 1111
0111 1101 0000 1010 1010 1010 0100 0111 1111 1121
1010 1100 1110 0111 110 1101 0000 1010 1010 1010
1100 1010 1110 0111 1101 0000 1010 0100 0111 1111
0111 11011010 0000 1010 1010 0100 0111 1111 1121
1010 1100 1110 0111 110 1101 0000 1010 1010 1010
1100 1110 0111 1101 0000 1010 1010 0100 0111 1111
1010 0111 1101 0000 1010 1010 0100 0111 1111 1121
1100 1110 0111 110 1101 1010 0000 1010 1010 1010
1100 11101010 0111 1101 0000 1010 0100 0111 1111
0111 1101 0000 10101010 1010 0100 0111 1111 1121
1100 1110 0111 110 1101 0000 1010 1010 1010 1010
A T T A C K
cybercrime
online activity
that has been
classified as a
crime, or an
online activity
that is committed
in violation of lawhttps://www.flickr.com/photos/23905174@N00/
cyberwarfare
Digitally
mediated
attacks on a
nation state
by a nation
statehttps://www.flickr.com/photos/58687716@N05/
cyberterrorism
Digitally
mediated
intimidation
attack on a
nation’s
citizenry by
civilians to
personalize war
cybersurveillance
Digitally
mediated and
covert
information
monitoring or
collection
NDTV Convergence Limited
cyberactivism“hacktivism”
Digitally-mediated
protest against
commercial or
non-commercial
entities or a
nation state a
group or
individual
https://www.flickr.com/photos/foto_db/
cybervandalism
Digitally-mediated
destruction of, or
damage to,
commercial or
non-commercial
entities or a nation
state a group or
individual
activities are rarely “exclusively ciber”
• activities in cyberspace are not that
unique from activities in the physical world
• the Internet is the shared playing field
• consider M M O – means, motive,
opportunity – and you’ll find it easy to
distinguish activities
questions?