Professional Documents
Culture Documents
The nation is vulnerable to new forms of terrorism ranging from cyber attacks to attacks on military bases abroad to ballistic missile attacks on U.S. cities. Wars in the 21st century will increasingly require all elements of national power not just the military. They will require that economic, diplomatic, financial, law enforcement and intelligence capabilities work together.
Secretary Rumsfeld address to the National Defense University, January 31, 2002.
Discussion
Critical Infrastructures
Where the Crown Jewels Are
Power Outages
Poisoned Water Supply
Telephone Outages
Bridges Down
Airliner Crash
Oklahoma City
Unrelated Events or
National Security Reduce the U.S.s ability to protect its interests Public Psyche Erode confidence in critical services and the government Economic impact Damage economic systems Enhancement of Physical Attacks Physical damage/distraction efforts Asymmetric Warfare Lack of attribution, low cost/high potential
Globalization of infrastructures = vulnerability Anonymous access to infrastructures via the Internet and SCADA
Interdependencies of systems make attack consequences harder to predict and more severe Malicious software is widely available and does not require a high degree of technical skill to use
Vulnerability Types
Computer based Poor passwords Lack of appropriate protection/or improperly configured protection Network based Unprotected or unnecessary open entry points Personnel based Temporary/staff firings Disgruntled personnel Lack of training Facility based Servers in unprotected areas Inadequate security policies
Al-Qaeda
Al-Qaeda laptop found in Afghanistan contained: Hits on web sites that contained Sabotage Handbook Handbook Internet tools, planning a hit, anti-surveillance methods, cracking tools Al-Qaeda actively researched publicly available information concerning critical
Terrorist Groups
Terrorists
Attention must be paid to studying the terrorists: Ideology History Motivation Capabilities
Terrorists
Terrorism is carried out by disrupting activities, undermining confidence, and creating fear In the future, cyber terrorism may become a viable option to traditional physical acts of violence due to: Perceived anonymity Diverse targets Low risk of detection Low risk of personnel injury Low investment Operate from nearly any location
Hacktivism
Cyber Facilitated Terrorism Cyber terrorism
Resource Denial Virus/malicious code Legitimate traffic overwhelms site (unauthorized high-volume links) DoS DDoS WWW Defacement Defacement to embarrass Content modification to convey message Content modification as component
System Compromise Data destruction Data modification Information gathering Compromised platform : Launch pad for attacks Jump off point for other compromises Target Research and Acquisition Internet makes significant amounts of data instantly and anonymously
Hacktivism
Hacktivism is hacking with a cause and is concerned with influencing opinions on a specific issue.
Example: ELF hacks into the web page of a local ski resort and defaces the web page. This is done to reflect the
Hacktivism
Electronic Disturbance Theater
Smithsonian Mental Institution
Web sites also contain information necessary to construct weapons, obtain false identification
6. Feroz Abbasi
4. Zacarias Moussaoui
5. Richard Reid
3. Kamel Daoudi
7. Nizar Tribelsi 1. Finsbury Park Mosque, North London
2. Djamel Beghal
9. Abu Qatada
8. Abu Hamza
Kamel Daoudi
Believed to be AlQaeda Cyber Terrorist. Arrested for alleged involvement in plot to bomb American Embassy in Paris
Cyberterrorism
Cyberterrorism is a criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or
Technical Feasib
Operational Practicality
Availability of Capability
1945
1955
1960
1970
1975
1985
Today
Cruise Missile Precisi Compute Strategic Missiles on Invasi Nuclear ICBM & SLBM Guided on Weapons
International Investigations
Cyber Evidence in USA
MLAT
Request
Joint
Liaison Critical Infrastructure Companies, i.e. FBI InfraGard Internet Service Providers Universities Internet Cafes Hacker clubs IT companies, developers International, local law enforcement Look on the Internet Coordinate - national security, terrorist
Conclusion
Our national security, databases, and economy are extremely dependent upon automation
Therefore, there exists a target rich environment for those who would do harm via the Internet Our critical infrastructures require joint private/public efforts to protect them