Switzerland's Security 2016

Total Page:16

File Type:pdf, Size:1020Kb

Switzerland's Security 2016 SWITZERLAND’S SECURITY Situation Report 2016 of the Federal Intelligence Service FIS SWITZERLAND’S SECURITY Federal Intelligence Service FIS Situation Report 2016 Papiermühlestrasse 20 CH-3003 Bern of the Federal Intelligence Service FIS www.fis.admin.ch / [email protected] SWITZERLAND’S SECURITY Switzerland’s Security 2016 Table of contents Security and sovereignty in uncertain times 5 The situation report in brief 7 Strategic environment in a state of flux 13 Focus on China 24 Violent extremism and terrorism motivated by religion and ethno-nationalism 33 Right-wing and left-wing extremism 53 Proliferation 63 Illegal intelligence 71 List of abbreviations 85 SITUATION REPORT 2016 | FIS 3 Security and sovereignty in uncertain times As the previously favourable security climate becomes more volatile, security policy is required to provide guidance. Our environment is characterized by rapidly growing complexity, and even the word ‘chaos’ is creeping into the language of security policy. It is being used as a rather inadequate description of the trend toward ‘fragmentation’: the sharp rise in the number of relevant players compared with past eras. Increasingly, many non-state players are able to influence Switzerland's internal and external security, both for good and for ill. In this environment, threats and dangers can often develop rapidly and surprisingly. They are becoming more unpredictable and the response times for decision-makers are shrinking. This is generating an atmosphere of uncertainty. The prob- ability of strategic surprises is growing. Providing security guidance under such conditions is a major challenge, and a reliable situation assessment is an indispensible requirement. It provides the basis for governing bodies to make deci- sions which will help to prevent strategic surprises and to guarantee security even in an increasingly uncertain environment. The intelligence service’s assessment of the threat situation, as presented in an unclassified version by the FIS in its annual report, using its situation radar tool, makes a substan- tial contribution to these security policy objectives. Every ship in turbulent waters relies on its own radar. This alone shows precisely those threats and dangers that are relevant to its position. However, this does not preclude the exchange of informa- tion with other ships in similar positions about risks lying in wait along the route. The situation is similar in the case of states. In a volatile security environment, it is natural to exchange information with other states about developments, risks and consequences. However, our coun- try decides independently on our external security-policy stance and the specific design of our internal security-policy instruments. This independence requires us to be willing and able to do our own information gathering, analysis and assessment. For this reason, the intelligence service is a particularly important tool for sovereign decision-making on security policy in Switzerland. The new Intelligence Service Act will increase its importance still further. It will im- prove the intelligence service’s information gathering, primarily where there are indications of an immediate threat to our own interests. It will optimise our own radar. The new Intelligence Service Act will in this way contribute to our security and our sovereignty. Federal Department of Defence, Civil Protection and Sport DDPS Guy Parmelin Federal Councillor SITUATION REPORT 2016 | FIS 5 The situation report in brief The complexity of the challenges facing the security authorities is increasing as the security environ- ment becomes fragmented due to the growing number of relevant players. The FIS uses its 'situation radar' tool to provide a certain amount of security policy guidance. It gives an overview of the se- curity situation, removing any unnecessary complexity, and identifies what the intelligence service sees as being the major issues facing Switzerland's inhabitants. ▪ Switzerland's strategic environment is land's strategic environment that will have marked by unusually high levels of stress lasting effects. Realistically possible secu- in Europe due to various crisis situations. rity scenarios in Europe fall into two broad These crises are long-term in nature, but they categories: in one of these, an understanding have all come to a head at around the same between East and West limits the conflicts time: the political and economic crisis over along the edges of the emerging zones of in- European integration, a new conflict situa- terest at an early stage, and in the alternative tion with Russia and the crisis situations in evolution, escalation gradually continues to the Middle East, the impacts of which have spiral upward over the next few years. been directly felt in Europe in the form of es- ▪ Syria is in many respects the epicentre of one calating migration movements and a height- of the crisis situations. The problems under- ened terror threat. lying the Arab Spring have not been brought ▪ For a number of years, Russia has opposed any closer to a solution anywhere in the re- the expanded EU and NATO in Eastern Eu- gion (with the possible exception of Tunisia), rope and has sought to consolidate its own and new crises have escalated (such as in sphere of influence on its borders. Ukraine is Yemen). The tensions between Saudi Ara- strategic territory and lies at the heart of this bia and Iran have the potential to cause par- ambition. Since the annexation of Crimea, ticularly far-reaching destabilisation of the force of arms has been used to prosecute the region. But it is in Syria that the expansion conflict; the armed conflict has left its mark of ‘Islamic State’ and signs of attrition of the on the Ukrainian economy and population. regime have internationalised the conflict to However, the country is also being weak- a whole new level. Russia took the strategi- ened by internal power struggles. Russia's cally significant decision to intervene on the influence can also be seen in Moldova, Be- side of the regime with its own armed forces. larus and Georgia. The conflict with Russia This step and the attacks by ‘Islamic State’ in will in all probability be a change in Switzer- Paris have given fresh impetus to efforts by SITUATION REPORT 2016 | FIS 7 THE SITUATION REPORT IN BRIEF the Western powers to exert influence. How- ▪ An agreement has been successfully reached ever, despite intensified military operations, with Iran in the shape of the Joint Compre- there is as yet no sign of a resolution of the hensive Plan of Action, thus overcoming one Syrian civil war, let alone a sustainable polit- of the challenges in the area of nonprolifer- ical solution. ation. This should prevent a nuclear-armed Iran for the next ten to fifteen years. Howev- ▪ The terrorist organisation ‘Islamic State’ er, the nonproliferation issue has not in any occupies the leadership role in the jihadist way diminished in importance as a result; movement. It took over this role from al-Qa- further efforts in this area are required in re- eda, but the potential threat from the latter lation to North Korea as well as Iran. has not diminished as a result. The threat posed by jihadist terrorism has increased ▪ Illegal intelligence is carried out in Swit- further in recent months, mainly due to the zerland, as elsewhere. The damage caused fact that ‘Islamic State’ is sending individu- by the theft of information is just one of the als to Europe on missions to plan or carry out resulting problems. The access which intelli- attacks. Switzerland is part of the European gence services obtain to persons, institutions threat area, and the threat level has also risen or electronic systems can potentially be ex- in this country. ploited not only in order to collect intelli- gence, but also for the purposes of manipula- ▪ Migration movements toward Europe have tion or even sabotage. Information obtained escalated over the course of the last year. by intelligence services can also be used for Despite rising numbers, Switzerland has un- information operations, the importance of til now been less affected by this than other which is increasing. In the area of informa- countries in Europe. Migration is not a se- tion security, the lessons that emerged from curity issue in itself, but individual aspects the Snowden affair remain as valid as ever. of migration certainly are. Notable among these are attempts by groups or individuals to reach Europe concealed within the mass flow of migrants in order to carry out terrorist attacks. The violent reactions of right-wing and left-wing extremists to developments in the area of migration and asylum also require close monitoring. The situation in Switzerland, unlike that in some countries in Europe, has been largely calm. Nonetheless, the potential for violence is present in both right-wing and left-wing extremist circles. 8 SITUATION REPORT 2016 | FIS SITUATION REPORT 2016 | FIS 9 Situation radar tool The FIS uses a situation radar tool to depict the threats affecting Switzerland. A simplified version of the sit- uation radar, without any confidential data, has also been incorporated into this report. The public version lists the threats that fall within the FIS’s remit, togeth- er with those classified under the categories of ’migra- tion risks’ and ’organised crime’, which are also relevant from the point of view of security policy. This report does not go into detail about these two categories, for more information on which readers are referred to the reports
Recommended publications
  • Rethinking Documentary Photography
    RETHINKING DOCUMENTARY PHOTOGRAPHY: DOCUMENTARY AND POLITICS IN TIMES OF RIOTS AND UPRISINGS —————————————————— A Thesis Presented to The Honors Tutorial College Ohio University —————————————————— In Partial Fulfillment of the Requirements for Graduation from the Honors Tutorial College with the degree of Bachelor of Arts in Art History —————————————————— by Jack Opal May 2013 Introduction I would like to think about documentary photography. In particular, I would like to rethink the limits of documentary photography for the contemporary. Documentary, traditionally, concerns itself with the (re)presentation of factual information, constitutes a record.1 For decades, documentary – and especially social documentary – has been under siege; its ability to capture and convey and adequately represent “truth” thrown into question, victim to the aestheticization of the objects, fading trust in their authors, and technological development. So much so that the past three decades have prompted photographer, documentarian, and art historian Martha Rosler to question first its utility, then its role, and finally its future in society. All of this has opened up the possibility and perhaps the need to reconsider the conditions and purpose of documentary practice, and to consider the ways in which it has been impacted by recent technological and historical developments. The invention of the internet and the refinement of the (video) camera into ever more portable devices and finally into the smartphone, and the rise to ubiquity within society of these inventions, signifies a major shift in documentary. So, too, have certain events of the past two decades – namely, the beating of Rodney King (and the circulation of the video of that event) and the development and adoption of the occupation as a major tactic within the political left.
    [Show full text]
  • Deterring Iran After the Nuclear Deal
    MARCH 2017 COVER PHOTO NIEL HESTER | FLICKR 1616 Rhode Island Avenue NW Washington, DC 20036 202 887 0200 | www.csis.org Lanham • Boulder • New York • London 4501 Forbes Boulevard Lanham, MD 20706 301 459 3366 | www.rowman.com Deterring Iran After the Nuclear Deal PROJECT DIRECTORS AND EDITORS Kathleen H. Hicks Melissa G. Dalton CONTRIBUTING AUTHORS Melissa G. Dalton Thomas Karako Jon B. Alterman J. Matthew McInnis Michael Connell Hijab Shah Michael Eisenstadt Michael Sulmeyer ISBN 978-1-4422-7993-3 Farideh Farhi Ian Williams Kathleen H. Hicks 1616 Rhode Island Avenue NW Washington,Ë|xHSLEOCy279933z DC 20036v*:+:!:+:! 202-887-0200 | www.csis.org Blank MARCH 2017 Deterring Iran after the Nuclear Deal PROJ ECT DIRECTORS AND EDITORS Kathleen H. Hicks Melissa G. Dalton CONTRIBUTING AUTHORS Melissa G. Dalton Thomas Karako Jon B. Alterman J. Matthew McInnis Michael Connell Hijab Shah Michael Eisenstadt Michael Sulmeyer Farideh Farhi Ian Williams Kathleen H. Hicks Lanham • Boulder • New York • London 594-68742_ch00_6P.indd 1 3/13/17 7:13 AM About CSIS For over 50 years, the Center for Strategic and International Studies (CSIS) has worked to develop solutions to the world’s greatest policy challenges. T oday, CSIS scholars are providing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organ ization headquartered in Washington, D.C. The Center’s 220 full- time staff and large network of affiliated scholars conduct research and analy sis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M.
    [Show full text]
  • Cyberwar: the ISIL Threat & Resiliency in Operational Technology
    Cyberwar: The ISIL Threat & Resiliency in Operational Technology Thesis Presented to the Faculty of the Department of Information and Logistics Technology University of Houston In Partial Fulfillment of the Requirements for the Degree Master’s of Information Systems Security By Gregory S. Anderson May 2017 Cyberwar: The ISIL Threat & Resiliency in Operational Technology ____________________________________ Gregory S. Anderson Approved: Committee Chair: ____________________________________ Wm. Arthur Conklin, PhD Computer Information Systems and Information System Security Committee Member: ____________________________________ Chris Bronk, PhD Computer Information Systems and Information System Security Committee Member: ____________________________________ Paula deWitte, PhD Computer Information Systems and Information System Security ____________________________________ ____________________________________ Rupa Iyer, PhD Dan Cassler Associate Dean for Research and Graduate Interim Chair for Department of Information Studies, College of Technology and Logistics Technology THIS PAGE INTENTIONALLY LEFT BLANK Acknowledgments First, I would like to thank Dr. Chris Bronk and Dr. Art Conklin for their support and guidance throughout my time at the University of Houston. Their dedication to students is unparalleled for any other professor I have come across during my education. I would also like to thank my family for their ongoing encouragement and love. The fostering environment to peruse knowledge and “never settle for less” has been a constant inspiration throughout my life. Lastly, to my partner of 7 years, Lorelei. None of my achievements these past few years would have come to fruition without her continuous love, support, and willingness to sacrifice for the greater good is deeply appreciated. Thank you for being the most patient and steadfast person I have ever known, I love you.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Coping with the Crisis: Managing Social Security in Uncertain Times
    www.issa.int Report Coping with the crisis: Managing social security in uncertain times The ISSA Crisis Monitor Project International Social Security Association, Geneva, 2012 Coping with the crisis: Managing social security in uncertain times ACKNOWLEDGEMENTS Produced under the responsibility of the ISSA’s Social Security Observatory, the report was authored by Ian Orton, with contributions from Alexander Belopopsky, Ariel Pino, Roland Sigg, Shea McClanahan and Simon Brimblecombe. Publications of the International Social Security Association enjoy copyright. Nevertheless, short excerpts from them may be reproduced without authorization for non-profit purposes on condition that the source is indicated. For rights of reproduction or translation, application should be made to the International Social Security Association, ISSA Publications, Case postale 1, CH-1211 Geneva 22, Switzerland. The designations employed herein, which are in conformity with United Nations practice, do not imply the expression of any opinion on the part of the ISSA concerning the legal status of any country, area or territory or of its authorities, or concerning the delimitation of its frontiers. While care has been taken in the preparation and reproduction of the data published herein, the ISSA declines liability for any inaccuracy, omission or other error in the data, and, in general, for any financial or other loss or damage in any way resulting from the use of this publication. The report is available in electronic format: www.issa.int First published January 2012. © International Social Security Association, 2012 Contents Executive summary 4 1. Introduction 5 2. Assessing the impact of the crisis 7 3. Responding to the crisis 9 3.1.
    [Show full text]
  • Cyber, Intelligence, and Security
    Cyber, Intelligence, and Security Volume 3 | No. 1 | May 2019 European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research David Siman-Tov and Mor Buskila The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it Pnina Shuker and Gabi Siboni The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber Stephen J. Cimbala Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests Sam Cohen Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons? Omree Wechsler The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West Kobi Michael and Aaron Kornbluth Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War Shmuel Even National Cyber Security in Israel Yigal Unna Cyber, Intelligence, and Security Volume 3 | No. 1 | May 2019 Contents European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research | 3 David Siman-Tov and Mor Buskila The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it | 27 Pnina Shuker and Gabi Siboni The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber | 41 Stephen J. Cimbala Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests | 71 Sam Cohen Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons? | 95 Omree Wechsler The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West | 117 Kobi Michael and Aaron Kornbluth Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War | 141 Shmuel Even National Cyber Security in Israel | 167 Yigal Unna The purpose of Cyber, Intelligence, and Security is to stimulate Cyber, and enrich the public debate on related issues.
    [Show full text]
  • Catalogue 24 Winter/Spring 2018
    CATALOGUE 24 WINTER/SPRING 2018 © Dargaud - Leo & Rodolphe NEW TITLES TO JUNE 2018 JANUARY APRIL P4 P5 P6 P14 P15 P16 P17 FEBRUARY MAY P7 P8 P9 P10 P18 P19 P20 MARCH JUNE P11 P12 P13 P21 P22 P23 Dear readers, welcome to Cinebook’s the threshold between sci-fi and fantasy, shenanigans in the Middle East. And Valerian to take us on a crazy adventure 24th catalogue. Thorgal must deal with the casual cruelty if you like planes, then please give a through time. Expect hilarity. Your response last year to our first of those who call themselves ‘civilised’ warm welcome to our new series Bear’s Finally, don’t miss the second adven- hardback collected edition was nothing in The Barbarian. Tooth – a story of flying, betrayal and ture of Mountie Trent. It’s a rare comic short of awe-inspiring, and we have We begin the second cycle of The friendship against all odds set in WW2. that manages to perfectly balance the more of them, with volumes 4 and 5 Last Templar, with FBI Agent Reilly and Different war with some new exploits serenity of the Canadian wilds, the quiet, of The Complete Valerian coming this archaeologist Tess Chaykin reuniting by The Bluecoats – training new recruits contemplative nature of a taciturn hero, semester. We also have another regular on a new treasure hunt. And speaking is hard when you don’t speak the same and a hefty dose of excitement when Valerian & Laureline title, as well as the of contemporary action-thrillers with language! Our old friend Lucky Luke he eventually gets his man – but Leo, brilliant one-shot Valerian
    [Show full text]
  • DISAPPEAR HERE Violence After Generation X
    · · · · · · · · · · · · · · · · DISAPPEAR HERE Violence after Generation X Naomi Mandel THE OHIO STATE UNIVERSITY PRESS / COLUMBUS All Rights Reserved. Copyright © The Ohio State University Press, 2015. Batch 1. Copyright © 2015 by The Ohio State University. All rights reserved. Library of Congress Cataloging-in-Publication Data Mandel, Naomi, 1969– author. Disappear here : violence after Generation X / Naomi Mandel. pages cm Includes bibliographical references and index. ISBN 978-0-8142-1286-8 (cloth : alk. paper) 1. Violence in literature. 2. Violence—United States—20th century. 3. Generation X— United States—20th century. I. Title. PN56.V53M36 2015 809'.933552—dc23 2015010172 Cover design by Janna Thompson-Chordas Text design by Juliet Williams Type set in Adobe Sabon Printed by Thomson-Shore, Inc. Cover image: Young woman with knife behind foil. © Bernd Friedel/Westend61/Corbis. The paper used in this publication meets the minimum requirements of the American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials. ANSI Z39.48-1992. 9 8 7 6 5 4 3 2 1 All Rights Reserved. Copyright © The Ohio State University Press, 2015. Batch 1. To Erik with love and x x x All Rights Reserved. Copyright © The Ohio State University Press, 2015. Batch 1. All Rights Reserved. Copyright © The Ohio State University Press, 2015. Batch 1. contents · · · · · · · · · List of Illustrations vi Acknowledgments vii introduction The Middle Children of History 1 one Why X Now? Crossing Out and Marking the Spot 9 two Nevermind: An X Critique of Violence 41 three The Game That Moves: Bret Easton Ellis, 1985–2010 79 four Something Empty in the Sky: 9/11 after X 111 five Not Yes or No: Fact, Fiction, Fidelity in Jonathan Safran Foer 150 six I Am Jack’s Revolution: Fight Club, Hacking, Violence after X 178 conclusion X Out 210 Works Cited 227 Index 243 All Rights Reserved.
    [Show full text]
  • Cisco 2010 Midyear Security Report
    Cisco 2010 Midyear Security Report The impact of global security threats and trends on the enterprise Web 2.0, mobility, virtualization, and other dramatic shifts in how we communicate and collaborate are carving out a new landscape for business and for enterprise security. The Cisco® Midyear Security Report examines these changes and their impact on the enterprise, and highlights other significant trends and threats creating security challenges for organizations worldwide. The report also includes recommendations from Cisco security experts designed to help enterprises strengthen their security. 2 Enterprises and the Tectonic Forces of Change Cisco Study: Collaboration Critical to Employee Success 4 The Technologic Shift: The Proliferation of Mobile and Connected Devices The Mobile Device Onslaught What’s Disrupting the Enterprise? Consumerization of IT Risk Alert: IP-Addressable Devices: Who’s Listening to Your Network? What’s Disrupting the Enterprise? Mobility 8 The Economic Shift: Virtualization of Operations What’s Disrupting the Enterprise? Virtualization 10 The Demographic Shift: The Role of Collaboration and Social Networks Social Media for Enterprises: Upside and Downside It’s 3 p.m.—What Are Your Employees Doing? Tending Their Virtual Fields What’s Disrupting the Enterprise? Social Media 13 Worldwide Government Trends: The Impact on Business Multiple Governments, Multiple Stances on Security Global Security Guidelines: Should Business Become a Player? U.S. Government Update Privacy Issues Moving to the Forefront 16 Taking Action
    [Show full text]
  • BENCHMARKING CYBER OPS 2018 an Initiative by Onnet for OOAT
    BENCHMARKING CYBER OPS 2018 An initiative by OnNet for OOAT //UNCLASSIFIED FOREIGN GOVERNMENT CYBER UNITS EXAMPLES • ISRAEL = UNIT8200 • US = U.S. CYBERCOM, NSATAO, DHS NCCIC • ISRAEL/US = “EQUATION GROUP” Name give by Kaspersky • UK = GHCQ-JTRIG, NCSC, MYNOC • SA = COMSEC • Australia = ASD • CANADA = CSEC • CHINA = PLA61398 • NKOREA = LAZARUSGROUP • RUSSIA = GRU6thDIR-FSO, GTsST • IRAN = INCA • DUTCH = JSCU AFRICA • Only cyber warfare unit known is under South African Government • Owned under National Intelligence Agency NIA • Formerly Electronic Communications Security ELS • Interagency with OIC, Office of Interception Centre EXAMPLES OF KNOWN NATION STATE CYBER WARFARE EVENTS • Estonia cyber attack by Russia • Crimea cyber attack by Russia • Operation Olympic games by TAO and Unit8200 (EquationGroup) against IRAN • Operation Nitro Zeus By TAO against IRAN by US • Operation Socialite by JTRIG/MYNOC, done by UK • Operation Rolling Thunder by JTRIG, operations by UK • Ethiopian use of HackingTeam software RCS to spy on ESAT journalists and Activists • Operation Aurora by Unit61398, operations in China • Operation Disttrack by ICA, Operations in Tehran to respond to US • Operation Turla Uroburos by Russian GRU6th Directorate in Russia • Operation DarkHotel Unit61398, from Israel EXAMPLES OF KNOWN NATION STATE CYBER WARFARE EVENTS • Sony pictures attack by LazarusGroup responding to a movie potraying Nkorea Leader • Red October – Unknown Nation State actor • Operation Ghostnet by Unit61398 from China • Operation NewsCaster by INCA in Tehran
    [Show full text]
  • The Day of the Cyber Wolf
    Regis University ePublications at Regis University All Regis University Theses Fall 2014 The aD y of the Cyber Wolf Ryan K. Buch Regis University Follow this and additional works at: https://epublications.regis.edu/theses Part of the Criminology and Criminal Justice Commons Recommended Citation Buch, Ryan K., "The aD y of the Cyber Wolf" (2014). All Regis University Theses. 210. https://epublications.regis.edu/theses/210 This Thesis - Open Access is brought to you for free and open access by ePublications at Regis University. It has been accepted for inclusion in All Regis University Theses by an authorized administrator of ePublications at Regis University. For more information, please contact [email protected]. Regis University College for Professional Studies Graduate Programs Final Project/Thesis Disclaimer Use of the materials available in the Regis University Thesis Collection (“Collection”) is limited and restricted to those users who agree to comply with the following terms of use. Regis University reserves the right to deny access to the Collection to any person who violates these terms of use or who seeks to or does alter, avoid or supersede the functional conditions, restrictions and limitations of the Collection. The site may be used only for lawful purposes. The user is solely responsible for knowing and adhering to any and all applicable laws, rules, and regulations relating or pertaining to use of the Collection. All content in this Collection is owned by and subject to the exclusive control of Regis University and the authors of the materials. It is available only for research purposes and may not be used in violation of copyright laws or for unlawful purposes.
    [Show full text]
  • Hacker, Hoaxer, Whistleblower, Spy: the Story of Anonymous
    hacker, hoaxer, whistleblower, spy hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York First published by Verso 2014 © Gabriella Coleman 2014 The partial or total reproduction of this publication, in electronic form or otherwise, is consented to for noncommercial purposes, provided that the original copyright notice and this notice are included and the publisher and the source are clearly acknowledged. Any reproduction or use of all or a portion of this publication in exchange for financial consideration of any kind is prohibited without permission in writing from the publisher. The moral rights of the author have been asserted 1 3 5 7 9 10 8 6 4 2 Verso UK: 6 Meard Street, London W1F 0EG US: 20 Jay Street, Suite 1010, Brooklyn, NY 11201 www.versobooks.com Verso is the imprint of New Left Books ISBN-13: 978-1-78168-583-9 eISBN-13: 978-1-78168-584-6 (US) eISBN-13: 978-1-78168-689-8 (UK) British Library Cataloguing in Publication Data A catalogue record for this book is available from the British library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the library of congress Typeset in Sabon by MJ & N Gavan, Truro, Cornwall Printed in the US by Maple Press Printed and bound in the UK by CPI Group Ltd, Croydon, CR0 4YY I dedicate this book to the legions behind Anonymous— those who have donned the mask in the past, those who still dare to take a stand today, and those who will surely rise again in the future.
    [Show full text]