Cyber Warfare an Analysis of the Means and Motivations of Selected Nation States
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Dialectical Versus Empirical Thinking: Ten Key Elements of the Russian Understanding of Information Operations
WARNING! The views expressed in FMSO publications and reports are those of the authors and do not necessarily represent the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government. Dialectical Versus Empirical Thinking: Ten Key Elements of the Russian Understanding of Information Operations CALL Publication #98-21 by Mr. Thimothy L. Thomas Foreign Military Studies Office, Fort Leavenworth, KS. This article was previously published in The Journal of Slavic Military Studies, Vol. 11, No 1 (March 1998), pp. 40-62. and Conflict Studies Research Centre, RMA Sandhurst, England, July 1997, Report AA29 Introduction Finding similarities in the Russian and U.S. approaches to information operations (IO) is not a difficult task. Both countries' specialists closely study electronic warfare and command and control systems of other countries, and both stress the importance of the use of computers and information management in the preparation and conduct of modern combat operations. This includes the use of information to conduct psychological operations (PSYOP). Upon closer examination, however, the Russian approach to the information warfare (IW) aspect of IO has several elements that makes it unique and different. There are three principal reasons for the distinct Russian method. First, there is the issue of overall context. The Russian state, economy, and society are in a transition period resulting in institutional and philosophical instability. Russian mass consciousness, according to many prominent scientists and government officials, is vulnerable to manipulation by slick marketing campaigns and to exploitation by promises of economic and social prosperity during this transition period. -
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
Recent Developments in Cybersecurity Melanie J
American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime -
Republic of Uzbekistan QUICK FACTS UZBEKISTAN
Republic of Uzbekistan QUICK FACTS UZBEKISTAN ............................................................................ The telecommunications market of Uzbekistan is in the Land Area: 425, 400 sq km process of saturation and is one of the fastest growing Population: 28.2 million sectors of the economy. Uzbekistan has the highest rate GNI per capita, PPP $3,110 (WB, 2010) of growth in the number of mobile subscribers in the CIS. The growth rate of revenues from mobile services TLD: .uz lags behind the pace of growth in the number of mobile Fixed Telephones: 1.9 million (2010) subscribers. There were 24.3 million mobile subscribers GSM Telephones: 24.3 million (2011) to the end of 2011.83 Fixed Broadband: 0.15 million (2010) Internet Users: 8.8 million (2012) TELECOMMUNICATIONS MARKET Indicator80 Measurement Value Computers Per 100 n/a Kazakstan Internet Users Per 100 31.2 Fixed Lines Per 100 6.6 Internet Broadband Per 100 0.3 Uzbekistan Kyrgyzstan Mobile Subscriptions Per 100 84.0 Mobile Broadband Per 100 19.9 (est) Turkmenistan Tajikistan International Bandwidth Per 100 17.2 kb Iran There have been no changes in number of operators Afghanistan in the last 3 years: “MTS” brand from “Uzdunrobita” (established June 1991) GSM/UMTS; “Beeline” brand from “Unitel” (established in April 1996) GSM/UMTS; In August 2011, all mobile operators in Uzbekistan 84 “Ucell” brand from “COSCOM” (established in April suspended internet and messaging services for the 1996) GSM/UMTS; “Perfectum Mobile” brand from duration of university entrance exams in an attempt to “Rubicon Wireless Communication” (established in prevent cheating. Five national mobile operators shut November 1996) CDMA 2001X; “UzMoble” brand from down mobile internet, text, and picture messaging JSC “Uzbektelecom” (established in August 2000) for four hours from 9 am local time, citing “urgent CDMA-450. -
Inside Russia's Intelligence Agencies
EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat. -
MAPPING DIGITAL MEDIA: PAKISTAN Mapping Digital Media: Pakistan
COUNTRY REPORT MAPPING DIGITAL MEDIA: PAKISTAN Mapping Digital Media: Pakistan A REPORT BY THE OPEN SOCIETY FOUNDATIONS WRITTEN BY Huma Yusuf 1 EDITED BY Marius Dragomir and Mark Thompson (Open Society Media Program editors) Graham Watts (regional editor) EDITORIAL COMMISSION Yuen-Ying Chan, Christian S. Nissen, Dusˇan Reljic´, Russell Southwood, Michael Starks, Damian Tambini The Editorial Commission is an advisory body. Its members are not responsible for the information or assessments contained in the Mapping Digital Media texts OPEN SOCIETY MEDIA PROGRAM TEAM Meijinder Kaur, program assistant; Morris Lipson, senior legal advisor; and Gordana Jankovic, director OPEN SOCIETY INFORMATION PROGRAM TEAM Vera Franz, senior program manager; Darius Cuplinskas, director 21 June 2013 1. Th e author thanks Jahanzaib Haque and Individualland Pakistan for their help with researching this report. Contents Mapping Digital Media ..................................................................................................................... 4 Executive Summary ........................................................................................................................... 6 Context ............................................................................................................................................. 10 Social Indicators ................................................................................................................................ 12 Economic Indicators ........................................................................................................................ -
The Siloviki in Russian Politics
The Siloviki in Russian Politics Andrei Soldatov and Michael Rochlitz Who holds power and makes political decisions in contemporary Russia? A brief survey of available literature in any well-stocked bookshop in the US or Europe will quickly lead one to the answer: Putin and the “siloviki” (see e.g. LeVine 2009; Soldatov and Borogan 2010; Harding 2011; Felshtinsky and Pribylovsky 2012; Lucas 2012, 2014 or Dawisha 2014). Sila in Russian means force, and the siloviki are the members of Russia’s so called “force ministries”—those state agencies that are authorized to use violence to respond to threats to national security. These armed agents are often portrayed—by journalists and scholars alike—as Russia’s true rulers. A conventional wisdom has emerged about their rise to dominance, which goes roughly as follows. After taking office in 2000, Putin reconsolidated the security services and then gradually placed his former associates from the KGB and FSB in key positions across the country (Petrov 2002; Kryshtanovskaya and White 2003, 2009). Over the years, this group managed to disable almost all competing sources of power and control. United by a common identity, a shared worldview, and a deep personal loyalty to Putin, the siloviki constitute a cohesive corporation, which has entrenched itself at the heart of Russian politics. Accountable to no one but the president himself, they are the driving force behind increasingly authoritarian policies at home (Illarionov 2009; Roxburgh 2013; Kasparov 2015), an aggressive foreign policy (Lucas 2014), and high levels of state predation and corruption (Dawisha 2014). While this interpretation contains elements of truth, we argue that it provides only a partial and sometimes misleading and exaggerated picture of the siloviki’s actual role. -
Iran Threat Reduction and Syria Human Rights Act of 4 2012’’
In the House of Representatives, U. S., August 1, 2012. Resolved, That the House agree to the amendment of the Senate to the bill (H.R. 1905) entitled ‘‘An Act to strengthen Iran sanctions laws for the purpose of compelling Iran to abandon its pursuit of nuclear weapons and other threatening activities, and for other purposes.’’, with the following HOUSE AMENDMENT TO SENATE AMENDMENT: In lieu of the matter proposed to be inserted by the amendment of the Senate, insert the following: 1 SECTION 1. SHORT TITLE; TABLE OF CONTENTS. 2 (a) SHORT TITLE.—This Act may be cited as the 3 ‘‘Iran Threat Reduction and Syria Human Rights Act of 4 2012’’. 5 (b) TABLE OF CONTENTS.—The table of contents for 6 this Act is as follows: Sec. 1. Short title; table of contents. Sec. 2. Definitions. TITLE I—EXPANSION OF MULTILATERAL SANCTIONS REGIME WITH RESPECT TO IRAN Sec. 101. Sense of Congress on enforcement of multilateral sanctions regime and expansion and implementation of sanctions laws. Sec. 102. Diplomatic efforts to expand multilateral sanctions regime. TITLE II—EXPANSION OF SANCTIONS RELATING TO THE ENERGY SECTOR OF IRAN AND PROLIFERATION OF WEAPONS OF MASS DESTRUCTION BY IRAN Subtitle A—Expansion of the Iran Sanctions Act of 1996 Sec. 201. Expansion of sanctions with respect to the energy sector of Iran. 2 Sec. 202. Imposition of sanctions with respect to transportation of crude oil from Iran and evasion of sanctions by shipping companies. Sec. 203. Expansion of sanctions with respect to development by Iran of weapons of mass destruction. Sec. -
Tajikistan Internet Exchange Point Environment Assessment June 2017
Tajikistan Internet Exchange Point Environment Assessment June 2017 Photo: Ronan Shenhav, flickr.com/photos/ronan_shenhav/30486008950/ Tajikistan – Internet Exchange Point Environment Assessment 2 Table of contents Executive Summary ................................................................................................................................................................................................. 3 1. Background to the Study ............................................................................................................................................................................. 7 2. Introduction ................................................................................................................................................................................................................ 8 2.1 Development Challenges .................................................................................................................................................................. 9 2.2 Internet Challenges ............................................................................................................................................................................... 10 3. Baseline Assessment of Tajikistan’s Internet Ecosystem ................................................................................... 12 3.1 International Capacity & Connectivity .......................................................................................................................... -
Investigating Web Defacement Campaigns at Large
Session 11: Malware and Web ASIACCS’18, June 4–8, 2018, Incheon, Republic of Korea Investigating Web Defacement Campaigns at Large Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini Forward-Looking Threat Research Team - Trend Micro, Inc. ABSTRACT the attack, team affiliation of the defacer(s), or nicknames ofthe Website defacement is the practice of altering the web pages of a supporting actors. Over the years, defacers have abandoned their website after its compromise. The altered pages, called deface pages, interested in defacing for the mere purpose of advertising the com- can negatively affect the reputation and business of the victim site. promise, pursuing defacement more as a mean to broadcast strong Previous research has focused primarily on detection, rather than messages “to the World”—by compromising popular websites. exploring the defacement phenomenon in depth. While investigat- Despite several actors are still driven by the desire of promot- ing several defacements, we observed that the artifacts left by the ing their own reputation, an increasing number of defacers strive defacers allow an expert analyst to investigate the actors’ modus instead to promote their ideologies, religious orientation, political operandi and social structure, and expand from the single deface views, or other forms of activism, often closely following real-world page to a group of related defacements (i.e., a campaign). However, events (e.g., war, elections, crisis, terrorist attacks). We refer to this manually performing such analysis on millions of incidents is te- phenomenon as dark propaganda, to highlight that legitimate re- dious, and poses scalability challenges. From these observations, we sources are abused for pushing the actors’ viewpoints. -
Organized Crime and the Russian State Challenges to U.S.-Russian Cooperation
Organized Crime and the Russian State Challenges to U.S.-Russian Cooperation J. MICHAEL WALLER "They write I'm the mafia's godfather. It was Vladimir Ilich Lenin who was the real organizer of the mafia and who set up the criminal state." -Otari Kvantrishvili, Moscow organized crime leader.l "Criminals Nave already conquered the heights of the state-with the chief of the KGB as head of a mafia group." -Former KGB Maj. Gen. Oleg Kalugin.2 Introduction As the United States and Russia launch a Great Crusade against organized crime, questions emerge not only about the nature of joint cooperation, but about the nature of organized crime itself. In addition to narcotics trafficking, financial fraud and racketecring, Russian organized crime poses an even greater danger: the theft and t:rafficking of weapons of mass destruction. To date, most of the discussion of organized crime based in Russia and other former Soviet republics has emphasized the need to combat conven- tional-style gangsters and high-tech terrorists. These forms of criminals are a pressing danger in and of themselves, but the problem is far more profound. Organized crime-and the rarnpant corruption that helps it flourish-presents a threat not only to the security of reforms in Russia, but to the United States as well. The need for cooperation is real. The question is, Who is there in Russia that the United States can find as an effective partner? "Superpower of Crime" One of the greatest mistakes the West can make in working with former Soviet republics to fight organized crime is to fall into the trap of mirror- imaging. -
Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.