Critical Information Infrastructure Protection: the Threat Is Real Hearing

Total Page:16

File Type:pdf, Size:1020Kb

Critical Information Infrastructure Protection: the Threat Is Real Hearing S. HRG. 106±858 CRITICAL INFORMATION INFRASTRUCTURE PROTECTION: THE THREAT IS REAL HEARING BEFORE THE SUBCOMMITTEE ON TECHNOLOGY, TERRORISM, AND GOVERNMENT INFORMATION OF THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE ONE HUNDRED SIXTH CONGRESS FIRST SESSION ON EXAMINING THE PROTECTION EFFORTS BEING MADE AGAINST FOR- EIGN-BASED THREATS TO UNITED STATES CRITICAL COMPUTER IN- FRASTRUCTURE OCTOBER 6, 1999 Serial No. J±106±53 Printed for the use of the Committee on the Judiciary ( U.S. GOVERNMENT PRINTING OFFICE 68±563 WASHINGTON : 2001 VerDate 11-MAY-2000 09:42 Jan 26, 2001 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 OCT6.TXT SJUD2 PsN: SJUD2 COMMITTEE ON THE JUDICIARY ORRIN G. HATCH, Utah, Chairman STROM THURMOND, South Carolina PATRICK J. LEAHY, Vermont CHARLES E. GRASSLEY, Iowa EDWARD M. KENNEDY, Massachusetts ARLEN SPECTER, Pennsylvania JOSEPH R. BIDEN, JR., Delaware JON KYL, Arizona HERBERT KOHL, Wisconsin MIKE DEWINE, Ohio DIANNE FEINSTEIN, California JOHN ASHCROFT, Missouri RUSSELL D. FEINGOLD, Wisconsin SPENCER ABRAHAM, Michigan ROBERT G. TORRICELLI, New Jersey JEFF SESSIONS, Alabama CHARLES E. SCHUMER, New York BOB SMITH, New Hampshire MANUS COONEY, Chief Counsel and Staff Director BRUCE A. COHEN, Minority Chief Counsel SUBCOMMITTEE ON TECHNOLOGY, TERRORISM, AND GOVERNMENT INFORMATION JON KYL, Arizona, Chairman ORRIN G. HATCH, Utah DIANNE FEINSTEIN, California CHARLES E. GRASSLEY, Iowa JOSEPH R. BIDEN, JR., Delaware MIKE DEWINE, Ohio HERBERT KOHL, Wisconsin STEPHEN HIGGINS, Chief Counsel and Staff Director NEIL QUINTER, Minority Chief Counsel and Staff Director (II) VerDate 11-MAY-2000 09:42 Jan 26, 2001 Jkt 000000 PO 00000 Frm 00002 Fmt 0486 Sfmt 0486 OCT6.TXT SJUD2 PsN: SJUD2 C O N T E N T S STATEMENTS OF COMMITTEE MEMBERS Page Kyl, Hon. Jon, U.S. Senator from the State of Arizona ........................................ 1 Feinstein, Hon. Dianne, U.S. Senator from the State of California .................... 4 CHRONOLOGICAL LIST OF WITNESSES Statement of Hon. Robert F. Bennett, a U.S. Senator From the State of Utah ...................................................................................................................... 5 Panel consisting of John S. Tritak, director, Critical Infrastructure Assurance, Office, Washington, DC; and Michael A. Vatis, director, National Infrastruc- ture Protection Center, Washington, DC ........................................................... 6 Statement of Jack L. Brock, Jr., director, Government-Wide and Defense Information Systems, Accounting and Information Management Division, U.S. General Accounting Office, Washington, DC; accompanied by Jean L. Boltz .................................................................................................................. 35 Prepared statement of Richard C. Schaeffer, Jr., director, Infrastructure and Information Assurance Office of the Assistant Secretary of Defense .............. 56 ALPHABETICAL LIST AND MATERIAL SUBMITTED Bennett, Hon. Robert F.: Testimony ...................................................................... 5 Brock, Jack L., Jr.: Testimony .......................................................................................................... 35 Prepared statement .......................................................................................... 44 Schaeffer, Richard C., Jr.: Prepared statement .................................................... 56 Tritak, John S.: Testimony .......................................................................................................... 6 Prepared statement .......................................................................................... 9 Vatis, Michael A.: Testimony .......................................................................................................... 14 Prepared statement .......................................................................................... 18 (III) VerDate 11-MAY-2000 09:42 Jan 26, 2001 Jkt 000000 PO 00000 Frm 00003 Fmt 5904 Sfmt 5904 OCT6.TXT SJUD2 PsN: SJUD2 VerDate 11-MAY-2000 09:42 Jan 26, 2001 Jkt 000000 PO 00000 Frm 00004 Fmt 5904 Sfmt 5904 OCT6.TXT SJUD2 PsN: SJUD2 CRITICAL INFORMATION INFRASTRUCTURE PROTECTION: THE THREAT IS REAL WEDNESDAY, OCTOBER 6, 1999 U.S. SENATE, SUBCOMMITTEE ON TECHNOLOGY, TERRORISM, AND GOVERNMENT INFORMATION, COMMITTEE ON THE JUDICIARY, Washington, DC. The committee met, pursuant to notice, at 10:01 a.m., in room SD±226, Dirksen Senate Office Building, Hon. Jon Kyl (chairman of the subcommittee) presiding. Also present: Senators Feinstein, and Bennett (ex officio). OPENING STATEMENT OF HON. JON KYL, A U.S. SENATOR FROM THE STATE OF ARIZONA Senator KYL. The hearing before the Senate Judiciary Commit- tee, Subcommittee on Technology, Terrorism, and Government In- formation will please come to order. Today's hearing is on the subject of the critical information infra- structure and protection of the infrastructure and the threat there- to. Our panelists this morning, we will have two panels, and on the first panel, we have Mr. John S. Tritak, who is Director of the Crit- ical Information Assurance Office in Washington, and Mr. Michael Vatis, the Director of the National Infrastructure Protection Center here. The second panel will be Mr. Jack Brock, Director of Informa- tion Management Issues at the General Accounting Office. I appre- ciate the attendance of the witnesses here. I am informed that other members of the subcommittee will be arriving, but in view of the schedules of everyone concerned, I am going to begin the hearing right on time and we will move forward from there. Let me first of all make a brief opening statement and then call upon our two witnesses to make an opening statement, after which we will have a series of questions. At our hearing today, we are going to examine a growing public policy concern, the threat of hostile attack on our Nation's critical information infrastructure and the adequacy of the Federal Gov- ernment's response to this threat. This is the fourth public hearing that our subcommittee has held on the topic in the last 2 years, and given the importance of the subject, it will not be our last. The President's top advisors recently issued a report on preserv- ing America's privacy and security in cyberspace. As the report points out, the enormous success the United States has enjoyed over the past century was due in part to the ability of our Nation (1) VerDate 11-MAY-2000 09:42 Jan 26, 2001 Jkt 000000 PO 00000 Frm 00005 Fmt 6633 Sfmt 6633 OCT6.TXT SJUD2 PsN: SJUD2 2 and its leaders to deal with the latest technological trends in a way that enhanced the security and prosperity of successive generations of Americans. At critical junctures in our history, wise government policies with regard to innovative technology have resulted in un- precedented success. During the industrial age, the arrival of World War II signaled an urgent need for increased production and scientific advances. The success of America's war effort in defeating fascism rested largely on the strength of our industrial might and the successful collaboration between our government and industry. We not only protected America's security, but also vaulted the U.S. economy to unprecedented heights in the post-war period. Today, the industrial age has become the information age and computers facilitate the instant exchange of vast amounts of data and ideas. Who would have predicted just a few decades ago that a small Defense Department research effort would result in the creation of the Internet and revolutionize our society. As we approach the dawn of the new millennium, America again faces a time of pivotal change. Information technology presents both an opportunity and a threat to our society, which is increas- ingly dependent upon computers and communications equipment, what we call our critical information infrastructure. As most Amer- icans have learned recently, with the preparations for Y2K to make sure there are no major disruptions in services, virtually every key service is dependent upon computers, from electric power grids, to phone systems, to air traffic control, water and sewer service, medi- cal devices, banking, and the list goes on and on. Unfortunately, very few of these critical computer networks were designed with good security measures. The changes in our society also must be viewed in context with America's changing geopolitical role in the post-Cold War world. The United States is the world's only superpower and our armed forces enjoy technological superiority on the battlefield. Nations and terrorist groups that are hostile to our interests are increas- ingly choosing not to confront our strengths directly, that is, by try- ing to field fleets of advanced fighter planes or ships on par with ours, but rather are seeking to exploit our vulnerabilities, looking hard for an Achilles heel. According to the National Security Agency, over 100 countries are working on information warfare techniques. One recent case il- lustrates the danger of this threat. According to Newsweek maga- zine, computer systems at the Defense and Energy Departments have been the subject of a sustained computer hacking effort from Russia. These attacks have resulted in the loss of vast quantities of data, possibly including classified naval codes and information on missile guidance systems. These computer attacks have reportedly been very subtle. For ex- ample, the London Sunday Times interviewed an engineer at the Space and Naval Warfare Systems Command in
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Infosec Year in Review -- 1999
    InfoSec Year In Review -- 1999 M. E. Kabay, PhD, CISSP. Security Leader, INFOSEC Group, AtomicTangerine Inc. Category 11 Breaches of confidentiality Date 1999-01-29 Keyword data leakage privacy confidentiality control Web Source, Vol, No. RISKS 20 18 The Canadian consumer-tracking service Air Miles inadvertently left 50,000 records of applicants for its loyalty program publicly accessible on their Web site for an undetermined length of time. The Web site was offline as of 21 January until the problem was fixed. Date 1999-02-03 Keyword data leakage Web script QA vulnerability confidentiality Source, Vol, No. WIRED via PointCast An error in the configuration or programming of the F. A. O. Schwarz Web site resulted paradoxically in weakening the security of transactions deliberately completed by FAX instead of through SSL. Customers who declined to send their credit-card numbers via SSL ended up having their personal details — address and so forth — stored in a Web page that could be accessed by anyone entering a URL with an appropriate (even if randomly chosen) numerical component. Date 1999-02-10 Keyword e-commerce credit card personal information password privacy Source, Vol, No. RISKS 20 20 Prof. Ross Anderson of Cambridge University analyzed requirements on the AMAZON.COM online bookstore for credit card number, password, and personal details such as phone number. He identified several risks: (1) merchant retention of credit card numbers poses a far higher risk of capture than of capture in transit; (2) adding a password increases the likelihood of compromise because so many naïve users choose bad passwords and then write them down; (3) even the British site for Amazon contravenes European rules on protecting consumer privacy; (3) such practices make it easier for banks to reject their clients' claims of fraudulent use of their credit-card numbers.
    [Show full text]
  • NS/EP) Internet Communications an Awareness Document
    The Electronic Intrusion Threat to National Security and Emergency Preparedness (NS/EP) Internet Communications An Awareness Document December 2000 Office of the Manager National Communications System 701 South Courthouse Road Arlington, VA 22204-2198 TABLE OF CONTENTS EXECUTIVE SUMMARY............................................................................................................... ES-1 1. OVERVIEW AND SCOPE............................................................................................................ 1 2. BACKGROUND ............................................................................................................................ 3 2.1 NS/EP FUNCTIONS ................................................................................................................... 4 2.1.1 NS/EP Responsibilities ........................................................................................................ 4 2.1.2 NS/EP Communications Services and the Functions They Support........................................ 4 2.1.3 NS/EP Community’s Current Dependence on the Internet .................................................... 5 2.2 INTERNET DESCRIPTION........................................................................................................ 5 2.2.1 Internet Technology............................................................................................................. 6 2.2.2 The Internet and Security....................................................................................................
    [Show full text]
  • WORLD WAR C : Understanding Nation-State Motives Behind Today’S Advanced Cyber Attacks
    REPORT WORLD WAR C : Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks Authors: Kenneth Geers, Darien Kindlund, Ned Moran, Rob Rachwald SECURITY REIMAGINED World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks CONTENTS Executive Summary ............................................................................................................................................................................................................................................................................................................... 3 Introduction ............................................................................................................................................................................................................................................................................................................................................... 4 A Word of Warning ................................................................................................................................................................................................................................................................................................................. 5 The FireEye Perspective ...........................................................................................................................................................................................................................................................................................
    [Show full text]
  • Defending America Redefining the Conceptual Borders of Homeland Defense
    CSIS_______________________________ Center for Strategic and International Studies 1800 K Street N.W. Washington, DC 20006 (202) 775-3270 Updates from: CSIS.ORG, “Homeland Defense” Comments to: [email protected] DEFENDING AMERICA REDEFINING THE CONCEPTUAL BORDERS OF HOMELAND DEFENSE CRITICAL INFRASTRUCTURE PROTECTION AND INFORMATION WARFARE Final Review Draft for Comment Anthony H. Cordesman Arleigh A. Burke Chair in Strategy Revision: December 8, 2000 Copyright CSIS, all rights reserved. CSIS Homeland Defense: Asymmetric Warfare & Terrorism 12/12/00 Page ii Introduction The following report is a rough initial draft section of a full report on Homeland Defense being prepared as part of the CSIS Homeland Defense project. It is a rough working draft, and reflects solely the views of the author and not of the CSIS team working on the project. It is being circulated for comment and reaction and will be substantially modified and updated before being included in the final report. Copyright CSIS, all rights reserved CSIS Homeland Defense: Asymmetric Warfare & Terrorism 12/12/00 Page iii Acknowledgments The author would like to thank Stephanie M. Lanz, Andrew Li, Steve Chu, and Preston Golson for their help in researching and writing this study. Copyright CSIS, all rights reserved CSIS Homeland Defense: Asymmetric Warfare & Terrorism 12/12/00 Page iv Executive Summary There is nothing new about critical infrastructure protection. The US carried out limited contingency planning to deal with threats to its infrastructure facilities during the Cold War. These plans included attacks on key utilities such as power plants and grids, oil and gas pipelines, telecommunication, and critical facilities that affected the continuity of government.
    [Show full text]
  • Cyber Warfare an Analysis of the Means and Motivations of Selected Nation States
    CYBER WARFARE AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF SELECTED NATION STATES INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE November 2004 Charles Billo Revised December 2004 Welton Chang 45 Lyme Road Hanover, NH 03755 603-646-0700 INSTITUTE FOR SECURITY TECHNOLOGY STUDIES ___________________________________________________________ Authors of this report: Charles G. Billo Senior Research Associate, ISTS Welton Chang Research Intern, ISTS ACKNOWLEDGEMENTS We are grateful for the numerous comments received from our anonymous reviewers as well as ISTS reviewers. In particular, the substantive suggestions received from Professor David Kotz, Eric Goetz, and Colleen Hurd, were especially helpful. We would like to thank Sarah Brooks and Jocelyn Troy for their help. We would also like to thank George Bakos, Kathleen Cassedy, Amy Gannon, Robert Hillery, Dennis McGrath, and the Technical Analysis Group at ISTS. DISCLAIMERS All Internet links and citations contained within were active at the time of publication. We cannot guarantee that the links will remain active indefinitely, although an effort was made to ensure that each citation contained enough information for the cited source to be located in print or other forms of media. Information available prior to November 1, 2004 was used in this report. Copyright © 2004, Trustees of Dartmouth College. All rights reserved. This project was supported under Award No. 2000-DT-CX-K001 from the Office for Domestic Preparedness, U.S. Department of Homeland Security. Points of view in this document are those of the authors and do not necessarily represent the official position of the U.S.Department of Homeland Security. 2 INSTITUTE FOR SECURITY TECHNOLOGY STUDIES ___________________________________________________________ FOREWORD This study, written in response to a grant provided by the Department of Homeland Security, assesses potential foreign computer threats to information technology networks in the United States.
    [Show full text]
  • Cyber War Methods and Practice Version 9.0 – 17 Jun 2014
    LV Internet policy Fachbereich 1 49069 Osnabrueck Cyber war Methods and Practice Version 9.0 – 17 Jun 2014 Summary Computer and internet security is under discussion due to the increasing relevance of the Internet and of the information and communication technology (ICT). The cyberspace is meanwhile regarded as separate military dimension. This paper gives an overview on the methods and practice of cyber war and presents the cyber war activities since 1998 and the security architecture of the cyberspace. Finally, the cyber war strategies of the United States, China and Russia and the cyber policies of the European and African Union are discussed. Version 9.0 – 17 Jun 2014_English 1 apl. Prof. Dr. Dr. K. Saalbach Table of Contents 1. Fundamentals ....................................................................................................... 4 1.1 Introduction ............................................................................................................... 4 1.2 Background ............................................................................................................... 4 1.3 Definition .................................................................................................................. 6 1.4 The general concept of cyber war ............................................................................. 7 1.4.1 Basic principles .................................................................................................. 7 1.4.2 Cyber war Definition ........................................................................................
    [Show full text]
  • Netcat, Superscan, Winscan
    IEEE Globecom 2011 Information Warfare Tom Chen Swansea University Wales, UK [email protected] Outline • Background - Definitions; actors; targets; historical cases • Attack techniques - Reconnaissance; intrusions; stealth; persistent control; DDoS • Defense techniques - Deterrence; prevention; detection; attribution; intrusion tolerance; self healing • Open research issues • Conclusions and future directions TC/Globecom2011/12-9-11 p. 2 Background TC/Globecom2011/12-9-11 p. 3 Section Outline • Definitions • Actors • Targets • Historical cases TC/Globecom2011/12-9-11 p. 4 Definitions • Info. warfare (or cyber warfare): military or political conflicts between nations carried out through computer networks - Actions to adversely affect enemy’s info. and info. systems while defending own - Information is both target and means for gaining advantage (in support of military/political goals) - Definitions vary, e.g., U.S. DoD defines broadly: “operations directed against information in any form, transmitted over any media, including operations against information content, its supporting systems and software, the physical hardware device that stores the data or instructions, and also human practices and perceptions” TC/Globecom2011/12-9-11 p. 5 DoD Definitions Info. Operations Broad (info. warfare) definition Psychological Military Operations Computer Electronic operations deception security network warfare Propaganda Weapon hiding, Classified operations Radio Examples: leaflets target decoys info. (CNO) jamming *Definition here Computer Computer Computer network network network exploitation/ attack (CNA) defense (CND) espionage (CNE) DDoS, Firewalls, Backdoors, malware IDS data theft TC/Globecom2011/12-9-11 p. 6 Recognition as Warfare Domain • U.S. DoD Strategy for Operating in Cyberspace (July 2011) recognizes cyberspace as 5th operational domain (with sea, air, land, space) “Potential U.S.
    [Show full text]
  • The Rise of China's Hacking Culture: Defining Chinese Hackers
    California State University, San Bernardino CSUSB ScholarWorks Electronic Theses, Projects, and Dissertations Office of aduateGr Studies 6-2016 The Rise of China's Hacking Culture: Defining Chinese Hackers William Howlett IV California State University - San Bernardino Follow this and additional works at: https://scholarworks.lib.csusb.edu/etd Part of the Asian Studies Commons, Criminology and Criminal Justice Commons, International Relations Commons, Politics and Social Change Commons, and the Science and Technology Studies Commons Recommended Citation Howlett, William IV, "The Rise of China's Hacking Culture: Defining Chinese Hackers" (2016). Electronic Theses, Projects, and Dissertations. 383. https://scholarworks.lib.csusb.edu/etd/383 This Thesis is brought to you for free and open access by the Office of aduateGr Studies at CSUSB ScholarWorks. It has been accepted for inclusion in Electronic Theses, Projects, and Dissertations by an authorized administrator of CSUSB ScholarWorks. For more information, please contact [email protected]. THE RISE OF CHINA’S HACKING CULTURE DEFINING CHINESE HACKERS A Thesis Presented to the Faculty of California State University, San Bernardino In Partial Fulfillment of the Requirements for the Degree Master of Arts in Social Sciences and Globalization by William Sedgwick Howlett June 2016 THE RISE OF CHINA’S HACKING CULTURE DEFINING CHINESE HACKERS A Thesis Presented to the Faculty of California State University, San Bernardino by William Sedgwick Howlett June 2016 Approved by: Cherstin Lyon, Committee Chair, Social Sciences and Globalization Jeremy Murray, Committee Member, History Jose Munoz, Committee Member, Sociology © 2016 William Sedgwick Howlett ABSTRACT China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade.
    [Show full text]