Inside Cyber Warfare

Total Page:16

File Type:pdf, Size:1020Kb

Inside Cyber Warfare SECOND EDITION Inside Cyber Warfare Jeffrey Carr Beijing • Cambridge • Farnham • Köln • Sebastopol • Tokyo Inside Cyber Warfare, Second Edition by Jeffrey Carr Copyright © 2012 Jeffrey Carr. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Jasmine Perez Cover Designer: Karen Montgomery Copyeditor: Marlowe Shaeffer Interior Designer: David Futato Proofreader: Jasmine Perez Illustrator: Robert Romano December 2009: First Edition. December 2011: Second Edition. Revision History for the First Edition: 2011-12-07 First release See http://oreilly.com/catalog/errata.csp?isbn=9781449310042 for release details. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Inside Cyber Warfare, the image of light cavalry, and related trade dress are trade- marks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc., was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information con- tained herein. ISBN: 978-1-449-31004-2 [LSI] 1323275105 Table of Contents Foreword ................................................................... xi Preface .................................................................... xiii 1. Assessing the Problem ................................................... 1 The Complex Domain of Cyberspace 1 Cyber Warfare in the 20th and 21st Centuries 2 Cyber Espionage 4 Cyber Crime 5 Future Threats 7 Increasing Awareness 7 Critical Infrastructure 8 The Conficker Worm: The Cyber Equivalent of an Extinction Event? 12 Africa: The Future Home of the World’s Largest Botnet? 13 The Way Forward 14 2. The Rise of the Nonstate Hacker .......................................... 15 The StopGeorgia.ru Project Forum 15 Counter-Surveillance Measures in Place 16 The Russian Information War 17 The Foundation for Effective Politics’ War on the Net (Day One) 17 The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead 19 Impact 19 Overview of Perpetrators 21 Hackers’ Profiles 22 Methods of Attack 27 Israeli Retaliation 28 Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria 29 Are Nonstate Hackers a Protected Asset? 29 iii 3. The Legal Status of Cyber Warfare ........................................ 31 Nuclear Nonproliferation Treaties 32 The Antarctic Treaty System and Space Law 33 UNCLOS 34 MLAT 34 United States Versus Russian Federation: Two Different Approaches 34 The Law of Armed Conflict 35 Is This an Act of Cyber Warfare? 37 South Korea 37 Iran 37 Tatarstan 37 United States 38 Kyrgyzstan 38 Israel and the Palestinian National Authority 38 Zimbabwe 38 Myanmar 39 Cyber: The Chaotic Domain 39 4. Responding to International Cyber Attacks as Acts of War .................... 45 The Legal Dilemma 47 The Road Ahead: A Proposal to Use Active Defenses 48 The Law of War 48 General Prohibition on the Use of Force 49 The First Exception: UN Security Council Actions 49 The Second Exception: Self-Defense 50 A Subset of Self-Defense: Anticipatory Self-Defense 51 An Alternate Basis for Using Active Defenses: Reprisals 52 Nonstate Actors and the Law of War 52 Armed Attacks by Nonstate Actors 53 Duties between States 54 Imputing State Responsibility for Acts by Nonstate Actors 55 Cross-Border Operations 56 Analyzing Cyber Attacks under Jus ad Bellum 57 Cyber Attacks as Armed Attacks 58 Establishing State Responsibility for Cyber Attacks 61 The Duty to Prevent Cyber Attacks 62 Support from International Conventions 63 Support from State Practice 64 Support from the General Principles of Law 66 Support from Judicial Opinions 67 Fully Defining a State’s Duty to Prevent Cyber Attacks 67 Sanctuary States and the Practices That Lead to State Responsibility 68 The Choice to Use Active Defenses 68 iv | Table of Contents Technological Limitations and Jus ad Bellum Analysis 69 Jus in Bello Issues Related to the Use of Active Defenses 71 Conclusion 74 5. The Intelligence Component to Cyber Warfare .............................. 77 The Korean DDoS Attacks (July 2009) 78 The Botnet Versus the Malware 80 The DPRK’s Capabilities in Cyberspace 81 One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack 83 Ingushetia Conflict, August 2009 85 The Predictive Role of Intelligence 86 6. Nonstate Hackers and the Social Web ..................................... 89 Russia 89 China 90 The Middle East 91 Pakistani Hackers and Facebook 92 The Dark Side of Social Networks 93 The Cognitive Shield 94 TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences 97 Automating the Process 99 Catching More Spies with Robots 99 7. Follow the Money ..................................................... 103 False Identities 103 Components of a Bulletproof Network 105 ICANN 105 The Accredited Registrar 106 The Hosting Company 106 The Bulletproof Network of StopGeorgia.ru 106 StopGeorgia.ru 106 NAUNET.RU 108 SteadyHost.ru 109 Innovation IT Solutions Corp 110 Mirhosting.com 112 SoftLayer Technologies 112 SORM-2 114 The Kremlin and the Russian Internet 115 Nashi 115 The Kremlin Spy for Hire Program 117 Sergei Markov, Estonia, and Nashi 118 Table of Contents | v A Three-Tier Model of Command and Control 119 8. Organized Crime in Cyberspace .......................................... 121 A Subtle Threat 125 Atrivo/Intercage 126 ESTDomains 126 McColo: Bulletproof Hosting for the World’s Largest Botnets 127 Russian Organized Crime and the Kremlin 129 9. Investigating Attribution .............................................. 131 Using Open Source Internet Data 131 Background 134 What Is an Autonomous System Network? 135 Team Cymru and Its Darknet Report 138 Using WHOIS 139 Caveats to Using WHOIS 140 10. Weaponizing Malware ................................................. 141 A New Threat Landscape 141 StopGeorgia.ru Malware Discussions 141 Twitter as DDoS Command Post against Iran 144 Social Engineering 146 Channel Consolidation 148 An Adversary’s Look at LinkedIn 149 BIOS-Based Rootkit Attack 151 Malware for Hire 151 Anti-Virus Software Cannot Protect You 151 Targeted Attacks Against Military Brass and Government Executives 152 11. The Role of Cyber in Military Doctrine .................................... 161 The Russian Federation 161 The Foundation for Effective Politics (FEP) 163 “Wars of the Future Will Be Information Wars” 165 “RF Military Policy in International Information Security” 166 The Art of Misdirection 169 China Military Doctrine 171 Anti-Access Strategies 174 The 36 Stratagems 174 US Military Doctrine 176 12. A Cyber Early Warning Model ........................................... 179 The Challenge We Face 179 Cyber Early Warning Networks 180 vi | Table of Contents Building an Analytical Framework for Cyber Early Warning 180 Cases Studies of Previous Cyber Attacks 183 Lessons Learned 187 Defense Readiness Condition for Cyberspace 188 13. Advice for Policymakers from the Field ................................... 191 When It Comes to Cyber Warfare: Shoot the Hostage 191 The United States Should Use Active Defenses to Defend Its Critical Information Systems 194 Scenarios and Options to Responding to Cyber Attacks 196 Scenario 1 196 Scenario 2 197 Scenario 3 197 Scenario 4 198 In Summary 198 Whole-of-Nation Cyber Security 199 14. Conducting Operations in the Cyber-Space-Time Continuum ................. 203 Anarchist Clusters: Anonymous, LulzSec, and the Anti-Sec Movement 206 Social Networks: The Geopolitical Strategy of Russian Investment in Social Media 206 2005: A Turning Point 209 DST and the Kremlin 210 The Facebook Revolution 211 Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec 213 15. The Russian Federation: Information Warfare Framework ................... 217 Russia: The Information Security State 217 Russian Government Policy 217 New Laws and Amendments 218 Government Structures 220 Russian Ministry of Defense 222 Administrative Changes 222 Electronic Warfare Troops 222 The Federal Service for Technical and Export Control (FSTEC)— Military Unit (Vch) 96010 224 5th Central Research and Testing Institute of the Russian Defense Ministry (5th TSNIII)—Military Unit (Vch) 33872 225 18th Central Research Institute of the Russian Defense Ministry (18th CRI MOD)—Military Unit (Vch) 11135 228 27th Central Research Institute of the Russian Defense Ministry (27th CRI MOD)—Military Unit (Vch) 01168 228 Table of Contents | vii Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO) 229 Federal Security Service Information Security Center (FSB ISC)— Military Unit (Vch) 64829 229 Russian Federal Security Service Center for Electronic Surveillance of Communications (FSB TSRRSS)—Military Unit (Vch)
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • Babushka Egg Concept Book #15 (Amended 1-1-2021)
    Babushka Egg Concept Book #15 (amended 1-1-2021) ***************************************. Babushka Egg Concept Book #15 www.apocalypse2008-2015.com Page 1 of 92 Babushka Egg Concept Book #15 (amended 1-1-2021) Basel Dome Window After September 2022 AD - Please read and print before the Web is gone - Pearl # Name Pages 889 Amended Conclusion of the Corona Virus 9 Part 1,2,3,4 Infection 300 The Resurrection Plan 23 Part 1,2,3 of Mankind Why, How & When is the End 270 st 49 of the 21 Century? 242 The Seven Mystery Thunders 62 126 The Population Curve 76 According to the Bible 285 Seven Abomination Changing Christianity 88-92 www.apocalypse2008-2015.com Page 2 of 92 Babushka Egg Concept Book #15 (amended 1-1-2021) To my Relatives and Friends Recently many politicized TV stations announced an increase of a deadly Corona-Virus. Perhaps one should study the history of Mankind connected to Prophecy of the Torah-Bible (Rev. 20:12) ending much Life in nature caused by an atheistic hi-tech culture of our civilization. Like the Gospel mentioned five (5) foolish virgins to hear a voice behind a locked door: Truly, I say to you, I do not know you (Matt. 25:1-13), depart from me. (Matt. 25:41) Therefore you might be interested to pass on this information to a friend or pastor since our 21st Century Civilization was predicted to perish. Thus, a few Pearls were amended to reveal the hidden Truth of the Torah- Bible now exposed in Babushka Egg Concept Book #15 with forbidden knowledge forgotten in many Christian churches, synagogues & universities.
    [Show full text]
  • Legal Considerations
    © 2010 Cooperative Cyber Defence Centre of Excellence (CCD COE) Contact: Cooperative Cyber Defence Centre of Excellence (CCD COE) 12 Filtri Rd. 10132 Tallinn, Estonia [email protected] www.ccdcoe.org All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission of CCD COE. The views, opinions, and/or findings and recommendations contained in this analysis are those of the authors and should not be construed as an official position, policy, or decision of NATO or any NATO entity. Layout, design and illustrations: Marko Söönurm ISBN: 978-9949-9040-0-6 INTERNATIONAL CYBER INCIDENTS: LEGAL CONSIDERATIONS Eneken Tikk Kadri Kaska Liis Vihul 2010 4 Contents PREFACE ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������6 INTRODUCTION TO CASE STUDIES..........................................................................................................................................................................................10 ESTONIA 2007 ����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������14
    [Show full text]
  • Pirates of the Isps: Tactics for Turning Online Crooks Into International Pariahs
    21st CENTURY DEFENSE INITIATIVE CyBER SECuRITy #1 July 2011 Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman 1775 Massachusetts Ave., NW Washington, D.C. 20036 brookings.edu Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman CyberSeCurity #1 July 2011 21st CENTURY DEFENSE INITIATIVE Acknowledgements every research paper is a group effort, no mat- My Wired.com colleagues—ryan Singel, kevin ter what it says on the byline. this project relied Poulsen, kim Zetter and David kravets—cover more on outside assistance than most. brookings the cybersecurity beat better than anyone. this Senior fellows Peter Singer and ken lieberthal paper would have been impossible without them, were the ones who convinced me to explore the and without brian krebs, master investigator of broad topic of cybersecurity. the panel they as- the online underworld. sembled gave me new insight with every meeting; my colleague allan friedman was an especially bill Woodcock, rick Wesson, Jeff Cooper, tyler invaluable tutor and remarkably generous with Moore, audrey Plonk, Jim lewis, Dmitri alpero- his time. heather Messera and robert o’brien vitch, Paul Nicholas, Jessica herrera-flannigan, provided important research and logistical sup- Jart armin, richard bejtlich, Steve Schleien, Jona- port. My research assistant, adam rawnsley, was than Zittrain and many, many others steered me tireless in his exploration of the minutiae of ev- away from my worst ideas and towards those few erything from tort law to pirate havens. not-so-bad ones. for that, i am deeply in their debt. brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact.
    [Show full text]
  • The Blogization of Journalism
    DMITRY YAGODIN The Blogization of Journalism How blogs politicize media and social space in Russia ACADEMIC DISSERTATION To be presented, with the permission of the Board of School of Communication, Media and Theatre of the University of Tampere, for public discussion in the Lecture Room Linna K 103, Kalevantie 5, Tampere, on May 17th, 2014, at 12 o’clock. UNIVERSITY OF TAMPERE DMITRY YAGODIN The Blogization of Journalism How blogs politicize media and social space in Russia Acta Universitatis Tamperensis 1934 Tampere University Press Tampere 2014 ACADEMIC DISSERTATION University of Tampere School of Communication, Media and Theatre Finland Copyright ©2014 Tampere University Press and the author Cover design by Mikko Reinikka Distributor: [email protected] http://granum.uta.fi Acta Universitatis Tamperensis 1934 Acta Electronica Universitatis Tamperensis 1418 ISBN 978-951-44-9450-5 (print) ISBN 978-951-44-9451-2 (pdf) ISSN-L 1455-1616 ISSN 1456-954X ISSN 1455-1616 http://tampub.uta.fi Suomen Yliopistopaino Oy – Juvenes Print 441 729 Tampere 2014 Painotuote Preface I owe many thanks to you who made this work possible. I am grateful to you for making it worthwhile. It is hard to name you all, or rather it is impossible. By reading this, you certainly belong to those to whom I radiate my gratitude. Thank you all for your attention and critique, for a friendly talk and timely empathy. My special thanks to my teachers. To Ruslan Bekurov, my master’s thesis advisor at the university in Saint-Petersburg, who encouraged me to pursue the doctoral degree abroad. To Kaarle Nordenstreng, my local “fixer” and a brilliant mentor, who helped me with my first steps at the University of Tampere.
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]
  • Analisis Y Diagnostico De La Seguridad Informatica De Indeportes Boyaca
    ANALISIS Y DIAGNOSTICO DE LA SEGURIDAD INFORMATICA DE INDEPORTES BOYACA ANA MARIA RODRIGUEZ CARRILLO 53070244 UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA “UNAD” ESPECIALIZACION EN SEGURIDAD INFORMATICA TUNJA 2014 ANALISIS Y DIAGNOSTICO DE LA SEGURIDAD INFORMATICA DE INDEPORTES BOYACA ANA MARIA RODRIGUEZ CARRILLO 53070244 Trabajo de grado como requisito para optar el título de Especialista En Seguridad informática Ingeniero SERGIO CONTRERAS Director de Proyecto UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA UNAD ESPECIALIZACION EN SEGURIDAD INFORMATICA TUNJA 2014 _____________________________________ _____________________________________ _____________________________________ _____________________________________ _____________________________________ _____________________________________ _____________________________________ Firma del presidente del jurado _____________________________________ Firma del jurado _____________________________________ Firma del jurado Tunja, 06 de Octubre de 2014. DEDICATORIA El presente trabajo es dedicado en primera instancia a Dios quien día a día bendice mi profesión y me ayuda con cada uno de los retos que se me presentan a lo largo del camino de mi vida. A mi fiel compañero, amigo, cómplice y esposo, quien es la ayuda idónea diaria y mi fortaleza constante para seguir en el camino del conocimiento, quien no deja que me rinda y me apoya incondicionalmente para que día a día logre ser mejor persona. A mis familiares y compañeros de trabajo, por todo su amor, confianza y apoyo incondicional, a nuestros compañeros y profesores gracias por la amistad, la comprensión, los conocimientos y dedicación a lo largo de todo este camino recorrido que empieza a dar indudablemente los primeros frutos que celebramos. AGRADECIMIENTOS La vida está llena de metas y retos, que por lo general van de la mano con grandes sacrificios, por eso hoy podemos decir que gracias a Dios y nuestras familias esta meta se ha cumplido y seguramente vendrá muchas metas que harán parte de nuestro gran triunfo personal como familiar.
    [Show full text]
  • Twitter Taken Down by Ddos Attack August 2009
    the Availability Digest www.availabilitydigest.com Twitter Taken Down by DDoS Attack August 2009 On Thursday, August 6, 2009, the Twitter social networking site went down. It suffered repeated outages, timeouts, and serious slowdowns for at least two days. What caused this failure? To add to the mystery, Facebook and LiveJournal simultaneously had similar problems. Were these outages somehow related? They occurred at about the same time as the 2009 Defcon 17 hackers conference held from July 30th to August 2nd. Could this have been some misguided mischief? But first, what is Twitter? For those who haven’t yet become addicted, Twitter is a microblogging social networking site that allows users to communicate what they are doing to their “followers” at any time via 140-character text messages, or “tweets.” Twitter was born in 2006 and has exploded in use. It currently has about five-million registered users, and an estimated 45 million people follow these users via their tweets. Twitter sprung into the mainstream when Republican presidential candidate John McCain joined the 21st century technology by embracing tweeting following the 2008 U.S. presidential election. Even more recently, and perhaps more importantly, Twitter was the primary communication mechanism to the rest of the world from those Iranians participating in the major rallies decrying the recent Iranian presidential election process. The untimely death of Michael Jackson also saw a massive increase in tweet volume. The Twitter Outage Access to Twitter Lost Twitter has not been known for its availability record. Pingdom, a web-site monitoring service,1 reports that Twitter was down for 84 hours in 2008, achieving only a 99% uptime.2 It should be noted, however, that Twitter is working hard to improve this record; and its uptime improved significantly in the second half of 2008.
    [Show full text]
  • [Evillar] Tesis Doctoral
    Campus Universitario Dpto. de Teoría de la Señal y Comunicaciones Ctra. Madrid-Barcelona, Km. 36.6 28805 Alcalá de Henares (Madrid) Telf: +34 91 885 88 99 Fax: +34 91 885 66 99 DR. D. SANCHO SALCEDO SANZ, Profesor Titular de Universidad del Área de Conocimiento de Teoría de la Señal y Comunicaciones de la Universidad de Alcalá, y y DR. D. JAVIER DEL SER LORENTE, Director Tecnológico del Área OPTIMA (Optimización, Modelización y Analítica de Datos) de la Fundación TECNALIA RESEARCH & INNOVATION, CERTIFICAN Que la tesis “Advanced Machine Learning Techniques and Meta-Heuristic Optimization for the Detection of Masquerading Attacks in Social Networks”, presentada por Esther Villar Ro- dríguez y realizada en el Departamento de Teoría de la Señal y Comunicaciones bajo nuestra dirección, reúne méritos suficientes para optar al grado de Doctor, por lo que puede procederse a su depósito y lectura. Alcalá de Henares, Octubre 2015. Fdo.: Dr. D. Sancho Salcedo Sanz Fdo.: Dr. D. Javier Del Ser Lorente Campus Universitario Dpto. de Teoría de la Señal y Comunicaciones Ctra. Madrid-Barcelona, Km. 36.6 28805 Alcalá de Henares (Madrid) Telf: +34 91 885 88 99 Fax: +34 91 885 66 99 Esther Villar Rodríguez ha realizado en el Departamento de Teoría de la Señal y Comunica- ciones y bajo la dirección del Dr. D. Sancho Salcedo Sanz y del Dr. D. Javier Del Ser Lorente, la tesis doctoral titulada “Advanced Machine Learning Techniques and Meta-Heuristic Optimiza- tion for the Detection of Masquerading Attacks in Social Networks”, cumpliéndose todos los requisitos para la tramitación que conduce a su posterior lectura.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • BILLY GRAHAM the FREE MASON
    BILLY GRAHAM The FREE MASON This report also covers MANY other Well-Known TV Preachers who are Illuminists and FREE MASONS Compiled By Karen E. Connell EXTENDED LIFE Christian Training Ministry BILLY GRAHAM AND OTHER FREE MASONS Contents Billy Graham the Free Mason ............................................................................................................................ 6 Proof that Billy Graham is a Mason ................................................................................................................ 6 The Deception of Billy Graham—A mind Control Front ..................................................................... 7 A List of Known and Credible Witnesses ...................................................................................... 10 Clarifying What Is Looked For In Proof ................................................................................................. 11 The Motivation of the Co-Authors ...................................................................................................... 12 Clarifying what is Acceptable Testimony ........................................................................................... 12 The Policies of Deception by the Billy Graham Crusade Staff........................................................... 14 Billy Graham’s Active Role in Satanic Ritual Abuse ......................................................................... 16 Billy Graham is part of the people who implement the Monarch program .......................................
    [Show full text]