Global Cyber Bi-Weekly Report by INSS November 1, 2016 ISRAEL

Total Page:16

File Type:pdf, Size:1020Kb

Global Cyber Bi-Weekly Report by INSS November 1, 2016 ISRAEL Global Cyber Bi-Weekly Report by INSS November 1, 2016 Editor-in-chief: Gabi Siboni, Editor: Hadas Klein; Contributors: Jeremy Makowski, Simon Tsipis, Gal Perl Finkel, Ido Sivan, Paola Aurucci ISRAEL US Department of Homeland Security officials are coming to Israel to discuss including Israeli cybersecurity companies in federal tenders For years, claims have been made in the United States that Israeli high-tech companies had incorporated backdoors in their products in order to gather information from US government departments and agencies. These claims, which, as far as is known, have never been verified, are the reason why Israeli companies are restricted from participating in US federal tenders. Now the Americans, with the aid of Israeli organizations, are trying to deal with the problem. A senior official in the US Department of Homeland Security is set to come to Israel to discuss with her Israeli counterparts ways of removing the restrictions. http://www.globes.co.il/en/article-us-govt-mulls-removing-bar-to-israeli-tech-cos- 1001156645 UNITED STATES Non-state actor likely behind US cyberattack The giant cyberattack that paralyzed many US sites last week was likely not the work of a foreign country, the top US intelligence chief James Clapper said. Clapper, who oversees US intelligence branches including the CIA, the FBI, sand Homeland Security, pointed to degrees of cybersecurity threats. “We’ve had this disparity or contrast between the capability of the most sophisticated cyber actors, nation-state cyber actors, which are clearly Russia and China, but have to this point perhaps more benign intent,” he said. “And then you have other countries who have a more nefarious intent. And then even more nefarious are non-nation-state actors,” he added. http://phys.org/news/2016-10-non-state-actor-cyber-clapper.html#jCp The Institute for National Security Studies 40, Haim Levanon St, POB 39950, Ramat Aviv, Tel Aviv 61398 Tel: +972-3-6400400 Fax: +972-3-7447588 United States vs. Russia: Cyber war will have to wait until after the election After US intelligence agencies and the Homeland Security Department accused and blamed Russia for cyber espionage designed to interfere with the presidential election, the Obama administration promised a response “to protect [the country’s] interests at a time and place of our choosing.” That response, however, seems unlikely to come before Election Day. According to four officials, Obama is giving the next president a chance to gradually hit back at Russia for hacking the DNC. http://www.thedailybeast.com/articles/2016/10/27/the-u-s-cyber-war-with-russia- will-wait-for-president-hillary-clinton.html EUROPE United Kingdom: British Army launches cyberattacks on ISIS Talking at an international conference on waging war, UK Defense Secretary, Sir Michael Fallon suggested that Britain is unleashing its cyber capability on ISIS. Indeed, in response to the question whether the United Kingdom is launching cyber- attacks on ISIS in order to reclaim the northern Iraqi city Mosul, the Defense Secretary answered: “I'm not going into operational specifics, but yes, you know we are conducting military operations against Daesh as part of the international coalition, and I can confirm that we are using offensive cyber for the first time in this campaign.” The UK army is now starting to launch cyber operations. In April 2015, they created a cyber unit named the 77th Brigade which includes reservists as well as regular soldiers, from all three services of the armed forces. Like the United States, the United Kingdom is now launching offensive cyber operations in order to counter terrorism and cyber terrorism activities. Indeed, terrorist groups such as ISIS are developing their cyber capabilities and using encrypted applications to communicate. Thus, armed forces have to adapt themselves and be more reactive. Cyber terrorism will continue, and if its impact is limited to attacking critical infrastructures, it most likely will directly cause human loss in the future. http://www.bbc.co.uk/news/uk-37721147 The Institute for National Security Studies 40, Haim Levanon St, POB 39950, Ramat Aviv, Tel Aviv 61398 Tel: +972-3-6400400 Fax: +972-3-7447588 RUSSIA Alarming Russian cybernetic strengthening The US administration has noted the strengthening of the Russian armed forces, including their cyber capabilities, GPS jamming, and the use of drones, according to US Secretary of the Army Eric Fanning. According to Fanning, in 2014, in the context of the disagreements with Russia over Ukraine, the Pentagon discovered that the Russian armed forces have improved many cybernetic aspects. https://ria.ru/world/20161024/1479893224.html Russian Foreign Ministry internet site hacked On October 23, the American hacker “the Jester” cracked the website of the Russian Foreign Ministry, CNN reported. The official representative of the Russian Foreign Ministry, Maria Zakharova, explained that it was an old site, which is no longer in operation. http://money.cnn.com/2016/10/22/technology/russian-foreign-ministry-hacked/ Russia to develop its own internet browser The Russian Federal Security Service approved on October 27 the ongoing local Russian internet browser development project, following the President’s decree from May 22, 2015. The aim is to create separate internet for each state under the name RSNet, based on the Federal Security Services’ resources and integrating all Russian government agencies and their subordinate organizations. http://www.securitylab.ru/news/484271.php Russia to tighten its cyber defense towards its elections Russia intends to strengthen the security of its presidential elections, to be held in 2018. According to the publication Izvestia, the Central Election Commission is considering the possibility of minimizing the influence of the human factor when entering the final protocols of the State Automated System (SAS) Elections. http://www.securitylab.ru/news/484267.php The Institute for National Security Studies 40, Haim Levanon St, POB 39950, Ramat Aviv, Tel Aviv 61398 Tel: +972-3-6400400 Fax: +972-3-7447588 MIDDLE EAST A hacking group operating from the Middle East, arguably linked to Hamas, has been exposed Several Cybersecurity firms have tracked the group’s activity. Its main tactics are social engineering, spear-phishing emails, and social media. http://news.softpedia.com/news/moonlight-apt-uses-h-worm-backdoor-to-spy-on- middle-eastern-targets-509667.shtml Cisco reports rise in cyber threats in the Middle East According to Cisco, the main cyber threats are to oil production and intellectual property. At the same time, the Middle East suffers from a shortage in cybersecurity professionals. http://www.4-traders.com/CISCO-SYSTEMS-INC-4862/news/Cisco-Cyber-threats-in- Mideast-rising-23260009/ CHINA and ASIA PACIFIC $43 million for new lab to bolster Singapore’s cyber security A new laboratory has been launched by the National Research Foundation (NRF). The new laboratory will bolster Singapore’s capabilities in the battle against cybersecurity threats. The NRF, National University of Singapore (NUS), and telecommunications company Singtel will invest $43 million in the lab over the next five years to develop new ways to fight such threats. The NUS-Singtel Cyber Security Research and Development Laboratory will dive deep into areas such as quantum cryptography, which uses light to secure communications over fiber-optic networks, as well as data analytics and machine learning, which helps in the auto-detection of threats. The National University of Singapore has developed some prototypes in quantum cryptography that will be tested over Singtel’s network, he added. The lab has also been tasked to develop a pool of cybersecurity professionals. It is slated to host 100 researchers and train 120 new cybersecurity professionals from undergraduate to postgraduate levels over the next five years. In 2013 the university The Institute for National Security Studies 40, Haim Levanon St, POB 39950, Ramat Aviv, Tel Aviv 61398 Tel: +972-3-6400400 Fax: +972-3-7447588 launched a five-year $130 million National Cyber Security Research and Development Program to bolster the nation’s security. http://bit.ly/2f5pVCj DDoS attack on StarHub, first of its kind on Singapore’s telco infrastructure: CSA, IMDA In a joint statement, the Cyber Security Agency of Singapore (CSA) and Infocomm Media Development Authority (IMDA) stated that the DDoS attacks on StarHub’s broadband network were the first of that nature on Singapore’s telecommunications infrastructure. This comes after the telco revealed in a media briefing that compromised devices such as webcams and routers owned by its customers led to the DDoS attacks. Communications and Information Minister, Dr Yaacob Ibrahim, said at an Asian Pacific cyber security summit that businesses must take action and address their specific cyber security needs, even as the government steps up efforts to help them stay safe. Dr Yaacob said the government has been consistent in pursuing cybersecurity development and working with multiple stakeholders, including businesses and international partners. This includes launching the national cyber security strategy earlier in October, and developing a multi-tiered cyber security response plan. A new Cybersecurity Act is also in the pipeline. Dr. Yaacob emphasized that the Government cannot do it alone, and urged companies to make cybersecurity a priority. http://bit.ly/2f79NFn China’s Xiongmai recalls webcams after cyberattack on Twitter and the New
Recommended publications
  • “Hacktivists” Strike Back
    SECUrITY AGENCE FRANCE-PRESSE Supporters of Wikileaks founder Julian Assange “Hacktivists” Strike Back wear Guy Fawkes masks Cyber attacks on financial institutions serve as they demonstrate against his arrest in as a warning sign Amsterdam in December 2010. The “Hacktivist” in december 2010, the websites of international financial services gi- group “Anonymous” has ants Visa, Mastercard and PayPal were temporarily shut down, victims adopted the Guy Fawkes of a coordinated cyber attack dubbed Operation Payback by its per- image as its public face. petrators. “Hacktivists” who support wikileaks and its founder Julian assange attacked after the companies terminated service and disabled donations to the website. The economic impact of the attack remains unclear and the tar- geted companies denied suffering consequential losses. but the attackers, using the names “anon” and “anonymous,” demonstrated the ability of cyber attacks to infiltrate and damage businesses and government agencies. A modern form of protest Amazon, the online retailer that hosted Anonymous didn’t protest by chanting slogans Wikileaks on its servers, was the first to pull out. or waving signs — it struck against Wikileaks’ Visa, MasterCard and PayPal soon followed, perceived enemies in the spirit of the virtual essentially crippling Wikileaks’ ability to accept world they share. Wikileaks, whose raison d'être is donations that support publishing efforts. The exposing classified or confidential government cyber attacks started soon after. or corporate information, is under pressure When Anonymous staged its attack in the vir- from the United States and other governments tual world, it used a favorite weapon of the cyber after leaking more than 250,000 U.S.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Wikileaks – Following the Cybertrail
    4/9/11 WikiLeaks – Following the Cybertrail 2011 VT InfraGard WikiLeaks Synposium Dr. Peter Stephenson, CISSP, CISM, FICAF Director, NUCAC-DF and CISO Norwich University A Tail of Digital Forensics and Anti- Forensics The players PFC Bradley Manning Julian Assange Adrian Lamo Kevin Poulsen Glen Greenwald Chet Uber Mark Rasch Kim Zetter Tyler Watkins David Finkel John Cook Ellen Nakashima Numerous other writers and journalists 1 4/9/11 The Timeline in Brief* 2008: U.S. Army Counterintelligence Center prepares a classified report placing WikiLeaks on “the list of the enemies threatening the security of the United States.” That Report discussed ways to destroy WikiLeaks’ reputation and efficacy, and emphasized creating the impression that leaking to it is unsafe. October: Manning enters the Army as a private 2009: November 24: Per chat logs, Manning said he first started working with Wikileaks after release of 9/11 pager messages, which was first announced on November 24, 2009 November 19: Earliest possible day Manning downloaded “Collateral Murder” video & all charges except accessing the Rejkjavik 13 cables, per Charge Sheet (Spec. 2 & 4) November 1: Earliest date for which government subpoenas Wikileaks related twitter accounts October: Manning arrives in Iraq. http://firedoglake.com/bradley-manning-wikileaks-timeline/ 2010: January 21: Manning leaves for US February 11: Manning returns to Baghdad from US February: Manning gives Wikileaks the video of the 2007 Army helicoper attack on Iraqi insurgents, according to Adrian Lamo in the Washington Post February 18 Wilikeaks publishes Rejkjavik cable dated January 13, 2010. According to the Manning/Lamo chat transcripts, after the leak Manning tracked the Northern Europe Diplomatic Security Team tailing Assange in Sweden.
    [Show full text]
  • Hacktivism, Anonymous & a New Breed of Protest in a Networked World
    HACKTIVISM, ANONYMOUS & A NEW BREED OF PROTEST IN A NETWORKED WORLD Noah C.N. Hampson Introduction Early on the morning of November 30, 2010, WikiLeaks.org came under assault by a hacker known as ‚th3j35t3r‛ (The Jester).1 By launching what is known as a denial of service (DoS) attack with soft- ware of his own invention, The Jester overwhelmed WikiLeaks’ serv- ers with requests for information.2 WikiLeaks.org soon crashed, and remained down for over a day.3 Days before, WikiLeaks made interna- tional headlines by posting on its website roughly 250,000 classified documents stolen from the U.S. government.4 On his Twitter feed, The Jester claimed credit: ‚www.wikileaks.org — TANGO DOWN — for attempting to endanger the lives of our troops, ‘other assets’ & foreign relations #wikileaks #fail‛.5 To get its web site back online, WikiLeaks promptly switched hosting providers and began renting bandwidth from Amazon.com.6 DoS and other attacks against WikiLeaks continued, but were unsuc- cessful.7 Shortly thereafter, however, Amazon ousted WikiLeaks from 1 Sean-Paul Correll, ‘Tis the Season of DDoS – WikiLeaks Edition, PandaLabs Blog (Dec. 4, 2010), http://pandalabs.pandasecurity.com/tis-the-season-of-ddos-wikileaks-editio/. 2 See Neil J. Rubenkind, WikiLeaks Attack: Not the First by th3j35t3r, PC (Nov. 29, 2010), http://www.pcmag.com/article2/0,2817,2373559,00.asp 3 See Correll, supra note 1. 4 See Scott Shane & Andrew W. Lehren, Leaked Cables Offer Raw Look at U.S. Diplomacy, N.Y. Times, Nov. 29, 2010, at A1, available at http://www.nytimes.com/2010/11/29/world/29cables.html.
    [Show full text]
  • Issue 19 | August 12, 2013 and RADIO ONE
    Issue 19 | August 12, 2013 AND RADIO ONE NATIONWIDE TOUR 2013 SAMMYS 65 Crawford Street, Dunedin FRIDAY 23rd AUGUST TICKETS AVAILABLE FROM COSMIC CORNER STORES AND ONLINE FROM WWW.EVENTFINDER.CO.NZ Support from SUMMER THIEVES and DAVE BOOGIE Hosted by MAX DAD E 2 | Issue 19 | Critic The IN ASSOCIATION WITH NEW ZEALAND SYMPHONY ORCHESTRA UNBEATABLE STUDENT presents – DEALS WORLDWIDE MAGNIFICENT PARIS LONDON BALI MOZART ONE WAY ONE WAY RETURN FROM$889 FROM$979 FROM $999 MOZART The Abduction from the Seraglio: Overture ALL AGES ALL AGES ALL AGES MOZART Sinfonia Concertante MOZART Symphony No.40 BANGKOK LOS ANGELES EUROPE The ultimate RETURN RETURN RETURN FROM $1069 FROM$1349 FROM$1849 Mozart STUDENT/UNDER 26 STUDENT/UNDER 26 STUDENT/UNDER 26 experience ROUND THE WORLD FROM $2099 Wed 21 Aug STUDENT/UNDER 26 andrew 6.30pm GraMs – duNEdIN CONduCTOR Town Hall Vesa-Matti UP TO 10% OFF CONTIKI Leppänen – Scan to listen PLUS EUROPE WINTER TOURS VIOLIN JULia JOYCe – COME AND SEE THE TEAM AT STA TRAVEL TODAY! VIOLA 207a George Street (inside Starbucks) For ticket details go to P: 03 474 0146 E: [email protected] nzso.co.nz Terms and conditions apply, ask in -store for details. 18 to 35? Get cheap tickets at nzso.co.nz/pya Critic | Issue 19 | 3 EDITOR Sam McChesney DePUTY EDITOR Zane Pocock SUB EDITOR Sarah MacIndoe TeCHNICAL EDITOR 20 Sam Clark FEATURE DesIGNER 29 | Big Brothers-At-Arms Daniel Blackball We live in an age of surveillance, in which our lives are policed by social norms and groupthink.
    [Show full text]
  • (Ddos) Attacks
    Distributed Denial of Service Attacks Against Independent Media and Human Rights Sites Ethan Zuckerman, Hal Roberts, Ryan McGrady, Jillian York, John Palfrey† The Berkman Center for Internet & Society at Harvard University December 2010 † Ethan Zuckerman is a senior researcher at the Berkman Center for Internet & Society. Hal Roberts is a fellow at the Berkman Center. Ryan McGrady is a PhD student at North Carolina State University. Jillian York is a staff member at the Berkman Center. John Palfrey is a faculty co-director of the Berkman Center. 1 Table of Contents 1. Executive Summary 3 2. Introduction 6 3. Background 8 3.1. Core vs. Edge 9 3.2. A Brief History of DDoS 11 3.3. Current State of the Art 13 3.4. How DDoS Works 15 3.5. Mitigating DDoS 21 3.6. Additional Attacks 23 4. Research 25 4.1. Media Review 25 4.2. Survey 33 4.3. Interviews 38 4.4. Working Meeting 42 5. Recommendations 48 6. Glossary 58 2 1. Executive Summary Our research begins with the idea that Distributed Denial of Service (DDoS) is an increasingly common Internet phenomenon and is capable of silencing Internet speech, usually for a brief interval but occasionally for longer. We explore the specific phenomenon of DDoS attacks on independent media and human rights organizations, seeking to understand the nature and frequency of these attacks, their efficacy, and the responses available to sites under attack. Our report offers advice to independent media and human rights sites likely to be targeted by DDoS but comes to the uncomfortable conclusion that there is no easy solution to these attacks for many of these sites, particularly for attacks that exhaust network bandwidth.
    [Show full text]
  • The Jester Free
    FREE THE JESTER PDF James Patterson,Andrew Gross | 544 pages | 01 Mar 2004 | Headline Publishing Group | 9780755300204 | English | London, United Kingdom The Jester Race - Wikipedia As The Jester celebrates its 30th birthday, we have six shows to get you ready for those pivotal years of your life Get some streaming picks. Set four years after the Portuguese revolution and the simultaneous loss of the Portuguese empire in Africa, the story concerns a director who sells guns to finance his play. The idea of combining the action with performance of a play is good, but the way it is done is The Jester than a little confusing. Perhaps you need to be Portuguese to understand this one. Looking for some great streaming picks? Check out some of the IMDb editors' favorites movies and shows to round out The Jester Watchlist. Visit our What to Watch page. Sign In. Keep track of everything you watch; tell your friends. Full Cast and Crew. Release Dates. Official Sites. Company Credits. Technical The Jester. Plot Summary. Plot Keywords. Parents Guide. External Sites. User Reviews. User Ratings. External Reviews. Metacritic Reviews. Photo Gallery. Trailers and Videos. Crazy Credits. Alternate Versions. Rate This. Added to Watchlist. Portugal: watchlist. Share this Rating Title: The Jester 6. Use the The Jester below. You must be a registered user to use the IMDb rating plugin. Photos Add Image Add an image Do you have any images for this title? Edit Cast Cast overview, first billed only: Fernando Heitor Cousin Raul Solnado Undercover Agent Rui Lopes Undercover Agent Bernardo Figueiredo Sailor Pedro Martins Edit Storyline Set four years after the Portuguese revolution and the simultaneous loss of the Portuguese empire in Africa, the story concerns a director who sells guns to finance his play.
    [Show full text]
  • Digital Democracy and the Impact of Technology on Governance and Politics: New Globalized Practices
    Digital Democracy and the Impact of Technology on Governance and Politics: New Globalized Practices Christina Akrivopoulou Democritus University of Thrace, Greece Nicolaos Garipidis Aristotle University of Thessaloniki, Greece Managing Director: Lindsay Johnston Editorial Director: Joel Gamon Book Production Manager: Jennifer Yoder Publishing Systems Analyst: Adrienne Freeland Development Editor: Monica Speca Assistant Acquisitions Editor: Kayla Wolfe Typesetter: Christina Henning Cover Design: Jason Mull Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2013 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Digital democracy and the impact of technology on governance and politics: new globalized practices / Christina Akrivo- poulou and Nicolaos Garipidis, editors. p. cm. Includes bibliographical references and index. Summary: “This book brings together a detailed examination of the new ideas on electronic citizenship, electronic democracy, e-governance, and digital legitimacy, combining theory with the study of law and public policy”-- Provided by publisher. ISBN 978-1-4666-3637-8 -- ISBN 978-1-4666-3638-5 (ebook) -- ISBN 978-1-4666-3639-2 (print & perpetual access) 1.
    [Show full text]
  • Download Hacker's Almanac
    A FIELD GUIDE to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals TABLE OF CONTENTS INTRODUCTION: THE EVOLVING THREAT LANDSCAPE ................................................................................... 1 1.0 CYBERTHREATS 1.1 BOTNETS ....................................................................................................................... 2 1.2 CONSUMER TOOLS........................................................................................................ 5 1.3 DEFACEMENTS .............................................................................................................. 8 1.4 EXPLOIT KITS ................................................................................................................ 11 1.5 RANSOMWARE .............................................................................................................. 13 1.6 TROJANS ....................................................................................................................... 15 2.0 THREAT ACTORS 2.1 ADVANCED PERSISTENT THREAT (APT) ...................................................................... 18 2.2 DENIAL-OF-SERVICE (DOS) GROUPS ............................................................................ 21 2.3 HACKTIVISTS ................................................................................................................ 23 2.4 INSIDERS ....................................................................................................................... 26 2.5
    [Show full text]
  • Systémový Model Protidžihádistického Vigilantismu
    MASARYKOVA UNIVERZITA Fakulta sociálních studií Katedra politologie Mgr. Jakub Drmola Kybernetická bezpečnost: systémový model protidžihádistického vigilantismu Disertační práce Školitel: prof. JUDr. PhDr. Miroslav Mareš, Ph.D. Brno 2017 Čestné prohlášení Čestně prohlašuji, že jsem disertační práci s názvem Kybernetická bezpečnost: systémový model protidžihádistického vigilantismu vypracoval samostatně a uvedl veškerou použitou literaturu a prameny. V Brně dne 20. 9. 2017 Jakub Drmola 1 Poděkování Za odborné vedení a pomoc v průběhu celého mého studia si v prvé řadě zaslouží velké poděkování Miroslav Mareš. Za podněty, spolupráci, kritiku, trpělivost a plamenné akademické rozepře na půdě naší fakulty i mimo ni bych chtěl poděkovat především Petře Vejvodové, Janu Hanzelkovi a Vendule Divišové. Vděk si zaslouží také všichni bývalí i současní kolegové z našeho oboru, kteří mě motivovali, rozvíjeli a společně tvořili a stále tvoří plodné prostředí. Pronikání do konceptuálních a metodologických tajů dynamických systémů, jejich modelů a simulací by nepochybně bylo o poznání pomalejší a méně příjemné, kdyby mne při něm neprovázeli Tomáš Hubík, Niels van Rosmalen, Jonas Matheus, Tim Clancy a mnoho dalších mentorů a kolegů z UiB, EMSD a SDS. I jim všem patří můj dík. V neposlední řadě musím poděkovat své rodině a přátelům za neutuchající podporu během studia i mimo něj a za tolik potřebná rozptýlení, bez nichž by průchod doktorským studiem nebyl možný. 2 Anotace Tato disertační práce se zabývá povahou a vlivem protidžihádistického vigilantismu v kyberprostoru na džihádismem motivovaný terorismus, a to zejména z hlediska počtu útoků a množství jejich obětí. K tomuto účelu je sestaven hybridní stochastický model, který stojí na metodách Systémové dynamiky a principech mocninných zákonů.
    [Show full text]
  • Targets and Combatants 2
    © Yurii Andreichyn/Shutterstock. © Yurii CHAPTER Targets and Combatants 2 HE HISTORY YOU LEARN IN SCHOOL is fi lled with stories of military victories and losses. When the word war is mentioned, people immediately conjure Tup images of armies marching off to fi ght. Over thousands of years of documented human warfare, people have become used to identifying a variety of traditionally accepted military targets. These include military bases, vehicles, groups of soldiers, and infrastructure that supports military operations. Many of the same targets exist in cyberwarfare. An enemy can attack strategically important military units, facilities, infrastructure, vehicles, and, more recently, the control systems for drones. The variety of targets and combatants who may participate in cyberwarfare is broad. Further, many of the countries considered to have signifi cant cyberwarfare capabilities typically do not make public their doctrines for cyberwarfare. This chapter discusses both operational concepts for the U.S. Department of Defense (DoD) and concepts that expand the ideas of cyberwar beyond those currently accepted as part of U.S. information operations doctrine. Thus, it explores the wider potential boundaries of a constantly changing form of warfare. As you read this chapter, keep in mind that U.S. cyberspace operations doctrine defi nes three cyberspace missions: offensive cyberspace operations (OCO), defensive cyberspace operations (DCO), and DODIN operations, which are DoD operational actions to secure, confi gure, operate, and maintain the DoD’s systems and capabilities. The United States also defi nes Information Operation (IO) as “the application of force and the employment of information with the goal of affecting the perception and will of adversaries” and in terms of seven components: computer network attack (CNA), computer network defense (CND), intelligence gathering, electronic warfare, computer network espionage (CNE), psychological operations (PSYOPS), and operations security.
    [Show full text]
  • Self-Organizing High-Assurance Privacy
    UPTEC IT 19015 Examensarbete 15 hp Augusti 2019 Self-Organizing High-Assurance Privacy Joakim Ingnäs & Nicole Tutsch Institutionen för informationsteknologi Department of Information Technology Abstract Self-Organizing High-Assurance Privacy Joakim Ingnäs & Nicole Tutsch Teknisk- naturvetenskaplig fakultet UTH-enheten When using a network, devices might have to securely communicate with one another. Issues arise when the devices are unaware of others in the network, or Besöksadress: when the devices have to be manually updated with the information about the Ångströmlaboratoriet Lägerhyddsvägen 1 devices they wish to communicate with. This presents an issue with bootstrapping Hus 4, Plan 0 over networks. Therefore, the question of how to make these devices find the relevant peers becomes a pressing one. In addition, the devices have to securely Postadress: exchange keys. In this paper, a solution is presented using a rendezvous point that Box 536 751 21 Uppsala acts as a gateway between a key distribution server and the clients. The architecture of the system consists of one rendezvous point, one key distribution Telefon: server, and multiple clients. The clients have to go through the rendezvous point in 018 – 471 30 03 order to reach the key distribution server. Two different protocols, RSA and Telefax: password-authenticated key exchange, are studied in order to understand which 018 – 471 30 00 one of them is superior in key exchange security. The result of the study is that the RSA protocol is faster than the password-authenticated key exchange protocol Hemsida: when applied to this solution. However, password-authenticated key exchange is http://www.teknat.uu.se/student seen as safer, as it applies security measures that RSA lacks.
    [Show full text]