11.07.2015 Views

Cyberterrorism: The Bloodless War - WITSA

Cyberterrorism: The Bloodless War - WITSA

Cyberterrorism: The Bloodless War - WITSA

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Cyberterrorism</strong>:<strong>The</strong> <strong>Bloodless</strong> <strong>War</strong>?Pat McgregorChief Information Security ArchitectIntel Corporation3 October 2001


<strong>The</strong> threat of terrorist attacks againstU.S. citizens and U.S. interests aroundthe world has become the nation’s mostpressing national security issue. …This aggression may include cyberattacks by the terrorists themselves orby targeted nation-states.3 October 2001 <strong>Cyberterrorism</strong>/P McGregor 2


Even more likely are cyber attacksby sympathizers of the terrorists,hackers with general anti-US oranti-allied sentiments, or thrillseekerswith no particularpolitical motivation.Cyber Attacks During the <strong>War</strong> on Terrorism:A Predictive AnalysisDartmouth Institute for Security Technology Studies3 October 2001 <strong>Cyberterrorism</strong>/P McGregor 3


What Do We Know?Cyber attacks immediately followphysical attacksCyber attacks are increasing in volume,sophistication, and coordinationCyber attackers are attracted to highvaluetargetsMany, if not most, targets wouldprobably be commercial computer andcommunications systems3 October 2001 <strong>Cyberterrorism</strong>/P McGregor 4


Cyberwar Strategies<strong>The</strong> basic elements are:• Hacking• Virus writing• Electronic snooping• Old-fashioned human spyingMass disruption can be unleashed overthe internet, butAttackers first must compromise privateand secure networks3 October 2001 <strong>Cyberterrorism</strong>/P McGregor 5


Info<strong>War</strong>riors are not Scrip KiddiesFunded by foreign military organizations andterrorist groups• Likely to have more people and deeper pocketsCan devote more resources – people andtime• <strong>The</strong>y can crack systems that might withstandcasual assaultLikely to be more experienced• Will use more sophisticated tacticsSerious IW attackers would not reveal theiractivities until it is absolutely necessary3 October 2001 <strong>Cyberterrorism</strong>/P McGregor 6


Why Use Cyber <strong>War</strong>fare?Low barriers to entry – laptops cost a lotless than tanksComplex societies are dependent oncomputers and networksComputer disruption has economic,logistical, and emotional effectParalysis caused by computer outageslevels the playing field for less-wellequippedcountries3 October 2001 <strong>Cyberterrorism</strong>/P McGregor 9


Questions?3 October 2001 <strong>Cyberterrorism</strong>/P McGregor 12


Thank you!Pat McGregorpat.mcgregor@intel.com+1 916 356 35583 October 2001 <strong>Cyberterrorism</strong>/P McGregor 13


Selected SourcesBerkowitz, Bruce, “Information <strong>War</strong>fare: Time to Prepare.” Issues inScience and Technology, Winter, 2000.http://www.nap.edu/issues/17.2/berkowitz.htmGaudin, Sharon, “ Protecting a net in a time of terrorism”, NetworkWorld, 09/24/01. http://www.nwfusion.com/archive/2001/125631_09-24-2001.html“Cyber Attacks During the <strong>War</strong> on Terrorism:A Predictive Analysis.” Dartmouth Institute for Security TechnologyStudies.http://www.ists.dartmouth.edu/ISTS/counterterrorism/cyber_attacks.htmBickers, Charles, “Innovation, Cyberwar, Combat on <strong>The</strong> Web”. FarEastern Economic Review, August 16, 2001Risks Digest. http://catless.ncl.ac.uk/Risks3 October 2001 <strong>Cyberterrorism</strong>/P McGregor 14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!