12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

P A R T IICYBER ESPIONAGE ANDEXPLOITATIONIn this part, we discuss cyber espionage and exploitation, which deals withthe theft of information through and from computer systems. Throughoutthe last decade, there have been many such incidents which are believed<strong>to</strong> be politically motivated. In most of these cases, the data are s<strong>to</strong>len as par<strong>to</strong>f intelligence collection, theft of intellectual property and/or <strong>to</strong> gain a technologicalknowledge of an adversary’s weapons systems. Many such eventswere attributed <strong>to</strong> hackers from China. Hence, all of Chapter 7 is dedicated <strong>to</strong>cyber espionage attributed <strong>to</strong> China. This if followed by a discussion of themore recently discovered cyber-based intelligence gathering platforms suchas Duqu, Flame, and Gauss in Chapter 8. Then we discuss of social networkexploitation in Chapter 9—which is an emerging trend in social engineeringand intelligence collection. Finally, in Chapter 10, we take a more tacticalview of cyber exploitation in studying the interception of unencrypted videofeed from the Preda<strong>to</strong>r drones during Operation Iraqi Freedom by Shi’itemilitants.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!