12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SUGGESTED FURTHER READING181As we have seen in previous chapters, social media on the Internet can have a great impactin a civil conflict as it allows a group with limited resources <strong>to</strong> produce a message heard by theglobal community. As a result, an opposing group (i.e., an existing regime) shall seek <strong>to</strong> limitthe effects of a social media-driven information operations campaign through a variety ofmeans. Using social engineering techniques <strong>to</strong> exploit Facebook accounts, for example, is alreadybeing looked at by groups such as the SEA <strong>to</strong> limit the effects of social media. Further,the linkages among user accounts in such sites form a complex social network, which often issusceptible <strong>to</strong> the spread of ideas through cascades. This fact may indicate that in the nearfuture techniques <strong>to</strong> influence large portions of an online user community in a propagandacampaign may appear in a conflict.SUMMARYOnline social media has ushered in a new age of how information is managed in conflictsituations. These information operations can both support or be supported by cyber warfare.We saw with the “Robin Sage” and the Facebook imposters that cyber warriors can leveragethe trust relationships of such sites in order <strong>to</strong> obtain the sensitive information that can lead <strong>to</strong>cyber exploitation and espionage operations. On the other side, groups such as the SEA leveragecyber-warfare techniques <strong>to</strong> hack in<strong>to</strong> user accounts of online social networks in aneffort <strong>to</strong> destroy the credibility of an adversary. Finally, in the future, such techniques maybe used with <strong>to</strong>ols from the study of complex networks in an attempt <strong>to</strong> influence large portionsof an online user community during a conflict.SUGGESTED FURTHER READINGThe Robin Sage experiment is outlined in Thomas Ryan’s paper “Getting in Bed with RobinSage” which was also presented at the BlackHat conference in 2010. BlackHat is one of thepremier hacker conferences. The actions of the Syrian Electronic Army were described bythe Information <strong>Warfare</strong> Moni<strong>to</strong>r group in a paper entitled “The Emergence of Open andOrganized Pro-Government <strong>Cyber</strong> Attacks in the Middle East: The Case of the Syrian ElectronicArmy” which is available on the Information <strong>Warfare</strong> Moni<strong>to</strong>r Web site (http://www.infowar-moni<strong>to</strong>r.net/2011/08/fake-facebook-page-targets-pro-revolution-syrian-users/).Further information about common hacking techniques used <strong>to</strong> illicitly obtain access in<strong>to</strong> auser’s Facebook or Twitter account are described in the book Hacking: The Next Generationby Nitesh Dhanjani, Billy Rios, and Brett Hardin. This book also includes accounts of howmany commercial Web-based email applications can be hacked—specifically noting how2008 vice-presidential candidate’s Sarah Palin’s email account was compromised duringher campaign. Incidentally, some of Palin’s personal communications were posted on 4chan’sb-board, the significance of which is described in Chapter 6.The study of complex social networks is a new and exciting emerging field of science combiningtechniques from computer science, sociology, physics, mathematics, economics, andbiology. For an introduction <strong>to</strong> this exciting new field, we recommend Networks, Crowds,and Markets: Reasoning About a Highly Connected World by David Easley and Jon Kleinberg.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!