12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

316 INDEXNATO (Continued)high-level connections, 175Night Dragon campaign, 176“virtually disguised” as commander, 172Network science, 203NIST. See National Institute of Standards andTechnology (NIST)Notable hacks on anonymousAnonPaste, 94AnonTune, 93anonymous’ campaigns, 78Anonymous-OS 0.1/Live, 94–95Arab Spring, 90–91CCC (see Chaos Computer Club (CCC))Guy Fawkes mask, 74–75, 74f, 77Habbo hotel raids, 87–88HBGary Federal and Aaron Barr, 91–92headless suit, 74f, 77Internet vigilantism, 88–89LulzSec, 82–85memes (see Memes)modus operandi, 85–87“Operation Mayhem Code Tyler”, 77personal information, hackers, 81physical structure, 76–77PLF (see People’s Liberation Front (PLF))political activism, 82Project Chanology, 89–90R3dH4ck (RedHack) attacks, 82self-proclaimed Anons, 79–80Straightforward Operations, 92–93summer fags, 75TeaMp0isoN, 80–81Novaya Gazetadefined, 47–48LiveJournal, 49–50“March of Millions”, 52–53motivation, 2011 DDoS, 50–51Yulia Latynina, 48OObject-oriented malware, 166–169Object-oriented programming (OOP), 166–167OOP. See Object-oriented programming (OOP)Operation Auroraindica<strong>to</strong>rs, 148–150intellectual property, 146–148Trojan.Hydraq, 145–146Operation Cast LeadIDF, 38–39IO and cyber warfare, Israel-Hamas war,39–41Optima/darkness botnet, 51–52P“Patriot”, 40People’s Liberation Army (PLA)INEW and cyber, 121unrestricted warfare, 118–119People’s Liberation Front (PLF)and Anonymous, 78Commander X, 75political activism and civil disobedience, 80People’s Republic of China (PRC)C&C serverrs, 137–138cyber espionage operations, 138SIGINT stations, 140–141Tibetan government, 133, 139fTibetan institutions, 140Phishing, 134–135PIRs. See Priority information requirements (PIRs)“Privilege escalation vulnerabilities”, 162–163PKI. See Public Key Infrastructure (PKI)PLA. See People’s Liberation Army (PLA)PLCs. See Programmable logic controllers (PLCs)PLF. See People’s Liberation Front (PLF)Political cyber attack, 2007DDoS (see Distributed denial of service (DDoS))DoS (see Denial of service (DoS) attacks)Es<strong>to</strong>niaBronze Soldier of Tallinn, 17f, 19DDoS attacks, 19, 20electronic and physical disruptions, 17e-mail servers, internet, 17government’s response, 18–19Toompea Castle, 17, 18freliance, information, 12Power gridaccess, 212cascading failure, 220–221categories, 211control, 213description, 210discovery, 212functions, 211offline, 217–221“smart grid”, 210transmission substations target, 218–219PRC. See People’s Republic of China (PRC)Preda<strong>to</strong>r UAVDARPA, 186–187hacking, feedKata’ib Hezbollah, 191–193vulnerability, 188–191, 193wireless networks, 189–191Priority information requirements (PIRs), 30Programmable logic controllers (PLCs)SCADA systems, 226–227

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!