12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CIVILIANS IN THE CYBER MELEE: OPERATION CAST LEAD39(i.e. broadcast) <strong>to</strong> emerging technologies on the Internet. 26 These efforts included outreach <strong>to</strong>Jewish and Israeli support groups worldwide through social media. This outreach differsfrom Hezbollah’s cybercortical warfare, which is oriented <strong>to</strong>ward the opponent as theseIsraeli efforts were directed at like-minded audiences <strong>to</strong> rally support.IO and <strong>Cyber</strong> <strong>Warfare</strong> in the 2008 Israel-Hamas WarIn late December 2008, Israel commenced a new operation—“Cast Lead”—with the goal ofs<strong>to</strong>pping missile strikes in southern Israel that originated from Gaza. The attack commencedwith an air assault that <strong>to</strong>ok out 50 Hamas targets on the first day. Israel emplaced a carefullyconstructed information campaign that actually began simultaneously with the physical conflict.Two days after the initial airstrike, the IDF launched the YouTube channel called the“IDF Spokesperson’s Unit.” This channel, the brainchild of some IDF soldiers, included a varietyof footage of the IDF—everything from video logs (“vlogs”) of IDF personnel <strong>to</strong> gunvideo of precision strikes and the footage of humanitarian assistance missions. 27 Additionally,the “Jewish Internet Defense Force” played a key role in encouraging the JewishDiaspora <strong>to</strong> become active in the “new media” of the Internet. For instance, their Web siteincluded instructions for using various types of social media—including Facebook, YouTube,Wikipedia, and various blogging services. Further, they also directed efforts against the “newmedia” of the opposing force as they also claimed <strong>to</strong> be responsible for shutting down severalpro-Hamas YouTube channels.Hamas and the inhabitants of Gaza responded <strong>to</strong> Israel’s IO campaign with its own contentdocumenting the devastation of the Israeli attack. Leveraging mobile phones, Twitter, digitalimages, and blogs, the Gazans were able <strong>to</strong> tell their s<strong>to</strong>ry <strong>to</strong> the world. 28 They responded <strong>to</strong>the attempts <strong>to</strong> shut down their YouTube channels with the creation of paltube.com—a sitededicated <strong>to</strong> Hamas videos.Not only did Hamas and its supporters fight Israeli IO with their own information campaign,and conducted a series of hundreds of defacements of Israeli Web sites. Though someWeb site defacements were high profile enough <strong>to</strong> gain the attention of mass media, 29 the actualdamage (likely economic) is presumed <strong>to</strong> have resulted from the sheer number of theseactions carried out by pro-Hamas hackers. Typically, the pro-Hamas groups conducted somerudimentary vulnerability scanning of targeted Israeli Web sites, often with the Web serversoftware. Upon obtaining access <strong>to</strong> parts of the server, the pro-Hamas hackers would defacethe Web sites with anti-Israeli graffiti. 30Perhaps the most notable hacking group for these Web site defacements was known as“Team Hell.” One member, known as “Cold Zero,” was responsible for over 2000 defacementsof Israeli Web sites, nearly 800 of which were carried out during the 2008 war. He allegedlyconducted defacements of high-profile sites such as Israel’s Likud Party and the TelAviv Maccabis basketball team. 31 Upon his arrest in early January 2009, “Cold Zero” wasfound <strong>to</strong> be a 17-year-old Palestinian male Israeli-Arab who worked with accomplices inother Islamic countries.In addition <strong>to</strong> Web site defacements, Hamas supporters also leveraged DDoS attacks on asmall <strong>to</strong> medium scale. Pro-Hamas hacker, Nimu al-Iraq, who is thought <strong>to</strong> be a 22-year-oldIraqi Mohammed Sattar al-Shamari, modified the hacking DDoS-<strong>to</strong>ol known as al-Durrah

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!