CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18...
-
Upload
clyde-lynch -
Category
Documents
-
view
217 -
download
1
Transcript of CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18...
![Page 1: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/1.jpg)
CHANGING PERCEPTIONS OF CYBER WARFARE
Presentation Higher Command CourseArmy College of Warfare
18 October 2003
![Page 2: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/2.jpg)
2
Genesis of the Internet Rand thesis Internet a product of the cold war Paradigm shift – hierarchical to
networking Advent of WWW Gift of TCP/IP to public domain
![Page 3: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/3.jpg)
3
CYBER ABUSES
CYBER TERROR
CYBER FRAUD
CYBER LAUNDERING
CYBER INFRACTION
CYBER HACKING
CYBER PHREAKING
CYBER HACTIVISM
SPYING
SPOOFING
SNIFFING
SPAMING
SPINNING
STALKING
SEEDING (Viruses, Worms & Trojans)
![Page 4: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/4.jpg)
4
Maxim
The Internet is the high ground and a first termer in NDA will know that the first lesson that one learns is to occupy high ground and hold it under all costs.
![Page 5: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/5.jpg)
5
![Page 6: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/6.jpg)
6
Cyber Terrorism Threat The most potent threat vector. We are victims of polemics and politics of
definitions. What is terrorism? Is cyber terrorism a hype or for real?
![Page 7: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/7.jpg)
7
According to National Information Protection Centre
(NIPC), ”Cyber terrorism is an act through computers
that results in violence death and/or destruction and
creates terror for the purpose of coercing a government
to change its policies.”
“Cyber terrorism is the premeditated, politically
motivated attack against information, computer
systems, computer programmes, and data which result
in violence against non combatant targets by sub-
national groups or clandestine agents”
CYBER TERRORISM
![Page 8: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/8.jpg)
8
Cyber Psywar zoom Cyber anarchy is a vested interest. Anthrax, SARS and Melissa are more
psychological than physical. We are in permanent and perpetual
state of threat. The Motto: “We need to give them back,
something to live for, instead something to die for.”
Cyber security is now a big business
![Page 9: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/9.jpg)
9
Cyber enabled Terror InfoInfra Terror threats. Propaganda and psyops. Communications; crypto, stegano, PGP Money laundering, hawala. WMD Int, tech snooping, contact with hackers
and criminals. Proxy operations. Transacting, shopping and scheduling in
contrabands, drugs and weapons Clandestine meetings and RVs, ICQ, IRC
![Page 10: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/10.jpg)
10
Cyber Terrorism Threat (Contd) Asymmetric warfare anchors on
unpredictable “the unknown unknown.” Both the perpetrator and the victim deny
the impact if not the criminal/terror act. A virtual attack may coincide with real
one, e.g. imagine mayhem if Code Red and 9/11 were mounted simultaneously
![Page 11: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/11.jpg)
11
----------------
1. Unknown hacker sends Code red worm out onto the Internet to find a vulnnerable host server
2. The worm propagates to other vulnerable servers, turning them into dummies that infect other servers. And this process continues exponentially
3. …Code red ceases to proliferate, and the numerous dummy servers turn to attack the White House website, attempting to overwhelm its server with junk communications
<whitehouse.gov>
![Page 12: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/12.jpg)
12
Surveillance & Security Industry
The digital surveillance and security industry is spurting sharply.
It is expected to cross $50 billion mark worldwide by 2008.
![Page 13: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/13.jpg)
13
Threats to Infrastructure The physical infrastructure threat. Ranges from compromising critical
systems to severely affecting them. Critical physical infrastructure, e.g.
power grids, water, railways, dams, hospitals, oil pipelines, TV and AIR stations, telecommunications, air traffic, or any other networked system.
![Page 14: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/14.jpg)
14
Scepticism
“To us cyber terrorism is a lower-level threat”
Marcus Kempe, Director Operations,
Masachusetts Water Source Authority
![Page 15: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/15.jpg)
15
Vitek Borden Exploit
A hacker Vitek Borden succeeded in releasing a million litter of sewage into the water supply in Australia after 44 attempts
![Page 16: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/16.jpg)
16
India’s SCADA Systems SCADA stands for Supervisor Control
and Acquisition of Data – these are systems that are cybernated or computer controlled/
30 percent of such networks are accessible by modems connected to public switched telephone networks.
Employees are lax about manual backup.
![Page 17: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/17.jpg)
17
Threat to Data Compromising critical computer
systems to steal or irreversibly damage vital data. More pronounced against military, R&D, defence production and other sensitive data.
More critical the data, greater the vulnerability.
![Page 18: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/18.jpg)
18
THREATS TO INDIAN CYBERSPACE Muslim Hacker Club Al Qaeda network ISI covert Internet-enabled spy
network. ICT exploitation tactics. Pak “G” Force, mOs, WFD, PHC and
Silver Lords LTTE cyber hactivism. Mercenary hackers.
![Page 19: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/19.jpg)
19
![Page 20: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/20.jpg)
20
Cyber Crime – Wide Canvas Rampant misuse and abuse of e-
banking and e-businesses. Unauthorized access to data. Forgery of digital signatures. Infringement of intellectual property
rights covering patents and trademarks. Fraudulent subversion of electronic
payment systems. Spamming.
![Page 21: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/21.jpg)
21
Cyber Crime (contd) Wars over domain names,
browsers and portals. Monopoly practices. Commercial spying. Porno Growing menace of intruders,
masqueraders, and saboteurs in the cyberspace.
![Page 22: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/22.jpg)
22
Security Breaches (1997-2001)
0
20
40
60
80
100
(% o
f Res
po
nd
ents
)
1997
1998
1999
2000
2001
Respondents 1997 98 99 2000 01
CSI/ FBI 2001 Survey 484 583 460 428 503
DoS Laptop Unauth Virus Sabotage IPR System Telecom Fin
Access theft penetration fraud fraud
![Page 23: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/23.jpg)
23
Threat Perception by US Defence Science Board in 1996
StateSponsored
Terrorist
Espionage
Criminal
Individual hacker
High
Low
Low High
Probability of Occurrence
Potential damage
1996
2000
2004
Source : Jane’s Intelligence Review, Dec 2000
![Page 24: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/24.jpg)
24
![Page 25: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/25.jpg)
25
CYBER SURVEILLANCE
Systematic observation of cyberspace by surfing, sniffing, snooping or other means. primarily for the purpose of locating, identifying, determining, profiling and analyzing by all available and predictable means the transmission of e-mail, movement of packets, file transfer, e-money transactions and subversive activities of criminals, cyber terrorists, hostile regimes and intelligence agencies.
![Page 26: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/26.jpg)
26
CYBER SURVEILLANCE
It equally applies to watch over friendly elements to anticipate and prevent cyber crime and social abuse, carry out counter surveillance and find holes in own procedures and systems of cyber security
![Page 27: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/27.jpg)
27
CYBER INTELLIGENCE
Cyber Intelligence is open-source information minus noise, gathered over the Internet
The product resulting from the collection, processing, integration, analysis, evaluation and interpretation of available information concerning hackers, criminals, terrorists, hostile countries and cyber operations.
![Page 28: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/28.jpg)
28
CYBERINT
HACKERINT TERRORINT
E-MAILINTERCEPTION
WEBINT
OPEN INTELLIGENCECOUNTRIES OF INTEREST
COMMERCIAL& TRADE-INT
CYBERCRIME INT
IRC
SPYINGSNOOPINGSNIFFING
CYBERINT
BB
INT ON SECURITY PRODUCTS
ICQ
![Page 29: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/29.jpg)
29
![Page 30: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/30.jpg)
30
Sun Tse Precepts in Cyber Arena
PLA’s capabilities to spy in cyberspace is next only to Echelon and that of waging cyber war and protecting cyber assets next only to NATO.
The scope of Chinese Information warfare spreads over a wide canvas, military, social, economic and political.
Encompasses electronic warfare, attacks on “human cognitive systems,” cyber, signal and signal deception, strategic deterrence,
![Page 31: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/31.jpg)
31
Cyber Warfare is all Deception and Ess Abuses propaganda warfare, psychological
warfare, network warfare, structural sabotage and trade warfare.
#The Chinese have no compunctions whatsoever for employing dubious tactics, machinations and subterfuge, e.g invasion of adversaries’ financial systems, use of computer viruses, human sabotage, disrupting enemies’ economies, or spreading rumours over the Internet and thus psychologically impacting society.
![Page 32: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/32.jpg)
32
Doctrine and Training “PLA has successfully integrated the latest
C4ISRT (Command, Control, Communications and Computers Intelligence, Surveillance, Reconnaissance and Targeting) and information warfare techniques into its war doctrine.”
The Chinese have been conducting training in cyber warfare.
![Page 33: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/33.jpg)
33
Sino-Taiwanese Cyber War 1997-99
@Eversince 1997 the Taiwanese and Chinese armed forces have been preparing openly for a long drawn hacker war.
@“The wolf has already come. Pick up your hunting rifle!”
@The most serious attack has been that of the Chernobyl virus, written by a Taiwanese computer engineering student, Chen Ing-hao.
@The virus reportedly impaired 3,60,000 computers in China and caused $120 million in damage.
![Page 34: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/34.jpg)
34
Cyber War -1
@Whereas China accused Taiwanese complicity, the Taiwanese authorities maintained that it was an individual act of crime.
@The Guaangzhou Military Region, which includes the South China Sea Fleet and the Second Artillery units, was hit and was paralyzed.
![Page 35: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/35.jpg)
35
Cyber War-1
@A state of emergency was declared placing the Nanjing Military Region and the East China Sea Fleet on second-degree combat readiness. This was the first time China’s military entered a second degree combat readiness since the death of Deng Xioping in February 1997.
![Page 36: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/36.jpg)
36
Cyber war-1@ After the incident, the State Council and the
Central Committee Military Commission promptly ordered the formation of a task force composed of General staff Intelligence Department, General staff Technology and Communications Department, Ministry of Defence Technological Intelligence Department, Institute of Military Sciences’ Special Technologies Department (also known as Department 553), and Ministry of Security’s Security Bureau.
![Page 37: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/37.jpg)
37
China is reportedly considering developing a fourth branch of its People's Liberation Army devoted solely to cyberwarfare.
"China’s military planners recognize that... over-dependence on information systems is a potential weakness... Combining information warfare - such as computer hacking - with irregular special and guerilla operations, would allow China to mount destructive attacks within the enemy’s own operations systems, while avoiding a major head-on confrontation." (For more on prospective Chinese cyberwar strategies, read Unrestricted Warfare [file is in .pdf format], a book of military proposals written by two young Chinese military officers in February 1999.)
![Page 38: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/38.jpg)
38
China’s Cyberwar Strategies
For more on prospective Chinese cyberwar strategies, read Unrestricted Warfare, a book of military proposals written by two young Chinese military officers in February 1999.
![Page 39: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/39.jpg)
39
Sino-US CYBER WAR 2001 This war started as a sequel to the
collision between American military surveillance plane and the Chinese fighter jet on April 1, 2001.
China launched massive attacks agains US Websites including those of
It's (Cyber) War: China v. U.S. Crackers Expand Private War FBI Warns of Chinese Hack Threat
![Page 40: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/40.jpg)
40
Cyber War-2
The Xinhua News Agency reported that U.S hackers have defaced the websites of the provincial governments of Yichun, Xiajun and Beijing, the Deng Xiaoping police force,the Tsinghua and Xinjiang Universities, and Samsung's and Daewoo Telecoms' Korean sites.
![Page 41: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/41.jpg)
41
Cyber War-2
FBI-led National Infrastructure Protection Center (NIPC) confirmed that Chinese hackers had been active in launching Web defacing and distributed-denial-of-service attacks on the Department of the Interior's National Business Center, the U.S. Geological Survey's site and Pacific Bell Internet Services
![Page 42: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/42.jpg)
42
National Security Presidential Directive 16
President Bush signed a directive in July 2002, ordering the government to develop a cyber-warfare guidance plan. The strategic doctrine would detail when the U.S. would use cyber attacks, who would authorize it, what constitutes legitimate targets, and what kinds of attacks -- Denial of Service, hacking, worms -- could be used.
![Page 43: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/43.jpg)
43
The Fifth Dimension The U.S. government and military have been
studying the possibility of cyberwarfare for years, although it has only recently become a realistic threat. The U.S. military is convinced that "operations within the information domain will become as important as those conducted in the domains of sea, land, air, and space." (Source: Joint Vision 2020).
![Page 44: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/44.jpg)
44
The full extent of the US cyber arsenal is among the most tightly held national security secrets. But reports point to a broad range of weapons under development, including use of computer viruses or "logic bombs" to disrupt enemy networks, the feeding of false information to sow confusion and the morphing of video images onto foreign television stations to deceive.
![Page 45: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/45.jpg)
45
Maxim An extraordinary amount of detailed
intelligence is needed about a target's hardware and software systems for mounting a large scale cyber attack. Commanders must know not just where to strike but be able to anticipate all the repercussions of an attack.
![Page 46: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/46.jpg)
46
Indo-Pak Cyber War
* It’s desi hackers vs rediff.comPak G Force. N Vidyasagar The Times of India
www.ofbjp.org * War in Cyberspace, Priya
Ganapati, www.rediff.com
![Page 47: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/47.jpg)
47
Al Qaeda – ISI Gathbandan Al Qaeda uses simple hacking tools, e.g.
LOphtCrack that can break 8 letter/figure password in two minutes. The tool is freely downloadable.
Al Qaeda doing recce of critical infrastructure in particular that of US, Russia and India.
Technical expertise: Khaled Sheikh Mohammad studied engineering in a university in North Carolina
![Page 48: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/48.jpg)
48
Gathbandhan (contd) Some experts had training in
computer security. ISI ran classes at Qandhar and in Malaysia under Muslim Hacker Club. Reports suggest revival.
All money movement is done by e-mail and hawala. None dare burst it
Al Jazeera still gets tapes. Tapes Trail remains uncompromised
![Page 49: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/49.jpg)
49
Al Qaeda connection A hacker in US opines, “Al Qaeda as a
network has known connections to ISI. ISI has contacts with hacker groups operating agaist other targets, The belief is that if you accept that there is connection between Al Qaeda and ISI and ISI is operating against for example India, then Al Qaeda (even in its present state) would be able to gain access to computer hacks and plan operations”
![Page 50: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/50.jpg)
50
It may well happen in India Someday Al Qaeda, if it is still alive
and operating will use cybespace as a vehicle for attacking infrastructure, not with bombs but with bytes. It would inflict biggest possible damage with least possible investment.
Richard Clarke Presidential Adviser for Cyberspace Security (2001-2003)
![Page 51: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/51.jpg)
51
Hato Ashwathama
Let us not be naïve. There are no ethics in cybersocietyWar will continue to be between
belief systemsFlesh and silicate pitched against
flesh and silicate
![Page 52: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/52.jpg)
52
![Page 53: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/53.jpg)
53
Technologies and Tools Black bag jobs Packet Sniffers Carnivore Red and Blue Pill Trap and Trace Omnivore Genoa
![Page 54: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/54.jpg)
54
Technologies and Tools (contd) Protocol Analyser Blackice Defender Dsniff Ethereal Spyware, e.g. spyBuddy AntiSpy software
![Page 55: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/55.jpg)
55
Blackbag Jobs A black-bag operation is a secret break-in
by a law-enforcement or intelligence organization. It involves secret search of suspected locations, copying files or other materials. Besides scrounging trash, elect- ronic and physical
surveillance, pen-tests are part of the game. The search sometimes leads to what the hackers call “Rat Racing.”
![Page 56: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/56.jpg)
56
PACKET SNIFFER
A packet sniffer is a wiretap device that plugs into a computer network and eavesdrops on the network traffic. Like a telephone wiretap that allows an intelligence agency to listen in on the conversations, sniffer programme lets someone listen in computer conversation.
Carnivore is one such packet sniffer or
packet filter.
![Page 57: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/57.jpg)
57
CARNIVORE: A PACKET SNIFFER
Carnivore acts like a “packet sniffer” down into bundles called "packets". Carnivore eavesdrops on packets that all Internet traffic is broken into and watches them go by, then saves a copy of the packets it is interested in.
![Page 58: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/58.jpg)
58
Carnivore News of Carnivore broke in July 2000. Public furor. How voracious Carnivore
could get? Can it vacuum up Internet comns from innocent users? How frequently is it used? What is the legal basis? Is it permanently hooked up?
FBI came clean or did they? “Designed to conduct efficient wiretaps of e-mail and online communications involving suspected hackers, terrorists and other criminals.”
![Page 59: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/59.jpg)
59
CARNIVORE
Carnivore is packed in a slim laptop and is described as “a tool within a tool” that enables the FBI, in cooperation with an Internet Service Providers (ISPs) to collect counter-intelligence by tapping e-mails or other electronic communications of targeted user. This is done on the court orders. Carnivore is used in two ways, viz. as a "content-wiretap" and a “trap-and-trace, pen-register.”
![Page 60: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/60.jpg)
60
CARNIVOREBOX
Windows NT or Windows 2000Box with 128 megabytes of RAMA Ppentium 111, 4-18 gigabit of
disk space and 2 G Jaz Drive
HardwareAuthentication
Device
Network IsolationDevice
![Page 61: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/61.jpg)
61
Carnivore Box
A COTS (Commercial Off The Shelf) Windows NT (or Windows 2000) box with 128-megabytes of RAM, a Pentium III, 4-18 gigabytes of disk space, and a 2G Jaz drive where evidence is written to
The software is written in C++
The box has no TCP/IP stack, and therefore it is hack-proof.
![Page 62: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/62.jpg)
62
Carnivore Box
A hardware authentication device to control access to the box, preventing personnel from accessing the device without leaving telltale signs. It is a "network isolation device", which is probably a Shomiti or NetOptics tap.
Some units are rumored to have dial-in modem ports, but it seems that the standard procedure is to have an FBI agent come in daily to exchange the Jaz disk for a fresh one.
![Page 63: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/63.jpg)
63
RED AND BLUE PILL
Carnivore comes in two pills, the “Red” one and the “Blue” one The former is administered when the ISP claims that it cannot or will not comply with the court order. The Blue Pill is a sophisticated Carnivore programme that scans only e-mails where the ISP cooperates for an investigation. The FBI explains the origin of the codename: "Carnivore chews all the data on the network, but it only actually eats the information authorized by a court order.
![Page 64: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/64.jpg)
64
TRAP AND TRACE
A less invasive wiretap that courts in the US allow without probable-cause. A pen-register records just the telephone numbers of inbound calls to a suspect.
![Page 65: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/65.jpg)
65
IP Sniffing OMNIVORE
Earlier, the FBI was using Carnivore in a mode they call "Omnivore": capturing all the traffic to and from the specified IP address. There are numerous products that can fulfill these types of requirements. The easiest is the freeware program known as TCPDUMP, which is available for both Windows and UNIX.
![Page 66: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/66.jpg)
66
DARPA’s GENOA
CARNIVORE is now known as DCS 1000
Effectiveness under doubt Genoa provides a cutting edge
search engine, sophisticated information harvesting programme and P2P computing methods.
Still in experimental stage.
![Page 67: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/67.jpg)
67
PROTOCOL ANALYSIS
Network wiretap comes with a feature called “protocol analysis,” which allows them to decode the computer traffic and make sense of it. Network sniffing has a distinct advantage over telephone wiretaps as many networks use shared media dispensing the need to break into a wiring closet to install the wiretap. This can be done from any network connection and is called promiscuous mode sniffer. However this shared technology is fast changing to switched technology, which implies that sniffer would have to actively tap the wire.
![Page 68: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/68.jpg)
68
BLACKICE DEFENDER
BlackICE Defender" has a feature called "Packet Logging". It monitors all traffic to and from the machine and saves it directly to disk just like Carnivore. This feature could be used when there is apprehension of being subjected to an attack. The popular freeware utility known as
"Ethereal" can then be used to display the contents of this data. IP fing may also be done in a pen-register mode. Many packet sniffers could be used for this capability.
ICE stands for Intrusion Countermeasures Electronics.
![Page 69: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/69.jpg)
69
Ethereal Described as sniffing the glue that holds
the Internet It is a freeware, network protocol
analyzer for Unix or Windows. It allows examination of data from a live
network Interactively browse the data. View summary and detailed description
of each packet
![Page 70: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/70.jpg)
70
dsniff
Dsniff is a collection of tools for network auditing and penetration testing.dsniff, filesmart, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data, e.g password, e-mails, files etc. Its avowed purpose is to create security awareness. However significantly, it provides useful sniffing/wiretap utilities to hackers that are claimed to be more advanced than Carnivore. See http://www.monkey.org/~dugsong/dsniff/
![Page 71: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/71.jpg)
71
dsniff Websites www.monkey.org www.datanerds.net www.ethereal.zing.org www.sysadmin.oreilly.com www.freshmeat.net www.groar.org www.packages.debian.org
![Page 72: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/72.jpg)
72
dsniff Websites (contd) www.science.uva.nl www.cvsweb.netbsd.org www.rpmfind.net www.linuxsecurity.com www.packetstormsecurity.nl www.itworld.com www.online.securityfocus.com
![Page 73: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/73.jpg)
73
Spyware - Capture & record every IRC. - Capture & record banking information - Capture & record passwords - Capture & record everything typed or clicked on computer Some of these software products have the ability to
send the above information covertly via email ! If you bank online or access password protected
material, your passwords or private banking information can be exposed!
![Page 74: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/74.jpg)
74
SPY SOFTWARE Downloadable, worth 40 dollars or
so Monitor home PC from workplace
or vice versa Features: Real-time remote keystroke viewing Remote desktop viewing Remote application and task management Remote open windows management
![Page 75: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/75.jpg)
75
Spy SoftwareSpyBuddy Internet Conversation Logging. Ability
to log AOL/ICQ/MSN/AIM chat conversations. Disk Activity Logging. Record all
changes made to the hard drive, e.g. directories and files, created, deleted or renamed.
Window Activity Logging Clipboard Activity Logging Website Activity Monitoring
![Page 76: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/76.jpg)
76
SpyBuddy Printed Document Logging Keystroke Monitoring Screen Shot Capturing Webwatch Keyword Alerting
![Page 77: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/77.jpg)
77
Remote Capture Remote system information viewing. Remote file system navigation Remote locking control Remote Internet connection monitoring Document history viewing Mouse freeze control Remote Website launching. Remote application launching Remote shut down
![Page 78: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/78.jpg)
78
Anti-spy software SpyCop X-Cleaner Anti-keylogger Nitrous Anti-spy Evidence Eraser software, e.g. Window washer Evidence Eliminator Pro Evidence Terminator
![Page 79: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/79.jpg)
79
Anti-Spy SoftwareSpyCop Find computer monitoring programmes used
for spying. Allows you to rename any suspect files Minimizes software while scanning so you
can do other things! You can right click on files in explorer and
scan them for spyware! Single file scan function built in complete
with browse capability Save results to a text file for future reference
![Page 80: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/80.jpg)
80
SpyCop Print the results directly from the software SpyCop icon deters spyware installation Finds when a spy programme was installed. Checks if a spy programme is detectable
with database search "LiveUpdate" feature to instantly update
database without re-downloading! Unrecognizable to most spy programmes. A screensaver which scans the system
when the user is absent.
![Page 81: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/81.jpg)
81
Virus scanners don't detect spyware & Firewalls don't stop it!
Many think someone needs access to your computer to install spy software. This just isn't true.
Now there are hybrid versions that can be sent to you just like a virus in email.
Why aren't more people upset about spyware?
![Page 82: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/82.jpg)
82
![Page 83: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/83.jpg)
83
Hacker (and terrorist) profiles are created not by identifying real
evidence, but by probing scenarios, resemblances and
similarities. Vranasvich
![Page 84: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/84.jpg)
84
PROFILING & TRACKING TERRORISTS Est virtual identity before real identity. Exploit inter group rivalries Catalogue ustad-shagird relationship. Model “terror family” tree. Bio-print Psy-print. Form chain of custody of exploits. Become a chameleon Play KOOTNITI
![Page 85: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/85.jpg)
85
JAFFNA1.AMMA2. ARASU3. BANU4. BURMAN5. CALIFORNIA6. CHICAGO7. ESHWARAN8. KENNEDY9. LOSANGELES10. MADI11. MOSCOW12. NAKULAN13. RAHIM14.SENTHIL15. VINCENT16. WILSON
MANNAR1. KALI2. NE3. N74. TIMBU
VAVUNIA1. BAHIR2. DAYABARAN3. JESSIE4. KANNAN5. MAIN6. MAHENDRAN7. N 378. SENDAN9. SHANKAR10. SUSI11. VIBULAN12. VILLAI
KILINOCHCHI1. ALEX2. GRACY3.. KEEDAN4. PARMALINGAM5. RADHAN6. RANJIT7.ROBIN8.SELVA
EWCCLTTE NETWORK
1
35 6
1615
12119
7
414
13
102 8
23
1567
8
4
8621
7
5
11
43
9
12
10
1
1412
119
87654
2
1
13
3
15
10
16
17413109515
11 76
32
1
11
1
4
28
1311
1210
796
4
21 3
VAVUNIYA
MANNAR
KILINOCHCHI
MULLAITTIVU
JAFFNA
BATTICALOA
JAFFNA
BATTICALOA
TRINCOMALEE
MULLAITTIVU
MANNAR
KILINICHCHI
MULLAITTIVU1. AC2. AIERISH3. ALFA4. ALLEN5. BALRAJ6. CHANDRU7. CHARLIE8.CHINANNA9. DHANAM10. DIVAKAR11. FORK12. IAN13. KAMAL14. KUMAR15. MAHENDI16. MURALI17.PASILAM18.PULLIANDI
BATTICALOA1. AGATIAR2. DILIP3. KANDAN4. KARIHALAN5. KUMAR6. NATHAR7. NEWTON8. RAJAN9. REAGAN10. SABASAN11. SIVAN12. SURAN
TRINCOMALEE1. BONAT2. CHITRA3. DAYA4. DEEPAN5. GURUJI6.JENA7. MAINDAN8. MICHAEL9. MOHAN10. NATHAN11. HIMAN12. RADUMAN13. RAMESH14.SHARAD15. SURENDRAN
TRINCOMALEE
143.390144.390145.390
144.440
146.310/144.310
146.310/144.440143.310144.310145.310
144.550/145.550
147.430
145.650
145.810
146.850146.910
144.440
145.590
146.910
145.630
145.350145.630
144.820
144.820143.660
144.820
145.450
144.850144.750
144.850
145.620
145.640145.650
![Page 86: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/86.jpg)
86
Udhayan,,Easan Kumar .Captain David . Kiruban, Thavoor, Das, Romeo, Menon, Kesavan, Pathi RaththiDixon Pottu Amman
Sivarasan @ Raghuvaran,the 'one eyed Jack',
Ravi @ Ravichandran Suchindran @ MaheshKP @ T.S.Kumaran A.S.Shanthakumar @ Rajan,Easan @ Easwaran ... Sigirthakumar,
![Page 87: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/87.jpg)
87
E IDENTITY TO REAL IDENTITY Udhayan, Responsible for fabrication of
Arul - 89 RPG shells, Easan. Incharge of hawala transactions. KP. Highest functionary in SE Asia. Kumar. Assistant of 'KP' in South East Asia. Captain David. Commander LTTE fleet of
three vessels including Elusia and Sea Bird. Dixon. Communication expert Pottu Amman, Intelligence Chief
![Page 88: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/88.jpg)
88
ISI: Cyber Surveillance Profiling ISI has set up a special wing called
National Response Centre for Cyber Crimes (Associated Press, March 13, 2003). “Earlier it had to rely on US investigators to trace e-mails sent by the kidnappers of Danial Pearl”
![Page 89: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/89.jpg)
89
GLOBAL INFORMATION BASE USAF Project Applied System Intelligence Inc. (ASI) KARNAC (Knowledge-Aided Retrieval iN
Activity Context. Anchored on bunch of technologies and
Database Management Systems Detect, identify and corroborate
impending t5errorist operations interalia missions of the like kind
![Page 90: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/90.jpg)
90
SOFTWARE JUNGLEE
Produced by Bangalore-based company Stratify
It sifts through myriad of unstructured information pieces that stream into CIA.
It goes through e-mailsw, letters and even rumours sent in by the CIA operatives to lend aq logical pattern and coherence.
Software understands different languages including Persian, Arabic and German.
Funded by In-Q-Tel
![Page 91: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/91.jpg)
91
CYBER COPS
In 20001, National Science Foundation announced a scholarship programme for training cyber cops.
200 students bachelor's degrees in information technology and computer security at six U.S. universities.
Graduates must work for the government for one year for every year of scholarship support they receive.
![Page 92: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/92.jpg)
92
Universities involved in the Project
Designated "Centers of Excellence" by the National Security Agency. They are
Iowa State, Purdue University. The University of Idaho. The University of Tulsa. The Naval Postgraduate School. Carnegie Mellon University, which is also home to the
government's CERT Coordination Center, formerly known as the Computer Emergency Response Team.
![Page 93: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/93.jpg)
93
![Page 94: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/94.jpg)
94
Electronic Communications Privacy Act (ECPA)
Pronounced (ek-pah). This law was designed to clarify how existing wiretap laws apply to cyber space, but at the same time sets boundaries on how much the government could intrude into on-line privacy. Commonly called "Internet wiretap law" The law was originally promoted by privacy and civil rights organizations. However, subtle changes that made it into the final version ended up being what privacy advocates called "a wish list for the law enforcement community"
![Page 95: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/95.jpg)
95
FISA-1978 Stands for Foreign Intelligence Surveillance
Act. It establishes va legal regime for foreign int separate from ordinary lawenforcement.
Deter-neutralize-exploit Special courts FII Foreign Intelligence Information is
defined. FISA allowsb surveillance without court order
![Page 96: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/96.jpg)
96
CALEA-94
Communications Assistance for Law Enforcement Act (CALEA) commonly called Digital telephony law was passed by the US Congress in 1994 to allow law enforcement to tap digital lines with the same ease in which they were tapping analogue lines. It required phone companies (common carriers) to make sure their systems would support wiretapping. This required existing systems to be retrofitted (estimated cost: $500 million) as well as to support new technological developments in wiretapping.
ISA
![Page 97: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/97.jpg)
97
Patriot Act - 2001 Broadly expands law enforcement
agencies’ surveillance and investigative powers.
Aim is to intercept and obstruct terrorism
Contradictory views expressed on the threats to security viz threats to privacy
![Page 98: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/98.jpg)
98
How is it different? Makes it easier for the investigative
agencies to use FISA to circumvent Title 111.
FISA courts can allow roving surveillance The standard under which FISA pen/trap
orders can be obtained is much lower Pen/trap orders apply to both wire and
electronic comns. When obtained all pen/trap orders are
valid throughout the US
![Page 99: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/99.jpg)
99
Regulatory Investigative Powers (RIP) of UK. RIP mandates black-boxes to be
permanently located at all ISPs, unlike Carnivore, where boxes have to be brought on site for each investigation and removed when the investigation is done. Like Carnivore, a court order is needed. The technology provides an effective mechanism to bypass a constitutionally required process of court authorization for wiretapping of electronic communications.
![Page 100: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/100.jpg)
100
SORM OF RUSSIA
SORM is a Russian acronym for System of Ensuring Investigative Activity. The regulation requires all ISPs to install a “black box” rerouting device and to build a high-speed communication line, which would hot-wire the provider, and of necessity all Internet users to FSB headquarters. FSB is the successor agency to KGB. The agency needs a warrant but that is more of a formality that can be easily dispensed with because of the provision to reroute transmissions in real time to FSB offices.
![Page 101: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/101.jpg)
101
Indian Scene Section 167 (2) (a) of the Code of Criminal
Procedure has been amended in Andhra Pradesh to make the production of the accused for the purpose of remand through video linkage as valid. But for such law, the physical production of the accused for the purpose of remand would have been mandatory. Similarly, recording of evidence through video-conference has been permitted by the Calcutta High Court.
![Page 102: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/102.jpg)
102
![Page 103: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/103.jpg)
103
Let us therefore Fix the enemy in time and space (Cyber
and geographical. Develop indigenous software that
facilitates humans and machines to think and act together. Software that is:-
- Collaborative - Coordinative - Cognitive - Comprehensive (Total Information Awareness) Destroy, disrupt, deface, deny enemy’s
ICT and cyber assets/access
![Page 104: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/104.jpg)
104
Let us therefore Raise cyberCops. Revamp our intelligence agencies with
intake from technical graduates, preferably trained in IT, biometrics, communications, bioinformatics and cryptography.
In the army, convert Intelligence Corps into a technical arm.
Create expertise within the Services and the DRDO.
Promote R&D in our training institutions
![Page 105: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/105.jpg)
105
Recommendations (contd) * Creation of a "cyber court" to preside over
computer crime. * Increased participation and data sharing
between the services and between the services and the Defence Ministry, particularly from the top down.
* Creation of a National Infrastructure
Protection Center.
![Page 106: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/106.jpg)
106
And lastly
Shed anti-technology mindset and
stop glorifying technology illiteracy
and humint
![Page 107: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/107.jpg)
107
Concluding RemarksIndia not only needs cyber warriors
but alsocyber commanders
whose cerebrums are ticking and net-worked,
and not clogged by trivia.
Tasmaad uttishth Kauntay udhay krit nishchaya
![Page 108: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649dc85503460f94abd5f5/html5/thumbnails/108.jpg)
108