SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Stuck in the Middle
         February 2009

          Jason Healey
  Cyber Conflict Studies Association
          Cyberconflict.org




            Yes I'm stuck in the middle with you,
          And I'm wondering what it is I should do,
       It's so hard to keep this smile from my face,
        Losing control, yeah, I'm all over the place,
       Clowns to the left of me, Jokers to the right,
          Here I am, stuck in the middle with you.

               From “Stuck in the Middle”
                 Stealers Wheel, 1972
Page 2

    About Cyber Conflict Studies Association

                        Goal: begin a cross-discipline study of
                     implications of strategic conflict in cyberspace

•   Symposium at Georgetown University last February: Can a cyber conflict be deterred? Lessons from
    Estonia
•   Previous symposia have been on law and cyber conflict, attribution of attacks, arms control, and
    visualization of cyber conflict, and deterrence of cyber conflict
•   Online “Journal of Cyber Conflict Studies”
•   Membership from government, academia, industry. Includes James Mulvenon, Paul Kurtz, Greg
    Rattray, Dorothy Denning, others
•   Sponsored by Norwich University
Page 3

Agenda




          • Why “Stuck in the Middle”
            • How can it happen?
         • How can you see it coming?
             • What can you do?
           • The Sleep Deprivers…
Page 4

 Why “Stuck in the Middle” ?

• We are all defending our own corners of cyberspace
   – But could be stuck in something larger


• Can be caught because of a protest
   – World Economic Forum in 2002


• Or as part of a war
   – No, of course it won’t happen
   – But what will you do when it does?
Page 5

    “Hactivists,” “Patriotic Hackers” and the Big Boys

• Relation of physical and cyber troubles
     –   Easier to cross borders with your protest in cyberspace
     –   Less likely to be caught
     –   Easy to organize
     –   Anonymity means increased chances of bad behavior

•   Why did “Hacking = art”
•   Who started “patriotic hacking”?
•   Who is meanest?
•   What nations are best at harnessing it?

• None of this is “cyberterror”
Page 6

 You may be targeted because of

• Bum luck
  – “Kosovo is Serbia” in 2000
  – Caught in the middle: Manchester United,
    Adidas, viagra.com, jamesbond.com

• The sector you are part of?
   – Caught in the middle: Finance, firebombings
     and beagles
       Secondary and tertiary targeting


          Are they just random hackers, or are they organized?
                      Is another company behind it?
                         Is another nation behind it?
Page 7

 Secondary and Tertiary Targeting

• "If you support or raise funds for any company
  connected with Huntingdon Life Sciences we will track
  you down, come for you and destroy your property with
  fire.“
   – Animal Liberation Front (source:   wikipedia, accessed 7 November 2008)



• The physical dimension
   – Yacht club
   – Protests at insurers, shareholders, market makers
   – Executives targeted, attacked, property firebombed


• The cyber dimension:
   – Email and DoS campaigns
   – Skip’s neighbors
Page 8

 You may be targeted because of

• A group you are associated with?
  – Caught in the middle? AIPAC

• Choices of your company?
  – Caught in the middle? Carrefour




          Are they just random hackers, or are they organized?
                      Is another company behind it?
                         Is another nation behind it?
Page 9

 You may be targeted because of

  "KFC's license is from America, an important Israeli ally. In consuming US products, it means
     that we give financial contributions to Israel's military strikes on the Palestinian people"
                          Indonesian protest coordinator, January 2009
                        (Source: Hill and Associates from AFP, CAN, Viva News)



• Perceived actions of your country?
   – Serbia, EP-3.
            Caught in the middle? The poorly protected…
    – Japan in 2001: history books from South Korea, visit
      to Yasukuni
            Caught in the middle? The poorly protected…
    – Who moved my statue?
            Caught in the middle? The whole online country




                   Are they just random hackers, or are they organized?
                               Is another company behind it?
                                  Is another nation behind it?
Page 10

 You may be targeted because of

• A real, no-kidding war

  – How could this happen here?

  – Unless you can make hard, unpalatable
    choices you may be in the middle




          Are they just random hackers, or are they organized?
                      Is another company behind it?
                         Is another nation behind it?
Page 11

 This region is hactivist central

• Long history of patriotic hacking in Asia
   –   India  Pakistan
   –   China   Taiwan
   –   China   Japan
   –   South Korea   Japan
   –   China   United States
   –   China   Olympic, Tibet protesters


• The “China Ceiling”
Page 12

 How to see it coming

• Rule #1: Cyber follows, never precedes the
  physical

• Rarely ever broken (so far)

• You should find traces of this online with a good
  search process
Page 13

 How to see it coming

• Are you involved in an area likely to draw activists:
   –   Israel/Palestine
   –   China/Tibet and China/Taiwan
   –   Russia/Baltics, Russia/Georgia
   –   Serbia
   –   Olympics
   –   Environmental
   –   Finance and globalization


• Play “what if” on your CSR and business decisions

• Develop your indicators
Page 14

      How to see it coming

  • Your indicators, rate them 1 to 5
  • As these get checked off, consider yourself warned.
    Attacks are getting closer:

                  • Are activists mentioning our company or related
                  topics?
                  • Are there physical protests affecting our sector
                  or related businesses?
  Increasing
specificity and
                    • For example, other companies in the same
 likelihood of      line, other globalizing firms, or other Olympic
 you’re being
    attacked        sponsors
                  • Are there cyber protest attacks related to our
                  business?
                  • Are there cyber protest attacks against our
                  sector?
                  • Are there physical protests against our
                  company?
                  • Are we being specifically mentioned for cyber
Page 15

 What to do if you’re targeted?

• What to do if you’re a target depends on which category
  you fall in to
   – Bum-luck attacks are best for you as neither sophisticated nor
     persistent
   – Sector attacks will keep coming back
        But will hit your competitors too, ha ha
   – Company-specific attacks may be short, but very intense
        In rare cases (n=1?) they will be with you forever
         Country-specific may also be short, but has the worst
         consequences


Are your standard defenses good enough?
   – WEF attacks of 2002
Page 16

The Sleep Deprivers


             • The old big things:
                      – Olympics
                       – Taiwan


            • The new big things:
                       – Russia?
                – Collapsing Economies
                        – Food?

Weitere ähnliche Inhalte

Ähnlich wie Cyber Conflict

Action to empathy
Action to empathyAction to empathy
Action to empathylmittler
 
Going Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online VideoGoing Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online VideoArik Abel
 
Adventures in 21st Century Organizational Design
Adventures in 21st Century Organizational DesignAdventures in 21st Century Organizational Design
Adventures in 21st Century Organizational DesignTraction Software
 
Crisis Communication in the Digital Age
 Crisis Communication in the Digital Age Crisis Communication in the Digital Age
Crisis Communication in the Digital AgeJane Jordan-Meier
 
WH @ IEA2014
WH @ IEA2014WH @ IEA2014
WH @ IEA2014GRAPE
 
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC HuangDiversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC HuangXena Crystal LC Huang
 
UHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering InnovationUHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering InnovationChris Osborn
 
No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019Webflow
 
Hello, i'm from the internet
Hello, i'm from the internetHello, i'm from the internet
Hello, i'm from the internetAditya Anupkumar
 
Media Codes and Conventions: Audience
Media Codes and Conventions: AudienceMedia Codes and Conventions: Audience
Media Codes and Conventions: Audiencehanaa_m
 
Science fiction audiences
Science fiction audiencesScience fiction audiences
Science fiction audiencesshaniajay
 
Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business Innovation Forum Publishing
 
How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...YPFP
 
Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101James Redmond
 
Tips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crisesTips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crisesIsobar Australia
 

Ähnlich wie Cyber Conflict (20)

Action to empathy
Action to empathyAction to empathy
Action to empathy
 
Going Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online VideoGoing Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online Video
 
Adventures in 21st Century Organizational Design
Adventures in 21st Century Organizational DesignAdventures in 21st Century Organizational Design
Adventures in 21st Century Organizational Design
 
Kony2012
Kony2012Kony2012
Kony2012
 
Crisis Communication in the Digital Age
 Crisis Communication in the Digital Age Crisis Communication in the Digital Age
Crisis Communication in the Digital Age
 
You can't have COIN without Cultural Awareness
You can't have COIN without Cultural AwarenessYou can't have COIN without Cultural Awareness
You can't have COIN without Cultural Awareness
 
WH @ IEA2014
WH @ IEA2014WH @ IEA2014
WH @ IEA2014
 
The Path to Healing
The Path to HealingThe Path to Healing
The Path to Healing
 
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC HuangDiversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC Huang
 
UHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering InnovationUHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering Innovation
 
No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019
 
Hello, i'm from the internet
Hello, i'm from the internetHello, i'm from the internet
Hello, i'm from the internet
 
Epilepsy action
Epilepsy actionEpilepsy action
Epilepsy action
 
Media Codes and Conventions: Audience
Media Codes and Conventions: AudienceMedia Codes and Conventions: Audience
Media Codes and Conventions: Audience
 
Science fiction audiences
Science fiction audiencesScience fiction audiences
Science fiction audiences
 
Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business
 
How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...
 
1. goldsmiths short course the attention economy - 13th february
1. goldsmiths short course   the attention economy - 13th february1. goldsmiths short course   the attention economy - 13th february
1. goldsmiths short course the attention economy - 13th february
 
Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101
 
Tips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crisesTips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crises
 

Mehr von Enterprise Security Risk Management

Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantEnterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantEnterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Enterprise Security Risk Management
 

Mehr von Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Kürzlich hochgeladen

Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 

Kürzlich hochgeladen (20)

Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 

Cyber Conflict

  • 1. Stuck in the Middle February 2009 Jason Healey Cyber Conflict Studies Association Cyberconflict.org Yes I'm stuck in the middle with you, And I'm wondering what it is I should do, It's so hard to keep this smile from my face, Losing control, yeah, I'm all over the place, Clowns to the left of me, Jokers to the right, Here I am, stuck in the middle with you. From “Stuck in the Middle” Stealers Wheel, 1972
  • 2. Page 2 About Cyber Conflict Studies Association Goal: begin a cross-discipline study of implications of strategic conflict in cyberspace • Symposium at Georgetown University last February: Can a cyber conflict be deterred? Lessons from Estonia • Previous symposia have been on law and cyber conflict, attribution of attacks, arms control, and visualization of cyber conflict, and deterrence of cyber conflict • Online “Journal of Cyber Conflict Studies” • Membership from government, academia, industry. Includes James Mulvenon, Paul Kurtz, Greg Rattray, Dorothy Denning, others • Sponsored by Norwich University
  • 3. Page 3 Agenda • Why “Stuck in the Middle” • How can it happen? • How can you see it coming? • What can you do? • The Sleep Deprivers…
  • 4. Page 4 Why “Stuck in the Middle” ? • We are all defending our own corners of cyberspace – But could be stuck in something larger • Can be caught because of a protest – World Economic Forum in 2002 • Or as part of a war – No, of course it won’t happen – But what will you do when it does?
  • 5. Page 5 “Hactivists,” “Patriotic Hackers” and the Big Boys • Relation of physical and cyber troubles – Easier to cross borders with your protest in cyberspace – Less likely to be caught – Easy to organize – Anonymity means increased chances of bad behavior • Why did “Hacking = art” • Who started “patriotic hacking”? • Who is meanest? • What nations are best at harnessing it? • None of this is “cyberterror”
  • 6. Page 6 You may be targeted because of • Bum luck – “Kosovo is Serbia” in 2000 – Caught in the middle: Manchester United, Adidas, viagra.com, jamesbond.com • The sector you are part of? – Caught in the middle: Finance, firebombings and beagles Secondary and tertiary targeting Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 7. Page 7 Secondary and Tertiary Targeting • "If you support or raise funds for any company connected with Huntingdon Life Sciences we will track you down, come for you and destroy your property with fire.“ – Animal Liberation Front (source: wikipedia, accessed 7 November 2008) • The physical dimension – Yacht club – Protests at insurers, shareholders, market makers – Executives targeted, attacked, property firebombed • The cyber dimension: – Email and DoS campaigns – Skip’s neighbors
  • 8. Page 8 You may be targeted because of • A group you are associated with? – Caught in the middle? AIPAC • Choices of your company? – Caught in the middle? Carrefour Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 9. Page 9 You may be targeted because of "KFC's license is from America, an important Israeli ally. In consuming US products, it means that we give financial contributions to Israel's military strikes on the Palestinian people" Indonesian protest coordinator, January 2009 (Source: Hill and Associates from AFP, CAN, Viva News) • Perceived actions of your country? – Serbia, EP-3. Caught in the middle? The poorly protected… – Japan in 2001: history books from South Korea, visit to Yasukuni Caught in the middle? The poorly protected… – Who moved my statue? Caught in the middle? The whole online country Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 10. Page 10 You may be targeted because of • A real, no-kidding war – How could this happen here? – Unless you can make hard, unpalatable choices you may be in the middle Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 11. Page 11 This region is hactivist central • Long history of patriotic hacking in Asia – India Pakistan – China Taiwan – China Japan – South Korea Japan – China United States – China Olympic, Tibet protesters • The “China Ceiling”
  • 12. Page 12 How to see it coming • Rule #1: Cyber follows, never precedes the physical • Rarely ever broken (so far) • You should find traces of this online with a good search process
  • 13. Page 13 How to see it coming • Are you involved in an area likely to draw activists: – Israel/Palestine – China/Tibet and China/Taiwan – Russia/Baltics, Russia/Georgia – Serbia – Olympics – Environmental – Finance and globalization • Play “what if” on your CSR and business decisions • Develop your indicators
  • 14. Page 14 How to see it coming • Your indicators, rate them 1 to 5 • As these get checked off, consider yourself warned. Attacks are getting closer: • Are activists mentioning our company or related topics? • Are there physical protests affecting our sector or related businesses? Increasing specificity and • For example, other companies in the same likelihood of line, other globalizing firms, or other Olympic you’re being attacked sponsors • Are there cyber protest attacks related to our business? • Are there cyber protest attacks against our sector? • Are there physical protests against our company? • Are we being specifically mentioned for cyber
  • 15. Page 15 What to do if you’re targeted? • What to do if you’re a target depends on which category you fall in to – Bum-luck attacks are best for you as neither sophisticated nor persistent – Sector attacks will keep coming back But will hit your competitors too, ha ha – Company-specific attacks may be short, but very intense In rare cases (n=1?) they will be with you forever Country-specific may also be short, but has the worst consequences Are your standard defenses good enough? – WEF attacks of 2002
  • 16. Page 16 The Sleep Deprivers • The old big things: – Olympics – Taiwan • The new big things: – Russia? – Collapsing Economies – Food?