SlideShare ist ein Scribd-Unternehmen logo
1 von 27
“Επιχειρήσεις Επιρροής στον
Κυβερνοχώρο”
(Cyber Influence Operations)
“… Ο Κυβερνοπόλεμος απειλεί εκ θεμελίων τη λειτουργία ενός
υπερδικτύου C4ISR και κατά συνέπεια και μια ολόκληρη φιλοσοφία
περί μάχεσθαι, η οποία βασίζεται στην πληροφοριακή κυριαρχία και
στη δικτυοκεντρική λειτουργία…”
Richard Clarke (Cyber War Analyst)
Παπαδάκης Κων/νος- Cyber Warfare Analyst
cos_pap@hotmail.com
linkedin.com/in/konstantinos-papadakis
Cyber Influence Operations
Temet Nosce
“…cyber warfare of the future may be less about hacking
electrical power grids and more about hacking minds by
shaping the environment in which political debate takes
place…”
Tim Stevens
Cyber Influence Operations-Objective of Influence Operations
Temet Nosce
Cyber Influence Operations
Doing
Do something that B
would not otherwise Do
Cyber Influence Operations
Temet Nosce
when does influencing the behavior of an audience
become the primary effect of a cyber operation…?
and
which cyber operations might qualify as such….?
Cyber Influence Operations-Definitions
Temet Nosce
Cyber Influence Operations
“…well over a decade after the topic of information
warfare broke out into the open, its conceptual
underpinnings remain weak and largely unsatisfa-
ctory, with fierce battles raging over neologisms and
definitions…”
2007 Martin C. Libicki
Cyber Influence Operations-Definitions
Temet Nosce
Cyber Influence Operations
Inform & Influence Operations (IIOs)
Efforts to inform, influence, or persuade selected audiences through
actions, utterances, signals, or messages’.
***Strategic communications (STRATCOM) and propaganda activities fall
under this category, as well as the deliberate dissemination of disinfo-
rmation to confuse audiences.
Isaac R. Porche III et.al
Influence Cyber Operations-ICOs
‘Operations which affect the logical layer of cyberspace with the intention of
influencing attitudes, behaviors, or decisions of target audiences.’
Brangetto-Veenendaal
Cyber Influence Operations-Definitions
Temet Nosce
Cyber Influence Operations
Influence Operations
Coordinated, integrated, and synchronized application of national
diplomatic, informational, military, economic, and other capabilities in
peacetime, crisis, conflict, and post-conflict to foster attitudes, behaviors, or
decisions by foreign target audiences that further [a nation’s] interests and
objectives’.
Larson-Darilek-Gibran-Nichiporuk-Richardson-Schwartz-Thurston
* ‘the use of non-military [non-kinetic], means to erode the adversary’s
willpower, confuse and constrain his decision-making, and undermine his public
support, so that victory can be attained without a shot being fired’
Cyber Influence Operations-Definitions
Temet Nosce
Cyber Influence Operations
Cyber Attack
‘[a]n act or action initiated in cyberspace to cause harm by compromising communication,
information or other electronic systems, or the information that is stored, processed or
transmitted in these systems.
NATO Report on Cyber Defence Taxonomy and Definitions, Enclosure 1 to 6200/TSC FCX 0010/TT-
10589/Ser: NU 0289
Harm in Information System
Direct or indirect harm to a communication and information system, such as com-promising the
confidentiality, integrity, or availability of the system and any information
exchanged or stored.
NATO Report on Cyber Defence Taxonomy and Definitions, Enclosure 1 to 6200/TSC FCX 0010/TT-
10589/Ser: NU 0289
Cyber Influence Operations-Definitions
Temet Nosce
Cyber Influence Operations
Information Operations
‘[t]he integrated employment, during military operations, of information-
related capabilities in concert with other lines of operations to influence,
disrupt, corrupt, or usurp the decision making of adversaries and potential
adversaries while protecting [its] own’.
US Department of Defense, Directive 3600.01. May 2, 2013. p.12
Information
Operations
Cyber Influence Operations-Definitions
Temet Nosce
Cyber Influence Operations
‘apples’
of information content
Informational
Technical
‘apples carts’
of information systems
Informational
Psychological
Semantic or Cognitive
actions
Info on Info
Cyber Influence Operations
Temet Nosce
Cyber Influence Operations
Temet Nosce
Cyber Influence Operations
Logical Net
Component
Logical Layer
Logical Connections between network nodes
Instructions and Rules (OS, Applications,…) which
control the function of the Information System and
the way it handles the data which are transfer
through this system
The core message of
every Information
(transferred, storage
in a system, etc) to the
receiver
Cyber Influence Operations-Definitions
Temet Nosce
Cyber Influence Operations
Inform & Influence Operations (IIOs)
Efforts to inform, influence, or persuade selected
audiences through actions, utterances, signals, or
messages’.
Isaac R. Porche III et.al
***Strategic communications (STRATCOM) and propaganda activities
fall under this category, as well as the deliberate dissemination of
disinfo-rmation to confuse audiences.
Cyber Influence Operations-Definitions
Temet Nosce
Cyber Influence Operations
Influence Cyber Operations-ICOs
‘Operations which affect the logical layer of cyberspace with the intention of
influencing attitudes, behaviors, or decisions of target audiences.’
Brangetto-Veenendaal
* The ‘apple carts’ of Influence Operations concern the technical actions that
target the logical layer of cyberspace and are designed to influence the behavior
of a target audience. These actions are intrusive as they gain unauthorized
access to networks and systems in order to destroy, change or add information.
Cyber Influence Operations
Temet Nosce
Brangetto-Veenendaal
Cyber Influence Operations-Views
Temet Nosce
Cyber Influence Operations
* Integrate cyber operations into a strategy capable of achieving political
objectives.
* Conflicts between developed nations must remain below the threshold of an
armed conflict, or at least below the threshold where it is actually proclaimed
to be an armed conflict.
* Gerasimov doctrine (Russian nonlinear war)
‘[t]he role of non-military means of achieving political and
strategic goals has grown, and, in many cases, they have exceeded the power of
weapons in their effectiveness’.
Cyber Influence Operations-Views
Temet Nosce
Peacetime, Prelude to war, Wartime
‘all the means and methods of impacting information, information-psychological,
and information-technological objects and information resources to achieve the
objectives of the attacking side’.
Intelligence, counterintelligence, deceit, disinformation, electronic warfare,
debilitation of communications, degradation of navigation support,
psychological pressure, degradation of information systems, and propaganda.
Use of intrusive ICOs as part of a broader Influence Operations strategy
distributed denial of service attacks (DDoS)
advanced exploitation techniques,
or RT television
Cyber Influence Operations-Views
Temet Nosce
Cyber Influence Operations
Use of ICOs to military operations (MILDEC, CNOs) or specific authorities
(primarily intelligence agencies) for very specific purposes.
Transparency, Objectivity, and Legality
Tell the Truth and act in a manner consistent with your principles
Weakness1: facts and messages supporting the narrative must be reliable and
consistent.
Weakness2: assumes critical thinking, reading ability and interest among the
audiences
Cyber Influence Operations-Types
Temet Nosce
Unauthorized access to an information system
Cyber Influence Operations
False Flag Cyberattacks
DDoS-Distributed Denial of Services Attacks
Website Defacements
Doxing
Cyber Influence Operations-Incidents
Temet Nosce
Cyber Influence Operations
Unauthorised access to an information system
Hacking, or gaining access to a computer system.
2015, Security breach- US Office of Personnel Management.
May 2014, “Cyber Berkut’s” attack in Central Election Committee
in Ukraine.
Damage the credibility of the Ukrainian government
in overseeing a fair election process
Major embarrassment for the US government giving the
impression that US authorities were not able to protect
sensitive information.
Cyber Influence Operations-Incidents
Temet Nosce
Cyber Influence Operations
False flag cyberattacks
Use of specific techniques (IP Spoofing, fake code lines in a specific
language…)
Apr 2015, TV5 Monde attack.
Confusion and undermine trust in French institutions in a
period of national anxiety.
Cyber Influence Operations-Incidents
Temet Nosce
Cyber Influence Operations
DDoS Attacks
Overwhelm the target’s resources (degradation) or stop its services
(disruption)
April 2007, Estonia.
Undermine Estonia’s Government credibility.
2014, 2015, NATO Websites attacks.
Embarrass and disseminate anti-NATO propaganda and
undermine NATO’s readiness to defend itself in cyberspace.
«Paintball Effect».
Cyber Influence Operations-Incidents
Temet Nosce
Cyber Influence Operations
Website Defacements
Alter the content of a website
2013, Hacking in Twitter account of the Associated Press.
Confusion and undermine trust in institutions by spreading
disinformation or embarrass the administrators for poor
network defense.
Cyber Influence Operations-Incidents
Temet Nosce
Cyber Influence Operations
Doxing
Revealing and publicizing information on an organization
Feb 2014, Victoria Nuland
This type of incident is embarrassing, but more importantly,
can create divisions among allies and jeopardize a common
policy to address a crisis situation
Cyber Influence Operations
Temet Nosce
Cyber Influence Operations
Difficult to attribute
Their impact will generally be limited to harassing and annoying a target
audience.
The more target audiences and organizations become aware of the need for
adequate protection of their digital infrastructure and the limited long term
impact of cyberattacks, the less useful they will become.
ICOs will, however, remain a nuisance and be able to create a certain
amount of confusion
NATO members and other democracies, have limited use of ICOs outside of
an armed conflict situation.
Cyber Influence Operations
Temet Nosce
Cyber Influence Operations
Increase transparency
Government officials and the public at large have a fundamental grasp of
the nature and impact of the multiple kinds of cyberattacks that are
possible.
Raise cyber awareness among the population at large as well as the bure-
aucratic and political elite.
Cyber Influence Operations
Temet Nosce

Weitere ähnliche Inhalte

Was ist angesagt?

Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalEdi Suryadi
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructureNeha Agarwal
 
The State of Application Security: What Hackers Break
The State of Application Security: What Hackers BreakThe State of Application Security: What Hackers Break
The State of Application Security: What Hackers BreakImperva
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesPaige Rasid
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
 

Was ist angesagt? (18)

Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasional
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
The State of Application Security: What Hackers Break
The State of Application Security: What Hackers BreakThe State of Application Security: What Hackers Break
The State of Application Security: What Hackers Break
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
C018131821
C018131821C018131821
C018131821
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
Lecture5
Lecture5Lecture5
Lecture5
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
 

Ähnlich wie Cyber Influence Operations

Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinAFCEA International
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxglendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxtodd581
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
Cyber space & critical information infrastructure
Cyber space & critical information infrastructureCyber space & critical information infrastructure
Cyber space & critical information infrastructureNarayan Joshi
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...cyberprosocial
 
Cyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatCyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatMicrosoft
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...cyberprosocial
 

Ähnlich wie Cyber Influence Operations (20)

Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Cyber War
Cyber WarCyber War
Cyber War
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Cyber space & critical information infrastructure
Cyber space & critical information infrastructureCyber space & critical information infrastructure
Cyber space & critical information infrastructure
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
 
Cyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatCyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threat
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 

Mehr von Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD

Mehr von Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD (20)

Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)
 
Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdfRussia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
 
Mitigation of cyber threats 1a.pdf
Mitigation of cyber threats 1a.pdfMitigation of cyber threats 1a.pdf
Mitigation of cyber threats 1a.pdf
 
CYBER KILL CHAIN Table
CYBER KILL CHAIN TableCYBER KILL CHAIN Table
CYBER KILL CHAIN Table
 
Logismika Parakolouthisis.docx
Logismika Parakolouthisis.docxLogismika Parakolouthisis.docx
Logismika Parakolouthisis.docx
 
Surveillance Software.docx
Surveillance Software.docxSurveillance Software.docx
Surveillance Software.docx
 
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
 
Russia vs Estonia_First Cyber War (2007)
Russia vs Estonia_First Cyber War (2007)Russia vs Estonia_First Cyber War (2007)
Russia vs Estonia_First Cyber War (2007)
 
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
 
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεωνΚυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
 
Cyberspace_New Operational Domain
Cyberspace_New Operational DomainCyberspace_New Operational Domain
Cyberspace_New Operational Domain
 
Πληροφοριακός Πόλεμος-Information Warfare
Πληροφοριακός Πόλεμος-Information WarfareΠληροφοριακός Πόλεμος-Information Warfare
Πληροφοριακός Πόλεμος-Information Warfare
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Corporate Cyber Security
Corporate Cyber SecurityCorporate Cyber Security
Corporate Cyber Security
 
Russia Georgia 2008 Conflict-Information Operations, Cyberwarfare
Russia Georgia 2008 Conflict-Information Operations, CyberwarfareRussia Georgia 2008 Conflict-Information Operations, Cyberwarfare
Russia Georgia 2008 Conflict-Information Operations, Cyberwarfare
 
Cyber risks for enterprises-Vacations Time
Cyber risks for enterprises-Vacations TimeCyber risks for enterprises-Vacations Time
Cyber risks for enterprises-Vacations Time
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber WarfareΚυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
 
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing GuideΟδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
 

Kürzlich hochgeladen

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Kürzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Cyber Influence Operations

  • 1. “Επιχειρήσεις Επιρροής στον Κυβερνοχώρο” (Cyber Influence Operations) “… Ο Κυβερνοπόλεμος απειλεί εκ θεμελίων τη λειτουργία ενός υπερδικτύου C4ISR και κατά συνέπεια και μια ολόκληρη φιλοσοφία περί μάχεσθαι, η οποία βασίζεται στην πληροφοριακή κυριαρχία και στη δικτυοκεντρική λειτουργία…” Richard Clarke (Cyber War Analyst) Παπαδάκης Κων/νος- Cyber Warfare Analyst cos_pap@hotmail.com linkedin.com/in/konstantinos-papadakis
  • 2. Cyber Influence Operations Temet Nosce “…cyber warfare of the future may be less about hacking electrical power grids and more about hacking minds by shaping the environment in which political debate takes place…” Tim Stevens
  • 3. Cyber Influence Operations-Objective of Influence Operations Temet Nosce Cyber Influence Operations Doing Do something that B would not otherwise Do
  • 4. Cyber Influence Operations Temet Nosce when does influencing the behavior of an audience become the primary effect of a cyber operation…? and which cyber operations might qualify as such….?
  • 5. Cyber Influence Operations-Definitions Temet Nosce Cyber Influence Operations “…well over a decade after the topic of information warfare broke out into the open, its conceptual underpinnings remain weak and largely unsatisfa- ctory, with fierce battles raging over neologisms and definitions…” 2007 Martin C. Libicki
  • 6. Cyber Influence Operations-Definitions Temet Nosce Cyber Influence Operations Inform & Influence Operations (IIOs) Efforts to inform, influence, or persuade selected audiences through actions, utterances, signals, or messages’. ***Strategic communications (STRATCOM) and propaganda activities fall under this category, as well as the deliberate dissemination of disinfo- rmation to confuse audiences. Isaac R. Porche III et.al Influence Cyber Operations-ICOs ‘Operations which affect the logical layer of cyberspace with the intention of influencing attitudes, behaviors, or decisions of target audiences.’ Brangetto-Veenendaal
  • 7. Cyber Influence Operations-Definitions Temet Nosce Cyber Influence Operations Influence Operations Coordinated, integrated, and synchronized application of national diplomatic, informational, military, economic, and other capabilities in peacetime, crisis, conflict, and post-conflict to foster attitudes, behaviors, or decisions by foreign target audiences that further [a nation’s] interests and objectives’. Larson-Darilek-Gibran-Nichiporuk-Richardson-Schwartz-Thurston * ‘the use of non-military [non-kinetic], means to erode the adversary’s willpower, confuse and constrain his decision-making, and undermine his public support, so that victory can be attained without a shot being fired’
  • 8. Cyber Influence Operations-Definitions Temet Nosce Cyber Influence Operations Cyber Attack ‘[a]n act or action initiated in cyberspace to cause harm by compromising communication, information or other electronic systems, or the information that is stored, processed or transmitted in these systems. NATO Report on Cyber Defence Taxonomy and Definitions, Enclosure 1 to 6200/TSC FCX 0010/TT- 10589/Ser: NU 0289 Harm in Information System Direct or indirect harm to a communication and information system, such as com-promising the confidentiality, integrity, or availability of the system and any information exchanged or stored. NATO Report on Cyber Defence Taxonomy and Definitions, Enclosure 1 to 6200/TSC FCX 0010/TT- 10589/Ser: NU 0289
  • 9. Cyber Influence Operations-Definitions Temet Nosce Cyber Influence Operations Information Operations ‘[t]he integrated employment, during military operations, of information- related capabilities in concert with other lines of operations to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting [its] own’. US Department of Defense, Directive 3600.01. May 2, 2013. p.12 Information Operations
  • 10. Cyber Influence Operations-Definitions Temet Nosce Cyber Influence Operations ‘apples’ of information content Informational Technical ‘apples carts’ of information systems Informational Psychological Semantic or Cognitive actions Info on Info
  • 12. Cyber Influence Operations Temet Nosce Cyber Influence Operations Logical Net Component Logical Layer Logical Connections between network nodes Instructions and Rules (OS, Applications,…) which control the function of the Information System and the way it handles the data which are transfer through this system The core message of every Information (transferred, storage in a system, etc) to the receiver
  • 13. Cyber Influence Operations-Definitions Temet Nosce Cyber Influence Operations Inform & Influence Operations (IIOs) Efforts to inform, influence, or persuade selected audiences through actions, utterances, signals, or messages’. Isaac R. Porche III et.al ***Strategic communications (STRATCOM) and propaganda activities fall under this category, as well as the deliberate dissemination of disinfo-rmation to confuse audiences.
  • 14. Cyber Influence Operations-Definitions Temet Nosce Cyber Influence Operations Influence Cyber Operations-ICOs ‘Operations which affect the logical layer of cyberspace with the intention of influencing attitudes, behaviors, or decisions of target audiences.’ Brangetto-Veenendaal * The ‘apple carts’ of Influence Operations concern the technical actions that target the logical layer of cyberspace and are designed to influence the behavior of a target audience. These actions are intrusive as they gain unauthorized access to networks and systems in order to destroy, change or add information.
  • 15. Cyber Influence Operations Temet Nosce Brangetto-Veenendaal
  • 16. Cyber Influence Operations-Views Temet Nosce Cyber Influence Operations * Integrate cyber operations into a strategy capable of achieving political objectives. * Conflicts between developed nations must remain below the threshold of an armed conflict, or at least below the threshold where it is actually proclaimed to be an armed conflict. * Gerasimov doctrine (Russian nonlinear war) ‘[t]he role of non-military means of achieving political and strategic goals has grown, and, in many cases, they have exceeded the power of weapons in their effectiveness’.
  • 17. Cyber Influence Operations-Views Temet Nosce Peacetime, Prelude to war, Wartime ‘all the means and methods of impacting information, information-psychological, and information-technological objects and information resources to achieve the objectives of the attacking side’. Intelligence, counterintelligence, deceit, disinformation, electronic warfare, debilitation of communications, degradation of navigation support, psychological pressure, degradation of information systems, and propaganda. Use of intrusive ICOs as part of a broader Influence Operations strategy distributed denial of service attacks (DDoS) advanced exploitation techniques, or RT television
  • 18. Cyber Influence Operations-Views Temet Nosce Cyber Influence Operations Use of ICOs to military operations (MILDEC, CNOs) or specific authorities (primarily intelligence agencies) for very specific purposes. Transparency, Objectivity, and Legality Tell the Truth and act in a manner consistent with your principles Weakness1: facts and messages supporting the narrative must be reliable and consistent. Weakness2: assumes critical thinking, reading ability and interest among the audiences
  • 19. Cyber Influence Operations-Types Temet Nosce Unauthorized access to an information system Cyber Influence Operations False Flag Cyberattacks DDoS-Distributed Denial of Services Attacks Website Defacements Doxing
  • 20. Cyber Influence Operations-Incidents Temet Nosce Cyber Influence Operations Unauthorised access to an information system Hacking, or gaining access to a computer system. 2015, Security breach- US Office of Personnel Management. May 2014, “Cyber Berkut’s” attack in Central Election Committee in Ukraine. Damage the credibility of the Ukrainian government in overseeing a fair election process Major embarrassment for the US government giving the impression that US authorities were not able to protect sensitive information.
  • 21. Cyber Influence Operations-Incidents Temet Nosce Cyber Influence Operations False flag cyberattacks Use of specific techniques (IP Spoofing, fake code lines in a specific language…) Apr 2015, TV5 Monde attack. Confusion and undermine trust in French institutions in a period of national anxiety.
  • 22. Cyber Influence Operations-Incidents Temet Nosce Cyber Influence Operations DDoS Attacks Overwhelm the target’s resources (degradation) or stop its services (disruption) April 2007, Estonia. Undermine Estonia’s Government credibility. 2014, 2015, NATO Websites attacks. Embarrass and disseminate anti-NATO propaganda and undermine NATO’s readiness to defend itself in cyberspace. «Paintball Effect».
  • 23. Cyber Influence Operations-Incidents Temet Nosce Cyber Influence Operations Website Defacements Alter the content of a website 2013, Hacking in Twitter account of the Associated Press. Confusion and undermine trust in institutions by spreading disinformation or embarrass the administrators for poor network defense.
  • 24. Cyber Influence Operations-Incidents Temet Nosce Cyber Influence Operations Doxing Revealing and publicizing information on an organization Feb 2014, Victoria Nuland This type of incident is embarrassing, but more importantly, can create divisions among allies and jeopardize a common policy to address a crisis situation
  • 25. Cyber Influence Operations Temet Nosce Cyber Influence Operations Difficult to attribute Their impact will generally be limited to harassing and annoying a target audience. The more target audiences and organizations become aware of the need for adequate protection of their digital infrastructure and the limited long term impact of cyberattacks, the less useful they will become. ICOs will, however, remain a nuisance and be able to create a certain amount of confusion NATO members and other democracies, have limited use of ICOs outside of an armed conflict situation.
  • 26. Cyber Influence Operations Temet Nosce Cyber Influence Operations Increase transparency Government officials and the public at large have a fundamental grasp of the nature and impact of the multiple kinds of cyberattacks that are possible. Raise cyber awareness among the population at large as well as the bure- aucratic and political elite.