SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Stuck in the Middle
         February 2009

          Jason Healey
  Cyber Conflict Studies Association
          Cyberconflict.org




            Yes I'm stuck in the middle with you,
          And I'm wondering what it is I should do,
       It's so hard to keep this smile from my face,
        Losing control, yeah, I'm all over the place,
       Clowns to the left of me, Jokers to the right,
          Here I am, stuck in the middle with you.

               From “Stuck in the Middle”
                 Stealers Wheel, 1972
Page 2

    About Cyber Conflict Studies Association

                        Goal: begin a cross-discipline study of
                     implications of strategic conflict in cyberspace

•   Symposium at Georgetown University last February: Can a cyber conflict be deterred? Lessons from
    Estonia
•   Previous symposia have been on law and cyber conflict, attribution of attacks, arms control, and
    visualization of cyber conflict, and deterrence of cyber conflict
•   Online “Journal of Cyber Conflict Studies”
•   Membership from government, academia, industry. Includes James Mulvenon, Paul Kurtz, Greg
    Rattray, Dorothy Denning, others
•   Sponsored by Norwich University
Page 3

Agenda




          • Why “Stuck in the Middle”
            • How can it happen?
         • How can you see it coming?
             • What can you do?
           • The Sleep Deprivers…
Page 4

 Why “Stuck in the Middle” ?

• We are all defending our own corners of cyberspace
   – But could be stuck in something larger


• Can be caught because of a protest
   – World Economic Forum in 2002


• Or as part of a war
   – No, of course it won’t happen
   – But what will you do when it does?
Page 5

    “Hactivists,” “Patriotic Hackers” and the Big Boys

• Relation of physical and cyber troubles
     –   Easier to cross borders with your protest in cyberspace
     –   Less likely to be caught
     –   Easy to organize
     –   Anonymity means increased chances of bad behavior

•   Why did “Hacking = art”
•   Who started “patriotic hacking”?
•   Who is meanest?
•   What nations are best at harnessing it?

• None of this is “cyberterror”
Page 6

 You may be targeted because of

• Bum luck
  – “Kosovo is Serbia” in 2000
  – Caught in the middle: Manchester United,
    Adidas, viagra.com, jamesbond.com

• The sector you are part of?
   – Caught in the middle: Finance, firebombings
     and beagles
       Secondary and tertiary targeting


          Are they just random hackers, or are they organized?
                      Is another company behind it?
                         Is another nation behind it?
Page 7

 Secondary and Tertiary Targeting

• "If you support or raise funds for any company
  connected with Huntingdon Life Sciences we will track
  you down, come for you and destroy your property with
  fire.“
   – Animal Liberation Front (source:   wikipedia, accessed 7 November 2008)



• The physical dimension
   – Yacht club
   – Protests at insurers, shareholders, market makers
   – Executives targeted, attacked, property firebombed


• The cyber dimension:
   – Email and DoS campaigns
   – Skip’s neighbors
Page 8

 You may be targeted because of

• A group you are associated with?
  – Caught in the middle? AIPAC

• Choices of your company?
  – Caught in the middle? Carrefour




          Are they just random hackers, or are they organized?
                      Is another company behind it?
                         Is another nation behind it?
Page 9

 You may be targeted because of

  "KFC's license is from America, an important Israeli ally. In consuming US products, it means
     that we give financial contributions to Israel's military strikes on the Palestinian people"
                          Indonesian protest coordinator, January 2009
                        (Source: Hill and Associates from AFP, CAN, Viva News)



• Perceived actions of your country?
   – Serbia, EP-3.
            Caught in the middle? The poorly protected…
    – Japan in 2001: history books from South Korea, visit
      to Yasukuni
            Caught in the middle? The poorly protected…
    – Who moved my statue?
            Caught in the middle? The whole online country




                   Are they just random hackers, or are they organized?
                               Is another company behind it?
                                  Is another nation behind it?
Page 10

 You may be targeted because of

• A real, no-kidding war

  – How could this happen here?

  – Unless you can make hard, unpalatable
    choices you may be in the middle




          Are they just random hackers, or are they organized?
                      Is another company behind it?
                         Is another nation behind it?
Page 11

 This region is hactivist central

• Long history of patriotic hacking in Asia
   –   India  Pakistan
   –   China   Taiwan
   –   China   Japan
   –   South Korea   Japan
   –   China   United States
   –   China   Olympic, Tibet protesters


• The “China Ceiling”
Page 12

 How to see it coming

• Rule #1: Cyber follows, never precedes the
  physical

• Rarely ever broken (so far)

• You should find traces of this online with a good
  search process
Page 13

 How to see it coming

• Are you involved in an area likely to draw activists:
   –   Israel/Palestine
   –   China/Tibet and China/Taiwan
   –   Russia/Baltics, Russia/Georgia
   –   Serbia
   –   Olympics
   –   Environmental
   –   Finance and globalization


• Play “what if” on your CSR and business decisions

• Develop your indicators
Page 14

      How to see it coming

  • Your indicators, rate them 1 to 5
  • As these get checked off, consider yourself warned.
    Attacks are getting closer:

                  • Are activists mentioning our company or related
                  topics?
                  • Are there physical protests affecting our sector
                  or related businesses?
  Increasing
specificity and
                    • For example, other companies in the same
 likelihood of      line, other globalizing firms, or other Olympic
 you’re being
    attacked        sponsors
                  • Are there cyber protest attacks related to our
                  business?
                  • Are there cyber protest attacks against our
                  sector?
                  • Are there physical protests against our
                  company?
                  • Are we being specifically mentioned for cyber
Page 15

 What to do if you’re targeted?

• What to do if you’re a target depends on which category
  you fall in to
   – Bum-luck attacks are best for you as neither sophisticated nor
     persistent
   – Sector attacks will keep coming back
        But will hit your competitors too, ha ha
   – Company-specific attacks may be short, but very intense
        In rare cases (n=1?) they will be with you forever
         Country-specific may also be short, but has the worst
         consequences


Are your standard defenses good enough?
   – WEF attacks of 2002
Page 16

The Sleep Deprivers


             • The old big things:
                      – Olympics
                       – Taiwan


            • The new big things:
                       – Russia?
                – Collapsing Economies
                        – Food?

Weitere ähnliche Inhalte

Ähnlich wie Cyber Conflict

Action to empathy
Action to empathyAction to empathy
Action to empathylmittler
 
Going Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online VideoGoing Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online VideoArik Abel
 
Adventures in 21st Century Organizational Design
Adventures in 21st Century Organizational DesignAdventures in 21st Century Organizational Design
Adventures in 21st Century Organizational DesignTraction Software
 
Crisis Communication in the Digital Age
 Crisis Communication in the Digital Age Crisis Communication in the Digital Age
Crisis Communication in the Digital AgeJane Jordan-Meier
 
WH @ IEA2014
WH @ IEA2014WH @ IEA2014
WH @ IEA2014GRAPE
 
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC HuangDiversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC HuangXena Crystal LC Huang
 
UHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering InnovationUHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering InnovationChris Osborn
 
No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019Webflow
 
Hello, i'm from the internet
Hello, i'm from the internetHello, i'm from the internet
Hello, i'm from the internetAditya Anupkumar
 
Media Codes and Conventions: Audience
Media Codes and Conventions: AudienceMedia Codes and Conventions: Audience
Media Codes and Conventions: Audiencehanaa_m
 
Science fiction audiences
Science fiction audiencesScience fiction audiences
Science fiction audiencesshaniajay
 
Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business Innovation Forum Publishing
 
How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...YPFP
 
Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101James Redmond
 
Tips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crisesTips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crisesIsobar Australia
 

Ähnlich wie Cyber Conflict (20)

Action to empathy
Action to empathyAction to empathy
Action to empathy
 
Going Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online VideoGoing Viral: Making and Distributing Online Video
Going Viral: Making and Distributing Online Video
 
Adventures in 21st Century Organizational Design
Adventures in 21st Century Organizational DesignAdventures in 21st Century Organizational Design
Adventures in 21st Century Organizational Design
 
Kony2012
Kony2012Kony2012
Kony2012
 
Crisis Communication in the Digital Age
 Crisis Communication in the Digital Age Crisis Communication in the Digital Age
Crisis Communication in the Digital Age
 
You can't have COIN without Cultural Awareness
You can't have COIN without Cultural AwarenessYou can't have COIN without Cultural Awareness
You can't have COIN without Cultural Awareness
 
WH @ IEA2014
WH @ IEA2014WH @ IEA2014
WH @ IEA2014
 
The Path to Healing
The Path to HealingThe Path to Healing
The Path to Healing
 
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC HuangDiversity Dtudies Day 1 -  Welcome notes from Dr. Crystal LC Huang
Diversity Dtudies Day 1 - Welcome notes from Dr. Crystal LC Huang
 
UHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering InnovationUHY Advisors - Sparking Creativity and Fostering Innovation
UHY Advisors - Sparking Creativity and Fostering Innovation
 
No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019No code for marginalized communities - No Code Conf 2019
No code for marginalized communities - No Code Conf 2019
 
Hello, i'm from the internet
Hello, i'm from the internetHello, i'm from the internet
Hello, i'm from the internet
 
Epilepsy action
Epilepsy actionEpilepsy action
Epilepsy action
 
Media Codes and Conventions: Audience
Media Codes and Conventions: AudienceMedia Codes and Conventions: Audience
Media Codes and Conventions: Audience
 
Science fiction audiences
Science fiction audiencesScience fiction audiences
Science fiction audiences
 
Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business Lecture Four - Campaigning NGOs, their role and trends for business
Lecture Four - Campaigning NGOs, their role and trends for business
 
How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...How to Fight Networks: New Visions for National Security From the Head of Def...
How to Fight Networks: New Visions for National Security From the Head of Def...
 
1. goldsmiths short course the attention economy - 13th february
1. goldsmiths short course   the attention economy - 13th february1. goldsmiths short course   the attention economy - 13th february
1. goldsmiths short course the attention economy - 13th february
 
Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101Be The Change Course 2015 Media Activism 101
Be The Change Course 2015 Media Activism 101
 
Tips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crisesTips for dealing with negative comments, trolls and a social media crises
Tips for dealing with negative comments, trolls and a social media crises
 

Mehr von Enterprise Security Risk Management

Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantEnterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantEnterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Enterprise Security Risk Management
 

Mehr von Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Kürzlich hochgeladen

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 

Kürzlich hochgeladen (20)

Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 

Cyber Conflict

  • 1. Stuck in the Middle February 2009 Jason Healey Cyber Conflict Studies Association Cyberconflict.org Yes I'm stuck in the middle with you, And I'm wondering what it is I should do, It's so hard to keep this smile from my face, Losing control, yeah, I'm all over the place, Clowns to the left of me, Jokers to the right, Here I am, stuck in the middle with you. From “Stuck in the Middle” Stealers Wheel, 1972
  • 2. Page 2 About Cyber Conflict Studies Association Goal: begin a cross-discipline study of implications of strategic conflict in cyberspace • Symposium at Georgetown University last February: Can a cyber conflict be deterred? Lessons from Estonia • Previous symposia have been on law and cyber conflict, attribution of attacks, arms control, and visualization of cyber conflict, and deterrence of cyber conflict • Online “Journal of Cyber Conflict Studies” • Membership from government, academia, industry. Includes James Mulvenon, Paul Kurtz, Greg Rattray, Dorothy Denning, others • Sponsored by Norwich University
  • 3. Page 3 Agenda • Why “Stuck in the Middle” • How can it happen? • How can you see it coming? • What can you do? • The Sleep Deprivers…
  • 4. Page 4 Why “Stuck in the Middle” ? • We are all defending our own corners of cyberspace – But could be stuck in something larger • Can be caught because of a protest – World Economic Forum in 2002 • Or as part of a war – No, of course it won’t happen – But what will you do when it does?
  • 5. Page 5 “Hactivists,” “Patriotic Hackers” and the Big Boys • Relation of physical and cyber troubles – Easier to cross borders with your protest in cyberspace – Less likely to be caught – Easy to organize – Anonymity means increased chances of bad behavior • Why did “Hacking = art” • Who started “patriotic hacking”? • Who is meanest? • What nations are best at harnessing it? • None of this is “cyberterror”
  • 6. Page 6 You may be targeted because of • Bum luck – “Kosovo is Serbia” in 2000 – Caught in the middle: Manchester United, Adidas, viagra.com, jamesbond.com • The sector you are part of? – Caught in the middle: Finance, firebombings and beagles Secondary and tertiary targeting Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 7. Page 7 Secondary and Tertiary Targeting • "If you support or raise funds for any company connected with Huntingdon Life Sciences we will track you down, come for you and destroy your property with fire.“ – Animal Liberation Front (source: wikipedia, accessed 7 November 2008) • The physical dimension – Yacht club – Protests at insurers, shareholders, market makers – Executives targeted, attacked, property firebombed • The cyber dimension: – Email and DoS campaigns – Skip’s neighbors
  • 8. Page 8 You may be targeted because of • A group you are associated with? – Caught in the middle? AIPAC • Choices of your company? – Caught in the middle? Carrefour Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 9. Page 9 You may be targeted because of "KFC's license is from America, an important Israeli ally. In consuming US products, it means that we give financial contributions to Israel's military strikes on the Palestinian people" Indonesian protest coordinator, January 2009 (Source: Hill and Associates from AFP, CAN, Viva News) • Perceived actions of your country? – Serbia, EP-3. Caught in the middle? The poorly protected… – Japan in 2001: history books from South Korea, visit to Yasukuni Caught in the middle? The poorly protected… – Who moved my statue? Caught in the middle? The whole online country Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 10. Page 10 You may be targeted because of • A real, no-kidding war – How could this happen here? – Unless you can make hard, unpalatable choices you may be in the middle Are they just random hackers, or are they organized? Is another company behind it? Is another nation behind it?
  • 11. Page 11 This region is hactivist central • Long history of patriotic hacking in Asia – India Pakistan – China Taiwan – China Japan – South Korea Japan – China United States – China Olympic, Tibet protesters • The “China Ceiling”
  • 12. Page 12 How to see it coming • Rule #1: Cyber follows, never precedes the physical • Rarely ever broken (so far) • You should find traces of this online with a good search process
  • 13. Page 13 How to see it coming • Are you involved in an area likely to draw activists: – Israel/Palestine – China/Tibet and China/Taiwan – Russia/Baltics, Russia/Georgia – Serbia – Olympics – Environmental – Finance and globalization • Play “what if” on your CSR and business decisions • Develop your indicators
  • 14. Page 14 How to see it coming • Your indicators, rate them 1 to 5 • As these get checked off, consider yourself warned. Attacks are getting closer: • Are activists mentioning our company or related topics? • Are there physical protests affecting our sector or related businesses? Increasing specificity and • For example, other companies in the same likelihood of line, other globalizing firms, or other Olympic you’re being attacked sponsors • Are there cyber protest attacks related to our business? • Are there cyber protest attacks against our sector? • Are there physical protests against our company? • Are we being specifically mentioned for cyber
  • 15. Page 15 What to do if you’re targeted? • What to do if you’re a target depends on which category you fall in to – Bum-luck attacks are best for you as neither sophisticated nor persistent – Sector attacks will keep coming back But will hit your competitors too, ha ha – Company-specific attacks may be short, but very intense In rare cases (n=1?) they will be with you forever Country-specific may also be short, but has the worst consequences Are your standard defenses good enough? – WEF attacks of 2002
  • 16. Page 16 The Sleep Deprivers • The old big things: – Olympics – Taiwan • The new big things: – Russia? – Collapsing Economies – Food?