SlideShare ist ein Scribd-Unternehmen logo
1 von 49
  Where Cyber and Military Might Combined for War Fighting Advantage. Paul M. Joyal, Managing Director  Public Safety and Homeland Security The Brave New World of the 5 Day War
Russian Views on Electronic and Information Warfare “ The growing role of information-technology is rapidly lowering the barrier between war and peace.”  Mary C. FitzGerald www.nationalstrategies.com
Briefing ,[object Object],[object Object],[object Object],[object Object],“ Warfare has indeed shifted from being a duel of strike systems to being a duel of information systems”
Russian analysts Yevgeniy Korotchenko and  Nikolay Plotnikov conclude in 1993: We are now seeing a tendency toward a shift in the center of gravity away from traditional methods of force and the means of combat toward non-traditional methods, including information.  Their impact is imperceptible and appears gradually. ... Thus today information and information technologies are becoming a real weapon.  A weapon not just in a metaphoric sense but in a direct sense as well
Two Aspects of Parity and Defense Sufficiency  (1993) Russian Admiral V.S. Pirumov   "... that a war's main objective is shifting away from seizure of the opponent's territory and moving towards neutralizing his political or military-economic potential - eliminating a competitor - and ensuring the victor's supremacy in the political arena or in raw materials and sales markets.
General Viktor Samsonov, Chief of the Russian General Staff stated 23 Dec 96 The high effectiveness of ‘information warfare’ systems, in combination with highly accurate weapons and ‘non-military means of influence’ makes it possible to disorganize the system of state administration, hit strategically important installations and groupings of forces, and affect the mentality and moral spirit of the population. In other words, the effect of using these means is comparable with the damage resulting from the effect of weapons of mass destruction.
Developments to this doctrinal understanding have evolved in the 90’s with the dynamism of the information era ,[object Object],[object Object]
Information age technologies have created a new cyberspace environment in which to conduct warfare. Russia's response to the information age highlights the potential for challenges to the existing military balance and global security. This was brought vividly home during the 5 Day Russian Georgian War. Countries around the globe are increasingly vulnerable to information warfare  as cyberspace and social networking increases, dependence expands. The gap between the emerging information age environment and the doctrine, capabilities and strategies for defending against and prosecuting information warfare  are now being globally confronted.
Tectonic shift in military affairs:  6 th  Generation warfare will change the laws of combat and the principles of military science ,[object Object],[object Object]
Nature of Information Warfare ,[object Object],[object Object],[object Object],[object Object]
Information Warfare ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computerization of Information Warfare ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Russian intelligence services have a history of employing hackers against the United States . ,[object Object],[object Object]
Russian FSB continues to employ hackers ,[object Object],[object Object]
Psychological Operations and Information Warfare ,[object Object],[object Object],[object Object]
Reflexive Control of the enemy is the goal of PYSOPS and A/M ,[object Object],[object Object],[object Object],[object Object]
CYBERWAR The New “Active Measure” ,[object Object],[object Object],[object Object]
Russian cyber warfare doctrine also addresses the optimum time to strike.  Prior to an “information strike”, all targets should be identified (including enemy information systems), enemy access to external information should be denied, credit and monetary circulation should be disrupted, and the populace should be subjected to a massive psychological operation--including disinformation and propaganda.
In preparation for conflict, computer networks and databases are penetrated before the beginning of combat operations by agent and other methods Micro-organism cultures are introduced that eat away electronic components. The employment of information weapons in the concluding phase of a major regional conflict is similar to their use in peacekeeping operations.
Combined information and military operations are required Estimates have shown that the use of information weapons must be constantly accompanied by the limited use or threat of use of conventional weapons, especially high-precision weapons.
Information Warfare Wrap Up ,[object Object],[object Object],[object Object],[object Object]
Russian-Georgian War ,[object Object],[object Object],[object Object],[object Object]
Information Warfare and Active Measures have a highly developed history in Soviet -Russian Intelligence History Today Russia is no longer constrained by communism. Government, business and criminal groups operate seamlessly.  Intelligence skills have now entered the market place and are used by any number of public and private entities to achieve their ends.  Cyber threats only amplify this muddled reality
The Brave New World of the 5 Day War: Where Cyber and Military Might Combined Presented by Eka   Tkeshelashvili Secretary, National Security Council of Georgia February 6, 2011 , Washington, DC
PLANNING ,[object Object],[object Object],[object Object],February 6, 2011
Let’s go back about a decade ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
THE PROBLEM ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The War in Context ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber-attack Details - 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber-attack Details - 2 ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
Conclusions ,[object Object],[object Object],[object Object],February 6, 2011
Commercial Effects of E-Wars   Analysis of Georgia events and related topics . Stephen Spoonamore Partner GSP llc [email_address] Skype: spoonamore 202 351 1883
Where was the Georgian War? This is snapshot of what part of the Internet looked like at a computational perspective near the start of the Georgia War. Yes…it is fuzzy… So is the web.
More or less here… The Green Square (virtually as it were) covers the Caucus . It amounts to apx 0.3% of global IT  Traffic. From a commercial  perspective, it is not  a high priority.
Rewind to the Baltics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In other words this… The Green Square Now covers the  Baltics . Who also amount to apx 0.3% of  global IT Traffic.
Became this… Green Square covers failures Spilling out of the  Baltics . Impacting nearly  30% of the globes  IP traffic and 20% of the globes  Finance. This sucked.
After the Baltics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Banks now act like a herd. Watch our for lions…
One dies, Herd survives. Lions eat the weak link (Georgia) while the bank herd goes off to graze.  They are programmed this way as we sit here today.
Banks impact Cell Phones. Average Credit Card usage needs 36 computers to  confirm or process data. Many, perhaps most, EU Cell Phones confirm account validity by piggy-backing on credit system Banks cut of Credit Card settlement systems, none of  those phones linked to it function.
Impact on other credentials. Border credential systems overlap phone networks . IP address blocks for ISPs of attacked banks shut out. Commercial entities within those ISP blocks can not  access ISP or email. ATM network will not function. Travel tickets wont function. Gas Pumps won’t function.
E-War knowns Mo-Fri. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Commercial Responses. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense David Sweigert
 
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...inventionjournals
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
 
Methods of Research final
Methods of Research finalMethods of Research final
Methods of Research finalEric Sutton
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlinJavierski
 
International Law-2
International Law-2International Law-2
International Law-2Erum Khatoon
 
The revolution after next
The revolution after nextThe revolution after next
The revolution after nextLex Pit
 
Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016 Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016 DonbassFullAccess
 
Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)cynrx
 
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain RegionNotice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain Regionlegaladvice
 
Terrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoTerrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoAlvin "Flex" Plexico, Ph.D.
 
Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...528Hz TRUTH
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?Melissa Andrews
 

Was ist angesagt? (19)

Final Thesis_Bessinger
Final Thesis_BessingerFinal Thesis_Bessinger
Final Thesis_Bessinger
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
 
Book studies 63-1-mar2019
Book studies 63-1-mar2019Book studies 63-1-mar2019
Book studies 63-1-mar2019
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 
Methods of Research final
Methods of Research finalMethods of Research final
Methods of Research final
 
Bush doctrine for submission 1
Bush doctrine for submission 1Bush doctrine for submission 1
Bush doctrine for submission 1
 
The work-of-a-nation
The work-of-a-nationThe work-of-a-nation
The work-of-a-nation
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlin
 
International Law-2
International Law-2International Law-2
International Law-2
 
4 g wfinal (2)
4 g wfinal (2)4 g wfinal (2)
4 g wfinal (2)
 
The revolution after next
The revolution after nextThe revolution after next
The revolution after next
 
Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016 Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016
 
Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)
 
Vol3ch03
Vol3ch03Vol3ch03
Vol3ch03
 
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain RegionNotice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
 
Terrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoTerrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. Plexico
 
Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?
 

Andere mochten auch

The 2008 Russia-Georgia War
The 2008 Russia-Georgia WarThe 2008 Russia-Georgia War
The 2008 Russia-Georgia Warhandman003
 
Media presentation project
Media presentation projectMedia presentation project
Media presentation projectAaronLott
 
Military (2)
Military (2)Military (2)
Military (2)rockopri
 
My presentation on Rising Influence of China
My presentation on Rising Influence of ChinaMy presentation on Rising Influence of China
My presentation on Rising Influence of ChinaJoharyab Baig
 
Arms Control AND Disarmament
Arms Control AND DisarmamentArms Control AND Disarmament
Arms Control AND DisarmamentUltraspectra
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)Board of Innovation
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsXPLAIN
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideCrispy Presentations
 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)Steven Hoober
 
Upworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureReferralCandy
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing FailsRand Fishkin
 
The History of SEO
The History of SEOThe History of SEO
The History of SEOHubSpot
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into MarketingEd Fry
 

Andere mochten auch (20)

Relationship between Russia and Georgia
Relationship between Russia and GeorgiaRelationship between Russia and Georgia
Relationship between Russia and Georgia
 
The 2008 Russia-Georgia War
The 2008 Russia-Georgia WarThe 2008 Russia-Georgia War
The 2008 Russia-Georgia War
 
Media presentation project
Media presentation projectMedia presentation project
Media presentation project
 
Military (2)
Military (2)Military (2)
Military (2)
 
Ethical challenges
Ethical challengesEthical challenges
Ethical challenges
 
My presentation on Rising Influence of China
My presentation on Rising Influence of ChinaMy presentation on Rising Influence of China
My presentation on Rising Influence of China
 
Ethics and AI
Ethics and AIEthics and AI
Ethics and AI
 
Arms Control AND Disarmament
Arms Control AND DisarmamentArms Control AND Disarmament
Arms Control AND Disarmament
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
The Minimum Loveable Product
The Minimum Loveable ProductThe Minimum Loveable Product
The Minimum Loveable Product
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media Sins
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same Slide
 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)
 
Upworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The Internets
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From Failure
 
Design Your Career 2018
Design Your Career 2018Design Your Career 2018
Design Your Career 2018
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing Fails
 
The History of SEO
The History of SEOThe History of SEO
The History of SEO
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into Marketing
 

Ähnlich wie Govsec Georgia 2008 Cyber War

Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacksClifford Stone
 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016cacds_ukraine
 
The Mind Has No Firewall.pdf
The Mind Has No Firewall.pdfThe Mind Has No Firewall.pdf
The Mind Has No Firewall.pdfTeabeAmet
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseRepentSinner
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseAnonDownload
 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)pavithra M
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxoreo10
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Pranav Gupta
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxfestockton
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxalfredai53p
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxambersalomon88660
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on TerrorTpeisi Nesby
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxfestockton
 

Ähnlich wie Govsec Georgia 2008 Cyber War (20)

Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016
 
Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)
 
The Mind Has No Firewall.pdf
The Mind Has No Firewall.pdfThe Mind Has No Firewall.pdf
The Mind Has No Firewall.pdf
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docx
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docx
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docx
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
 

Kürzlich hochgeladen

Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 

Kürzlich hochgeladen (20)

Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 

Govsec Georgia 2008 Cyber War

  • 1. Where Cyber and Military Might Combined for War Fighting Advantage. Paul M. Joyal, Managing Director Public Safety and Homeland Security The Brave New World of the 5 Day War
  • 2. Russian Views on Electronic and Information Warfare “ The growing role of information-technology is rapidly lowering the barrier between war and peace.” Mary C. FitzGerald www.nationalstrategies.com
  • 3.
  • 4. Russian analysts Yevgeniy Korotchenko and Nikolay Plotnikov conclude in 1993: We are now seeing a tendency toward a shift in the center of gravity away from traditional methods of force and the means of combat toward non-traditional methods, including information. Their impact is imperceptible and appears gradually. ... Thus today information and information technologies are becoming a real weapon. A weapon not just in a metaphoric sense but in a direct sense as well
  • 5. Two Aspects of Parity and Defense Sufficiency (1993) Russian Admiral V.S. Pirumov "... that a war's main objective is shifting away from seizure of the opponent's territory and moving towards neutralizing his political or military-economic potential - eliminating a competitor - and ensuring the victor's supremacy in the political arena or in raw materials and sales markets.
  • 6. General Viktor Samsonov, Chief of the Russian General Staff stated 23 Dec 96 The high effectiveness of ‘information warfare’ systems, in combination with highly accurate weapons and ‘non-military means of influence’ makes it possible to disorganize the system of state administration, hit strategically important installations and groupings of forces, and affect the mentality and moral spirit of the population. In other words, the effect of using these means is comparable with the damage resulting from the effect of weapons of mass destruction.
  • 7.
  • 8. Information age technologies have created a new cyberspace environment in which to conduct warfare. Russia's response to the information age highlights the potential for challenges to the existing military balance and global security. This was brought vividly home during the 5 Day Russian Georgian War. Countries around the globe are increasingly vulnerable to information warfare as cyberspace and social networking increases, dependence expands. The gap between the emerging information age environment and the doctrine, capabilities and strategies for defending against and prosecuting information warfare are now being globally confronted.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Russian cyber warfare doctrine also addresses the optimum time to strike. Prior to an “information strike”, all targets should be identified (including enemy information systems), enemy access to external information should be denied, credit and monetary circulation should be disrupted, and the populace should be subjected to a massive psychological operation--including disinformation and propaganda.
  • 19. In preparation for conflict, computer networks and databases are penetrated before the beginning of combat operations by agent and other methods Micro-organism cultures are introduced that eat away electronic components. The employment of information weapons in the concluding phase of a major regional conflict is similar to their use in peacekeeping operations.
  • 20. Combined information and military operations are required Estimates have shown that the use of information weapons must be constantly accompanied by the limited use or threat of use of conventional weapons, especially high-precision weapons.
  • 21.
  • 22.
  • 23. Information Warfare and Active Measures have a highly developed history in Soviet -Russian Intelligence History Today Russia is no longer constrained by communism. Government, business and criminal groups operate seamlessly. Intelligence skills have now entered the market place and are used by any number of public and private entities to achieve their ends. Cyber threats only amplify this muddled reality
  • 24. The Brave New World of the 5 Day War: Where Cyber and Military Might Combined Presented by Eka Tkeshelashvili Secretary, National Security Council of Georgia February 6, 2011 , Washington, DC
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Commercial Effects of E-Wars Analysis of Georgia events and related topics . Stephen Spoonamore Partner GSP llc [email_address] Skype: spoonamore 202 351 1883
  • 37. Where was the Georgian War? This is snapshot of what part of the Internet looked like at a computational perspective near the start of the Georgia War. Yes…it is fuzzy… So is the web.
  • 38. More or less here… The Green Square (virtually as it were) covers the Caucus . It amounts to apx 0.3% of global IT Traffic. From a commercial perspective, it is not a high priority.
  • 39.
  • 40. In other words this… The Green Square Now covers the Baltics . Who also amount to apx 0.3% of global IT Traffic.
  • 41. Became this… Green Square covers failures Spilling out of the Baltics . Impacting nearly 30% of the globes IP traffic and 20% of the globes Finance. This sucked.
  • 42.
  • 43. Banks now act like a herd. Watch our for lions…
  • 44. One dies, Herd survives. Lions eat the weak link (Georgia) while the bank herd goes off to graze. They are programmed this way as we sit here today.
  • 45. Banks impact Cell Phones. Average Credit Card usage needs 36 computers to confirm or process data. Many, perhaps most, EU Cell Phones confirm account validity by piggy-backing on credit system Banks cut of Credit Card settlement systems, none of those phones linked to it function.
  • 46. Impact on other credentials. Border credential systems overlap phone networks . IP address blocks for ISPs of attacked banks shut out. Commercial entities within those ISP blocks can not access ISP or email. ATM network will not function. Travel tickets wont function. Gas Pumps won’t function.
  • 47.
  • 48.
  • 49.