Beruflich Dokumente
Kultur Dokumente
AdedayoStephen
TheImpactofInformationWarfare
Overview
1. Introduction 2. Definitions 3. MilitaryViewofInformationWarfare 4. CivilianViewofInformationWarfare 5. ImpactofInformationWarfareonMilitary Sector 6. ImpactofInformationWarfareonPrivateSector 7. SecurityMeasures 8. CharacteristicofCyberWar 9. InterviewResult 10. Conclusion 11. References
TheImpactofInformationWarfare
1.0Introduction
Informationtechnologyhasbroughtalotchangestothewaywarfarearebeingwage
today,agreatnumberofthenationalinfrastructuresinthedevelopednationgreatly dependonIT.Theeconomic,social,political,educational,powerandotheractivities dependonit.Computersnowcontrolsmostofthecivilianandmilitaryinfrastructure, includingcommunication,powersystems,sewageregulation,andhealthcareandover twomillioncomputersarebeingusedbytheUSmilitary(Melnick,2007).Libicki(1995) stated,informationwarfareisamilitarywordwhichcanbecategorizedinto; psychologicalwarfare,intelligencebasedwarfare,electronicwarfare,cyberwarfare, commandandcontrolwarfare,economicinformationwarfareandhackerwarfare. Internetisnowaverypowerfultoolfortrade,nationalandfinancialdevelopment,itis thelargestcomputernetworkintheworldcomprisingofsmallernetworks,formingthe backbonefordatatransmissionacrossthewholeworldbecauseofthelevelofitsgreat redundancy.ThereliabilityoftheInternethasgeneratedasignificantriseinthe vulnerabilityofthenetwork(SecurityFocus,2008).Today,informationwarandcyber warcoverwideareaofconflicttypesrangingfromeconomic,social,political,andcivilian tomilitaryscopes.Cyberwarfareisgenerallyreferredtoastheuseofinformation technologydevicestowedgewarinacommunicationmedium.
TheImpactofInformationWarfare
1.0Introduction
(contd)
Cybercriminalsnowtargetsnationalinfrastructures,suchaspublic
healthsystem,transportation,emergencyservices,waterandsewage, energy,oilandgassystem,financeandbankingsystem,massmedia, andmilitarycommandandcontrol(Wik,2000).Ifcybercriminalsare abletosucceedintheirattacksbydisruptingorstoppingtheessential informationnetworksthen,anationaldisasterandeconomicloses. Theimpactoftheinformationwarfareanditsassociatedriskisvery highbasedontheincidentreportstoComputerEmergencyResponse TeamCoordinationCenter(CERT/CC)(CERTStatistics,2009). Pati(2007)stated,cybercrimeincidentsreportedcanbecategorizeas; casesinvolvingindividualslikeprovocationthroughemails,cyber stalking,slander,hacking,crackingandoffensivedisclosure.Cases corporateorganizationreportedarecomputerdamage,intruding, hacking,cracking,cyberterrorism,andvirusdissemination.
TheImpactofInformationWarfare 4
2.0Definitions
InformationWarfarehasmanydefinitions. Haeni(1997)defineIWas;Actionstakentoachieveinformationsuperioritybyaffectingadversary information,informationbasedprocesses,informationsystems,andcomputerbasednetworkswhile defendingone'sowninformation,informationbasedprocesses,informationsystems,andcomputer basednetworks. InformationwarfareisreferredtobyNunes(2001)astoperformthesametasksweusedtoperform butatamuchfasterratebyoccasionallyusingequipmentderivedfromoursocietystechnological evolution. Littleton(1995)inhisthesisstatedthatInformationbasedWarfareisanapproachtoarmedconflict focusingonthemanagementanduseofinformationinallitsformsandatalllevelstoachievea decisivemilitaryadvantageespeciallyinthejointandcombinedenvironment. Otherdefinitionusedinclude,Cyberwarreferstoconducting,andpreparingtoconduct,military operationsaccordingtoinformationrelatedprinciples.(Arquilla&Ronfeldt,1997) ThewordNetwarwasusedbyreferstoinformationrelatedconflictatagrandlevelbetweennations orsocieties(Arquilla&Ronfeldt,1997)
TheImpactofInformationWarfare
3.0TheMilitaryViewOf InformationWarfare.
Informationwarfareisreferredtoaswarwithout
3.0TheMilitaryViewof InformationWarfare.(contd)
Softwarisanotherformofinformationwarfareusedby
TheImpactofInformationWarfare
3.1OffensiveInformation Warfare
Thisisdefineastakingfullcontroloftheenemys information,computerandcontrolsystemsusing informationweapons.OffensiveWeaponsinclude: computervirus,logicbombs,worms,trajanhorses,back doors,trapdoors,chipping,electronicjamming,HERF guns,nanomachines,andmicrobes(Haeni,1997).The toolscanbeinformofsoftwarecodeorhardwaredevice withabilitytoperformdangerousoperation,whichcan causepartialortotalbreakdownoftheenemys computersystem,infrastructureornetworks.
TheImpactofInformationWarfare 10
3.2
DefensiveInformation Warfare
Themainsecuritymeasuresemployedindefensive
TheImpactofInformationWarfare
11
3.3PassiveInformationWarfare
Passiveweaponsareharmless,consistingofsurveillance
TheImpactofInformationWarfare
12
3.4InformationWeaponries
"Avirusisacodefragmentthatcopiesitselfintoa
TheImpactofInformationWarfare
13
3.4InformationWeaponries (contd)
"ATrojanhorseisacodefragmentthathidesinsidea
programandperformsadisguisedfunction.It'sa popularmechanismfordisguisingavirusoraworm" (Russell&Gangemi,2006) "AbombisatypeofTrojanhorse,usedtoreleasea virus,awormorsomeothersystemattack.It'seitheran independentprogramorapieceofcodethat'sbeen plantedbyasystemdeveloperorprogrammer."(Russell &Gangemi,2006) Surveillancesystem,satellitessystems,Signalsand HumanIntelligence(C4ISRandIW,n.d) TheImpactofInformationWarfare 14
3.4InformationWeaponries (contd)
"Atrapdoor,orabackdoor,isamechanismthat'sbuilt
intoasystembyitsdesigner.Thefunctionofatrapdoor istogivethedesignerawaytosneakbackintothe system,circumventingnormalsystemprotection." (Russell&Gangemi,2006) Chippingisaprocessofimplantingtinyelectronicschip intohardwaretoperformanunexpectedfunctionbythe manufacturer.Thefunctionincludesendingradiosignal toaspecificlocation,totalbreakdownandunexpected performancewhenremotelytriggeredbyaspecific frequencysignal(Haeni,1997).
TheImpactofInformationWarfare 15
3.4InformationWeaponries (contd)
NanomachineandMicrobes;thisarespecialbredof
microorganismandtinyrobotswithabilitytodestroy integratedcircuits,computersystem,buildingsor completelyshutdownsystems(Haeni,1997). Electronicjammingareusedtodestruct communicationsignalsorovershadowsignalwith incorrectinformationtodeceivetheaudience(Haeni, 1997). HighEnergyRadioFrequency(HERF)gunand ElectroMagneticPulse(EMP)bombareusedto shutdownelectronicdevicesorcompletelydestroyit (Haeni,1997).
TheImpactofInformationWarfare 16
4.0CivilianviewofInformation Warfare
Withtheintroductionofinformationand
communicationtechnology(ICT)resultinginhigh securityriskalongthetransmissionmedia,various securitymeasuresarebeingtakenbyindividualand industriestoreduceinformationrisks.Today,the confidentiality,integrityandavailabilityofdataareso importanttotheITsystem.TheComputerSecurity Institutereportedthatin2007,encryptionwasused71% oforganizationtosenddatainformationwhile53%uses varioustypesofencryptiontheirdatastorage (Richardson,2008).
TheImpactofInformationWarfare 17
4.1EncryptionPrograms
Currently,varioustypesofencryptionprogramsare
4.2SecureDigital Communication
Moderntechnologyindigitalcommunicationhas
4.3EMVChipCard
Thereplacementofmagneticstripesmartcardbythe
4.4RedundantManagement Systems
Inattempttoreducesecurityrisk,theuseofredundant
managementsystemsisemployedaswayofquick recoveryfrominformationsecurityattacks(Littleton, 1995).Redundancyisdefinedastheabilityofcertain componentsofasystemtoassumefunctionsoffailed componentswithoutadverselyaffectingthe performanceofthesystemitself(Matalus&Fiering, 1977).Buildingofredundancyincommunicationpath andbackingupofallinformationsystemsresourcesis beingusedbycooperateorganizationtomitigateriskof systemfailuresinceitisraretoattackallthesystemsat atime. TheImpactofInformationWarfare 21
5.0ImpactofInformation WarfareonMilitarySector
Onethemajorresponsibilityistotowinthe
informationwarstated,intheNationalMilitary strategyoftheUnitedStatesofFebruary1995(DeVries, 1997). Themilitarypowerandnationaleconomydepends greatlyonlythenationalinformationinfrastructures duetoitsautomatedandnetworkdependantnature. Asaresult,thenationalinformationinfrastructuresis thecentreofallinformationwarfareattackandit dependslargelyonelectricpower,computersand telecommunication(Wik,2000).
TheImpactofInformationWarfare 22
5.0ImpactofInformation WarfareonMilitarySectorContd
Theimpactofinformationarecanbegroupedintothree
parts:Organizational,DoctrineandOperation. (Hawkin, 1997) IWhasbroughtnewidealthathelpstheinvestigationand explorationofnewoperationalandorganizationalconcept inthemilitary. (Hawkin, 1997) IWhelpstoreduceloses,casualtiesandworkinggroupsto asmallerrate. (Hawkin, 1997) IWspeedsupoperationwhilecommandandcontrolis worsen.Withlesstimeandwidebattlespace,resultscan beeasyexamined. (Hawkin, 1997)
TheImpactofInformationWarfare
23
COMPUTERS
Media Transport Waterand sewage Emergencyservices
TELECOM
6.0ImpactofInformation WarfareonPrivateSector
Theworldtodayhadmovedfromagrariantoindustrialandfinallyto
TheImpactofInformationWarfare 25
6.0ImpactofInformation WarfareonPrivateSectorcontd
Since1994,whenhackersattacksmilitary,civilianand
governmentorganizationsthroughtheGriffissAirForcebase computers.Themajortargetofcyberterroristhavebeingonthe civilianfirms,commercialfirmsandinfrastructures. (Strassmann,2001). InanattempttoavoiddirectmilitaryconflictwiththeU.S forces.Today,privatesectorandciviliansarenowthemajorfocus ofinformationwarfare(Adams,2001). Corporateespionagerateisrapidlyincreasingduetothecurrent corporatecompetition,moderndevelopmentinITand miniaturizationofdigitaldevicesandopeningofinternal networkwhichmakemoreinformationavailableforboththe workersandvendors(Knapp&Boulton,2006).
TheImpactofInformationWarfare 26
7.0SecurityMeasures
Protectivemeasureusedbyciviliansecuritypractitioners
areredundancy,alternativeprocedureandemergency plans(Wik,2000). Implementingsecuritypolicyandguidelines,proper allocationofallresourcesandtraining(Wik,2000). Accesscontrolthroughtheinstallationofintrusion detector,vulnerabilityscanners,firewallsystemsand networksecurityanalyzer(Hrovat,2001). Informationconfidentiality,integrityandavailability measurethroughuserauthentication,encryption,and installationofantivirusandInternetsecuritysoftware. (Uchida,Sugano,&Andou,2006).
TheImpactofInformationWarfare 27
7.1VulnerabilityScanners/Tools
Someoftheinformationweaponriesusedbythemilitaryandciviliansecurity
practitionerstoacquireknowledgeabouttheirorganizationalstrategiesand plansandsecuritymeasurestoreduceinformationrisksare: NetworkVisualisation,MonitorsandSnifferssoftwares.LikeVisio,NetViz, NetPartitioner,NeoTrace,TraceRoute,Ethload,NetXray,Etherpeak, TCPDump,Snoop,IPWatcher,TsightandScott/Tkined VulnerabilityAnalysissoftware.LikeISSInternetScanner,KaneSecurity Analyst,TridentIPToolbox/L3Expert,SecurityProfileInspector(SPI),SNI BallistaandSATAN Intrusiondetectionsoftware.LikeRealSecure,NetRanger,Stalker/CyberCop, IntruderAlert,NetworkFlightRecorder,SHADOWandNIDS Exploitationsoftware.LikeNTSecurity,RootShell,OfflineNTPasswordUtility, LophtHeavyIndustries,AntiOnline,Insecure/Fyodor,TCPwrappers, Tripwire,COPS,crack,LophtCrackandScanNT
TheImpactofInformationWarfare 28
8.0CharacteristicsofCyberwar
TargetexitinCyberspacewithrealimpact Telecommunication ComputerNetwork ControlNetwork Weapons MaliciousSoftware EMPWeapons Datamanipulationanddestruction Techniques Virtualdestructionoftargetinthecyberspace Disablingofsystemsoftware Overwhelmingofcontrolsystem Capitalrequiredissmallforlargeimpact PhysicalriskassociatedisLowforthecybercriminal Roleofmediaismoderate Legalfactorareilldefined Physicalpresencenotrequiredforsuccessfulattack(boundaryless) Attackcanhaveanyeffectsfocusedordiffused Treatcreatedareinthevirtualandphysical
TheImpactofInformationWarfare 29
InterviewQuestionandResult
Conclusion
Theincreasingoverdependencyofoureconomyand
infrastructuresonITsystemcreatedahighlevelof securityrisksresultingfrominexpensivecostofcyber attacksisofgreatconcernstoboththepublic,private andmilitarysectors.Informationwarfareisatwo edgedsword,acountrycapableofwagingIWisalso veryvulnerability.Currently,securitytreataremore thatthesolutionwehaveandthecostofpreventing informationwarfareisfarbeyondthecostofthe attack.Itisthereforenecessaryfomthegovernment andagencyinvolvedtobemorecommittedand effective. TheImpactofInformationWarfare
31
References
Adams,J.(2001).VirtualDefense.RetrievedfromForeignAffairs:http://www.foreignaffairs.com/articles/57037/jamesadams/virtualdefense Arquilla,J.&Ronfeldt,D.(1997).Retrievedfromhttp://www.rand.org/pubs/reprints/2007/RAND_RP223.pdf Brazzoli,S.M.(2007).Futureprospectsofinformationwarfareandparticularlypsychologicaloperations..Retrievedfrom http://www.iss.org.za/uploads/SA2020CHAP13.PDF Bush,G.W.(2003).NationalStrategytoSecureCyberspace.Retrievedfromhttp://www.whitehouse. C4ISRandInformationWarfare.NavalWeaponsSystems.(n.d).Retrievedfrom http://www.owlnet.rice.edu/~nava201/presentations/Lecture19.ppt DeVries,A.(1997).InformationWarfareandItsImpactonNationalSecurity(U).Retrievedfromhttp://www.dtic.mil/cgi bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA325003 Haeni,R.E.(1997).InformationWarfareanIntroduction.Retrievedfromhttp://www.trinity.edu/rjensen/infowar.pdf Hrovat,E.(2001).InformationWarfare:TheUnconventional ArtInADigitalWorld.Retrievedfrom http://www.sans.org/reading_room/whitepapers/warfare/informationwarfareunconventionalartdigitalworld_787 Kaomea,P.(n.d.).BeyondSecurity:ADataQualityPerspectiveonDefensiveInformationWarfare.Retrievedfrom http://mitiq.mit.edu/iciq/Documents/IQ%20Conference%201996/Keynote%20and%20Lunch%20Speeches/Beyond%20Security.pdf Kelsey,J.T.(2008).HackingintoInternationalHumanitarianLaw:ThePrinciplesofDistinctionandNeutralityintheAgeofCyberWarfare. Retrievedfromhttp://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bsh&AN=32010233&site=ehost live
TheImpactofInformationWarfare
32
Knapp,K.J.,&Boulton,W.R.(2006).CyberwarfareThreatensCorporations:ExpansionintoCommercialEnvironments.Information SystemsManagement.Retrievedfrom http://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bsh&AN=20025701&site=ehostlive Melnick,J.(2007).ThecyberwaragainsttheUnitedStates.Retrievedfrom http://www.boston.com/news/globe/editorial_opinion/oped/articles/2007/08/19/the_cyberwar_against_the_united_states/ Nunes,P.F.(2001).TheImpactofNewTechnologiesintheMilitaryArena:InformationWarfare.Retrievedfrom http://www.iwar.org.uk/iwar/resources/technology/nunes.htm Peters,D.(2009).IntercontinentalReplacesATMCardswithVerveChip.Retrievedfrom http://businessworldng.com/web/articles/79/1/IntercontinentalReplacesATMCardswithVerveChip/Page1.html ResearchCouncilNational.(1991).ComputersatRisk.WashingtonD.C:NationalAcademyPress. SecurityFocus.(2008).Retrievedfromhttp://www.securityfocus.com/glossary/I Strassmann,P.A.(2001).GovernmentShouldBlazeGlobalInformationWarfareTrails..Retrievedfromhttp://www.strassmann. com/pubs/searchsecurity/20018.php. Thom,M.(n.d).InformationWarfareCapabilitiesandPolicyIssues.Retrievedfrom http://www2.fiu.edu/~apodaca/Information%20Warfare%20Lecture.ppt Uchida,K.Sugano,N.&Andou,S.(2006).InformationSecuritySolutions.Retrievedfrom http://www.fujitsu.com/downloads/MAG/vol432/paper04.pdf Wik,M.W.(2000).RevolutioninInformationAffairs:TacticalandStrategicImplicationsofInformationWarfareandInformation Operations.Retrievedfromhttp://ics.leeds.ac.uk/papers/pmt/exhibits/812/wik.pdf
TheImpactofInformationWarfare 33
THANKYOU
TheImpactofInformationWarfare 34