108
CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

Embed Size (px)

Citation preview

Page 1: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

CHANGING PERCEPTIONS OF CYBER WARFARE

Presentation Higher Command CourseArmy College of Warfare

18 October 2003

Page 2: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

2

Genesis of the Internet Rand thesis Internet a product of the cold war Paradigm shift – hierarchical to

networking Advent of WWW Gift of TCP/IP to public domain

Page 3: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

3

CYBER ABUSES

CYBER TERROR

CYBER FRAUD

CYBER LAUNDERING

CYBER INFRACTION

CYBER HACKING

CYBER PHREAKING

CYBER HACTIVISM

SPYING

SPOOFING

SNIFFING

SPAMING

SPINNING

STALKING

SEEDING (Viruses, Worms & Trojans)

Page 4: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

4

Maxim

The Internet is the high ground and a first termer in NDA will know that the first lesson that one learns is to occupy high ground and hold it under all costs.

Page 5: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

5

Page 6: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

6

Cyber Terrorism Threat The most potent threat vector. We are victims of polemics and politics of

definitions. What is terrorism? Is cyber terrorism a hype or for real?

Page 7: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

7

According to National Information Protection Centre

(NIPC), ”Cyber terrorism is an act through computers

that results in violence death and/or destruction and

creates terror for the purpose of coercing a government

to change its policies.”

“Cyber terrorism is the premeditated, politically

motivated attack against information, computer

systems, computer programmes, and data which result

in violence against non combatant targets by sub-

national groups or clandestine agents”

CYBER TERRORISM

Page 8: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

8

Cyber Psywar zoom Cyber anarchy is a vested interest. Anthrax, SARS and Melissa are more

psychological than physical. We are in permanent and perpetual

state of threat. The Motto: “We need to give them back,

something to live for, instead something to die for.”

Cyber security is now a big business

Page 9: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

9

Cyber enabled Terror InfoInfra Terror threats. Propaganda and psyops. Communications; crypto, stegano, PGP Money laundering, hawala. WMD Int, tech snooping, contact with hackers

and criminals. Proxy operations. Transacting, shopping and scheduling in

contrabands, drugs and weapons Clandestine meetings and RVs, ICQ, IRC

Page 10: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

10

Cyber Terrorism Threat (Contd) Asymmetric warfare anchors on

unpredictable “the unknown unknown.” Both the perpetrator and the victim deny

the impact if not the criminal/terror act. A virtual attack may coincide with real

one, e.g. imagine mayhem if Code Red and 9/11 were mounted simultaneously

Page 11: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

11

----------------

1. Unknown hacker sends Code red worm out onto the Internet to find a vulnnerable host server

2. The worm propagates to other vulnerable servers, turning them into dummies that infect other servers. And this process continues exponentially

3. …Code red ceases to proliferate, and the numerous dummy servers turn to attack the White House website, attempting to overwhelm its server with junk communications

<whitehouse.gov>

Page 12: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

12

Surveillance & Security Industry

The digital surveillance and security industry is spurting sharply.

It is expected to cross $50 billion mark worldwide by 2008.

Page 13: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

13

Threats to Infrastructure The physical infrastructure threat. Ranges from compromising critical

systems to severely affecting them. Critical physical infrastructure, e.g.

power grids, water, railways, dams, hospitals, oil pipelines, TV and AIR stations, telecommunications, air traffic, or any other networked system.

Page 14: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

14

Scepticism

“To us cyber terrorism is a lower-level threat”

Marcus Kempe, Director Operations,

Masachusetts Water Source Authority

Page 15: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

15

Vitek Borden Exploit

A hacker Vitek Borden succeeded in releasing a million litter of sewage into the water supply in Australia after 44 attempts

Page 16: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

16

India’s SCADA Systems SCADA stands for Supervisor Control

and Acquisition of Data – these are systems that are cybernated or computer controlled/

30 percent of such networks are accessible by modems connected to public switched telephone networks.

Employees are lax about manual backup.

Page 17: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

17

Threat to Data Compromising critical computer

systems to steal or irreversibly damage vital data. More pronounced against military, R&D, defence production and other sensitive data.

More critical the data, greater the vulnerability.

Page 18: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

18

THREATS TO INDIAN CYBERSPACE Muslim Hacker Club Al Qaeda network ISI covert Internet-enabled spy

network. ICT exploitation tactics. Pak “G” Force, mOs, WFD, PHC and

Silver Lords LTTE cyber hactivism. Mercenary hackers.

Page 19: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

19

Page 20: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

20

Cyber Crime – Wide Canvas Rampant misuse and abuse of e-

banking and e-businesses. Unauthorized access to data. Forgery of digital signatures. Infringement of intellectual property

rights covering patents and trademarks. Fraudulent subversion of electronic

payment systems. Spamming.

Page 21: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

21

Cyber Crime (contd) Wars over domain names,

browsers and portals. Monopoly practices. Commercial spying. Porno Growing menace of intruders,

masqueraders, and saboteurs in the cyberspace.

Page 22: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

22

Security Breaches (1997-2001)

0

20

40

60

80

100

(% o

f Res

po

nd

ents

)

1997

1998

1999

2000

2001

Respondents 1997 98 99 2000 01

CSI/ FBI 2001 Survey 484 583 460 428 503

DoS Laptop Unauth Virus Sabotage IPR System Telecom Fin

Access theft penetration fraud fraud

Page 23: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

23

Threat Perception by US Defence Science Board in 1996

StateSponsored

Terrorist

Espionage

Criminal

Individual hacker

High

Low

Low High

Probability of Occurrence

Potential damage

1996

2000

2004

Source : Jane’s Intelligence Review, Dec 2000

Page 24: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

24

Page 25: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

25

CYBER SURVEILLANCE

Systematic observation of cyberspace by surfing, sniffing, snooping or other means. primarily for the purpose of locating, identifying, determining, profiling and analyzing by all available and predictable means the transmission of e-mail, movement of packets, file transfer, e-money transactions and subversive activities of criminals, cyber terrorists, hostile regimes and intelligence agencies.

Page 26: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

26

CYBER SURVEILLANCE

It equally applies to watch over friendly elements to anticipate and prevent cyber crime and social abuse, carry out counter surveillance and find holes in own procedures and systems of cyber security

Page 27: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

27

CYBER INTELLIGENCE

Cyber Intelligence is open-source information minus noise, gathered over the Internet

The product resulting from the collection, processing, integration, analysis, evaluation and interpretation of available information concerning hackers, criminals, terrorists, hostile countries and cyber operations.

Page 28: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

28

CYBERINT

HACKERINT TERRORINT

E-MAILINTERCEPTION

WEBINT

OPEN INTELLIGENCECOUNTRIES OF INTEREST

COMMERCIAL& TRADE-INT

CYBERCRIME INT

IRC

SPYINGSNOOPINGSNIFFING

CYBERINT

BB

INT ON SECURITY PRODUCTS

ICQ

Page 29: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

29

Page 30: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

30

Sun Tse Precepts in Cyber Arena

PLA’s capabilities to spy in cyberspace is next only to Echelon and that of waging cyber war and protecting cyber assets next only to NATO.

The scope of Chinese Information warfare spreads over a wide canvas, military, social, economic and political.

Encompasses electronic warfare, attacks on “human cognitive systems,” cyber, signal and signal deception, strategic deterrence,

Page 31: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

31

Cyber Warfare is all Deception and Ess Abuses propaganda warfare, psychological

warfare, network warfare, structural sabotage and trade warfare.

#The Chinese have no compunctions whatsoever for employing dubious tactics, machinations and subterfuge, e.g invasion of adversaries’ financial systems, use of computer viruses, human sabotage, disrupting enemies’ economies, or spreading rumours over the Internet and thus psychologically impacting society.

Page 32: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

32

Doctrine and Training “PLA has successfully integrated the latest

C4ISRT (Command, Control, Communications and Computers Intelligence, Surveillance, Reconnaissance and Targeting) and information warfare techniques into its war doctrine.”

The Chinese have been conducting training in cyber warfare.

 

Page 33: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

33

Sino-Taiwanese Cyber War 1997-99

@Eversince 1997 the Taiwanese and Chinese armed forces have been preparing openly for a long drawn hacker war.

@“The wolf has already come. Pick up your hunting rifle!”

@The most serious attack has been that of the Chernobyl virus, written by a Taiwanese computer engineering student, Chen Ing-hao.

@The virus reportedly impaired 3,60,000 computers in China and caused $120 million in damage.

Page 34: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

34

Cyber War -1

@Whereas China accused Taiwanese complicity, the Taiwanese authorities maintained that it was an individual act of crime.

@The Guaangzhou Military Region, which includes the South China Sea Fleet and the Second Artillery units, was hit and was paralyzed.

Page 35: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

35

Cyber War-1

@A state of emergency was declared placing the Nanjing Military Region and the East China Sea Fleet on second-degree combat readiness. This was the first time China’s military entered a second degree combat readiness since the death of Deng Xioping in February 1997.

Page 36: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

36

Cyber war-1@ After the incident, the State Council and the

Central Committee Military Commission promptly ordered the formation of a task force composed of General staff Intelligence Department, General staff Technology and Communications Department, Ministry of Defence Technological Intelligence Department, Institute of Military Sciences’ Special Technologies Department (also known as Department 553), and Ministry of Security’s Security Bureau.

Page 37: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

37

China is reportedly considering developing a fourth branch of its People's Liberation Army devoted solely to cyberwarfare.

"China’s military planners recognize that... over-dependence on information systems is a potential weakness... Combining information warfare - such as computer hacking - with irregular special and guerilla operations, would allow China to mount destructive attacks within the enemy’s own operations systems, while avoiding a major head-on confrontation." (For more on prospective Chinese cyberwar strategies, read Unrestricted Warfare [file is in .pdf format], a book of military proposals written by two young Chinese military officers in February 1999.)

Page 38: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

38

China’s Cyberwar Strategies

For more on prospective Chinese cyberwar strategies, read Unrestricted Warfare, a book of military proposals written by two young Chinese military officers in February 1999.

Page 39: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

39

Sino-US CYBER WAR 2001 This war started as a sequel to the

collision between American military surveillance plane and the Chinese fighter jet on April 1, 2001.

China launched massive attacks agains US Websites including those of

It's (Cyber) War: China v. U.S. Crackers Expand Private War FBI Warns of Chinese Hack Threat

Page 40: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

40

Cyber War-2

The Xinhua News Agency reported that U.S hackers have defaced the websites of the provincial governments of Yichun, Xiajun and Beijing, the Deng Xiaoping police force,the Tsinghua and Xinjiang Universities, and Samsung's and Daewoo Telecoms' Korean sites.

Page 41: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

41

Cyber War-2

FBI-led National Infrastructure Protection Center (NIPC) confirmed that Chinese hackers had been active in launching Web defacing and distributed-denial-of-service attacks on the Department of the Interior's National Business Center, the U.S. Geological Survey's site and Pacific Bell Internet Services

Page 42: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

42

National Security Presidential Directive 16

President Bush signed a directive in July 2002, ordering the government to develop a cyber-warfare guidance plan. The strategic doctrine would detail when the U.S. would use cyber attacks, who would authorize it, what constitutes legitimate targets, and what kinds of attacks -- Denial of Service, hacking, worms -- could be used.

Page 43: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

43

The Fifth Dimension The U.S. government and military have been

studying the possibility of cyberwarfare for years, although it has only recently become a realistic threat. The U.S. military is convinced that "operations within the information domain will become as important as those conducted in the domains of sea, land, air, and space." (Source: Joint Vision 2020).

Page 44: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

44

The full extent of the US cyber arsenal is among the most tightly held national security secrets. But reports point to a broad range of weapons under development, including use of computer viruses or "logic bombs" to disrupt enemy networks, the feeding of false information to sow confusion and the morphing of video images onto foreign television stations to deceive.

Page 45: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

45

Maxim An extraordinary amount of detailed

intelligence is needed about a target's hardware and software systems for mounting a large scale cyber attack. Commanders must know not just where to strike but be able to anticipate all the repercussions of an attack.

Page 46: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

46

Indo-Pak Cyber War

* It’s desi hackers vs rediff.comPak G Force. N Vidyasagar The Times of India

www.ofbjp.org * War in Cyberspace, Priya

Ganapati, www.rediff.com

Page 47: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

47

Al Qaeda – ISI Gathbandan Al Qaeda uses simple hacking tools, e.g.

LOphtCrack that can break 8 letter/figure password in two minutes. The tool is freely downloadable.

Al Qaeda doing recce of critical infrastructure in particular that of US, Russia and India.

Technical expertise: Khaled Sheikh Mohammad studied engineering in a university in North Carolina

Page 48: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

48

Gathbandhan (contd) Some experts had training in

computer security. ISI ran classes at Qandhar and in Malaysia under Muslim Hacker Club. Reports suggest revival.

All money movement is done by e-mail and hawala. None dare burst it

Al Jazeera still gets tapes. Tapes Trail remains uncompromised

Page 49: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

49

Al Qaeda connection A hacker in US opines, “Al Qaeda as a

network has known connections to ISI. ISI has contacts with hacker groups operating agaist other targets, The belief is that if you accept that there is connection between Al Qaeda and ISI and ISI is operating against for example India, then Al Qaeda (even in its present state) would be able to gain access to computer hacks and plan operations”

Page 50: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

50

It may well happen in India Someday Al Qaeda, if it is still alive

and operating will use cybespace as a vehicle for attacking infrastructure, not with bombs but with bytes. It would inflict biggest possible damage with least possible investment.

Richard Clarke Presidential Adviser for Cyberspace Security (2001-2003)

Page 51: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

51

Hato Ashwathama

Let us not be naïve. There are no ethics in cybersocietyWar will continue to be between

belief systemsFlesh and silicate pitched against

flesh and silicate

Page 52: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

52

Page 53: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

53

Technologies and Tools Black bag jobs Packet Sniffers Carnivore Red and Blue Pill Trap and Trace Omnivore Genoa

Page 54: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

54

Technologies and Tools (contd) Protocol Analyser Blackice Defender Dsniff Ethereal Spyware, e.g. spyBuddy AntiSpy software

Page 55: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

55

Blackbag Jobs A black-bag operation is a secret break-in

by a law-enforcement or intelligence organization. It involves secret search of suspected locations, copying files or other materials. Besides scrounging trash, elect- ronic and physical

surveillance, pen-tests are part of the game. The search sometimes leads to what the hackers call “Rat Racing.”

Page 56: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

56

PACKET SNIFFER

A packet sniffer is a wiretap device that plugs into a computer network and eavesdrops on the network traffic. Like a telephone wiretap that allows an intelligence agency to listen in on the conversations, sniffer programme lets someone listen in computer conversation.

Carnivore is one such packet sniffer or

packet filter.

Page 57: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

57

CARNIVORE: A PACKET SNIFFER

Carnivore acts like a “packet sniffer” down into bundles called "packets". Carnivore eavesdrops on packets that all Internet traffic is broken into and watches them go by, then saves a copy of the packets it is interested in.

Page 58: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

58

Carnivore News of Carnivore broke in July 2000. Public furor. How voracious Carnivore

could get? Can it vacuum up Internet comns from innocent users? How frequently is it used? What is the legal basis? Is it permanently hooked up?

FBI came clean or did they? “Designed to conduct efficient wiretaps of e-mail and online communications involving suspected hackers, terrorists and other criminals.”

Page 59: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

59

CARNIVORE

Carnivore is packed in a slim laptop and is described as “a tool within a tool” that enables the FBI, in cooperation with an Internet Service Providers (ISPs) to collect counter-intelligence by tapping e-mails or other electronic communications of targeted user. This is done on the court orders. Carnivore is used in two ways, viz. as a "content-wiretap" and a “trap-and-trace, pen-register.”

Page 60: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

60

CARNIVOREBOX

Windows NT or Windows 2000Box with 128 megabytes of RAMA Ppentium 111, 4-18 gigabit of

disk space and 2 G Jaz Drive

HardwareAuthentication

Device

Network IsolationDevice

Page 61: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

61

Carnivore Box

A COTS (Commercial Off The Shelf) Windows NT (or Windows 2000) box with 128-megabytes of RAM, a Pentium III, 4-18 gigabytes of disk space, and a 2G Jaz drive where evidence is written to

The software is written in C++

The box has no TCP/IP stack, and therefore it is hack-proof.

Page 62: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

62

Carnivore Box

A hardware authentication device to control access to the box, preventing personnel from accessing the device without leaving telltale signs. It is a "network isolation device", which is probably a Shomiti or NetOptics tap.

Some units are rumored to have dial-in modem ports, but it seems that the standard procedure is to have an FBI agent come in daily to exchange the Jaz disk for a fresh one.

Page 63: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

63

RED AND BLUE PILL

Carnivore comes in two pills, the “Red” one and the “Blue” one The former is administered when the ISP claims that it cannot or will not comply with the court order. The Blue Pill is a sophisticated Carnivore programme that scans only e-mails where the ISP cooperates for an investigation. The FBI explains the origin of the codename: "Carnivore chews all the data on the network, but it only actually eats the information authorized by a court order.

 

Page 64: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

64

TRAP AND TRACE

A less invasive wiretap that courts in the US allow without probable-cause. A pen-register records just the telephone numbers of inbound calls to a suspect. 

Page 65: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

65

IP Sniffing OMNIVORE

Earlier, the FBI was using Carnivore in a mode they call "Omnivore": capturing all the traffic to and from the specified IP address. There are numerous products that can fulfill these types of requirements. The easiest is the freeware program known as TCPDUMP, which is available for both Windows and UNIX.

Page 66: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

66

DARPA’s GENOA

CARNIVORE is now known as DCS 1000

Effectiveness under doubt Genoa provides a cutting edge

search engine, sophisticated information harvesting programme and P2P computing methods.

Still in experimental stage.

Page 67: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

67

PROTOCOL ANALYSIS

Network wiretap comes with a feature called “protocol analysis,” which allows them to decode the computer traffic and make sense of it. Network sniffing has a distinct advantage over telephone wiretaps as many networks use shared media dispensing the need to break into a wiring closet to install the wiretap. This can be done from any network connection and is called promiscuous mode sniffer. However this shared technology is fast changing to switched technology, which implies that sniffer would have to actively tap the wire.

Page 68: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

68

BLACKICE DEFENDER

  BlackICE Defender" has a feature called "Packet Logging". It monitors all traffic to and from the machine and saves it directly to disk just like Carnivore. This feature could be used when there is apprehension of being subjected to an attack. The popular freeware utility known as

"Ethereal" can then be used to display the contents of this data. IP fing may also be done in a pen-register mode. Many packet sniffers could be used for this capability.

ICE stands for Intrusion Countermeasures Electronics.

Page 69: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

69

Ethereal Described as sniffing the glue that holds

the Internet It is a freeware, network protocol

analyzer for Unix or Windows. It allows examination of data from a live

network Interactively browse the data. View summary and detailed description

of each packet

Page 70: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

70

dsniff

Dsniff is a collection of tools for network auditing and penetration testing.dsniff, filesmart, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data, e.g password, e-mails, files etc. Its avowed purpose is to create security awareness. However significantly, it provides useful sniffing/wiretap utilities to hackers that are claimed to be more advanced than Carnivore. See http://www.monkey.org/~dugsong/dsniff/

Page 71: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

71

dsniff Websites www.monkey.org www.datanerds.net www.ethereal.zing.org www.sysadmin.oreilly.com www.freshmeat.net www.groar.org www.packages.debian.org

Page 72: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

72

dsniff Websites (contd) www.science.uva.nl www.cvsweb.netbsd.org www.rpmfind.net www.linuxsecurity.com www.packetstormsecurity.nl www.itworld.com www.online.securityfocus.com

Page 73: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

73

Spyware - Capture & record every IRC. - Capture & record banking information - Capture & record passwords - Capture & record everything typed or clicked on computer Some of these software products have the ability to

send the above information covertly via email ! If you bank online or access password protected

material, your passwords or private banking information can be exposed!

Page 74: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

74

SPY SOFTWARE Downloadable, worth 40 dollars or

so Monitor home PC from workplace

or vice versa Features: Real-time remote keystroke viewing Remote desktop viewing Remote application and task management Remote open windows management

Page 75: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

75

Spy SoftwareSpyBuddy Internet Conversation Logging. Ability

to log AOL/ICQ/MSN/AIM chat conversations. Disk Activity Logging. Record all

changes made to the hard drive, e.g. directories and files, created, deleted or renamed.

Window Activity Logging Clipboard Activity Logging Website Activity Monitoring

Page 76: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

76

SpyBuddy Printed Document Logging Keystroke Monitoring Screen Shot Capturing Webwatch Keyword Alerting

Page 77: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

77

Remote Capture Remote system information viewing. Remote file system navigation Remote locking control Remote Internet connection monitoring Document history viewing Mouse freeze control Remote Website launching. Remote application launching Remote shut down

Page 78: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

78

Anti-spy software SpyCop X-Cleaner Anti-keylogger Nitrous Anti-spy Evidence Eraser software, e.g. Window washer Evidence Eliminator Pro Evidence Terminator

Page 79: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

79

Anti-Spy SoftwareSpyCop Find computer monitoring programmes used

for spying. Allows you to rename any suspect files Minimizes software while scanning so you

can do other things! You can right click on files in explorer and

scan them for spyware! Single file scan function built in complete

with browse capability Save results to a text file for future reference

Page 80: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

80

SpyCop Print the results directly from the software SpyCop icon deters spyware installation Finds when a spy programme was installed. Checks if a spy programme is detectable

with database search "LiveUpdate" feature to instantly update

database without re-downloading! Unrecognizable to most spy programmes. A screensaver which scans the system

when the user is absent.

Page 81: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

81

Virus scanners don't detect spyware & Firewalls don't stop it!

Many think someone needs access to your computer to install spy software. This just isn't true.

Now there are hybrid versions that can be sent to you just like a virus in email.

Why aren't more people upset about spyware?

Page 82: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

82

Page 83: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

83

Hacker (and terrorist) profiles are created not by identifying real

evidence, but by probing scenarios, resemblances and

similarities. Vranasvich

Page 84: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

84

PROFILING & TRACKING TERRORISTS Est virtual identity before real identity. Exploit inter group rivalries Catalogue ustad-shagird relationship. Model “terror family” tree. Bio-print Psy-print. Form chain of custody of exploits. Become a chameleon Play KOOTNITI

Page 85: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

85

JAFFNA1.AMMA2. ARASU3. BANU4. BURMAN5. CALIFORNIA6. CHICAGO7. ESHWARAN8. KENNEDY9. LOSANGELES10. MADI11. MOSCOW12. NAKULAN13. RAHIM14.SENTHIL15. VINCENT16. WILSON

MANNAR1. KALI2. NE3. N74. TIMBU

VAVUNIA1. BAHIR2. DAYABARAN3. JESSIE4. KANNAN5. MAIN6. MAHENDRAN7. N 378. SENDAN9. SHANKAR10. SUSI11. VIBULAN12. VILLAI

KILINOCHCHI1. ALEX2. GRACY3.. KEEDAN4. PARMALINGAM5. RADHAN6. RANJIT7.ROBIN8.SELVA

EWCCLTTE NETWORK

1

35 6

1615

12119

7

414

13

102 8

23

1567

8

4

8621

7

5

11

43

9

12

10

1

1412

119

87654

2

1

13

3

15

10

16

17413109515

11 76

32

1

11

1

4

28

1311

1210

796

4

21 3

VAVUNIYA

MANNAR

KILINOCHCHI

MULLAITTIVU

JAFFNA

BATTICALOA

JAFFNA

BATTICALOA

TRINCOMALEE

MULLAITTIVU

MANNAR

KILINICHCHI

MULLAITTIVU1. AC2. AIERISH3. ALFA4. ALLEN5. BALRAJ6. CHANDRU7. CHARLIE8.CHINANNA9. DHANAM10. DIVAKAR11. FORK12. IAN13. KAMAL14. KUMAR15. MAHENDI16. MURALI17.PASILAM18.PULLIANDI

BATTICALOA1. AGATIAR2. DILIP3. KANDAN4. KARIHALAN5. KUMAR6. NATHAR7. NEWTON8. RAJAN9. REAGAN10. SABASAN11. SIVAN12. SURAN

TRINCOMALEE1. BONAT2. CHITRA3. DAYA4. DEEPAN5. GURUJI6.JENA7. MAINDAN8. MICHAEL9. MOHAN10. NATHAN11. HIMAN12. RADUMAN13. RAMESH14.SHARAD15. SURENDRAN

TRINCOMALEE

143.390144.390145.390

144.440

146.310/144.310

146.310/144.440143.310144.310145.310

144.550/145.550

147.430

145.650

145.810

146.850146.910

144.440

145.590

146.910

145.630

145.350145.630

144.820

144.820143.660

144.820

145.450

144.850144.750

144.850

145.620

145.640145.650

Page 86: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

86

Udhayan,,Easan Kumar .Captain David . Kiruban, Thavoor, Das, Romeo, Menon, Kesavan, Pathi RaththiDixon Pottu Amman

Sivarasan @ Raghuvaran,the 'one eyed Jack',

Ravi @ Ravichandran Suchindran @ MaheshKP @ T.S.Kumaran A.S.Shanthakumar @ Rajan,Easan @ Easwaran ... Sigirthakumar,

Page 87: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

87

E IDENTITY TO REAL IDENTITY Udhayan, Responsible for fabrication of

Arul - 89 RPG shells, Easan. Incharge of hawala transactions. KP. Highest functionary in SE Asia. Kumar. Assistant of 'KP' in South East Asia. Captain David. Commander LTTE fleet of

three vessels including Elusia and Sea Bird. Dixon. Communication expert Pottu Amman, Intelligence Chief

Page 88: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

88

ISI: Cyber Surveillance Profiling ISI has set up a special wing called

National Response Centre for Cyber Crimes (Associated Press, March 13, 2003). “Earlier it had to rely on US investigators to trace e-mails sent by the kidnappers of Danial Pearl”

Page 89: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

89

GLOBAL INFORMATION BASE USAF Project Applied System Intelligence Inc. (ASI) KARNAC (Knowledge-Aided Retrieval iN

Activity Context. Anchored on bunch of technologies and

Database Management Systems Detect, identify and corroborate

impending t5errorist operations interalia missions of the like kind

Page 90: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

90

SOFTWARE JUNGLEE

Produced by Bangalore-based company Stratify

It sifts through myriad of unstructured information pieces that stream into CIA.

It goes through e-mailsw, letters and even rumours sent in by the CIA operatives to lend aq logical pattern and coherence.

Software understands different languages including Persian, Arabic and German.

Funded by In-Q-Tel

Page 91: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

91

CYBER COPS

In 20001, National Science Foundation announced a scholarship programme for training cyber cops.

200 students bachelor's degrees in information technology and computer security at six U.S. universities.

Graduates must work for the government for one year for every year of scholarship support they receive.

  

Page 92: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

92

Universities involved in the Project

Designated "Centers of Excellence" by the National Security Agency. They are

Iowa State, Purdue University. The University of Idaho. The University of Tulsa. The Naval Postgraduate School. Carnegie Mellon University, which is also home to the

government's CERT Coordination Center, formerly known as the Computer Emergency Response Team.

 

Page 93: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

93

Page 94: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

94

Electronic Communications Privacy Act (ECPA)

Pronounced (ek-pah). This law was designed to clarify how existing wiretap laws apply to cyber space, but at the same time sets boundaries on how much the government could intrude into on-line privacy. Commonly called "Internet wiretap law" The law was originally promoted by privacy and civil rights organizations. However, subtle changes that made it into the final version ended up being what privacy advocates called "a wish list for the law enforcement community"

Page 95: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

95

FISA-1978 Stands for Foreign Intelligence Surveillance

Act. It establishes va legal regime for foreign int separate from ordinary lawenforcement.

Deter-neutralize-exploit Special courts FII Foreign Intelligence Information is

defined. FISA allowsb surveillance without court order

Page 96: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

96

CALEA-94

Communications Assistance for Law Enforcement Act (CALEA) commonly called Digital telephony law was passed by the US Congress in 1994 to allow law enforcement to tap digital lines with the same ease in which they were tapping analogue lines. It required phone companies (common carriers) to make sure their systems would support wiretapping. This required existing systems to be retrofitted (estimated cost: $500 million) as well as to support new technological developments in wiretapping.

ISA

Page 97: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

97

Patriot Act - 2001 Broadly expands law enforcement

agencies’ surveillance and investigative powers.

Aim is to intercept and obstruct terrorism

Contradictory views expressed on the threats to security viz threats to privacy

Page 98: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

98

How is it different? Makes it easier for the investigative

agencies to use FISA to circumvent Title 111.

FISA courts can allow roving surveillance The standard under which FISA pen/trap

orders can be obtained is much lower Pen/trap orders apply to both wire and

electronic comns. When obtained all pen/trap orders are

valid throughout the US

Page 99: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

99

Regulatory Investigative Powers (RIP) of UK. RIP mandates black-boxes to be

permanently located at all ISPs, unlike Carnivore, where boxes have to be brought on site for each investigation and removed when the investigation is done. Like Carnivore, a court order is needed. The technology provides an effective mechanism to bypass a constitutionally required process of court authorization for wiretapping of electronic communications.

Page 100: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

100

SORM OF RUSSIA

SORM is a Russian acronym for System of Ensuring Investigative Activity. The regulation requires all ISPs to install a “black box” rerouting device and to build a high-speed communication line, which would hot-wire the provider, and of necessity all Internet users to FSB headquarters. FSB is the successor agency to KGB. The agency needs a warrant but that is more of a formality that can be easily dispensed with because of the provision to reroute transmissions in real time to FSB offices.

Page 101: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

101

Indian Scene Section 167 (2) (a) of the Code of Criminal

Procedure has been amended in Andhra Pradesh to make the production of the accused for the purpose of remand through video linkage as valid. But for such law, the physical production of the accused for the purpose of remand would have been mandatory. Similarly, recording of evidence through video-conference has been permitted by the Calcutta High Court.

Page 102: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

102

Page 103: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

103

Let us therefore Fix the enemy in time and space (Cyber

and geographical. Develop indigenous software that

facilitates humans and machines to think and act together. Software that is:-

- Collaborative - Coordinative - Cognitive - Comprehensive (Total Information Awareness) Destroy, disrupt, deface, deny enemy’s

ICT and cyber assets/access

Page 104: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

104

Let us therefore Raise cyberCops. Revamp our intelligence agencies with

intake from technical graduates, preferably trained in IT, biometrics, communications, bioinformatics and cryptography.

In the army, convert Intelligence Corps into a technical arm.

Create expertise within the Services and the DRDO.

Promote R&D in our training institutions

Page 105: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

105

Recommendations (contd) * Creation of a "cyber court" to preside over

computer crime. * Increased participation and data sharing

between the services and between the services and the Defence Ministry, particularly from the top down.

* Creation of a National Infrastructure

Protection Center.

Page 106: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

106

And lastly

Shed anti-technology mindset and

stop glorifying technology illiteracy

and humint

Page 107: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

107

Concluding RemarksIndia not only needs cyber warriors

but alsocyber commanders

whose cerebrums are ticking and net-worked,

and not clogged by trivia.

Tasmaad uttishth Kauntay udhay krit nishchaya

Page 108: CHANGING PERCEPTIONS OF CYBER WARFARE Presentation Higher Command Course Army College of Warfare 18 October 2003

108