HL+Cyber+Warfare+Essay

3**Research Topics** Introduction/IT concepts/Developments - Roddy Effects - Daniel Solutions - Richard Future Trends/Conclusion - Tai Sun

__**Introduction**__ Cyber-warfare, also known as cybernetic war or cyber war, is the use of computers and the Internet in conducting warfare in cyberspace. Types of cyber warfare: Espionage, web vandalism, propaganda, gathering data, distributed denial of service attacks, equipment disruption, attacking critical infrastructure, compromised counterfeit hardware. Reported threats/known attacks: Estonia, 2007 Titan Rain, Moonlight Maze. US attacked by China or Russia September 2007, Pentagon + French/German/British government computers attacked by Chinese hackers December 2007, Kyrgyzstan Central Election Commission website defaced, also DoS attacks 2008, Georgia attacked

__**Concepts**__ Internet, networks. -Various tactics, such as viruses and whatnot: DoS = ‘An attack that is specifically designed to prevent the normal functioning of a system, and thereby to prevent lawful access to that system and its data by its authorized users. DoS can be caused by the destruction or modification of data, by bringing down the system, or by overloading the system’s servers to the extent that service to authorized users is delayed or prevented. Denial of Service attacks normally stem from external sources using telecommunications (such as via the Internet); or from disaffected or disgruntled employees who bear a grudge towards the company.’ -Always developing new methods -Cyber warfare methods are probably state secrets. Or maybe Amanieu knows...

__**Developments**__ Hacking has been around for a long time, and since wars have been where it is accessible by any country, it was inevitable for it to come to technology.

__**Effects**__ Stakeholders - Government (Chinese, US, Russia), Military/Politics, Citizens (IP detection leading to false accusations)

Disadvantages - Government isn't able to access their own networks because there is too much traffic (caused by a "denial of service" attack). e.g. "China" attacking the Pentagon shutting down networks in the Secretary of Defense department. Estonian's government networks were being flooded with junk messages (The Evolution of...), Govt arent able to communicate with other govts for help during wars (e.g. Chinese shutting down communication lines for Taiwan and the US. (The evolution...)
 * Governments**

Advantages - New ways of attacking other governments or countries anonymously since the tracking of IP isnt reliable at all (The Evolution of...), the ability to stop the government from broadcasting news to citizens since they arent able to access the different news/blog/govt website (Russia accused...)/(China emerges...), the ability to cut of the electrical supply of an airplane during mid-flight so as to "crash" into specific regions (Pentagon debates...), the ability to "hack" into sensors and other radar devices to hide war planes (Pentagon debates...), the ability to remove troops from harms way
 * Military/Politics**

Disadvantages - The undetectable attacks due to non-corresponding IPs (The Evolution...), the constant debate on whether to attack for defense or to attack for offense (Pentagon debates...)

Advantages - "rogue citizens" working for other govts could compromise their own govt due to the tracking of IP (The Evolution...),
 * Citizens**

Disadvantages - everyone is susceptible to being falsely accused since hackers could hack a system but use an IP which bounces off a different server (China emerges...)

Links: [|China emerges as leader in cyberwarfare] [|The Evolution of Cyber Warfare] [|Russia accused of unleashing cyberwar to disable Estonia] [|Pentagon debates development of offensive cyberspace capabilities]

__**Solutions**__


 * Countering forces
 * Partially or fully funded by the government
 * Programs to educate potential counter-attack specialists (national)
 * Defense centers à Estonia
 * Counter-attack forces
 * Governments attacking other governments
 * “Good offense is the best defense”
 * US government considering boosting cyber warfare offensive in order to protect its own internal systems
 * International collaboration
 * “Modern Defenses Against 21st Century Cyber Warfare & Cyber Crime” Conference in APAC (Asia Pacific) EC|RF (Roundtable forum) – Malaysia, Nov. 2008
 * Sharing innovative ideas that can be implemented in order to defend one’s computer systems
 * Spreading awareness in around the world via awareness programs/initiatives

__**Future Trends/Conclusion**__ Cyberwarfare will develop itself Take control of power plants, refineries, and other infrastructure A few number of people, low cost, and anywhere in the world Cyberwarfare will affect more  instead of killing, negotitate with after destroying the system. No damage to population or infrastructure. The scale of cybercriminal will “exceed all limits” (deaths of people) In the future, technology used for cyber warfare will be developed and influence more greatly. Instead of ‘denial-of-service’ attack, total control of power plants, refineries and other infrastructures would be possibly done (Source 5). By taking control of the important structures of a country beforehand, military officials will be able to negotiate without using weapons since those infrastructures are so important (Source 4).  This will prevent possible damage to population or infrastructure by physical attacks (Source 4). Also, attacks will be possibly done by just few people at low cost to anywhere in the world (Source 4). These characteristics will be especially useful for terrorist attacks increasing their number. According to Kaspersky, these attacks will “exceed all limits” and result in detrimental results (Source 3). 1. http://www.technewsworld.com/story/The-Winds-of-Cyber-War-64494.html 2. http://www.tribuneindia.com/2008/20080921/spectrum/main1.htm 3. http://www.crn.com.au/Feature/5050,does-cyberterrorism-exist.aspx 4.  http://www.asiaeconomy.co.kr/uhtml/read.php?idxno=2008100115064273368 <span style="COLOR: rgb(0,230,17)"><span style="COLOR: rgb(14,240,0)"><span style="COLOR: rgb(99,245,0)">5. <span style="COLOR: rgb(79,255,10); LINE-HEIGHT: 115%; FONT-FAMILY: Arial,Helvetica,sans-serif">http://www.usatoday.com/tech/news/techinnovations/2008-04-07-cyperwar-offensive_N.htm <span style="COLOR: rgb(0,230,17)"> <span style="COLOR: rgb(4,255,0)">I am going to work on sentence fluency, word choice and voice.

[|U.S. military prepares cyberwarfare offensive - USATODAY.com] [|The Evolution of Cyber Warfare - Council on Foreign Relations] [|Cyberwarfare Wish List - Defense News] [|Obama's Strong Defense Card - Cyberwarfare - Andrew Kaplan - Open Salon]
 * __Articles__**

[|Richard Si] October 6 at 10:20pm[|Reply]Alright boys, so the plan is to divide the project up into sections so that each of us is doing something with our lives. Unfortunately, Tai Sun doesn't have facebook....

There are five sections that i think are crucial to the paper and here they are:

Introduction+Background Information (1-2 paragraphs) Development and Future Trends to Cyberwarfare Effects of Cyberwarfare Solutions to Cyberwarfare Conclusion

So basically, its like our portfolio, haha. We'll talk about who will do what tomorrow and also, how we'll communicate together. I think the best way will be to use the wikispace. I'll find something out. Until then, see you tomorrow.

[|Roderick Yen] October 9 at 2:52pm[|Reply]Hey, lets share websites to start with, if you've any that might be useful to others.

[|http://www.cfr.org/publica][|tion/15577/evolution_of_cy] <span class="word_break"> [|ber_warfare.html] [|http://www.upi.com/Emergin] <span class="word_break"> [|g_Threats/2007/09/17/China] <span class="word_break"> [|_has_75M_zombie_computers_] <span class="word_break"> [|in_US/UPI-73941190055386/]

Just a couple that I have.[|The Evolution of Cyber Warfare - Council on Foreign Relations]Source: www.cfr.org Foreign governments, non-state actors, and criminal networks are increasingly targeting the computerized infrastructures of Western powers, leading some experts to predict a new era of cyber-based warfare. [|Taisun Park] October 13 at 4:56am[|Reply]I will work on development (not including technological concepts) since I see Roddeh has to do both the presentation of the issue and the technology part and the assignment should be equally divided. If you see the rubric, there is not any mention about any conclusion so I do not think it is needed and writing a conclusion will not add points. Don't worry about me destrying the paper. I got B+ in ITGS. You can also fix anything if you do not like it. [|Roderick Yen] October 13 at 8:20am[|Reply]Well an essay should have some sort of conclusion, or ending point, or summary paragraph or whatever. We've already split up the work, TS, you can see it in the document.

Introduction/IT concepts/Developments - Roddy Effects - Daniel Solutions - Richard Future Trends/Conclusion - Tai Sun [|Daniel Leong] October 13 at 10:18am[|Reply]ok guys... u gotta post ur stuff on the wiki Loading... [|Taisun Park] October 13 at 10:19am[|Reply]Just thought I could lesson your load, and share equal amount of work. [|Taisun Park] October 13 at 10:22am[|Reply]yeah. I need general information for what to write for the conclusion. Pls, upload your outline for your writing.

[|Richard Si] October 13 at 12:32 pm guys, post your outlines on the wiki and write the actual thing on the goog doc [|Daniel Leong] October 13 at 10:48am[|Reply]umm... basically reiterate wad everyone has said.. its a lil vague but yea... its jus like any other conclusion [|Taisun Park] October 15 at 6:13pm[|Reply]I can start working at 7:30. I need to go to Korean class. [|Roderick Yen] October 15 at 7:26pm[|Reply]Ok. Didn't seem like you'd done much of a conclusion yet so hopefully that can be done before 9? [|Taisun Park] October 15 at 8:09pm[|Reply]Ok. [|Richard Si] October 15 at 9:14pm hey guys, sorry, i had to go get my new passport registered. Anyways, lets get this entire paper done by 10:30, and i'll edit it. sorry about the delay. i'll edit it around 11:00 so if you guys finish before then, look over it yourselves and edit anything you think should be edited. thanks guys [|Roderick Yen] October 15 at 10:10pm[|Reply]I've edited it already, but I'll look again at 10:30 to see if Richard's finished :)

1. As initial preparation read the following articles linked on the wiki: a. [|Why students of small wars should care about cyber-warfare] b. [|Pentagon debates development of offensive cyberspace capabilities - Los Angeles Times] c. [|Cyberwarfare and the Georgian Crisis - Political Fever - The Political Debate Forums] d. [|NATO Allies Sign Cyber Defense Pact] e. [|Chinese Government at the Center of 5 Cyber Attack Claims] 2. Watch the following series of videos created by PBS. Link is on the wiki: a. [|Frontline: Cyber War!| PBS] 3. Work with your partners to define the categories of the paper you feel will be important in the analysis process; decide how you will work together to research and write the paper (both in regards to other tools you might use in the collaborative process and the content). 4. Continue secondary research and keep track of your sources (yes, the paper should have parenthetical citations and a complete works cited). 5. Start writing the paper on the shared Google Document. In the drafting process, use the following color to show your contributions and edits in the paper (before final draft is submitted, it will all be changed to black): Richard- Blue Daniel- Red Tai Sun- Green <span style="COLOR: rgb(153,0,255)">Roderick- Purple 6. Make sure the paper follows MLA formatting throughout, including the citations and works cited page. 7. Other than the final Google Document itself provide evidence of your collaboration (link to a wiki page; chat/skype transcripts; Facebook notes/emails/application, etc.)
 * Tasks **