You are on page 1of 40

Cyber War: Beyond Theory

Dr. Kenneth Geers NCIS Cyber Subject Matter Expert

Normandy, 1944

Behind the Scenes

ENIAC

Weapons Development

The Internet

The Art of Intelligence

Miyazaki 8.299
Van Damme 4.805

IMDb

Zone-H

Zone-H Stats

1990s: World Wide Weapon

Kosovo War 1911: Black Hand 1.0 1999: Black Hand 2.0

Patriotic Hackers

2001: U.S. EP-3 in China

Arab Israeli Conflict

m0sad

Hacker Portals

www.wizel.com

webmaster@hezbollah.org
www.wizel.com

www.pna.net

downloads

You will attack

these IPs:

and Bank of Israel Tel Aviv Stock Exchange Prime Ministers Office www.wizel.com

Cloud Battlespace

www.ummah.com/unity
Due to complaints, moved and renamed: http://defend.unity-news.com http://members.tripod.com/irsa2003 http://members.tripod.com/irsa2004

Tallinn, Estonia

Threat Evolution

Patriotic Feeling

Physical Attacks, Cyber Attacks

Georgia 2008

|\|470

Network Configuration 101

Pen versus Sword

Updating the Adage

New Pen

New Sword

Syria 1982, Syria 2012

cut all telephone and road communication with the city. Exact details ... Incomplete. No reporters

Syria 2007

Syrian MoD Homepage

Military Grade Software

Stuxnet
1. 2. 3. 4. 5. Infrastructure test 1st PLC rootkit Multiple 0-days Global operation Stolen certificates 6. Half-megabyte 7. Multiple languages 8. AV evasion 9. Remote C2 10. P2P updates

Software as a Weapon

Siemens PLC

Target centrifuge

The Air Gap

Art of Cyber War

Wikileaks

Stuxnet

High Value Target

Stuxnet

Slammer, Blaster, Sobig

Crossing Boundaries

Information Space

Attack Space

Wikileaks

Stuxnet

Free Download

Strategic Cyber Security


by Kenneth Geers www.ccdcoe.org/278.html

Cyber Attack Mitigation

Reliability Factor

War Games

The truth is out there

Questions?
Thank You

You might also like