SlideShare uma empresa Scribd logo
1 de 49
  Where Cyber and Military Might Combined for War Fighting Advantage. Paul M. Joyal, Managing Director  Public Safety and Homeland Security The Brave New World of the 5 Day War
Russian Views on Electronic and Information Warfare “ The growing role of information-technology is rapidly lowering the barrier between war and peace.”  Mary C. FitzGerald www.nationalstrategies.com
Briefing ,[object Object],[object Object],[object Object],[object Object],“ Warfare has indeed shifted from being a duel of strike systems to being a duel of information systems”
Russian analysts Yevgeniy Korotchenko and  Nikolay Plotnikov conclude in 1993: We are now seeing a tendency toward a shift in the center of gravity away from traditional methods of force and the means of combat toward non-traditional methods, including information.  Their impact is imperceptible and appears gradually. ... Thus today information and information technologies are becoming a real weapon.  A weapon not just in a metaphoric sense but in a direct sense as well
Two Aspects of Parity and Defense Sufficiency  (1993) Russian Admiral V.S. Pirumov   "... that a war's main objective is shifting away from seizure of the opponent's territory and moving towards neutralizing his political or military-economic potential - eliminating a competitor - and ensuring the victor's supremacy in the political arena or in raw materials and sales markets.
General Viktor Samsonov, Chief of the Russian General Staff stated 23 Dec 96 The high effectiveness of ‘information warfare’ systems, in combination with highly accurate weapons and ‘non-military means of influence’ makes it possible to disorganize the system of state administration, hit strategically important installations and groupings of forces, and affect the mentality and moral spirit of the population. In other words, the effect of using these means is comparable with the damage resulting from the effect of weapons of mass destruction.
Developments to this doctrinal understanding have evolved in the 90’s with the dynamism of the information era ,[object Object],[object Object]
Information age technologies have created a new cyberspace environment in which to conduct warfare. Russia's response to the information age highlights the potential for challenges to the existing military balance and global security. This was brought vividly home during the 5 Day Russian Georgian War. Countries around the globe are increasingly vulnerable to information warfare  as cyberspace and social networking increases, dependence expands. The gap between the emerging information age environment and the doctrine, capabilities and strategies for defending against and prosecuting information warfare  are now being globally confronted.
Tectonic shift in military affairs:  6 th  Generation warfare will change the laws of combat and the principles of military science ,[object Object],[object Object]
Nature of Information Warfare ,[object Object],[object Object],[object Object],[object Object]
Information Warfare ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computerization of Information Warfare ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Russian intelligence services have a history of employing hackers against the United States . ,[object Object],[object Object]
Russian FSB continues to employ hackers ,[object Object],[object Object]
Psychological Operations and Information Warfare ,[object Object],[object Object],[object Object]
Reflexive Control of the enemy is the goal of PYSOPS and A/M ,[object Object],[object Object],[object Object],[object Object]
CYBERWAR The New “Active Measure” ,[object Object],[object Object],[object Object]
Russian cyber warfare doctrine also addresses the optimum time to strike.  Prior to an “information strike”, all targets should be identified (including enemy information systems), enemy access to external information should be denied, credit and monetary circulation should be disrupted, and the populace should be subjected to a massive psychological operation--including disinformation and propaganda.
In preparation for conflict, computer networks and databases are penetrated before the beginning of combat operations by agent and other methods Micro-organism cultures are introduced that eat away electronic components. The employment of information weapons in the concluding phase of a major regional conflict is similar to their use in peacekeeping operations.
Combined information and military operations are required Estimates have shown that the use of information weapons must be constantly accompanied by the limited use or threat of use of conventional weapons, especially high-precision weapons.
Information Warfare Wrap Up ,[object Object],[object Object],[object Object],[object Object]
Russian-Georgian War ,[object Object],[object Object],[object Object],[object Object]
Information Warfare and Active Measures have a highly developed history in Soviet -Russian Intelligence History Today Russia is no longer constrained by communism. Government, business and criminal groups operate seamlessly.  Intelligence skills have now entered the market place and are used by any number of public and private entities to achieve their ends.  Cyber threats only amplify this muddled reality
The Brave New World of the 5 Day War: Where Cyber and Military Might Combined Presented by Eka   Tkeshelashvili Secretary, National Security Council of Georgia February 6, 2011 , Washington, DC
PLANNING ,[object Object],[object Object],[object Object],February 6, 2011
Let’s go back about a decade ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
THE PROBLEM ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber War ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The War in Context ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber-attack Details - 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],February 6, 2011
The Cyber-attack Details - 2 ,[object Object],[object Object],[object Object],[object Object],February 6, 2011
Conclusions ,[object Object],[object Object],[object Object],February 6, 2011
Commercial Effects of E-Wars   Analysis of Georgia events and related topics . Stephen Spoonamore Partner GSP llc [email_address] Skype: spoonamore 202 351 1883
Where was the Georgian War? This is snapshot of what part of the Internet looked like at a computational perspective near the start of the Georgia War. Yes…it is fuzzy… So is the web.
More or less here… The Green Square (virtually as it were) covers the Caucus . It amounts to apx 0.3% of global IT  Traffic. From a commercial  perspective, it is not  a high priority.
Rewind to the Baltics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In other words this… The Green Square Now covers the  Baltics . Who also amount to apx 0.3% of  global IT Traffic.
Became this… Green Square covers failures Spilling out of the  Baltics . Impacting nearly  30% of the globes  IP traffic and 20% of the globes  Finance. This sucked.
After the Baltics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Banks now act like a herd. Watch our for lions…
One dies, Herd survives. Lions eat the weak link (Georgia) while the bank herd goes off to graze.  They are programmed this way as we sit here today.
Banks impact Cell Phones. Average Credit Card usage needs 36 computers to  confirm or process data. Many, perhaps most, EU Cell Phones confirm account validity by piggy-backing on credit system Banks cut of Credit Card settlement systems, none of  those phones linked to it function.
Impact on other credentials. Border credential systems overlap phone networks . IP address blocks for ISPs of attacked banks shut out. Commercial entities within those ISP blocks can not  access ISP or email. ATM network will not function. Travel tickets wont function. Gas Pumps won’t function.
E-War knowns Mo-Fri. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Commercial Responses. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Methods of Research final
Methods of Research finalMethods of Research final
Methods of Research final
Eric Sutton
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlin
Javierski
 
International Law-2
International Law-2International Law-2
International Law-2
Erum Khatoon
 
Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)
cynrx
 
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain RegionNotice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
legaladvice
 

Mais procurados (19)

Final Thesis_Bessinger
Final Thesis_BessingerFinal Thesis_Bessinger
Final Thesis_Bessinger
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
 
Book studies 63-1-mar2019
Book studies 63-1-mar2019Book studies 63-1-mar2019
Book studies 63-1-mar2019
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 
Methods of Research final
Methods of Research finalMethods of Research final
Methods of Research final
 
Bush doctrine for submission 1
Bush doctrine for submission 1Bush doctrine for submission 1
Bush doctrine for submission 1
 
The work-of-a-nation
The work-of-a-nationThe work-of-a-nation
The work-of-a-nation
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlin
 
International Law-2
International Law-2International Law-2
International Law-2
 
4 g wfinal (2)
4 g wfinal (2)4 g wfinal (2)
4 g wfinal (2)
 
The revolution after next
The revolution after nextThe revolution after next
The revolution after next
 
Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016 Civilian casualties in eastern Ukraine 2016
Civilian casualties in eastern Ukraine 2016
 
Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)
 
Vol3ch03
Vol3ch03Vol3ch03
Vol3ch03
 
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain RegionNotice Appealable Decisions; Legal Notice Rocky Mountain Region
Notice Appealable Decisions; Legal Notice Rocky Mountain Region
 
Terrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoTerrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. Plexico
 
Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?
 

Destaque

Media presentation project
Media presentation projectMedia presentation project
Media presentation project
AaronLott
 
Military (2)
Military (2)Military (2)
Military (2)
rockopri
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same Slide
Crispy Presentations
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing Fails
Rand Fishkin
 

Destaque (20)

Relationship between Russia and Georgia
Relationship between Russia and GeorgiaRelationship between Russia and Georgia
Relationship between Russia and Georgia
 
The 2008 Russia-Georgia War
The 2008 Russia-Georgia WarThe 2008 Russia-Georgia War
The 2008 Russia-Georgia War
 
Media presentation project
Media presentation projectMedia presentation project
Media presentation project
 
Military (2)
Military (2)Military (2)
Military (2)
 
Ethical challenges
Ethical challengesEthical challenges
Ethical challenges
 
My presentation on Rising Influence of China
My presentation on Rising Influence of ChinaMy presentation on Rising Influence of China
My presentation on Rising Influence of China
 
Ethics and AI
Ethics and AIEthics and AI
Ethics and AI
 
Arms Control AND Disarmament
Arms Control AND DisarmamentArms Control AND Disarmament
Arms Control AND Disarmament
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
The Minimum Loveable Product
The Minimum Loveable ProductThe Minimum Loveable Product
The Minimum Loveable Product
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media Sins
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same Slide
 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)
 
Upworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The Internets
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From Failure
 
Design Your Career 2018
Design Your Career 2018Design Your Career 2018
Design Your Career 2018
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing Fails
 
The History of SEO
The History of SEOThe History of SEO
The History of SEO
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into Marketing
 

Semelhante a Govsec Georgia 2008 Cyber War

Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
Clifford Stone
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
RepentSinner
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
AnonDownload
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
oreo10
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docx
festockton
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docx
alfredai53p
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docx
ambersalomon88660
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
MarioEliseo3
 
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
festockton
 

Semelhante a Govsec Georgia 2008 Cyber War (20)

Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016
 
Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)
 
The Mind Has No Firewall.pdf
The Mind Has No Firewall.pdfThe Mind Has No Firewall.pdf
The Mind Has No Firewall.pdf
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docx
 
Article - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docxArticle - httpwww.campusreview.com.aupagessectionarticle.docx
Article - httpwww.campusreview.com.aupagessectionarticle.docx
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docx
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
 

Último

Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Último (20)

Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 

Govsec Georgia 2008 Cyber War

  • 1. Where Cyber and Military Might Combined for War Fighting Advantage. Paul M. Joyal, Managing Director Public Safety and Homeland Security The Brave New World of the 5 Day War
  • 2. Russian Views on Electronic and Information Warfare “ The growing role of information-technology is rapidly lowering the barrier between war and peace.” Mary C. FitzGerald www.nationalstrategies.com
  • 3.
  • 4. Russian analysts Yevgeniy Korotchenko and Nikolay Plotnikov conclude in 1993: We are now seeing a tendency toward a shift in the center of gravity away from traditional methods of force and the means of combat toward non-traditional methods, including information. Their impact is imperceptible and appears gradually. ... Thus today information and information technologies are becoming a real weapon. A weapon not just in a metaphoric sense but in a direct sense as well
  • 5. Two Aspects of Parity and Defense Sufficiency (1993) Russian Admiral V.S. Pirumov "... that a war's main objective is shifting away from seizure of the opponent's territory and moving towards neutralizing his political or military-economic potential - eliminating a competitor - and ensuring the victor's supremacy in the political arena or in raw materials and sales markets.
  • 6. General Viktor Samsonov, Chief of the Russian General Staff stated 23 Dec 96 The high effectiveness of ‘information warfare’ systems, in combination with highly accurate weapons and ‘non-military means of influence’ makes it possible to disorganize the system of state administration, hit strategically important installations and groupings of forces, and affect the mentality and moral spirit of the population. In other words, the effect of using these means is comparable with the damage resulting from the effect of weapons of mass destruction.
  • 7.
  • 8. Information age technologies have created a new cyberspace environment in which to conduct warfare. Russia's response to the information age highlights the potential for challenges to the existing military balance and global security. This was brought vividly home during the 5 Day Russian Georgian War. Countries around the globe are increasingly vulnerable to information warfare as cyberspace and social networking increases, dependence expands. The gap between the emerging information age environment and the doctrine, capabilities and strategies for defending against and prosecuting information warfare are now being globally confronted.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Russian cyber warfare doctrine also addresses the optimum time to strike. Prior to an “information strike”, all targets should be identified (including enemy information systems), enemy access to external information should be denied, credit and monetary circulation should be disrupted, and the populace should be subjected to a massive psychological operation--including disinformation and propaganda.
  • 19. In preparation for conflict, computer networks and databases are penetrated before the beginning of combat operations by agent and other methods Micro-organism cultures are introduced that eat away electronic components. The employment of information weapons in the concluding phase of a major regional conflict is similar to their use in peacekeeping operations.
  • 20. Combined information and military operations are required Estimates have shown that the use of information weapons must be constantly accompanied by the limited use or threat of use of conventional weapons, especially high-precision weapons.
  • 21.
  • 22.
  • 23. Information Warfare and Active Measures have a highly developed history in Soviet -Russian Intelligence History Today Russia is no longer constrained by communism. Government, business and criminal groups operate seamlessly. Intelligence skills have now entered the market place and are used by any number of public and private entities to achieve their ends. Cyber threats only amplify this muddled reality
  • 24. The Brave New World of the 5 Day War: Where Cyber and Military Might Combined Presented by Eka Tkeshelashvili Secretary, National Security Council of Georgia February 6, 2011 , Washington, DC
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Commercial Effects of E-Wars Analysis of Georgia events and related topics . Stephen Spoonamore Partner GSP llc [email_address] Skype: spoonamore 202 351 1883
  • 37. Where was the Georgian War? This is snapshot of what part of the Internet looked like at a computational perspective near the start of the Georgia War. Yes…it is fuzzy… So is the web.
  • 38. More or less here… The Green Square (virtually as it were) covers the Caucus . It amounts to apx 0.3% of global IT Traffic. From a commercial perspective, it is not a high priority.
  • 39.
  • 40. In other words this… The Green Square Now covers the Baltics . Who also amount to apx 0.3% of global IT Traffic.
  • 41. Became this… Green Square covers failures Spilling out of the Baltics . Impacting nearly 30% of the globes IP traffic and 20% of the globes Finance. This sucked.
  • 42.
  • 43. Banks now act like a herd. Watch our for lions…
  • 44. One dies, Herd survives. Lions eat the weak link (Georgia) while the bank herd goes off to graze. They are programmed this way as we sit here today.
  • 45. Banks impact Cell Phones. Average Credit Card usage needs 36 computers to confirm or process data. Many, perhaps most, EU Cell Phones confirm account validity by piggy-backing on credit system Banks cut of Credit Card settlement systems, none of those phones linked to it function.
  • 46. Impact on other credentials. Border credential systems overlap phone networks . IP address blocks for ISPs of attacked banks shut out. Commercial entities within those ISP blocks can not access ISP or email. ATM network will not function. Travel tickets wont function. Gas Pumps won’t function.
  • 47.
  • 48.
  • 49.