Title: Hacking, Crime, Terrorism
1Security Issues
Hacking, Crime, Terrorism Warfare
Public Policy 290 Cyberlife
Stephen M. Maurer
2Methods
Physical Attacks
Explosives
EMP
Wire Closets, Lap Tops, Dumpsters
Van Eck Bugging
Packet Monitoring Insertion
3Methods
Human Factors
Bribery Espionage
Stupidity
Impersonation
Password Guessing
Shoulder Surfing
Spoofing
4Methods
Over-The-Wire
War Dialers Scanners
Trojan Horses, Viruses Worms
Interruption of Service
Time Bombs
Sympathetic Vibration
Open Microphone (Video) Bugging
5Methods
Defenses
Servers
Unplugging
Disk Protection
Surveillance
Human Checks Balances
Reduced Capability?
6Goals
Hacking
Crime
Terrorism
Warfare
7Goals
Hacking
Hacker Culture
Clubs, Sites Tools
Prevalence
Hacking Into Servers
Denial of Service
High Profile Events
Phone Phreaks
8Goals
Crime
Industrial Espionage
Embezzlement Theft
Extortion
Counterintelligence
9(No Transcript)
10Goals
Terrorism
Denial of Service
Intelligence for "Traditional" Operations
How Sensible?
11(No Transcript)
12Goals
Warfare
Espionage
Disinformation
Attacks on Physical Assets
13Goals
Warfare
Targets
Telecommunications
Transportation
Emergency Services
Electric Power
Banking Finance
Military
Government Services
Oil Gas Distribution/Storage
Water
14Lessons
Targets
Insititutional Knowledge
Flexibility
Norman Angell, The Great Illusion (1910)
USAAF Strategic Bombing Survey
15Lessons
Attackers
Crime Waves
Weapons Systems