1 00:00:01,640 --> 00:00:05,820 To end this module I'd like to talk a bit about cyber war and cyber terrorism. 2 00:00:07,610 --> 00:00:12,320 Incidents of both types of warfare have already been launched. 3 00:00:12,480 --> 00:00:17,220 The first cyber war broke out in 2007 when China attacked Germany and the US 4 00:00:19,930 --> 00:00:24,130 soon after Estonia became victim of another wave of cyber attacks. 5 00:00:25,100 --> 00:00:26,330 We'll look into this later 6 00:00:30,200 --> 00:00:33,180 cyber warfare will emerge as a more and more prevalent reality. 7 00:00:33,180 --> 00:00:42,830 Unfortunately Why is the it's easy to attack a computer system. 8 00:00:42,960 --> 00:00:47,990 It's easier than attacking let's say a commuting system. 9 00:00:48,140 --> 00:00:52,180 You don't need many resources or planning. 10 00:00:52,400 --> 00:00:59,380 You don't even have to be at the scene of the crime. 11 00:00:59,400 --> 00:01:03,210 It's not hard to locate the missile launcher in the first picture of the slide. 12 00:01:04,050 --> 00:01:07,170 The Russians learned that the hard way when they tried to plane it in Cuba. 13 00:01:09,310 --> 00:01:13,630 The bottom picture shows a typical housing estate. 14 00:01:13,760 --> 00:01:20,100 You can launch an effective cyber attack from there and attack which is impossible to detect. 15 00:01:20,100 --> 00:01:26,920 You don't need a nuclear missile silo either an internet connection will be enough. 16 00:01:26,940 --> 00:01:29,530 What are the methods of cyber warfare. 17 00:01:29,690 --> 00:01:31,110 First espionage 18 00:01:34,290 --> 00:01:38,690 is very easy to send information over the internet without attracting any one's attention. 19 00:01:40,330 --> 00:01:45,500 It's possible to hide data in the picture posted on a service. 20 00:01:45,700 --> 00:01:51,110 The picture can be viewed by anyone but only the person who's in the know can read the letter hidden 21 00:01:51,110 --> 00:01:51,960 in the image. 22 00:01:54,710 --> 00:02:02,470 Can you do this in the Internet of course you can Arab Spring is a good example of how effective Internet 23 00:02:02,470 --> 00:02:10,510 propaganda and networking can be all Arab governments attempted to significantly reduce or even ban 24 00:02:10,540 --> 00:02:14,880 Internet services. 25 00:02:15,060 --> 00:02:21,560 While the outcome wasn't successful this whole situation the first of its kind really makes one thing 26 00:02:25,820 --> 00:02:32,290 will now move on to denial of service attacks trying to think of what could happen if there was no internet 27 00:02:32,290 --> 00:02:34,710 for a day a week or a month. 28 00:02:36,300 --> 00:02:42,920 You wouldn't be able to read your e-mails log into your account in a social networking service. 29 00:02:43,000 --> 00:02:48,470 Your smartphone wouldn't work and you wouldn't be able to buy or sell anything online. 30 00:02:52,640 --> 00:02:59,610 But that's not all it's possible to attack and stop or at least hinder the functionality of specialist 31 00:02:59,610 --> 00:03:00,910 computer systems. 32 00:03:03,220 --> 00:03:08,320 Electricity water supply or television or all services that can be remotely blocked. 33 00:03:10,700 --> 00:03:14,800 A magnetic cloud can even block those systems which are not connected to the Internet. 34 00:03:17,840 --> 00:03:25,710 The final point in this module We'll talk about some specific instances of cyberwar. 35 00:03:25,740 --> 00:03:28,110 First there is Estonia in 2007 36 00:03:30,760 --> 00:03:35,920 the attacks began around the time when a monument commemorating Soviet soldiers the Bronze Soldier of 37 00:03:35,920 --> 00:03:37,950 Tallin was removed from the city center 38 00:03:41,150 --> 00:03:45,260 first speculation's pointed to the Russian Federation as being behind this attack. 39 00:03:50,310 --> 00:03:55,860 The DOS attack which lasted for three weeks targeted banks and administration infrastructure 40 00:03:58,680 --> 00:04:07,560 embassies were blocked for three weeks the country's information flow services were paralyzed. 41 00:04:07,730 --> 00:04:11,170 The Kremlin refused to assume responsibility for the sabotage. 42 00:04:12,110 --> 00:04:16,500 But at the same time admitted that it would be able to run a large scale attack of this kind. 43 00:04:19,540 --> 00:04:23,340 A year later as some of you may remember Russian forces invaded Georgia 44 00:04:26,830 --> 00:04:33,990 standard military operations were concurrent with cyber attacks that targeted government servers torrent 45 00:04:33,990 --> 00:04:43,060 networks were utilized all network traffic was redirected to governmental Web sites this resulted in 46 00:04:43,060 --> 00:04:50,070 the complete denial of service which means the government Web sites and Georgeann press agencies websites 47 00:04:50,130 --> 00:04:51,380 were all blocked. 48 00:04:55,620 --> 00:05:01,880 Another instance of cyber warfare occurred in 2010 when Google detected that some of their accounts 49 00:05:01,880 --> 00:05:04,280 set up on Google servers were being monitored 50 00:05:07,880 --> 00:05:12,550 e-mail accounts that belong to Chinese dissidents were monitored by sniffer programs and stolen klank 51 00:05:12,560 --> 00:05:13,470 computers. 52 00:05:16,460 --> 00:05:21,380 This was revealed also because a lot of simultaneous connections to one account were detected from many 53 00:05:21,380 --> 00:05:22,810 locations in China. 54 00:05:25,290 --> 00:05:30,170 It turned out that incoming and outgoing information on the accounts had been spied on for a long time. 55 00:05:32,260 --> 00:05:40,100 Accounts of U.S. and EU based Chinese human rights activists were also targeted in the same way during 56 00:05:40,100 --> 00:05:41,090 its investigation. 57 00:05:41,090 --> 00:05:45,680 Google also found traces of attacks that hit some high tech American companies. 58 00:05:48,600 --> 00:05:53,100 These attacks aimed to steal intellectual property and technologies that were being developed by the 59 00:05:53,100 --> 00:05:57,420 companies. 60 00:05:57,530 --> 00:06:02,090 The last case I'd like you to know about is the Stuxnet worm. 61 00:06:02,160 --> 00:06:10,540 We're moving on to the latest history now the worm hit Iran in June of 2010. 62 00:06:10,570 --> 00:06:15,510 It was a highly specific were written for PC devices that hit itself by using a rootkit. 63 00:06:26,370 --> 00:06:32,250 The technology used to develop sticks and it had to be highly sophisticated as the motivation behind 64 00:06:32,250 --> 00:06:35,160 the attack was to impede the Iranian nuclear program. 65 00:06:38,490 --> 00:06:43,120 The virus might have been spread into uranium enrichment plants through a U.S. flash drive. 66 00:06:45,350 --> 00:06:49,860 The infected drives would have needed to be connected to a computer that controlled centrifuges used 67 00:06:49,860 --> 00:06:51,540 for cooling nuclear fuel. 68 00:06:53,370 --> 00:06:57,060 The Iranian stuff broke basic security rules. 69 00:06:57,200 --> 00:07:00,940 The virus exploited vulnerabilities that were unknown at the point of attack. 70 00:07:03,070 --> 00:07:09,240 The U.S. and Israel have been obviously speculated to be involved in the attacks. 71 00:07:09,340 --> 00:07:14,140 The virus caused centrifuges to malfunction by slowing them down and making them work faster after a 72 00:07:14,140 --> 00:07:15,310 few weeks. 73 00:07:17,360 --> 00:07:23,000 This behavior should have been immediately detected at the uranium enrichment plant and immediate steps 74 00:07:23,000 --> 00:07:24,230 should have been taken. 75 00:07:26,920 --> 00:07:31,530 The Iranians had replaced about 1000 centrifuges before they understood that they were under attack. 76 00:07:34,060 --> 00:07:36,470 The nuclear program was not stopped however. 77 00:07:39,340 --> 00:07:44,090 Two Iranian scientists were later killed in bomb explosions which can also be linked to the attack. 78 00:07:48,240 --> 00:07:52,470 Summing up it has to be highlighted that cyber criminals don't seek publicity. 79 00:07:55,570 --> 00:08:02,030 They don't want to be media heroes dangerous rationale behind their attacks as motivated by greed or 80 00:08:02,030 --> 00:08:03,330 national interest. 81 00:08:05,100 --> 00:08:12,530 This is an indirect reason which explains why we don't hear much nowadays on cyber attacks. 82 00:08:12,630 --> 00:08:16,600 They aren't launched to bring their creators fame. 83 00:08:16,680 --> 00:08:21,780 They're intended to be stealthy and bring money. 84 00:08:21,920 --> 00:08:22,360 Thank you.