Assessing Actions Along the Spectrum of Cyberspace Operations
Presented by USCYBERCOM/JA This presentation does not necessarily reflect the position of the US Government.
Unclassified Unclassified
1
Assessing Actions Along the Spectrum of Cyberspace Operations - - PowerPoint PPT Presentation
Unclassified Assessing Actions Along the Spectrum of Cyberspace Operations Presented by USCYBERCOM/JA This presentation does not necessarily reflect the position of the US Government. 1 Unclassified Unclassified Spectrum of Cyber
Unclassified Unclassified
1
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption Cyber Attack
Change, delete, manipulate data, (e.g., changing a word in a document); Modify software to cause system glitches, (e.g., causing a reboot or causing a file to close); Disrupting communications, or command and control (e.g. blocking emails, web forums, telephone communication)
Unclassified Unclassified
2
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption Cyber Attack
Unclassified Unclassified
3
damage or injury With that background, we will discuss several real world and exercise examples of cyber operations to determine where they fall on the spectrum of cyber operations
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Unclassified Unclassified
4
Operation Buckshot Yankee Implant
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Unclassified
5
Change Data with No Physical Damage to Gain Access
Unclassified
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Unclassified Unclassified
6
Cyber Shock Wave—Move One
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Unclassified Unclassified t
7
Small scale Denial of Service against Non-Government Adversary
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
8
Delete or Change Data of Non-Govermental Adversary (with no physical damage or injury to persons)
Unclassified Unclassified t
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Unclassified Unclassified
9
Operation Aurora
including web security, defense industry
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
U.S. and South Korea 2009
Dept of Transportation, Treasury, FTC, White House, Secret Service
Unclassified Unclassified
10
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Estonia 2007
Unclassified Unclassified
11
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Estonia 2007
Unclassified Unclassified
12
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Unclassified Unclassified
13
Cyber Shock Wave—Move 2
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Unclassified Unclassified
14
Cyber Storm
Gray area: may be viewed as attack depending
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Stuxnet
uranium enrichment
Unclassified Unclassified
15
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Unclassified Unclassified
16
Deleting or Manipulating Data (causing physical damage and injury)
records causing serious illness and death when patients treated
Very stealthy Less stealthy
Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems
Cyber Attack
to property or injury to persons
Cyber Attack During Conflict
Unclassified Unclassified
17
Very stealthy Less stealthy Access Operations
(e.g., stealthy implant)
Cyber Disruption
function of information systems without physical damage or injury
Cyber Attack
to property or injury to persons
Unclassified Unclassified
18
Estonia
Banking down for most of a month
US/ROK
with minor impact CSW Move One
malware
botnet
Change Data
injury or damage Buckshot Yankee Degrade Service or access to info Delete or change adversary data with no phys. damage or injury Cyber Storm
with no physical damage
Govt & critical systems Cyber Shock Wave
with no physical damage
private systems
Stuxnet
1000 centri- fuges China & Google
Attack in conflict
C2, fuel, planes, ships
logs
code Ping, Map
Probe