Inside Cyber Warfare - Jeffrey Carr [186]
Russian Organized Crime and the Kremlin
9. Investigating Attribution
Using Open Source Internet Data
Background
What Is an Autonomous System Network?
Timeline of political events
Analysis
Alternate views
Team Cymru and Its Darknet Report
Using WHOIS
Caveats to Using WHOIS
10. Weaponizing Malware
A New Threat Landscape
StopGeorgia.ru Malware Discussions
SQL injection, blind SQL injection, and using BENCHMARK
Twitter as DDoS Command Post against Iran
Social Engineering
The Social Graph API
Channel Consolidation
An Adversary’s Look at LinkedIn
BIOS-Based Rootkit Attack
Malware for Hire
Anti-Virus Software Cannot Protect You
Targeted Attacks Against Military Brass and Government Executives
Research is the key to offensive capabilities
Delivery of targeted attacks
Command, control, and exfiltration of data
Why client-side 0day vulnerabilities can be so devastating
Protecting against 0day exploits
Defense in Depth
Using technologies such as MOICE and virtualization
Physical separation between data of varying sensitivity
11. The Role of Cyber in Military Doctrine
The Russian Federation
The Foundation for Effective Politics (FEP)
Chronicles of Information Warfare
Analysis
“Wars of the Future Will Be Information Wars”
Who is Alexandr Burutin?
The speech
Analysis
“RF Military Policy in International Information Security”
The paper
Creating a legend for a cyber attack
The Art of Misdirection
China Military Doctrine
Anti-Access Strategies
The 36 Stratagems
US Military Doctrine
12. A Cyber Early Warning Model
The Challenge We Face
Cyber Early Warning Networks
Building an Analytical Framework for Cyber Early Warning
Latent tensions
Cyber reconnaissance
Initiating event
Cyber mobilization
Cyber attack
Cases Studies of Previous Cyber Attacks
Case study: Cyber attacks against Georgia
Case study: GhostNet cyber espionage
Case study: Cyber attacks against Denmark
Lessons Learned
Defense Readiness Condition for Cyberspace
13. Advice for Policymakers from the Field
When It Comes to Cyber Warfare: Shoot the Hostage
The United States Should Use Active Defenses to Defend Its Critical Information Systems
Scenarios and Options to Responding to Cyber Attacks
Scenario 1
Option 1
Option 2
Option 3
Option 4
Scenario 2
Option 1
Option 2
Scenario 3
Option
Scenario 4
Option
In Summary
Whole-of-Nation Cyber Security
14. Conducting Operations in the Cyber-Space-Time Continuum
Anarchist Clusters: Anonymous, LulzSec, and the Anti-Sec Movement
Social Networks: The Geopolitical Strategy of Russian Investment in Social Media
2005: A Turning Point
DST and the Kremlin
The Facebook Revolution
Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec
15. The Russian Federation: Information Warfare Framework
Russia: The Information Security State
Russian Government Policy
New Laws and Amendments
Government Structures
Russian Ministry of Defense
Administrative Changes
Electronic Warfare Troops
The Federal Service for Technical and Export Control (FSTEC)—Military Unit (Vch) 96010
5th Central Research and Testing Institute of the Russian Defense Ministry (5th TSNIII)—Military Unit (Vch) 33872
18th Central Research Institute of the Russian Defense Ministry (18th CRI MOD)—Military Unit (Vch) 11135
27th Central Research Institute of the Russian Defense Ministry (27th CRI MOD)—Military Unit (Vch) 01168
Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO)
Federal Security Service Information Security Center (FSB ISC)—Military Unit (Vch) 64829
Russian