Documente Academic
Documente Profesional
Documente Cultură
Cn : .pril 4>>=, The +entagon announced they spent more than P2>> million in the last si( months
responding to and repairing damage from cyber attacks and other computer network problems.
19:3
Cn 2 .pril 4>>=, ;.$. lawmakers pushed for the appointment of a White Bouse cyber security ?c0ar?
to dramatically escalate ;.$. defenses against cyber attacks, crafting proposals that would empower
the go'ernment to set and enforce security standards for pri'ate industry for the first time.
19<3
Cn = February 4>>=, the White Bouse announced that it will conduct a re'iew of the nationDs cyber
security to ensure that the Federal go'ernment of the ;nited $tates cyber security initiati'es are
appropriately integrated, resourced and coordinated with the ;nited $tates Congress and the pri'ate
sector.
19=3
!n the wake of the 4>>: cyberwar waged against &stonia, #.TC established the Cooperati'e Cyber
*efence Centre of &(cellence (CC* Co& in Tallinn, &stonia, in order to enhance the organi0ationDs
cyber defence capability. The center was formally established on 26 "ay 4>><, and it recei'ed full
accreditation by #.TC and attained the status of !nternational "ilitary Crgani0ation on 4< Cctober
4>><.
1:>3
$ince &stonia has led international efforts to fight cybercrime, the ;nited $tates Federal
Fureau of !n'estigationsays it will permanently base a computer crime e(pert in &stonia in 4>>= to
help fight international threats against computer systems.
1:23
Cne of the hardest issues in cyber counterintelligence is the problem of ?.ttribution?. ;nlike con'entional
warfare, figuring out who is behind an attack can be 'ery difficult.
1:43
Bowe'er *efense $ecretary Ieon
+anetta has claimed that the ;nited $tates has the capability to trace attacks back to their sources and
hold the attackers ?accountable?.
1:53
Contro'ersy o'er terms
There is debate on whether the term ?cyberwarfare? is accurate. !n Cctober 4>22, for instance,
the 8o&r%al of -trategic -t&dies, a leading )ournal in that field, published an article by Thomas ,id, ?Cyber
War Will #ot Take +lace.? .n act of cyber war would ha'e to be potentially lethal, instrumental, and
political. Then not one single cyber offense on record constitutes an act of war on its own. !nstead, all
politically moti'ated cyber attacks, ,id argued, are merely sophisticated 'ersions of three acti'ities that
are as old as warfare itself: sabotage, espionage, and sub'ersion.
1:63
Boward $chmidt, an .merican cybersecurity e(pert, argued in "arch 4>2> that ?there is no cyberwar... !
think that is a terrible metaphor and ! think that is a terrible concept. There are no winners in that
en'ironment.? Cther e(perts, howe'er, belie'e that this type of acti'ity already constitutes a war.
1273
The
warfare analogy is often seen intended to moti'ate a militaristic response when that is not necessarily
appropriate. ,on *eibert, of CanadaDs Citi0en Iab, has warned of a ?militari0ation of cyberspace.?
1:73
The &uropean cybersecurity e(pert $andro 8aycken argued for a middle position. Be considers cyberwar
from a legal perspecti'e an unlikely scenario, due to the reasons lined out by ,id (and, before him,
$ommer,
1:93
but the situation looks different from a strategic point of 'iew. $tates ha'e to consider
military/led cyber operations an attracti'e acti'ity, within and without war, as they offer a large 'ariety of
cheap and risk/free options to weaken other countries and strengthen their own positions. Considered
from a long/term, geostrategic perspecti'e, cyber offensi'e operations can cripple whole economies,
change political 'iews, agitate conflicts within or among states, reduce their military efficiency and
e@uali0e the capacities of high/tech nations to that of low/tech nations, and use access to their critical
infrastructures to blackmail them.
1::3
!ncidents
10
Cn 42 #o'ember 4>22, it was widely reported in the ;.$. media that a hacker had destroyed a water
pump at the Curran/8ardner Township +ublic Water *istrict in !llinois.
1:<3
Bowe'er, it later turned out that
this information was not only false, but had been inappropriately leaked from the !llinois $tatewide
Terrorism and !ntelligence Center.
1:=3
Cn 9 Cctober 4>22, it was announced that Creech .FFDs drone and +redator fleetDs command and
control data stream has been keylogged, resisting all attempts to re'erse the e(ploit, for the past two
weeks.
1<>3
The .ir Force issued a statement that the 'irus had ?posed no threat to our operational
mission?.
1<23
!n Auly 4>22, the $outh -orean company $- Communications was hacked, resulting in the theft of the
personal details (including names, phone numbers, home and email addresses and resident
registration numbers of up to 57 million people. . tro)aned software update was used to gain access
to the $- Communications network. Iinks e(ist between this hack and other malicious acti'ity and it
is belie'ed to be part of a broader, concerted hacking effort.
1<43
Cperation $hady ,.T is an ongoing series of cyber attacks starting mid/4>>9, reported by !nternet
security company "c.fee in .ugust 4>22. The attacks ha'e hit at least :4 organi0ations including
go'ernments and defense contractors.
1<53
Cn 6 *ecember 4>2>, a group calling itself the +akistan Cyber .rmy hacked the website of !ndiaDs
top in'estigating agency, the Central Fureau of !n'estigation (CF!. The#ational !nformatics
Center (#!C has begun an in@uiry.
1<63
Cn 49 #o'ember 4>2>, a group calling itself the !ndian Cyber .rmy hacked the websites belonging to
the +akistan .rmy and the others belong to different ministries, including the "inistry of Foreign
.ffairs, "inistry of &ducation, "inistry of Finance, +akistan Computer Fureau, Council of !slamic
!deology, etc. The attack was done as a re'enge for the"umbai terrorist attacks.
1<73
!n $eptember 4>2>, !ran was attacked by the $tu(net worm, thought to specifically target its #atan0
nuclear enrichment facility. The worm is said to be the most ad'anced piece of malware e'er
disco'ered and significantly increases the profile of cyberwarfare.
1<:31<<3
!n Auly 4>>=, there were a series of coordinated denial of ser'ice attacks against ma)or go'ernment,
news media, and financial websites in $outh -orea and the ;nited $tates.
1<=3
While many thought the
attack was directed by #orth -orea, one researcher traced the attacks to the ;nited -ingdom.
1=>3
,ussian, $outh Cssetian, 8eorgian and .0erbai)ani sites were attacked by hackers during the 4>><
$outh Cssetia War.
1=23
!n 4>>: the website of the -yrgy0 Central &lection Commission was defaced during its election. The
message left on the website read ?This site has been hacked by *ream of &stonian organi0ation?.
*uring the election campaigns and riots preceding the election, there were cases of *enial/of/ser'ice
attacks against the -yrgy0 !$+s.
1=43
11
!n $eptember 4>>:, !srael carried out an airstrike on $yria dubbed Cperation Crchard. ;.$. industry
and military sources speculated that the !sraelis may ha'e used cyberwarfare to allow their planes to
pass undetected by radar into $yria.
1=531=63
!n .pril 4>>:, &stonia came under cyber attack in the wake of relocation of the Fron0e $oldier of
Tallinn.
1=73
The largest part of the attacks were coming from ,ussia and from official ser'ers of the
authorities of ,ussia.
1=93
!n the attack, ministries, banks, and media were targeted.
1=:31=<3
!n the 4>>9 war against Be0bollah, !srael alleges that cyber/warfare was part of the conflict, where
the !srael *efense Forces (!*F intelligence estimates se'eral countries in the "iddle &ast used
,ussian hackers and scientists to operate on their behalf. .s a result, !srael attached growing
importance to cyber/tactics, and became, along with the ;.$., France and a couple of other nations,
in'ol'ed in cyber/war planning. "any international high/tech companies are now locating research
and de'elopment operations in !srael, where local hires are often 'eterans of the !*FDs elite computer
units.
1==3
,ichard .. Clarke adds that ?our !sraeli friends ha'e learned a thing or two from the programs
we ha'e been working on for more than two decades.?
1723:<
&fforts at prohibition
The $hanghai Cooperation Crganisation (members include China and ,ussia defines cyberwar to
include dissemination of information ?harmful to the spiritual, moral and cultural spheres of other states?.
!n $eptember 4>22, these countries proposed to the ;# $ecretary 8eneral a document called
?!nternational code of conduct for information security?.
12>>3
The approach was not endorsed by western
countries as it entailed too many hints on political censorship of the internet.
!n contrast, the ;nited $tatesD approach focuses on physical and economic damage and in)ury, putting
political concerns under freedom of speech. This difference of opinion has led to reluctance in the West to
pursue global cyber arms control agreements.
12>23
Bowe'er, .merican 8eneral -eith F. .le(ander did
endorse talks with ,ussia o'er a proposal to limit military attacks in cyberspace.
12>43
!n Aune 4>25, Farack
Cbama and %ladimir +utin agreed to install a secure Cyberwar59otli%e pro'iding ?a direct secure 'oice
communications line between the ;$ cybersecurity coordinator and the ,ussian deputy secretary of the
security council, should there be a need to directly manage a crisis situation arising from an !CT security
incident.? (White Bouse @uote
12>53
. ;krainian professor of !nternational Iaw, .le(ander "ere0hko, has de'eloped a pro)ect called the
!nternational Con'ention on +rohibition of Cyberwar in !nternet. .ccording to this pro)ect, cyberwar is
defined as the use of !nternet and related technological means by one state against political, economic,
technological and information so'ereignty and independence of any other state. +rofessor "ere0hkoDs
pro)ect suggests that the !nternet ought to remain free from warfare tactics and be treated as an
international landmark. Be states that the !nternet (cyberspace is a ?common heritage of mankind.?
12>63
Backti'ism is a form of cyber warfare that is strictly politically moti'ated. &(amples include Web site
defacements, ;,I redirection, denial/of/ser'ice attacks, information theft and dumping, web site
parodies, typos@uatting, and 'irtual sabotage. *enning e(plains in her book The ethics of cyber conflict.
The Bandbook of !nformation and Computer &thics(4>><
12>73
how hackti'ism has spurred the desire for
proper rights and laws in cyberspace.
$ee also
Computer security portal
.ir Force Cyber Command (+ro'isional
Chinese intelligence operations in the ;nited $tates
Computer insecurity
12
Cyber/collection
Cyber $hockWa'e
Cyber spying
Cyberterrorism
Cyberwarfare in ,ussia
*enial/of/ser'ice attack
&lectronic warfare
&spionage
Backer (computer security
!ndustrial espionage
!nformation warfare
!T risk
iWar
Iist of cyber attack threat trends
+enetration test
+roacti'e Cyber *efence
$ignals intelligence
$tu(net
*u@u
Flame
;.$. Cyber Command
.ir Force Cyber Command
.rmy Cyber Command
Fleet Cyber Command
"arine Corps Forces Cyberspace Command
Further reading
.ndress, Aason. Winterfeld, $te'e. (4>22. Cyber Warfare+ (ech%i:&es, (actics a%d (ools for -ec&rity
.ractitio%ers. $yngress. !$F# 2/7=:6=/95:/7
13
Frenner, $. (4>>=. Cyber (hreats+ (he 'mergi%g Fa< ;i%es of the $atio% -tate. C(ford ;ni'ersity
+ress. !$F# >/2=/75<7>2/4
Carr, Aeffrey. (4>2>. 3%side Cyber Warfare+ !a//i%g the Cyber 2%derworld. CD,eilly. !$F# =:</>/
7=9/<>427/<
Cordesman, .nthony B., Cordesman, Austin 8. Cyber5threats, 3%formatio% Warfare, a%d Critical
3%frastr&ct&re .rotectio%, 8reenwood +ubl. (4>>4
8aycken, $andro. (4>24. Cyberwar < ,as Wettr=ste% hat l>%gst bego%%e%.
8oldmann/,andomhouse. !$F# =:</566427:2>7
8eers, -enneth. (4>22. -trategic Cyber -ec&rity. #.TC Cyber Centre. -trategic Cyber
-ec&rity, !$F# =:</==6=/=>6>/:/7 29= pages
Aanc0ewski, IechK Colarik, .ndrew ". Cyber Warfare and Cyber Terrorism !8! 8lobal (4>><
,id, Thomas (4>22 ?Cyber War Will #ot Take +lace,? 8o&r%al of -trategic
-t&dies, doi:2>.2><>/>26>45=>.4>22.9><=5=
%entre, *. (4>>:. ;a g&erre de l0i%formatio%. Bermes/Ia'oisier. 5>> pages
%entre, *. (4>>=. 3%formatio% Warfare. Wiley H !$T&. !$F# =:</2/<6<42/>=6/5
%entre, *. (&dit. (4>2>. Cyberg&erre et g&erre de l0i%formatio%. -trat?gies, r@gles, e%Ae&B. Bermes/
Ia'oisier. !$F# =:</4/:694/5>>6/>
%entre, *. (4>22. Cyberes/ace et acte&rs d& cyberco%flit. Bermes/Ia'oisier. 4<< pages
%entre, *. (&dit. (4>22. Cyberwar a%d 3%formatio% Warfare. Wiley. 69> pages
%entre, *. (4>22. Cyberatta:&e et Cyberd?fe%se. Bermes/Ia'oisier. 559 pages
%entre, *. (&dit. (4>24. Cyber Co%flict. Com/eti%g $atio%al .ers/ectives. Wiley/!$T&. 55> pages
Woltag, Aohann/Christoph: DCyber WarfareD in 1=diger Wolfr&m ('d.) !aB .la%c* '%cyclo/edia of
.&blic 3%ter%atio%al ;aw ("Bford 2%iversity .ress 2012).
,eferences
Q Aump up to:
a
b
*C* H Cyberspace. *tic.mil. ,etrie'ed < #o'ember 4>22.
2.
.ump up / Cyberspace and the changing nature of warfare. $trategists must be aware that part
of e'ery political and military conflict will take place on the internet, says -enneth 8eers.
4.
.ump up / ?Cyberattacks, Terrorism Top ;.$. $ecurity Threat ,eport.?
5.
Q Aump up to:
a
b
?Clarke: "ore defense needed in cyberspace? 9ometow%C%%a/olis.com, 46
$eptember 4>2>
6.
.ump up / ?"alware Bits Computeri0ed !ndustrial &@uipment? $ew )or* (imes, 46 $eptember
4>2>
7.
.ump up / $hiels, "aggie. (= .pril 4>>= FFC: $pies Dinfiltrate ;$ power gridD. FFC #ews.
,etrie'ed < #o'ember 4>22.
9.
.ump up / %ideo. C## (< .pril 4>>=. ,etrie'ed < #o'ember 4>22.
14
:.
.ump up / ,euters: ;$ concerned power grid 'ulnerable to cyber/attack. !n.reuters.com (= .pril
4>>=. ,etrie'ed < #o'ember 4>22.
<.
.ump up / 8orman, $iobhan. (< .pril 4>>= &lectricity 8rid in ;.$. +enetrated Fy $pies.
Cnline.ws).com. ,etrie'ed < #o'ember 4>22.
=.
.ump up / #&,C +ublic #otice. (+*F . ,etrie'ed < #o'ember 4>22.
2>.
.ump up / Rinhua: China denies intruding into the ;.$. electrical grid. = .pril 4>>=
22.
.ump up / DChina threatD theory re)ected. China *aily (= .pril 4>>=. ,etrie'ed < #o'ember 4>22.
24.
.ump up / .FC #ews: %ideo. .bcnews.go.com (4> .pril 4>>=. ,etrie'ed < #o'ember 4>22.
25.
.ump up / *isconnect electrical grid from !nternet, former terror c0ar Clarke warns. The ,aw
$tory (< .pril 4>>=. ,etrie'ed < #o'ember 4>22.
26.
Q Aump up to:
a
b
?White Bouse Cyber C0ar: JThere !s #o CyberwarE? Wired maga0ine, 6 "arch
4>2>
27.
Q Aump up to:
a
b
?Cyber/War #ominee $ees 8aps in Iaw?, $ew )or* (imes, 26 .pril 4>2>
29.
.ump up / Cyber $hockWa'e $hows ;.$. ;nprepared For Cyber Threats. Fipartisanpolicy.org.
,etrie'ed < #o'ember 4>22.
2:.
.ump up / *rogin, Fob (2: February 4>2>. ?!n a doomsday cyber attack scenario, answers are
unsettling?. (he ;os C%geles (imes.
2<.
.ump up / .li, $armad (29 February 4>2>. ?Washington 8roup Tests $ecurity in JCyber
$hockWa'eD?. (he Wall -treet 8o&r%al.
2=.
.ump up / Cyber $hockWa'e C##/F+C wargame: was it a failureS H Computerworld Flogs.
Flogs.computerworld.com (2: February 4>2>. ,etrie'ed < #o'ember 4>22.
4>.
.ump up / $te'e ,agan ,eport: The Cyber $hockWa'e e'ent and its aftermath. The Tech
Berald. 29 February 4>2>
42.
.ump up / .ndy Iee. D!nternational Cyber Warfare: Iimitations and +ossibilities.D Ae)u +eace
!nstitute. 2 "ay 4>24. http://)pi.or.kr/contents/SmidT-,2924
44.
Q Aump up to:
a
b
?Iatest 'iruses could mean Jend of world as we know it,E says man who
disco'ered Flame?, (he (imes of 3srael, 9 Aune 4>24
45.
.ump up / ?Cyber espionage bug attacking "iddle &ast, but !srael untouched U so far?, (he
(imes of 3srael, 6 Aune 4>25
46.
.ump up / ?8oogle .ttack !s Tip Cf !ceberg?, "c.fee $ecurity !nsights, 25 Aanuary 4>2>
47.
.ump up / 8o'ernment/sponsored cyberattacks on the rise, "c.fee says. #etworkworld.com
(4= #o'ember 4>>:. ,etrie'ed < #o'ember 4>22.
49.
.ump up / ?;$ embassy cables: China uses access to "icrosoft source code to help plot cyber
warfare, ;$ fears?. (he #&ardia% (Iondon. 6 *ecember 4>2>. ,etrie'ed 52 *ecember 4>2>.
4:.
Q Aump up to:
a
b
C<&re !a%dala+ (he 4&lleti% of the Ce%tre for 'ast5West C<&ral a%d
'co%omic -t&dies, Dol. E, 3ss. 1 F"ctober 200EG, Crt. 2. //.6H (4>><.
http://epublications.bond.edu.au/cgi/'iewcontent.cgiSarticleT222>Vconte(tTcm (4>><.W
urlT missing title (help. ,etrie'ed Aanuary 4>25.
15
4<.
.ump up / ?China to make mastering cyber warfare . priority (4>22.?. $atio%al .&blic 1adio.
(Iondon. ,etrie'ed Aanuary 4>25.
4=.
Q Aump up to:
a
b
C<&re !a%dala+ (he 4&lleti% of the Ce%tre for 'ast5West C<&ral a%d
'co%omic -t&dies, Dol. E, 3ss. 1 F"ctober 200EG, Crt. 2. //.42 (4>><.
http://epublications.bond.edu.au/cgi/'iewcontent.cgiSarticleT222>Vconte(tTcm (4>><.W
urlT missing title (help. ,etrie'ed Aanuary 4>25.
5>.
.ump up / C<&re !a%dala+ (he 4&lleti% of the Ce%tre for 'ast5West C<&ral a%d 'co%omic
-t&dies, Dol. E, 3ss. 1 F"ctober 200EG, Crt. 2. //.46 (4>><.
http://epublications.bond.edu.au/cgi/'iewcontent.cgiSarticleT222>Vconte(tTcm (4>><.W
urlT missing title (help. ,etrie'ed Aanuary 4>25.
52.
.ump up / ?W.$B!#8TC#, F&!A!#8 !# CGF&,/W., $T.#*CFF (Feb. 24,4>25.?. )ahoo
$ews. ,etrie'ed Aanuary 4>25.
54.
.ump up / ?8ermanyDs 9>/person Computer #etwork Cperation (C#C unit has been practicing
for cyber war for years.?
55.
.ump up / 9ac*ers wa%ted to ma% fro%t li%e i% cyber war, 123, The Iocal, 46 "ar 4>25
56.
.ump up / #erma%y to i%vest 100 millio% e&ros o% i%ter%et s&rveilla%ce+ re/ort, 143, -a0inform,
2< Aune 4>25
57.
Q Aump up to:
a
b
c
?Feware of the bugs: Can cyber attacks on !ndiaDs critical infrastructure be
thwartedS?. 4&si%ess(oday. ,etrie'ed Aanuary 4>25.
59.
.ump up / ?7 lakh cyber warriors to bolster !ndiaDs e/defence?. (imes of 3%dia (!ndia. 29 Cctober
4>24. ,etrie'ed 2< Cctober 4>24.
5:.
Q Aump up to:
a
b
?$tu(net and the Future of Cyber War?. 8ames .. Farwell a%d 1afal 1ohoIi%s*i.
,etrie'ed Aanuary 4>25.
5<.
.ump up / $anger, *a'id &. (2 Aune 4>24. ?Cbama Crder $ped ;p Wa'e of Cyberattacks
.gainst !ran?. The #ew Gork Times. ,etrie'ed 2 Aune 4>24.
5=.
Q Aump up to:
a
b
c
?;$ 8eneral: !ranDs Cyber War "achine D. Force To Fe ,eckoned
WithD?.4&si%ess 3%sider. ,etrie'ed Aanuary 4>25.
6>.
.ump up / -ile%t War Auly 4>25 %anity Fair
62.
.ump up / Iee, $e Goung. ?$outh -orea raises alert after hackers attack broadcasters, banks?.
Thomson ,euters. ,etrie'ed 9 .pril 4>25.
64.
.ump up / -im, &un/)ung. ?$. -orean military to prepare with ;.$. for cyber warfare scenarios?.
Gonhap #ews .gency. ,etrie'ed 9 .pril 4>25.
65.
.ump up / http://www.csmonitor.com/;$./4>24/>6>5/.l/Maeda/rocked/by/apparent/
cyberattack./Fut/who/did/it/(page/4
66.
.ump up / ?.ttack the City: why the banks are Dwar gamingD?.
67.
.ump up / ?Wall $treet banks learn how to sur'i'e in staged cyber attack?. 1e&ters. 42 Cctober
4>25.
69.
.ump up / .merican Forces +ress $er'ice: Iynn &(plains ;.$. Cybersecurity $trategy.
*efense.go'. ,etrie'ed < #o'ember 4>22.
16
6:.
.ump up / +entagon to Consider Cyberattacks .cts of War. #ew Gork Times. 52 "ay 4>>9
6<.
.ump up / *ilanian, -en. ?Cyber/attacks a bigger threat than .l Maeda, officials say?, ;os
C%geles (imes, 24 "arch 4>25
6=.
.ump up / ?!ntelligence Chairman: ;.$. Fighting Cyber War J&'ery *ayE? .8 !edia, Auly 4=, 4>25
7>.
Q Aump up to:
a
b
Clarke, ,ichard .. Cyber War, BarperCollins (4>2>
72.
Q Aump up to:
a
b
c
?Cyberwar: War in the Fifth *omain? 'co%omist, 2 Auly 4>2>
74.
.ump up / Iynn, William A. !!!. ?*efending a #ew *omain: The +entagonDs
Cyberstrategy?,Foreig% Cffairs, $ept/Cct. 4>2>, pp. =:H2><
75.
Q Aump up to:
a
b
The Iipman ,eport, 27 Cctober 4>2>
76.
.ump up / Clarke, ,ichard. ?ChinaDs Cyberassault on .merica?, Wall -treet 8o&r%al, 27 Aune
4>22
77.
.ump up / ?Cyberwarrior $hortage Threatens ;.$. $ecurity? $.1, 2= Auly 4>2>
79.
.ump up / ?;.$. military cyberwar: WhatDs off/limitsS? C$'(, 4= Auly 4>2>
7:.
Q Aump up to:
a
b
,ussia Today, 49 Aanuary 4>24, ?;$ Iaunched Cyber .ttacks on Cther
#ations,?https://rt.com/usa/news/us/attacks/cyber/war/927/
7<.
.ump up / $anger, *a'id &. ?Cbama Crder $ped ;p Wa'e of Cyberattacks .gainst !ran.? $ew
)or* (imes, 2 Aune 4>24.
7=.
.ump up / .##;.I ,&+C,T TC CC#8,&$$ "ilitary and $ecurity *e'elopments !n'ol'ing the
+eopleEs ,epublic of China 4>2>. (+*F . ,etrie'ed < #o'ember 4>22.
9>.
.ump up / .+: +entagon takes aim at China cyber threat
1dead li%*3
92.
Q Aump up to:
a
b
?The Aoint Cperating &n'ironment?, ,eport released, 2< February 4>2>, pp. 56H
59
94.
.ump up / . Fill. To amend the Bomeland $ecurity .ct of 4>>4 and other laws to enhance the
security and resiliency of the cyber and communications infrastructure of the ;nited $tates..
$enate.go'. 222th Congress 4* $ession
95.
.ump up / $enators $ay Cybersecurity Fill Bas #o D-ill $witchD, informationweek.com, 46 Aune
4>2>. ,etrie'ed 47 Aune 4>2>.
96.
.ump up / $atter, ,aphael. ?;$ general: We hacked the enemy in .fghanistan.? C., 46 .ugust
4>24.
97.
.ump up / *C* H Cyber Counterintelligence. *tic.mil. ,etrie'ed < #o'ember 4>22.
99.
.ump up / +entagon Fill To Fi( Cyber .ttacks: ,>". CF$ #ews. ,etrie'ed < #o'ember 4>22.
9:.
.ump up / $enate Iegislation Would Federali0e Cybersecurity. Washingtonpost.com. ,etrie'ed
< #o'ember 4>22.
9<.
.ump up / White Bouse &yes Cyber $ecurity +lan. CF$ #ews (2> February 4>>=. ,etrie'ed <
#o'ember 4>22.
9=.
.ump up / CC* CC& H Cyber *efence. Ccdcoe.org. ,etrie'ed < #o'ember 4>22.
17
:>.
.ump up / +ress, .ssociated. (22 "ay 4>>= FF! to station cybercrime e(pert in &stonia.
FostonBerald.com. ,etrie'ed < #o'ember 4>22.
:2.
.ump up / ,eed, Aohn. ?!s the Dholy grailD of cyber security within reachS? Foreig% .olicy
!agaIi%e, 9 $eptember 4>24.
:4.
.ump up / Carroll, Chris. ?;$ can trace cyberattacks, mount pre/empti'e strikes, +anetta
says.? -tars a%d -tri/es, 22 Cctober 4>24.
:5.
.ump up / ,id, Thomas (Cctober 4>22. ?Cyber War Will #ot Take +lace?. 8o&r%al of -trategic
-t&dies. doi:2>.2><>/>26>45=>.4>22.9><=5=. ,etrie'ed 42 Cctober 4>22.
:6.
.ump up / *eibert, ,on (4>22. ?Tracking the emerging arms race in cyberspace?. 4&lleti% of the
Ctomic -cie%tists 01 (2. doi:2>.22::/>>=956>42>5=5:>5.
:7.
.ump up / $ommer, +eter (Aanuary 4>22. ?,educing $ystemic Cybersecurity ,isk?. "'C,
!<i5,is/li%ary 3ss&es. ,etrie'ed 42 "ay 4>24.
:9.
.ump up / 8aycken, $andro (4>2>. Cyberwar < ,as 3%ter%et als 7riegsscha&/latI.
::.
.ump up / "athew A. $chwart0 (42 #o'ember 4>22. ?Backer .pparently Triggers !llinois Water
+ump Furnout?. !nformation Week.
:<.
.ump up / -im Xetter (5> #o'ember 4>22. ?&(clusi'e: Comedy of &rrors Ied to False JWater/
+ump BackE ,eport?. Wired.
:=.
.ump up / ;.$. drone and predator fleet is being keylogged accessdateT4>22/2>/>9
<>.
.ump up / Bennigan, W.A. ?.ir Force says drone computer 'irus poses Dno threatD.? ;C (imes, 25
Cctober 4>22.
<2.
.ump up / ?$- Back by an .d'anced +ersistent Threat?. Command Fi'e +ty Itd. ,etrie'ed 46
$eptember 4>22.
<4.
.ump up / Aim Finkle (5 .ugust 4>22. ?$tate actor seen in ?enormous? range of cyber attacks?.
,euters. ,etrie'ed 5 .ugust 4>22.
<5.
.ump up / Backed by D+akistan cyber armyD, CF! website still not restored. #dt'.com (6
*ecember 4>2>. ,etrie'ed < #o'ember 4>22.
<6.
.ump up / 59 go'ernment sites hacked by J!ndian Cyber .rmyE H The &(press Tribune.
Tribune.com.pk. ,etrie'ed < #o'ember 4>22.
<7.
.ump up / Fritain faces serious cyber threat, spy agency head warns. The 8lobe and "ail (25
Cctober 4>2>. ,etrie'ed < #o'ember 4>22.
<9.
.ump up / .F+: $tu(net worm brings cyber warfare out of 'irtual world. 8oogle.com (2 Cctober
4>2>. ,etrie'ed < #o'ember 4>22.
<:.
.ump up / ,alph Iangner: Cracking $tu(net, a 42st/century cyber weapon W %ideo on. Ted.com.
,etrie'ed < #o'ember 4>22.
<<.
.ump up / $udworth, Aohn. (= Auly 4>>= #ew cyberattacks hit $outh -orea. FFC #ews.
,etrie'ed < #o'ember 4>22.
<=.
.ump up / Williams, "artin. ;-, #ot #orth -orea, $ource of **C$ .ttacks, ,esearcher $ays.
+C World.
18
=>.
.ump up / *anche', *ancho (22 .ugust 4>><. ?Coordinated ,ussia 's 8eorgia cyberattack?.
X*net. ,etrie'ed 47 #o'ember 4>><.
=2.
.ump up / Website of -yrgy0 Central &lection Commission hacked by &stonian hackers,
,egnum, 26 *ecember 4>>:
=4.
.ump up / Fulghum, *a'id .. ?Why $yriaDs .ir *efenses Failed to *etect !sraelis?, Cviatio%
Wee* J -/ace (ech%ology, 4>>:/2>/>5. ,etrie'ed 5 Cctober 4>>:.
=5.
.ump up / Fulghum, *a'id .. ?!srael used electronic attack in air strike against $yrian mystery
target?, Cviatio% Wee* J -/ace (ech%ology, 4>>:/2>/><. ,etrie'ed < Cctober 4>>:.
=6.
.ump up / ?War in the fifth domain. .re the mouse and keyboard the new weapons of
conflictS?.(he 'co%omist. 2 Auly 4>2>. ,etrie'ed 4 Auly 4>2>. ?!mportant thinking about the
tactical and legal concepts of cyber/warfare is taking place in a former $o'iet barracks in &stonia,
now home to #.TCDs ?centre of e(cellence? for cyber/defence. !t was established in response to
what has become known as ?Web War 2?, a concerted denial/of/ser'ice attack on &stonian
go'ernment, media and bank web ser'ers that was precipitated by the decision to mo'e a
$o'iet/era war memorial in central Tallinn in 4>>:.?
=7.
.ump up / &stonia accuses ,ussia of Dcyber attackD. Csmonitor.com (2: "ay 4>>:. ,etrie'ed <
#o'ember 4>22.
=9.
.ump up / !an Traynor, D,ussia accused of unleashing cyberwar to disable &stonia?, (he
#&ardia%, 2: "ay 4>>:
=:.
.ump up / Foyd, Clark. (2: Aune 4>2> FFC: Cyber/war a growing threat warn e(perts. FFC
#ews. ,etrie'ed < #o'ember 4>22.
=<.
.ump up / ?!srael .dds Cyber/.ttack to !*F?, !ilitary.com, 2> February 4>2>
==.
.ump up / ,ussian &mbassy to the ;- 153. ,etrie'ed 47 "ay 4>24.
2>>.
.ump up / Tom 8)elten (45 $eptember 4>2>. ?$eeing The !nternet .s .n D!nformation
WeaponD?. $atio%al .&blic 1adio. ,etrie'ed 45 $eptember 4>2>.
2>2.
.ump up / 8orman, $iobhan. (6 Aune 4>2> W$A: ;.$. Facks Talks on Cyber Warfare.
Cnline.ws).com. ,etrie'ed < #o'ember 4>22.
2>4.
.ump up / $ean 8allagher, 2-, 1&ssia to i%stall Kcyber5hotli%eL to /reve%t accide%tal cyberwar,
163, .rstechnica, 2< Aune 4>25
2>5.
.ump up / YZ[\]^_`Zab cd^e[ fghieaj^gkg ld^dmnld^eo H pli_e foqhiZ\ci] H rg^sd^cat g
u\f[dvd^aa a_fgh`ugs\^at Zaqd[sgb^w. +olitik.org.ua. ,etrie'ed < #o'ember 4>22.
2>6.
.ump up / *enning, *. &. (4>><. The ethics of cyber conflict. The Bandbook of !nformation and
Computer &thics. 6>:H64=.
Boo%s
4:> Cyberwarfare related books
Fodmer, -ilger, Carpenter, V Aones (4>24. ,e'erse *eception: Crgani0ed Cyber Threat Counter/
&(ploitation. #ew Gork: "c8raw/Bill Csborne "edia. !$F# >>:2::46==, !$F# =:</>>:2::46=7
2ideos
19
?$abotaging the $ystem? 'ideo, ?9> "inutes?, < #o'ember 4>>=, CF$ #ews, 27 minutes
?Cyber $hockWa'e? (simulation of a cyber attack, 29 February 4>2>, 'ideo from the Fipartisan
+olicy Center, < minutes
,rticles
.FC: Former White Bouse security ad'isor warns of cyber war
Wall $treet Aournal: Fighting Wars in Cyberspace
Will There Fe .n &lectronic +earl Barbor, +C World by !ra Winkler, 2 *ecember 4>>=
Bow to $pot a Corporate $py, Computer World, 9 February 4>>=
;$ China $ecurity and ,e'iew Commission, 4>>= annual report Chapter 4 on ChinaDs acti'ities
impacting ;$ security interests
$enate panel: <> percent of cyberattacks pre'entable, Wired, 2: #o'ember 4>>=
Consumer ,eports Cnline $ecurity 8uide
Fo( #ews: ;pdated Cybersecurity information
Cyberwarfare reference materials
*uncan 8ardham, 49 Aune 4>>=, Backers recruited to fight Dnew cold warD, Telegraph ;-
$tefano "ele, Aun 4>25, Cyber/Weapons: Iegal and $trategic .spects ('ersion 4.>
$tefano "ele, 5> $eptember 4>2>, Cyberwarfare and its damaging effects on citi0ens
Bistory of Cyber Warfare
Cybersecurity: .uthoritati'e ,eports and ,esources, ;$ Congressional ,esearch $er'ice
Categories:
"ilitary technology
Backing (computer security
Cyberwarfare
&spionage
!ntelligence (information gathering
"ilitary intelligence collection
Computer security
Cybercrime
!nformation sensiti'ity
$abotage
$pyware
"ass intelligence/gathering systems
$ecurity engineering
$ocial engineering (computer security
#ational security
20
Computer security procedures
Computing terminology
Cyber Warfare &en3adi ,ncaman (*R) di &asa *ini dan &asa Depan
C+!#! W 45 $eptember 4>25 W 24:4= *ibaca: 145 -omentar: 6 2
Cyber Warfare memiliki arti perang yang dilakukan didunia maya (cyber $pace dengan menggunakan teknologi
canggih dan )aringan nircabel/wifi. sudah banya tulisan yang membahas tentang Cyber Warfare itu sendiri tetapi
dewasa ini pengetahuan tentang ada Cyber Warfare baru sekedar dianggap sebagai pengetahuan yang baru serta
tidak dianggapi terlalu serius oleh para pengguna )aringan internet (user. dalam tulisan ini penulis akan mencoba
memaparkan bahaya yang aka di hadang oleh negara berkembang termasuk dalam ini !ndonesia dalam menghadapi
Cyber Warfare.
$ebelum membahas Cyber Warfare lebih )auh saya mencoba mebahas terlebih dahulu tentang munculnya internet.
!nternet muncul dan berkembang pada tahun 2=9= melalui +royek .+,.#&T (.d'anced ,esearch +ro)ect .gency
#etwork.yang merupakan proyek dari *epartemen +ertahanan .merika $erika. dengan ber)alannya waktu dirasa
perlu ada suatu )aringan yang dapat menghubungkan antar wilayah satu dengan wilayah lainnya, berawal dari
gagasan ini *epartemen +ertahanan .merika mulai membuka )aringan !nternet untuk dapat dinikmati oleh
publik.*engan dapatnya internet dapat diakses oleh seluruh masyarakat dunia membuat dunia ini seperti tidak ada
sekat yang membatasi wilayah satu dengaan lainnya.
Cyber Warfare sendiri berkembang dari Cyber Crime yang memiliki arti bentuk/bentuk ke)ahatan yang ditimbulkan
karena pemanfaatan teknologi internet. *apat )uga didefinisikan sebagai perbuatan melawan hukum yang dilakukan
dengan menggunakan internet yang berbasis pada kecanggihan teknologi komputer dan telekomunikasi.The
+re'ention of Crime and The Treatment of Cfflenderes di Ba'ana, Cuba pada tahun 2=== dan di Wina, .ustria tahun
4>>>, menyebutkan ada 4 istilah yang dikenal:
Cybercrime dalam arti sempit disebut computer crime, yaitu prilaku ilegal / melanggar yang secara langsung
menyerang sistem keamanan komputer dan data yang diproses oleh komputer.
Cybercrime dalam arti luas disebut computer related crime, yaitu prilaku ilegal/ melanggar yang berkaitan dengan
sistem komputer atau )aringan.
Aenis/Aenis ke)ahata Cyber Crime:
Backing adalah Backing adalah kegiatan menerobos program komputer milik orang/pihak lain. Backer adalah orang
yang gemar ngoprek komputer, memiliki keahlian membuat dan membaca program tertentu, dan terobsesi mengamati
keamanan (security/nya. NBackerO memiliki wa)ah gandaK ada yang budiman ada yang pencoleng. NBackerO budiman
memberi tahu kepada programer yang komputernya diterobos, akan adanya kelemahan/kelemahan pada program
yang dibuat, sehingga bisa NbocorO, agar segera diperbaiki. $edangkan, hacker pencoleng, menerobos program orang
lain untuk merusak dan mencuri datanya.
Cracking adalah hacking untuk tu)uan )ahat. $ebutan untuk NcrackerO adalah NhackerO bertopi hitam (black hat hacker.
Ferbeda dengan NcarderO yang hanya mengintip kartu kredit, NcrackerO mengintip simpanan para nasabah di berbagai
bank atau pusat data sensitif lainnya untuk keuntungan diri sendiri. "eski sama/sama menerobos keamanan komputer
orang lain, NhackerO lebih fokus pada prosesnya. $edangkan NcrackerO lebih fokus untuk menikmati hasilnya.
Cyber $abotage adalah ke)ahatan yang dilakukan dengan membuat gangguan, perusakan atau penghancuran
terhadap suatu data, program komputer atau sistem )aringan komputer yang terhubung dengan internet.
21
Cyber .ttack adalah semua )enis tindakan yang senga)a dilakukan untuk mengganggu kerahasiaan (confidentiality,
integritas (integrity, dan ketersedian (a'ailability informasi. Tindakan ini bisa ditu)ukan untuk mengganggu secara fisik
maupun dari alur logic sistem informasi
Carding adalah berbelan)a menggunakan nomor dan identitas kartu kredit orang lain, yang diperoleh secara ilegal,
biasanya dengan mencuri data di internet. $ebutan pelakunya adalah NcarderO. $ebutan lain untuk ke)ahatan )enis ini
adalah cyberfroud alias penipuan di dunia maya.
$pyware adalah program yang dapat merekam secara rahasia segala akti'itas online usser, seperti merekam cookies
atau registry. *ata yang sudah terekam akan dikirim atau di)ual kepada perusahaan atau perorangan yang akan
mengirim iklan atau menyebarkan 'irus.
*engan kemudahan yang ada saat ini banyak membuat terlena atau diman)akan para user komputer dengan
kemudahan mengakses berbagai informasi dengan menggunakan )aringan internet. tetapi dibalik kemudahan yang
diberikan oleh internet user harus mewaspadai bahaya yang akan menghadang para user terutama departemen
ketahanan, kenapa departemen ketahanan harus waspadaS)awabannya adalah 2. )aringan yang terhubung antara
komputer yang ada di seluruh dunia dengan menggunakan )aringan internet semua data yang di akses atau di unggah
akan terkirim ke ser'er pusat yaitu di .merika. 4. -emudahan mengakses data melalui )aringan rentan dengan
penyadapan atau crackring dari pengguna )aringan internet yang tidak bertanggung)awab. 5 Aaringan internet saat ini
dan masa depan bukan hanya sebagai sarana untuk mengakses informasi dengan cepat melainkan sebagai sen)ata
dalam perang bisa ambil contoh dalam perang israel dengan iran dimana isralem membobol )aringan keamanan iran
untuk meledakan nuklir yang mengakibatka ledakan luar biasa menewaskan : orang. 6 Aaringan internet digunakan
sebagai mata/mata ($py hal ini dapat dilakukan dengan mengambil data/data di beberapa departemen seperti )umlah
personil tentara yang di upload di linggkungan kementerian pertahanan ssebagai bentuk laporang kepada pusat
melalui )aringan internet masih banyak contoh lain. 7 Aaringan internet sebagai propaganda negara lain dalam
merusak citra negara musuh di mata dunia.
-etika point 5,6, dan 7 seperti yang telah di)elaskan diatas dikuasai negara ketiga keamanan dan ketahanan #-,!
terancam karena semua rahasia negara (off the record dikuasai oleh negara ketiga, negara ketiga tersebut dengan
mudah untuk menyusun strategi untuk melumpuhkan #-,! secara dunia maya maupun secara fisik. hal yang paling
berbahaya dengan dikuasainya kemanan #-,! membuat negara ketiga dapat memanfaatkan indonesia dengan
ancaman menghancurkan !ndonesia tanpa ada perlawanan dari !ndonesia karena posisi !ndonesia saat itu lemah.
Tidak ada )aminan negara adikuasa seperti .merika sebagai pusat ser'er internet akan men)aga baik data/data yang
tersimpan dalam tempat penyimpanan yang ada di .merika dan tidak akan memanfaatkan data/data yang tersimpan
rapih dalam komputer ser'er.
+emaparan diatas men)elaskan bahwa #-,! harus serius dalam mempersiapkan putra/putra terbaiknya untuk
mencegah dampak Cyber Warfare dan mempersiapkan diri untuk menghadapai Cyber Warfare ketika indonesia ikut
dalam perang tersebut. ketika indonesia tidak dapat mempersiapkan diri memprotek diri untuk menghadapi Cyber
Warfare berdampak dikuasainya keamanan nasional indonesia baik di bidang +olitik, -ebudayaan, &konomi dan
-eaamana negara.