Free Essay

International Security

In:

Submitted By decoy574
Words 406
Pages 2
International Security: Cyber Warfare – notes 10/3/12

* Review * Drones * What is Cyber Warfare? * Cyberspace: Interconnected network of information systems * Cyber warfare: using cyber capabilities to disrupt information in computers of another state * Inexpensive, just need to create unique computer code * Types * Denial of Service (DoS) * Goal: shut down network * Method: flood networkd with so many extra requests it overloads * Variant: Distributed (DDoS) attack from many infected bots * “carpet bomb in cyberspace” * Variant: Permanent (PDoS) * Damagers hardware * Malicious Programs * Goal: Disrupt of gain control of target computer * Method: Open a back door for remote access * Types: * Virus: Attached to file, self-replicates * Worm: Self-replicates, travels unaided * Trojan Horse: Apparently harmless program with code inside to gain system control * Logic bomb: * Goal: Coordinate timing of an attack * Method: Watch for specific event or predetermined time to trigger malicious code * Digital Manipulation * Goal: misinform/deceive audience * Method: Digitally alter images/audio * Extent: Real-time video, voice morphing * Cyber Espionage * Definition: Using cyber capabilities to acquire information about another state * Espionage is not warfare * Legal internationally * Illegal domestically * Examples: * Moonlight Maze: Soviet stole information * Titan Rain: Chinese stole aircraft info from Lockheed Martin * Cyber Warfare: Cases * Estonia 2007 * April – June: Russian-based DoS attack on government websites * Normally 1,000 visits/day * Attack 2,000 visits/second * Georgia 2008 * Russia wages cyber attacks evening of Georgian surprise attacks on South Ossettia rebels. Russia invades next day. * Launched cyber attack before invasion to weaken enemy * Stuxnet * U.S. and Israel attack on Iranian nuclear centrifuges * 1) Insert “beacon” to map network * Paints picture of network layout * 2) Develop and test “bug” on old Libyan centrifuges * 3) Insert “bug” via worker’s thumbdrive * 4) Watch confusion unfold * “The intent was that the failure should make them feel stupid” * Fear: Disruption of infrastructure control networks * Benefits of Cyber Warfare * 1) Less physical destruction * Stuxnet prevented Israel from striking * Provided alternative * 2) Less cost * 3) Less risk of life * Challenges: * 1) Extremely difficult to trace * 2) Relatively unpredictable until too late * Bottom Line * We haven’t seen Cyber Warfare do too much
“Choosing war, he governed as if no war”

Whack-a-mole type policy – take out people/groups states view as hostile “Israeli-fication” * Absence of political logic backing up military actions * “our problems extent from the acceptance of the filthy, rotten system” – Dorothy Day virtuous warrior militarized foreign policy outsourced to warriors terrorism is a tactic weapon of weak against the strong

Similar Documents

Free Essay

International Security

...International Security The future of nation-state as the primary unit of action for world affairs can generally be said to be insecure. This may be mostly due to the increasingly world interconnection and also the move from a society monarchy to a communal one. The idea of globalisation has really intensified the interconnection globally which will lead to the world been interconnected to institutions of economics, politics and society. The challenges posed to nation-state by globalisation include; first, it reduces the ability of nation-state in influencing the economy in that all economic transactions are done in the global stage. Second it increases the transnational bodies which could be political, economic or combination of both. The third aspect is it allows for emergence of super and sub national power centres. Finally, there is the increasing world migrations and non-governmental organisations (NGOs) importance. The insecurity of the nation state has great impact on the US foreign and security policies. There are various ways in which this is affecting the US foreign and security policies; through the introduction of the globalisation system the US policies will be undermined and thus negatively impacting on its security. The United States will also lose its control in the international economy a factor which will lea to other countries undermining its policies. This gradual decline will also widen the scope of security and stability and hence nations will be able...

Words: 862 - Pages: 4

Premium Essay

International Security

...KEVIN NGIRA 640568 LIT 3351 ASSIGNMENT HOW THE WRITER BRINGS OUT MORAL VALUES IN THE NOVEL TOBACCO ROAD The novel ‘’Tobacco Road’’ is a novel by a talented writer Erskine Caldwell. The novel gives a story of a very unique family and their inability to move on when life turns out not to be as expected. Jeeter Lester has always been, stayed and farmed the land on which his grandfather once grew tobacco, however, a lot of debts have made Jeeter more of a sharecropper on land that the owner no longer wants to farm. Jeeter has a tendency of vowing every year that he will find a way to buy the seed and fertilizer needed to farm the land, but when the time comes he gets excuses not to do the work until too much time passes and planting period is gone. Tobacco Road is a story of two faces, of giving up, a story that can either inspire the reader to work that much harder or continue to give up in the face of adversity. Jeeter has been living on the same plot of land since he came to these world, and even though his standard of living continues to decline until he and his family begin to starve, Jeeter as always stubborn refuses the idea of moving to the city to make a better life for himself and his family by working in a cotton mill. Such a life, he says, would be very hard for him to live. Alongside Jeeter’s work with farming the land is his thinking of his own death. Ada his wife is also thinking about her death. Ada’s main worry is that she does not fish life on the planet still...

Words: 1593 - Pages: 7

Premium Essay

International Security Law

...1. Tumble has entered into a derivative contact with Prudent in the form of ISDA standard master agreement in 1992, which is drafted by the International Swap Dealers Association Inc. The Agreement supplemented and modified by an ISDA schedule. After Tumble insolvency, Prudent Bank claimed that s2a(iii) of ISDA Master agreement permits it to withhold from paying any sum due to Tumble under ISDA contract and under s6(a) of ISDA agreement, Prudent has the right to refuse indefinitely to terminate the ISDA contract. I will review if Prudent has such right according to terms provided in ISDA agreement. I. Right under Master Agreement? From the ISDA contract, section 2(a)(iii) provides that the payment obligations specified in each confirmation are subject to 1) Condition precedent that no event of default or potential event of default with respect to the other party has occurred and is continuing, and also 2) Condition precedent that no early termination date in respect of the relevant transaction has occurred. 3) Each other application condition precedent specified in this Agreement Since the conditions stated in s2a(iii) are the conditions precedent to the payment obligation of the counterparties, if any one of the condition has not been met at any time, there is no payment obligation under any of the trade under the agreement. For condition 2 and 3, as seen in the schedule, there is no automatic early termination clause and other specified condition...

Words: 3128 - Pages: 13

Free Essay

International Journal of Network Security & Its Applications (Ijnsa), Vol.4, No.2, March 2012

...com 3 Lecturer, Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh bikasbd@yahoo.com ABSTRACT Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So Intrusion Detection Systems have become a needful component in terms of computer and network security. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not completely flawless. So, the quest of betterment continues. In this progression, here we present an Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network intrusions. Parameters and evolution processes for GA are discussed in details and implemented. This approach uses evolution theory to information evolution in order to filter the traffic data and thus reduce the complexity. To implement and measure the performance of our system we used the KDD99 benchmark dataset and obtained reasonable detection rate. KEYWORDS Computer & Network Security, Intrusion Detection, Intrusion Detection System, Genetic Algorithm, KDD Cup 1999 Dataset. 1. INTRODUCTION In 1987 Dorothy E. Denning proposed intrusion detection as is an...

Words: 4796 - Pages: 20

Free Essay

Effectiveness of the Aircraft Movement Areas Security Screening Procedures of the Airport Police Department at the Ninoy Aquino International Airport

...States’ economic clout. On the same day, two other hijacked airliners were flown to other targets, one of which was the Pentagon, the seat of America’s military might, while the fourth aircraft crashed in a Pennsylvania field, believed to have been due to its passengers fighting back to regain control. While these incidents are certainly not the latest terrorist attacks against civil aviation, these attacks are significant in the sense that its aftermath truly changed the course of history of many nations and radically changed the lifestyles of many peoples. The earliest recorded terrorist act was on September 9, 1949, when a bomb was placed and exploded in a Quebec Airways flight in Canada. Since that first recorded aviation security breach, security experts had been trying to be one step ahead of the terror groups in hardening aircraft and airport targets against all forms of terrorist attacks. However, on July 22, 1968, three gunmen from the Popular Front for the Liberation of Palestine (PFLP), hijacked a passenger airliner of the Israeli airline El Al, on a flight from Rome to Tel-Aviv, and demanded the release of their comrades-in-arms who were imprisoned in Israel. While this may not be the first case of civilian aircraft seizure during that year, this operation was qualitatively different in its content and ultimate aim. It was the first time that an aircraft had been hijacked not out of criminal motivation or for personal reasons, but with the specific goal of politically...

Words: 17180 - Pages: 69

Free Essay

Humanitatrian Intervention in Afghanistan

...INTD724 Humanitarian Assistance and Service Delivery Individual Project Submitted By Uma Kanjinghat AFGHANISTAN Introduction Afghanistan is a landlocked country in central Asia. The full name of the country is Islamic Republic of Afghanistan. Afghanistan has a population of 33.4 million (UN, 2012). The capital of the country is Kabul which is also the largest one. The major religion in Afghanistan is Islam. The main exports that support the economy of Afghanistan are fruit and nuts, carpets, wool and opium. According to World Bank the Gross National Income per capita is US $470 (Afghanistan profile, 2014). Afghanistan has abundant natural resources. Afghanistan has abundant of coal, iron, chrome, copper and salt deposits. It has also have small deposits of uranium, silver and gold. Natural gas is the richest source of hydrocarbon in Afghanistan. Considerable amount of oil deposits are documented but not yet evaluated (Library of Congress , 2008). Afghanistan has experienced serious instability and turbulence in the modern era which is ruining the economy and infrastructure. This instability has pushed majority of population into refugees (Afghanistan profile, 2014). Afghanistan was the 6th largest receiver of official humanitarian aid in 2012. The total aid received by Afghanistan came around 32% of Gross National Income. The vulnerability index score in 2012-13 in Afghanistan is high (Global Humanitarian Assistance, n.d.). Underlying factors of the humanitarian crisis...

Words: 1778 - Pages: 8

Free Essay

International Relations

...Introduction: Afghanistan has a history of a high degree of decentralization, and resistance to foreign invasion and occupation. Some have termed it the “graveyard of empires.” Afghanistan is a landlocked country that is located approximately in the center of Asia. It is bordered by Pakistan in the south and east. Since the late 1970s Afghanistan has suffered brutal civil war in addition to foreign interventions in the form of the 1979 Soviet invasion and the 2001 U.S. invasion. The strategic interests of the great powers of the day in Afghanistan pitched against the potential threat of terrorism, religious extremism, smuggling and drug trafficking substantiates the assertion that Afghan security situation has the potential to generate effects far beyond its borders. Afghanistan had experienced several coups since 1973, when the Afghan monarchy was overthrown by Daud Khan, who was sympathetic to Soviet overtures. Subsequent coups reflected struggles within Afghanistan among factions with different ideas about how Afghanistan should be governed and whether it should be communist, and with degrees warmth toward the Soviet Union. The Soviets intervened following the overthrow of a pro-communist leader. In late December 1979, after several months of evident military preparation, they invaded Afganistan. At that time, the Soviet Union and the United States were engaged in the Cold War, a global competition for the fealty of other nations. The United States was, thus, deeply interested...

Words: 5184 - Pages: 21

Free Essay

Cultural

...POLICY BRIEF SUMMARY SHAPING EUROPE’S AFGHAN SURGE Daniel Korski Unnoticed by many, the last few years have seen something of a European military surge in Afghanistan. Since late 2006, 18 of the 25 EU countries participating in the International Security Assistance Force (ISAF), NATO’s Afghan mission, have increased their troop contributions, and as a result EU member states now account for 43% of ISAF’s total deployment. This military surge has been accompanied by a steady growth in European efforts to contribute to Afghanistan’s reconstruction, from development aid to police training – although not every EU member state is pulling its weight. These measures have made the EU a major stakeholder in Afghanistan. Yet the EU’s real impact on the country has been limited. In the face of a likely request from the Obama administration to do more, European governments should now formulate a hard-headed political strategy as a complement to the coming US military surge. Introduction President Barack Obama and his secretary of state, Hillary Clinton, have made it clear that they expect a significant enhancement of the European effort in Afghanistan. The issue is likely to be viewed in Washington as a litmus test of whether the Europeans can be taken seriously as strategic partners. Obama’s strategy in Afghanistan is likely to include an attempt to “regionalise” the issue, involving some kind of dialogue with Iran and efforts to bring India, the Gulf states and the central Asian...

Words: 14014 - Pages: 57

Free Essay

Afgan

...Arika Richardson January 19, 2014 Ind. Project The International Security and Assistance Force also known as the ISAF is an agency that supports Afghan reconstructing their country. ISAF was created in December of 2001 when Afghanistan decided to set up a new government structure also known as the Afghan Transitional Authority. The ISAF was put in place to create a secure environment in and around Afghanistan during the reconstruction. The ISAF forces conduct security and stability operations throughout the country with Afghan National Security Forces. During the reconstruction and development of Afghanistan the ISAF helps in securing areas that are under reconstructing at the time. The ISAF headquarters in Afghanistan consist of 9 people that run the headquarters (ISAF, 2006). The Commander of ISAF is General Joseph Dunford, The Deputy Commander is Lieutenant General John Lorimer and the Chief of staff is Lieutenant General Giorgio Battisti just to name a few (ISAF, 2009). On July 11th the ISAF joined forces with the Army National Guard’s in Kabul Afghanistan to bring relief supplies and assistance to people in Daridam village. Taliban fighters had come to this village fighting and the ISAF security and Afghan forces pushed out Taliban fighters leaving the residents in need of assistance. After the situation defused ISAF met with district sub- governor and Daridam village elders to begin rebuilding the agriculture based economy. The pipe lines that...

Words: 1025 - Pages: 5

Premium Essay

My Personal Philosphy of Nursing

...sent the GPS coordinates as to their location. Communications prior to the airstrike were that all was calm within the hospital compound. Yet the U.S. Airship that bombed the hospital believed it was a Taliban headquarters and was being used as a human shield. How could there be such a miscommunication? MSF believes that the air strikes were an aggressive violation of the International Humanitarian Laws and the Geneva Conventions. To date there are ongoing NATO, US Military and Afghan Military investigations. MSF ultimately claims this was a war crime committed by the United States of America, and is asking President Obama for an independent impartial investigation conducted by the International Humanitarian Fact Finding Commission. Who is Medecins Sans Frontieres and what were they doing in Kunduz, Afghanistan? Why was there fighting going on between the Afghan Army and the Taliban? And, what role does the United States Military play in this horrible incident? These are the questions I wish to explore to help determine, was Kunduz, as MSF claims, a war crime? MSF is a French Independent International Humanitarian Organization providing medical care for all people in times of conflict or war, be it soldiers or civilians. They...

Words: 1298 - Pages: 6

Free Essay

Equipment Backlog

...Backlog Time for Equipment Upgraded by Contractors in Afghanistan I served in Kandahar Afghanistan from January 2011 to December 2011 during Operation Enduring Freedom with the 655th Transportation Company (TC). My task was to supervise the maintenance of ground equipment, specifically Mine Resistant Ambush Protected (MRAP) vehicles, and manage Class IX parts to which provided convoy security for movements between outposts. During that period I encountered extensive backlog times for upgraded equipment completed by contractors that often left vehicles dead-lined in excess of 90 days. Observation 1: Poorly operating or inoperable air conditioning units awaiting upgrades left equipment dead-lined for extended periods. Discussion: The 655th Transportation Company was tasked with providing convoy security for supply movements between outposts in the Kandahar region of Afghanistan. Due to the extreme heat experienced in this region during the summer months non-functioning air conditioning becomes a deadline issue for the MRAP classes of vehicles. One MRAP in particular, the International MaxxPro, had an insufficient electrical system to power the air conditioning units resulting in melted wiring and reduced fan speeds. Contract maintenance was doing retrofits of the electrical system for this issue; however, due to the number of vehicles needing conversion, a significant backlog was created. The work could be done by the motor pool mechanics but the kit was not available...

Words: 374 - Pages: 2

Premium Essay

Plsc

...Blackwill thinks the United States needs to accept the “least bad option” in Afghanistan and he explains several reasons for it: first, because the U.S government needs to spend billions of dollars and military to maintain the security in Afghanistan. In the future, these numbers may keep going up economy inside the United States. Second, American military’s intervention has a lot of differences with the local people. Therefore, the foreign troops make the wars worse. In other words, the troops can only maintain their security but cannot reassure them. For Blackwill ’s recommendation, he suggests America should let the local “correlation of forces” to take the course about “the U.S. air power and Special Forces to forecast what could happen in the future to the Afghan army and the government in Kabul” and make sure the North and West are not controlled by the Taliban. He thinks ‘de facto partition’ is the best option. Moreover, Blackwill talks about three alternatives: first, “would be to stay the counterinsurgency course in Afghanistan no matter how long it takes, and perhaps even expand the existing commitment” (Blackwill 6). However, this alternative is not good because the U.S spends an excess amount of time and money to deal with the small group of terrorists each year. This does not make sense for the U.S interests in Afghanistan. Second, American military leaves Afghanistan in the next several years. In the meantime, this method also has the disadvantages because it...

Words: 503 - Pages: 3

Free Essay

Mcchrystal and Petraeucus

...Operation Enduring were generals Stanley McChrystal and David Petraeus. Both of these military leaders proved inspirational to troops in their efforts to battle global terrorism. Patraeus took charge of the campaign in Iraq in 2007 and in 2010 took over the war in Afghanistan from McChrystal. Both of these generals were pivotal in what is commonly know as ‘the war on terrorism’. As a result of their leadership, many soldiers were influenced and subsequently inspired in battle. Thus, this paper will take a Brief look at the traits of leadership they displayed in shaping these two campaigns against terrorist networks. McChrystal commanded the Joint Special Operations Command (JSOC) for five years along with command of the International Security Assistance Force (ISAF). He spent most of his time in Afghanistan and Iraq. His most noteworthy accomplishments occurred in Iraq, where he personally led special operations. In June, 2006, his forces were responsible for the leader of Al0queda forces in Iraq, Abu-musab al-Zarqawi being tracked down and killed. In fact, after his team called in the air strike that killed al-Zarqawi, McChrystal personally accompanied his team to the bombed-out hut near Baqubah to identify the remains. This was but one of many examples of McChrystal getting out from the desk and applying ‘hands on’. This was to be his signature during his time in both Iraq and Afghanistan. To hear of him going out with his soldiers on raids was not out of the...

Words: 1139 - Pages: 5

Premium Essay

Human Security and National Security

...HUMAN AND NATIONAL SECURITY: ENMESHING CONCEPTUALIZATION OF SECURITY PARADIGM IN EMERGING SECURITY DYNAMICS Introduction and Background In the realm of international relations and political science, there has been the recurring debate on the human versus national security. Theorists and scholars, like Goucha and Crowley (2008, 57) enrolled into the ethos of realism take the state-oriented view of the security and places the dominance of national security over human security; whereas, those who take the idealistic view of the entire episode take the human security as the primary level of security to be protected by the state (Mathew, 2010, 78). The idea of human security gained eminence in security studies with developments taken place in the aftermath of the post-Cold War era. The Cold War put the security apparatuses and concepts over all other dominant themes of national and pubic life and couched them into strategic and national cultures all over the world. Now as the world is moving into new era of globalization, economic expansion and post-industrial revolution, the focus has also been shifted from national security to other facets of global world like climate change, AIDS/HIV and poverty. In this work, the contrasting debate between national security and human security will be presented in an argumentative style. For this purpose, the concept of human security will be derived from UNHP Report of 1994 whereas the concept of national security will be couched in its classical...

Words: 2210 - Pages: 9

Premium Essay

Similarities and Differences in Terrorism and Counter Terrorism

...Similarities and differences in security and risk. Joshua Williams POL192 Perspectives on Security and Terrorism Murdoch University Semester 1, 2014 Utilizing the concepts of risk and security, critically explain the similarities and differences between terrorist strategies and tactics on one hand, and counter-terrorism measures, on the other, since 2001. The terrorist attacks of September 11, 2001 in the United States marked a turning point in the understanding of terrorism within the international society (Beck 2002, 39). Although the motives behind terrorism and counter-terrorism are opposite, their effects in terms of security and risk are similar. The similarities and differences between these two activities will be discussed in terms of risk and security within the international society. Central to the issues of security and risk, is the concept of an international society. An international society ‘exists when a group of states, conscious of certain common interests and common values, form a society in the sense that they conceive themselves to be bound by a common set of rules in their relations with one anther, and share in the working of common institutions’ (Bull and Watson 1984, 1). These rules, norms and institutions which make up international society is the central focus of security and risk when discussing terrorism...

Words: 2232 - Pages: 9