A 2011 presentation from the U.S. Cyber Command analyzing various examples of cyber attacks along a spectrum of overall cyberspace operations capabilities.
Tag Archive for Cyberattacks
U.S. Army
U.S. Army Cyber Attack Cycle Awareness Guide and Threat Vignettes
Federal Bureau of Investigation
(U//LES) FBI Pre-Deployment Checklist for Cyber Investigations
A document detailing investigative tools and materials utilized by the FBI when conducting cyber investigations. The document was distributed by the Oklahoma Bankers Association after being provided by a local branch of the FBI Cyber Division.
Federal Bureau of Investigation
(U//FOUO) FBI Financial Sector Cyber Security Presentation
A presentation on recent cyber attacks on the U.S. financial industry included in a collection of documents provided to banks and financial institutions by a local branch of the FBI Cyber Division office and distributed by the Oklahoma Bankers Association.
California
U.S. District Court of Northern California Anonymous DDoS Attacks Indictment July 2011
U.S. District Court of Northern California indictment of sixteen people filed July 13, 2011 in connection with Anonymous DDoS attacks on PayPal.
White House
White House International Strategy for Cyberspace
Digital infrastructure is increasingly the backbone of prosperous economies, vigorous research communities, strong militaries, transparent governments, and free societies. As never before, information technology is fostering transnational dialogue and facilitating the global flow of goods and services. These social and trade links have become indispensable to our daily lives. Critical life-sustaining infrastructures that deliver electricity and water, control air traffic, and support our financial system all depend on networked information systems. Governments are now able to streamline the provision of essential services through eGovernment initiatives. Social and political movements rely on the Internet to enable new and more expansive forms of organization and action. The reach of networked technology is pervasive and global. For all nations, the underlying digital infrastructure is or will soon become a national asset.
Federal Bureau of Investigation
HBGary Infragard Hospital Cyber Attacks Brief
HBGary Northern California Infragard “Anatomy of a Cyber Terrorist Attack on the Nation’s Hospital Infrastructure” from October 19, 2010.
United States
People’s Republic of China Cyber Warfare and Computer Network Exploitation Capability Report
This paper presents a comprehensive open source assessment of China’s capability to conduct computer network operations (CNO) both during peacetime and periods of conflict. The result will hopefully serve as useful reference to policymakers, China specialists, and information operations professionals.
Space and Naval Warfare Systems Command
SPAWAR/USCYBERCOM Cyber Warfare, Exploitation & Information Dominance (CWEID) Lab Overview
Opening Statements
▼Never before has it been possible for one person to potentially affect an entire Nation‟s security.
▼In 1999 (10 years ago), two Chinese Colonels published a book called “Unrestricted Warfare” that advocated “not fighting” the U.S. directly, but “understanding and employing the principle of asymmetry correctly to allow us [the Chinese] always to find and exploit an enemy’s soft spots.”
▼The idea that a less-capable foe can take on a militarily superior opponent also aligns with the views of the ancient Chinese general, Sun Tzu. In his book “The Art of War,” the strategist advocates stealth, deceptionand indirect attackto overcome a stronger opponent in battle.
Department of Homeland Security
United States Computer Emergency Readiness Team Operations
The National Cyber Security Division (NCSD) United States Computer Emergency Readiness Team (US-CERT) is a partnership between the Department of Homeland Security (DHS) and the public and private sectors. Established in 2003 to protect the nation’s internet infrastructure, US-CERT coordinates defense against and responses to cyber attacks across the nation. The organization interacts with federal agencies, state and local governments, industry professionals, and others to improve information sharing and incident response coordination and to reduce cyber threats and vulnerabilities.