U.S. Army Cyber Attack Cycle Awareness Guide and Threat Vignettes

The following guides were released in November 2012 by the U.S. Army Office of the Provost Marshal General in collaboration with the Army Cyber Command.

Cyber Attack Cycle November 2012 20 pages Download
Cyber Threat Vignettes November 2012 12 pages Download

 

The Cyber Threat

Ends: Adversaries will use cyberspace to commit espionage, subversion (including insider threat), and sabotage.

Ways: Adversaries gain intelligence and access via cyberspace in order to:

• Recruit insiders (subversion)
• Commit acts of sabotage (stop Army missions; crash networks, electric power, water facilities)
• Harm Army personnel, families, units, and operations
• Commit criminal actions against Army installations, facilities, units, personnel, and/or family members
• Enable conventional threat capabilities
• Identify U.S. vulnerabilities in weapons systems, facilities, and tactics, techniques, and procedures

Means: To do this, adversaries tactics include:

• Exploiting people’s trust through Phishing attacks
• Infiltrating Malware to perform unauthorized and often surreptitious actions on computers
• Exploiting Social Media through false personas
• Gathering open source information from online postings
• Using infected thumb drives, CDs, DVDs, or other computer memory products to transfer attack mechanisms
• Tampering with cell phones and laptops (both personal and official) especially while personnel are traveling overseas
• Exfiltrating information that enables sabotage and other harmful actions

Share this:

Facebooktwitterredditlinkedinmail