CYBER SKIRMISHES By Zubair Khan ZUBAIR KHAN Introducing
![CYBER SKIRMISHES By Zubair Khan ZUBAIR KHAN CYBER SKIRMISHES By Zubair Khan ZUBAIR KHAN](https://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-1.jpg)
CYBER SKIRMISHES By Zubair Khan ZUBAIR KHAN
![Introducing Cyber Warfare ZUBAIR KHAN Introducing Cyber Warfare ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-2.jpg)
Introducing Cyber Warfare ZUBAIR KHAN
![". . . attaining one hundred victories in one hundred battles is not the ". . . attaining one hundred victories in one hundred battles is not the](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-3.jpg)
". . . attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy's army without fighting is the true pinnacle of excellence. " ZUBAIR KHAN
![Is Cyber Warfare Best Strategy? ZUBAIR KHAN Is Cyber Warfare Best Strategy? ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-4.jpg)
Is Cyber Warfare Best Strategy? ZUBAIR KHAN
![• Highly Anonymous • Deniability • Low expenditure on R&D ZUBAIR KHAN • Highly Anonymous • Deniability • Low expenditure on R&D ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-5.jpg)
• Highly Anonymous • Deniability • Low expenditure on R&D ZUBAIR KHAN
![Outsourcing and Globalization of Warfare • No Command • Difficult to identify private or Outsourcing and Globalization of Warfare • No Command • Difficult to identify private or](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-6.jpg)
Outsourcing and Globalization of Warfare • No Command • Difficult to identify private or state sponsored hacking. • Citizens of other regions and countries can also volunteer. ZUBAIR KHAN
![Cyber Targets • • • Military Networks Government Systems and Websites Ecommerce and Financial Cyber Targets • • • Military Networks Government Systems and Websites Ecommerce and Financial](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-7.jpg)
Cyber Targets • • • Military Networks Government Systems and Websites Ecommerce and Financial Institutes Telecommunication Companies Others ZUBAIR KHAN
![Psychology of Modern Warfare and Hacking • • For Fun (31. 4%) Want to Psychology of Modern Warfare and Hacking • • For Fun (31. 4%) Want to](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-8.jpg)
Psychology of Modern Warfare and Hacking • • For Fun (31. 4%) Want to be best defacer (17. 2%) No reason Specified (14. 7%) Political Reasons (11. 8%) Patriotism (10. 9%) As a challenge (10. 8%) Revenge (3. 3%) ZUBAIR KHAN
![Cyber Weapons • Software Based Weapons – Availability – Capability • Hardware Based Weapons Cyber Weapons • Software Based Weapons – Availability – Capability • Hardware Based Weapons](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-9.jpg)
Cyber Weapons • Software Based Weapons – Availability – Capability • Hardware Based Weapons – Availability – Cost of Manufacturing – Capability ZUBAIR KHAN
![Cyber Battleground of Palestine And Israel ZUBAIR KHAN Cyber Battleground of Palestine And Israel ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-10.jpg)
Cyber Battleground of Palestine And Israel ZUBAIR KHAN
![History • 28 th September 2000 – Israeli teenage hackers attacked Hezbollah and Hamas History • 28 th September 2000 – Israeli teenage hackers attacked Hezbollah and Hamas](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-11.jpg)
History • 28 th September 2000 – Israeli teenage hackers attacked Hezbollah and Hamas websites in Lebanon. • Call for Cyber Jihad from Palestine ZUBAIR KHAN
![The Middle East Cyber War • • Elite Hackers around 100 How Elite Hackers The Middle East Cyber War • • Elite Hackers around 100 How Elite Hackers](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-12.jpg)
The Middle East Cyber War • • Elite Hackers around 100 How Elite Hackers work? Volunteers around 1200 How Volunteers work? ZUBAIR KHAN
![Targets in Middle East Conflict • Pro-Israeli Attacks – Extremist Websites – Government Websites Targets in Middle East Conflict • Pro-Israeli Attacks – Extremist Websites – Government Websites](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-13.jpg)
Targets in Middle East Conflict • Pro-Israeli Attacks – Extremist Websites – Government Websites • Pro-Palestinian Attacks – Israeli official Websites – Media, technology, financial and telecommunication corporations ZUBAIR KHAN
![Middle East Cyber War. A Global Cyber War ZUBAIR KHAN Middle East Cyber War. A Global Cyber War ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-14.jpg)
Middle East Cyber War. A Global Cyber War ZUBAIR KHAN
![Israeli Hackers • • Mossad Wizel Israel Hackers Unite Israeli Internet Underground Small Mistake Israeli Hackers • • Mossad Wizel Israel Hackers Unite Israeli Internet Underground Small Mistake](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-15.jpg)
Israeli Hackers • • Mossad Wizel Israel Hackers Unite Israeli Internet Underground Small Mistake Analyzer Vi. Rii ZUBAIR KHAN
![Targets of Israeli Hackers • • • Government Systems Palestinian National Authority HAMAS Hizballah Targets of Israeli Hackers • • • Government Systems Palestinian National Authority HAMAS Hizballah](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-16.jpg)
Targets of Israeli Hackers • • • Government Systems Palestinian National Authority HAMAS Hizballah VISA ZUBAIR KHAN
![ZUBAIR KHAN ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-17.jpg)
ZUBAIR KHAN
![Tactics and Strategy of Israeli Hackers • • Registering websites with misspellings Hamas. com Tactics and Strategy of Israeli Hackers • • Registering websites with misspellings Hamas. com](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-18.jpg)
Tactics and Strategy of Israeli Hackers • • Registering websites with misspellings Hamas. com to hamas. org Propaganda Others ZUBAIR KHAN
![Counter Attack • Pro-Palestinians hacked more than 50 websites. • Paralyzed Israel’s email system Counter Attack • Pro-Palestinians hacked more than 50 websites. • Paralyzed Israel’s email system](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-19.jpg)
Counter Attack • Pro-Palestinians hacked more than 50 websites. • Paralyzed Israel’s email system for days many times • Israel’s e-commerce websites ZUBAIR KHAN
![Israel: Cyber Target • Extensive targets • Israel losing the cyber war • Hackers Israel: Cyber Target • Extensive targets • Israel losing the cyber war • Hackers](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-20.jpg)
Israel: Cyber Target • Extensive targets • Israel losing the cyber war • Hackers of all Arab countries combined ZUBAIR KHAN
![Pro-Palestinian Hackers • • G-Force Pakistan Dr. Nuker Pakistani Hackerz Club Arab Hackers Xegypt Pro-Palestinian Hackers • • G-Force Pakistan Dr. Nuker Pakistani Hackerz Club Arab Hackers Xegypt](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-21.jpg)
Pro-Palestinian Hackers • • G-Force Pakistan Dr. Nuker Pakistani Hackerz Club Arab Hackers Xegypt Arab Hax 0 rs Al-Muhajiroun ZUBAIR KHAN
![Palestinian Targets • • Israeli Army Israeli Central Bank of Israel’s Educational Institutes Government Palestinian Targets • • Israeli Army Israeli Central Bank of Israel’s Educational Institutes Government](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-22.jpg)
Palestinian Targets • • Israeli Army Israeli Central Bank of Israel’s Educational Institutes Government System AT&T TA Stock Exchange ZUBAIR KHAN
![Cyber Battleground of Iran And USA ZUBAIR KHAN Cyber Battleground of Iran And USA ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-23.jpg)
Cyber Battleground of Iran And USA ZUBAIR KHAN
![• • • Development Process Threat to USA Effects Caused Capabilities of Persian • • • Development Process Threat to USA Effects Caused Capabilities of Persian](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-24.jpg)
• • • Development Process Threat to USA Effects Caused Capabilities of Persian Hackers Strategies Globalize War ZUBAIR KHAN
![Cyber Battleground of China, Cuba And USA ZUBAIR KHAN Cyber Battleground of China, Cuba And USA ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-25.jpg)
Cyber Battleground of China, Cuba And USA ZUBAIR KHAN
![How Cuba is better than USA in Cyber Warfare? ZUBAIR KHAN How Cuba is better than USA in Cyber Warfare? ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-26.jpg)
How Cuba is better than USA in Cyber Warfare? ZUBAIR KHAN
![Bejucal Base – 1100 engineers, computer scientists, technicians, staff – Three groups of antennas/satellites. Bejucal Base – 1100 engineers, computer scientists, technicians, staff – Three groups of antennas/satellites.](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-27.jpg)
Bejucal Base – 1100 engineers, computer scientists, technicians, staff – Three groups of antennas/satellites. • General USA telecommunications • Pre Designated phones and computers • Voice recognition capacity • Ability to interfere USA computer networks ZUBAIR KHAN
![Paseo – Transmission and reception of radio waves – Ability to interfere radio telecommunications Paseo – Transmission and reception of radio waves – Ability to interfere radio telecommunications](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-28.jpg)
Paseo – Transmission and reception of radio waves – Ability to interfere radio telecommunications in USA, mainly in airports and strategic places. ZUBAIR KHAN
![Cojimar Electronic Complex – Research Department – Main focus High Radio Frequency ZUBAIR KHAN Cojimar Electronic Complex – Research Department – Main focus High Radio Frequency ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-29.jpg)
Cojimar Electronic Complex – Research Department – Main focus High Radio Frequency ZUBAIR KHAN
![Wajay Electronic Base – Weather Change Research – Radio Interference – More than 100 Wajay Electronic Base – Weather Change Research – Radio Interference – More than 100](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-30.jpg)
Wajay Electronic Base – Weather Change Research – Radio Interference – More than 100 very high antennas ZUBAIR KHAN
![Chinese in Cuba • • Mutual Understanding Trade Cooperation Financial Support Strategic Location ZUBAIR Chinese in Cuba • • Mutual Understanding Trade Cooperation Financial Support Strategic Location ZUBAIR](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-31.jpg)
Chinese in Cuba • • Mutual Understanding Trade Cooperation Financial Support Strategic Location ZUBAIR KHAN
![Cyber Battleground of India And Pakistan ZUBAIR KHAN Cyber Battleground of India And Pakistan ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-32.jpg)
Cyber Battleground of India And Pakistan ZUBAIR KHAN
![History • • • First cyber attack: May 1998 Reason: Pokhran 2 Nuclear Tests History • • • First cyber attack: May 1998 Reason: Pokhran 2 Nuclear Tests](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-33.jpg)
History • • • First cyber attack: May 1998 Reason: Pokhran 2 Nuclear Tests Target: Bhabha Atomic Research Centre, India Responsible Group: Milworm Disclosure of sensitive mails regarding nuclear tests Website Defaced ZUBAIR KHAN
![“Is BARC being brought under the defence ministry? If that happens, there'll be a “Is BARC being brought under the defence ministry? If that happens, there'll be a](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-34.jpg)
“Is BARC being brought under the defence ministry? If that happens, there'll be a lot of restrictions. I have doubts if the explosion was successful. That place is full of idiots, including Chidu. I know them inside out. I'm sure those morons aren't capable of anything. Must have exploded some RDX and are now claiming to have exploded the bomb for political gains. Biku is jumping about here and newspapers report some VECC scientists have contributed to the nuclear tests. He has asked for special security. The clown has got two bodyguards. Security has been tightened at the institute. ” ZUBAIR KHAN
![Major Targets of Pakistani Hackers • • Gujrat Government Ministry of External Affairs India Major Targets of Pakistani Hackers • • Gujrat Government Ministry of External Affairs India](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-35.jpg)
Major Targets of Pakistani Hackers • • Gujrat Government Ministry of External Affairs India Gandhi Centre for Atomic Research India Online Bazaar Indian National IT Promotion India Today Nuclear Science Centre Telecommunication companies ZUBAIR KHAN
![Stats of Indian Defacements • • • • Total number of defacements recorded – Stats of Indian Defacements • • • • Total number of defacements recorded –](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-36.jpg)
Stats of Indian Defacements • • • • Total number of defacements recorded – 780 co. in - 115 defacements - 14. 74% gov. in - 29 defacements - 3. 72% net. in - 23 defacements - 2. 95% org. in - 15 defacements - 1. 92% nic. in - 45 defacements - 5. 77% ac. in - 33 defacements - 4. 23% ernet. in - 56 defacements - 7. 18% res. in - 20 defacements - 2. 56%. com - 398 defacements - 51. 03%. net - 18 defacements - 2. 31%. org - 25 defacements - 3. 21%. edu - 2 defacements - 0. 26% ZUBAIR KHAN
![ZUBAIR KHAN ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-37.jpg)
ZUBAIR KHAN
![ZUBAIR KHAN ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-38.jpg)
ZUBAIR KHAN
![Top 5 Pakistani Attackers • AIC - 166 defacements - 21. 28% • GForce Top 5 Pakistani Attackers • AIC - 166 defacements - 21. 28% • GForce](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-39.jpg)
Top 5 Pakistani Attackers • AIC - 166 defacements - 21. 28% • GForce Pakistan - 116 defacements 14. 87% • Silver Lords - 101 defacements - 12. 95% • WFD - 59 defacements - 7. 56% • ISOTK - 17 defacements - 2. 18% ZUBAIR KHAN
![Formation of Pakistani Hacker Groups and their Strategies • GForce Pakistan • Silver Lords Formation of Pakistani Hacker Groups and their Strategies • GForce Pakistan • Silver Lords](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-40.jpg)
Formation of Pakistani Hacker Groups and their Strategies • GForce Pakistan • Silver Lords • Pakistan Hacker Club ZUBAIR KHAN
![Objectives of Pakistani Hackers • Target websites with a huge domestic audience • To Objectives of Pakistani Hackers • Target websites with a huge domestic audience • To](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-41.jpg)
Objectives of Pakistani Hackers • Target websites with a huge domestic audience • To bring attention to violence in Kashmir • Middle East conflict ZUBAIR KHAN
![Indians in Action • Paralyzed Pakistani government sites for more than two months in Indians in Action • Paralyzed Pakistani government sites for more than two months in](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-42.jpg)
Indians in Action • Paralyzed Pakistani government sites for more than two months in 2003. • Yaha-series viruses • Damaged about 150 Pakistani websites in two days and erasing files from the hard disks of more than 3, 000 corporate computers. • Severe damage to Pakistan Internet Exchange and ecommerce ZUBAIR KHAN
![Cricket and Indian Hacking ZUBAIR KHAN Cricket and Indian Hacking ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-43.jpg)
Cricket and Indian Hacking ZUBAIR KHAN
![Indian Hackers • Indian Snakes – Roxx of Calcutta – Cobra • Hindustan Hackers Indian Hackers • Indian Snakes – Roxx of Calcutta – Cobra • Hindustan Hackers](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-44.jpg)
Indian Hackers • Indian Snakes – Roxx of Calcutta – Cobra • Hindustan Hackers Association (H 2 O) • Indian Hackers Club • Indian Spy ZUBAIR KHAN
![Strategy of Indian Hackers • Using Denial of Service Attacks as their primary weapon Strategy of Indian Hackers • Using Denial of Service Attacks as their primary weapon](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-45.jpg)
Strategy of Indian Hackers • Using Denial of Service Attacks as their primary weapon ZUBAIR KHAN
![India Pakistan State-Sponsored Hacking and Warfare ZUBAIR KHAN India Pakistan State-Sponsored Hacking and Warfare ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-46.jpg)
India Pakistan State-Sponsored Hacking and Warfare ZUBAIR KHAN
![What FBI hates more than Osama Bin Laden? ZUBAIR KHAN What FBI hates more than Osama Bin Laden? ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-47.jpg)
What FBI hates more than Osama Bin Laden? ZUBAIR KHAN
![ZUBAIR KHAN ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-48.jpg)
ZUBAIR KHAN
![Capabilities and interests of Al Qaeda • Training Process – Khalid Sheikh Mohammed – Capabilities and interests of Al Qaeda • Training Process – Khalid Sheikh Mohammed –](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-49.jpg)
Capabilities and interests of Al Qaeda • Training Process – Khalid Sheikh Mohammed – Ph. D Cyber Security • • • Reconnaissance of critical infrastructures Communications and Cryptography techniques Cyber Propaganda Call for Jihad How Bin Laden is better than NSA in Tech ZUBAIR KHAN
![Capabilities and interests of Al Qaeda • Big Damage……less investment • High Anonymity ZUBAIR Capabilities and interests of Al Qaeda • Big Damage……less investment • High Anonymity ZUBAIR](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-50.jpg)
Capabilities and interests of Al Qaeda • Big Damage……less investment • High Anonymity ZUBAIR KHAN
![Al Qaeda’s Cryptography • Cryptography Techniques and methods used • Example ZUBAIR KHAN Al Qaeda’s Cryptography • Cryptography Techniques and methods used • Example ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-51.jpg)
Al Qaeda’s Cryptography • Cryptography Techniques and methods used • Example ZUBAIR KHAN
![Cyber Attacks on Al-Qaeda by US • Bin Laden’s Financial Network • Damage to Cyber Attacks on Al-Qaeda by US • Bin Laden’s Financial Network • Damage to](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-52.jpg)
Cyber Attacks on Al-Qaeda by US • Bin Laden’s Financial Network • Damage to Financial Network of Bin Laden by U. S Hackers • Calls Interception • Decrypting Messages • Avenues for US hackers by Al Qaeda ZUBAIR KHAN
![What makes Cyber War as important as Nuclear War for USA? ZUBAIR KHAN What makes Cyber War as important as Nuclear War for USA? ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-53.jpg)
What makes Cyber War as important as Nuclear War for USA? ZUBAIR KHAN
![Future of Al Qaeda’s Cyber Warfare ZUBAIR KHAN Future of Al Qaeda’s Cyber Warfare ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-54.jpg)
Future of Al Qaeda’s Cyber Warfare ZUBAIR KHAN
![Cyber Defence Strategies ZUBAIR KHAN Cyber Defence Strategies ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-55.jpg)
Cyber Defence Strategies ZUBAIR KHAN
![Hacking affecting Military Operations • Before Fighting – Example of Department of Defence • Hacking affecting Military Operations • Before Fighting – Example of Department of Defence •](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-56.jpg)
Hacking affecting Military Operations • Before Fighting – Example of Department of Defence • During Fighting – Example of Gulf War ZUBAIR KHAN
![Influencing Foreign Policy ZUBAIR KHAN Influencing Foreign Policy ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-57.jpg)
Influencing Foreign Policy ZUBAIR KHAN
![Can hacking cause real war? ZUBAIR KHAN Can hacking cause real war? ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-58.jpg)
Can hacking cause real war? ZUBAIR KHAN
![ECHELON/Project 415 Global network of computers that automatically search through millions of intercepted messages ECHELON/Project 415 Global network of computers that automatically search through millions of intercepted messages](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-59.jpg)
ECHELON/Project 415 Global network of computers that automatically search through millions of intercepted messages for pre-programmed keywords or fax, telex and e-mail addresses. ZUBAIR KHAN
![ECHELON • ECHELON Dictionaries • ECHELON Working • UKUSA System ZUBAIR KHAN ECHELON • ECHELON Dictionaries • ECHELON Working • UKUSA System ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-60.jpg)
ECHELON • ECHELON Dictionaries • ECHELON Working • UKUSA System ZUBAIR KHAN
![Agencies in UKUSA System • National Security Agency (NSA) • Government Communications Headquarters, UK Agencies in UKUSA System • National Security Agency (NSA) • Government Communications Headquarters, UK](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-61.jpg)
Agencies in UKUSA System • National Security Agency (NSA) • Government Communications Headquarters, UK (GCHQ) • Defence Signals Directorate, Australia (DSD) ZUBAIR KHAN
![Agencies in UKUSA System • Government Communications Security Bureau, New Zealand (GCSB) • Communication Agencies in UKUSA System • Government Communications Security Bureau, New Zealand (GCSB) • Communication](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-62.jpg)
Agencies in UKUSA System • Government Communications Security Bureau, New Zealand (GCSB) • Communication Security Establishment, Canada (CSE) ZUBAIR KHAN
![Revolution in Military Affairs And C 4 i • • • Psychological Operations Military Revolution in Military Affairs And C 4 i • • • Psychological Operations Military](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-63.jpg)
Revolution in Military Affairs And C 4 i • • • Psychological Operations Military Deception Operations Security Computer Network Operations Electronic Warfare ZUBAIR KHAN
![Cyber Terrorism and Propaganda ZUBAIR KHAN Cyber Terrorism and Propaganda ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-64.jpg)
Cyber Terrorism and Propaganda ZUBAIR KHAN
![The Abu Ghraib Prison Photos ZUBAIR KHAN The Abu Ghraib Prison Photos ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-65.jpg)
The Abu Ghraib Prison Photos ZUBAIR KHAN
![Example of Powerful Cyber Propaganda The propagation of Abu Ghraib photos on internet did Example of Powerful Cyber Propaganda The propagation of Abu Ghraib photos on internet did](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-66.jpg)
Example of Powerful Cyber Propaganda The propagation of Abu Ghraib photos on internet did a severe damage to political interests of American Government. ZUBAIR KHAN
![The Future of Warfare ZUBAIR KHAN The Future of Warfare ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-67.jpg)
The Future of Warfare ZUBAIR KHAN
![References • http: //zone-h. org/en/stats (ZONE-H Statistics) • http: //www. netforcuba. org/Feature. Section. EN/New. References • http: //zone-h. org/en/stats (ZONE-H Statistics) • http: //www. netforcuba. org/Feature. Section. EN/New.](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-68.jpg)
References • http: //zone-h. org/en/stats (ZONE-H Statistics) • http: //www. netforcuba. org/Feature. Section. EN/New. Thr. htm (Net For Cuba) • http: //ctp. iccas. miami. edu/FOCUS_Web/Issue 58. htm (Focus on Cuba) • http: //www. findarticles. com/p/articles/mi_m 0 PBZ/is_2_83 /ai_106732244/pg_3 (Palestine Israel Cyber War) • http: //journalism. uts. edu. au/subjects/oj 1_a 2002/inter netactivisminasia/india 2. html (Indo-Pakistan Cyber war) • http: //www. srijith. net/indiacracked/stats/index. shtml (Project India Cracked Statistics) • http: //www. attrition. org/mirror/attrition/2000/08/26/gujarat. gov. in/ (Gujrat Government Defaced Mirror) ZUBAIR KHAN
![References • http: //www. attrition. org/mirror/attrition/2001/01/02/igcar. e rnet. in/ (India Gandhi Centre Defaced Mirror) References • http: //www. attrition. org/mirror/attrition/2001/01/02/igcar. e rnet. in/ (India Gandhi Centre Defaced Mirror)](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-69.jpg)
References • http: //www. attrition. org/mirror/attrition/2001/01/02/igcar. e rnet. in/ (India Gandhi Centre Defaced Mirror) • http: //pakcert. org/defaced/www. sysnet. com. pk. html (Sysnet Defaced Mirror) • http: //www. pbs. org/wgbh/pages/frontline/shows/cyberwar /vulnerable/alqaeda. html (Frontline Cyber war) • http: //www. newsmax. com/archives/articles/2001/2/8/221 142. shtml (US war on Bin Laden) • http: //www. fas. org/irp/program/process/echelon. htm (ECHELON) • http: //www. antiwar. com/news/? articleid=2444 (Photos of Abu Ghraib) ZUBAIR KHAN
![QUESTIONS? ZUBAIR KHAN QUESTIONS? ZUBAIR KHAN](http://slidetodoc.com/presentation_image/440e7fc4e7c6a2a5d9f0d696a6b353cf/image-70.jpg)
QUESTIONS? ZUBAIR KHAN
- Slides: 70