ok there are 2 parts to this first document..... and I *think* i have links to both of them.. (you know how it is with gov docs, they sometimes just dissappear) http://www.hlswatch.com/sitedocs/cyberstorm.pdfhttp://cryptome.org/cyberstorm.pdf
if they are the same I am sorry..
for me the real curiosity for me was the 'Adversary' chart
Freedom not Bombs <--this is obviously targeted at the peaceful hippie free food group you may even be familier with "Food Not Bombs" which has been added to the domestic terrorist watch list.
Auggie Jones <--is this a vague reference to the #1 radio talk show host "Alex Jones" ?
anyway... I'm pretty sure the links are to both of the docs...
and then there is thishttp://media.govtech.net/Digital_Publications_Art/Documents/CYBERCRIME_Public_and_Private_Entities_Face_Challenges_in_Addressing_Cyber_Threats.pdf
heres some highlights
Cybercrime refers to criminal activities that specifically target a computer
or network for damage or infiltration. For example, it can be a crime to
access (“hack into”) a computer without authorization or to distribute
viruses. Cybercrime also includes the use of computers as tools to conduct
criminal activity such as fraud, identity theft, and copyright infringement.
Computers significantly multiply the criminal’s power and reach in committing such crimes
To protect networks and information against cybercrime, organizations
and individuals implement cybersecurity techniques such as access
controls (passwords) and firewalls. In addition, they use monitoring
devices or intrusion detection systems to detect incidents that could potentially be criminal intrusions
A key component of cybercrime investigations is the gathering and
examination of electronic evidence that can be useful for prosecution.
Using cyberforensic tools and techniques,
cybercrime investigators and
examiners gather and analyze electronic evidence. If available,
cyberforensic laboratories may be used to extract the electronic evidence
and present it in a court-admissible format. The evidence could entail
analysis of terabytes of information on multiple electronic devices, the
electronic path taken by a fraudulent e-mail, pornographic images stored
on a hard drive, or data stored on a mutilated but later reconstructed CD-
ROM. The ability to gather electronic evidence and the assurance that
cyberforensic procedures do not compromise the evidence gathered can
be key to building a case and prosecuting cybercriminals.
The annual loss due to computer crime was estimated to be $67.2 billion for U.S. organizations
estimated losses associated with particular crimes include
$49.3 billion in 2006 for identity theft
$1 billion annually due to phishing
according to the U.S.-China Economic and
Security Review Commission report, Chinese military strategists write
openly about exploiting the vulnerabilities created by the U.S. military’s
reliance on advanced technologies and the extensive infrastructure used
The Secret Service
official stated that the service is expanding its Electronic Crimes Special
Agent Program and will have approximately 770 trained and active agents
by the end of fiscal year 2007
150 million U.S. citizens are connected to the Internet
Approximately 88 percent of all e-mail processed at service centers is classified as “junk.”
From September 2006 to March 2007, Postini collected over 60 billion pieces of spam totaling 537.7 terabytes of data.
Between July and December 2006, spam constituted 59 percent of all e-mail monitored.
Through 2005, hackers most frequently targeted the telecommunications and health care sectors,
where almost 80 percent of all e-mail traffic was spam.
Between July and December 2006, an average of 63,912 active, bot-infected computers per day
were observed, an 11 percent increase from the previous reporting period.
Between July and December 2006, 166,248 unique phishing messages detected, a 6 percent
increase over the first 6 months of 2006.
An average of 904 unique phishing messages per day was reported for the second half of 2006.
During the same period, over 1.5 billion phishing messages were blocked.
During 2006, U.S.-based businesses were the most targeted organizations of phishing e-mails,
accounting for 71.37 percent of all phishing e-mail. In addition, more than 55 percent of the world’s
phishing attacks fabricate company Web sites that are hosted in the United States.
Between January and June 2006, approximately 2 million of the 4 million computers cleaned by
the malicious software removal tool had at least one backdoor Trojan horse.
43,000 new variants of malware were found in the same period.
In 2005, close to 40 percent of the financial services and banking industry sector suffered the most
Trojan horse attacks.
Director of Central Intelligence (1996) "Hackers, terrorists, or other nations could use information
warfare techniques as part of a coordinated attack to
seriously disrupt electric power distribution, air traffic
control, or financial sectors. "
DOD officials stated that its information network, representing
approximately 20 percent of the entire Internet, receives approximately 6
million probes/scans a day. Further, representatives from DOD stated that
between January 2005 and July 2006, the agency initiated 92 cybercrime
cases, the majority of which involved intrusions or malicious activities
directed against its information network.