Abstract
The technological advances made in the last twenty years radically changed our society, improving our lifestyle in almost every aspect of our daily life. This change directly affects human habits, transforming the way people share information and knowledge. The exponential technological advancement, together with the related information deluge, are also radically changing Information Warfare and its scenarios. Indeed, the consequently increase of the digital attack surface poses new challenges and threats for both personal and national security.
In this paper we discuss the motivations behind the need to redefine the Information Warfare according to its new dimensions. Then, we analyze the potential impact of the new threats on the most sensitive targets exposed by every nation: the Society, the Economy, and the Critical Infrastructures. Finally, for every considered scenario, we analyze existing state-of-the-art countermeasures, highlighting open issues and suggesting possible new defensive techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
The best bitcoin mining pools. https://www.bitcoinmining.com/bitcoin-mining-pools/. Accessed June 2020
The deep web is the 99% of the internet you can’t google. https://curiosity.com/topics/the-deep-web-is-the-99-of-the-internet-you-cant-google-curiosity/. Accessed June 2020
Google’s search knows about over 130 trillion pages. https://searchengineland.com/googles-search-indexes-hits-130-trillion-pages-documents-263378. Accessed June 2020
How to escape your political bubble for a clearer view. https://www.nytimes.com/2017/03/03/arts/the-battle-over-your-political-bubble.html. Accessed June 2020
Internet growth statistics. https://www.internetworldstats.com/emarketing.htm. Accessed June 2020
Breaking through censorship barriers, even when tor is blocked. https://blog.torproject.org/breaking-through-censorship-barriers-even-when-tor-blocked. Accessed June 2020
Eu vs disinfo website. https://euvsdisinfo.eu/about/. Accessed June 2020
How trolls are ruining the internet. http://time.com/4457110/internet-trolls/. Accessed June 2020
A new study suggests fake news might have won donald trump the 2016 election. https://www.washingtonpost.com/news/the-fix/wp/2018/04/03/a-new-study-suggests-fake-news-might-have-won-donald-trump-the-2016-election/?noredirect=on&utm_term=.d6e63f61fa06. Accessed June 2020
Presidential policy directive - critical infrastructure security and resilience. https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil. Accessed June 2020
Social media and censorship in china: how is it different to the west? http://www.bbc.co.uk/newsbeat/article/41398423/social-media-and-censorship-in-china-how-is-it-different-to-the-west. Accessed June 2020
What is scada? https://inductiveautomation.com/what-is-scada. Accessed June 2020
Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 375–392. IEEE (2017)
Bamman, D., O’Connor, B., Smith, N.: Censorship and deletion practices in Chinese social media. First Monday 17(3), 3–5 (2012)
Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against tor. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 11–20. ACM (2007)
Blockgeeks: What is cryptocurrency game theory: A basic introduction. https://blockgeeks.com/guides/cryptocurrency-game-theory/. Accessed June 2020
Boldyreva, A., Lychev, R.: Provable security of S-BGP and other path vector protocols: model, analysis and extensions. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 541–552. ACM (2012)
Chabaud, F., Joux, A.: Differential collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56–71. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0055720
Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Sec. Comput. 9(6), 811–824 (2012)
Dan Shea, A.E., Husch, B.: Drones and critical infrastructure. National Conference of States Legislatures (NCSL). http://www.ncsl.org/research/energy/drones-and-critical-infrastructure.aspx. December 2016. Accessed June 2020
Dewey, J.: Democracy in education. Elementary School Teacher 4(4), 193–204 (1903)
Di Pietro, R., Oligeri, G.: Silence is golden: exploiting jamming and radio silence to communicate. ACM Trans. Inf. Syst. Secur. 17(3), 9:1–9:24 (2015). https://doi.org/10.1145/2699906. http://doi.acm.org/10.1145/2699906
Ding, F., Yang, Z., Chen, X., Guo, J.: Effective methods to avoid the internet censorship. In: 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming. pp. 67–71. IEEE (2011)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. Tech. rep, Naval Research Lab Washington DC (2004)
Dobbertin, H.: Cryptanalysis of md4. In: International Workshop on Fast Software Encryption. pp. 53–69. Springer (1996)
Dobbertin, H.: Cryptanalysis of md5 compress. Technical report, Presented at the Rump Session of EuroCrypt (1996)
Dobbertin, H.: The status of md5 after a recent attack. Crypto-Bytes The technical newsletter of RSA Laboratories, a division of RSA Data Security, Inc. vol. 2, no. (2) (1996)
Dobbertin, H.: Ripemd with two-round compress function is not collision-free. J. Cryptol. 10(1), 51–69 (1997)
Elyashar, A., Bendahan, J., Puzis, R.: Has the online discussion been manipulated? quantifying online discussion authenticity within online social media. arXiv preprint arXiv:1708.02763 (2017)
Eperiesi-Beck, E.: The threat quantum computers pose to modern security. https://www.scmagazineuk.com/the-threat-quantum-computers-pose-to-modern-security/article/709472/. Accessed June 2020
Ferrara, E.: Disinformation and social bot operations in the run up to the 2017 french presidential election (2017)
Fokin, A., et al.: Internet trolling as a tool of hybrid warfare: the case of latvia. Technical report, NATO Strategic Communications Centre of Excellence (1996)
Forelle, M., Howard, P., Monroy-Hernández, A., Savage, S.: Political bots and the manipulation of public opinion in venezuela. arXiv preprint arXiv:1507.07109 (2015)
Fovino, I.N., Carcano, A., Masera, M., Trombetta, A.: An experimental investigation of malware attacks on scada systems. Int. J. Critical Infrastruct. Protect. 2(4), 139–145 (2009)
Gertz, N.: Censorship, Propaganda, and the Production of ‘Shell Shock’ in World War I. Disciplinary Press, Oxford (2009)
Gervais, A., Karame, G., Capkun, S., Capkun, V.: Is bitcoin a decentralized currency? IEEE Secur. Privacy 12(3), 54–60 (2014)
Gill, P., Schapira, M., Goldberg, S.: Let the market drive deployment: a strategy for transitioning to BGP security. In: ACM SIGCOMM Computer Communication Review. vol. 41, pp. 14–25. ACM (2011)
Guriev, S.M., Treisman, D.: How modern dictators survive: cooptation, censorship, propaganda, and repression. CEPR Discussion Paper No. DP10454 (2015)
Handschuh, H., Knudsen, L.R., Robshaw, M.J.: Analysis of SHA-1 in encryption mode. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 70–83. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45353-9_7
Hegelich, S., Janetzko, D.: Are social bots on twitter political actors? empirical evidence from a ukrainian social botnet. In: Tenth International AAAI Conference on Web and Social Media (2016)
Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: USENIX Security Symposium, pp. 129–144 (2015)
Heins, M.: The brave new world of social media censorship. Harv. L. Rev. F. 127, 325 (2013)
Hilvert, J.: Blue Pencil Warriors: Censorship and Propaganda in World War II. University of Queensland Press, Manchester (1984)
Hintz, A.: Social media censorship, privatized regulation, and new restrictions to protest and dissent. Rowman & Littlefield (2015)
Howard, P.N., Kollanyi, B.: Bots, #strongerin, and #brexit: computational propaganda during the uk-eu referendum. SSRN 2798311 (2016)
Hu, Y.C., Perrig, A., Sirbu, M.: SPV: Secure path vector routing for securing BGP. ACM SIGCOMM Comput. Commun. Rev. 34(4), 179–192 (2004)
Ismail, N.: New malware represents biggest threat to critical infrastructure. https://www.information-age.com/new-malware-represents-biggest-threat-critical-infrastructure-123466733/ June 2017. Accessed June 2020
Keshen, J.: Propaganda and censorship during Canada’s Great War. University of Alberta, Edmonton (1996)
Knapp, E.D., Langill, J.T.: Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress (2014)
Kumar, S., Cheng, J., Leskovec, J., Subrahmanian, V.: An army of me: sockpuppets in online discussion communities. In: Proceedings of the 26th International Conference on World Wide Web. pp. 857–866. International World Wide Web Conferences Steering Committee (2017)
La Morgia, M., Mei, A., Raponi, S., Stefa, J.: Time-zone geolocation of crowds in the dark web. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 445–455. IEEE (2018)
MacArthur, J.R.: Second Front: Censorship and Propaganda in the 1991 Gulf War. University of California Press, California (2004)
Mason, A.: CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN). Pearson Higher Education (2004)
Mihaylov, T., Georgiev, G., Nakov, P.: Finding opinion manipulation trolls in news community forums. In: Proceedings of the Nineteenth Conference on Computational Natural Language Learning, pp. 310–314 (2015)
Miller, B., Rowe, D.C.: A survey scada of and critical infrastructure incidents. RIIT 12, 51–56 (2012)
Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: Scada security in the light of cyber-warfare. Comput. Secur. 31(4), 418–436 (2012)
Nobori, D., Shinjo, Y.: \(\{\)VPN\(\}\) gate: a volunteer-organized public \(\{\)VPN\(\}\) relay system with blocking resistance for bypassing government censorship firewalls. In: Proceedings of the 11th \(\{\)USENIX\(\}\) Symposium on Networked Systems Design and Implementation (\(\{\)NSDI\(\}\) 14). pp. 229–241 (2014)
van Oorschot, P.C., Wan, T., Kranakis, E.: On interdomain routing security and pretty secure BGP (PSBGP). ACM Trans. Inf. Syst. Secur. (TISSEC) 10(3), 11 (2007)
Peacock, M., Johnstone, M.N.: Towards detection and control of civilian unmanned aerial vehicles. SRI Security Research Institute, Edith Cowan University, Perth, Western (2013)
Preneel, B., Govaerts, R., Vandewalle, J.: Differential cryptanalysis of hash functions based on block ciphers. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 183–188. ACM (1993)
Ratkiewicz, J., Conover, M.D., Meiss, M., Gonçalves, B., Flammini, A., Menczer, F.M.: Detecting and tracking political abuse in social media. In: Fifth International AAAI Conference on Weblogs and Social Media (2011)
Roberts, A.: Documents on the Laws of War. HeinOnline (2000)
Saarinen, M.-J.O.: Cryptanalysis of block ciphers based on SHA-1 and MD5. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 36–44. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-39887-5_4
Security, U.H.: Unmanned aircraft systems (UAS) - critical infrastructure. https://www.dhs.gov/uas-ci. Accessed June 2020
Shadmehr, M., Bernhardt, D.: State censorship. Am. Econ. J.: Microecon. 7(2), 280–307 (2015)
Shi, X., Xiang, Y., Wang, Z., Yin, X., Wu, J.: Detecting prefix hijackings in the internet with argus. In: Proceedings of the 2012 Internet Measurement Conference, pp. 15–28. ACM (2012)
Shmatikov, V., Wang, M.-H.: Timing analysis in low-latency mix networks: attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 18–33. Springer, Heidelberg (2006). https://doi.org/10.1007/11863908_2
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, 1994 Proceedings., pp. 124–134. IEEE (1994)
Smith, K.W.: Drone technology: benefits, risks, and legal considerations. Seattle J. Envtl. L. 5, i (2015)
Starbird, K.: Examining the alternative media ecosystem through the production of alternative narratives of mass shooting events on twitter. In: Eleventh International AAAI Conference on Web and Social Media (2017)
Sun, Y., et al.: \(\{\)RAPTOR\(\}\): routing attacks on privacy in tor. In: 24th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 2015), pp. 271–286 (2015)
Waldorf, L.: Censorship and Propaganda in Post-Genocide Rwanda. Pluto Press, London (2007)
Wang, Y., Ji, P., Ye, B., Wang, P., Luo, R., Yang, H.: Gohop: personal vpn to defend from censorship. In: 16th International Conference on Advanced Communication Technology, pp. 27–33. IEEE (2014)
Winter, P., Lindskog, S.: How the great firewall of china is blocking tor. USENIX-The Advanced Computing Systems Association (2012)
Yardley, T.: Scada: issues, vulnerabilities and future directions.; login: the magazine of USENIX & SAGE 33(6), 14–20 (2008)
Zannettou, S., Caulfield, T., De Cristofaro, E., Sirivianos, M., Stringhini, G., Blackburn, J.: Disinformation warfare: Understanding state-sponsored trolls on twitter and their influence on the web. arXiv preprint arXiv:1801.09288 (2018)
Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M.: Practical defenses against BGP prefix hijacking. In: Proceedings of the 2007 ACM CoNEXT Conference, p. 3. ACM (2007)
Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M., Bush, R.: ispy: detecting ip prefix hijacking on my own. IEEE/ACM Trans. Network. (TON) 18(6), 1815–1828 (2010)
Acknowledgement
This publication was partially supported by awards NPRP-S-11-0109-180242, UREP23-065-1-014, and NPRP X-063-1-014 from the QNRF-Qatar National Research Fund, a member of The Qatar Foundation. The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Di Pietro, R., Caprolu, M., Raponi, S. (2020). Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues. In: Mori, P., Furnell, S., Camp, O. (eds) Information Systems Security and Privacy. ICISSP 2019. Communications in Computer and Information Science, vol 1221. Springer, Cham. https://doi.org/10.1007/978-3-030-49443-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-49443-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-49442-1
Online ISBN: 978-3-030-49443-8
eBook Packages: Computer ScienceComputer Science (R0)