Skip to main content

Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues

  • Conference paper
  • First Online:
Information Systems Security and Privacy (ICISSP 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1221))

Included in the following conference series:

Abstract

The technological advances made in the last twenty years radically changed our society, improving our lifestyle in almost every aspect of our daily life. This change directly affects human habits, transforming the way people share information and knowledge. The exponential technological advancement, together with the related information deluge, are also radically changing Information Warfare and its scenarios. Indeed, the consequently increase of the digital attack surface poses new challenges and threats for both personal and national security.

In this paper we discuss the motivations behind the need to redefine the Information Warfare according to its new dimensions. Then, we analyze the potential impact of the new threats on the most sensitive targets exposed by every nation: the Society, the Economy, and the Critical Infrastructures. Finally, for every considered scenario, we analyze existing state-of-the-art countermeasures, highlighting open issues and suggesting possible new defensive techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The best bitcoin mining pools. https://www.bitcoinmining.com/bitcoin-mining-pools/. Accessed June 2020

  2. The deep web is the 99% of the internet you can’t google. https://curiosity.com/topics/the-deep-web-is-the-99-of-the-internet-you-cant-google-curiosity/. Accessed June 2020

  3. Google’s search knows about over 130 trillion pages. https://searchengineland.com/googles-search-indexes-hits-130-trillion-pages-documents-263378. Accessed June 2020

  4. How to escape your political bubble for a clearer view. https://www.nytimes.com/2017/03/03/arts/the-battle-over-your-political-bubble.html. Accessed June 2020

  5. Internet growth statistics. https://www.internetworldstats.com/emarketing.htm. Accessed June 2020

  6. Breaking through censorship barriers, even when tor is blocked. https://blog.torproject.org/breaking-through-censorship-barriers-even-when-tor-blocked. Accessed June 2020

  7. Eu vs disinfo website. https://euvsdisinfo.eu/about/. Accessed June 2020

  8. How trolls are ruining the internet. http://time.com/4457110/internet-trolls/. Accessed June 2020

  9. A new study suggests fake news might have won donald trump the 2016 election. https://www.washingtonpost.com/news/the-fix/wp/2018/04/03/a-new-study-suggests-fake-news-might-have-won-donald-trump-the-2016-election/?noredirect=on&utm_term=.d6e63f61fa06. Accessed June 2020

  10. Presidential policy directive - critical infrastructure security and resilience. https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil. Accessed June 2020

  11. Social media and censorship in china: how is it different to the west? http://www.bbc.co.uk/newsbeat/article/41398423/social-media-and-censorship-in-china-how-is-it-different-to-the-west. Accessed June 2020

  12. What is scada? https://inductiveautomation.com/what-is-scada. Accessed June 2020

  13. Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 375–392. IEEE (2017)

    Google Scholar 

  14. Bamman, D., O’Connor, B., Smith, N.: Censorship and deletion practices in Chinese social media. First Monday 17(3), 3–5 (2012)

    Article  Google Scholar 

  15. Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against tor. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 11–20. ACM (2007)

    Google Scholar 

  16. Blockgeeks: What is cryptocurrency game theory: A basic introduction. https://blockgeeks.com/guides/cryptocurrency-game-theory/. Accessed June 2020

  17. Boldyreva, A., Lychev, R.: Provable security of S-BGP and other path vector protocols: model, analysis and extensions. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 541–552. ACM (2012)

    Google Scholar 

  18. Chabaud, F., Joux, A.: Differential collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56–71. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0055720

    Chapter  MATH  Google Scholar 

  19. Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Sec. Comput. 9(6), 811–824 (2012)

    Article  Google Scholar 

  20. Dan Shea, A.E., Husch, B.: Drones and critical infrastructure. National Conference of States Legislatures (NCSL). http://www.ncsl.org/research/energy/drones-and-critical-infrastructure.aspx. December 2016. Accessed June 2020

  21. Dewey, J.: Democracy in education. Elementary School Teacher 4(4), 193–204 (1903)

    Article  Google Scholar 

  22. Di Pietro, R., Oligeri, G.: Silence is golden: exploiting jamming and radio silence to communicate. ACM Trans. Inf. Syst. Secur. 17(3), 9:1–9:24 (2015). https://doi.org/10.1145/2699906. http://doi.acm.org/10.1145/2699906

    Article  Google Scholar 

  23. Ding, F., Yang, Z., Chen, X., Guo, J.: Effective methods to avoid the internet censorship. In: 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming. pp. 67–71. IEEE (2011)

    Google Scholar 

  24. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. Tech. rep, Naval Research Lab Washington DC (2004)

    Book  Google Scholar 

  25. Dobbertin, H.: Cryptanalysis of md4. In: International Workshop on Fast Software Encryption. pp. 53–69. Springer (1996)

    Google Scholar 

  26. Dobbertin, H.: Cryptanalysis of md5 compress. Technical report, Presented at the Rump Session of EuroCrypt (1996)

    Google Scholar 

  27. Dobbertin, H.: The status of md5 after a recent attack. Crypto-Bytes The technical newsletter of RSA Laboratories, a division of RSA Data Security, Inc. vol. 2, no. (2) (1996)

    Google Scholar 

  28. Dobbertin, H.: Ripemd with two-round compress function is not collision-free. J. Cryptol. 10(1), 51–69 (1997)

    Article  Google Scholar 

  29. Elyashar, A., Bendahan, J., Puzis, R.: Has the online discussion been manipulated? quantifying online discussion authenticity within online social media. arXiv preprint arXiv:1708.02763 (2017)

  30. Eperiesi-Beck, E.: The threat quantum computers pose to modern security. https://www.scmagazineuk.com/the-threat-quantum-computers-pose-to-modern-security/article/709472/. Accessed June 2020

  31. Ferrara, E.: Disinformation and social bot operations in the run up to the 2017 french presidential election (2017)

    Google Scholar 

  32. Fokin, A., et al.: Internet trolling as a tool of hybrid warfare: the case of latvia. Technical report, NATO Strategic Communications Centre of Excellence (1996)

    Google Scholar 

  33. Forelle, M., Howard, P., Monroy-Hernández, A., Savage, S.: Political bots and the manipulation of public opinion in venezuela. arXiv preprint arXiv:1507.07109 (2015)

  34. Fovino, I.N., Carcano, A., Masera, M., Trombetta, A.: An experimental investigation of malware attacks on scada systems. Int. J. Critical Infrastruct. Protect. 2(4), 139–145 (2009)

    Article  Google Scholar 

  35. Gertz, N.: Censorship, Propaganda, and the Production of ‘Shell Shock’ in World War I. Disciplinary Press, Oxford (2009)

    Google Scholar 

  36. Gervais, A., Karame, G., Capkun, S., Capkun, V.: Is bitcoin a decentralized currency? IEEE Secur. Privacy 12(3), 54–60 (2014)

    Article  Google Scholar 

  37. Gill, P., Schapira, M., Goldberg, S.: Let the market drive deployment: a strategy for transitioning to BGP security. In: ACM SIGCOMM Computer Communication Review. vol. 41, pp. 14–25. ACM (2011)

    Google Scholar 

  38. Guriev, S.M., Treisman, D.: How modern dictators survive: cooptation, censorship, propaganda, and repression. CEPR Discussion Paper No. DP10454 (2015)

    Google Scholar 

  39. Handschuh, H., Knudsen, L.R., Robshaw, M.J.: Analysis of SHA-1 in encryption mode. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 70–83. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45353-9_7

    Chapter  MATH  Google Scholar 

  40. Hegelich, S., Janetzko, D.: Are social bots on twitter political actors? empirical evidence from a ukrainian social botnet. In: Tenth International AAAI Conference on Web and Social Media (2016)

    Google Scholar 

  41. Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: USENIX Security Symposium, pp. 129–144 (2015)

    Google Scholar 

  42. Heins, M.: The brave new world of social media censorship. Harv. L. Rev. F. 127, 325 (2013)

    Google Scholar 

  43. Hilvert, J.: Blue Pencil Warriors: Censorship and Propaganda in World War II. University of Queensland Press, Manchester (1984)

    Google Scholar 

  44. Hintz, A.: Social media censorship, privatized regulation, and new restrictions to protest and dissent. Rowman & Littlefield (2015)

    Google Scholar 

  45. Howard, P.N., Kollanyi, B.: Bots, #strongerin, and #brexit: computational propaganda during the uk-eu referendum. SSRN 2798311 (2016)

    Google Scholar 

  46. Hu, Y.C., Perrig, A., Sirbu, M.: SPV: Secure path vector routing for securing BGP. ACM SIGCOMM Comput. Commun. Rev. 34(4), 179–192 (2004)

    Article  Google Scholar 

  47. Ismail, N.: New malware represents biggest threat to critical infrastructure. https://www.information-age.com/new-malware-represents-biggest-threat-critical-infrastructure-123466733/ June 2017. Accessed June 2020

  48. Keshen, J.: Propaganda and censorship during Canada’s Great War. University of Alberta, Edmonton (1996)

    Google Scholar 

  49. Knapp, E.D., Langill, J.T.: Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress (2014)

    Google Scholar 

  50. Kumar, S., Cheng, J., Leskovec, J., Subrahmanian, V.: An army of me: sockpuppets in online discussion communities. In: Proceedings of the 26th International Conference on World Wide Web. pp. 857–866. International World Wide Web Conferences Steering Committee (2017)

    Google Scholar 

  51. La Morgia, M., Mei, A., Raponi, S., Stefa, J.: Time-zone geolocation of crowds in the dark web. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 445–455. IEEE (2018)

    Google Scholar 

  52. MacArthur, J.R.: Second Front: Censorship and Propaganda in the 1991 Gulf War. University of California Press, California (2004)

    Google Scholar 

  53. Mason, A.: CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN). Pearson Higher Education (2004)

    Google Scholar 

  54. Mihaylov, T., Georgiev, G., Nakov, P.: Finding opinion manipulation trolls in news community forums. In: Proceedings of the Nineteenth Conference on Computational Natural Language Learning, pp. 310–314 (2015)

    Google Scholar 

  55. Miller, B., Rowe, D.C.: A survey scada of and critical infrastructure incidents. RIIT 12, 51–56 (2012)

    Article  Google Scholar 

  56. Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: Scada security in the light of cyber-warfare. Comput. Secur. 31(4), 418–436 (2012)

    Article  Google Scholar 

  57. Nobori, D., Shinjo, Y.: \(\{\)VPN\(\}\) gate: a volunteer-organized public \(\{\)VPN\(\}\) relay system with blocking resistance for bypassing government censorship firewalls. In: Proceedings of the 11th \(\{\)USENIX\(\}\) Symposium on Networked Systems Design and Implementation (\(\{\)NSDI\(\}\) 14). pp. 229–241 (2014)

    Google Scholar 

  58. van Oorschot, P.C., Wan, T., Kranakis, E.: On interdomain routing security and pretty secure BGP (PSBGP). ACM Trans. Inf. Syst. Secur. (TISSEC) 10(3), 11 (2007)

    Article  Google Scholar 

  59. Peacock, M., Johnstone, M.N.: Towards detection and control of civilian unmanned aerial vehicles. SRI Security Research Institute, Edith Cowan University, Perth, Western (2013)

    Google Scholar 

  60. Preneel, B., Govaerts, R., Vandewalle, J.: Differential cryptanalysis of hash functions based on block ciphers. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 183–188. ACM (1993)

    Google Scholar 

  61. Ratkiewicz, J., Conover, M.D., Meiss, M., Gonçalves, B., Flammini, A., Menczer, F.M.: Detecting and tracking political abuse in social media. In: Fifth International AAAI Conference on Weblogs and Social Media (2011)

    Google Scholar 

  62. Roberts, A.: Documents on the Laws of War. HeinOnline (2000)

    Google Scholar 

  63. Saarinen, M.-J.O.: Cryptanalysis of block ciphers based on SHA-1 and MD5. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 36–44. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-39887-5_4

    Chapter  Google Scholar 

  64. Security, U.H.: Unmanned aircraft systems (UAS) - critical infrastructure. https://www.dhs.gov/uas-ci. Accessed June 2020

  65. Shadmehr, M., Bernhardt, D.: State censorship. Am. Econ. J.: Microecon. 7(2), 280–307 (2015)

    Google Scholar 

  66. Shi, X., Xiang, Y., Wang, Z., Yin, X., Wu, J.: Detecting prefix hijackings in the internet with argus. In: Proceedings of the 2012 Internet Measurement Conference, pp. 15–28. ACM (2012)

    Google Scholar 

  67. Shmatikov, V., Wang, M.-H.: Timing analysis in low-latency mix networks: attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 18–33. Springer, Heidelberg (2006). https://doi.org/10.1007/11863908_2

    Chapter  Google Scholar 

  68. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, 1994 Proceedings., pp. 124–134. IEEE (1994)

    Google Scholar 

  69. Smith, K.W.: Drone technology: benefits, risks, and legal considerations. Seattle J. Envtl. L. 5, i (2015)

    Google Scholar 

  70. Starbird, K.: Examining the alternative media ecosystem through the production of alternative narratives of mass shooting events on twitter. In: Eleventh International AAAI Conference on Web and Social Media (2017)

    Google Scholar 

  71. Sun, Y., et al.: \(\{\)RAPTOR\(\}\): routing attacks on privacy in tor. In: 24th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 2015), pp. 271–286 (2015)

    Google Scholar 

  72. Waldorf, L.: Censorship and Propaganda in Post-Genocide Rwanda. Pluto Press, London (2007)

    Google Scholar 

  73. Wang, Y., Ji, P., Ye, B., Wang, P., Luo, R., Yang, H.: Gohop: personal vpn to defend from censorship. In: 16th International Conference on Advanced Communication Technology, pp. 27–33. IEEE (2014)

    Google Scholar 

  74. Winter, P., Lindskog, S.: How the great firewall of china is blocking tor. USENIX-The Advanced Computing Systems Association (2012)

    Google Scholar 

  75. Yardley, T.: Scada: issues, vulnerabilities and future directions.; login: the magazine of USENIX & SAGE 33(6), 14–20 (2008)

    Google Scholar 

  76. Zannettou, S., Caulfield, T., De Cristofaro, E., Sirivianos, M., Stringhini, G., Blackburn, J.: Disinformation warfare: Understanding state-sponsored trolls on twitter and their influence on the web. arXiv preprint arXiv:1801.09288 (2018)

  77. Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M.: Practical defenses against BGP prefix hijacking. In: Proceedings of the 2007 ACM CoNEXT Conference, p. 3. ACM (2007)

    Google Scholar 

  78. Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M., Bush, R.: ispy: detecting ip prefix hijacking on my own. IEEE/ACM Trans. Network. (TON) 18(6), 1815–1828 (2010)

    Article  Google Scholar 

Download references

Acknowledgement

This publication was partially supported by awards NPRP-S-11-0109-180242, UREP23-065-1-014, and NPRP X-063-1-014 from the QNRF-Qatar National Research Fund, a member of The Qatar Foundation. The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Roberto Di Pietro , Maurantonio Caprolu or Simone Raponi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Di Pietro, R., Caprolu, M., Raponi, S. (2020). Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues. In: Mori, P., Furnell, S., Camp, O. (eds) Information Systems Security and Privacy. ICISSP 2019. Communications in Computer and Information Science, vol 1221. Springer, Cham. https://doi.org/10.1007/978-3-030-49443-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-49443-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-49442-1

  • Online ISBN: 978-3-030-49443-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics