Download - The Impact of Information Warfare
-
8/13/2019 The Impact of Information Warfare
1/34
THEIMPACTOFINFORMATIONW
ARFAREIN
NIGERIA
AdedayoStephen
TheImpactofInformationWarfare 1
-
8/13/2019 The Impact of Information Warfare
2/34
Overview
TheImpactofInformationWarfare 2
1. Introduction
2. Definitions
3. MilitaryViewof InformationWarfare
4. Civilian Viewof InformationWarfare
5. ImpactofInformationWarfareonMilitary Sector
6. Impactof
Information
Warfare
on
Private
Sector
7. SecurityMeasures
8. CharacteristicofCyberWar
9. InterviewResult
10. Conclusion
11. References
-
8/13/2019 The Impact of Information Warfare
3/34
1.0Introduction Informationtechnologyhasbroughtalotchangestothewaywarfarearebeingwage
today,agreat
number
of
the
national
infrastructures
in
the
developed
nation
greatly
dependonIT.Theeconomic,social,political,educational,powerandotheractivitiesdependonit.Computersnowcontrolsmostofthecivilianandmilitaryinfrastructure,includingcommunication,powersystems,sewageregulation,andhealthcareandovertwomillioncomputersarebeingusedbytheUSmilitary(Melnick,2007).Libicki(1995)stated,informationwarfareisamilitarywordwhichcanbecategorizedinto;psychologicalwarfare,intelligencebasedwarfare,electronicwarfare,cyberwarfare,
commandand
control
warfare,
economic
information
warfare
and
hacker
warfare.
Internetisnowaverypowerfultoolfortrade,nationalandfinancialdevelopment,itisthelargestcomputernetworkintheworldcomprisingofsmallernetworks,formingthebackbonefordatatransmissionacrossthewholeworldbecauseofthelevelofitsgreatredundancy.ThereliabilityoftheInternethasgeneratedasignificantriseinthevulnerabilityofthenetwork(SecurityFocus,2008).Today,informationwarandcyberwar
cover
wide
area
of
conflict
types
ranging
from
economic,
social,
political,
and
civilian
tomilitaryscopes.Cyberwarfareisgenerallyreferredtoastheuseofinformationtechnologydevicestowedgewarinacommunicationmedium.
TheImpactofInformationWarfare 3
-
8/13/2019 The Impact of Information Warfare
4/34
1.0Introduction (contd)
Cyber
criminals
now
targets
national
infrastructures,
such
as
public
healthsystem,transportation,emergencyservices,waterandsewage,energy,oilandgassystem,financeandbankingsystem,massmedia,andmilitarycommandandcontrol (Wik,2000). Ifcybercriminalsareabletosucceedintheirattacksbydisruptingorstoppingtheessential
informationnetworks
then,
anational
disaster
and
economic
loses.
TheimpactoftheinformationwarfareanditsassociatedriskisveryhighbasedontheincidentreportstoComputerEmergencyResponseTeamCoordinationCenter(CERT/CC)(CERTStatistics,2009).
Pati(2007)
stated,
cybercrime
incidents
reported
can
be
categorize
as
;casesinvolvingindividualslikeprovocationthroughemails,cyber
stalking,slander,hacking,crackingandoffensivedisclosure.Casescorporateorganizationreportedarecomputerdamage,intruding,hacking,cracking,cyberterrorism,andvirusdissemination.
TheImpactofInformationWarfare 4
-
8/13/2019 The Impact of Information Warfare
5/34
2.0Definitions
InformationWarfarehasmanydefinitions.
Haeni(1997)defineIWas;Actionstakentoachieveinformationsuperioritybyaffectingadversary
information,informationbasedprocesses,informationsystems,andcomputerbasednetworkswhile
defendingone'sowninformation,informationbasedprocesses,informationsystems,andcomputer
basednetworks.
Informationwarfareisreferredtoby Nunes(2001)astoperformthesametasksweusedtoperform
butatamuchfasterratebyoccasionallyusingequipmentderivedfromoursocietystechnological
evolution.
Littleton(1995)
in
his
thesis
stated
that
Information
based
Warfare
is
an
approach
to
armed
conflict
focusingonthemanagementanduseofinformationinallitsformsandatalllevelstoachievea
decisivemilitaryadvantageespeciallyinthejointandcombinedenvironment.
Otherdefinitionusedinclude,Cyberwarreferstoconducting,andpreparingtoconduct,military
operationsaccordingtoinformationrelatedprinciples.(Arquilla&Ronfeldt,1997)
ThewordNetwarwasusedbyreferstoinformationrelatedconflictatagrandlevelbetweennations
orsocieties(Arquilla&Ronfeldt,1997)
TheImpactofInformationWarfare 5
-
8/13/2019 The Impact of Information Warfare
6/34
-
8/13/2019 The Impact of Information Warfare
7/34
-
8/13/2019 The Impact of Information Warfare
8/34
3.0TheMilitaryViewOfInformationWarfare.
TheImpactofInformationWarfare 8
Information
warfare
is
referred
to
as
war
without
armoredtank.A21stcenturycyberwarriorutilizesdigitalequipments;helmetwithdigitaldisplayunit,nightvisionsensor,flatvideopanel,computersystem
withchemical
and
bomb
detector,
Global
Positioning
System GPS(Haeni,1997). Theintegratedwirelessandthethermalsightsystemallowseasytrackingofthe
soldierin
the
battlefield.
Today
the
military
uses
the
command,control,communication,computerandintelligenceusuallycalledC4Iininformationwarfare.
-
8/13/2019 The Impact of Information Warfare
9/34
3.0The
Military
View
of
InformationWarfare.(contd)
Soft
war
is
another
form
of
information
warfare
used
by
themilitary;theaimistowrongfullyinformtheenemywithfalseormanipulatedinformation.Thesecouldbeinfromoftelevisionbroadcastincombinationwith
signaljamming(Haeni,
1997).
Cyber
warfare
is
possible
withouttheloseof livesorequipment(Kelsey,2008).
Informationwarfare consistofoffensive,defensiveand
passivecomponents(DeVries,
1997)
TheImpactofInformationWarfare 9
-
8/13/2019 The Impact of Information Warfare
10/34
3.1OffensiveInformation
Warfare
Thisis
define
as
taking
full
control
of
the
enemys
information,computerandcontrolsystemsusinginformationweapons.OffensiveWeaponsinclude:
computer
virus,
logic
bombs,
worms,
trajan
horses,
back
doors,trapdoors,chipping,electronicjamming,HERFguns,nanomachines,andmicrobes(Haeni,1997).Thetoolscanbeinformofsoftwarecodeorhardwaredevice
withability
to
perform
dangerous
operation,
which
can
causepartialortotalbreakdownoftheenemyscomputersystem,infrastructureornetworks.
10TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
11/34
3.2 DefensiveInformationWarfare
Themainsecuritymeasuresemployedindefensive
Information
warfare
are
physical
security,
electronics
countermeasureandencryptionmethods.Henceprotectingsystemavailabilityanddataconfidentialityareveryimportant.(Kaomea,n.d).Countermeasures
usedin
modern
day
Information
warfare
are
intrusion
detectorsystems,antivirussoftware,encryption,vulnerabilityscannersandsecurityanalysissoftware
(Hrovat,
2001).
11TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
12/34
3.3Passive
Information
Warfare
Passiveweaponsareharmless,consistingofsurveillance
equipment
used
in
information
warfare,
an
example
is
duringthebuildingoftheU.S.EmbassyinMoscowinthe1980s,whentheSovietworkersburiedthousandsofelectronicdiodesintotheconcreteslabsforthepurpose
ofsecret
surveillance.
This
weaponry
does
not
leave
anytraceorharmfuleffectonthevictims.(Schwartau,1996)
12TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
13/34
3.4Information
Weaponries
"Avirusisacodefragmentthatcopiesitselfintoa
larger
program,
modifying
that
program.
A
virus
executesonlywhenitshostprogrambeginstorun.Thevirusthenreplicatesitself,infectingotherprogramsasitreproduces."(Russell&Gangemi,2006)
"Aworm
is
an
independent
program.
It
reproduces
by
copyingitselfinfullblownfashionfromonecomputertoanother,usuallyoveranetwork.Unlikeavirus,it
usuallydoesn't
modify
other
programs."
(Russell
&
Gangemi,2006)
13TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
14/34
3.4InformationWeaponries
(contd)
"ATrojanhorseisacodefragmentthathidesinsidea
program
and
performs
a
disguised
function.
It's
a
popularmechanismfordisguisingavirusoraworm"(Russell&Gangemi,2006)
"AbombisatypeofTrojanhorse,usedtoreleaseavirus,
aworm
or
some
other
system
attack.
It's
either
an
independentprogramorapieceofcodethat'sbeenplantedbyasystemdeveloperorprogrammer."(Russell
&Gangemi,
2006)
Surveillancesystem,satellitessystems,SignalsandHumanIntelligence(C4ISRandIW,n.d)
14TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
15/34
3.4InformationWeaponries
(contd)
"Atrapdoor,orabackdoor,isamechanismthat'sbuilt
into
a
system
by
its
designer.
The
function
of
a
trap
door
istogivethedesignerawaytosneakbackintothesystem,circumventingnormalsystemprotection."(Russell&Gangemi,2006)
Chippingis
aprocess
of
implanting
tiny
electronics
chip
intohardwaretoperformanunexpectedfunctionbythemanufacturer.Thefunctionincludesendingradiosignal
toaspecific
location,
total
breakdown
and
unexpected
performancewhenremotelytriggeredbyaspecificfrequencysignal(Haeni,1997).
15TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
16/34
3.4In ormationWeaponries
(contd)
NanomachineandMicrobes;thisarespecialbredofmicroorganismandtinyrobotswithabilitytodestroy
integratedcircuits,
computer
system
,buildings
or
completelyshutdownsystems(Haeni,1997).
Electronicjammingareusedtodestruct
communicationsignals
or
overshadow
signal
with
incorrectinformationtodeceivetheaudience(Haeni,1997).
High
Energy
Radio
Frequency(
HERF)
gun
and
ElectroMagneticPulse(EMP)bombareusedtoshutdownelectronicdevicesorcompletelydestroyit(Haeni,1997).
16TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
17/34
4.0Civilian viewof Information
Warfare
Withtheintroductionofinformationand
communication
technology
(ICT)
resulting
in
high
securityriskalongthetransmissionmedia,varioussecuritymeasuresarebeingtakenbyindividualandindustriestoreduceinformationrisks.Today,the
confidentiality,integrity
and
availability
of
data
are
so
importanttotheITsystem. TheComputerSecurityInstitutereportedthatin2007,encryptionwasused71%
of
organization
to
send
data
information
while
53%
uses
varioustypesofencryptiontheirdatastorage(Richardson,2008).
17TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
18/34
4.1Encryption
Programs
Currently,varioustypesofencryptionprogramsare
being
design
and
used
to
transmit
information
securely
ontheinformationsuperhighwaysbythecivilians.
Therapid rateofdevelopmentofencryptionnowsupporttheuserofstrong,powerfulencryptionto
protectprivate,
public
communications
network
and
theirdatastorage.Therearenowbetterproductsoffering128bitand256bitencryptionsmakingthe
illegaland
unauthorized
decryption
of
transmitted
informationmoredifficult(Littleton,1995).
18TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
19/34
4.2SecureDigital
Communication
Moderntechnologyindigitalcommunicationhasbroughtalotofimprovementininformationintermsencryptionasawayofreducingsecurityrisk.Thenewcommunicationutilizeddigitalsignatures,therebypreventingunauthorizedinterception,preservingthe
confidentialityand
integrity
of
data
(Littleton,
1995).
Randomencryptionisusedeachtimethephoneisusedmakingguessingtherightkeytodecryptthesignal
difficult
(Littleton,
1995).
19TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
20/34
4.3EMV
Chip
Card
ThereplacementofmagneticstripesmartcardbytheEMVchipcard,ErastusAkingbola,formergroupchiefexecutiveofaNigerianbank,said
"WearemigratingourMasterCardtoEMVChipand
Pincompliance,
and
are
installing
several
automated
processesforcardandPindistributionthatareefficientandsecure.Ofcourseourcardswillprovide100per
cent
transaction
approval
rates.
It
is
a
multi
channel
basedcardfortransactionsviaATM,POSterminals,Kiosk(Peters,2009).
20TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
21/34
4.4RedundantManagement
Systems
Inattempttoreducesecurityrisk,theuseofredundantmanagementsystemsisemployedaswayofquickrecoveryfrominformationsecurityattacks(Littleton,1995).Redundancyisdefinedastheabilityofcertaincomponentsofasystemtoassumefunctionsoffailed
componentswithout
adversely
affecting
the
performanceofthesystemitself(Matalus&Fiering,1977).Buildingofredundancyincommunicationpath
and
backing
up
of
all
information
systems
resources
is
beingusedbycooperateorganizationtomitigateriskofsystemfailuresinceitisraretoattackallthesystemsatatime.
21TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
22/34
5.0ImpactofInformation
Warfareon
Military
Sector
Onethe majorresponsibilityistotowintheinformationwarstated,intheNationalMilitarystrategyoftheUnitedStatesofFebruary1995(DeVries,1997).
Themilitarypowerandnationaleconomydepends
greatlyonly
the
national
information
infrastructures
duetoitsautomatedandnetworkdependantnature.Asaresult,thenationalinformationinfrastructuresis
thecentre
of
all
information
warfare
attack
and
itdependslargelyonelectricpower,computersand
telecommunication(Wik,2000).
22TheImpactofInformationWarfare
-
8/13/2019 The Impact of Information Warfare
23/34
5.0ImpactofInformation
Warfareon
Military
Sector
Contd
Theimpactofinformationarecanbegroupedintothreeparts:Organizational,DoctrineandOperation.(Hawkin,1997)
IWhasbroughtnewidealthathelpstheinvestigationandexplorationofnewoperationalandorganizationalconcept
inthe
military.(Hawkin, 1997)
IWhelpstoreduceloses,casualtiesandworkinggroupstoasmallerrate.(Hawkin, 1997)
IWspeedsupoperationwhilecommandandcontrolisworsen.Withlesstimeandwidebattlespace,resultscanbeeasyexamined.(Hawkin, 1997)
TheImpactofInformationWarfare 23
-
8/13/2019 The Impact of Information Warfare
24/34
NationalInformationInfrastructures
Media
Transport
Waterandsewage
EmergencyservicesFinanceandbanking
IndustrialproductionPublichealthandsafety
Energy,oil,andgascontrolOthergovernmentaloperations
Militarycommandandcontrolsystems
TheImpactofInformationWarfare 24
ELECTRIC
POWERTELECOM
COMPUTERS
-
8/13/2019 The Impact of Information Warfare
25/34
6.0
Impact
of
Information
WarfareonPrivateSector Theworldtodayhadmovedfromagrariantoindustrialandfinallyto
informationwave.
The
most
industrial
nations
economy
greatly
dependsoninformationtechnology(Knapp&Boulton,2006).
Computersnowcontroltheelectricpower,telecommunicationsystems,aviationsystemsandthefinancialsector.Medical,business,criminalandothervitarecordsarenowstoredonthecomputersystems(NationalResearchCouncil,1991).
FormalPresidentBush(2003)stated
By2003,oureconomyandnationalsecuritybecamefullydependentuponITandtheinformationinfrastructure.Anetworkofnetworksdirectly
supportsthe
operation
of
all
sectors
of
our
economy,
energy,
transportation, financeandbanking,informationandtelecommunications,publichealth,emergencyservices,water,medical,defenseindustrialbase,food,agriculture,andpostalandshipping.
TheImpactofInformationWarfare 25
-
8/13/2019 The Impact of Information Warfare
26/34
6.0
Impact
of
Information
WarfareonPrivateSectorcontd Since 1994,whenhackersattacksmilitary,civilianand
governmentorganizations
through
the
Griffiss
Air
Force
base
computers.Themajortargetofcyberterroristhavebeingonthecivilianfirms,commercialfirmsand infrastructures.(Strassmann,2001).
In
an
attempt
to
avoid
direct
military
conflict
with
the
U.S
forces.Today,privatesectorandciviliansarenowthemajorfocusof informationwarfare(Adams,2001).
Corporateespionagerateisrapidlyincreasingduetothecurrent
corporatecompetition,
modern
development
in
IT
and
miniaturizationofdigitaldevicesandopeningofinternalnetworkwhichmakemoreinformationavailableforboththeworkersandvendors(Knapp&Boulton,2006).
TheImpactofInformationWarfare 26
-
8/13/2019 The Impact of Information Warfare
27/34
7.0Security
Measures
Protectivemeasureusedbyciviliansecuritypractitionersareredundancy,alternative procedureandemergencyplans(Wik,2000).
Implementingsecuritypolicyandguidelines,properallocationofallresourcesandtraining(Wik,2000).
Accesscontrol
through
the
installation
of
intrusion
detector,vulnerabilityscanners,firewallsystems andnetworksecurityanalyzer(Hrovat,2001).
Information
confidentiality,
integrity
and
availability
measurethroughuserauthentication,encryption,andinstallationofantivirusandInternetsecuritysoftware.
(Uchida,Sugano,&Andou,2006).
TheImpactofInformationWarfare 27
-
8/13/2019 The Impact of Information Warfare
28/34
7.1VulnerabilityScanners/ToolsSomeoftheinformationweaponriesusedbythe militaryand civiliansecurity
practitionersto
acquire
knowledge
about
their
organizational
strategies
and
plansandsecuritymeasurestoreduceinformationrisksare:
NetworkVisualisation,MonitorsandSnifferssoftwares.LikeVisio,NetViz,NetPartitioner,NeoTrace,TraceRoute,Ethload,NetXray,Etherpeak,TCPDump,Snoop,IPWatcher,TsightandScott/Tkined
VulnerabilityAnalysissoftware. LikeISSInternetScanner,KaneSecurityAnalyst,TridentIPToolbox/L3Expert,SecurityProfileInspector(SPI),SNIBallistaandSATAN
Intrusiondetectionsoftware.LikeRealSecure,NetRanger,Stalker/CyberCop,
IntruderAlert,
Network
Flight
Recorder,
SHADOW
and
NIDS
Exploitationsoftware.LikeNTSecurity,RootShell,OfflineNTPasswordUtility,LophtHeavyIndustries,AntiOnline,Insecure/Fyodor,TCPwrappers,Tripwire,COPS,crack,LophtCrackandScanNT
TheImpactofInformationWarfare 28
-
8/13/2019 The Impact of Information Warfare
29/34
8.0Characteristics
of
Cyber
war
TargetexitinCyberspacewithrealimpact
Telecommunication
ComputerNetwork
ControlNetwork
Weapons
MaliciousSoftware
EMPWeapons
Datamanipulationanddestruction
Techniques
Virtualdestruction
of
target
in
the
cyberspace
Disablingofsystemsoftware
Overwhelmingofcontrolsystem
Capitalrequiredissmallforlargeimpact
PhysicalriskassociatedisLowforthecybercriminal
Role
of
media
is
moderate
Legalfactorareilldefined
Physicalpresence notrequiredforsuccessfulattack(boundaryless)
Attackcanhave any effectsfocusedordiffused
Treatcreatedare inthevirtualandphysical
TheImpactofInformationWarfare 29
-
8/13/2019 The Impact of Information Warfare
30/34
InterviewQuestionandResult Theinterviewconductedshowsthatmostpeopleinthedevelopingcountriesarecompletelyignorant
of
information
warfare
and
cyber
war.
I
interviewed
two
military
officials
from
Nigerian
Defense
AcademyKadunaandNigerianWarCollegeAbujawhobothclaimedtobeunawareoftheterminformationwarfare.Also,fromtheinterviewconducteditshowsthatmostoftheciviliansandmilitaryofficialsinterviewedclaimedtobecompletelyignorantofinformationwarfareandcyberwarfare.AllthepeopleIinterviewedclaimedtohavenoideaofinformationandcyberwarfare.
Someofthequestionaskedboththecivilianandmilitarysecuritypractitionersare;1. Whatisinformationwarfare
2. Whataretheinformationsecuritymeasuresusedinyourorganization?
3. Whatarethecausesofinformationsecurityfailuresinyourorganization?
4. Whataretheinformationwarfaresecuritymeasuresimplementedinyourorganizationalplanningandstrategic?
5. HowwillyouassestheeffectivenessoftheinformationsecuritymeasureusedIyourorganization?
6. Evaluatethestateofinformationsecuritymeasuresinyourorganization?
Sincealotofthepeoplearoundmeseemnottobeawareofthisnewtopicduetothelowtechnologicaldevelopmentofthedevelopingcountries.WhichBrazzoli(2007)referstothisasthelowAfricantechnologyscenarioandmaybeintheyear2020thefirstAfricancountrywillwaketoinformationwarfarecapability.Itiscompletelydifficultformetocompletethisassignmentwithanyinterviewresultbecause100%ofthepeopleinterviewedclaimedtohavenoideaofinformationandcyberwarfare.
TheImpactofInformationWarfare 30
-
8/13/2019 The Impact of Information Warfare
31/34
Conclusion
TheincreasingoverdependencyofoureconomyandinfrastructuresonITsystemcreatedahighlevelofsecurity
risks
resulting
from
inexpensive
cost
of
cyber
attacksisofgreatconcernstoboththepublic,privateandmilitarysectors.Informationwarfareisatwo
edgedsword,
acountry
capable
of
waging
IW
is
also
veryvulnerability.Currently,securitytreataremorethatthesolutionwehaveandthecostofpreventinginformationwarfareisfarbeyondthecostoftheattack.Itisthereforenecessaryfomthegovernmentandagencyinvolvedtobemorecommittedandeffective.
TheImpactofInformationWarfare 31
-
8/13/2019 The Impact of Information Warfare
32/34
References
Adams,J.(2001).VirtualDefense.RetrievedfromForeignAffairs:http://www.foreignaffairs.com/articles/57037/jamesadams/virtualdefense
Arquilla,J.&Ronfeldt,D.(1997).Retrievedfromhttp://www.rand.org/pubs/reprints/2007/RAND_RP223.pdf
Brazzoli,S.M.(2007).Futureprospectsofinformationwarfareandparticularlypsychologicaloperations..Retrievedfrom
http://www.iss.org.za/uploads/SA2020CHAP13.PDF
Bush,G.W.(2003).NationalStrategytoSecureCyberspace.Retrievedfromhttp://www.whitehouse.
C4ISRandInformationWarfare.NavalWeaponsSystems.(n.d).Retrievedfrom
http://www.owlnet.rice.edu/~nava201/presentations/Lecture19.ppt
DeVries,A.(1997).InformationWarfareandItsImpactonNationalSecurity(U).Retrievedfromhttp://www.dtic.mil/cgi
bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA325003
Haeni,R.E.(1997).InformationWarfareanIntroduction.Retrievedfromhttp://www.trinity.edu/rjensen/infowar.pdf
Hrovat,E.(2001).InformationWarfare:TheUnconventionalArtInADigitalWorld.Retrievedfrom
http://www.sans.org/reading_room/whitepapers/warfare/informationwarfareunconventionalartdigitalworld_787
Kaomea,P.(n.d.).BeyondSecurity:ADataQualityPerspectiveonDefensiveInformationWarfare.Retrievedfrom
http://mitiq.mit.edu/iciq/Documents/IQ%20Conference%201996/Keynote%20and%20Lunch%20Speeches/Beyond%20Security.pdf
Kelsey,J.T.(2008).HackingintoInternationalHumanitarianLaw:ThePrinciplesofDistinctionandNeutralityintheAgeofCyberWarfare.
Retrievedfromhttp://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bsh&AN=32010233&site=ehost
live
TheImpactofInformationWarfare 32
-
8/13/2019 The Impact of Information Warfare
33/34
-
8/13/2019 The Impact of Information Warfare
34/34
THANKYOUTheImpactofInformationWarfare 34