Cyberwarfare
This article is part of a series on |
Information security |
---|
Related security categories |
Threats |
Defenses |
Part of a series on | ||||||||||||||||||||||||||||
War | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Cyberwarfare
Cyberwarfare involves the battlespace use and targeting of computers,[1] online control systems[1] and networks[1] in warfare.[1] It involves both offensive and defensive operations pertaining to the threat of cyberattacks, espionage and sabotage.[1]
There has been controversy over whether such operations can be called
"war". Nevertheless, nations have been developing their capabilities and
engaged in cyberwarfare either as an aggressor, defendant, or both. The
United States, China, Russia, Israel and the United Kingdom are believed to have the most developed cyber warfare capabilities. Two other notable players are Iran and North Korea.[2]
ContentsDefinition
A number of definitions of cyber warfare have been proposed, with no single definition being widely adopted internationally. Richard A. Clarke
has defined it as "actions by a nation-state to penetrate another
nation's computers or networks for the purposes of causing damage or
disruption",[3]:6.
Martin Libicki defines two types of cyber warfare: strategic and
operational. Strategic being "a campaign of cyberattacks one entity
carries out on another", whilst operational cyber warfare "involves the
use of cyberattacks on the other side’s military in the context of a
physical war."[4]
Other definitions also include non-state actors, such as terrorist
groups, companies, political or ideological extremist groups, hacktivists, and transnational criminal organizations.[5][6][7][8][9]
Some governments have made it an integral part of their overall
military strategy, with some having invested heavily in cyberwarfare
capability.[10][11][12][13] One kind of cyberwarfare involves the kind of hacking that is the concern of penetration testing;
in such cases, a government entity has established it as a warfighting
capability, or a non-governmental entity has used it as a weapon against
a state or its concerns.[14]
This capability uses the same set of penetration testing
methodologies but applies them, in the case of United States doctrine,
in a strategic way to
Types of threat
Cyber
warfare can present a multitude of threats towards a nation. At the
most basic level, cyber attacks can be used to support traditional
warfare. For example, tampering with the operation of air defences via
cyber means in order to facilitate an air attack[16]. Aside from these "hard" threats, cyber warfare can also contribute towards "soft" threats such as espionage and propaganda.
EspionageTraditional espionage is not an act of war, nor is cyber-espionage,[17] and both are generally assumed to be ongoing between major powers. Despite this assumption, some incidents can cause serious tensions between nations, and are often described as "attacks". For example:
SabotageComputers and satellites that coordinate other activities are vulnerable components of a system and could lead to the disruption of equipment. Compromise of military systems, such as C4ISTAR components that are responsible for orders and communications could lead to their interception or malicious replacement. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to disruption. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.[24]In mid July 2010, security experts discovered a malicious software program called Stuxnet that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes The New York Times.[25] Stuxnet, while extremely effective in delaying Iran's nuclear program for the development of nuclear weaponry, came at a high cost. For the first time, it became clear that not only could cyber weapons be defensive but they could be offensive. The large decentralization and scale of cyberspace makes it extremely difficult to direct from a policy perspective. Non-state actors can play as large a part in the cyberwar space as state actors, which leads to dangerous, sometimes disastrous, consequences. Small groups of highly skilled malware developers are able to as effectively impact global politics and cyber warfare as large governmental agencies. A major aspect of this ability lies in the willingness of these groups to share their exploits and developments on the web as a form of arms proliferation. This allows lesser hackers to become more proficient in creating the large scale attacks that once only a small handful were skillful enough to manage. In addition, thriving black markets for these kinds of cyber weapons are buying and selling these cyber capabilities to the highest bidder without regard for consequences.[26] Denial-of-service attackIn computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. DoS attacks may not be limited to computer-based methods, as strategic physical attacks against infrastructure can be just as devastating. For example, cutting undersea communication cables may severely cripple some regions and countries with regards to their information warfare ability.Electrical power gridThe federal government of the United States admits that the electric power grid is susceptible to cyberwarfare.[27][28] The United States Department of Homeland Security works with industries to identify vulnerabilities and to help industries enhance the security of control system networks. The federal government is also working to ensure that security is built in as the next generation of "smart grid" networks are developed.[29] In April 2009, reports surfaced that China and Russia had infiltrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national security officials.[30] The North American Electric Reliability Corporation (NERC) has issued a public notice that warns that the electrical grid is not adequately protected from cyber attack.[31] China denies intruding into the U.S. electrical grid.[32][33] One countermeasure would be to disconnect the power grid from the Internet and run the net with droop speed control only.[34][35] Massive power outages caused by a cyber attack could disrupt the economy, distract from a simultaneous military attack, or create a national trauma.Howard Schmidt, former Cyber-Security Coordinator of the US, commented on those possibilities:[36] It's possible that hackers have gotten into administrative computer systems of utility companies, but says those aren't linked to the equipment controlling the grid, at least not in developed countries. [Schmidt] has never heard that the grid itself has been hacked.On 23 December 2015, what is believed to be a first known successful cyber attack on a power grid took place in Ukraine leading to temporary blackouts.[37] The cyber attack is attributed to the Russian advanced persistent threat group called "Sandworm"[38] and it was performed during an ongoing military confrontation. PropagandaCyber propaganda is an effort to control information in whatever form it takes, and influence public opinion.[39] It is a form of psychological warfare, except it uses social media, fake news websites and other digital means. In 2018, Sir Nicholas Carter, Chief of the General Staff of the British Army stated that this kind of attack from actors such as Russia "is a form of system warfare that seeks to de-legitimise the political and social system on which our military strength is based".[40]Jowell and O'Donnell (2006) state that "propaganda is the deliberate, systematic attempt to shape perceptions, manipulate cognitions, and direct behavior to achieve a response that furthers the desired intent of the propagandist" (p. 7). The internet is a phenomenal means of communication. People can get their message across to a huge audience, and with this opens a window for evil. Terrorist organizations can use this medium to brainwash people. It has been suggested that restricted media coverage of terrorist attacks would in turn decrease the amount of terrorist attacks that occur afterwards (Cowen 2006). If this is the case, an interesting perspective to look for in the data would be the ties that connect the media, propaganda, and the communicative messages that are being conveyed.[41] MotivationsMilitaryIn the U.S., General Keith B. Alexander, first head of USCYBERCOM, told the Senate Armed Services Committee that computer network warfare is evolving so rapidly that there is a "mismatch between our technical capabilities to conduct operations and the governing laws and policies. Cyber Command is the newest global combatant and its sole mission is cyberspace, outside the traditional battlefields of land, sea, air and space." It will attempt to find and, when necessary, neutralize cyberattacks and to defend military computer networks.[42]Alexander sketched out the broad battlefield envisioned for the computer warfare command, listing the kind of targets that his new headquarters could be ordered to attack, including "traditional battlefield prizes – command-and-control systems at military headquarters, air defense networks and weapons systems that require computers to operate."[42] One cyber warfare scenario, Cyber ShockWave, which was wargamed on the cabinet level by former administration officials, raised issues ranging from the National Guard to the power grid to the limits of statutory authority.[43][44][45][46] The distributed nature of internet based attacks means that it is difficult to determine motivation and attacking party, meaning that it is unclear when a specific act should be considered an act of war.[47] Examples of cyberwarfare driven by political motivations can be found worldwide. In 2008, Russia began a cyber attack on the Georgian government website, which was carried out along with Georgian military operations in South Ossetia. In 2008, Chinese 'nationalist hackers' attacked CNN as it reported on Chinese repression on Tibet.[48] Jobs in cyberwarfare have become increasingly popular in the military. All four branches of the United States military actively recruit for cyber warfare positions.[49] CivilPotential targets in internet sabotage include all aspects of the Internet from the backbones of the web, to the internet service providers, to the varying types of data communication mediums and network equipment. This would include: web servers, enterprise information systems, client server systems, communication links, network equipment, and the desktops and laptops in businesses and homes. Electrical grids, financial networks, and telecommunication systems are also deemed vulnerable, especially due to current trends in computerization and automation.[50]HacktivismPolitically motivated hacktivism involves the subversive use of computers and computer networks to promote an agenda, and can potentially extend to attacks, theft and virtual sabotage that could be seen as cyberwarfare – or mistaken for it.[51] Hacktivists use their knowledge and software tools to gain unauthorized access to computer systems they seek to manipulate or damage not for material gain or to cause widespread destruction, but to draw attention to their cause through well-publicized disruptions of select targets. Anonymous and other hacktivist groups are often portrayed in the media as cyber-terrorists, wreaking havoc by hacking websites, posting sensitive information about their victims, and threatening further attacks if their demands are not met. However, hacktivism is more than that. They are politically motivated to change the world, through the use of fundamentalism. Groups like Anonymous have divided opinion with their methods.[52]Private sectorComputer hacking represents a modern threat in ongoing global conflicts and industrial espionage and as such is presumed to widely occur.[50] It is typical that this type of crime is underreported to the extent they are known. According to McAfee's George Kurtz, corporations around the world face millions of cyberattacks a day. "Most of these attacks don't gain any media attention or lead to strong political statements by victims."[53] This type of crime is usually financially motivated.Non-profit researchBut not all examinations with the issue of cyberwarfare are achieving profit or personal gain. There are still institutes and companies like the University of Cincinnati or the Kaspersky Security Lab which are trying to increase the sensibility of this topic by researching and publishing of new security threats.By regionApproximately 120 countries have been developing ways to use the Internet as a weapon and target financial markets, government computer systems and utilities.[54]AsiaChinaForeign Policy magazine puts the size of China's "hacker army" at anywhere from 50,000 to 100,000 individuals.[55]Diplomatic cables highlight US concerns that China is using access to Microsoft source code and 'harvesting the talents of its private sector' to boost its offensive and defensive capabilities.[56] A 2008 article in the Culture Mandala: The Bulletin of the Centre for East-West Cultural and Economic Studies by Jason Fritz alleges that the Chinese government from 1995 to 2008 was involved in a number of high-profile cases of espionage, primarily through the use of a "decentralized network of students, business people, scientists, diplomats, and engineers from within the Chinese Diaspora".[57] A defector in Belgium, purportedly an agent, claimed that there were hundreds of spies in industries throughout Europe, and on his defection to Australia Chinese diplomat Chen Yonglin said there were over 1,000 such in that country. In 2007, a Russian executive was sentenced to 11 years for passing information about the rocket and space technology organization to China. Targets in the United States have included 'aerospace engineering programs, space shuttle design, C4ISR data, high-performance computers, Nuclear weapon design, cruise missile data, semiconductors, integrated circuit design, and details of US arms sales to Taiwan'.[57] While China continues to be held responsible for a string of cyber-attacks on a number of public and private institutions in the United States, India, Russia, Canada, and France, the Chinese government denies any involvement in cyber-spying campaigns. The administration maintains the position that China is not the threat but rather the victim of an increasing number of cyber-attacks. Most reports about China's cyber warfare capabilities have yet to be confirmed by the Chinese government.[58]
According to Fritz, China has expanded its cyber capabilities and military technology by acquiring foreign military technology.[59] Fritz states that the Chinese government uses "new space-based surveillance and intelligence gathering systems, Anti-satellite weapon,
anti-radar, infrared decoys, and false target generators" to assist in
this quest, and that they support their "informationization" of their
military through "increased education of soldiers in cyber warfare;
improving the information network for military training, and has built
more virtual laboratories, digital libraries and digital campuses."[59]
Through this informationization, they hope to prepare their forces to
engage in a different kind of warfare, against technically capable
adversaries.[60] Many recent news reports link China's technological capabilities to the beginning of a new 'cyber cold war.'[61]
In response to reports of cyberattacks by China against the United States, Amitai Etzioni
of the Institute for Communitarian Policy Studies has suggested that
China and the United States agree to a policy of mutually assured
restraint with respect to cyberspace. This would involve allowing both
states to take the measures they deem necessary for their self-defense
while simultaneously agreeing to refrain from taking offensive steps; it
would also entail vetting these commitments.[62]
Operation Shady RAT is an ongoing series of cyber attacks starting mid-2006, reported by Internet security company McAfee
in August 2011. China is widely believed to be the state actor behind
these attacks which hit at least 72 organizations including governments
and defense contractors.[63]
India
The Department of Information Technology created the Indian Computer Emergency Response Team (CERT-In) in 2004 to thwart cyber attacks in India.[64]
That year, there were 23 reported cyber security breaches. In 2011,
there were 13,301. That year, the government created a new subdivision,
the National Critical Information Infrastructure Protection Centre (NCIIPC) to thwart attacks against energy, transport, banking, telecom, defence, space and other sensitive areas.
The Executive Director of the Nuclear Power Corporation of India
(NPCIL) stated in February 2013 that his company alone was forced to
block up to ten targeted attacks a day. CERT-In was left to protect less
critical sectors.
A high-profile cyber attack on 12 July 2012 breached the email
accounts of about 12,000 people, including those of officials from the Ministry of External Affairs, Ministry of Home Affairs, Defence Research and Development Organisation (DRDO), and the Indo-Tibetan Border Police (ITBP).[64] A government-private sector plan being overseen by National Security Advisor (NSA) Shivshankar Menon
began in October 2012, and intends to beef up India's cyber security
capabilities in the light of a group of experts findings that India
faces a 470,000 shortfall of such experts despite the country's
reputation of being an IT and software powerhouse.[65]
In February 2013, Information Technology Secretary J. Satyanarayana stated that the NCIIPC[page needed]
was finalizing policies related to national cyber security that would
focus on domestic security solutions, reducing exposure through foreign
technology.[64]
Other steps include the isolation of various security agencies to
ensure that a synchronised attack could not succeed on all fronts and
the planned appointment of a National Cyber Security Coordinator. As of
that month, there had been no significant economic or physical damage to
India related to cyber attacks.
On 26 November 2010, a group calling itself the Indian Cyber Army
hacked the websites belonging to the Pakistan Army and the others belong
to different ministries, including the Ministry of Foreign Affairs,
Ministry of Education, Ministry of Finance, Pakistan Computer Bureau,
Council of Islamic Ideology, etc. The attack was done as a revenge for
the Mumbai terrorist attacks.[66]
On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the Central Bureau of Investigation (CBI). The National Informatics Center (NIC) has begun an inquiry.[67]
In July 2016, Cymmetria researchers discovered and revealed the cyber
attack dubbed 'Patchwork', which compromised an estimated 2500
corporate and government agencies using code stolen from GitHub and the dark web.
Examples of weapons used are an exploit for the Sandworm vulnerability
(CVE-2014-4114), a compiled AutoIt script, and UAC bypass code dubbed
UACME. Targets are believed to be mainly military and political
assignments around Southeast Asia and the South China Sea and the
attackers are believed to be of Indian origin and gathering intelligence
from influential parties.[68][69]
Philippines
The
Chinese are being blamed after a cybersecurity company, F-Secure Labs,
found a malware, NanHaiShu, which targeted the Philippines Department of
Justice. It sent information in an infected machine to a server with a
Chinese IP address. The malware which is considered particularly
sophisticated in nature was introduced by phishing emails that were
designed to look like they were coming from an authentic sources. The
information sent is believed to be relating to the South China Sea legal
case.[70]
Russia
When Russia was still the Soviet Union in 1982, a portion of its Trans-Siberia pipeline within its territory exploded, allegedly due to computer malware implanted in the pirated Canadian software by the Central Intelligence Agency.
The malware caused the SCADA system running the pipeline to
malfunction. The "Farewell Dossier" provided information on this attack,
and wrote that compromised computer chips would become a part of Soviet
military equipment, flawed turbines would be placed in the gas
pipeline, and defective plans would disrupt the output of chemical
plants and a tractor factor. This caused the "most monumental nonnuclear
explosion and fire ever seen from space." However, the Soviet Union did
not blame the United States for the attack.[71]
Russian, South Ossetian, Georgian and Azerbaijani sites were attacked by hackers during the 2008 South Ossetia War.[72]
Russian-led cyberattacks
It has been claimed that Russian security services organized a number of denial of service attacks as a part of their cyber-warfare against other countries,[73] most notably the 2007 cyberattacks on Estonia and the 2008 cyberattacks on Russia, South Ossetia, Georgia, and Azerbaijan.[74] One identified young Russian hacker said that he was paid by Russian state security services to lead hacking attacks on NATO computers. He was studying computer sciences at the Department of the Defense of Information. His tuition was paid for by the FSB.[75]
South Korea
In July 2009, there were a series of coordinated denial of service attacks against major government, news media, and financial websites in South Korea and the United States.[76] While many thought the attack was directed by North Korea, one researcher traced the attacks to the United Kingdom.[77] Security researcher Chris Kubecka presented evidence multiple European Union and United Kingdom companies unwittingly helped attack South Korea due to a W32.Dozer
infections, malware used in part of the attack. Some of the companies
used in the attack were partially owned by several governments, further
complicating attribution.[78]
With ongoing tensions on the Korean Peninsula, South Korea's defense ministry stated that South Korea was going to improve cyber-defense strategies in hopes of preparing itself from possible cyber attacks. In March 2013, South Korea's major banks – Shinhan Bank, Woori Bank and NongHyup Bank – as well as many broadcasting stations – KBS, YTN and MBC – were hacked and more than 30,000 computers were affected; it is one of the biggest attacks South Korea has faced in years.[80] Although it remains uncertain as to who was involved in this incident, there has been immediate assertions that North Korea is connected, as it threatened to attack South Korea's government institutions, major national banks and traditional newspapers numerous times – in reaction to the sanctions it received from nuclear testing and to the continuation of Foal Eagle, South Korea's annual joint military exercise with the United States. North Korea's cyber warfare capabilities raise the alarm for South Korea, as North Korea is increasing its manpower through military academies specializing in hacking. Current figures state that South Korea only has 400 units of specialized personnel, while North Korea has more than 3,000 highly trained hackers; this portrays a huge gap in cyber warfare capabilities and sends a message to South Korea that it has to step up and strengthen its Cyber Warfare Command forces. Therefore, in order to be prepared from future attacks, South Korea and the United States will discuss further about deterrence plans at the Security Consultative Meeting (SCM). At SCM, they plan on developing strategies that focuses on accelerating the deployment of ballistic missiles as well as fostering its defense shield program, known as the Korean Air and Missile Defense.[81] North KoreaEuropeEstoniaIn April 2007, Estonia came under cyber attack in the wake of relocation of the Bronze Soldier of Tallinn.[82] The largest part of the attacks were coming from Russia and from official servers of the authorities of Russia.[83] In the attack, ministries, banks, and media were targeted.[84][85] This attack on Estonia, a seemingly small Baltic nation, was so effective because of how most of the nation is run online. Estonia has implemented an e-government, where bank services, political elections and taxes are all done online. This attack really hurt Estonia's economy and the people of Estonia. At least 150 people were injured on the first day due to riots in the streets.[86]GermanyIn 2013, Germany revealed the existence of their 60-person Computer Network Operation unit.[87] The German intelligence agency, BND, announced it was seeking to hire 130 "hackers" for a new "cyber defence station" unit. In March 2013, BND president Gerhard Schindler announced that his agency had observed up to five attacks a day on government authorities, thought mainly to originate in China. He confirmed the attackers had so far only accessed data and expressed concern that the stolen information could be used as the basis of future sabotage attacks against arms manufacturers, telecommunications companies and government and military agencies.[88] Shortly after Edward Snowden leaked details of the U.S. National Security Agency's cyber surveillance system, German Interior Minister Hans-Peter Friedrich announced that the BND would be given an additional budget of 100 million Euros to increase their cyber surveillance capability from 5% of total internet traffic in Germany to 20% of total traffic, the maximum amount allowed by German law.[89]NetherlandsIn the Netherlands, Cyber Defense is nationally coordinated by the National Cyber Security Centrum (NCSC).[90] The Dutch Ministry of Defense laid out a cyber strategy in 2011.[91] The first focus is to improve the cyber defense handled by the Joint IT branch (JIVC). To improve intel operations the intel community in the Netherlands (including the military intel organization MIVD) has set up the Joint Sigint Cyber Unit (JSCU). The ministry of Defense is furthermore setting up an offensive cyber force, called Defensie Cyber Command (DCC),[92] which will be operational in the end of 2014.NorwaySwedenIn January 2017, Sweden's armed forces were subjected to a cyber-attack that caused them to shutdown a so-called Caxcis IT system used in military exercises.[93]UkraineAccording to CrowdStrike from 2014 to 2016, the Russian APT Fancy Bear used Android malware to target the Ukrainian Army's Rocket Forces and Artillery. They distributed an infected version of an Android app whose original purpose was to control targeting data for the D-30 Howitzer artillery. The app, used by Ukrainian officers, was loaded with the X-Agent spyware and posted online on military forums. The attack was claimed by CrowdStrike to be successful, with more than 80% of Ukrainian D-30 Howitzers destroyed, the highest percentage loss of any artillery pieces in the army (a percentage that had never been previously reported and would mean the loss of nearly the entire arsenal of the biggest artillery piece of the Ukrainian Armed Forces[94]).[95] According to the Ukrainian army this number is incorrect and that losses in artillery weapons "were way below those reported" and that these losses "have nothing to do with the stated cause".[96]In 2014, the Russians were suspected to use a cyber weapon called "Snake", or "Ouroboros," to conduct a cyber attack on Ukraine during a period of political turmoil. The Snake tool kit began spreading into Ukrainian computer systems in 2010. It performed Computer Network Exploitation (CNE), as well as highly sophisticated Computer Network Attacks (CNA).[97] On December 23, 2015 the BlackEnergy malware was used in a cyberattack on Ukraine's powergrid that left more than 200,000 people temporarily without power. A mining company and a large railway operator were also victims of the attack.[98] United KingdomMI6 reportedly infiltrated an Al Qaeda website and replaced the instructions for making a pipe bomb with the recipe for making cupcakes.[99]In October 2010, Iain Lobban, the director of the Government Communications Headquarters (GCHQ), said the UK faces a "real and credible" threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 times each month, such attacks threatened the UK's economic future, and some countries were already using cyber assaults to put pressure on other nations.[100] On 12 November 2013, financial organisations in London conducted cyber war games dubbed 'Waking Shark 2'[101] to simulate massive internet-based attacks against bank and other financial organisations. The Waking Shark 2 cyber war games followed a similar exercise in Wall Street.[102] Middle EastIranIran has been both victim and predator of several cyberwarfare operations. Iran is considered an emerging military power in the field.[103]In September 2010, Iran was attacked by the Stuxnet worm, thought to specifically target its Natanz nuclear enrichment facility. It was a 500-kilobyte computer worm that infected at least 14 industrial sites in Iran, including the Natanz uranium-enrichment plant. Although the official authors of Stuxnet haven’t been officially identified, Stuxnet is believed to be developed and deployed by the United States and Israel.[104] The worm is said to be the most advanced piece of malware ever discovered and significantly increases the profile of cyberwarfare.[105][106] IsraelIn the 2006 war against Hezbollah, Israel alleges that cyber-warfare was part of the conflict, where the Israel Defense Forces (IDF) intelligence estimates several countries in the Middle East used Russian hackers and scientists to operate on their behalf. As a result, Israel attached growing importance to cyber-tactics, and became, along with the U.S., France and a couple of other nations, involved in cyber-war planning. Many international high-tech companies are now locating research and development operations in Israel, where local hires are often veterans of the IDF's elite computer units.[107] Richard A. Clarke adds that "our Israeli friends have learned a thing or two from the programs we have been working on for more than two decades."[3]:8In September 2007, Israel carried out an airstrike on Syria dubbed Operation Orchard. U.S. industry and military sources speculated that the Israelis may have used cyberwarfare to allow their planes to pass undetected by radar into Syria.[108][109] Saudi ArabiaOn August 15, 2012 at 11:08 am local time, the Shamoon virus began destroying over 35,000 computer systems, rendering them inoperable. The virus used to target the Saudi government by causing destruction to the state owned national oil company Saudi Aramco. The attackers posted a pastie on PasteBin.com hours prior to the wiper logic bomb occurring, citing oppression and the Al-Saud regime as a reason behind the attack.[110]Saudi Aramco announced the attack on their Facebook page and went offline again until a company statement was issued on 25 August 2012. The statement falsely reported normal business was resumed on 25 August 2012. However a Middle Eastern journalist leaked photographs taken on 1 September 2012 showing kilometers of petrol trucks unable to be loaded due to backed business systems still inoperable. According to Kubecka, in order to restore operations. Saudi Aramco used its large private fleet of aircraft and available funds to purchase much of the world's hard drives, driving the price up. New hard drives were required as quickly as possible so oil prices were not affected by speculation. By September 1, 2012 gasoline resources were dwindling for the public of Saudi Arabia 17 days after the August 15th attack. RasGas was also affected by a different variant, crippling them in a similar manner.[122] North AmericaUnited StatesCyberwarfare in the United States is a part of the American military strategy of proactive cyber defence and the use of cyberwarfare as a platform for attack.[123] The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war.[124]In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials.[125] In 2017, Representative Mike Rogers, chairman of the U.S. House Permanent Select Committee on Intelligence, for instance, said that "We are in a cyber war in this country, and most Americans don't know it. And we are not necessarily winning. We have got huge challenges when it comes to cybersecurity."[126] U.S. government security expert Richard A. Clarke, in his book Cyber War (May 2010), defines "cyberwarfare" as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption."[3]:6 The Economist describes cyberspace as "the fifth domain of warfare,"[127] and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space."[10] In 2009, president Barack Obama declared America's digital infrastructure to be a "strategic national asset," and in May 2010 the Pentagon set up its new U.S. Cyber Command (USCYBERCOM), headed by General Keith B. Alexander, director of the National Security Agency (NSA), to defend American military networks and attack other countries' systems. The EU has set up ENISA (European Union Agency for Network and Information Security) which is headed by Prof. Udo Helmbrecht and there are now further plans to significantly expand ENISA's capabilities. The United Kingdom has also set up a cyber-security and "operations centre" based in Government Communications Headquarters (GCHQ), the British equivalent of the NSA. In the U.S. however, Cyber Command is only set up to protect the military, whereas the government and corporate infrastructures are primarily the responsibility respectively of the Department of Homeland Security and private companies.[127] In February 2010, top American lawmakers warned that the "threat of a crippling attack on telecommunications and computer networks was sharply on the rise."[128] According to The Lipman Report, numerous key sectors of the U.S. economy along with that of other nations, are currently at risk, including cyber threats to public and private facilities, banking and finance, transportation, manufacturing, medical, education and government, all of which are now dependent on computers for daily operations.[128] In 2009, president Obama stated that "cyber intruders have probed our electrical grids."[129] The Economist writes that China has plans of "winning informationised wars by the mid-21st century". They note that other countries are likewise organizing for cyberwar, among them Russia, Israel and North Korea. Iran boasts of having the world's second-largest cyber-army.[127] James Gosler, a government cybersecurity specialist, worries that the U.S. has a severe shortage of computer security specialists, estimating that there are only about 1,000 qualified people in the country today, but needs a force of 20,000 to 30,000 skilled experts.[130] At the July 2010 Black Hat computer security conference, Michael Hayden, former deputy director of national intelligence, challenged thousands of attendees to help devise ways to "reshape the Internet's security architecture", explaining, "You guys made the cyberworld look like the north German plain."[131] In January 2012, Mike McConnell, the former director of national intelligence at the National Security Agency under president George W. Bush told the Reuters news agency that the U.S. has already launched attacks on computer networks in other countries.[132] McConnell did not name the country that the U.S. attacked but according to other sources it may have been Iran.[132] In June 2012 the New York Times reported that president Obama had ordered the cyber attack on Iranian nuclear enrichment facilities.[133] In August 2010, the U.S. for the first time warned publicly about the Chinese military's use of civilian computer experts in clandestine cyber attacks aimed at American companies and government agencies. The Pentagon also pointed to an alleged China-based computer spying network dubbed GhostNet that was revealed in a research report last year.[134] The Pentagon stated: The People's Liberation Army is using "information warfare units" to develop viruses to attack enemy computer systems and networks, and those units include civilian computer professionals. Commander Bob Mehal, will monitor the PLA's buildup of its cyberwarfare capabilities and will continue to develop capabilities to counter any potential threat.[135]The United States Department of Defense sees the use of computers and the Internet to conduct warfare in cyberspace as a threat to national security. The United States Joint Forces Command describes some of its attributes: Cyberspace technology is emerging as an "instrument of power" in societies, and is becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. With low barriers to entry, coupled with the anonymous nature of activities in cyberspace, the list of potential adversaries is broad. Furthermore, the globe-spanning range of cyberspace and its disregard for national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies.[136]In February 2010, the United States Joint Forces Command released a study which included a summary of the threats posed by the internet:[136] With very little investment, and cloaked in a veil of anonymity, our adversaries will inevitably attempt to harm our national interests. Cyberspace will become a main front in both irregular and traditional conflicts. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. Through cyberspace, enemies will target industry, academia, government, as well as the military in the air, land, maritime, and space domains. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Indeed, adversaries have already taken advantage of computer networks and the power of information technology not only to plan and execute savage acts of terrorism, but also to influence directly the perceptions and will of the U.S. Government and the American population.On 6 October 2011, it was announced that Creech AFB's drone and Predator fleet's command and control data stream had been keylogged, resisting all attempts to reverse the exploit, for the past two weeks.[137] The Air Force issued a statement that the virus had "posed no threat to our operational mission".[138] On 21 November 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois.[139] However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence Center.[140] According to the Foreign Policy magazine, NSA's Tailored Access Operations (TAO) unit "has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People's Republic of China."[141][142] On 24 November 2014. The Sony Pictures Entertainment hack was a release of confidential data belonging to Sony Pictures Entertainment (SPE). In June 2015, the United States Office of Personnel Management (OPM) announced that it had been the target of a data breach targeting the records of as many as four million people.[143] Later, FBI Director James Comey put the number at 18 million.[144] The Washington Post has reported that the attack originated in China, citing unnamed government officials.[145] In 2016, Jeh Johnson the United States Secretary of Homeland Security and James Clapper the U.S. Director of National Intelligence issued a joint statement accusing Russia of interfering with the 2016 United States presidential election.[146] The New York Times reported the Obama administration has formally accused Russia of stealing and disclosing Democratic National Committee emails.[147] Under U.S. law (50 U.S.C.Title 50 – War and National Defense, Chapter 15 – National Security, Subchapter III Accountability for Intelligence Activities [148]) there must be a formal Presidential finding prior to authorizing a covert attack. U.S. vice president Joe Biden said on the American news interview program Meet The Press that the United States will respond.[149] The New York Times noted that Biden's comment "seems to suggest that Mr. Obama is prepared to order — or has already ordered — some kind of covert action".[150] On December 29 the United States imposed the most extensive sanctions against Russia since the Cold War,[151] expelling 35 Russian diplomats from the United States.[152][153] The United States has used cyberattacks for tactical advantage in Afghanistan.[154] In 2014 Barack Obama ordered an intensification of cyberwarfare against North Korea's missile program for sabotaging test launches in their opening seconds.[155] In 2016 President Barack Obama authorized the planting of cyber weapons in Russian infrastructure in the final weeks of his presidency in response to Moscow’s alleged interference in the 2016 presidential election.[156] In March 2017, WikiLeaks has published more than 8,000 documents on the CIA. The confidential documents, codenamed Vault 7 and dated from 2013–2016, include details on CIA's software capabilities, such as the ability to compromise cars, smart TVs,[157] web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA),[158][159][160] and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux.[161] "Kill switch bill" On 19 June 2010, United States Senator Joe Lieberman (I-CT) introduced a bill called "Protecting Cyberspace as a National Asset Act of 2010",[162] which he co-wrote with Senator Susan Collins (R-ME) and Senator Thomas Carper (D-DE). If signed into law, this controversial bill, which the American media dubbed the "Kill switch bill", would grant the president emergency powers over parts of the Internet. However, all three co-authors of the bill issued a statement that instead, the bill "[narrowed] existing broad presidential authority to take over telecommunications networks".[163] CyberpeaceThe rise of cyber as a warfighting domain has led to efforts to determine how cyberspace can be used to foster peace. For example, the German civil rights panel FIfF runs a campaign for cyberpeace − for the control of cyberweapons and surveillance technology and against the militarization of cyberspace and the development and stockpiling of offensive exploits and malware.[164][165][166][167] Measures for cyberpeace include policymakers developing new rules and norms for warfare, individuals and organizations building new tools and secure infrastructures, promoting open source, the establishment of cyber security centers, auditing of critical infrastructure cybersecurity, obligations to disclose vulnerabilities, disarmament, defensive security strategies, decentralization, education and widely applying relevant tools and infrastructures, encryption and other cyberdefenses.[164][168][169][170]The topics of cyber peacekeeping[171][172] and cyber peacemaking[173] have also been studied by researchers, as a way to restore and strengthen peace in the aftermath of both cyber and traditional warfare. Cyber counterintelligenceCyber counter-intelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions.[174]
Controversy over termsThere is debate on whether the term "cyberwarfare" is accurate.Eugene Kaspersky, founder of Kaspersky Lab, concludes that "cyberterrorism" is a more accurate term than "cyberwar". He states that "with today's attacks, you are clueless about who did it or when they will strike again. It's not cyber-war, but cyberterrorism."[182] He also equates large-scale cyber weapons, such as Flame and NetTraveler which his company discovered, to biological weapons, claiming that in an interconnected world, they have the potential to be equally destructive.[182][183] In October 2011 the Journal of Strategic Studies, a leading journal in that field, published an article by Thomas Rid, "Cyber War Will Not Take Place" which argued that all politically motivated cyber attacks are merely sophisticated versions of sabotage, espionage, or subversion[184] – and that it is unlikely that cyber war will occur in the future. Howard Schmidt, an American cybersecurity expert, argued in March 2010 that "there is no cyberwar... I think that is a terrible metaphor and I think that is a terrible concept. There are no winners in that environment."[36] Other experts, however, believe that this type of activity already constitutes a war. The warfare analogy is often seen intended to motivate a militaristic response when that is not necessarily appropriate. Ron Deibert, of Canada's Citizen Lab, has warned of a "militarization of cyberspace".[185] The European cybersecurity expert Sandro Gaycken argued for a middle position. He considers cyberwar from a legal perspective an unlikely scenario, due to the reasons lined out by Rid (and, before him, Sommer),[186] but the situation looks different from a strategic point of view. States have to consider military-led cyber operations an attractive activity, within and without war, as they offer a large variety of cheap and risk-free options to weaken other countries and strengthen their own positions. Considered from a long-term, geostrategic perspective, cyber offensive operations can cripple whole economies, change political views, agitate conflicts within or among states, reduce their military efficiency and equalize the capacities of high-tech nations to that of low-tech nations, and use access to their critical infrastructures to blackmail them.[187] Oxford academic Lucas Kello proposed a new term – "unpeace" – to denote highly damaging cyber actions whose non-violent effects do not rise to the level of traditional war. Such actions are neither warlike nor peacelike. Although they are non-violent, and thus not acts of war, their damaging effects on the economy and society may be greater than even some armed attacks.[188][189] The idea of a cyber Pearl Harbor has been debated by scholars, drawing an analogy to the historical act of war.[190][191][192][193][194] Others have used cyber 9/11 to draw attention to the nontraditional, asymmetric, or irregular aspect of cyber action against a state.[195][196] Legality, rulesVarious parties have attempted to come up with international legal frameworks to clarify what is and is not acceptable, but none have yet to be widely accepted.The Tallinn Manual, published in 2013, is an academic, non-binding study on how international law, in particular the jus ad bellum and international humanitarian law, apply to cyber conflicts and cyber warfare. It was written at the invitation of the Tallinn-based NATO Cooperative Cyber Defence Centre of Excellence by an international group of approximately twenty experts between 2009 and 2012. The Shanghai Cooperation Organisation (members of which include China and Russia) defines cyberwar to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other states". In September 2011, these countries proposed to the UN Secretary General a document called "International code of conduct for information security".[197] In contrast, the United States' approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech. This difference of opinion has led to reluctance in the West to pursue global cyber arms control agreements.[198] However, American General Keith B. Alexander did endorse talks with Russia over a proposal to limit military attacks in cyberspace.[199] In June 2013, Barack Obama and Vladimir Putin agreed to install a secure Cyberwar-Hotline providing "a direct secure voice communications line between the US cybersecurity coordinator and the Russian deputy secretary of the security council, should there be a need to directly manage a crisis situation arising from an ICT security incident" (White House quote).[200] A Ukrainian professor of International Law, Alexander Merezhko, has developed a project called the International Convention on Prohibition of Cyberwar in Internet. According to this project, cyberwar is defined as the use of Internet and related technological means by one state against the political, economic, technological and information sovereignty and independence of another state. Professor Merezhko's project suggests that the Internet ought to remain free from warfare tactics and be treated as an international landmark. He states that the Internet (cyberspace) is a "common heritage of mankind".[201] On the February 2017 RSA Conference Microsoft president Brad Smith suggested global rules – a "Digital Geneva Convention" – for cyber attacks that "ban the nation-state hacking of all the civilian aspects of our economic and political infrastructures". He also stated that an independent organization could investigate and publicly disclose evidence that attributes nation-state attacks to specific countries. Furthermore, he said that the technology sector should collectively and neutrally work together to protect Internet users and pledge to remain neutral in conflict and not aid governments in offensive activity and to adopt a coordinated disclosure process for software and hardware vulnerabilities.[202][203] In filmsDocumentaries
See also
References
Further reading
External links
Categories:
LanguagesImportant thinking about the tactical and legal concepts of cyber-warfare is taking place in a former Soviet barracks in Estonia, now home to NATO's "centre of excellence" for cyber-defence. It was established in response to what has become known as "Web War 1", a concerted denial-of-service attack on Estonian government, media and bank web servers that was precipitated by the decision to move a Soviet-era war memorial in central Tallinn in 2007. Sweden's armed forces were recently exposed to an extensive cyber attack that prompted them to shut down an IT system used in military exercises, daily newspaper Dagens Nyheter reported on Wednesday. The attack that affected the Caxcis IT system was confirmed to the Swedish newspaper by armed forces spokesman Philip Simon. |
||||||||||||||||||||||||||||
Contents
Definition
A number of definitions of cyber warfare have been proposed, with no single definition being widely adopted internationally. Richard A. Clarke
has defined it as "actions by a nation-state to penetrate another
nation's computers or networks for the purposes of causing damage or
disruption",[3]:6.
Martin Libicki defines two types of cyber warfare: strategic and
operational. Strategic being "a campaign of cyberattacks one entity
carries out on another", whilst operational cyber warfare "involves the
use of cyberattacks on the other side’s military in the context of a
physical war."[4]
Other definitions also include non-state actors, such as terrorist
groups, companies, political or ideological extremist groups, hacktivists, and transnational criminal organizations.[5][6][7][8][9]
Some governments have made it an integral part of their overall
military strategy, with some having invested heavily in cyberwarfare
capability.[10][11][12][13] One kind of cyberwarfare involves the kind of hacking that is the concern of penetration testing;
in such cases, a government entity has established it as a warfighting
capability, or a non-governmental entity has used it as a weapon against
a state or its concerns.[14]
This capability uses the same set of penetration testing
methodologies but applies them, in the case of United States doctrine,
in a strategic way to
- Prevent cyber attacks against critical infrastructure
- Reduce national vulnerability to cyber attacks
- Minimize damage and recovery time from cyber attacks[14]
Offensive operations are also part of these national level strategies
for officially declared wars as well as undeclared secretive
operations.[15]
Types of threat
Cyber
warfare can present a multitude of threats towards a nation. At the
most basic level, cyber attacks can be used to support traditional
warfare. For example, tampering with the operation of air defences via
cyber means in order to facilitate an air attack[16]. Aside from these "hard" threats, cyber warfare can also contribute towards "soft" threats such as espionage and propaganda.
Espionage
Traditional espionage is not an act of war, nor is cyber-espionage,[17]
and both are generally assumed to be ongoing between major powers.
Despite this assumption, some incidents can cause serious tensions
between nations, and are often described as "attacks". For example:
- Massive spying by the US on many countries, revealed by Edward Snowden.
- After the NSA's spying on Germany's Chancellor Angela Merkel was revealed, the Chancellor compared the NSA with the Stasi.[18]
- The NSA recording nearly every cell phone conversation in the Bahamas, without the Bahamian government's permission,[19] and similar programs in Kenya, the Philippines, Mexico and Afghanistan.[20]
- The "Titan Rain" probes of American defence contractors computer systems since 2003.[21]
- The Office of Personnel Management data breach, in the US, widely attributed to China.[22][23]
Sabotage
Computers and satellites
that coordinate other activities are vulnerable components of a system
and could lead to the disruption of equipment. Compromise of military
systems, such as C4ISTAR
components that are responsible for orders and communications could
lead to their interception or malicious replacement. Power, water, fuel,
communications, and transportation infrastructure all may be vulnerable
to disruption. According to Clarke, the civilian realm is also at risk,
noting that the security breaches have already gone beyond stolen
credit card numbers, and that potential targets can also include the
electric power grid, trains, or the stock market.[24]
In mid July 2010, security experts discovered a malicious software program called Stuxnet
that had infiltrated factory computers and had spread to plants around
the world. It is considered "the first attack on critical industrial
infrastructure that sits at the foundation of modern economies," notes The New York Times.[25]
Stuxnet,
while extremely effective in delaying Iran's nuclear program for the
development of nuclear weaponry, came at a high cost. For the first
time, it became clear that not only could cyber weapons be defensive but
they could be offensive. The large decentralization and scale of
cyberspace makes it extremely difficult to direct from a policy
perspective. Non-state actors can play as large a part in the cyberwar
space as state actors, which leads to dangerous, sometimes disastrous,
consequences. Small groups of highly skilled malware developers are able
to as effectively impact global politics and cyber warfare as large
governmental agencies. A major aspect of this ability lies in the
willingness of these groups to share their exploits and developments on
the web as a form of arms proliferation. This allows lesser hackers to
become more proficient in creating the large scale attacks that once
only a small handful were skillful enough to manage. In addition,
thriving black markets for these kinds of cyber weapons are buying and
selling these cyber capabilities to the highest bidder without regard
for consequences.[26]
Denial-of-service attack
In computing, a denial-of-service attack (DoS attack) or distributed
denial-of-service attack (DDoS attack) is an attempt to make a machine
or network resource unavailable to its intended users. Perpetrators of
DoS attacks typically target sites or services hosted on high-profile
web servers such as banks, credit card payment gateways, and even root
nameservers. DoS attacks may not be limited to computer-based methods,
as strategic physical attacks against infrastructure can be just as
devastating. For example, cutting undersea communication cables may
severely cripple some regions and countries with regards to their
information warfare ability.
Electrical power grid
The federal government of the United States admits that the electric power grid is susceptible to cyberwarfare.[27][28] The United States Department of Homeland Security works with industries to identify vulnerabilities
and to help industries enhance the security of control system networks.
The federal government is also working to ensure that security is built
in as the next generation of "smart grid" networks are developed.[29]
In April 2009, reports surfaced that China and Russia had infiltrated
the U.S. electrical grid and left behind software programs that could be
used to disrupt the system, according to current and former national
security officials.[30] The North American Electric Reliability Corporation (NERC) has issued a public notice that warns that the electrical grid is not adequately protected from cyber attack.[31] China denies intruding into the U.S. electrical grid.[32][33] One countermeasure would be to disconnect the power grid from the Internet and run the net with droop speed control only.[34][35] Massive power outages caused by a cyber attack could disrupt the economy, distract from a simultaneous military attack, or create a national trauma.
Howard Schmidt, former Cyber-Security Coordinator of the US, commented on those possibilities:[36]
It's possible that hackers have gotten into administrative computer systems of utility companies, but says those aren't linked to the equipment controlling the grid, at least not in developed countries. [Schmidt] has never heard that the grid itself has been hacked.
On 23 December 2015, what is believed to be a first known successful cyber attack on a power grid took place in Ukraine leading to temporary blackouts.[37] The cyber attack is attributed to the Russian advanced persistent threat group called "Sandworm"[38] and it was performed during an ongoing military confrontation.
Propaganda
Cyber propaganda is an effort to control information in whatever form it takes, and influence public opinion.[39] It is a form of psychological warfare, except it uses social media, fake news websites
and other digital means. In 2018, Sir Nicholas Carter, Chief of the
General Staff of the British Army stated that this kind of attack from
actors such as Russia "is a form of system warfare that seeks to
de-legitimise the political and social system on which our military
strength is based".[40]
Jowell and O'Donnell (2006) state that "propaganda is the deliberate,
systematic attempt to shape perceptions, manipulate cognitions, and
direct behavior to achieve a response that furthers the desired intent
of the propagandist" (p. 7). The internet is a phenomenal means of
communication. People can get their message across to a huge audience,
and with this opens a window for evil. Terrorist organizations can use
this medium to brainwash people. It has been suggested that restricted
media coverage of terrorist attacks would in turn decrease the amount of
terrorist attacks that occur afterwards (Cowen 2006). If this is the
case, an interesting perspective to look for in the data would be the
ties that connect the media, propaganda, and the communicative messages
that are being conveyed.[41]
Motivations
Military
In the U.S., General Keith B. Alexander, first head of USCYBERCOM, told the Senate Armed Services Committee
that computer network warfare is evolving so rapidly that there is a
"mismatch between our technical capabilities to conduct operations and
the governing laws and policies. Cyber Command
is the newest global combatant and its sole mission is cyberspace,
outside the traditional battlefields of land, sea, air and space." It
will attempt to find and, when necessary, neutralize cyberattacks and to
defend military computer networks.[42]
Alexander sketched out the broad battlefield envisioned for the
computer warfare command, listing the kind of targets that his new
headquarters could be ordered to attack, including "traditional
battlefield prizes – command-and-control systems at military
headquarters, air defense networks and weapons systems that require
computers to operate."[42]
One cyber warfare scenario, Cyber ShockWave, which was wargamed on the cabinet level by former administration officials, raised issues ranging from the National Guard to the power grid to the limits of statutory authority.[43][44][45][46]
The distributed nature of internet based attacks means that it is
difficult to determine motivation and attacking party, meaning that it
is unclear when a specific act should be considered an act of war.[47]
Examples of cyberwarfare driven by political motivations can be found
worldwide. In 2008, Russia began a cyber attack on the Georgian
government website, which was carried out along with Georgian military
operations in South Ossetia. In 2008, Chinese 'nationalist hackers' attacked CNN as it reported on Chinese repression on Tibet.[48]
Jobs in cyberwarfare have become increasingly popular in the
military. All four branches of the United States military actively
recruit for cyber warfare positions.[49]
Civil
Potential targets in internet sabotage include all aspects of the Internet from the backbones of the web, to the internet service providers,
to the varying types of data communication mediums and network
equipment. This would include: web servers, enterprise information
systems, client server systems, communication links, network equipment,
and the desktops and laptops in businesses and homes. Electrical grids, financial networks, and telecommunication systems are also deemed vulnerable, especially due to current trends in computerization and automation.[50]
Hacktivism
Politically motivated hacktivism involves the subversive use of computers and computer networks
to promote an agenda, and can potentially extend to attacks, theft and
virtual sabotage that could be seen as cyberwarfare – or mistaken for
it.[51]
Hacktivists use their knowledge and software tools to gain unauthorized
access to computer systems they seek to manipulate or damage not for
material gain or to cause widespread destruction, but to draw attention
to their cause through well-publicized disruptions of select targets.
Anonymous and other hacktivist groups are often portrayed in the media
as cyber-terrorists, wreaking havoc by hacking websites, posting
sensitive information about their victims, and threatening further
attacks if their demands are not met. However, hacktivism is more than
that. They are politically motivated to change the world, through the
use of fundamentalism. Groups like Anonymous have divided opinion with
their methods.[52]
Private sector
Computer hacking represents a modern threat in ongoing global conflicts and industrial espionage and as such is presumed to widely occur.[50]
It is typical that this type of crime is underreported to the extent
they are known. According to McAfee's George Kurtz, corporations around
the world face millions of cyberattacks a day. "Most of these attacks don't gain any media attention or lead to strong political statements by victims."[53] This type of crime is usually financially motivated.
Non-profit research
But
not all examinations with the issue of cyberwarfare are achieving
profit or personal gain. There are still institutes and companies like
the University of Cincinnati or the Kaspersky Security Lab which are trying to increase the sensibility of this topic by researching and publishing of new security threats.
By region
Approximately
120 countries have been developing ways to use the Internet as a weapon
and target financial markets, government computer systems and
utilities.[54]
Asia
China
Foreign Policy magazine puts the size of China's "hacker army" at anywhere from 50,000 to 100,000 individuals.[55]
Diplomatic cables
highlight US concerns that China is using access to Microsoft source
code and 'harvesting the talents of its private sector' to boost its
offensive and defensive capabilities.[56]
A 2008 article in the Culture Mandala: The Bulletin of the Centre for East-West Cultural and Economic Studies
by Jason Fritz alleges that the Chinese government from 1995 to 2008
was involved in a number of high-profile cases of espionage, primarily
through the use of a "decentralized network of students, business
people, scientists, diplomats, and engineers from within the Chinese
Diaspora".[57]
A defector in Belgium, purportedly an agent, claimed that there were
hundreds of spies in industries throughout Europe, and on his defection
to Australia Chinese diplomat Chen Yonglin said there were over 1,000
such in that country. In 2007, a Russian executive was sentenced to 11
years for passing information about the rocket and space technology
organization to China. Targets in the United States have included 'aerospace engineering programs, space shuttle design, C4ISR data, high-performance computers, Nuclear weapon design, cruise missile data, semiconductors, integrated circuit design, and details of US arms sales to Taiwan'.[57]
While China continues to be held responsible for a string of
cyber-attacks on a number of public and private institutions in the
United States, India, Russia, Canada, and France, the Chinese government
denies any involvement in cyber-spying campaigns. The administration
maintains the position that China is not the threat but rather the
victim of an increasing number of cyber-attacks. Most reports about
China's cyber warfare capabilities have yet to be confirmed by the Chinese government.[58]
According to Fritz, China has expanded its cyber capabilities and military technology by acquiring foreign military technology.[59] Fritz states that the Chinese government uses "new space-based surveillance and intelligence gathering systems, Anti-satellite weapon,
anti-radar, infrared decoys, and false target generators" to assist in
this quest, and that they support their "informationization" of their
military through "increased education of soldiers in cyber warfare;
improving the information network for military training, and has built
more virtual laboratories, digital libraries and digital campuses."[59]
Through this informationization, they hope to prepare their forces to
engage in a different kind of warfare, against technically capable
adversaries.[60] Many recent news reports link China's technological capabilities to the beginning of a new 'cyber cold war.'[61]
In response to reports of cyberattacks by China against the United States, Amitai Etzioni
of the Institute for Communitarian Policy Studies has suggested that
China and the United States agree to a policy of mutually assured
restraint with respect to cyberspace. This would involve allowing both
states to take the measures they deem necessary for their self-defense
while simultaneously agreeing to refrain from taking offensive steps; it
would also entail vetting these commitments.[62]
Operation Shady RAT is an ongoing series of cyber attacks starting mid-2006, reported by Internet security company McAfee
in August 2011. China is widely believed to be the state actor behind
these attacks which hit at least 72 organizations including governments
and defense contractors.[63]
India
The Department of Information Technology created the Indian Computer Emergency Response Team (CERT-In) in 2004 to thwart cyber attacks in India.[64]
That year, there were 23 reported cyber security breaches. In 2011,
there were 13,301. That year, the government created a new subdivision,
the National Critical Information Infrastructure Protection Centre (NCIIPC) to thwart attacks against energy, transport, banking, telecom, defence, space and other sensitive areas.
The Executive Director of the Nuclear Power Corporation of India
(NPCIL) stated in February 2013 that his company alone was forced to
block up to ten targeted attacks a day. CERT-In was left to protect less
critical sectors.
A high-profile cyber attack on 12 July 2012 breached the email
accounts of about 12,000 people, including those of officials from the Ministry of External Affairs, Ministry of Home Affairs, Defence Research and Development Organisation (DRDO), and the Indo-Tibetan Border Police (ITBP).[64] A government-private sector plan being overseen by National Security Advisor (NSA) Shivshankar Menon
began in October 2012, and intends to beef up India's cyber security
capabilities in the light of a group of experts findings that India
faces a 470,000 shortfall of such experts despite the country's
reputation of being an IT and software powerhouse.[65]
In February 2013, Information Technology Secretary J. Satyanarayana stated that the NCIIPC[page needed]
was finalizing policies related to national cyber security that would
focus on domestic security solutions, reducing exposure through foreign
technology.[64]
Other steps include the isolation of various security agencies to
ensure that a synchronised attack could not succeed on all fronts and
the planned appointment of a National Cyber Security Coordinator. As of
that month, there had been no significant economic or physical damage to
India related to cyber attacks.
On 26 November 2010, a group calling itself the Indian Cyber Army
hacked the websites belonging to the Pakistan Army and the others belong
to different ministries, including the Ministry of Foreign Affairs,
Ministry of Education, Ministry of Finance, Pakistan Computer Bureau,
Council of Islamic Ideology, etc. The attack was done as a revenge for
the Mumbai terrorist attacks.[66]
On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the Central Bureau of Investigation (CBI). The National Informatics Center (NIC) has begun an inquiry.[67]
In July 2016, Cymmetria researchers discovered and revealed the cyber
attack dubbed 'Patchwork', which compromised an estimated 2500
corporate and government agencies using code stolen from GitHub and the dark web.
Examples of weapons used are an exploit for the Sandworm vulnerability
(CVE-2014-4114), a compiled AutoIt script, and UAC bypass code dubbed
UACME. Targets are believed to be mainly military and political
assignments around Southeast Asia and the South China Sea and the
attackers are believed to be of Indian origin and gathering intelligence
from influential parties.[68][69]
Philippines
The
Chinese are being blamed after a cybersecurity company, F-Secure Labs,
found a malware, NanHaiShu, which targeted the Philippines Department of
Justice. It sent information in an infected machine to a server with a
Chinese IP address. The malware which is considered particularly
sophisticated in nature was introduced by phishing emails that were
designed to look like they were coming from an authentic sources. The
information sent is believed to be relating to the South China Sea legal
case.[70]
Russia
When Russia was still the Soviet Union in 1982, a portion of its Trans-Siberia pipeline within its territory exploded, allegedly due to computer malware implanted in the pirated Canadian software by the Central Intelligence Agency.
The malware caused the SCADA system running the pipeline to
malfunction. The "Farewell Dossier" provided information on this attack,
and wrote that compromised computer chips would become a part of Soviet
military equipment, flawed turbines would be placed in the gas
pipeline, and defective plans would disrupt the output of chemical
plants and a tractor factor. This caused the "most monumental nonnuclear
explosion and fire ever seen from space." However, the Soviet Union did
not blame the United States for the attack.[71]
Russian, South Ossetian, Georgian and Azerbaijani sites were attacked by hackers during the 2008 South Ossetia War.[72]
Russian-led cyberattacks
It has been claimed that Russian security services organized a number of denial of service attacks as a part of their cyber-warfare against other countries,[73] most notably the 2007 cyberattacks on Estonia and the 2008 cyberattacks on Russia, South Ossetia, Georgia, and Azerbaijan.[74] One identified young Russian hacker said that he was paid by Russian state security services to lead hacking attacks on NATO computers. He was studying computer sciences at the Department of the Defense of Information. His tuition was paid for by the FSB.[75]
South Korea
In July 2009, there were a series of coordinated denial of service attacks against major government, news media, and financial websites in South Korea and the United States.[76] While many thought the attack was directed by North Korea, one researcher traced the attacks to the United Kingdom.[77] Security researcher Chris Kubecka presented evidence multiple European Union and United Kingdom companies unwittingly helped attack South Korea due to a W32.Dozer
infections, malware used in part of the attack. Some of the companies
used in the attack were partially owned by several governments, further
complicating attribution.[78]
In July 2011, the South Korean company SK Communications
was hacked, resulting in the theft of the personal details (including
names, phone numbers, home and email addresses and resident registration
numbers) of up to 35 million people. A trojaned software update was
used to gain access to the SK Communications network. Links exist
between this hack and other malicious activity and it is believed to be
part of a broader, concerted hacking effort.[79]
With ongoing tensions on the Korean Peninsula, South Korea's defense ministry
stated that South Korea was going to improve cyber-defense strategies
in hopes of preparing itself from possible cyber attacks. In March 2013,
South Korea's major banks – Shinhan Bank, Woori Bank and NongHyup Bank –
as well as many broadcasting stations – KBS, YTN and MBC – were hacked
and more than 30,000 computers were affected; it is one of the biggest
attacks South Korea has faced in years.[80]
Although it remains uncertain as to who was involved in this incident,
there has been immediate assertions that North Korea is connected, as it
threatened to attack South Korea's government institutions, major
national banks and traditional newspapers numerous times – in reaction
to the sanctions it received from nuclear testing and to the
continuation of Foal Eagle,
South Korea's annual joint military exercise with the United States.
North Korea's cyber warfare capabilities raise the alarm for South
Korea, as North Korea is increasing its manpower through military
academies specializing in hacking. Current figures state that South
Korea only has 400 units of specialized personnel, while North Korea has
more than 3,000 highly trained hackers; this portrays a huge gap in
cyber warfare capabilities and sends a message to South Korea that it
has to step up and strengthen its Cyber Warfare Command forces.
Therefore, in order to be prepared from future attacks, South Korea and
the United States will discuss further about deterrence plans at the
Security Consultative Meeting (SCM). At SCM, they plan on developing
strategies that focuses on accelerating the deployment of ballistic
missiles as well as fostering its defense shield program, known as the
Korean Air and Missile Defense.[81]
North Korea
Europe
Estonia
In April 2007, Estonia came under cyber attack in the wake of relocation of the Bronze Soldier of Tallinn.[82] The largest part of the attacks were coming from Russia and from official servers of the authorities of Russia.[83] In the attack, ministries, banks, and media were targeted.[84][85]
This attack on Estonia, a seemingly small Baltic nation, was so
effective because of how most of the nation is run online. Estonia has
implemented an e-government, where bank services, political elections
and taxes are all done online. This attack really hurt Estonia's economy
and the people of Estonia. At least 150 people were injured on the
first day due to riots in the streets.[86]
Germany
In 2013, Germany revealed the existence of their 60-person Computer Network Operation unit.[87] The German intelligence agency, BND, announced it was seeking to hire 130 "hackers" for a new "cyber defence station" unit. In March 2013, BND president Gerhard Schindler
announced that his agency had observed up to five attacks a day on
government authorities, thought mainly to originate in China. He
confirmed the attackers had so far only accessed data and expressed
concern that the stolen information could be used as the basis of future
sabotage attacks against arms manufacturers, telecommunications
companies and government and military agencies.[88] Shortly after Edward Snowden leaked details of the U.S. National Security Agency's cyber surveillance system, German Interior Minister Hans-Peter Friedrich
announced that the BND would be given an additional budget of 100
million Euros to increase their cyber surveillance capability from 5% of
total internet traffic in Germany to 20% of total traffic, the maximum
amount allowed by German law.[89]
Netherlands
In the Netherlands, Cyber Defense is nationally coordinated by the National Cyber Security Centrum (NCSC).[90] The Dutch Ministry of Defense laid out a cyber strategy in 2011.[91]
The first focus is to improve the cyber defense handled by the Joint IT
branch (JIVC). To improve intel operations the intel community in the
Netherlands (including the military intel organization MIVD) has set up
the Joint Sigint Cyber Unit (JSCU). The ministry of Defense is
furthermore setting up an offensive cyber force, called Defensie Cyber
Command (DCC),[92] which will be operational in the end of 2014.
Norway
Sweden
In January 2017, Sweden's armed forces were subjected to a cyber-attack that caused them to shutdown a so-called Caxcis IT system used in military exercises.[93]
Ukraine
According to CrowdStrike from 2014 to 2016, the Russian APT Fancy Bear used Android malware to target the Ukrainian Army's Rocket Forces and Artillery. They distributed an infected version of an Android app whose original purpose was to control targeting data for the D-30 Howitzer artillery. The app, used by Ukrainian officers, was loaded with the X-Agent
spyware and posted online on military forums. The attack was claimed by
CrowdStrike to be successful, with more than 80% of Ukrainian D-30
Howitzers destroyed, the highest percentage loss of any artillery pieces
in the army (a percentage that had never been previously reported and
would mean the loss of nearly the entire arsenal of the biggest
artillery piece of the Ukrainian Armed Forces[94]).[95] According to the Ukrainian army
this number is incorrect and that losses in artillery weapons "were way
below those reported" and that these losses "have nothing to do with
the stated cause".[96]
In 2014, the Russians were suspected to use a cyber weapon called
"Snake", or "Ouroboros," to conduct a cyber attack on Ukraine during a
period of political turmoil. The Snake tool kit began spreading into
Ukrainian computer systems in 2010. It performed Computer Network
Exploitation (CNE), as well as highly sophisticated Computer Network
Attacks (CNA).[97]
On December 23, 2015 the BlackEnergy malware was used in a cyberattack on Ukraine's powergrid
that left more than 200,000 people temporarily without power. A mining
company and a large railway operator were also victims of the attack.[98]
United Kingdom
MI6 reportedly infiltrated an Al Qaeda website and replaced the instructions for making a pipe bomb with the recipe for making cupcakes.[99]
In October 2010, Iain Lobban, the director of the Government Communications Headquarters
(GCHQ), said the UK faces a "real and credible" threat from cyber
attacks by hostile states and criminals and government systems are
targeted 1,000 times each month, such attacks threatened the UK's
economic future, and some countries were already using cyber assaults to
put pressure on other nations.[100]
On 12 November 2013, financial organisations in London conducted cyber war games dubbed 'Waking Shark 2'[101]
to simulate massive internet-based attacks against bank and other
financial organisations. The Waking Shark 2 cyber war games followed a
similar exercise in Wall Street.[102]
Middle East
Iran
Iran has been both victim and predator of several cyberwarfare operations. Iran is considered an emerging military power in the field.[103]
In September 2010, Iran was attacked by the Stuxnet worm, thought to specifically target its Natanz nuclear enrichment facility.
It was a 500-kilobyte computer worm that infected at least 14
industrial sites in Iran, including the Natanz uranium-enrichment plant.
Although the official authors of Stuxnet haven’t been officially
identified, Stuxnet is believed to be developed and deployed by the
United States and Israel.[104]
The worm is said to be the most advanced piece of malware ever
discovered and significantly increases the profile of cyberwarfare.[105][106]
Israel
In the 2006 war against Hezbollah, Israel alleges that cyber-warfare was part of the conflict, where the Israel Defense Forces
(IDF) intelligence estimates several countries in the Middle East used
Russian hackers and scientists to operate on their behalf. As a result,
Israel attached growing importance to cyber-tactics, and became, along
with the U.S., France and a couple of other nations, involved in
cyber-war planning. Many international high-tech companies are now
locating research and development operations in Israel, where local
hires are often veterans of the IDF's elite computer units.[107] Richard A. Clarke
adds that "our Israeli friends have learned a thing or two from the
programs we have been working on for more than two decades."[3]:8
In September 2007, Israel carried out an airstrike on Syria dubbed Operation Orchard.
U.S. industry and military sources speculated that the Israelis may
have used cyberwarfare to allow their planes to pass undetected by radar
into Syria.[108][109]
Saudi Arabia
On August 15, 2012 at 11:08 am local time, the Shamoon virus began destroying over 35,000 computer systems, rendering them inoperable. The virus used to target the Saudi government by causing destruction to the state owned national oil company Saudi Aramco.
The attackers posted a pastie on PasteBin.com hours prior to the wiper
logic bomb occurring, citing oppression and the Al-Saud regime as a
reason behind the attack.[110]
The attack was well staged according to Chris Kubecka, a former security advisor to Saudi Aramco after the attack and group leader of security for Aramco Overseas.[111]
It was an unnamed Saudi Aramco employee on the Information Technology
team which opened a malicious phishing email, allowing initial entry
into the computer network around mid-2012[112]
Kubecka also detailed in her Black Hat USA talk Saudi Aramco placed
the majority of their security budget on the ICS control network,
leaving the business network at risk for a major incident. "When you
realize most of your security budget was spent on ICS & IT gets
Pwnd".[113]
The virus has been noted to have behavior differing from other malware
attacks, due to the destructive nature and the cost of the attack and
recovery. US Defense Secretary Leon Panetta called the attack a "Cyber Pearl Harbor"[114] Known years later as the "Biggest hack in history" and intended for cyber warfare.[115] Shamoon can spread from an infected machine to other computers on the network.
Once a system is infected, the virus continues to compile a list of
files from specific locations on the system, upload them to the
attacker, and erase them. Finally the virus overwrites the master boot record of the infected computer, making it unusable.[116] [117] The virus has been used for cyber warfare against the national oil companies of Saudi Arabia's, Saudi Aramco and Qatar's RasGas.[118][119][116][120]
Saudi Aramco announced the attack on their Facebook page and went
offline again until a company statement was issued on 25 August 2012.
The statement falsely reported normal business was resumed on 25 August
2012. However a Middle Eastern journalist leaked photographs taken on 1
September 2012 showing kilometers of petrol trucks unable to be loaded
due to backed business systems still inoperable.
On August 29, 2012 the same attackers behind Shamoon posted another
pastie on PasteBin.com, taunting Saudi Aramco with proof they still
retained access to the company network. The post contained the username
and password on security and network equipment and the new password for
the CEO Khalid Al- Falih[121] The attackers also referenced a portion of the Shamoon malware as further proof in the pastie.
According to Kubecka, in order to restore operations. Saudi Aramco
used its large private fleet of aircraft and available funds to purchase
much of the world's hard drives, driving the price up. New hard drives
were required as quickly as possible so oil prices were not affected by
speculation. By September 1, 2012 gasoline resources were dwindling for
the public of Saudi Arabia 17 days after the August 15th attack. RasGas was also affected by a different variant, crippling them in a similar manner.[122]
North America
United States
Cyberwarfare in the United States is a part of the American military strategy of proactive cyber defence and the use of cyberwarfare as a platform for attack.[123] The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war.[124]
In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials.[125] In 2017, Representative Mike Rogers, chairman of the U.S. House Permanent Select Committee on Intelligence,
for instance, said that "We are in a cyber war in this country, and
most Americans don't know it. And we are not necessarily winning. We
have got huge challenges when it comes to cybersecurity."[126]
U.S. government security expert Richard A. Clarke, in his book Cyber War
(May 2010), defines "cyberwarfare" as "actions by a nation-state to
penetrate another nation's computers or networks for the purposes of
causing damage or disruption."[3]:6 The Economist describes cyberspace as "the fifth domain of warfare,"[127] and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon
has formally recognized cyberspace as a new domain in warfare . . .
[which] has become just as critical to military operations as land, sea,
air, and space."[10]
In 2009, president Barack Obama declared America's digital
infrastructure to be a "strategic national asset," and in May 2010 the
Pentagon set up its new U.S. Cyber Command (USCYBERCOM), headed by General Keith B. Alexander, director of the National Security Agency (NSA), to defend American military networks and attack other countries' systems. The EU has set up ENISA
(European Union Agency for Network and Information Security) which is
headed by Prof. Udo Helmbrecht and there are now further plans to
significantly expand ENISA's capabilities. The United Kingdom has also
set up a cyber-security and "operations centre" based in Government Communications Headquarters
(GCHQ), the British equivalent of the NSA. In the U.S. however, Cyber
Command is only set up to protect the military, whereas the government
and corporate infrastructures are primarily the responsibility
respectively of the Department of Homeland Security and private companies.[127]
In February 2010, top American lawmakers warned that the "threat of a
crippling attack on telecommunications and computer networks was
sharply on the rise."[128]
According to The Lipman Report, numerous key sectors of the U.S.
economy along with that of other nations, are currently at risk,
including cyber threats to public and private facilities, banking and
finance, transportation, manufacturing, medical, education and
government, all of which are now dependent on computers for daily
operations.[128] In 2009, president Obama stated that "cyber intruders have probed our electrical grids."[129]
The Economist writes that China has plans of "winning
informationised wars by the mid-21st century". They note that other
countries are likewise organizing for cyberwar, among them Russia,
Israel and North Korea. Iran boasts of having the world's second-largest
cyber-army.[127] James Gosler, a government cybersecurity specialist, worries that the U.S. has a severe shortage of computer security
specialists, estimating that there are only about 1,000 qualified
people in the country today, but needs a force of 20,000 to 30,000
skilled experts.[130] At the July 2010 Black Hat computer security conference, Michael Hayden,
former deputy director of national intelligence, challenged thousands
of attendees to help devise ways to "reshape the Internet's security
architecture", explaining, "You guys made the cyberworld look like the north German plain."[131]
In January 2012, Mike McConnell, the former director of national intelligence at the National Security Agency under president George W. Bush told the Reuters news agency that the U.S. has already launched attacks on computer networks in other countries.[132] McConnell did not name the country that the U.S. attacked but according to other sources it may have been Iran.[132] In June 2012 the New York Times reported that president Obama had ordered the cyber attack on Iranian nuclear enrichment facilities.[133]
In August 2010, the U.S. for the first time warned publicly about the
Chinese military's use of civilian computer experts in clandestine
cyber attacks aimed at American companies and government agencies. The
Pentagon also pointed to an alleged China-based computer spying network
dubbed GhostNet that was revealed in a research report last year.[134] The Pentagon stated:
The People's Liberation Army is using "information warfare units" to develop viruses to attack enemy computer systems and networks, and those units include civilian computer professionals. Commander Bob Mehal, will monitor the PLA's buildup of its cyberwarfare capabilities and will continue to develop capabilities to counter any potential threat.[135]
The United States Department of Defense sees the use of computers and the Internet to conduct warfare in cyberspace as a threat to national security. The United States Joint Forces Command describes some of its attributes:
Cyberspace technology is emerging as an "instrument of power" in societies, and is becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. With low barriers to entry, coupled with the anonymous nature of activities in cyberspace, the list of potential adversaries is broad. Furthermore, the globe-spanning range of cyberspace and its disregard for national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies.[136]
In February 2010, the United States Joint Forces Command released a study which included a summary of the threats posed by the internet:[136]
With very little investment, and cloaked in a veil of anonymity, our adversaries will inevitably attempt to harm our national interests. Cyberspace will become a main front in both irregular and traditional conflicts. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. Through cyberspace, enemies will target industry, academia, government, as well as the military in the air, land, maritime, and space domains. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Indeed, adversaries have already taken advantage of computer networks and the power of information technology not only to plan and execute savage acts of terrorism, but also to influence directly the perceptions and will of the U.S. Government and the American population.
On 6 October 2011, it was announced that Creech AFB's drone and Predator fleet's command and control data stream had been keylogged, resisting all attempts to reverse the exploit, for the past two weeks.[137] The Air Force issued a statement that the virus had "posed no threat to our operational mission".[138]
On 21 November 2011, it was widely reported in the U.S. media that a
hacker had destroyed a water pump at the Curran-Gardner Township Public
Water District in Illinois.[139]
However, it later turned out that this information was not only false,
but had been inappropriately leaked from the Illinois Statewide
Terrorism and Intelligence Center.[140]
According to the Foreign Policy magazine, NSA's Tailored Access Operations
(TAO) unit "has successfully penetrated Chinese computer and
telecommunications systems for almost 15 years, generating some of the
best and most reliable intelligence information about what is going on
inside the People's Republic of China."[141][142]
On 24 November 2014. The Sony Pictures Entertainment hack was a release of confidential data belonging to Sony Pictures Entertainment (SPE).
In June 2015, the United States Office of Personnel Management (OPM) announced that it had been the target of a data breach targeting the records of as many as four million people.[143] Later, FBI Director James Comey put the number at 18 million.[144] The Washington Post has reported that the attack originated in China, citing unnamed government officials.[145]
In 2016, Jeh Johnson the United States Secretary of Homeland Security and James Clapper the U.S. Director of National Intelligence issued a joint statement accusing Russia of interfering with the 2016 United States presidential election.[146] The New York Times reported the Obama administration has formally accused Russia of stealing and disclosing Democratic National Committee emails.[147]
Under U.S. law (50 U.S.C.Title 50 – War and National Defense, Chapter
15 – National Security, Subchapter III Accountability for Intelligence
Activities [148]) there must be a formal Presidential finding prior to authorizing a covert attack. U.S. vice president Joe Biden said on the American news interview program Meet The Press that the United States will respond.[149]
The New York Times noted that Biden's comment "seems to suggest that
Mr. Obama is prepared to order — or has already ordered — some kind of
covert action".[150] On December 29 the United States imposed the most extensive sanctions against Russia since the Cold War,[151] expelling 35 Russian diplomats from the United States.[152][153]
The United States has used cyberattacks for tactical advantage in Afghanistan.[154]
In 2014 Barack Obama ordered an intensification of cyberwarfare against North Korea's missile program for sabotaging test launches in their opening seconds.[155]
In 2016 President Barack Obama authorized the planting of cyber weapons
in Russian infrastructure in the final weeks of his presidency in
response to Moscow’s alleged interference in the 2016 presidential
election.[156]
In March 2017, WikiLeaks has published more than 8,000 documents on the CIA. The confidential documents, codenamed Vault 7 and dated from 2013–2016, include details on CIA's software capabilities, such as the ability to compromise cars, smart TVs,[157] web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA),[158][159][160] and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux.[161]
"Kill switch bill"
On 19 June 2010, United States Senator Joe Lieberman (I-CT) introduced a bill called "Protecting Cyberspace as a National Asset Act of 2010",[162] which he co-wrote with Senator Susan Collins (R-ME) and Senator Thomas Carper (D-DE). If signed into law, this controversial bill, which the American media dubbed the "Kill switch bill",
would grant the president emergency powers over parts of the Internet.
However, all three co-authors of the bill issued a statement that
instead, the bill "[narrowed] existing broad presidential authority to
take over telecommunications networks".[163]
Cyberpeace
The rise of cyber as a warfighting domain has led to efforts to
determine how cyberspace can be used to foster peace. For example, the
German civil rights panel FIfF
runs a campaign for cyberpeace − for the control of cyberweapons and
surveillance technology and against the militarization of cyberspace and
the development and stockpiling of offensive exploits and malware.[164][165][166][167]
Measures for cyberpeace include policymakers developing new rules and
norms for warfare, individuals and organizations building new tools and
secure infrastructures, promoting open source,
the establishment of cyber security centers, auditing of critical
infrastructure cybersecurity, obligations to disclose vulnerabilities,
disarmament, defensive security strategies, decentralization, education
and widely applying relevant tools and infrastructures, encryption and
other cyberdefenses.[164][168][169][170]
The topics of cyber peacekeeping[171][172] and cyber peacemaking[173]
have also been studied by researchers, as a way to restore and
strengthen peace in the aftermath of both cyber and traditional warfare.
Cyber counterintelligence
Cyber
counter-intelligence are measures to identify, penetrate, or neutralize
foreign operations that use cyber means as the primary tradecraft
methodology, as well as foreign intelligence service collection efforts
that use traditional methods to gauge cyber capabilities and intentions.[174]
- On 7 April 2009, The Pentagon announced they spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems.[175]
- On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House cyber security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first time.[176]
- On 9 February 2009, the White House announced that it will conduct a review of the nation's cyber security to ensure that the Federal government of the United States cyber security initiatives are appropriately integrated, resourced and coordinated with the United States Congress and the private sector.[177]
- In the wake of the 2007 cyberwar waged against Estonia, NATO established the Cooperative Cyber Defence Centre of Excellence (CCD CoE) in Tallinn, Estonia, in order to enhance the organization's cyber defence capability. The center was formally established on 14 May 2008, and it received full accreditation by NATO and attained the status of International Military Organization on 28 October 2008.[178] Since Estonia has led international efforts to fight cybercrime, the United States Federal Bureau of Investigation says it will permanently base a computer crime expert in Estonia in 2009 to help fight international threats against computer systems.[179]
- In 2015, the Department of Defense released an updated cyber strategy memorandum detailing the present and future tactics deployed in the service of defense against cyberwarfare. In this memorandum, three cybermissions are laid out. The first cybermission seeks to arm and maintain existing capabilities in the area of cyberspace, the second cybermission focuses on prevention of cyberwarfare, and the third cybermission includes strategies for retaliation and preemption (as distinguished from prevention).[12]
One of the hardest issues in cyber counterintelligence is the problem
of attribution. Unlike conventional warfare, figuring out who is behind
an attack can be very difficult.[180] However Defense Secretary Leon Panetta
has claimed that the United States has the capability to trace attacks
back to their sources and hold the attackers "accountable".[181]
Controversy over terms
There is debate on whether the term "cyberwarfare" is accurate.
Eugene Kaspersky, founder of Kaspersky Lab, concludes that "cyberterrorism"
is a more accurate term than "cyberwar". He states that "with today's
attacks, you are clueless about who did it or when they will strike
again. It's not cyber-war, but cyberterrorism."[182] He also equates large-scale cyber weapons, such as Flame and NetTraveler which his company discovered, to biological weapons, claiming that in an interconnected world, they have the potential to be equally destructive.[182][183]
In October 2011 the Journal of Strategic Studies, a leading journal in that field, published an article by Thomas Rid,
"Cyber War Will Not Take Place" which argued that all politically
motivated cyber attacks are merely sophisticated versions of sabotage,
espionage, or subversion[184] – and that it is unlikely that cyber war will occur in the future.
Howard Schmidt,
an American cybersecurity expert, argued in March 2010 that "there is
no cyberwar... I think that is a terrible metaphor and I think that is a
terrible concept. There are no winners in that environment."[36]
Other experts, however, believe that this type of activity already
constitutes a war. The warfare analogy is often seen intended to
motivate a militaristic response when that is not necessarily
appropriate. Ron Deibert, of Canada's Citizen Lab, has warned of a
"militarization of cyberspace".[185]
The European cybersecurity expert Sandro Gaycken argued for a middle
position. He considers cyberwar from a legal perspective an unlikely
scenario, due to the reasons lined out by Rid (and, before him, Sommer),[186]
but the situation looks different from a strategic point of view.
States have to consider military-led cyber operations an attractive
activity, within and without war, as they offer a large variety of cheap
and risk-free options to weaken other countries and strengthen their
own positions. Considered from a long-term, geostrategic perspective,
cyber offensive operations can cripple whole economies, change political
views, agitate conflicts within or among states, reduce their military
efficiency and equalize the capacities of high-tech nations to that of
low-tech nations, and use access to their critical infrastructures to
blackmail them.[187]
Oxford academic Lucas Kello proposed a new term – "unpeace" – to
denote highly damaging cyber actions whose non-violent effects do not
rise to the level of traditional war. Such actions are neither warlike
nor peacelike. Although they are non-violent, and thus not acts of war,
their damaging effects on the economy and society may be greater than
even some armed attacks.[188][189]
The idea of a cyber Pearl Harbor has been debated by scholars, drawing an analogy to the historical act of war.[190][191][192][193][194] Others have used cyber 9/11 to draw attention to the nontraditional, asymmetric, or irregular aspect of cyber action against a state.[195][196]
Legality, rules
Various parties have attempted to come up with international legal
frameworks to clarify what is and is not acceptable, but none have yet
to be widely accepted.
The Tallinn Manual, published in 2013, is an academic, non-binding study on how international law, in particular the jus ad bellum and international humanitarian law, apply to cyber conflicts and cyber warfare. It was written at the invitation of the Tallinn-based NATO Cooperative Cyber Defence Centre of Excellence by an international group of approximately twenty experts between 2009 and 2012.
The Shanghai Cooperation Organisation
(members of which include China and Russia) defines cyberwar to include
dissemination of information "harmful to the spiritual, moral and
cultural spheres of other states". In September 2011, these countries
proposed to the UN Secretary General a document called "International
code of conduct for information security".[197]
In contrast, the United States' approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech. This difference of opinion has led to reluctance in the West to pursue global cyber arms control agreements.[198] However, American General Keith B. Alexander did endorse talks with Russia over a proposal to limit military attacks in cyberspace.[199] In June 2013, Barack Obama and Vladimir Putin agreed to install a secure Cyberwar-Hotline
providing "a direct secure voice communications line between the US
cybersecurity coordinator and the Russian deputy secretary of the
security council, should there be a need to directly manage a crisis
situation arising from an ICT security incident" (White House quote).[200]
A Ukrainian professor of International Law, Alexander Merezhko, has
developed a project called the International Convention on Prohibition
of Cyberwar in Internet. According to this project, cyberwar is defined
as the use of Internet and related technological means by one state
against the political, economic, technological and information
sovereignty and independence of another state. Professor Merezhko's
project suggests that the Internet ought to remain free from warfare
tactics and be treated as an international landmark. He states that the
Internet (cyberspace) is a "common heritage of mankind".[201]
On the February 2017 RSA Conference Microsoft
president Brad Smith suggested global rules – a "Digital Geneva
Convention" – for cyber attacks that "ban the nation-state hacking of
all the civilian aspects of our economic and political infrastructures".
He also stated that an independent organization could investigate and
publicly disclose evidence that attributes nation-state attacks to
specific countries. Furthermore, he said that the technology sector
should collectively and neutrally work together to protect Internet
users and pledge to remain neutral in conflict
and not aid governments in offensive activity and to adopt a
coordinated disclosure process for software and hardware
vulnerabilities.[202][203]
In films
Documentaries- Hacking the Infrastructure: Cyber Warfare (2016) by Viceland
- Cyber War Threat (2015)
- Darknet, Hacker, Cyberwar[204] (2017)
- Zero Days (2016)
See also
- Automated teller machine
- Computer security organizations
- Cyber spying
- Cyber-arms industry
- Cyber-collection
- Cyberterrorism
- Duqu
- Fifth Dimension Operations
- IT risk
- iWar
- List of cyber attack threat trends
- List of cyberattacks
- Penetration test
- Proactive cyber defence
- Signals intelligence
- United States Cyber Command
- Virtual war
References
- "Darknet, Hacker, Cyberwar – Der geheime Krieg im Netz" (in German). Archived from the original on 4 April 2017. Retrieved 3 April 2017.
Further reading
- Andress, Jason. Winterfeld, Steve. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress. ISBN 1-59749-637-5
- Bodmer, Kilger, Carpenter, & Jones (2012). Reverse Deception: Organized Cyber Threat Counter-Exploitation. New York: McGraw-Hill Osborne Media. ISBN 0071772499, "ISBN 978-0071772495"
- Brenner, S. (2009). Cyber Threats: The Emerging Fault Lines of the Nation State. Oxford University Press. ISBN 0-19-538501-2
- Carr, Jeffrey. (2010). Inside Cyber Warfare: Mapping the Cyber Underworld. O'Reilly. ISBN 978-0-596-80215-8
- Conti, Gregory. Raymond, David. (2017). On Cyber: Towards an Operational Art for Cyber Conflict. Kopidion Press. ISBN 978-0692911563
- Cordesman, Anthony H., Cordesman, Justin G. Cyber-threats, Information Warfare, and Critical Infrastructure Protection, Greenwood Publ. (2002)
- Costigan, Sean S.; Perry, Jake (2012). Cyberspaces and global affairs. Farnham, Surrey: Ashgate. ISBN 9781409427544.
- Gaycken, Sandro. (2012). Cyberwar – Das Wettrüsten hat längst begonnen. Goldmann/Randomhouse. ISBN 978-3442157105
- Geers, Kenneth. (2011). Strategic Cyber Security. NATO Cyber Centre. Strategic Cyber Security, ISBN 978-9949-9040-7-5, 169 pages
- Shane Harris (2014). @War: The Rise of the Military-Internet Complex. Eamon Dolan/Houghton Mifflin Harcourt. ISBN 978-0544251793.
- Hunt, Edward (2012). "US Government Computer Penetration Programs and the Implications for Cyberwar". IEEE Annals of the History of Computing. 34 (3): 4–21. doi:10.1109/mahc.2011.82.
- Janczewski, Lech; Colarik, Andrew M. Cyber Warfare and Cyber Terrorism IGI Global (2008)
- Rid, Thomas (2011) "Cyber War Will Not Take Place," Journal of Strategic Studies, doi:10.1080/01402390.2011.608939
- Ventre, D. (2007). La guerre de l'information. Hermes-Lavoisier. 300 pages
- Ventre, D. (2009). Information Warfare. Wiley – ISTE. ISBN 978-1-84821-094-3
- Ventre, D. (Edit.) (2010). Cyberguerre et guerre de l'information. Stratégies, règles, enjeux. Hermes-Lavoisier. ISBN 978-2-7462-3004-0
- Ventre, D. (2011). Cyberespace et acteurs du cyberconflit. Hermes-Lavoisier. 288 pages
- Ventre, D. (Edit.) (2011). Cyberwar and Information Warfare. Wiley. 460 pages
- Ventre, D. (2011). Cyberattaque et Cyberdéfense. Hermes-Lavoisier. 336 pages
- Ventre, D. (Edit.) (2012). Cyber Conflict. Competing National Perspectives. Wiley-ISTE. 330 pages
- Woltag, Johann-Christoph: 'Cyber Warfare' in Rüdiger Wolfrum (Ed.) Max Planck Encyclopedia of Public International Law (Oxford University Press 2012).
External links
Wikimedia Commons has media related to Cyberwarfare. |
Wikibooks has a book on the topic of: The Information Age |
- NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)
- Cyberwar Twitter feed from Richard Stiennon
- Cyberwar News community by Reza Rafati
- "Sabotaging the System" video, "60 Minutes", 8 November 2009, CBS News, 15 minutes
- ABC: Former White House security advisor warns of cyber war
- Wall Street Journal: Fighting Wars in Cyberspace
- Will There Be An Electronic Pearl Harbor, PC World by Ira Winkler, 1 December 2009
- Senate panel: 80 percent of cyberattacks preventable, Wired, 17 November 2009
- Duncan Gardham, 26 June 2009, Hackers recruited to fight 'new cold war', Telegraph UK
- Stefano Mele, Jan 2016, Cyber Strategy & Policy Brief (Volume 01 – January 2016)
- Stefano Mele, Jun 2013, Cyber-Weapons: Legal and Strategic Aspects (version 2.0)
- Stefano Mele, Sep 2010, Cyberwarfare and its damaging effects on citizens
- Cybersecurity: Authoritative Reports and Resources, US Congressional Research Service
- Why the USA is Losing The Cyberwar Against China, by Joseph Steinberg, VentureBeat, 9 November 2011
- Michael Riley and Ashlee Vance, 20 July 2011, Cyber Weapons: The New Arms Race
- The Digital Arms Race: NSA Preps America for Future Battle, Der Spiegel, January 2015
Categories:
- Cyberwarfare
- Computer security
- Computer security procedures
- Computing terminology
- Cybercrime
- Espionage
- Hacking (computer security)
- Information sensitivity
- Mass intelligence-gathering systems
- Military intelligence collection
- Military technology
- National security
- Sabotage
- Security engineering
- Social engineering (computer security)
- Spyware
Languages
Important thinking about the tactical and legal concepts of cyber-warfare is taking place in a former Soviet barracks in Estonia, now home to NATO's "centre of excellence" for cyber-defence. It was established in response to what has become known as "Web War 1", a concerted denial-of-service attack on Estonian government, media and bank web servers that was precipitated by the decision to move a Soviet-era war memorial in central Tallinn in 2007.
Sweden's armed forces were recently exposed to an extensive cyber attack that prompted them to shut down an IT system used in military exercises, daily newspaper Dagens Nyheter reported on Wednesday. The attack that affected the Caxcis IT system was confirmed to the Swedish newspaper by armed forces spokesman Philip Simon.
Tidak ada komentar:
Posting Komentar