Research Note Engaging in Cyber Warfare



Similar documents
UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

Confrontation or Collaboration?

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

SCADA/ICS Security in an.

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

working group on foreign policy and grand strategy

Cybersecurity. Canisius College

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

the Council of Councils initiative

The main object of my research is :

Espionage and Intelligence. Debra A. Miller, Book Editor

It's a MAD, MAD, MAD Cyber World

Offensive capabilities

White Paper: Cyber Hawk or Digital Dove

IT Security Management 100 Success Secrets

A Detailed Strategy for Managing Corporation Cyber War Security

Trends Concerning Cyberspace

Cybersecurity Primer

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Subject: Critical Infrastructure Identification, Prioritization, and Protection

VIENNA MODEL UNITED NATIONS CLUB

Option 1: Use the Might of the U.S. Military to End the Assad Regime

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

Getting real about cyber threats: where are you headed?

Cyber Diplomacy A New Component of Foreign Policy 6

How To Implement International Terrorism Agreements

SPEECH. Visit for more news and information about MINDEF and the SAF

Impact of Data Breaches

CYBER WARFARE AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF SELECTED NATION STATES INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE

China s Economic Espionage

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

Protecting Organizations from Cyber Attack

Introduction to Special Edition on University Nonproliferation Education and Training

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Cedric Leighton, Colonel, USAF (Ret) Founder & President, Cedric Leighton Associates

The Implication of TMD System in Japan to China s Security

James R. Clapper. Director of National Intelligence

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad


JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Military Chemical Security in Russia s National Security System

Developing a robust cyber security governance framework 16 April 2015

The UK cyber security strategy: Landscape review. Cross-government

FBI AND CYBER SECURITY

New Battlegrounds: The Future of Cyber Security and Cyber Warfare

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

THE STRATEGIC POLICING REQUIREMENT. July 2012

Joint Communiqué The 46 th ROK-U.S. Security Consultative Meeting October 23, 2014 Washington D.C.

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Counterterrorism and Cybersecurity

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

As the US debates privacy a Berlin start up surges with...

Introduction to Cybersecurity Overview. October 2014

Cyber security: Practical Utility Programs that Work

ODUMUNC 39. Disarmament and International Security Committee. The Future of Cyber Intelligence. By: Joseph Espinoza

CSCAP MEMORANDUM NO. 24 Safety and Security of Vital Undersea Communications Infrastructure

Hearing date: 15 June Dennis F. Poindexter. Testimony before the U.S.-China Economic and Security Review Commission

Advanced Threat Protection with Dell SecureWorks Security Services

How To Get A Law Passed In The United States

Branding and Managing Reputational Risk

Joint ICTP-IAEA School of Nuclear Energy Management November Nuclear Security Fundamentals Module 9 topic 2

U. S. Attorney Office Northern District of Texas March 2013

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Cyber Security for audit committees

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

NATIONAL DEFENSE AND SECURITY ECONOMICS

NRC Cyber Security Regulatory

Inhibition of an Arms Race in Outer Space

Transcription:

Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines cyber warfare, justifies the need to establish rules for cyber warfare, and briefly discusses the current cyber war between the United States and China. 6273 19 th AVENUE NE, SEATTLE WA 98115 www.anniesearle.com 206.453.4386 Page 1 of 8

Introduction Many of us are aware of the most common domains in which global warfare takes place: land, water, aerial, and space. More specifically and recently, we have witnessed international fears regarding nuclear testing and the development of weapons of mass destruction (WMD). North Korea has recently threatened to conduct nuclear testing despite opposition from the United Nations. The North Korean government also has increased hostility against the United States and on many occasions resisted negotiating terms in regards to nuclear testing. The possibility that this country will potentially possess the capability to develop WMD has created great danger for the United States and other members of the United Nations. As these tensions will continue to be watched closely over the course of the year and future years, the United States is facing another form of warfare: cyber warfare. What is Cyber Warfare? Cyber warfare describes a politically influenced type of warfare conducted by a certain country or hostile organization (such as a terrorist group) that aims at spying on or sabotaging another country. 1 According to security specialists, there are numerous types of cyber 6273 19 th AVENUE NE, SEATTLE WA 98115 www.anniesearle.com 206.453.4386 Page 2 of 8

warfare, which include sabotage, electrical power grid, vandalism, and information gathering. 2 In an October 2012 speech by Leon Panetta, former Secretary of Defense, he stated the danger of cyber warfare, An aggressor nation or extremist group could use these kinds of cybertools to gain control of critical switches. 3 He explained further, They could derail passenger trains or, even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities or shut down the power grid across large parts of the country. 4 The reality is that a cyber war could cripple our nation, while it would take weeks or even months to repair the damage done by malicious code or hacking. If a hostile nation or organization decided to shut down or take over systems that control critical infrastructures, such as electricity, oil, water, gas, and transportation, this nation would be in chaos. Our daily lives are dependent on the consistent functionality of the critical infrastructures to the point where we may even take it for granted. As Panetta stated, the disruption in such processes could result in the inability to pump gas, inability to control ground and air traffic, and deadly contaminants being injected into our water. 6273 19 th AVENUE NE, SEATTLE WA 98115 www.anniesearle.com 206.453.4386 Page 3 of 8

New Game, New Rules As we struggle to understand what cyber warfare entails and the effect it may have on a nation, it is clear that global rules to this type of warfare do not currently exist. In terms of nuclear warfare, there is a general international understanding that the development of WMD should not be pursued and certainly should not be used on against any nation. Nations, such as North Korea, which oppose this general understanding, are in the minority. Ramin Mehmanparast, the Foreign Ministry spokesman of Iran, was quoted saying We think we need to come to a point where no country will have any nuclear weapons. 5 He goes on to say, all weapons of mass destruction and nuclear arms need to be destroyed. 6 Mehmanparast s statement clearly exemplifies a global understanding that the development of nuclear weapons will not be tolerated. However, this type of understanding and agreement has not been yet established for cyber warfare. The need for international rules exists due to the severe damage that can be caused by cyber attacks. Similar to nuclear warfare, where mutually assured destruction would be guaranteed if initiated, cyber warfare will not have any winners or losers just losers. While global rules restrict the use of nuclear weapons against other nations in order 6273 19 th AVENUE NE, SEATTLE WA 98115 www.anniesearle.com 206.453.4386 Page 4 of 8

to preserve the lives civilians and prisoners of war, however in cyber warfare hostile nations can essentially cut another nation s water supply, electrical grid, military defenses through mainframe and network hacking. 7 Damages are not limited there, as information gathered through cyber attacks can include the overall elimination of privacy and intellectual property theft. 8 The United Nations may be best suited for the job to define rules to cyber war. However, this task is easier said than done. Issues can arise when defining what qualifies as a cyber warfare attack, or more so difficult determining where this cyber attack originated. 9 Fears will continue to increase without rules being defined or nation standards established on how to approach defending against cyber attacks. President Obama recently signed an executive order to help protect the United States critical infrastructures from cyber attacks. 10 In this executive order, government officials are directed to work with companies that support critical infrastructures to establish standards around decreasing cyber security threats and vulnerabilities. 11 The order also incentivizes companies to accept and implement these security standards within their own organizations. 12 However, the order does not require companies to share information with each other. 13 In 6273 19 th AVENUE NE, SEATTLE WA 98115 www.anniesearle.com 206.453.4386 Page 5 of 8

regards to cyber security, information sharing among companies would most definitely help create stronger standards and best practices when defending against cyber attacks. Though, those that oppose information sharing express concerns regarding privacy and competitive advantage. Obama s executive order is a great first step to protecting nations and establishing a universal standard that can be implemented globally. According to Mandiant, a U.S. digital- security company, China has been the source of over 100 cyber attacks on the United States (including both public and private entities). 14 The same report claims that a building outside of Shanghai is responsible for these numerous cyber attacks. 15 Mandiant states that the group of hackers housed in this building is known as Unit 61398. 16 The U.S. accuses Unit 61398 to be under the authority of the People s Liberation Army but representatives from Beijing have denied all allegations. 17 Regardless, the report is shocking, as they have traced attacks on 141 companies within 20 different industries to this unit. 18 Although the attacks have been to many different countries, the United States have been the receiving end on a majority of these attacks. Since 2006, the Chinese hacker unit has committed 141 cyber attacks but 115 of those attacks were 6273 19 th AVENUE NE, SEATTLE WA 98115 www.anniesearle.com 206.453.4386 Page 6 of 8

directed towards U.S. companies. 19 As cyber attacks continue to increase, creating a universal understanding will be more important than ever. Conclusion Similar to treaties and agreements in place among many of the world powers regarding nuclear warfare, nations will need to come to an agreement on how cyber warfare should be handled. However, to accomplish this nations will need to first define what constitutes cyber warfare. Additionally, nations will need to establish standards on how to protect against cyber attacks and how to best identify cyber threats. The executive order set forth by President Obama will help establish international norms on how to protect against cyber attacks. However, this is only the beginning of the process. A sizable leap forward will need to take place in order to institute international norms regarding cyber warfare in general. Nations will continue to watch the United States and China closely, as cyber war tensions continue to rise. 6273 19 th AVENUE NE, SEATTLE WA 98115 www.anniesearle.com 206.453.4386 Page 7 of 8

References 1 SecPoint. What is Cyberwarfare? SecPoint.com. Web. 5 Mar 2013. <http://www.secpoint.com/what- is- cyberwarfare.html> 2 SecPoint, n. pag. 3 Daly, Michael. U.S. Not Ready for Cyber War Hostile Hackers Could Launch. The Daily Beast. 21 Feb 2013. Web. 5 Mar 2013. <http://www.thedailybeast.com/articles/2013/02/21/u- s- not- ready- for- cyber- war- hostile- hackers- could- launch.html> 4 Daly, n. pag. 5 Cowell, Alan. Iran Is Said to Convert Enriched Uranium to Fuel. New York Times. 12 Feb 2013. Web. 5 Mar 2013. <http://www.nytimes.com/2013/02/13/world/middleeast/iran- converts- enriched- uranium- to- reactor- fuel- reports- say.html?_r=0> 6 Cowell, n. pag. 7 Monitor s Editorial Board. Wanted: global rules on cyberwarfare. The Christian Science Monitor. 19 Feb 2013. Web. 6 Mar 2013. <http://www.csmonitor.com/commentary/the- monitors- view/2013/0219/wanted- global- rules- on- cyberwarfare> 8 Monitor s Editorial Board, n. pag. 9 Monitor s Editorial Board, n. pag. 10 Selyukh, Alina. Obama executive order seeks better defense against cyber attacks. Yahoo News. 12 Feb 2013. Web. 8 Mar 2013. <http://news.yahoo.com/obamas- executive- order- seeks- better- defense- against- cyber- 021755073.html> 11 Selyukh, n. pag. 12 Selyukh, n. pag. 13 Selyukh, n. pag. 14 Monitor s Editorial Board, n. pag. 15 Reuters Staff. US and China accuse each other of cyberwarfare. Reuters. 20 Feb 2013. Web. 8 Mar 2013. <http://rt.com/usa/cyber- china- war- unit- 604/> 16 Reuters Staff, n. pag. 17 Reuters Staff, n. pag. 18 Reuters Staff, n. pag. 19 Reuters Staff. US losing global cyber war to China House Intelligence chairman. Reuters. 25 Feb 2013. Web 9 Mar 2013. <http://rt.com/usa/us- china- cyber- war- 378/> 6273 19 th AVENUE NE, SEATTLE WA 98115 www.anniesearle.com 206.453.4386 Page 8 of 8