Cyberwar PDF
Cyberwar PDF
Cyberwar PDF
I. Introduction
Disclaimers
Im not a cyber defense guy nor am I a cyber intelligence person,
so some of you may wonder, Hey, why should I trust what Joe
tells me? My answer would be Please DONT! Think carefully
about what I say and verify it yourself!
Since todays topic is quite a sensitive one, Ive made a conscious
effort to be very careful about what I say since I have no desire to
help the bad guys. Ive thus restricted myself to material that is
unequivocally public, often material published in the news media.
At the same time, cyber war, cyber terrorism, and cyber espionage
are topics of increasing timeliness, and our nation and its citizens
will be ill prepared to deal with these threats if those topics never
get any discussion whatsoever. Hence, todays talk.
Id also like to take thank those who offered comments on a draft
of todays talk, including Jose Nazario, Ph.D., of Arbor Networks,
and Steven Bellovin, Ph.D., of Columbia University. Despite that
feedback, all opinions expressed in this talk are solely my own
responsibility and do not necessarily represent any other entity.3
'A Real Nuclear Option for the Nominees: Averting "inadvertent" war in two easy steps,'
Slate, May 9th, 2008, http://www.slate.com/id/2191104/pagenum/all/ [emphasis added]
[] the reason for the 12-minute deadline [for the President to make a launch or
don't launch decision] is that missiles launched from offshore submarines can reach
coastal targets in less than 15 minutes.
So it's insanely short-fused as it is. But when I spoke to [Bruce G.] Blair,
["perhaps the world's leading expert on both the U.S. and the former Soviet Union's
nuclear warning and launch postures"] in Washington last week, he noted an
additional cause for concern: cyber-attacks.
He pointed to the preface of his Oslo paper, which focused on how "information
warfare" in cyberspace heightened the threat of "inadvertent" nuclear war.
"The nuclear command systems today operate in an intense information
battleground," Blair wrote, "on which more than 20 nations including Russia, China,
and North Korea have developed dedicated computer attack programs. These programs
deploy viruses to disable, confuse, and delay nuclear command and warning processes
in other nations. At the brink of conflict, nuclear command and warning networks
around the world may be besieged by electronic intruders whose onslaught degrades
the coherence and rationality of nuclear decision-making. The potential for perverse
13
consequences with computer-launched weapons on hair-trigger is clear."
[yes, this is a doctored photo, used here just to lighten a serious moment]
Source: http://www.armscontrolwonk.com/1955/missile-palooza
14
Humour noire aside, continuing to quote from 'A Real Nuclear Option for the
Nominees: Averting "inadvertent" war in two easy steps':
"Perverse consequences" seems to understate the matter. In a footnote,
Blair cites one scary example: the discovery of "an unprotected electronic
backdoor into the naval broadcast communications network used to transmit
launch orders by radio to the U.S. Trident deterrent submarine fleet.
Unauthorized persons including terrorists might have been able to seize
electronic control of shore-based radio transmitters ... and actually inject a
launch order into the network. The deficiency was taken so seriously that new
launch order validation protocols had to be devised, and Trident crews had to
undergo special training to learn them."
Is this the only "electronic back door"? Or is it just the only one we've
discovered? And if an unauthorized launch order could be insinuated into the
system by hackers, why not a false-attack warning, which could generate an
authorized (but mistaken) launch order? So in addition to the potential for
accidental nuclear war, there is an even more disturbing threat of deliberatebut-unauthorized nuclear launches.
15
Titan Rain
"The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop
Them)," Monday, Aug. 29, 2005 http://www.time.com/time/magazine/
article/0,9171,1098961,00.html [emphasis added]
[] In Washington, officials are tight-lipped about Titan Rain, insisting
all details of the case are classified. But high-level officials at three agencies
told TIME the penetration is considered serious. A federal law-enforcement
official familiar with the investigation says the FBI is "aggressively" pursuing
the possibility that the Chinese government is behind the attacks. Yet they all
caution that they don't yet know whether the spying is official, a private-sector
job or the work of many independent, unrelated hands. The law-enforcement
source says China has not been cooperating with U.S. investigations of Titan
Rain. China's State Council Information Office, speaking for the government,
told TIME the charges about cyberspying and Titan Rain are "totally
groundless, irresponsible and unworthy of refute."
Despite the official U.S. silence, several government analysts who protect
the networks at military, nuclear-lab and defense- contractor facilities tell
TIME that Titan Rain is thought to rank among the most pervasive
cyberespionage threats that U.S. computer networks have ever faced.
[continues]
19
20
Digital Graffiti
25
Source: http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,7464025/
26
27
33
34
36
37
There are two problems with the theory of cyberwarfare in the Caucusus.
The first is that all of the reported attacks consisted of DoS against Web sites,
mostly connected with government functions. There were no reports of attacks
against critical infrastructure, electronic jamming of stock exchanges, SCADA-hack
explosions in substations or anything like that. This was not a battalion of elite
army-trained hackers from the Russian Southern Command of Cyber Warfare
(Unit 1337). In all likelihood it was groups of run-of-the-mill script kiddies with
control of a botnet, stroking their egos with the higher cause of injured nationalism.
More "Boris waz ere" than "All your SCADA are belong to us."
The second problem is that in order for cyberwarfare to be successful
there needs to be a lot of cyberinfrastructure to attack. Georgia and Russia
are both making tremendous strides in development of Internet infrastructure
but let's not kid ourselves. These are not info-economies running all their
banking in virtual reality on top of Second Life. The targets that were
attacked were mostly government brochure-sites. Even in the United States,
where a lot of government services are delivered over the Web, a sustained
DoS attack against government Web sites would not really affect the
economy. It would simply make the online experience more like the real-life
DMV experience, and we somehow survived that fine up to 1995.
Source: Georgia Cyberwar Overblown, Andreas Antonopoulos, 8/19/2008
http://www.networkworld.com/columnists/2008/081908-andreas.html [emphasis
added]
38
39
www.narus.com/blog/2008/04/28/radio-freedom-yet-another-ddos-attack
41
43
http://www.defenselink.mil/pubs/pdfs/070523-China-Military-Power-final.pdf
[The CNO in the above quotation stands for Computer Network Operations]
49
[] when I say reduce our exposure, these are the sorts of things on this
slide that we want to try to minimize in terms of making their way on to DoD
networks, things like root kits, virus/worms, spyware/adware, and the most
difficult one that we're all facing, both on the industry side as well as the
U.S. government side, are socially engineered e-mail or phishing attacks,
very difficult problem today, especially for folks that are able to really do
reconnaissance and understand an organization, their TTPs [tactics, techniques
and procedures], how they do business. They understand the people in those
organizations so that when you or I receive an e-mail that looks like it's
coming from our boss, why wouldn't we open it?
And in many cases, that socially-engineered e-mail has malicious
software or payload that takes you to a site that allows you to be
compromised, many times unbeknownst to you.
Hearing on Chinas Proliferation Practices, and the Development of its Cyber
and Space Warfare Capabilities,
http://www.uscc.gov/hearings/2008hearings/transcripts/08_05_20_trans/
08_05_20_trans.pdf
50
Source: http://news.cnet.com/8301-13578_3-10045980-38.html
54
64
http://www.washingtonpost.com/wp-dyn/content/article/2006/03/25/AR2006032500020_pf.html
67
69
70
71
72
http://query.nytimes.com/gst/fullpage.html?res=9B01E3D91730F933A05753C1A9679C8B63 73
79
Source: http://www.au.af.mil/info-ops/
80
82
<== 11.4%
Legitimate
Email
<== 200
BILLION
Spam/day
85
93
IPv6 has many of the same vulnerabilities that IPv4 does, and a site with IPv4
and IPv6 may see both improvements and some new problems when it comes to
their sites overall security. For example, because IPv6 address blocks tend to
be large, they make it more difficult for an adversary to attempt to exhaustively
map IPv6 address ranges. On the other hand, just to mention one factor, many
security appliances have limited support for IPv6, which means that IPv6 traffic
may be largely opaque to security staff monitoring.
See IPv6 and IPv4 Threat Comparison and Best-Practice Evaluation (v1.0),
http://www.cisco.com/security_services/ciag/documents/v6-v4-threats.pdf
-----* As of 2-Oct-2008, the best estimates are 18 Nov 2010 (at IANA),
and 18 Nov 2011 (at the RIRs), but those dates may/will change over time.94
96
www.cnn.com/2008/WORLD/asiapcf/02/25/pakistan.youtube/
98
99
104
A 60 car train derailed and caught fire in the Howard Street Tunnel under
Baltimore MD, the afternoon of July 18th 2001. 1.7 miles in length, the Howard
Street Tunnel is the longest active underground train route on the East Coast.
That tunnel was also used as a route for fiber optic cables, cables which burned as
a result of the train fire.
Media reports stated that a Silicon Valley company tracking Internet
traffic said the train accident caused the worst congestion in cyberspace in
the three years that it has monitored such data. The link through Baltimore
is basically the 1-95 of Internet traffic into and out of Washington, said the
Director of Public Services for a company that monitors Internet flow by the
hour on its Web site. The accident had almost no impact in some areas,
including parts of Baltimore, while certain connections were 10 times slower
than normal, such as the ones between Washington, D.C., and San Diego.
Note: While this particular choke point may (or may not) have been eliminated,
Im sure that there are other similar critical choke points which remain
unremediated, whether those are tunnels, bridges, etc.
----* TR-140 CSX Tunnel Fire,
http://www.usfa.dhs.gov/downloads/pdf/publications/tr-140.pdf
107
www.sfgate.com/cgi-bin/article.cgi?f=/n/a/2008/01/18/national/w122440S64.DTL
112
116
XV. Conclusion