Cyber Terrorism and Greek Defence Stategy
Cyber Terrorism and Greek Defence Stategy
Cyber Terrorism and Greek Defence Stategy
Georgios X. Protopapas
1 Introduction
In the age of globalization and Information technology the use of internet has rapidly
increased influencing the functioning of governmental and private bodies. The
individuals and communities worldwide connect and communicate through the
internet. The number of internet users increased significantly between 2000 and 2010:
from 360 million to over 2 billion people.
The cyberspace, which based on extensive computer networks, has become one of the
key elements of modern society. The information systems are particularly important for
all global cyber transactions at the international and national levels. They cover a large
spectrum of public and private activities related to the economy, banking and finance,
transport and energy, utilities, health, food supply and communications. The critical in
frastructures are an integral part of wide computer networks vulnerable to cyber attacks.
Cyber terrorism is an asymmetric threat that causes serious anxiety to states, regional
and international organizations and military alliances. The disruption or damage of
critical infrastructure is the main objective of cyber terrorists who can easily acquire
the necessary inexpensive know-how and technology. The cyber threat is shifting to the
masses and the possibilities for cyber attacks are greater than ever before.
This paper focuses on sensitive issues of cyber defence and cyber terrorism and analyses
the advantages and disadvantages based on three parameters: a) the relation between
cyber terrorism - critical infrastructure and the response of the USA and NATO to cyber
attacks, as a superpower and a powerful military alliance, respectively, b) the policies of
the European Union could be designed to avert cyber attacks and c) the cyber defence of
Greece, a medium-sized European Union member state aspiring to establish a National
Cyber Defence Authority.
The definition of cyber terrorism and critical infrastructures is of great importance
because it can help understand how they change the structures of conventional
warfare. The major powers attempt to control the complex cyber space by monitoring
programmes and methods of the advanced information technology. The USA and
NATO are facing the risk for a large-scale cyber terrorism attack that could damage
93
!
Se c t i o n II: C y b e r T h r e a t s to C r i t ic a l I n f r a s t r u c t u r e
their critical infrastructures provoking havoc and panic. At the same time, twenty-seven
member states of the European Union m ust agree on a collective and well coordinated
cyber defence strategy. The European Commission has proposed concrete initiatives
for the fight against cyber attacks and the protection of European critical infrastruc
ture. The exercise Cyber Europe 2010 is considered a dynamic test of the European
Unions preparedness exposing useful considerations and conclusions. The Greek cyber
exercise POMASTIS 2010 is also considered a significant effort by Greek authorities.
The main objective of the exercise was to detect gaps and vulnerabilities in the cyber
space domain. The existing cyber security mechanism is vast and complex consisting of
dozens of ministries and directorates with overlapping duties and activities.
This paper focuses on the necessity for cooperation between the engaged actors,
governments and private companies at the international and national level. The faceless
enemy of cyber terrorism demands an effective cyber defence strategy.
95
S e c tio n II: C y b e r T h r e a t s to C ritic a l In fra s tru c tu re
- Strategic Initiative 3: Partner with other U.S. government departments and agencies
and the private sector to enable a whole-of-government cyber security strategy
- Strategic Initiative 4: Build robust relationships with U.S. allies and international
partners to strengthen collective cyber security.
- Strategic Initiative 5: Leverage the nations ingenuity through an exceptional cyber
workforce and rapid technological innovation.
Cyber terrorism does not exclude NATO and its critical infrastructures that are playing
an essential role in the accomplishment of peacekeeping and military operations. NATO
is not concerned only with its own cyber defence but also with the security of member
states. During the 2002 Prague Summit NATO established the NATO Computer Incident
Response Capability (NCIRC). The mission of the NCIRC was to detect and prevent
computer viruses and intrusions into computers systems of the Atlantic Alliance. In
January 2008, the decision-makers approved the formation NATO Cyber Defence
Policy and as a result two bodies were created (J. McGee: 2011): a) The Cooperation
Cyber Defence Center of Excellence (CCDCoE), based in Tallinn, Estonia. The mission
of CCDCoE is to provide cyber doctrine and concepts, training workshops, research,
insight on previous incidents, and advice concerning current attacks, b) The Cyber
Defence Management Authority (CDMA), responsible for initiating and coordinating
responses to cyber attacks against allied member states and NATO itself. It is considered
an important step in NATO Cyber Defence because it helps member states improve their
own cyber security.
Broadly speaking, the cyber security should become the front line against cybers attack
and the national government could offer the resources required for the establishment
of a powerful cyber defence strategy. The USA, NATO and the European Union have
accepted that their critical infrastructures are vulnerable to large scale cyber attacks.
f :. '
I. . I if
!if
Security Strategy in Action has already proposed steps for collective cooperation in the
next three years in order to fight and prevent the cybercrime (EC -COM2010). The
Objective 3 with title Raise levels of security for citizens and businesses in cyberspace
recognizes the security IT networks as a fundamental factor for the well-functioning of
the information society and recommends the three following actions (EC-COM2010):
Build law enforcement and judiciary capacities: By 2013, the EU will create a cybercrime
centre through which member states and EU institutions will have an opportunity
to acquire operational and analytical capacity for conducting investigations and for
cooperation with international partners. The aim of the cybercrime centre will be the
improvement of evaluation and monitoring of the existing prevention and investigation
measures. At the national level, the police, judges, prosecutors and forensic investigators
of the member states should follow common standards in investigating and prosecuting
cybercrime offences. In cooperation with Eurojust, CEPOL and Europol, the member
States must develop their national cybercrime awareness and training capacities in order
to establish centres of excellence at the national level or in a partnership with other
member states.
- Work with the industry to empower and protect citizens: All member states should
encourage the reporting of cybercrime incidents by their citizens. The evaluation
of certain information is considered an initial vital element for a cybercrime
/ alert
platform. The member states should ensure that their citizens will have direct access
to the guidance on cyber threats and the basic precautions that need to be taken.
In 2013, the European Commission plans to establish a real-time control pool of
shared resources and best practices among the member states and the industry.
The European Public-Private Partnership for Resilience (EP3R) should play a
leading role in ensuring an increased cooperation between the public and private
sector. Moreover EP3R should cultivate interactions with international partners to
strengthen the global risk management of IT networks.
- Improve capability for dealing with cyber attacks. The strategy of prevention,
detection and direct response to cyber attacks could be accomplished by means of
the following policies: a) every member state and EU institutions should establish
a well-functioning CERT (Computer Emergency Response Team) by 2012, b)
member states should establish a network with their/national governmental CETRs
in order to increase Europes preparedness and c) member states in cooperation
with ENISA should implement national the contingency plans and carry out regular
national and European exercises for incident response and disaster recovery.
The European Unions preparedness for and response to a large-scale cyber attack was
tested during the Cyber Europe 2010 exercise which was carried out under the aegis
of the European Network and Information Security Agency (ENISA). According to
the Cyber Europe 2010 Evaluation Report the exercise was a first key step towards the
strengthening of the Europes cyber defen ce and was of vital importance for the common
goal to combat potential online threats to essential infrastructure, so ensuring that
businesses and citizens feel safe and secure online (Cyber - Europe 2010- Evaluation
Report 2011). The central control - the Exercise Control (EXCON), based in Athens,
97
Se c t io n : C y b e r T h r e a t s to C r i t i c a l In f r a s t r u c t u r e
gave direction and guidance to the participants. Based on the findings of the exercise it
can be concluded that the cyber test was useful for the member states and their public
bodies (Cyber Europe 2010- Evaluation Report 2011). The executive director of the
ENISA, Dr. Udo Helmbrecht, stated that the Cyber Europe 2010 exercise was the first
successful cyber stress test for Europe. It fully m et its objectives to test Europes readiness
to face online threats to essential critical infrastructure used by citizens, governments
and businesses. We will work closely with member states to identify and implement the
lessons learnt from this exercise. We also encourage member states to continue their
efforts in the area of exercises, both at national and pan European levels. ENISA will
strongly support their efforts (Cyber Europe - Interim Finding: 2010). The purpose of
the Cyber Europe 2010 exercise was to help the member states of the European Union to
restore their communication using alternative connections. The exercise was considered
very successful as member states managed to restore the communication networks earlier
than the time provided the scenario. The member states managed to communicate about
a wide variety of issues and they showed that harmonization could lead to a more secure
and well-organized communication among the member states (Cyber Europe - Interim
Finding: 2010).
The quick and collective response and the detection of cyber attacks traces would
enhance the effectiveness of the cyber defence strategy. Computer Emergency Response
Teams (CERTs) and Computer Security Incident Response Teams could develop and
cooperate at the international level and not only at the national level (A. Guinchard:
2011). Moreover, according to Audrey Guinchard technical detection will have to
be combined with adequate legal reporting. W hen it comes to cyber crime, reliable
reporting mechanisms are not always available (A. Guinchard: 2011).
However it is of great importance to underline the absence of the private sector from
Cyber Europe 2010. The threat of cyber attack comprises the public and private sectors
which should face the cyber terrorism with a coordinated strategy. Future exercises should
include the private sector so the cyber attack scenario would resemble the real situation
more (Cyber - Europe 2010- Evaluation Report 2011). In mid 2011 a series of cyber
intrusion have been reported in corporations such as Citibank, Sony, Google, Lockheed
Martin and Northrop Grumman. The cyber threat landscape has a wide spectrum of
users and receivers who cover public and private bodies. The ability to pose a cyber threat
is shifting to the masses as more people have managed to have access to inexpensive
technology and the internet. Persons with a very basic knowledge of computer could buy
hacking tools and manuals online. Furthermore markets which specialize in stolen credit
cards, personal data or identities are easily accessed (V. Sarkisian: 2011).
managed to create a specialized force. We could assume that after eleven years the
field of cyber defence has been developed and dozens of ministries have been tasked
with the security of computer systems raising legitimate questions for the level of
responsiveness and harm onization in the event of large-scale cyber attacks (E,
Stavrakakis: 2011).
In July 2011, a team of hackers named Real Democracy Reverse Engineering attacked
the website of the Greek Parliament. O ther major targets of attacks were the M inistry
of National Defence and other Greek ministries. The Cyber Crime Unit considered
the appearance of a group with the code name Anonymous which heralded a series
of attacks on the websites of different public bodies to be a significant threat. The
vast public cyber security umbrella which is responsible for the prevention of cyber
attacks includes the following agencies:
Hellenic National Defence General Staff: Directorate of Information/School of
Information Systems Security, D epartm ent of Comm unications/Departm ent for
the Security of Communications, D epartm ent of Comm unications/Department of
Inform ation Warfare, Directorate of Cyber Defence. The Hellenic National Defence
General Staff is a national security authority responsible for issuing national security
regulations in cooperation with the National Intelligence Service. The plan addresses
the security of classified, sensitive national information and applies to all public
bodies and agencies. The D epartm ent for Security of Information Systems serves
as a security' coordination centre for incident responses while the Departm ent for
Communications Security serves as a technical adviser of the National Certification
Authority for Security.
1. National Intelligence Service (NIS): It is characterized as the Authority of
International Security (INFOSEC) and it ensures the security of national
communications and inform ation technology systems. Moreover the NIS is
responsible for the certification of classified material of national communica
tions. It was designated as the National Authority for the Protection of Cyber
Attacks and prevents cyber attacks against communication networks, storage
facilities and information systems.
2. National Computer Emergency Response Team: In accordance with the
decisions of the Governmental Council for Foreign Policy and National Defence,
the National Computer Emergency Response Team coordinates the activities
of intelligence services related to the collection and disposal of information. It
cooperates with the D epartm ent of Military Intelligence and intelligence staffs
supervised by it. Moreover the National Computer Emergency Response Team
collaborates with the Departm ent of Military Intelligence on the issue of drafting
regulations, certification systems, prevention and treatm ent of cyber attacks.
3. Hellenic Police: The Forensic Division provides technical support to law
enforcement authorities, while the Cyber Crime Unit is responsible for inter
rogations and investigations.
4. General Secretariat of Communications of the M inistry of Infrastructure,
Transport and Networks: It collaborates with the Directorate of Banking
S e c t io n II: C y b e r T h r e a t s to C r it ic a l I n f r a s t r u c t u r e
100
G e o r g io s X . P r o t o p a p a s : C y b e r T e r r o r is m and G r e e k D e f e n c e St r a t e g y
objective of the exercise was to train participants in their response against aggressive
cyber operations which could threaten the Greek national defence. The exercise was
coordinated by the Hellenic National Defence General Staff and based on its experience
and successful participation of Greece in a similar NATO exercise (NCDEX-09). It
m ust be stressed that the participants were not familiar with the scenarios and that
the cyber attacks took place in real time (PANOPTIS: 2010). Dimitris Critzalis,
professor at the D epartm ent of Informatics at the Athens University of Economics
& Business argued that the purpose of the exercise had two essential aims: Firstly,
the establishment of cooperation among operators and specialists, secondly, the
systematic record and the study of the level of perception, knowledge and response
against cyber attacks (D.Gritzalis: 2010). The scenario of the exercise included a wide
range of targets throughout the country. The attacks were scalable, simultaneous,
mass, coordinated, repeating and directed. To make the exercise more authentic the
aims included informational and physical infrastructures. The scenario envisaged by
the existing geopolitical situation and the possibility of provocative actions against
Greece which could cause a warm episode or even a conflict with a neighbouring state
(PANOPTIS 2010).
Most of the planned attacks were successfully countered. This is a positive outcome,
since the exercise was carried out in Greece for the first time. However a number
of attacks were handled with a relatively low efficiency. However, the participants
managed to make useful conclusions that will help them adopt necessary measures in
the near future (D.Gritzalis: 2010).
The decision makers of national defence have realized that the enemy will exploit the
increased power of inform ation technology to cause extensive damage to political,
m ilitary and industrial infrastructure of the state. In January 2011, the former minister
of National Defence, E. Venizelos, requested the Directorate of Cyber Defence of the
Hellenic National Defence General Staff to prepare a report which would outline
the precondition for the foundation of the National Authority Cyber Defence. That
decision of the former m inister of Defence E. Venizelos could change the existing in
frastructure of the cyber defence policy creating an efficient and quick response of the
cyber defence unit.
The materialization of the National Authority Cyber Defence demands rapid changes
in a states legal framework. The am endm ent of the existing legal framework which
is in apparent discrepancy with the reality should be the first step. A second decision
could include the improvement of the Directorate of Cyber Defence of the Hellenic
National Defence General Staff based on the NATO member states standards. The
necessary funding for the upgrade is estimated to 2-3 million euro, a relatively small
am ount of money (M.Iliadis: 2010). Tne third and the most essential factor is for the
authorities to understand that the foundation of the National Cyber Defence Authority
requires a complex approach and cooperation with Directorate of Cyber Defence of
the Hellenic National Defence General Staff - the only experienced actor - and several
other agencies and universities, which can contribute both at the theoretical and
research levels (M.Iliadis: 2010).
101
S e c t io n II: C y b e r T h r e a t s to C r i t ic a l I n f r a s t r u c t u r e
5 Conclusion
The threat of cyber attacks requires that states and corporations, in a world that depends
on the internet more than ever, devote more resources to cyber security. Critical infra
structures are main targets of cyber terrorism which wants to disrupt or destroy physical
and information technology facilities, networks, services and assets.
The key element for a successful and effective cyber defence strategy is the cooperation,
coordination and quick response of public institutions and the private sector. The
systematic cooperation could manage to create a scientifically superior multi-disciplin
ary team that could cope with large-scale cyber attacks against the critical infrastructures
of states. The easy access to internet, the use of billion computers and the vast network
prevent a strict control of the state authorities on the internet.
Potential large scale cyber attacks have incited fear in the USA administration and the de
cision-makers of the Department of Defence who have issued a counter cyber strategy in
order to avoid the next Pearl Harbor. Although the USA as superpower has the expertise
and the technology to counter a large-scale cyber terrorism attack, it is uncertain if the
state authorities could prevent the disruption of or damage to their critical infrastruc
tures. The enemy is not a conventional enemy but a faceless and remote entity.
On the other hand, the European Union has adopted policies for the protection of
the internet. However, only the development of collective cyber defence could protect
computer networks and critical infrastructures of member states. The European Union
Internal Security Strategy in Action proposes five steps for close cooperation which
could be achieved by the member states in the near future.
Greece, a member state of the European Union, is in the process of adopting a cyber
defence strategy with the intention to protect its critical infrastructures. The level of re
sponsiveness and harmonization of numerous directorates in the event of large-scale
cyber attacks remains questionable. The foundation of a National Authority Cyber
Defence with extensive control over the cyber defence agencies seems to be the most
effective solution.
The asymmetrical threats of the 21st century, such as cyber terrorism demands a collective
and well coordinated cooperation between the USA, the European Union, NATO and the
United Nations. Only the harmonization of their capacities and strategies could prevent
large scale cyber terrorism attacks. Global digital security in the 21st century could be
examined by the following perceptions (Oliver Rolofs: 2011): a) cyber defence threats
differ greatly from the existing national security logic, because the conventional response
strategy reached its limits in this field. The lack of clarity concerning the attackers and
their motives are considered to be vital problem which limiting the response capabilities
of cyber defence; b) cyber vulnerability of m odern societies is considered to be a global
challenge which requires transnational solutions. The first step could be the establish
ment of legal and institutional instruments for international dialogue based on norms of
behaviour and confidence-building measures; c) an acceptable cyber security standard
could be achieved by close coordination and international cooperation between
countries, societies and the global economy.
-102 j
1/
G e o r g io s X . P r o t o p a p a s : C y b e r T e r r o r is m and G r e e k D e f e n c e St r a t e g y
References
1. Cyber Europe 2010- Evaluation Report, 2011 ( http://wnw.enisa.europa.eu/act/res/
cyber-europe-2010/cyber-europe-2010-report) (Retrieved 5/8/11)
2. Cyber Europe - Interim findings 2010 http://www.continuitycentral.com/news05473.
html (Retrieved 5/8/11)
3. Dunn Cavelty Myriam (2011), Cyberwar: A More Realistic Threat Assessment,
International Relations and Security Network (ISN), http://www.isn.ethz.ch/isn/
Current-Affairs/ISN Insights/Detail?lng=en&id=129766&contextid734=129766&contex
tid735=129764&tabid=129764 (Retrieved 5/8/11)
4. European Commission, Communication from the Commission to the Council and
the European Parliament, with title Critical Infrastructure Protection in the fight
against terrorism, Brussels, 20.10.2004, COM(2004) 702 final http://eur-lex.europa.eu/
LexUriServ/LexUriServ.do?uri=COM:2004:0702:FIN:EN:PDF, (Retrieved 6/8/11)
5. European Commission, Communication from the commission to the European
Parliament and the Council, with the title The EU Internal Security Strategy in Action:
Five steps towards a more secure Europe, Brussels 22.11.2010 (COM (2010) 673 final,
(http://ec.europa.eu/commission_20102014/malmstrom/archive/internal_security_
strategy_in_action_en.pdf) (Retrieved 6/8/11)
6. Gritzalis Dimitris (31/July 2010) Interview in Strategy Reports, http://www.
strategvreport.gr/?p=2716 (Retrieved 6/8/11)
7. Guinchard Audrey (2011), Between Hype and Understatement: Reassessing Cyber
Risks as a Security Strategy, Journal of Strategic Security, Volume IV Issue 2 2011, p.79
8. Iliadis Manos (15/1/2010), In Front of National Authority Cyber Defence, Greek
newspaper Investors World, p.30
9. Lewis James A (2002), Assessing the Risks of Cyber Terrorism, Cyber War and Other
Cyber Threats, Strategic and International Studies, http://csis.org/files/media/csis/
pubs/02110l_risks_of_cyberterror.pdf (Retrieved 5/8/11)
10. Lewis James A (2006), Cybersecurity and Critical Infrastructure Protection, Center
for Strategic and International Studies, http://directory.cip.management.dal.ca/
publications/Cybersecurity%20and%20Critical%20Infrastructure%20Protection.pdf
(Retrieved 5/8/11)
11. McGee Joshua (2011), NATO and Cyber Defense: A Brief Overview and Recent Events,
Center for Strategic and International Studies http://csis.org/blog/nato-and-cyber-
defense-brief-overview-and-recent-events (Retrieved 6/8/11)
12. Mulrine Anna (June 9, 2011), CIA chief Leon Panetta: The next Pearl Harbor could be
a cyberattack, international newspaper The Christian Science Monitor, http://www.
csmonitor.com/USA/Military/2011/0609/CIA-chief-Leon-Panetta-The-next-Pearl-
Harbor-could-be-a-cyberattack (Retrieved 5/8/11)
13. Nye Joseph S. (30 May 2011), Cyber Security and National Security, New Europe http://
neurope.eu/cybersecurity2011/?p=73 (Retrieved 5 /8/11)
14. PANOPTIS Cyber Exercise 2010, Greek Journal of Military Balance and Geopolitics,
No.4, June 2010, p.12
103
S e c tio n II: C y b e r T h r e a t s t o C r i t i c a l I n f r a s t r u c t u r e
15. Report: Coordinated supervision and management of security and privacy in Greece,
October 2010, http://athina.cs.unipi.gr/imerida/index.php (Retrieved 6/8/11)
16. Rolofs Oliver, Towards a new digital security culture , New Europe Special Edition
for Cyber Security, 30 May 2011, http://neurope.eu/cybersecurity2011/?p=51 (Retrieved
4/8/11)
17. Sarkisian Vartan (30 May 2011),, The Cyber-Jungle, newspaper New Europe, (http://
neurope.eu/cybersecurity2011/?p=81)
18. Stavrakakis Emmanuel (16-17 July 11), Alert in Cyber Crime Unit, Greek newspaper
Investors World, p.4
19. Symposium of CACI International Inc (CACI) and the U.S. Naval Institute (USNI)
Cyber Threats to National Security, Symposium One: Countering Challenges to the
Global Supply Chain, March, 2010, http://asymmetricthreat.net/docs/asymmetric_
threat_4_paper.pdf (Retrieved 6/8/11)
20. USA Department of Defense, Department of Defense Strategy for Operating in Cyber
Space, July 2011, http://www.defense.gov/news/d20110714cyber.pdf (Retrieved 5/8/11)
104