Operation “Olympic Games” Securing Memory Sharing

Total Page:16

File Type:pdf, Size:1020Kb

Operation “Olympic Games” Securing Memory Sharing OPERATION “OLYMPIC GAMES” SECURING MEMORY SHARING FOR CLOUD TENANTS Kshitij Yadav Associate Sales Engineer Analyst Dell EMC [email protected] Abhiram T.S. Associate Sales Engineer Analyst Dell EMC [email protected] Knowledge Sharing Article © 2020 Dell Inc. or its subsidiaries. The Dell Technologies Proven Professional Certification program validates a wide range of skills and competencies across multiple technologies and products. From Associate, entry-level courses to Expert-level, experience-based exams, all professionals in or looking to begin a career in IT benefit from industry-leading training and certification paths from one of the world’s most trusted technology partners. Proven Professional certifications include: • Cloud • Converged/Hyperconverged Infrastructure • Data Protection • Data Science • Networking • Security • Servers • Storage • Enterprise Architect Courses are offered to meet different learning styles and schedules, including self-paced On Demand, remote-based Virtual Instructor-Led and in-person Classrooms. Whether you are an experienced IT professional or just getting started, Dell Technologies Proven Professional certifications are designed to clearly signal proficiency to colleagues and employers. Learn more at www.dell.com/certification 2020 Dell Technologies Proven Professional Knowledge Sharing 2 Table of Contents Introduction .................................................................................................................................................. 4 Stuxnet ...................................................................................................................................................... 4 Computer Worm ....................................................................................................................................... 4 Payload ...................................................................................................................................................... 4 Zombie ...................................................................................................................................................... 4 Initial Plot ...................................................................................................................................................... 5 What It Targeted ....................................................................................................................................... 6 Who Identified It ....................................................................................................................................... 7 The Acual Working ........................................................................................................................................ 7 Step 7 software infection .......................................................................................................................... 8 PLC infection ............................................................................................................................................. 9 Countries It Effected ................................................................................................................................... 10 Stuxnet effect on Iran ............................................................................................................................. 11 Purpose of Stuxnet .................................................................................................................................. 12 Stuxnet Source Code ............................................................................................................................... 12 The Reactions .............................................................................................................................................. 13 Iran .......................................................................................................................................................... 13 Israel ........................................................................................................................................................ 14 USA .......................................................................................................................................................... 16 Legacy of Stuxnet ........................................................................................................................................ 17 Precautions Over Stuxnet Types ................................................................................................................. 17 McAfee Recommendations ..................................................................................................................... 17 Symantec Endpoint Protection – Application and Device Control ......................................................... 18 Conclusion ................................................................................................................................................... 18 References .................................................................................................................................................. 20 Disclaimer: The views, processes or methodologies published in this article are those of the authors. They do not necessarily reflect Dell Technologies’ views, processes or methodologies. Dell.com/certification 3 Introduction Stuxnet Stuxnet is a malevolent PC worm, first revealed in 2010, though thought to have been being developed in 2005. Stuxnet targets supervisory control and data acquisition (SCADA) frameworks and is suspected liable for greatly harming the atomic program of Iran. While neither country has straightforwardly assumed responsibility, the worm is widely considered a cyberweapon constructed together by the United States and Israel. Before we get into Stuxnet let us see what precisely a PC worm is. Computer Worm Albeit neither one of the countries has straightforwardly conceded duty, the worm is generally comprehended to be a cyberweapon constructed together by the United States and Israel. Presently, before we get into Stuxnet let us see what precisely a "payload" is. Payload Normal malignant payloads may erase records on a host framework, scramble records in a ransomware assault, or exfiltrate information, for example, classified reports or passwords. The payload is the piece of transmitted information that is the real expected message. Headers and metadata are sent distinctly to empower payload conveyance. With regard to a PC infection or worm, the payload is the segment of the malware which performs vindictive activity. The term is acquired from transportation, where payload alludes to the piece of the heap that pays for transportation. The payload is the piece of the private client content which could likewise contain malware, for example, worms or infections which plays out the vindictive activity; erasing information, sending spam or scrambling information. Notwithstanding the payload, such malware additionally regularly has overhead code focused on essentially spreading itself or maintaining a strategic distance from identification. Worms spread by abusing vulnerabilities in working frameworks. Merchants with security issues supply standard security refreshes, and on the off chance that these are introduced to a machine, at that point most worms can't spread to it. In the event that a powerlessness is uncovered before the security fix discharged by the seller, a zero-day assault is conceivable. Presumably the most well-known payload for worms is to introduce an indirect access. This permits the PC to be remotely constrained by the worm creator as a "zombie". Systems of such machines are frequently alluded to as botnets and are generally utilized for a scope of vindictive purposes, including sending spam or performing Denial of Service (DoS) assaults. Zombie A zombie is a PC associated with the Internet that has been undermined by a programmer, PC infection or trojan steed program and can be utilized to perform malignant undertakings of some 2020 Dell Technologies Proven Professional Knowledge Sharing 4 sort under remote course. Botnets of zombie PCs are regularly used to spread email spam and dispatch disavowal of-administration assaults (DoS assaults). Most proprietors of "zombie" PCs are uninformed that their framework is being utilized right now. Since the proprietor will in general be uninformed, these PCs are figuratively contrasted with anecdotal zombies. An organized Distributed Denial of Service (DDoS) assault by various botnet machines additionally looks like a "zombie swarm assault", as often seen in anecdotal zombie films. Zombies can be used to lead DDoS assaults, a term which alludes to the organized flooding of target sites by huge quantities of PCs without a moment's delay. The enormous number of Internet clients making concurrent solicitations of a site's server is expected to bring about smashing and counteraction of real clients from getting to the webpage. A variation of this kind of flooding is known as circulated debasement of-administration. Submitted by "beating" zombies, appropriated corruption of-administration is the directed and periodical flooding of sites expected to back off as opposed to crash an injured individual site. The viability of this strategy springs from the way that serious flooding can be immediately distinguished and helped, yet beating zombie assaults and the subsequent
Recommended publications
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Iran Dossier
    30 November 2010 Last updated at 14:48 GMT Iran and EU agree new nuclear talks Iran's nuclear negotiator Saeed Jalili is to travel to Geneva for the talks Iran has agreed to hold talks on its controversial nuclear programme, the European Union has said. The talks are to take place in Geneva on 6 and 7 December, said the EU's foreign policy chief, Baroness Ashton. They will be the first high-level direct talks with Iran on the nuclear issue since October 2009. Western powers fear Iran is seeking to develop nuclear weapons, but Tehran insists its uranium enrichment programme is peaceful and legal. Baroness Ashton's office said that meetings with Iranian chief nuclear negotiator Saeed Jalili next week see the EU's foreign policy chief would lead a delegation of officials from the five permanent members of the UN Security Council - US, Russia, China, France and Britain - as well as Germany. "We've now received a response from the Iranian authorities in which they have said that Dr Jalili has accepted Catherine Ashton's proposal to meet in Geneva", a spokesman said on Tuesday. Western countries have called on Iran to stop all enrichment of uranium amid accusations that the country is pursuing a secret nuclear weapons programme. Iran's defiance has led to sanctions on the country, which says it uses nuclear technology only for peaceful purposes. As a member state of the Nuclear Proliferation Treaty (NPT), Iran says it has the right to enrich uranium to produce nuclear fuel. Iranian President Mahmoud Ahmadinejad vowed on Tuesday that his country would not make "one iota" of concessions over its nuclear rights at the meetings in Geneva.
    [Show full text]
  • Iran and Israel's National Security in the Aftermath of 2003 Regime Change in Iraq
    Durham E-Theses IRAN AND ISRAEL'S NATIONAL SECURITY IN THE AFTERMATH OF 2003 REGIME CHANGE IN IRAQ ALOTHAIMIN, IBRAHIM,ABDULRAHMAN,I How to cite: ALOTHAIMIN, IBRAHIM,ABDULRAHMAN,I (2012) IRAN AND ISRAEL'S NATIONAL SECURITY IN THE AFTERMATH OF 2003 REGIME CHANGE IN IRAQ , Durham theses, Durham University. Available at Durham E-Theses Online: http://etheses.dur.ac.uk/4445/ Use policy The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that: • a full bibliographic reference is made to the original source • a link is made to the metadata record in Durham E-Theses • the full-text is not changed in any way The full-text must not be sold in any format or medium without the formal permission of the copyright holders. Please consult the full Durham E-Theses policy for further details. Academic Support Oce, Durham University, University Oce, Old Elvet, Durham DH1 3HP e-mail: [email protected] Tel: +44 0191 334 6107 http://etheses.dur.ac.uk 2 . IRAN AND ISRAEL’S NATIONAL SECURITY IN THE AFTERMATH OF 2003 REGIME CHANGE IN IRAQ BY: IBRAHIM A. ALOTHAIMIN A thesis submitted to Durham University in fulfilment of the requirements for the degree of Doctor of Philosophy DURHAM UNIVERSITY GOVERNMENT AND INTERNATIONAL AFFAIRS March 2012 1 2 Abstract Following the US-led invasion of Iraq in 2003, Iran has continued to pose a serious security threat to Israel.
    [Show full text]
  • Issue No. 486 AUGUST 2021
    Issue Brief ISSUE NO. 486 AUGUST 2021 © 2021 Observer Research Foundation. All rights reserved. No part of this publication may be reproduced, copied, archived, retained or transmitted through print, speech or electronic media without prior written approval from ORF. The Limits of Military Coercion in Halting Iran’s Nuclear Weapons Programme Kunal Singh Abstract Israel believes that the use of force is essential to stopping Iran from making the nuclear bomb. A vocal section of the strategic affairs community in the United States agrees with the proposition. This brief argues that military means are unlikely to sabotage the nuclear weapons programme of an advanced-stage bomb-seeker like Iran. Moreover, use of force could be counterproductive as it can incentivise Iran’s pursuit of the bomb, and it may erode the confidence required for diplomatic negotiations that can possibly help cease the weapons programme. Attribution: Kunal Singh, “The Limits of Military Coercion in Halting Iran’s Nuclear Weapons Programme,” ORF Issue Brief No. 486, August 2021, Observer Research Foundation. 01 n early April in Vienna, the Biden administration initiated efforts with Iran to reinstate the Joint Comprehensive Plan of Action (JCPOA), more commonly known as the Iran nuclear deal, from which the United States (US) had exited during the tenure of former US President Donald Trump. A week later, an explosion at Iran’s Natanz uranium enrichment Ifacility caused a power blackout. Israel, the state most vocally opposed to the JCPOA, is widely believed to have
    [Show full text]
  • Iran: Recent Incidents Likely a Coordinated String of Deliberate Attacks
    The Cambridge Security Initiative IRAN: RECENT INCIDENTS LIKELY A COORDINATED STRING OF DELIBERATE ATTACKS JULY 2020 Richard C. Baffa Since early May, Iranian critical infrastructure and national security facilities have been subject to at least nine fires, explosions, and apparent cyberattacks; eight of these have taken place since 26 June. The nature of the targets and the short period of time in which they have occurred is unprecedented, strongly pointing to deliberate attacks and/or sabotage. Tehran has downplayed many of the incidents as accidents, but unofficially blamed the United States, Israel, and an unnamed Arab state (likely Saudi Arabia and/or the United Arab Emirates), and has vowed to retaliate. Two of the sites, the Natanz enrichment facility and Khojir military base, are highly secure national security facilities, harbouring sensitive nuclear and ballistic missile capabilities, including the IR-4 and IR-6 generation of modern centrifuges. At Natanz, an explosion and fire damaged a new, high-value centrifuge production/assembly plant on 2 July; the building is adjacent to underground fuel production facilities where the U.S. and Israel conducted the Stuxnet cyberattack a decade ago. An unnamed Middle Eastern intelligence official claimed Israel was responsible, using a powerful bomb. On 26 June, another explosion took place at Khojir missile production site, a highly secretive facility for missile engines and propellant development and testing near Tehran. In addition, on 10 July, local witnesses in Garmdarreh, west of Tehran, reported a series of explosions followed by widespread power outages. Multiple reports claimed the explosions occurred at Islamic Revolutionary Guard Corps (IRGC) missile depots, possibly the Islam IRGC Aerospace military base; there are also other military facilities, a chemical weapons research site, and power plants in the area.
    [Show full text]
  • The European Position on the Nuclear Agreement: Its Significance and Future Scenarios
    STUDY The European Position on the Nuclear Agreement: Its Significance and Future Scenarios ٢٠٢٠ July ١٦ Sulaiman Hussain Alwadai a researcher at the International Insti- (tute for Iranian Studies (Rasanah Contents Introduction ...........................................................................................................3 I. European and Iranian Motives for Signing the Nuclear Deal ...............5 II. The US Withdrawal and the European Pledges to Maintain the Nuclear Deal .......................................................................... 10 III. The Factors Causing a Shift in the European Position on Iran ....... 14 IV. The Diminishing Importance of the Nuclear Deal ...............................17 V. The European Position and the Future of the Nuclear Deal ..............19 Conclusion ........................................................................................................... 22 Introduction The nuclear deal has been a turning point in the course of Iranian-European relations. The governments of the European Troika (France, Germany and the UK) and their Iranian counterpart contributed significantly to concluding the agreement and reaching common ground. This was done in order for both parties to reap the political and economic benefits from lifting the UN sanctions on Iran. This was in addition to monitoring Iran’s nuclear program. When the Trump administration decided to pull out of the nuclear deal, the European parties clung to the deal and adopted a neutral position with regard to the recriminations between the two parties (the United States and Iran) to prevent the total collapse of the deal. The policies of Russia and China clash with those of the United States. As a result, they denounced the US pullout from the deal and rejected the sanctions imposed on Iran. Along with Iranian diplomatic efforts, the three The European Position on the Nuclear Agreement: Its Significance and Future Scenarios 3 parties seek to persuade the European countries to adopt a position which is in opposition to Trump’s unilateral policies.
    [Show full text]
  • Examining 10 Warning Signs of Iran Nuclear Weapons
    International Committee In Search of Justice (ISJ) President: Dr. Alejo Vidal-Quadras Rue d’Arlon 63, B-1040 Brussels Belgium Tel : +32 2 400 1071 [email protected] www.isjcommittee.com EXAMINING 10 WARNING SIGNS OF IRAN NUCLEAR WEAPONS DEVELOPMENT NOVEMBER 20,2014 Dr. Alejo Vidal Quadras, Former Vice‐President of European Parliament, Professor of Atomic and Nuclear Physics: “An objective, thoroughly researched report on the core issue of the nature of Iranian nuclear program and its status”. Bob Jospeh, Former US Under Secretary of State for Arms Control and International Security, Senior White House Security Council staff on weapons of mass destruction: “A critically important report at a critically important time”. John Bolton, former US Ambassador to the UN, former Under Secretary of State for Arms Control and International Security: "A timely and well document report with alarming findings on Iran's nuclear program." Contents Executive summary Chapter 1: SPND (organ in charge of weaponization) Chapter 2: Procurement of dual purpose equipment and its possible use for military dimensions of nuclear program Chapter 3: Secret enrichment of uranium Chapter 4: Enrichment using laser technology Chapter 5: High explosives tests and trigger mechanism Chapter 6: Neutron initiator Chapter 7: Manufacturing uranium metal (uranium hemisphere) Chapter 8: Hydro-dynamic tests and explosion vessels at Parchin site Chapter 9: Research on nuclear warhead Chapter 10: Key scientists and researchers engaged in possible military dimensions of nuclear program International Committee In Search of Justice (ISJ) was initially formed in 2008 as an informal group of EU parliamentarians to seek justice for the Iranian democratic opposition.
    [Show full text]
  • Iran's Nuclear Ambitions From
    IDENTITY AND LEGITIMACY: IRAN’S NUCLEAR AMBITIONS FROM NON- TRADITIONAL PERSPECTIVES Pupak Mohebali Doctor of Philosophy University of York Politics June 2017 Abstract This thesis examines the impact of Iranian elites’ conceptions of national identity on decisions affecting Iran's nuclear programme and the P5+1 nuclear negotiations. “Why has the development of an indigenous nuclear fuel cycle been portrayed as a unifying symbol of national identity in Iran, especially since 2002 following the revelation of clandestine nuclear activities”? This is the key research question that explores the Iranian political elites’ perspectives on nuclear policy actions. My main empirical data is elite interviews. Another valuable source of empirical data is a discourse analysis of Iranian leaders’ statements on various aspects of the nuclear programme. The major focus of the thesis is how the discourses of Iranian national identity have been influential in nuclear decision-making among the national elites. In this thesis, I examine Iranian national identity components, including Persian nationalism, Shia Islamic identity, Islamic Revolutionary ideology, and modernity and technological advancement. Traditional rationalist IR approaches, such as realism fail to explain how effective national identity is in the context of foreign policy decision-making. I thus discuss the connection between national identity, prestige and bargaining leverage using a social constructivist approach. According to constructivism, states’ cultures and identities are not established realities, but the outcomes of historical and social processes. The Iranian nuclear programme has a symbolic nature that mingles with socially constructed values. There is the need to look at Iran’s nuclear intentions not necessarily through the lens of a nuclear weapons programme, but rather through the regime’s overall nuclear aspirations.
    [Show full text]
  • Duqu the Stuxnet Attackers Return
    Uncovering Duqu The Stuxnet Attackers Return Nicolas Falliere 4/24/2012 Usenix Leet - San Jose, CA 1 Agenda 1 Revisiting Stuxnet 2 Discovering Duqu 3 Inside Duqu 4 Weird, Wacky, and Unknown 5 Summary 2 Revisiting Stuxnet 3 Key Facts Windows worm discovered in July 2010 Uses 7 different self-propagation methods Uses 4 Microsoft 0-day exploits + 1 known vulnerability Leverages 2 Siemens security issues Contains a Windows rootkit Used 2 stolen digital certificates Modified code on Programmable Logic Controllers (PLCs) First known PLC rootkit 4 Cyber Sabotage 5 Discovering Duqu 6 Boldi Bencsath Announce (CrySyS) emails: discovery and “important publish 25 page malware Duqu” paper on Duqu Boldi emails: Hours later the “DUQU DROPPER 7 C&C is wiped FOUND MSWORD 0DAY INSIDE” Inside Duqu 8 Key Facts Duqu uses the same code as Stuxnet except payload is different Payload isn‟t sabotage, but espionage Highly targeted Used to distribute infostealer components Dropper used a 0-day (Word DOC w/ TTF kernel exploit) Driver uses a stolen digital certificate (C-Media) No self-replication, but can be instructed to copy itself to remote machines Multiple command and control servers that are simply proxies Infections can serve as peers in a peer-to-peer C&C system 9 Countries Infected Six organizations, in 8 countries confirmed infected 10 Architecture Main component A large DLL with 8 or 6 exports and 1 main resource block Resource= Command & Control module Copies itself as %WINDIR%\inf\xxx.pnf Injected into several processes Controlled by a Configuration Data file Lots of similarities with Stuxnet Organization Code Usual lifespan: 30 days Can be extended 11 Installation 12 Signed Drivers Some signed (C-Media certificate) Revoked on October 14 13 Command & Control Module Communication over TCP/80 and TCP/443 Embeds protocol under HTTP, but not HTTPS Includes small blank JPEG in all communications Basic proxy support Complex protocol TCP-like with fragments, sequence and ack.
    [Show full text]
  • Global Threat Research Report: Russia
    Global Threat Research Report: Russia Eli Jellenc, Senior Threat Intelligence Analyst [email protected] Kimberly Zenz, Senior Threat Intelligence Analyst [email protected] Jan. 10, 2007 An iDefense Security Report The VeriSign® iDefense® Intelligence Team Created and distributed by the iDefense Intelligence Operations Team INSIDE THIS REPORT 1 Executive Summary.................................................................................................................................. 2 2 Background............................................................................................................................................... 4 2.1 Foreign Politics of the Russian Federation ......................................................................................4 2.2 Domestic Politics of the Russian Federation ................................................................................... 7 2.3 Economic Background ...................................................................................................................... 9 2.3.1 General Features....................................................................................................................... 9 2.3.2 Macroeconomic Indicators: Attractive on the Surface............................................................ 10 2.3.3 Macroeconomic Tables:...........................................................................................................11 2.3.4 Looking Deeper: Sources of Concern ....................................................................................
    [Show full text]
  • Iran'in Siber Güvenlik Stratejisinin Saldiri Ve
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/334583513 İRAN’IN SİBER GÜVENLİK STRATEJİSİNİN SALDIRI VE SAVUNMA KAPASİTESİ BAKIMINDAN ANALİZİ Article in Turkish Studies - Social Sciences · January 2019 DOI: 10.29228/TurkishStudies.22799 CITATIONS READS 0 225 1 author: Ali Burak Darıcılı 35 PUBLICATIONS 21 CITATIONS SEE PROFILE All content following this page was uploaded by Ali Burak Darıcılı on 25 July 2019. The user has requested enhancement of the downloaded file. Turkish Studies Social Sciences Volume 14 Issue 3, 2019, p. 409-425 DOI: 10.29228/TurkishStudies.22799 ISSN: 2667-5617 Skopje/MACEDONIA-Ankara/TURKEY Research Article / Araştırma Makalesi A r t i c l e I n f o / M a k a l e B i l g i s i Received/Geliş: 04.02.2019 Accepted/Kabul: 10.06.2019 Report Dates/Rapor Tarihleri: Referee 1 (15.03.2019)-Referee 2 (11.03.2019)- Referee 3 (18.03.2019) This article was checked by iThenticate. ANALYSIS OF IRAN'S CYBER SECURITY STRATEGY WITH REGARD TO THE ATTACK AND THE DEFENSE CAPACITY Ali Burak DARICILI ABSTRACT The Stuxnet Virus was released in June 2010 and has affected Iran's nuclear facilities in Bushehr and Natanz. It was claimed that the United States of America (USA) and Israel secret services together have a role in the planning of this cyber-attack. Following this cover activity, also known as Operation Olympic Games in the literature, Iran considered the need to take serious measures in the field of cyber security and aimed to reach an effective cyber security capacity in cyber space with the investments made in 2010.
    [Show full text]
  • Andrew Futter Nuclear Weapons .Indd
    # 56 VALDAI PAPERS September 2016 www.valdaiclub.com NUCLEAR WEAPONS IN THE CYBER AGE: NEW CHALLENGES FOR SECURITY, STRATEGY AND STABILITY Andrew Futter About the author: Andrew Futter Senior Lecturer in International Politics, Department of Politics and International Relations, University of Leicester ; Fellow of the UK Higher Education Academy The views and opinions expressed in this Paper are those of the author and do not represent the views of the Valdai Discussion Club, unless explicitly stated otherwise. NUCLEAR WEAPONS IN THE CYBER AGE: NEW CHALLENGES FOR SECURITY, STRATEGY AND STABILITY The safe, secure and reliable management of nuclear weapons has always been a complex and complicated business, plagued by uncertainty and risks. But these challenges are being magnified and aggravated by new cyber tools, dynamics and capabilities, and from the threat posed by hackers seeking to gain access to, or interfere with, nuclear systems. The challenge is myriad in its scope, and ranges from the safe, secure and reliable nuclear C2, through fresh problems for information security, proliferation, and the safeguarding of highly sensitive nuclear secrets, to new complications for strategic deterrence and escalation, and the emergence of a cyber-nuclear security dilemma. While cyber threats may not currently undermine or supersede the role of nuclear weapons as the ultimate symbol of national security, increased uncertainty about the integrity and security of these systems raises questions for nuclear force management, thinking and strategy for all nuclear-armed states. The cyber challenge is nuanced and subtle, complicating and obfuscating the intrinsic difficulties of nuclear C2 and nuclear strategy rather than fundamentally transforming them.
    [Show full text]