Cyber, Intelligence, and Security
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
2016 8Th International Conference on Cyber Conflict: Cyber Power
2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government. -
From the Editor
EDITORIAL STAFF From the Editor ELIZABETH SKINNER Editor Happy New Year, everyone. As I write this, we’re a few weeks into 2021 and there ELIZABETH ROBINSON Copy Editor are sparkles of hope here and there that this year may be an improvement over SALLY BAHO Copy Editor the seemingly endless disasters of the last one. Vaccines are finally being deployed against the coronavirus, although how fast and for whom remain big sticky questions. The United States seems to have survived a political crisis that brought EDITORIAL REVIEW BOARD its system of democratic government to the edge of chaos. The endless conflicts VICTOR ASAL in Syria, Libya, Yemen, Iraq, and Afghanistan aren’t over by any means, but they have evolved—devolved?—once again into chronic civil agony instead of multi- University of Albany, SUNY national warfare. CHRISTOPHER C. HARMON 2021 is also the tenth anniversary of the Arab Spring, a moment when the world Marine Corps University held its breath while citizens of countries across North Africa and the Arab Middle East rose up against corrupt authoritarian governments in a bid to end TROELS HENNINGSEN chronic poverty, oppression, and inequality. However, despite the initial burst of Royal Danish Defence College change and hope that swept so many countries, we still see entrenched strong-arm rule, calcified political structures, and stagnant stratified economies. PETER MCCABE And where have all the terrorists gone? Not far, that’s for sure, even if the pan- Joint Special Operations University demic has kept many of them off the streets lately. Closed borders and city-wide curfews may have helped limit the operational scope of ISIS, Lashkar-e-Taiba, IAN RICE al-Qaeda, and the like for the time being, but we know the teeming refugee camps US Army (Ret.) of Syria are busy producing the next generation of violent ideological extremists. -
Russian Meddling in Western Elections, 2016-2017: a Preliminary
RUSSIAN MEDDLING IN WESTERN ELECTIONS, 2016-2017: A PRELIMINARY PROBE By Guillermo Lopez Sanchez A thesis submitted to the Graduate Council of Texas State University in partial fulfillment of the requirements for the degree of Master of Arts with a Major in International Studies May 2018 Committee Members: Dennis J. Dunn, Chair Ronald Angelo Johnson Sandhya Rao COPYRIGHT by Guillermo Lopez Sanchez 2018 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgement. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Guillermo Lopez Sanchez, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. ACKNOWLEDGEMENTS I express my gratitude to Dr. Dennis J. Dunn, Professor of History and Director of the Center for International Studies at Texas State University. His dedication, knowledge, and support since I began the Master of Arts with a major in International Studies were invaluable. In addition, my appreciation is extended to Dr. Ronald Angelo Johnson, Associate Professor in the Department of History; and Dr. Sandhya Rao, Professor in the Department of Mass Communication, for their outstanding advice and assistance. Collectively, they strengthened my resources, asked probing questions that helped me sharpen my focus, and provided valuable insights that benefitted my research. I also wish to express my appreciation to Jeremy Pena, Coordinator of Academic Programs at the Center for International Studies, for his administrative support. -
Civil-Military Capacities for European Security
Clingendael Report Civil-Military Capacities for European Security Margriet Drent Kees Homan Dick Zandee Civil-Military Capacities for European Security Civil-Military Capacities for European Security Margriet Drent Kees Homan Dick Zandee © Netherlands Institute of International Relations Clingendael. All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the copyright holders. Image rights: Drone, Binary Code: © Shutterstock.com Search and Rescue squadron: © David Fowler / Shutterstock.com Design: Textcetera, The Hague Print: Gildeprint, Enschede Clingendael Institute P.O. Box 93080 2509 AB The Hague The Netherlands Email: [email protected] Website: http://www.clingendael.nl/ Content Executive summary 7 Introduction 11 1 The external-internal security gap 13 2 Case study maritime security 25 3 Case study border security 39 4 Case study cyber security 53 5 Conclusions and recommendations 64 List of acronyms 70 5 Executive summary In the last two decades the European Union has created separated policies, institutions and capacities for external and internal security. In the meantime the world’s security environment has changed fundamentally. Today, it is no longer possible to make a clear distinction between security outside and within Europe. Conflicts elsewhere in the world often have direct spill-over effects, not primarily in terms of military threats but by challenges posed by illegal immigration, terrorism, international crime and illegal trade. Lampedusa has become a synonym for tragedy. Crises and instability in Africa, the Middle East and elsewhere in the world provide breeding grounds for extremism, weapons smuggling, drugs trafficking or kidnapping. -
National Programmes for Mass Surveillance of Personal Data in Eu Member States and Their Compatibility with Eu Law
DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of surveillance practices at stake, which represent a reconfiguration of traditional intelligence gathering, the study contends that an analysis of European surveillance programmes cannot be reduced to a question of balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The study argues that these surveillance programmes do not stand outside the realm of EU intervention but can be engaged from an EU law perspective via (i) an understanding of national security in a democratic rule of law framework where fundamental human rights standards and judicial oversight constitute key standards; (ii) the risks presented to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners, and (iii) the potential spillover into the activities and responsibilities of EU agencies. -
Nationale Programme Zur Massenüberwachung Personenbezogener Daten in Den Eu-Mitgliedstaaten Und Ihre Vereinbarkeit Mit Dem Eu-Recht
GENERALDIREKTION INTERNE POLITIKBEREICHE FACHABTEILUNG C: BÜRGERRECHTE UND KONSTITUTIONELLE ANGELEGENHEITEN BÜRGERLICHE FREIHEITEN, JUSTIZ UND INNERES NATIONALE PROGRAMME ZUR MASSENÜBERWACHUNG PERSONENBEZOGENER DATEN IN DEN EU-MITGLIEDSTAATEN UND IHRE VEREINBARKEIT MIT DEM EU-RECHT STUDIE Abriss Nach den Enthüllungen rund um PRISM und andere US-Überwachungsprogramme erfolgt mit der vorliegenden Studie eine Bewertung der Praxis der Überwachung in großem Ausmaß seitens einer Auswahl von EU-Mitgliedstaaten: Vereinigtes Königreich, Schweden, Frankreich, Deutschland und die Niederlande. Angesichts des großen Ausmaßes der untersuchten Überwachungspraxis muss man davon ausgehen, dass es sich im Vergleich zum traditionellen Sammeln geheimdienstlicher Daten um eine grundlegende Neuordnung der Überwachungspraxis handelt. Deshalb wird in der Studie die Ansicht vertreten, dass eine Analyse der europäischen Überwachungsprogramme nicht auf die Frage der Balance zwischen Datenschutz und nationaler Sicherheit beschränkt bleiben darf, sondern in den größeren Zusammenhang der kollektiven Freiheitsrechte und der Demokratie gestellt werden muss. Zu den Ergebnissen der Studie gehört, dass in vier von fünf der EU-Mitgliedstaaten, die für eine nähere Untersuchung ausgewählt worden sind, in irgendeiner Form ein Abfangen und Überwachen von Kommunikationsdaten in großem Ausmaß erfolgt. Ferner werden in der Studie Parallelen und Unterschiede zwischen diesen Programmen und den seitens der NSA durchgeführten Operationen ermittelt. Die Verfasser der Studie gelangen -
Iran: Capacity and Methods of Authorities to Monitor Online Activities and Religious Activities of Iranians Living Abroad Query Response [A-10098] 12 June 2017
BEREICH | EVENTL. ABTEILUNG | WWW.ROTESKREUZ.AT ACCORD - Austrian Centre for Country of Origin & Asylum Research and Documentation Iran: Capacity and methods of authorities to monitor online activities and religious activities of Iranians living abroad Query Response [a-10098] 12 June 2017 This response was prepared after researching publicly accessible information currently available to ACCORD as well as information provided by experts within time constraints and in accordance with ACCORD’s methodological standards and the Common EU Guidelines for processing Country of Origin Information (COI). This response is not, and does not purport to be, conclusive as to the merit of any particular claim to refugee status, asylum or other form of international protection. Please read in full all documents referred to. Non-English language information is summarised in English. Original language quotations are provided for reference. © Austrian Red Cross/ACCORD An electronic version of this query response is available on www.ecoi.net. Austrian Red Cross/ACCORD Wiedner Hauptstraße 32 A- 1040 Vienna, Austria Phone: +43 1 58 900 – 582 E-Mail: [email protected] Web: http://www.redcross.at/accord TABLE OF CONTENTS 1 Capacity and methods of authorities to monitor online activities inside Iran ..................... 3 2 Capacity and methods of authorities to monitor online activities of Iranians abroad ...... 14 3 Iranian authorities’ monitoring of religious activities of Iranians living abroad, including Christian converts ......................................................................................................................... -
The Future of Iranian Terror and Its Threat to the U.S. Homeland
The Future of Iranian Terror and Its Threat to the U.S. Homeland Statement before the House of Representatives Committee on Homeland Security Subcommittee on Counterterrorism and Intelligence Ilan Berman Vice President, American Foreign Policy Council February 11, 2016 Chairman King, Ranking Member Higgins, distinguished members of the Subcommittee: It is an honor to appear before you today to discuss Iran’s ongoing sponsorship of international terrorism and the impact that the new nuclear deal, formally known as the Joint Comprehensive Plan of Action (JCPOA), will have upon it. It is a topic that is of critical importance to the security of the United States and our allies abroad. While the Obama administration has argued that the signing of the JCPOA has enhanced both U.S. and global security, there is compelling evidence to the contrary: namely, that the passage of the agreement has ushered in a new and more challenging phase in U.S. Mideast policy. SHORTFALLS OF THE JCPOA While the JCPOA can be said to include some beneficial elements—including short- term constraints on Iranian uranium enrichment, a reduction in the number of centrifuges operated by the Islamic Republic, and a delay of the “plutonium track” of the regime’s nuclear program—there is broad consensus among national security practitioners, military experts, scientists and analysts that the agreement is woefully deficient in several respects. First, the new nuclear deal does not dismantle Iran’s nuclear capability, as originally envisioned by the United States and its negotiating partners. Contrary to the White House’s pledges at the outset of talks between Iran and the P5+1 nations in November 2013, the JCPOA does not irrevocably reduce Iran’s nuclear potential. -
Iranian Cyber-Activities in the Context of Regional Rivalries and International Tensions
CSS CYBER DEFENSE PROJECT Hotspot Analysis: Iranian cyber-activities in the context of regional rivalries and international tensions Zürich, May 2019 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Iranian cyber-activities in the context of regional rivalries and international tensions Authors: Marie Baezner © 2019 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zürich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group Myriam Dunn Cavelty, Deputy Head for Research and Teaching, Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie (2019): Hotspot Analysis: Iranian cyber-activities in context of regional rivalries and international tensions, May 2019, Center for Security Studies (CSS), ETH Zürich. 1 Iranian cyber-activities in the context of regional rivalries and international tensions Table of Contents 1 Introduction 4 2 Background and chronology 5 3 Description 9 3.1 Attribution and actors 9 Iranian APTs 9 Iranian patriotic hackers 11 Western actors 12 3.2 Targets 12 Iranian domestic targets 12 Middle East 12 Other targets 13 3.3 Tools and techniques 13 Distributed Denial of Service (DDoS) attacks 13 Fake personas, social engineering and spear phishing 13 -
Operation Cleaver – a Precursor to Control System Attacks Jon Miller Agenda
Operation Cleaver – A precursor to control system attacks Jon Miller Agenda Introduction What is Cylance What is the Problem Operation Cleaver Vulnerabilities Augmenting 2 | © 2015 Cylance, Inc. Introduction Jon Miller | Vice President of Strategy Internet Security Systems Accuvant Labs Cylance (5 years) (7 years) (2 Years) X-Force Penetration Testing Penetration Testing Internal Security Special Advisor to CTO Reverse Engineering Product Testing/Efficacy Weaponized 0day Sales SPEAR Research Team Customer Advocacy 3 | © 2015 Cylance, Inc. Introduction Stuart McClure | CEO / President & Founder Leader of Cylance Hacking Exposed Foundstone as CEO & Visionary Lead Author WW-CTO McAfee Creator Most Successful Security Book of All Time 4 | © 2015 Cylance, Inc. Introduction Ryan Permeh | Co-Founder & Chief Scientist THE brain behind the Eeye Retina Code Red mathematical architecture and new approach Securells McAfee to security. Chief Scientist 5 | © 2015 Cylance, Inc. What is the Problem? The Rise of Targeted Attacks 350 300 250 Targeted Attacks 200 150 100 50 Broad Attacks 0 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 '07 '07 '07 '08 '08 '08 '08 '09 '09 '09 '09 '10 '10 '10 '10 '11 '11 '11 '11 '12 '12 '12 '12 '13 '13 '13 '13 '14 '14 '14 '14 Source: CyberFactors, a subsidiary of CyberRisk Partners and CloudInsure.com http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-2014 6 | © 2015 Cylance, Inc. What is the Problem? Adversaries Traditional Adversaries Nation State Organized Crime Intelligence Intellectual Espionage Financial Gain Identity Theft Property Theft 7 | © 2015 Cylance, Inc. -
The Growing Cyberthreat from Iran the Initial Report of Project Pistachio Harvest
THE GROWING CYBERTHREAT FROM IRAN THE INITIAL REPORT OF PROJECT PISTACHIO HARVEST FREDERICK W. KAGAN AND TOMMY STIANSEN 1150 Seventeenth Street, NW 1825 South Grant Street, Ste. 635 April 2015 Washington, DC 20036 San Mateo, CA 94402 202.862.5800 650.513.2881 www.aei.org www.norse-corp.com THE GROWING CYBERTHREAT FROM IRAN THE INITIAL REPORT OF PROJECT PISTACHIO HARVEST Frederick W. Kagan and Tommy Stiansen April 2015 AMERICAN ENTERPRISE INSTITUTE CRITICAL THREATS PROJECT AND NORSE CORPORATION TABLE OF CONTENTS Executive Summary ....................................................................................................................................... v Introduction ................................................................................................................................................. 1 Intelligence Collection and Analysis Methodology ...................................................................................... 4 Iran: The Perfect Cyberstorm? ...................................................................................................................... 8 What Are the Iranians Doing? .................................................................................................................... 14 Cyberattacks Directly from Iran ................................................................................................................. 24 Conclusions ............................................................................................................................................... -
Mass Surveillance of Personal Data by EU Member States and Its
Mass Surveillance of Personal Data by EU Member States and its Compatibility with EU Law Didier Bigo, Sergio Carrera, Nicholas Hernanz, Julien Jeandesboz, Joanna Parkin, Francesco Ragazzi and Amandine Scherrer No. 62 / November 2013 Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this paper assesses the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of these practices, which represent a reconfiguration of traditional intelligence gathering, the paper contends that an analysis of European surveillance programmes cannot be reduced to a question of the balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The paper argues that these programmes do not stand outside the realm of EU intervention but can be analysed from an EU law perspective via i) an understanding of national security in a democratic rule of law framework where fundamental human rights and judicial oversight constitute key norms; ii) the risks posed to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners and iii) the potential spillover into the activities and responsibilities of EU agencies. The paper then presents a set of policy recommendations to the European Parliament.