Cyber Lawyers Bootcamp Offensive Cyber Activities Reading Materials

Session 1: The Cyber Threat Landscape | January 11, 2021 Jamil N. Jaffer, NSI Founder and Executive Director & Amyn Gilani, Vice President of Product, 4iQ; NSI Visiting Fellow

Phil Venables, Insider Threat - Blast Radius Perspective (Aug. 8, 2020) ...... 2

Phil Venables, Threat Intelligence (July 18, 2020) ...... 5

Keith B. Alexander & Jamil N. Jaffer, While the world battles the coronavirus, our adversaries are planning their next attack, The Hill (Apr. 7, 2020) ...... 7

Andy Greenberg, The Untold Story of NotPetya, the Most Devastating Cyberattack in History, Wired (Aug. 22, 2018) ...... 10

India Ashok, OpIcarus: reveals inspiration behind latest operation and evolution of , International Business Times (May 23, 2016) ...... 26

Worldwide Threat Assessment of the US Intelligence Community, 116th Cong. 75 (2019) (statement of Daniel R. Coats, Dir. of Nat’l Intelligence) ...... 30

Cyberspace Solarium Commission Report, 97–102 (Mar. 2020) ...... 72

Keith B. Alexander & Jamil N. Jaffer, China is Waging Economic War on America. The Pandemic Is an Opportunity to Turn the Fight Around, Barron’s (Aug. 4, 2020) ...... 78

Fahmida Y. Rashid, Capital One Breach Highlights Challenges of Insider Threats, Duo (July 30, 2019) ...... 81

Emily Stewart, have been holding the city of Baltimore’s computers hostage for 2 weeks, Vox (May 21, 2019) ...... 84

Bruce Sussman, Baltimore, $18 Million Later: ‘This Is Why We Didn’t Pay The Ransom’, SecureWorld (June 12, 2019) ...... 88 8/21/2020 Insider Threat - Blast Radius Perspective - Updated

RISK & CYBERSECURITY Thoughts from the Field

HOME ABOUT RECENT EVENTS & PUBLICATIONS

All Posts Leadership Risk Cybersecurity Technology

Phil Venables Aug 8 3 min read

Insider Threat - Blast Radius Perspective - Updated

Of the vast canon of insightful commentary that has come from Dan Geer over many years, one that especially stuck with me was his description of insider threat being the "illegitimate use of legitimate authority". I have found this to be a very useful and practical framing to help sort out what goes in your insider threat program vs. all your other control programs.

Of course, I just had to draw up the grid of legitimate vs. illegitimate use and authority.

Which raises the question of what is legitimate use of illegitimate authority? Perhaps law enforcement or military action to interdict or investigate attackers.

https://www.philvenables.com/post/insider-threat-blast-radius-perspective-updated 1/4 8/21/2020 Insider Threat - Blast Radius Perspective - Updated Anyway, let's focus on insider threats, the management of which is a complex and often under-thought process. People who work on it appreciate the subtlety and difficult trade- offs. Some who don’t think it is straightforward. Let’s unpack it.

First of all, this short post isn’t going to even come close to covering all aspects of well managed insider threat programs - instead there is excellent coverage by SIFMA and CERT.

Grossly simplifying, there are 3 types of threats:

Trusted insiders who go bad over time due to disgruntlement or other reason (Progressive Insider Risks)

Trusted insiders who go bad immediately from some cue like coercion from an external actor (Instantaneous Insider Risk)

Infiltrators, i.e. external attackers who infiltrate the organization. These are still acting with legitimate authority that they have been granted. Infiltrators can often look like Instantaneous Insider Risks, so we’ll just discuss the first 2 types.

Note: one of the commercial benefits of effective insider threat risk management is you can protect from error/carelessness often with the same precautionary steps as you would to thwart malicious intent - this can often be worth doing even if you're not considered a significant target.

1. Progressive Insider Risks. As the name implies, these people go bad over time before perpetrating usually small then progressively large malicious actions. They can get caught by detecting some “disturbance in the force” (h/t @taylopet for this phrase in this context). Such detections can be from their activities (e.g. accessing more information, leaking data, small infractions, job performance issues, etc.) or changes in their behavior (e.g. change in work patterns, personal circumstances, revealed work stresses, etc.) There will often be signals given off "left of boom” before they commit a more significant event. These can be used to intervene with discipline, but sometimes more helpfully as a trigger for support / counseling to address the root of the disgruntlement / other issues. The usual array of preventative and detective controls in place to mitigate many other risks are critical here, from background checks, identity / access management, data rights management, data leakage prevention and detection, logging, anomaly detection and so on.

2. Instantaneous Insider Risks. As the name implies, these can happen without warning and without pre-signaling. As they say in the trade, “if you hear the boom they’ve already missed you.” Arguably, as organization’s digital defenses improve and limit the reach of attackers, we will see more of the tactics come back that pre-date digitization i.e. bribes, extortion, coercing an employee into doing something nefarious with no warning. The key here is to reduce the blast radius of potential events. Specifically, to enumerate job roles and determine, if the person in that position went bad instantaneously, how bad would it be. If the answer to that is beyond whatever your risk appetite is, then work needs to happen. This, hard, work includes designing interventions to adjust job roles to reduce blast radius, https://www.philvenables.com/post/insider-threat-blast-radius-perspective-updated 2/4 8/21/2020 Insider Threat - Blast Radius Perspective - Updated remembering this isn't just about theft or fraud, it could be destructive events. Interventions can include:

- Reducing access to what is reasonable for the role

- Further redesigning the role to need less privileges

- Adding separation of duties or multi-party control

- Adding circuit breakers to reduce scale of potential damage

- Creating means to fast undo actions

- Adding temporal breakers to delay invocation of activities (time to reverse)

- Adding time between progressions of activities (time to intervene)

- Prohibiting direct change to environments - policy as code.

Bottom line: many insider threat programs are tuned to detect progressive risks. It is important to also deal with hazardous instantaneous risks by limiting the blast radius of potential events. This has the adjacent commercial benefit of reducing error risk and increasing resilience.

Cybersecurity

567 views 6

Recent Posts See All

Cybersecurity and the Board : Compliance vs. Security Threat Intelligence - Updated A Fresh Perspective? It is sad that many security This is an update from a thread How to represent cybersecurity discussions are so binary: that is, that became a post last year. (or technology / information risks if you’re not wildly for something Threat intelligence seems, at more generally) to the Board is an then you must be wildly against… least to me, to get maligned to… ongoing subject of discussion i…

2,018 12 1,282 11 866 8

Commenting is disabled on this post.

https://www.philvenables.com/post/insider-threat-blast-radius-perspective-updated 3/4 8/21/2020 Threat Intelligence - Updated

RISK & CYBERSECURITY Thoughts from the Field

HOME ABOUT RECENT EVENTS & PUBLICATIONS

All Posts Leadership Risk Cybersecurity Technology

Phil Venables Jul 18 3 min read

Threat Intelligence - Updated

This is an update from a thread that became a post last year.

Threat intelligence seems, at least to me, to get maligned too much. For many years I’ve found it an immensely useful element of an enterprise security and risk program. So, some perspectives on this. Security is a game to win, not a state you’re in. You have adversaries and you have to therefore understand their motivations and their tactics, techniques and procedures (TTPs) in the context of their goals versus your assets and objectives. To understand that you, surely, need some information about that. Let’s call that threat intelligence. At the risk of oversimplifying, there are essentially 2 types of threat intelligence:

1. Macro threat intelligence. Information on attacker goals, capabilities & evolving TTPs. Use this to adjust defenses to make life more difficult for the adversary & shape their economics (attackers have bosses & budgets too). Aim to eliminate whole classes of attacks. For macro you need to feed it into your risk decision making process as fast as possible & increase the speed of adjusting defenses.

2. Micro threat intelligence. Information about specific attacks, signatures, indicators of compromise and other selectors/data. Aim to eliminate or detect/respond to specific attacks. Information about threats, itself, is necessary but not sufficient. In both cases you need to be capable of doing something with it. For micro threat intelligence you need to feed this into your defensive operations as fast as possible - in as fully an automated way as you can. Work to improve the ingest speed and coverage of this into your preventive controls and your detective sensor grid.

Responding to macro has superior results, but is harder and so sometimes you can only handle and respond to micro. As with any intelligence process you will generate new/synthesized intelligence - feeding that into an appropriate information sharing organization is useful.

https://www.philvenables.com/post/threat-intelligence-updated 1/3 8/21/2020 Threat Intelligence - Updated I think threat intelligence gets maligned due to a lack of an organization’s capability to process it (perhaps fueled by over marketing of what it can do - by vendors or pundits). If you buy something or consume some capability you have to be equipped to use it. There’s no point buying some feed if you can't do anything with it. Like supply & demand - different sources of intelligence (shared/private/government) drives different demand pull, and handling capabilities (people, automation, frameworks) drive different supply needs.

Many critical infrastructure organizations (energy, telecommunications, health, finance, defense etc.) need to or are obliged to partner with domestic government agencies to mutually share timely threat intelligence (macro and micro). The challenge with such public/private partnerships from what I've observed around the world are that they are often artisanal and relationship driven - and so are brittle and don't scale. This is despite the best efforts of many dedicated professionals on all sides of this. There is, however, a lot of progress happening behind the scenes to make this industrialized and impersonal. Specifically to make intelligence sharing systematized and to create a concept of operations to ensure those processes continue and survive changes of key personnel on the private and public side. Some of this steady progress has been epitomized by organizations like the FS- ARC in finance, an outcrop of the widely admired FS-ISAC.

Bottom line : threat intelligence is critical but you have to use it well and that means having the organizational capability to do that. Grow capability (tooling and people) in balance with what you need to consume - think supply/demand.

Move fast.

Cybersecurity • Risk

866 views 8

Recent Posts See All

Tips for Running a Risk Insider Threat - Blast Radius Cybersecurity and the Board : Committee Perspective - Updated A Fresh Perspective?

In any sizable organization it is Of the vast canon of insightful How to represent cybersecurity important to have some form of commentary that has come from (or technology / information risks management steering group or Dan Geer over many years, one more generally) to the Board is an committee to oversee your risk… that especially stuck with me w… ongoing subject of discussion i…

1,290 12 567 6 2,018 12

https://www.philvenables.com/post/threat-intelligence-updated 2/3 8/21/2020 While the world battles the coronavirus, our adversaries are planning their next attack | TheHill

While the world battles the coronavirus, our adversaries a planning their next attack

BY GEN. (RET.) KEITH B. ALEXANDER AND JAMIL N. JAFFER, OPINION CONTRIBUTORS — 04/07/20 09:00 AM EDT THE VIEWS EXPRESSED BY CONTRIBUTORS ARE THEIR OWN AND NOT THE VIEW OF THE HILL

Just In... 7,023 SHARES SHARE TW Georgia police investigating viral video showing oicer taser a Black woman STATE WATCH — 4M 42S AGO

Graham tweets support for Navalny: 'The Russian people will reach a tipping point where they tire of Putin' SENATE — 6M 37S AGO

Biden draws highest TV ratings of Democratic convention, but down from 2016 MEDIA — 10M 6S AGO

© Getty Images Man suspected in Portland truck driver Every nation is engaged in ighting the coronavirus. The pandemic has attack turns himself in caused tens of thousands of deaths, and many nations are using drastic STATE WATCH — 10M 59S AGO measures to ight its spread. While we seek to make common cause with our allies in this effort, it is worth remembering that our adversaries often Kanye West fails to use crises to further their agendas. Indeed, we already see leaders across make ballot in three the globe — many struggling with similar problems in their own nations — states seeking to spread disinformation about the source and scope of this CAMPAIGN — 11M 10S AGO global pandemic.

Ocasio-Cortez shares In the past few weeks alone, we have seen a doubling-down by China , her skin care and Russia and Iran to conduct active media campaigns blaming the United makeup routine: States for the coronavirus. It is critical that our institutions, public and 'Beauty is political' private alike, collaborate closely on efforts to tamp down the spread of IN THE KNOW — 19M 38S AGO false narratives, particularly as we approach the 2020 election cycle.

Congress, free the Our response to this threat is critical because these foreign-inluence Space Force activities are not just aimed at convincing the Chinese, Russian and OPINION — 20M 1S AGO Iranian populations to ignore what is happening in their home countries. They also are designed to exploit, magnify and leverage divisions in our University of Iowa own population. These nations are engaged in a consistent effort to permanently canceling undermine Americans’ conidence in our government, its leaders and our four sports programs democratic institutions, to limit our ability to make key decisions and to NEWS — 23M 10S AGO distract us from our opponents’ malign activities around the globe. And https://thehill.com/opinion/national-security/491322-while-the-world-battles-the-coronavirus-our-adversaries-are 1/4 8/21/2020 While the world battles the coronavirus, our adversaries are planning their next attack | TheHill

VIEW ALL these efforts — which are likely to become more prevalent in coming weeks and months, and which will leverage both traditional means as well View Latest Opinions >> as cyber operations — present a very real threat to our national security.

The spread of the coronavirus has impacted the world in ways that go well beyond the threat to human health and the changes in our daily lives. It has fundamentally altered the relationship between governments and their citizens. In the United States, we have rapidly (and signiicantly) become more reliant on the government for information, access to lifesaving medical care and economic support. That has the potential to expand government’s reach into our personal lives as we try to get

Related News by visibility on the spread of the virus, raising signiicant privacy concerns. Given our penchant for self-reliance and jealous protection of our liberty, this expanding dependency and encroachment inevitably causes angst, particularly as questions persist about the government’s ability to provide. The massive uncertainty created by the virus likewise has the public on edge and, when combined with the very real economic challenges it presents, this uncertainty and angst can quickly turn to fear and, in some AOC has the right idea cases, to anger or frustration. but needs to move it… This creates opportunities for those who seek to undermine conidence in democracy and our rule of law. We’ve seen some of these nations trumpeting the idea that authoritarian forms of government have an advantage over democracies. This is, of course, a false narrative but one that could gain traction. We likewise see nations such as Russia and China Picking Kamala Harris combining efforts to blame the United States with the public provision of shows progress is… aid to us and our allies, making themselves seem like saviors when, in fact, they are simply sowing seeds of doubt in the ability of governments to confront the threat at home. Nation-states rarely, if ever, act out of pure altruism, and that is true even during a global pandemic.

The problem goes well beyond just coronavirus-focused efforts. Our How Congress can avoid adversaries know that by calling into question the very legitimacy of our a housing catastrophe government and its leaders, as well as their efforts to combat the disease, they can stoke public division and anger and distract us from their efforts elsewhere. Thus, as we head towards the general election in November, we are likely to see these efforts become even more aggressive.

For example, as various states consider changes to the timing and nature of elections, the potential vectors for further disinformation increase Quick Poll: Will You Vote signiicantly. We’ve already heard concerns about the impact of delayed for Biden Sponsored | Democratic Governors elections and new methods of voting. One can easily imagine our Association adversaries conducting inluence operations to stoke fears about the motivations of state and federal leaders and to raise questions about the additional risks and vulnerabilities that new systems present. While many remain focused on the threat of vote manipulation, the fact is that votes do not need to be modiied to successfully undermine political legitimacy. All that is really needed is the specter of undue inluence by foreign actors, as we saw in the 2016 election. In many ways, this type of disinformation and political manipulation is more insidious and harder to identify than actual efforts to modify results.

Given all of this, we must stay vigilant and must build the conidence of the American people in our systems and institutions. This starts with the larger effort to combat the coronavirus and return to some modicum of normalcy. In this effort, it is critical that leaders at all levels work together to counter this threat, recognizing that division and dissent amongst our leadership only plays into the hands of our adversaries. When it comes to elections themselves, there also is more to be done; while the federal https://thehill.com/opinion/national-security/491322-while-the-world-battles-the-coronavirus-our-adversaries-are 2/4 8/21/2020 While the world battles the coronavirus, our adversaries are planning their next attack | TheHill government has been fairly effective in describing the general threat to states, most still need signiicantly more investment — and sustained federal support — to harden their systems. We know that, in prior elections, Russia targeted these systems for exploitation, and we can expect more such activity going forward.

Likewise, states need to move from defending in isolation to defending collectively. While having states lead elections has served us well — offering diversity and experimentation that make our system more resilient — we know that our adversaries are conducting nationwide campaigns, using similar tactics against various states. As such, taking a joint approach to defense makes good sense, particularly since no one state alone can realistically expend the kind of resources necessary. To that end, states must not only create a common operating picture of disinformation efforts and cyber attacks, but the federal government must contribute actionable information about the attacks being crafted overseas. Perhaps most important, we must recognize that threat-sharing is only effective to the extent that it helps us identify new threat vectors, rapidly close gaps and collaborate in real-time to combat the threats.

Purdue suspends 36 students who attended gathering amid pandemic NY Mets player, coach test positive for coronavirus, prompting...

Finally, we must remember that this threat is a challenge to our allies, too. As people are forced to stay in their homes and face economic stresses, with governments struggling to keep up, the conidence in governments abroad may likewise fray. This makes our allies more susceptible to the type of manipulation that is the bread-and-butter of our opponents. As such, similar efforts to share knowledge and collaborate rapidly must be implemented with our allies. Now more than ever, it is critical that we not take our eye off the ball when it comes to the threats posed by our adversaries, and that we work collectively to defend against these threats around the globe.

Gen. (Ret.) Keith B. Alexander is the former director of the U.S. National Security Agency, the founding commander of United States Cyber Command, and founder, chairman and co-CEO of IronNet Cybersecurity, a startup technology company that focuses on behavioral network traic analytics and collective defense.

Jamil N. Jaffer is the former chief counsel of the Senate Foreign Relations Committee, a former associate counsel to President George W. Bush, and senior vice president for strategy, partnerships and corporate development at IronNet Cybersecurity. Follow him on Twitter @jamil_n_jaffer.

TAGS CHINA RUSSIA IRAN CORONAVIRUS COVID-19 PANDEMIC POLITICAL WARFARE CYBERWARFARE

SHARE TWEET

THE HILL 1625 K STREET, NW SUITE 900 WASHINGTON DC 20006 | 202-628-8500 TEL | 202-628-8503 FAX THE CONTENTS OF THIS SITE ARE ©2020 CAPITOL HILL PUBLISHING CORP., A SUBSIDIARY OF NEWS COMMUNICATIONS, INC.

https://thehill.com/opinion/national-security/491322-while-the-world-battles-the-coronavirus-our-adversaries-are 3/4 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED

MIKE MCQUADE

ANDY GREENBERG SECURITY 08.22.2018 05:00 AM

The Untold Story of NotPetya, the Most Devastating Cyberattack in History Crippled ports. Paralyzed corporations. Frozen government agencies. How a single piece of code crashed the world.

IT WAS A perfect sunny summer afternoon in Copenhagen when the world’s largest shipping conglomerate began to lose its mind.

The headquarters of A.P. Møller-Maersk sits beside the breezy, cobblestoned esplanade of Copenhagen’s harbor. A ship’s mast carrying the Danish flag is planted by the building’s northeastern corner, and six stories of blue-tinted windows look out over the water, facing a dock where the Danish royal family parks its yacht. In the building’s basement, employees can browse a corporate gift shop, stocked with Maersk-branded bags and ties, and even a rare Lego model of the company’s gargantuan Triple-E container ship, a vessel roughly as large as the Empire State Building laid on its side, capable of carrying another Empire State Building–sized load of cargo stacked on top of it.

That gift shop also houses a technology help center, a single desk manned by IT troubleshooters next to the shop’s cashier. And on the afternoon of June 27, 2017, confused Maersk staffers began to gather at that help desk in twos and https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 1/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED threes, almost all of them carrying laptops. On the machines’ screens were messages in red and black lettering. Some read “repairing file system on C:” with a stark warning not to turn off the computer. Others, more surreally, read “oops, your important files are encrypted” and demanded a payment of $300 worth of bitcoin to decrypt them.

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 2/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED Across the street, an IT administrator named Henrik Jensen was working in another part of the Maersk compound, an ornate white-stone building that in previous centuries had served as the royal archive of maritime maps and charts. (Henrik Jensen is not his real name. Like almost every Maersk employee, customer, or partner I interviewed, Jensen feared the consequences of speaking publicly for this story.) Jensen was busy preparing a software update for Maersk’s nearly 80,000 employees when his computer spontaneously restarted.

He quietly swore under his breath. Jensen assumed the unplanned reboot was a typically brusque move by Maersk’s central IT department, a little-loved entity in England that oversaw most of the corporate empire, whose eight business units ranged from ports to logistics to oil drilling, in 574 offices in 130 countries around the globe.

Jensen looked up to ask if anyone else in his open-plan office of IT staffers had been so rudely interrupted. And as he craned his head, he watched every other computer screen around the room blink out in rapid succession.

“I saw a wave of screens turning black. Black, black, black. Black black black black black,” he says. The PCs, Jensen and his neighbors quickly discovered, were irreversibly locked. Restarting only returned them to the same black screen.

About the Author

Andy Greenberg (@a_greenberg) is a WIRED senior writer. This story is excerpted from his book Sandworm, forthcoming from Doubleday.

All across Maersk headquarters, the full scale of the crisis was starting to become clear. Within half an hour, Maersk employees were running down hallways, yelling to their colleagues to turn off computers or disconnect them from Maersk’s network before the malicious software could infect them, as it dawned on them that every minute could mean dozens or hundreds more corrupted PCs. Tech workers ran into conference rooms and unplugged machines in the middle of meetings. Soon staffers were hurdling over locked key-card gates, which had been paralyzed by the still- mysterious , to spread the warning to other sections of the building.

Disconnecting Maersk’s entire global network took the company’s IT staff more than two panicky hours. By the end of that process, every employee had been ordered to turn off their computer and leave it at their desk. The digital phones at every cubicle, too, had been rendered useless in the emergency network shutdown.

Around 3 pm, a Maersk executive walked into the room where Jensen and a dozen or so of his colleagues were anxiously awaiting news and told them to go home. Maersk’s network was so deeply corrupted that even IT staffers were helpless. A few of the company’s more old-school managers told their teams to remain at the office. But many employees— rendered entirely idle without computers, servers, routers, or desk phones—simply left.

Jensen walked out of the building and into the warm air of a late June afternoon. Like the vast majority of Maersk staffers, he had no idea when he might return to work. The maritime giant that employed him, responsible for 76 ports on all sides of the earth and nearly 800 seafaring vessels, including container ships carrying tens of millions of tons of cargo, representing close to a fifth of the entire world’s shipping capacity, was dead in the water.

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 4/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED

MIKE MCQUADE

ON THE EDGE of the trendy Podil neighborhood in the Ukrainian capital of Kiev, coffee shops and parks abruptly evaporate, replaced by a grim industrial landscape. Under a highway overpass, across some trash-strewn railroad tracks, and through a concrete gate stands the four-story headquarters of Linkos Group, a small, family-run Ukrainian software business.

Up three flights of stairs in that building is a server room, where a rack of pizza-box-sized computers is connected by a tangle of wires and marked with handwritten, numbered labels. On a normal day, these servers push out routine updates

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 5/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED —bug fixes, security patches, new features—to a piece of accounting software called M.E.Doc, which is more or less Ukraine’s equivalent of TurboTax or Quicken. It’s used by nearly anyone who files taxes or does business in the country.

But for a moment in 2017, those machines served as ground zero for the most devastating cyberattack since the invention of the internet—an attack that began, at least, as an assault on one nation by another.

SIGN UP TODAY

Sign up for the Daily newsletter and never miss the best of WIRED.

For the past four and a half years, Ukraine has been locked in a grinding, undeclared war with Russia that has killed more than 10,000 Ukrainians and displaced millions more. The conflict has also seen Ukraine become a scorched-earth testing ground for Russian cyberwar tactics. In 2015 and 2016, while the Kremlin-linked hackers known as

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 6/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED were busy breaking into the US Democratic National Committee’s servers, another group of agents known as Sandworm was hacking into dozens of Ukrainian governmental organizations and companies. They penetrated the networks of victims ranging from media outlets to railway firms, detonating logic bombs that destroyed terabytes of data. The attacks followed a sadistic seasonal cadence. In the winters of both years, the saboteurs capped off their destructive sprees by causing widespread power outages—the first confirmed blackouts induced by hackers.

But those attacks still weren’t Sandworm’s grand finale. In the spring of 2017, unbeknownst to anyone at Linkos Group, Russian military hackers hijacked the company’s update servers to allow them a hidden back door into the thousands of PCs around the country and the world that have M.E.Doc installed. Then, in June 2017, the saboteurs used that back door to release a piece of malware called NotPetya, their most vicious cyberweapon yet.

Related Stories

SECURITY How an Entire Nation Became Russia's Test Lab for Cyberwar ANDY GREENBERG

SOCIAL MEDIA Facebook's Mandatory Malware Scan Is an Intrusive Mess LOUISE MATSAKIS

HACKERS Inside the Takedown of a Notorious Malware Clearinghouse LILY HAY NEWMAN

The code that the hackers pushed out was honed to spread automatically, rapidly, and indiscriminately. “To date, it was simply the fastest-propagating piece of malware we’ve ever seen,” says Craig Williams, director of outreach at Cisco’s Talos division, one of the first security companies to reverse engineer and analyze Not . “By the second you saw it, your data center was already gone.”

NotPetya was propelled by two powerful hacker exploits working in tandem: One was a penetration tool known as EternalBlue, created by the US National Security Agency but leaked in a disastrous breach of the agency’s ultrasecret files earlier in 2017. EternalBlue takes advantage of a vulnerability in a particular Windows protocol, allowing hackers free rein to remotely run their own code on any unpatched machine.

NotPetya’s architects combined that digital skeleton key with an older invention known as Mimikatz, created as a proof of concept by French security researcher Benjamin Delpy in 2011. Delpy had originally released Mimikatz to demonstrate that Windows left users’ passwords lingering in computers’ memory. Once hackers gained initial access to a computer, Mimikatz could pull those passwords out of RAM and use them to hack into other machines accessible with the same credentials. On networks with multiuser computers, it could even allow an automated attack to hopscotch from one machine to the next.

Before NotPetya’s launch, Microsoft had released a patch for its EternalBlue vulnerability. But EternalBlue and Mimikatz together nonetheless made a virulent combination.“You can infect computers that aren’t patched, and then you can grab https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 7/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED the passwords from those computers to infect other computers that are patched,” Delpy says.

NotPetya took its name from its resemblance to the Petya, a piece of criminal code that surfaced in early 2016 and extorted victims to pay for a key to unlock their files. But NotPetya’s ransom messages were only a ruse: The malware’s goal was purely destructive. It irreversibly encrypted computers’ master boot records, the deep-seated part of a machine that tells it where to find its own . Any ransom payment that victims tried to make was futile. No key even existed to reorder the scrambled noise of their computer’s contents.

The weapon’s target was Ukraine. But its blast radius was the entire world. “It was the equivalent of using a nuclear bomb to achieve a small tactical victory,” Bossert says.

The release of NotPetya was an act of cyberwar by almost any definition—one that was likely more explosive than even its creators intended. Within hours of its first appearance, the worm raced beyond Ukraine and out to countless machines around the world, from hospitals in Pennsylvania to a chocolate factory in Tasmania. It crippled multinational companies including Maersk, pharmaceutical giant Merck, FedEx’s European subsidiary TNT Express, French construction company Saint-Gobain, food producer Mondelēz, and manufacturer Reckitt Benckiser. In each case, it inflicted nine-figure costs. It even spread back to Russia, striking the state oil company Rosneft.

The result was more than $10 billion in total damages, according to a White House assessment confirmed to WIRED by former Homeland Security adviser Tom Bossert, who at the time of the attack was President Trump’s most senior cybersecurity-focused official. Bossert and US intelligence agencies also confirmed in February that Russia’s military— the prime suspect in any cyberwar attack targeting Ukraine—was responsible for launching the malicious code. (The Russian foreign ministry declined to answer repeated requests for comment.)

To get a sense of the scale of NotPetya’s damage, consider the nightmarish but more typical ransomware attack that paralyzed the city government of Atlanta this past March: It cost up to $10 million, a tenth of a percent of NotPetya’s price. Even WannaCry, the more notorious worm that spread a month before NotPetya in May 2017, is estimated to have cost between $4 billion and $8 billion. Nothing since has come close. “While there was no loss of life, it was the equivalent of using a nuclear bomb to achieve a small tactical victory,” Bossert says. “That’s a degree of recklessness we can’t tolerate on the world stage.”

In the year since NotPetya shook the world, WIRED has delved into the experience of one corporate goliath brought to its knees by Russia’s worm: Maersk, whose malware fiasco uniquely demonstrates the danger that cyberwar now poses to the infrastructure of the modern world. The executives of the shipping behemoth, like every other non-Ukrainian victim WIRED approached to speak about NotPetya, declined to comment in any official capacity for this story. WIRED’s account is instead assembled from current and former Maersk sources, many of whom chose to remain anonymous.

But the story of NotPetya isn’t truly about Maersk, or even about Ukraine. It’s the story of a nation-state’s weapon of war released in a medium where national borders have no meaning, and where collateral damage travels via a cruel and unexpected logic: Where an attack aimed at Ukraine strikes Maersk, and an attack on Maersk strikes everywhere at once.

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 8/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED

OLEKSII YASINSKY EXPECTED a calm Tuesday at the office. It was the day before Ukraine’s Constitution Day, a national holiday, and most of his coworkers were either planning their vacations or already taking them. But not Yasinsky. For the past year he’d been the head of the cyber lab at Information Systems Security Partners, a company that was quickly becoming the go-to firm for victims of Ukraine’s cyberwar. That job description didn’t lend itself to downtime. Since the first blows of Russia’s cyberattacks hit in late 2015, in fact, he’d allowed himself a grand total of one week off.

So Yasinsky was unperturbed when he received a call that morning from ISSP’s director telling him that Oschadbank, the second-largest bank in Ukraine, was under attack. The bank had told ISSP that it was facing a ransomware infection, an increasingly common crisis for companies around the world targeted by profit-focused cybercriminals. But when Yasinsky walked into Oschadbank’s IT department at its central Kiev office half an hour later, he could tell this was something new. “The staff were lost, confused, in a state of shock,” Yasinsky says. Around 90 percent of the bank’s thousands of computers were locked, showing NotPetya’s “repairing disk” messages and ransom screens.

After a quick examination of the bank’s surviving logs, Yasinsky could see that the attack was an automated worm that had somehow obtained an administrator’s credentials. That had allowed it to rampage through the bank’s network like a prison inmate who has stolen the warden’s keys.

As he analyzed the bank’s breach back in ISSP’s office, Yasinsky started receiving calls and messages from people around Ukraine, telling him of similar instances in other companies and government agencies. One told him that another victim had attempted to pay the ransom. As Yasinsky suspected, the payment had no effect. This was no ordinary ransomware. “There was no silver bullet for this, no antidote,” he says.

The Cost of NotPetya

In 2017, the malware NotPetya spread from the servers of an unassuming Ukrainian software firm to some of the largest businesses worldwide, paralyzing their operations. Here’s a list of the approximate damages reported by some of the worm’s biggest victims.

$870,000,000 Pharmaceutical company Merck

$400,000,000 Delivery company FedEx (through European subsidiary TNT Express)

$384,000,000 French construction company Saint-Gobain

$300,000,000 https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 9/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED Danish shipping company Maersk

$188,000,000 Snack company Mondelēz (parent company of Nabisco and Cadbury)

$129,000,000 British manufacturer Reckitt Benckiser (owner of Lysol and Durex condoms)

$10 billion Total damages from NotPetya, as estimated by the White House

A thousand miles to the south, ISSP CEO Roman Sologub was attempting to take a Constitution Day vacation on the southern coast of Turkey, preparing to head to the beach with his family. His phone, too, began to explode with calls from ISSP clients who were either watching NotPetya tear across their networks or reading news of the attack and frantically seeking advice.

Sologub retreated to his hotel, where he’d spend the rest of the day fielding more than 50 calls from customers reporting, one after another after another, that their networks had been infected. ISSP’s security operations center, which monitored the networks of clients in real time, warned Sologub that NotPetya was saturating victims’ systems with terrifying speed: It took 45 seconds to bring down the network of a large Ukrainian bank. A portion of one major Ukrainian transit hub, where ISSP had installed its equipment as a demonstration, was fully infected in 16 seconds. Ukrenergo, the energy company whose network ISSP had been helping to rebuild after the 2016 blackout cyberattack, had also been struck yet again. “Do you remember we were about to implement new security controls?” Sologub recalls a frustrated Ukrenergo IT director asking him on the phone. “Well, too late.”

By noon, ISSP’s founder, a serial entrepreneur named Oleh Derevianko, had sidelined his vacation too. Derevianko was driving north to meet his family at his village house for the holiday when the NotPetya calls began. Soon he had pulled off the highway and was working from a roadside restaurant. By the early afternoon, he was warning every executive who called to unplug their networks without hesitation, even if it meant shutting down their entire company. In many cases, they’d already waited too long. “By the time you reached them, the infrastructure was already lost,” Derevianko says.

On a national scale, NotPetya was eating Ukraine’s computers alive. It would hit at least four hospitals in Kiev alone, six power companies, two airports, more than 22 Ukrainian banks, ATMs and card payment systems in retailers and transport, and practically every federal agency. “The government was dead,” summarizes Ukrainian minister of infrastructure Volodymyr Omelyan. According to ISSP, at least 300 companies were hit, and one senior Ukrainian government official estimated that 10 percent of all computers in the country were wiped. The attack even shut down the computers used by scientists at the Chernobyl cleanup site, 60 miles north of Kiev. “It was a massive bombing of all our systems,” Omelyan says. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 10/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED When Derevianko emerged from the restaurant in the early evening, he stopped to refuel his car and found that the gas station’s credit card payment system had been taken out by NotPetya too. With no cash in his pockets, he eyed his gas gauge, wondering if he had enough fuel to reach his village. Across the country, Ukrainians were asking themselves similar questions: whether they had enough money for groceries and gas to last through the blitz, whether they would receive their paychecks and pensions, whether their prescriptions would be filled. By that night, as the outside world was still debating whether NotPetya was criminal ransom ware or a weapon of state-sponsored cyberwar, ISSP’s staff had already started referring to it as a new kind of phenomenon: a “massive, coordinated cyber invasion.”

Amid that epidemic, one single infection would become particularly fateful for Maersk: In an office in Odessa, a port city on Ukraine’s Black Sea coast, a finance executive for Maersk’s Ukraine operation had asked IT administrators to install the accounting software M.E.Doc on a single computer. That gave NotPetya the only foothold it needed.

THE SHIPPING TERMINAL in Elizabeth, New Jersey—one of the 76 that make up the port-operations division of Maersk known as APM Terminals—sprawls out into Newark Bay on a man-made peninsula covering a full square mile. Tens of thousands of stacked, perfectly modular shipping containers cover its vast asphalt landscape, and 200-foot-high blue cranes loom over the bay. From the top floors of lower Manhattan’s skyscrapers, five miles away, they look like brachiosaurs gathered at a Jurassic-era watering hole.

On a good day, about 3,000 trucks arrive at the terminal, each assigned to pick up or drop off tens of thousands of pounds of everything from diapers to avocados to tractor parts. They start that process, much like airline passengers, by checking in at the terminal’s gate, where scanners automatically read their container’s barcodes and a Maersk gate clerk talks to the truck driver via a speaker system. The driver receives a printed pass that tells them where to park so that a massive yard crane can haul their container from the truck’s chassis to a stack in the cargo yard, where it’s loaded onto a container ship and floated across an ocean—or that entire process in reverse order.

On the morning of June 27, Pablo Fernández was expecting dozens of trucks’ worth of cargo to be shipped out from Elizabeth to a port in the Middle East. Fernández is a so-called freight forwarder—a middleman whom cargo owners pay to make sure their property arrives safely at a destination halfway around the world. (Fernández is not his real name.)

At around 9 am New Jersey time, Fernández’s phone started buzzing with a succession of screaming calls from angry cargo owners. All of them had just heard from truck drivers that their vehicles were stuck outside Maersk’s Elizabeth terminal. “People were jumping up and down,” Fernández says. “They couldn’t get their containers in and out of the gate.”

That gate, a choke point to Maersk’s entire New Jersey terminal operation, was dead. The gate clerks had gone silent.

Soon, hundreds of 18-wheelers were backed up in a line that stretched for miles outside the terminal. One employee at another company’s nearby terminal at the same New Jersey port watched the trucks collect, bumper to bumper, farther than he could see. He’d seen gate systems go down for stretches of 15 minutes or half an hour before. But after a few hours, still with no word from Maersk, the Port Authority put out an alert that the company’s Elizabeth terminal would be closed for the rest of the day. “That’s when we started to realize,” the nearby terminal’s staffer remembers, “this was an attack.” Police began to approach drivers in their cabs, telling them to turn their massive loads around and clear out.

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 11/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED Fernández and countless other frantic Maersk customers faced a set of bleak options: They could try to get their precious cargo onto other ships at premium, last-minute rates, often traveling the equivalent of standby. Or, if their cargo was part of a tight supply chain, like components for a factory, Maersk’s outage could mean shelling out for exorbitant air freight delivery or risk stalling manufacturing processes, where a single day of downtime costs hundreds of thousands of dollars. Many of the containers, known as reefers, were electrified and full of perishable goods that required refrigeration. They’d have to be plugged in somewhere or their contents would rot.

Fernández had to scramble to find a New Jersey warehouse where he could stash his customers’ cargo while he waited for word from Maersk. During the entire first day, he says, he received only one official email, which read like “gibberish,” from a frazzled Maersk staffer’s Gmail account, offering no real explanation of the mounting crisis. The company’s central booking website, Maerskline.com, was down, and no one at the company was picking up their phones. Some of the containers he’d sent on Maersk’s ships that day would remain lost in cargo yards and ports around the world for the next three months. “Maersk was like a black hole,” Fernández remembers with a sigh. “It was just a clusterfuck.”

In fact, it was a clusterfuck of clusterfucks. The same scene was playing out at 17 of Maersk’s 76 terminals, from Los Angeles to Algeciras, Spain, to Rotterdam in the Netherlands, to Mumbai. Gates were down. Cranes were frozen. Tens of thousands of trucks would be turned away from comatose terminals across the globe.

No new bookings could be made, essentially cutting off Maersk’s core source of shipping revenue. The computers on Maersk’s ships weren’t infected. But the terminals’ software, designed to receive the Electronic Data Interchange files from those ships, which tell terminal operators the exact contents of their massive cargo holds, had been entirely wiped away. That left Maersk’s ports with no guide to perform the colossal Jenga game of loading and unloading their towering piles of containers.

For days to come, one of the world’s most complex and interconnected distributed machines, underpinning the circulatory system of the global economy itself, would remain broken. “It was clear this problem was of a magnitude never seen before in global transport,” one Maersk customer remembers. “In the history of shipping IT, no one has ever gone through such a monumental crisis.”

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 12/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED

MIKE MCQUADE

SEVERAL DAYS AFTER his screen had gone dark in a corner of Maersk’s office, Henrik Jensen was at home in his Copenhagen apartment, enjoying a brunch of poached eggs, toast, and marmalade. Since he’d walked out of the office the Tuesday before, he hadn’t heard a word from any of his superiors. Then his phone rang.

When he answered, he found himself on a conference call with three Maersk staffers. He was needed, they said, at Maersk’s office in Maidenhead, England, a town west of London where the conglomerate’s IT overlords, Maersk Group Infrastructure Services, were based. They told him to drop everything and go there. Immediately.

Two hours later, Jensen was on a plane to London, then in a car to an eight-story glass-and-brick building in central Maidenhead. When he arrived, he found that the fourth and fifth floors of the building had been converted into a 24/7 emergency operations center. Its singular purpose: to rebuild Maersk’s global network in the wake of its NotPetya meltdown.

Some Maersk staffers, Jensen learned, had been in the recovery center since Tuesday, when NotPetya first struck. Some had been sleeping in the office, under their desks or in corners of conference rooms. Others seemed to be arriving every minute from other parts of the world, luggage in hand. Maersk had booked practically every hotel room within tens of miles, every bed-and-breakfast, every spare room above a pub. Staffers were subsisting on snacks that someone had piled up in the office kitchen after a trip to a nearby Sainsbury’s grocery store.

The Maidenhead recovery center was being managed by the consultancy . Maersk had essentially given the UK firm a blank check to make its NotPetya problem go away, and at any given time as many as 200 Deloitte staffers were stationed in the Maidenhead office, alongside up to 400 Maersk personnel. All computer equipment used by Maersk from before NotPetya’s outbreak had been confiscated, for fear that it might infect new systems, and signs were posted threatening disciplinary action against anyone who used it. Instead, staffers had gone into every available electronics

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 13/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED store in Maidenhead and bought up piles of new laptops and prepaid Wi-Fi hot spots. Jensen, like hundreds of other Maersk IT staffers, was given one of those fresh laptops and told to do his job. “It was very much just ‘Find your corner, get to work, do whatever needs to be done,’ ” he says.

Early in the operation, the IT staffers rebuilding Maersk’s network came to a sickening realization. They had located backups of almost all of Maersk’s individual servers, dating from between three and seven days prior to NotPetya’s onset. But no one could find a backup for one crucial layer of the company’s network: its domain controllers, the servers that function as a detailed map of Maersk’s network and set the basic rules that determine which users are allowed access to which systems.

Maersk’s 150 or so domain controllers were programmed to sync their data with one another, so that, in theory, any of them could function as a backup for all the others. But that decentralized backup strategy hadn’t accounted for one scenario: where every domain controller is wiped simultaneously. “If we can’t recover our domain controllers,” a Maersk IT staffer remembers thinking, “we can’t recover anything.”

After a frantic global search, the admins finally found one lone surviving domain controller in a remote oce—in Ghana.

After a frantic search that entailed calling hundreds of IT admins in data centers around the world, Maersk’s desperate administrators finally found one lone surviving domain controller in a remote office—in Ghana. At some point before NotPetya struck, a blackout had knocked the Ghanaian machine offline, and the computer remained disconnected from the network. It thus contained the singular known copy of the company’s domain controller data left untouched by the malware—all thanks to a power outage. “There were a lot of joyous whoops in the office when we found it,” a Maersk administrator says.

When the tense engineers in Maidenhead set up a connection to the Ghana office, however, they found its bandwidth was so thin that it would take days to transmit the several-hundred-gigabyte domain controller backup to the UK. Their next idea: put a Ghanaian staffer on the next plane to London. But none of the West African office’s employees had a British visa.

So the Maidenhead operation arranged for a kind of relay race: One staffer from the Ghana office flew to Nigeria to meet another Maersk employee in the airport to hand off the very precious hard drive. That staffer then boarded the six-and- a-half-hour flight to Heathrow, carrying the keystone of Maersk’s entire recovery process.

With that rescue operation completed, the Maidenhead office could begin bringing Maersk’s core services back online. After the first days, Maersk’s port operations had regained the ability to read the ships’ inventory files, so operators were no longer blind to the contents of the hulking, 18,000-container vessels arriving in their harbors. But several days would pass after the initial outage before Maersk started taking orders through Maerskline.com for new shipments, and it would be more than a week before terminals around the world started functioning with any degree of normalcy.

In the meantime, Maersk staffers worked with whatever tools were still available to them. They taped paper documents to shipping containers at APM ports and took orders via personal Gmail accounts, WhatsApp, and Excel spreadsheets. “I

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 14/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED can tell you it’s a fairly bizarre experience to find yourself booking 500 shipping containers via WhatsApp, but that’s what we did,” one Maersk customer says.

About two weeks after the attack, Maersk’s network had finally reached a point where the company could begin reissuing personal computers to the majority of staff. Back at the Copenhagen headquarters, a cafeteria in the basement of the building was turned into a reinstallation assembly line. Computers were lined up 20 at a time on dining tables as help desk staff walked down the rows, inserting USB drives they’d copied by the dozens, clicking through prompts for hours.

A few days after his return from Maidenhead, Henrik Jensen found his laptop in an alphabetized pile of hundreds, its hard drive wiped, a clean image of Windows installed. Everything that he and every other Maersk employee had stored locally on their machines, from notes to contacts to family photos, was gone.

FIVE MONTHS AFTER Maersk had recovered from its NotPetya attack, Maersk chair Jim Hagemann Snabe sat onstage at the World Economic Forum meeting in Davos, Switzerland, and lauded the “heroic effort” that went into the company’s IT rescue operation. From June 27, when he was first awakened by a 4 am phone call in California, ahead of a planned appearance at a Stanford conference, he said, it took just 10 days for the company to rebuild its entire network of 4,000 servers and 45,000 PCs. (Full recovery had taken far longer: Some staffers at the Maidenhead operation continued to work day and night for close to two months to rebuild Maersk’s software setup.) “We overcame the problem with human resilience,” Snabe told the crowd.

Since then, Snabe went on, Maersk has worked not only to improve its cybersecurity but also to make it a “competitive advantage.” Indeed, in the wake of NotPetya, IT staffers say that practically every security feature they’ve asked for has been almost immediately approved. Multifactor authentication has been rolled out across the company, along with a long-delayed upgrade to Windows 10.

Snabe, however, didn’t say much about the company’s security posture pre-NotPetya. Maersk security staffers tell WIRED that some of the corporation’s servers were, up until the attack, still running Windows 2000—an operating system so old Microsoft no longer supported it. In 2016, one group of IT executives had pushed for a preemptive security redesign of Maersk’s entire global network. They called attention to Maersk’s less-than-perfect software patching, outdated operating systems, and above all insufficient network segmentation. That last vulnerability in particular, they warned, could allow malware with access to one part of the network to spread wildly beyond its initial foothold, exactly as NotPetya would the next year.

The security revamp was green-lit and budgeted. But its success was never made a so-called key performance indicator for Maersk’s most senior IT overseers, so implementing it wouldn’t contribute to their bonuses. They never carried the security makeover forward.

Few firms have paid more dearly for dragging their feet on security. In his Davos talk, Snabe claimed that the company suffered only a 20 percent reduction in total shipping volume during its NotPetya outage, thanks to its quick efforts and manual workarounds. But aside from the company’s lost business and downtime, as well as the cost of rebuilding an entire network, Maersk also reimbursed many of its customers for the expense of rerouting or storing their marooned cargo. One Maersk customer described receiving a seven-figure check from the company to cover the cost of sending his cargo via last-minute chartered jet.“They paid me a cool million with no more than a two-minute discussion,” he says. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 15/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED

On top of the panic and disruption it caused, NotPetya may have wiped away evidence of espionage or even reconnaissance for future sabotage.

All told, Snabe estimated in his Davos comments, NotPetya cost Maersk between $250 million and $300 million. Most of the staffers WIRED spoke with privately suspected the company’s accountants had low-balled the figure.

Regardless, those numbers only start to describe the magnitude of the damage. Logistics companies whose livelihoods depend on Maersk-owned terminals weren’t all treated as well during the outage as Maersk’s customers, for instance. Jeffrey Bader, president of a Port Newark–based trucking group, the Association of Bi-State Motor Carriers, estimates that the unreimbursed cost for trucking companies and truckers alone is in the tens of millions. “It was a nightmare,” Bader says. “We lost a lot of money, and we’re angry.”

The wider cost of Maersk’s disruption to the global supply chain as a whole—which depends on just-in-time delivery of products and manufacturing components—is far harder to measure. And, of course, Maersk was only one victim. Merck, whose ability to manufacture some drugs was temporarily shut down by NotPetya, told shareholders it lost a staggering $870 million due to the malware. FedEx, whose European subsidiary TNT Express was crippled in the attack and required months to recover some data, took a $400 million blow. French construction giant Saint-Gobain lost around the same amount. Reckitt Benckiser, the British manufacturer of Durex condoms, lost $129 million, and Mondelēz, the owner of chocolate-maker Cadbury, took a $188 million hit. Untold numbers of victims without public shareholders counted their losses in secret.

Only when you start to multiply Maersk’s story—imagining the same paralysis, the same serial crises, the same grueling recovery—playing out across dozens of other NotPetya victims and countless other industries does the true scale of Russia’s cyberwar crime begin to come into focus.

“This was a very significant wake-up call,” Snabe said at his Davos panel. Then he added, with a Scandinavian touch of understatement, “You could say, a very expensive one.”

ONE WEEK AFTER NotPetya’s outbreak, Ukrainian police dressed in full SWAT camo gear and armed with assault rifles poured out of vans and into the modest headquarters of Linkos Group, running up the stairs like SEAL Team Six invading the bin Laden compound.

They pointed rifles at perplexed employees and lined them up in the hallway, according to the company’s founder, Olesya Linnyk. On the second floor, next to her office, the armored cops even smashed open the door to one room with a metal baton, in spite of Linnyk’s offer of a key to unlock it. “It was an absurd situation,” Linnyk says after a deep breath of exasperation.

The militarized police squad finally found what it was looking for: the rack of servers that had played the role of patient zero in the NotPetya plague. They confiscated the offending machines and put them in plastic bags.

Even now, more than a year after the attack’s calamitous spread, cybersecurity experts still argue over the mysteries of NotPetya. What were the hackers’ true intentions? The Kiev staff of security firm ISSP, including Oleh Derevianko and

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 16/19 8/21/2020 The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED Oleksii Yasinsky, maintain that the attack was intended not merely for destruction but as a cleanup effort. After all, the hackers who launched it first had months of unfettered access to victims’ networks. On top of the panic and disruption it caused, NotPetya may have also wiped away evidence of espionage or even reconnaissance for future sabotage. Just in May, the US Justice Department and Ukrainian security services announced that they’d disrupted a Russian operation that had infected half a million internet routers—mostly in Ukraine—with a new form of destructive malware.

While many in the security community still see NotPetya’s international victims as collateral damage, Cisco’s Craig Williams argues that Russia knew full well the extent of the pain the worm would inflict internationally. That fallout, he argues, was meant to explicitly punish anyone who would dare even to maintain an office inside the borders of Russia’s enemy. “Anyone who thinks this was accidental is engaged in wishful thinking,” Williams says. “This was a piece of malware designed to send a political message: If you do business in Ukraine, bad things are going to happen to you.”

Almost everyone who has studied NotPetya, however, agrees on one point: that it could happen again or even reoccur on a larger scale. Global corporations are simply too interconnected, information security too complex, attack surfaces too broad to protect against state-trained hackers bent on releasing the next world-shaking worm. Russia, meanwhile, hardly seems to have been chastened by the US government’s sanctions for NotPetya, which arrived a full eight months after the worm hit and whose punishments were muddled with other messages chastising Russia for everything from 2016 election disinformation to hacker probes of the US power grid. “The lack of a proper response has been almost an invitation to escalate more,” says Thomas Rid, a political science professor at Johns Hopkins’ School of Advanced International Studies.

But the most enduring object lesson of NotPetya may simply be the strange, extra dimensional landscape of cyberwar’s battlefield. This is the confounding geography of cyberwarfare: In ways that still defy human intuition, phantoms inside M.E.Doc’s server room in a gritty corner of Kiev spread chaos into the gilded conference rooms of the capital’s federal agencies, into ports dotting the globe, into the stately headquarters of Maersk on the Copenhagen harbor, and across the global economy. “Somehow the vulnerability of this Ukrainian accounting software affects the US national security supply of vaccines and global shipping?” asks Joshua Corman, a cybersecurity fellow at the Atlantic Council, as if still puzzling out the shape of the wormhole that made that cause-and-effect possible. “The physics of cyberspace are wholly different from every other war domain.”

In those physics, NotPetya reminds us, distance is no defense. Every barbarian is already at every gate. And the network of entanglements in that ether, which have unified and elevated the world for the past 25 years, can, over a few hours on a summer day, bring it to a crashing halt.

Andy Greenberg (@a_greenberg) is a WIRED senior writer. This story is excerpted from his book Sandworm, forthcoming from Doubleday.

This article appears in the September issue. Subscribe now.

More Great WIRED Stories https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ 17/19 8/21/2020 OpIcarus: Anonymous hacker reveals inspiration behind latest operation and evolution of hacktivism

Technology | CyberSecurity OpIcarus: Anonymous hacker reveals inspiration behind latest operation and evolution of hacktivism

By India Ashok May 23, 2016 12:50 BST

acktivist group Anonymous has made waves with its varied cyberattack campaigns, with H targets ranging from militant outts to banking institutions. The collective's recent operation dubbed OpIcarus, which is aimed at taking down websites of international banks with DDoS attacks, has generated increased awareness among security professionals and the nancial community about the threat of cyberattacks. But there is one thing that has left many puzzled: The reason and motive behind this sort of hacktivism.

An Anonymous hacker, going by the pseudonym "The Voice", gave an exclusive interview to IBTimes UK about the evolution of the collective, its origin, and motive behind OpIcarus. One of Voice's main concerns was to highlight the operations carried out were a result of the group's efforts as a whole, and any individual who takes credit for leading an Anonymous operation goes against the principles of the collective – a point that he reiterated throughout the interview.

Where did it all start for OpIcarus?

According to Voice, OpIcarus has been in the making for ve years and "is created with the input of many different Anons [anonymous hackers] over a number of years." He explained that operations or ops like these are a result of "the collective input which allows the idea of a person to transform into an Op which may or may not be successful. Any individual claims to credit or about leading an Op are simply false. This has always been about group effort".

He claimed to be part of Anonymous since 2007 and has "personally [been] working on OpIcarus since 2011". But when asked if he spoke ofcially for the , he explained that he was "no more or no less a representative of Anonymous than any other member".     https://www.ibtimes.co.uk/opicarus-anonymous-hacker-reveals-inspiration-behind-latest-operation-evolution-hacktivism-1561457 1/5 8/21/2020 OpIcarus: Anonymous hacker reveals inspiration behind latest operation and evolution of hacktivism Speaking about OpIcaurs, Voice emphasised that the operation was not about causing damage or targeting and attacking innocent people. "It's about using the tools and methods we have available to highlight the ongoing problems within the elite banking industry and allow for all those concerns to once again be addressed in public."

The inspiration and motives behind the OpIcarus campaign

Voice revealed that the operation was "created to work hand-in-hand with the Occupy Wall Street movement. The Occupy movement, which started in New York in September 2011, saw thousands take to the streets to protest social and economic inequalities. The movement rapidly gathered force and spread across the globe and saw protests being carried out in over 900 cities across the world.

The online movement lost momentum after several Anonymous hackers were arrested, blaming George Soros for "hijacking" the Occupy movement, said Voice. "The original creators behind the Op decided to revive the Operation amidst all the new economic downfalls we are facing," he asserted. "The idea is to align online and ofine protests/attacks against the corrupt banking elite".

On the motives behind targeting banking systems, the Anonymous hacker revealed: "We want to bring people's attention back to nancial terrorism which is caused by the elite rather than the corporate terrorism which created by the state. Banks and elite have been getting away with murder, tax fraud, drug money laundering, arms dealing, warmongering and many more crimes. Just like in 2011 when there were marches all over the cities against the Banks, we hope to bring that back again with the Operation."

How Anonymous choose its targets

IBTimes UK spoke to ESET security researcher Cameron Camp about the Anonymous evolution as a hacktivist group and how they go about picking who to hit next.

Camp explained: "Anonymous and other loose-knit groups were something new in 2008, but since then companies have had a change to bolster their defences against hacktivism, so companies who have deployed defences are more resilient. This means Anonymous must pick both perceptionally valuable, and lightly defended organisations to be seen as successful. Since these attacks have shorter, less crippling lifespans before defences can be deployed, it is very difcult to continue a campaign long enough so the hacktivists can maintain their focus and retain media attention."     https://www.ibtimes.co.uk/opicarus-anonymous-hacker-reveals-inspiration-behind-latest-operation-evolution-hacktivism-1561457 2/5 8/21/2020 OpIcarus: Anonymous hacker reveals inspiration behind latest operation and evolution of hacktivism However, Camp came up with an alternative theory for the motives behind Anonymous' cyberattacks. "Protests have become digital, but otherwise retain many of the well-studied tenets of traditional protests or direct actions with signs and people marching in the streets. The motivation is to create a strong reaction, which will hopefully result in the perception of a group creating a credible threat, and thereby taken more seriously by the organisation under attack, by attackers who feel they were wrongly not taken seriously."

Why Anonymous targeted banks over individuals

When asked why Anonymous had chosen to target nancial institutions over individual elites, the hacker responded: "The elite are a corporation of their own. They own shares in each others' companies, they lobby each other to war, and they all prot together. As a corporation offering services to the public they are to be held accountable by the public".

He further claimed that the collective gathered forces by reaching out to people outside of the group. "We have been reaching out to many of the individual groups inside of Anonymous to unite and work together under this Operation." When asked if Anonymous had also reached out to a hacker going by the name 'S1ege', who recently also gave an interview about OpIcaurs, Voice responded by claiming that it was S1ege who "reached out to other hacktivists involved with this event and offered his help".

"The message is getting lost between the lies and glory-grabbing"

He went on to censure the Ghost Squad Hacker S1ege's claims of leading OpIcaurs and stressed, "He had nothing to do with the (cyberattacks on) the Philippines, Korea, Jordan, France and many of the others. This has upset many of the hacktivists involved.

"While S1ege and his 'squad' have been taking sites ofine for just a couple of moments, the original hacktivists involved with the Op, which took down Greece, Cyprus, Panama, Montenegro, Iraq, Sudan, Venezuela and many more have been holding these sites ofine all day and their message is getting lost between all the lies and glory grabbing that other people who are also taking part in the Op are doing. There are many at Anonymous who aren't happy with S1ege's recent actions, but despite all of that, unity is what we all hope to achieve."

The Voice provided IBTimes UK with several screenshots as evidence of having shut down various international banks, including the Reserve Bank of India, the State Bank of Hamburg, the Central Bank of UAE, the Vatican City Financial Services, the Rothschild Foundation and the World Bank.

Banks and the effect of the DDoS attack

    https://www.ibtimes.co.uk/opicarus-anonymous-hacker-reveals-inspiration-behind-latest-operation-evolution-hacktivism-1561457 3/5 8/21/2020 OpIcarus: Anonymous hacker reveals inspiration behind latest operation and evolution of hacktivism Cameron Camp also expressed his views on how cyberattacks function and the effects on banking systems: "The DDoS 'toolbox' is now very full with free open source tools that allow less skilled scammers to point-and-click to launch a higher volume attack. Due to the average connection speed increasing from home/school/business networks, compromised networks and computers used as amplication platforms can bring very high levels of network trafc to focus on a target, which then has a harder time defending the ood of trafc so they can continue business as normal," he said.

"Banks who are ooded with trafc have difculty with their system capacity being overwhelmed with junk trafc, reducing or eliminating their ability to do business with real customers, who are also frustrated due to their legitimate transactions failing," he stressed.

What's next for OpIcarus?

With OpIcarus shutting down in May, we asked what future ops the hacktivist collective was planning. "Operation Icarus will continue as long as there are corrupt and greedy banks out there who place their wealth ahead of people's lives and personal safety. 2016 will be a year with many Anonymous and other protest group movements against the banks. We expect to see many more Ops like OpIcarus appear this year."

Top Articles

READ MORE 0009 / 0015 After port disaster,

Lebanese brace for virus SKIP AD lockdown PROMOTED CONTENT

Ohio Launches New Policy For Ohio Launches New Policy For Simple Method "Ends" Tinnitus Cars Used Less Than 25  Cars Used Less Than 50 - Stops Ringing Ears (Watch)

Phytage Labs https://www.ibtimes.co.uk/opicarus-anonymous-hacker-reveals-inspiration-behind-latest-operation-evolution-hacktivism-1561457 4/5 Senate Select Committee on Intelligence

29 JANUARY 2019

STATEMENT FOR THE RECORD

WORLDWIDE THREAT ASSESSMENT of the US INTELLIGENCE COMMUNITY

January 29, 2019

INTRODUCTION

Chairman Burr, Vice Chairman Warner, Members of the Committee, thank you for the invitation to offer the United States Intelligence Community’s 2019 assessment of threats to US national security. My statement reflects the collective insights of the Intelligence Community’s extraordinary women and men, whom I am privileged and honored to lead. We in the Intelligence Community are committed every day to providing the nuanced, independent, and unvarnished intelligence that policymakers, warfighters, and domestic law enforcement personnel need to protect American lives and America’s interests anywhere in the world.

The order of the topics presented in this statement does not necessarily indicate the relative importance or magnitude of the threat in the view of the Intelligence Community.

Information available as of 17 January 2019 was used in the preparation of this assessment.

ATTENTION: This product contains US persons information, which has been included consistent with applicable laws, directives, and policies. Handle in accordance with recipient’s intelligence oversight and/or information handling procedures.

CONTENTS

INTRODUCTION ...... 2 CONTENTS ...... 3 FOREWORD ...... 4 GLOBAL THREATS ...... 5 CYBER ...... 5 ONLINE INFLUENCE OPERATIONS AND ELECTION INTERFERENCE ...... 7 WEAPONS OF MASS DESTRUCTION AND PROLIFERATION ...... 8 TERRORISM ...... 10 COUNTERINTELLIGENCE ...... 13 EMERGING AND DISRUPTIVE TECHNOLOGIES AND THREATS TO ECONOMICCOMPETITIVENESS ...... 15 SPACE AND COUNTERSPACE ...... 16 TRANSNATIONAL ORGANIZED CRIME ...... 18 ECONOMICS AND ENERGY ...... 19 HUMAN SECURITY ...... 21 REGIONAL THREATS ...... 24 CHINA AND RUSSIA ...... 24 EAST ASIA ...... 24 MIDDLE EAST AND NORTH AFRICA ...... 29 SOUTH ASIA ...... 35 RUSSIA AND EURASIA ...... 36 EUROPE ...... 38 AFRICA ...... 39 THE WESTERN HEMISPHERE...... 40

FOREWORD

Threats to US national security will expand and diversify in the coming year, driven in part by China and Russia as they respectively compete more intensely with the United States and its traditional allies and partners. This competition cuts across all domains, involves a race for technological and military superiority, and is increasingly about values. Russia and China seek to shape the international system and regional security dynamics and exert influence over the politics and economies of states in all regions of the world and especially in their respective backyards.

 China and Russia are more aligned than at any point since the mid-1950s, and the relationship is likely to strengthen in the coming year as some of their interests and threat perceptions converge, particularly regarding perceived US unilateralism and interventionism and Western promotion of democratic values and human rights.

 As China and Russia seek to expand their global influence, they are eroding once well- established security norms and increasing the risk of regional conflicts, particularly in the Middle East and East Asia.

 At the same time, some US allies and partners are seeking greater independence from Washington in response to their perceptions of changing US policies on security and trade and are becoming more open to new bilateral and multilateral partnerships.

The post-World War II international system is coming under increasing strain amid continuing cyber and WMD proliferation threats, competition in space, and regional conflicts. Among the disturbing trends are hostile states and actors’ intensifying online efforts to influence and interfere with elections here and abroad and their use of chemical weapons. Terrorism too will continue to be a top threat to US and partner interests worldwide, particularly in Sub-Saharan Africa, the Middle East, South Asia, and Southeast Asia. The development and application of new technologies will introduce both risks and opportunities, and the US economy will be challenged by slower global economic growth and growing threats to US economic competitiveness.

 Migration is likely to continue to fuel social and interstate tensions globally, while drugs and transnational organized crime take a toll on US public health and safety. Political turbulence is rising in many regions as governance erodes and states confront growing public health and environmental threats.

 Issues as diverse as Iran’s adversarial behavior, deepening turbulence in Afghanistan, and the rise of nationalism in Europe all will stoke tensions.

4

GLOBAL THREATS CYBER

Our adversaries and strategic competitors will increasingly use cyber capabilities—including cyber espionage, attack, and influence—to seek political, economic, and military advantage over the United States and its allies and partners. China, Russia, Iran, and North Korea increasingly use cyber operations to threaten both minds and machines in an expanding number of ways—to steal information, to influence our citizens, or to disrupt critical infrastructure.

At present, China and Russia pose the greatest espionage and cyber attack threats, but we anticipate that all our adversaries and strategic competitors will increasingly build and integrate cyber espionage, attack, and influence capabilities into their efforts to influence US policies and advance their own national security interests. In the last decade, our adversaries and strategic competitors have developed and experimented with a growing capability to shape and alter the information and systems on which we rely. For years, they have conducted cyber espionage to collect intelligence and targeted our critical infrastructure to hold it at risk. They are now becoming more adept at using social media to alter how we think, behave, and decide. As we connect and integrate billions of new digital devices into our lives and business processes, adversaries and strategic competitors almost certainly will gain greater insight into and access to our protected information.

China China presents a persistent cyber espionage threat and a growing attack threat to our core military and critical infrastructure systems. China remains the most active strategic competitor responsible for cyber espionage against the US Government, corporations, and allies. It is improving its cyber attack capabilities and altering information online, shaping Chinese views and potentially the views of US citizens—an issue we discuss in greater detail in the Online Influence Operations and Election Interference section of this report.

 Beijing will authorize cyber espionage against key US technology sectors when doing so addresses a significant national security or economic goal not achievable through other means. We are also concerned about the potential for Chinese intelligence and security services to use Chinese information technology firms as routine and systemic espionage platforms against the United States and allies.

 China has the ability to launch cyber attacks that cause localized, temporary disruptive effects on critical infrastructure—such as disruption of a natural gas pipeline for days to weeks—in the United States.

Russia We assess that Russia poses a cyber espionage, influence, and attack threat to the United States and our allies. Moscow continues to be a highly capable and effective adversary, integrating cyber espionage, attack, and influence operations to achieve its political and military objectives. Moscow is now staging cyber attack assets to allow it to disrupt or damage US civilian and military infrastructure during a crisis and poses a significant cyber influence threat—an issue discussed in the Online Influence Operations and Election Interference section of this report.

5

 Russian intelligence and security services will continue targeting US information systems, as well as the networks of our NATO and Five Eyes partners, for technical information, military plans, and insight into our governments’ policies.

 Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure—such as disrupting an electrical distribution network for at least a few hours—similar to those demonstrated in Ukraine in 2015 and 2016. Moscow is mapping our critical infrastructure with the long-term goal of being able to cause substantial damage.

Iran Iran continues to present a cyber espionage and attack threat. Iran uses increasingly sophisticated cyber techniques to conduct espionage; it is also attempting to deploy cyber attack capabilities that would enable attacks against critical infrastructure in the United States and allied countries. Tehran also uses social media platforms to target US and allied audiences, an issue discussed in the Online Influence Operations and Election Interference section of this report.

 Iranian cyber actors are targeting US Government officials, government organizations, and companies to gain intelligence and position themselves for future cyber operations.

 Iran has been preparing for cyber attacks against the United States and our allies. It is capable of causing localized, temporary disruptive effects—such as disrupting a large company’s corporate networks for days to weeks—similar to its data deletion attacks against dozens of Saudi governmental and private-sector networks in late 2016 and early 2017.

North Korea North Korea poses a significant cyber threat to financial institutions, remains a cyber espionage threat, and retains the ability to conduct disruptive cyber attacks. North Korea continues to use cyber capabilities to steal from financial institutions to generate revenue. Pyongyang’s cybercrime operations include attempts to steal more than $1.1 billion from financial institutions across the world—including a successful cyber heist of an estimated $81 million from the New York Federal Reserve account of Bangladesh’s central bank.

Nonstate and Unattributed Actors Foreign cyber criminals will continue to conduct for-profit, cyber-enabled theft and extortion against US networks. We anticipate that financially motivated cyber criminals very likely will expand their targets in the United States in the next few years. Their actions could increasingly disrupt US critical infrastructure in the health care, financial, government, and emergency service sectors, based on the patterns of activities against these sectors in the last few years.

Terrorists could obtain and disclose compromising or personally identifiable information through cyber operations, and they may use such disclosures to coerce, extort, or to inspire and enable physical attacks against their victims. Terrorist groups could cause some disruptive effects—defacing websites or executing denial-of-service attacks against poorly protected networks—with little to no warning.

6

The growing availability and use of publicly and commercially available cyber tools is increasing the overall volume of unattributed cyber activity around the world. The use of these tools increases the risk of misattributions and misdirected responses by both governments and the private sector. ONLINE INFLUENCE OPERATIONS AND ELECTION INTERFERENCE

Our adversaries and strategic competitors probably already are looking to the 2020 US elections as an opportunity to advance their interests. More broadly, US adversaries and strategic competitors almost certainly will use online influence operations to try to weaken democratic institutions, undermine US alliances and partnerships, and shape policy outcomes in the United States and elsewhere. We expect our adversaries and strategic competitors to refine their capabilities and add new tactics as they learn from each other’s experiences, suggesting the threat landscape could look very different in 2020 and future elections.

 Russia’s social media efforts will continue to focus on aggravating social and racial tensions, undermining trust in authorities, and criticizing perceived anti-Russia politicians. Moscow may employ additional influence toolkits—such as spreading disinformation, conducting hack-and- leak operations, or manipulating data—in a more targeted fashion to influence US policy, actions, and elections.

 Beijing already controls the information environment inside China, and it is expanding its ability to shape information and discourse relating to China abroad, especially on issues that Beijing views as core to party legitimacy, such as Taiwan, Tibet, and human rights. China will continue to use legal, political, and economic levers—such as the lure of Chinese markets —to shape the information environment. It is also capable of using cyber attacks against systems in the United States to censor or suppress viewpoints it deems politically sensitive.

 Iran, which has used social media campaigns to target audiences in both the United States and allied nations with messages aligned with Iranian interests, will continue to use online influence operations to try to advance its interests.

 Adversaries and strategic competitors probably will attempt to use deep fakes or similar machine-learning technologies to create convincing—but false—image, audio, and video files to augment influence campaigns directed against the United States and our allies and partners.

Adversaries and strategic competitors also may seek to use cyber means to directly manipulate or disrupt election systems—such as by tampering with voter registration or disrupting the vote tallying process—either to alter data or to call into question our voting process. Russia in 2016 and unidentified actors as recently as 2018 have already conducted cyber activity that has targeted US election infrastructure, but we do not have any intelligence reporting to indicate any compromise of our nation’s election infrastructure that would have prevented voting, changed vote counts, or disrupted the ability to tally votes.

7

WEAPONS OF MASS DESTRUCTION AND PROLIFERATION

We expect the overall threat from weapons of mass destruction (WMD) to continue to grow during 2019, and we note in particular the threat posed by chemical warfare (CW) following the most significant and sustained use of chemical weapons in decades. This trend erodes international norms against CW programs and shifts the cost-benefit analysis such that more actors might consider developing or using chemical weapons.

We assess that North Korea, Russia, Syria, and ISIS have used chemical weapons on the battlefield or in assassination operations during the past two years. These attacks have included traditional CW agents, toxic industrial chemicals, and the first known use of a Novichok nerve agent.

The threat from biological weapons has also become more diverse as BW agents can be employed in a variety of ways and their development is made easier by dual-use technologies.

North Korea Pyongyang has not conducted any nuclear-capable missile or nuclear tests in more than a year, has declared its support for the denuclearization of the Korean Peninsula, and has reversibly dismantled portions of its WMD infrastructure. However, North Korea retains its WMD capabilities, and the IC continues to assess that it is unlikely to give up all of its WMD stockpiles, delivery systems, and production capabilities. North Korean leaders view nuclear arms as critical to regime survival. For more explanation of the North Korea-WMD issue, see the Regional Threats section of this report.

8

 In his 2019 New Year’s address, Kim Jong Un pledged North Korea would “go toward” complete denuclearization and promised not to make, test, use, or proliferate nuclear weapons. However, he conditioned progress on US “practical actions.” The regime tied the idea of denuclearization in the past to changes in diplomatic ties, economic sanctions, and military activities.

 We continue to observe activity inconsistent with full denuclearization. In addition, North Korea has for years underscored its commitment to nuclear arms, including through an order in 2018 to mass-produce weapons and an earlier law—and constitutional change—affirming the country’s nuclear status.

Russia We assess that Russia will remain the most capable WMD adversary through 2019 and beyond, developing new strategic and nonstrategic weapons systems.

 Russian President Vladimir Putin used his annual address in March 2018 to publicly acknowledge several of these weapons programs, including a new ICBM designed to penetrate US missile defense systems; an intercontinental-range, hypersonic glide vehicle; a maneuverable, air-launched missile to strike regional targets; a long-range, nuclear-powered cruise missile; and a nuclear-powered, transoceanic underwater vehicle.

 Russia has also developed and fielded a ground-launched cruise missile (GLCM) that the United States has determined violates the Intermediate-Range Nuclear Forces (INF) Treaty.

 Moscow probably believes that the new GLCM provides sufficient military advantages to make it worth the risk of political repercussions from a violation.

China We assess that China will continue to expand and diversify its WMD capabilities.

 China continues its multiyear effort to modernize its nuclear missile forces, including deploying sea-based weapons, improving its road-mobile and silo-based weapons, and testing hypersonic glide vehicles. These new capabilities are intended to ensure the viability of China’s strategic deterrent by providing a second-strike capability and a way to overcome missile defenses. The Chinese have also publicized their intent to form a nuclear triad by developing a nuclear- capable, next-generation bomber.

9

Iran We continue to assess that Iran is not currently undertaking the key nuclear weapons-development activities we judge necessary to produce a nuclear device. However, Iranian officials have publicly threatened to reverse some of Iran’s Joint Comprehensive Plan of Action (JCPOA) commitments—and resume nuclear activities that the JCPOA limits—if Iran does not gain the tangible trade and investment benefits it expected from the deal.

 In June 2018, Iranian officials started preparations, allowable under the JCPOA, to expand their capability to manufacture advanced centrifuges.

 Also in June 2018, the Atomic Energy Organization of Iran (AEOI) announced its intent to

resume producing natural uranium hexafluoride (UF6) and prepare the necessary infrastructure to expand its enrichment capacity within the limits of the JCPOA.

 Iran continues to work with other JCPOA participants—China, the European Union, France, Germany, Russia, and the United Kingdom—to find ways to salvage economic benefits from it. Iran’s continued implementation of the JCPOA has extended the amount of time Iran would need to produce enough fissile material for a nuclear weapon from a few months to about one year.

Iran’s ballistic missile programs, which include the largest inventory of ballistic missiles in the region, continue to pose a threat to countries across the Middle East. Iran’s work on a space launch vehicle (SLV)—including on its Simorgh—shortens the timeline to an ICBM because SLVs and ICBMs use similar technologies.

The United States determined in 2018 that Iran is in noncompliance with its obligations under the Chemical Weapons Convention (CWC), and we remain concerned that Iran is developing agents intended to incapacitate for offensive purposes and did not declare all of its traditional CW agent capabilities when it ratified the CWC.

South Asia The continued growth and development of Pakistan and India’s nuclear weapons programs increase the risk of a nuclear security incident in South Asia, and the new types of nuclear weapons will introduce new risks for escalation dynamics and security in the region. Pakistan continues to develop new types of nuclear weapons, including short-range tactical weapons, sea-based cruise missiles, air-launched cruise missiles, and longer range ballistic missiles. India this year conducted its first deployment of a nuclear-powered submarine armed with nuclear missiles. TERRORISM

Sunni Violent Extremists Global jihadists in dozens of groups and countries threaten local and regional US interests, despite having experienced some significant setbacks in recent years, and some of these groups will remain intent on striking the US homeland. Prominent jihadist ideologues and media platforms continue to call for and justify efforts to attack the US homeland.

10

 Global jihadist groups in parts of Africa and Asia in the last year have expanded their abilities to strike local US interests, stoke insurgencies, and foster like-minded networks in neighboring countries.

 The conflicts in Iraq and Syria have generated a large pool of battle-hardened fighters with the skills to conduct attacks and bolster terrorist groups’ capabilities.

ISIS ISIS still commands thousands of fighters in Iraq and Syria, and it maintains eight branches, more than a dozen networks, and thousands of dispersed supporters around the world, despite significant leadership and territorial losses. The group will exploit any reduction in CT pressure to strengthen its clandestine presence and accelerate rebuilding key capabilities, such as media production and external operations. ISIS very likely will continue to pursue external attacks from Iraq and Syria against regional and Western adversaries, including the United States.

 ISIS is perpetrating attacks in Iraq and Syria to undermine stabilization efforts and retaliate against its enemies, exploiting sectarian tensions in both countries. ISIS probably realizes that controlling new territory is not sustainable in the near term. We assess that ISIS will seek to exploit Sunni grievances, societal instability, and stretched security forces to regain territory in Iraq and Syria in the long term.

11

Al-Qa‘ida Al-Qa‘ida senior leaders are strengthening the network’s global command structure and continuing to encourage attacks against the West, including the United States, although most al-Qa‘ida affiliates’ attacks to date have been small scale and limited to their regional areas. We expect that al-Qa‘ida’s global network will remain a CT challenge for the United States and its allies during the next year.

 Al-Qa‘ida media continues to call for attacks against the United States, including in statements from regional al-Qa‘ida leaders, reflecting the network’s enduring efforts to pursue or inspire attacks in the West.

 All al-Qa‘ida affiliates are involved in insurgencies and maintain safe havens, resources, and the intent to strike local and regional US interests in Africa, the Middle East, and South Asia.

 Al-Qa‘ida affiliates in East and North Africa, the Sahel, and Yemen remain the largest and most capable terrorist groups in their regions. All have maintained a high pace of operations during the past year, despite setbacks in Yemen, and some have expanded their areas of influence. Al-Qa‘ida elements in Syria, meanwhile, continue to undermine efforts to resolve that conflict, while the network’s affiliate in South Asia provides support to the Taliban.

Homegrown Violent Extremists Homegrown violent extremists (HVEs) are likely to present the most acute Sunni terrorist threat to the United States, and HVE activity almost certainly will have societal effects disproportionate to the casualties and damage it causes.

 The United States’ well-integrated Muslim population, fragmented HVE population, and high level of vigilance will ensure the United States remains a generally inhospitable operating environment for HVEs compared to many other Western countries. The isolated nature of self- radicalizing individuals, however, poses a continual challenge to law enforcement to identify them before they engage in violence. The frequency of attacks most likely will be very low compared to most other forms of criminal violence in the US, as long as US CT and law enforcement efforts remain constant.

 Despite territorial losses in Iraq and Syria, ISIS’s past actions and propaganda probably will inspire future HVE attacks, similar to the enduring influence of deceased al-Qa‘ida ideologues, especially if ISIS can retain its prominence among global jihadist movements and continue to promote its violent message via social and mainstream media.

Shia Actors

Iran Iran almost certainly will continue to develop and maintain terrorist capabilities as an option to deter or retaliate against its perceived adversaries.

 In mid-2018, Belgium and Germany foiled a probable Iranian Ministry of Intelligence and Security (MOIS) plot to set off an explosive device at an Iranian opposition group gathering in Paris—an event that included prominent European and US attendees.

12

Lebanese Hizballah During the next year, Hizballah most likely will continue to develop its terrorist capabilities, which the group views as a valuable tool and one it can maintain with plausible deniability.

 Hizballah most likely maintains the capability to execute a range of attack options against US interests worldwide.

Violent Ethno-supremacist and Ultranationalist Groups Some violent ethno-supremacist and ultranationalist groups in Europe will employ violent tactics as they seek ways to cooperate against immigration and the perceived Islamization of Europe, posing a potential threat to US and allied interests.

 In the past two years, individuals with ties to violent ethno-supremacist groups in France, Sweden, and the United Kingdom have either carried out attacks on minorities and politicians or had their plots disrupted by authorities. COUNTERINTELLIGENCE

The United States faces a complex global foreign intelligence threat environment in 2019. Russia and China will continue to be the leading state intelligence threats to US interests, based on their services’ capabilities, intent, and broad operational scopes. Other states also pose persistent threats, notably Iran and Cuba. Geopolitical, societal, and technological changes will increase opportunities for foreign

13

intelligence services and other entities—such as terrorists, criminals, and cyber actors—to collect on US activities and information to the detriment of US interests.

 Penetrating the US national decisionmaking apparatus and the Intelligence Community will remain a key objective for numerous foreign intelligence services and other entities. In addition, targeting of national security information and proprietary technology from US companies and research institutions will remain a sophisticated and persistent threat.

Russia We expect that Russia’s intelligence services will target the United States, seeking to collect intelligence, erode US democracy, undermine US national policies and foreign relationships, and increase Moscow’s global position and influence.

China We assess that China’s intelligence services will exploit the openness of American society, especially academia and the scientific community, using a variety of means.

Iran and Cuba We assess that Iran and Cuba’s intelligence services will continue to target the United States, which they see as a primary threat. Iran continues to unjustly detain US citizens and has not been forthcoming about the case of former FBI agent Robert Levinson (USPER).

Nonstate Actors We assess that nonstate actors—including hacktivist groups, transnational criminals, and terrorist groups—will attempt to gain access to classified information to support their objectives. They are likely to improve their intelligence capabilities—to include recruiting sources and performing physical and technical surveillance—and they will use human, technical, and cyber means to perform their illicit activities and avoid detection and capture.

14

EMERGING AND DISRUPTIVE TECHNOLOGIES AND THREATS TO ECONOMIC COMPETITIVENESS

Strategic Outlook For 2019 and beyond, the innovations that drive military and economic competitiveness will increasingly originate outside the United States, as the overall US lead in science and technology (S&T) shrinks; the capability gap between commercial and military technologies evaporates; and foreign actors increase their efforts to acquire top talent, companies, data, and intellectual property via licit and illicit means. Many foreign leaders, including Chinese President Xi Jinping and Russian President Vladimir Putin, view strong indigenous science and technology capabilities as key to their country’s sovereignty, economic outlook, and national power.

Artificial Intelligence and Autonomy The global race to develop artificial intelligence (AI)—systems that imitate aspects of human cognition—is likely to accelerate the development of highly capable, application-specific AI systems with national security implications. As academia, major companies, and large government programs continue to develop and deploy AI capabilities, AI-enhanced systems are likely to be trusted with increasing levels of autonomy and decisionmaking, presenting the world with a host of economic, military, ethical, and

15

privacy challenges. Furthermore, interactions between multiple advanced AI systems could lead to unexpected outcomes that increase the risk of economic miscalculation or battlefield surprise.

Information and Communications Foreign production and adoption of advanced communication technologies, such as fifth-generation (5G) wireless networks, most likely will challenge US competitiveness and data security, while advances in quantum computing foreshadow challenges to current methods of protecting data and transactions. US data will increasingly flow across foreign-produced equipment and foreign-controlled networks, raising the risk of foreign access and denial of service. Foreign deployment of a large-scale quantum computer, even 10 or more years in the future, would put sensitive information encrypted with today’s most widely used algorithms at greatly increased risk of decryption.

Biotechnology Rapid advances in biotechnology, including gene editing, synthetic biology, and neuroscience, are likely to present new economic, military, ethical, and regulatory challenges worldwide as governments struggle to keep pace. These technologies hold great promise for advances in precision medicine, agriculture, and manufacturing, but they also introduce risks, such as the potential for adversaries to develop novel biological warfare agents, threaten food security, and enhance or degrade human performance.

Materials and Manufacturing A global resurgence in materials science and manufacturing technology is likely to enable advanced states to create materials with novel properties and engineer structures not previously possible, while placing high- end manufacturing capabilities within reach of small groups and individuals. These developments are already supplementing or displacing traditional methods in most areas of manufacturing, from complex rocket-engine components to plastic desktop-printed toys, and they are enabling the development of a new generation of engineered materials that combine different materials in complex geometries to alter the overall material properties. SPACE AND COUNTERSPACE

We assess that commercial space services will continue to expand; countries—including US adversaries and strategic competitors—will become more reliant on space services for civil and military needs, and China and Russia will field new counterspace weapons intended to target US and allied space capabilities.

Evolving, Accessible Space Capabilities We continue to assess that the expansion of the global space industry will further extend space-enabled capabilities and space situational awareness to government, nonstate, and commercial actors in the next several years. All actors will increasingly have access to space-derived information services, such as imagery; weather; communications; and positioning, navigation, and timing (PNT).

16

 Global access to space services has expanded for civil, commercial, intelligence, and military purposes, in part because of technological innovation, private-sector investment, international partnerships, and demand from emerging markets.

Adversary Use of Space We expect foreign governments will continue efforts to expand their use of space-based reconnaissance, communications, and navigation systems— including by increasing the number of satellites, quality of capabilities, and applications for use. China and Russia are seeking to expand the full spectrum of their space capabilities, as exemplified by China’s launch of its highest- resolution imagery satellite, Gaofen-11, in July 2018.

Space Warfare and Counterspace Weapons We assess that China and Russia are training and equipping their military space forces and fielding new antisatellite (ASAT) weapons to hold US and allied space services at risk, even as they push for international agreements on the nonweaponization of space.

 Both countries recognize the world’s growing reliance on space and view the capability to attack space services as a part of their broader efforts to deter an adversary from or defeat one in combat.

 The People’s Liberation Army (PLA) has an operational ground-based ASAT missile intended to target low-Earth-orbit satellites, and China probably intends to pursue additional ASAT weapons capable of destroying satellites up to geosynchronous Earth orbit.

 Russia is developing a similar ground-launched ASAT missile system for targeting low-Earth orbit that is likely to be operational within the next several years. It has fielded a ground-based laser weapon, probably intended to blind or damage sensitive space-based optical sensors, such as those used for remote sensing.

 China’s and Russia’s proposals for international agreements on the nonweaponization of space do not cover multiple issues connected to the ASAT weapons they are developing and deploying, which has allowed them to pursue space warfare capabilities while maintaining the position that space must remain weapons free.

17

TRANSNATIONAL ORGANIZED CRIME

Global transnational criminal organizations and networks will threaten US interests and allies by trafficking drugs, exerting malign influence in weak states, threatening critical infrastructure, orchestrating human trafficking, and undermining legitimate economic activity.

Drug Trafficking The foreign drug threat will pose continued risks to US public health and safety and will present a range of threats to US national security interests in the coming year. Violent Mexican traffickers, such as members of the Sinaloa Cartel and New Generation Jalisco Cartel, remain key to the movement of illicit drugs to the United States, including heroin, methamphetamine, fentanyl, and cannabis from Mexico, as well as cocaine from Colombia. Chinese synthetic drug suppliers dominate US-bound movements of so- called designer drugs, including synthetic marijuana, and probably ship the majority of US fentanyl, when adjusted for purity.

 Approximately 70,000 Americans died from drug overdoses in 2017, a record high and a 10-percent increase from 2016, although the rate of growth probably slowed in early 2018, based on Centers for Disease Control (CDC) data.

 Increased drug fatalities are largely a consequence of surging production of the synthetic opioid fentanyl; in 2017, more than 28,000 Americans died from synthetic opioids other than methadone, including illicitly manufactured fentanyl. The CDC reports synthetic opioid- related deaths rose 846 percent between 2010 and 2017, while DHS reports that US seizures of the drug increased 313 percent from 2016 to 2017.

Other Organized Crime Activities Transnational criminal organizations and their affiliates are likely to expand their influence over some weak states, collaborate with US adversaries, and possibly threaten critical infrastructure.

 Mexican criminals use bribery, intimidation, and violence to protect their drug trafficking, kidnapping-for-ransom, fuel-theft, gunrunning, extortion, and alien-smuggling enterprises.

 Gangs based in Central America, such as MS-13, continue to direct some criminal activities beyond the region, including in the United States.

18

Transnational organized crime almost certainly will continue to inflict human suffering, deplete natural resources, degrade fragile ecosystems, drive migration, and drain income from the productive—and taxable—economy.

 Human trafficking generates an estimated $150 billion annually for illicit actors and governments that engage in forced labor, according to the UN’s International Labor Organization.

 Wildlife poaching and trafficking; illegal, unregulated, unlicensed fishing; illicit mining; timber pilfering; and drug-crop cultivation harm biodiversity, as well as the security of the food supply, water quality and availability, and animal and human health.

 One think tank study estimates that cybercrime, often facilitated by cryptocurrencies, and intellectual property theft resulted in $600 million in losses in 2017; such crimes threaten privacy, harm economic safety, and sap intellectual capital. ECONOMICS AND ENERGY

Global growth—projected by the IMF to remain steady in 2019—faces downside risks as global trade tensions persist, many countries contend with high debt levels, and geopolitical tensions continue. Average real growth in advanced economies, operating at close to full capacity, is projected by the IMF to slow in 2019, while emerging markets, key US trading partners, and China’s growth face headwinds.

Emerging Markets Uncertainty about global economic growth will challenge emerging markets—such as Argentina, Brazil, China, Mexico, South Africa, and Turkey—and especially those with weak fundamentals, heavy foreign financing, or close trade linkages with advanced economies. Commodity exporters will remain particularly vulnerable to downward pressure on prices from dampened demand.

 Since early 2018, investors have pulled capital out of Brazil, India, Indonesia, and Turkey, among others, exacerbating large currency depreciations in those countries and making it more difficult for them to service their US-dollar-denominated debt during the next year.

 Austerity measures imposed by countries to offset budget deficits could prove to be politically difficult to maintain, leading to risks of destabilizing protests, such as occurred in July 2018, when Haiti attempted to comply with an IMF program by reducing fuel subsidies and set off

19

nationwide protests that forced the Prime Minister and his cabinet to resign. Argentina has agreed to IMF recommendations for austerity, reducing the risk to investors, and Turkey is pursuing its own austerity measures.

Key US Trading Partners Among major US trading partners the outlook is mixed, with progress being made on US-Canada-Mexico trade discussions but US-China trade frictions and Brexit posing risks to European growth and US-EU trade.

 Mexico and Canada, whose economic prospects are tied closely to the United States-Mexico- Canada Agreement (USMCA), remain concerned about steel and aluminum tariffs and may delay ratifying the USMCA until those concerns are addressed.

 US-EU trade, valued at $1.2 trillion in 2017, would almost certainly suffer disruptions from a no-deal Brexit, which would further dampen UK—and to a lesser extent EU—economic growth. Uncertainty stemming from London’s pending exit from the EU is already hurting UK economic growth and the strength of the pound sterling.

 Financial conditions and economic performance generally remain favorable in both Japan and South Korea. However, both countries' economies are dependent on exports, which puts them at continued risk of downward pressure from China's economic slowdown.

China’s Economy China’s economic growth is likely to slow in 2019, and a worse-than-expected slowdown could exacerbate trade and budget pressures in emerging-market countries and key commodity exporters, who rely on Chinese demand.

 Since 2017, Beijing has been largely focused on stemming risks in China’s financial system, reducing bank credit growth to the lowest rate in a decade, while trying to bolster growth by cutting taxes, calling on banks to lend to private firms, and requiring local governments to plan measures to sustain employment.

 US-China trade tensions had not significantly affected China’s total exports as of late 2018, but firms in China have reported a slowdown in new export orders, suggesting China’s export sector will suffer in 2019. Some multinational companies are wary of bilateral tensions and have begun to move production to other countries, especially in Southeast Asia, for lower- value-added goods.

Energy and Commodities Slower economic growth combined with a rising US dollar could lower demand for energy and other commodities, hurting exporters. However, low global spare capacity or a supply disruption might still put upward pressure on oil prices in the coming year, which would further slow overall global economic growth.

 As of December 2018, the US Energy Information Administration forecast that 2019 oil prices would decline 17 percent and 15 percent for West Texas Intermediate and Brent, respectively. Prices for other key commodities declined in 2018. Food prices decreased 6.4 percent in 2018,

20

and metals prices decreased 11.7 percent, according to the IMF’s primary commodities index, reflecting tariffs, sanctions on the Russian company Rusal, and increasing uncertainty about trade policy.

 Production challenges in some oil-exporting countries—notably Libya, Nigeria, and Venezuela—as well as export losses from Iran, would the limit benefits of increased oil prices to those countries. Saudi Arabia, other Persian Gulf oil exporters, and Russia could enjoy increased revenues, but they might also backtrack on the economic reforms they began during periods of lower oil prices.

 In the past year, strong demand for liquefied natural gas (LNG) in China and India, as well as higher oil prices, kept the spot price for LNG close to its highest level in three years, according to the IMF, despite new supplies from the United States and Australia. HUMAN SECURITY

The United States will probably have to manage the impact of global human security challenges, such as threats to public health, historic levels of human displacement, assaults on religious freedom, and the negative effects of environmental degradation and climate change.

Global Health We assess that the United States and the world will remain vulnerable to the next flu pandemic or large- scale outbreak of a contagious disease that could lead to massive rates of death and disability, severely affect the world economy, strain international resources, and increase calls on the United States for support. Although the international community has made tenuous improvements to global health security, these gains may be inadequate to address the challenge of what we anticipate will be more frequent outbreaks of infectious diseases because of rapid unplanned urbanization, prolonged humanitarian crises, human incursion into previously unsettled land, expansion of international travel and trade, and regional climate change.

 The ongoing crisis in Venezuela has reversed gains in controlling infectious diseases, such as diphtheria, malaria, measles, and tuberculosis, increasing the risk that these diseases could spread to neighboring countries, particularly Brazil, Colombia, and Trinidad and Tobago. Similarly, the ongoing Ebola outbreak in the Democratic Republic of the Congo—the country’s largest ever—underscores the risks posed by the nexus of infectious disease outbreaks, violent conflict, and high population density, including large numbers of internally displaced person (IDPs).

 In the past two years, progress against malaria has halted after more than 15 years of steady reductions, in part because mosquitos and the pathogen have developed a resistance to insecticides and to antimalarial drugs, respectively, while global funding to combat the disease has plateaued.

 The growing proximity of humans and animals has increased the risk of disease transmission. The number of outbreaks has increased in part because pathogens originally found in animals have spread to human populations.

21

Human Displacement Global displacement almost certainly will remain near record highs, and host countries are unlikely to see many refugees or internally displaced persons return home, increasing humanitarian needs and the risk of political upheaval, health crises, and recruitment and radicalization by militant groups. The number of people becoming displaced within their own national borders continues to increase, according to the United Nations, placing fiscal and political strain on governments’ ability to care for their domestic populations and mitigate local discontent.

Religious Freedom Violations of religious freedom by governments and nonstate actors—particularly in the Middle East, China, and North Korea—will fuel the growth of violent extremist groups and lead to societal tensions, protests, or political turmoil.

 According to the Pew Research Center’s global indexes, the average score for government restrictions on religion rose 39 percent from 2007 to 2016, and the number of states with high or very high government restrictions grew from 40 to 55.

 Since 2017, Chinese authorities have detained hundreds of thousands and possibly millions of Turkic Muslim Uighurs in extrajudicial detainment centers. Beijing has also reached beyond its borders to pursue this campaign, including by pressuring ethnic Uighurs overseas, some of whom are American citizens, to return to China so it can more easily control them. Chinese security services have contacted Uighurs abroad and coerced them to act as informants by threatening to keep Xinjiang-based family members in detention.

22

Environment and Climate Change Global environmental and ecological degradation, as well as climate change, are likely to fuel competition for resources, economic distress, and social discontent through 2019 and beyond. Climate hazards such as extreme weather, higher temperatures, droughts, floods, wildfires, storms, sea level rise, soil degradation, and acidifying oceans are intensifying, threatening infrastructure, health, and water and food security. Irreversible damage to ecosystems and habitats will undermine the economic benefits they provide, worsened by air, soil, water, and marine pollution.

 Extreme weather events, many worsened by accelerating sea level rise, will particularly affect urban coastal areas in South Asia, Southeast Asia, and the Western Hemisphere. Damage to communication, energy, and transportation infrastructure could affect low-lying military bases, inflict economic costs, and cause human displacement and loss of life.

 Changes in the frequency and variability of heat waves, droughts, and floods—combined with poor governance practices—are increasing water and food insecurity around the world, increasing the risk of social unrest, migration, and interstate tension in countries such as Egypt, Ethiopia, Iraq, and Jordan.

 Diminishing Arctic sea ice may increase competition—particularly with Russia and China— over access to sea routes and natural resources. Nonetheless, Arctic states have maintained mostly positive cooperation in the region through the Arctic Council and other multilateral mechanisms, a trend we do not expect to change in the near term. Warmer temperatures and diminishing sea ice are reducing the high cost and risks of some commercial activities and are attracting new players to the resource-rich region. In 2018, the minimum sea ice extent in the Arctic was 25 percent below the 30-year average from 1980 to 2010.

23 REGIONAL THREATS CHINA AND RUSSIA

China and Russia will present a wide variety of economic, political, counterintelligence, military, and diplomatic challenges to the United States and its allies. We anticipate that they will collaborate to counter US objectives, taking advantage of rising doubts in some places about the liberal democratic model.

Chinese-Russian Relations China and Russia are expanding cooperation with each other and through international bodies to shape global rules and standards to their benefit and present a counterweight to the United States and other Western countries.

 The two countries have significantly expanded their cooperation, especially in the energy, military, and technology spheres, since 2014.

 China has become the second-largest contributor to the UN peacekeeping budget and the third- largest contributor to the UN regular budget. It is successfully lobbying for its nationals to obtain senior posts in the UN Secretariat and associated organizations, and it is using its influence to press the UN and member states to acquiesce in China’s preferences on issues such as human rights and Taiwan.

 Russia is working to consolidate the UN’s counterterrorism structures under the UN Under Secretary General for Counterterrorism, who is Russian.

 Both countries probably will use the UN as a platform to emphasize sovereignty narratives that reflect their interests and redirect discussions away from human rights, democracy, and good governance.

 China and Russia also have increased their sway in the International Telecommunication Union through key leadership appointments and financial and technical assistance. They seek to use the organization to gain advantage for their national industries and move toward more state-controlled Internet governance. EAST ASIA

The United States will see mounting threats in Asia, including a variety of challenges from China and North Korea, and rising authoritarianism in the region.

China

The Chinese Communist Party’s Concentration of Power China is deepening its authoritarian turn under President Xi Jinping, and the resulting hardening of Chinese politics and governance probably will make it more difficult for the leadership to recognize and correct policy errors, including in relations with the United States and our allies and partners.

24

 President Xi removed one of the few remaining checks on his authority when he eliminated presidential term limits in March 2018, and the Chinese Communist Party has reasserted control over the economy and society, tightened legal and media controls, marginalized independent voices, and intensified repression of Chinese Muslims, Christians, and other religious minorities.

 The Chinese Government also is harnessing technology, including facial recognition, biometrics, and vehicle GPS tracking, to bolster its apparatus of domestic monitoring and control.

 Beijing’s increasing restrictions on scholars’ and researchers’ freedom of movement and communication with US counterparts may increase the prospects for misunderstanding and misinterpretation of US policies.

Expanding Global Reach We assess that China’s leaders will try to extend the country’s global economic, political, and military reach while using China’s military capabilities and overseas infrastructure and energy investments under the Belt and Road Initiative to diminish US influence. However, Beijing is likely to face political pushback from host governments in many locations, and the overall threat to US and partner interests will depend on the size, locations, and offensive military capabilities of the eventual Chinese presence.

 China has built its first overseas military facility in Djibouti and probably is exploring bases, support facilities, or access agreements in Africa, Europe, Oceania, Southeast Asia, and South Asia.

 In most instances, China has not secured explicit permanent basing rights but is using commercial development and military ties to lay the groundwork for gaining future military access.

 Successful implementation of the Belt and Road Initiative could facilitate PLA access to dozens of additional ports and airports and significantly expand China’s penetration of the economies and political systems of participating countries.

The Coming Ideological Battle Chinese leaders will increasingly seek to assert China’s model of authoritarian capitalism as an alternative—and implicitly superior—development path abroad, exacerbating great-power competition that could threaten international support for democracy, human rights, and the rule of law.

 The actions of Xi and his advisers—doubling down on authoritarianism at home and showing they are comfortable with authoritarian regimes abroad—along with China’s opaque commercial and development practices, reward compliant foreign leaders and can be corrosive to civil society and the rule of law.

 At the 2018 Central Foreign Affairs Work Conference, Xi stated his desire to lead the reform of the global governance system, driving a period of increased Chinese foreign policy activism and a Chinese worldview that links China’s domestic vision to its international vision.

25

 Beijing has stepped up efforts to reshape the international discourse around human rights, especially within the UN system. Beijing has sought not only to block criticism of its own system but also to erode norms, such as the notion that the international community has a legitimate role in scrutinizing other countries’ behavior on human rights (e.g., initiatives to proscribe country-specific resolutions), and to advance narrow definitions of human rights based on economic standards.

South China Sea and Taiwan We assess that China will continue increasing its maritime presence in the South China Sea and building military and dual-use infrastructure in the Spratly Islands to improve its ability to control access, project power, and undermine US influence in the area. A body of open-source reporting shows that China seeks to achieve effective control over its claimed waters with a whole-of-government strategy, compel Southeast Asian claimants to acquiesce in China’s claims—at least tacitly—and bolster Beijing’s narrative in the region that the United States is in decline and China’s preeminence is inevitable.

 Meanwhile, Beijing almost certainly will continue using pressure and incentives to try to force Taipei to accept the One China framework and ultimately Chinese control, and it will monitor the US reaction as an indicator of US resolve in the region.

 Since 2016, Beijing has persuaded six of Taiwan’s 23 diplomatic partners, most recently Burkina Faso and El Salvador, to recognize China instead of Taiwan.

Military Capabilities The People’s Liberation Army (PLA) continues to develop and field advanced weapons and hardware while honing its ability to fight in all military domains. The force is undergoing its most comprehensive restructuring ever to realize China’s long-held goal of being able to conduct modern, rapid military operations based on high technology to assert and defend China’s regional and growing global interests.

 PLA reforms seek to reinforce the Chinese Communist Party’s control of the military, improve the PLA’s ability to perform joint operations, increase combat effectiveness, and curb corruption.

 As China’s global footprint and international interests have grown, its military modernization program has become more focused on investments and infrastructure to support a range of missions beyond China’s periphery, including a growing emphasis on the maritime domains, offensive air operations, and long-distance mobility operations.

26

North Korea

Nuclear Ambitions

Pyongyang has not conducted any nuclear- capable missile or nuclear tests in more than a year, has declared its support for the denuclearization of the Korean Peninsula, and has reversibly dismantled portions of its WMD infrastructure. However, we continue to assess that North Korea is unlikely to give up all of its nuclear weapons and production capabilities, even as it seeks to negotiate partial denuclearization steps to obtain key US and international concessions. North Korean leaders view nuclear arms as critical to regime survival, according to official statements and regime-controlled media.

 In his 2019 New Year’s address, North Korean President Kim Jong Un pledged that North Korea would “go toward” complete denuclearization and promised not to make, test, use, or proliferate nuclear weapons. However, he conditioned progress on US “practical actions.” The regime tied the idea of denuclearization in the past to changes in diplomatic ties, economic sanctions, and military activities.

 In Singapore in June 2018, Kim said he sought the “complete denuclearization of the Korean Peninsula”—a formulation linked to past demands that include an end to US military deployments and exercises involving advanced US capabilities.

 We continue to observe activity inconsistent with full denuclearization. North Korea has underscored its commitment to nuclear arms for years, including through an order to mass- produce weapons in 2018 and an earlier law—and constitutional change—that affirmed the country’s nuclear status.

Foreign Engagement North Korea will continue its efforts to mitigate the effects of the US-led pressure campaign, most notably through diplomatic engagement, counterpressure against the sanctions regime, and direct sanctions evasion.

 Kim Jong Un has sought sanctions relief through a campaign of diplomatic engagement that included his first summits with foreign leaders since taking power in 2011. He met with South Korean President Moon Jae-in three times in 2018, leading to agreements to reconnect roads

27

and rail lines, establish new military parameters, promote reforestation, and facilitate cultural exchanges.

 Kim has also sought to align the region against the US-led pressure campaign in order to gain incremental sanctions relief, and North Korean statements have repeatedly indicated that some sanctions relief is necessary for additional diplomacy to occur. In his annual New Year’s address, Kim linked US sanctions to diplomatic progress and threatened to resume nuclear and missile testing.

Sanctions Evasion We assess that sanctions continue to pressure the North Korean regime, despite North Korean sanctions evasion efforts. By late 2018, the enforcement of new UN sanctions had led to a precipitous decline in North Korea’s monthly export revenue compared with 2017, a change that also reduced imports.

 North Korea generates revenue through overseas labor, cyber-theft operations, and illicit commercial exports of UN Security Council-prohibited goods.

 Throughout 2018, the United States and its allies observed North Korean maritime vessels using at-sea, ship-to-ship transfers of petroleum from third-country tankers to acquire additional refined petroleum as a way to mitigate the effects of UNSC sanctions.

Conventional Military Capabilities North Korea’s conventional capabilities continue to pose a threat to South Korea, Japan, and US forces in the region. As a way to offset adversary military advantages, Kim Jong Un continues to pursue advanced conventional weapon programs and capabilities, including more accurate artillery and ballistic missile strike capabilities and UAVs.

Southeast Asia and the Pacific We expect democracy and civil liberties in many Southeast Asian countries to remain fragile and China to increase its engagement in the region to build its influence while diminishing the influence of the United States and US allies. Russia may also continue its diplomatic and military cultivation of Southeast Asian partners, and some countries will be receptive to Moscow as a balance against China’s push for hegemony.

 In the wake of Washington’s withdrawal from the Trans-Pacific Partnership, China is promoting a unified stance with the Association of Southeast Asian Nations (ASEAN) in defense of multilateralism and the WTO reform process, while also fostering a shared perception of US freedom of navigation operations through Chinese-claimed waters in the South China Sea as threats to regional stability.

 China is currying favor with numerous Pacific Island nations through bribery, infrastructure investments, and diplomatic engagement with local leaders while intervening in Burma— including by shielding Burma from UNSC sanctions in response to the humanitarian crisis and alleged ethnic cleansing in Rakhine State.

28

 Russia, too, has been increasing its diplomatic and military cultivation of Southeast Asian partners, some of which have been receptive to Moscow as a power capable of diluting China’s nascent hegemony and helping them diversify their hedging options.

 Cambodia’s slide toward autocracy, which culminated in the Cambodian People’s Party’s retention of power and complete dominance of the national legislature, opens the way for a constitutional amendment that could lead to a Chinese military presence in the country. Thailand’s coup-installed regime has promised elections in 2019 but appears set to help ensure that its proxy party retains power by tightly controlling the political space ahead of the vote. Burma’s civilian authorities continue to make scant progress toward resolving the crisis in Rakhine State, advancing economic reforms, or ending longstanding insurgencies by ethnic minority groups. MIDDLE EAST AND NORTH AFRICA

Political turmoil, economic fragility, and civil and proxy wars are likely to characterize the Middle East and North Africa in the coming year, as the region undergoes a realignment of the balance of regional power, wealth and resource management, and the relationships among governments, nonstate political groups, and wider populations.

Iran Iran’s regional ambitions and improved military capabilities almost certainly will threaten US interests in the coming year, driven by Tehran’s perception of increasing US, Saudi, and Israeli hostility, as well as continuing border insecurity, and the influence of hardliners.

Iran’s Objectives in Iraq, Syria, and Yemen We assess that Iran will attempt to translate battlefield gains in Iraq and Syria into long-term political, security, social, and economic influence while continuing to press Saudi Arabia and the UAE by supporting the Huthis in Yemen.

In Iraq, Iran-supported Popular Mobilization Committee-affiliated Shia militias remain the primary threat to US personnel, and we expect that threat to increase as the threat ISIS poses to the militias recedes, Iraqi Government formation concludes, some Iran-backed groups call for the United States to withdraw, and tension between Iran and the United States grows. We continue to watch for signs that the regime might direct its proxies and partners in Iraq to attack US interests.

Iran’s efforts to consolidate its influence in Syria and arm Hizballah have prompted Israeli airstrikes as recently as January 2019 against Iranian positions within Syria and underscore our growing concern about the long-term trajectory of Iranian influence in the region and the risk that conflict will escalate.

 Iran’s retaliatory missile and UAV strikes on ISIS targets in Syria following the attack on an Iranian military parade in Ahvaz in September were most likely intended to send a message to potential adversaries, showing Tehran’s resolve to retaliate when attacked and demonstrating Iran’s improving military capabilities and ability to project force.

 Iran continues to pursue permanent military bases and economic deals in Syria and probably wants to maintain a network of Shia foreign fighters there despite Israeli attacks on Iranian

29

positions in Syria. We assess that Iran seeks to avoid a major armed conflict with Israel. However, Israeli strikes that result in Iranian casualties increase the likelihood of Iranian conventional retaliation against Israel, judging from Syrian-based Iranian forces’ firing of rockets into the Golan Heights in May 2018 following an Israeli attack the previous month on Iranians at Tiyas Airbase in Syria.

In Yemen, Iran’s support to the Huthis, including supplying ballistic missiles, risks escalating the conflict and poses a serious threat to US partners and interests in the region. Iran continues to provide support that enables Huthi attacks against shipping near the Bab el Mandeb Strait and land-based targets deep inside Saudi Arabia and the UAE, using ballistic missiles and UAVs.

Domestic Politics Regime hardliners will be more emboldened to challenge rival centrists by undermining their domestic reform efforts and pushing a more confrontational posture toward the United States and its allies. Centrist President Hasan Ruhani has garnered praise from hardliners with his more hostile posture toward Washington but will still struggle to address ongoing popular discontent.

Nationwide protests, mostly focused on economic grievances, have continued to draw attention to the need for major economic reforms and unmet expectations for most Iranians. We expect more unrest in the months ahead, although the protests are likely to remain uncoordinated and lacking central leadership or broad support from major ethnic and political groups. We assess that Tehran is prepared to take more aggressive security measures in response to renewed unrest while preferring to use nonlethal force.

 Ruhani’s ability to reform the economy remains limited, given pervasive corruption, a weak banking sector, and a business climate that discourages foreign investment and trade.

Military Modernization and Behavior Iran will continue to develop military capabilities that threaten US forces and US allies in the region. It also may increase harassment of US and allied warships and merchant vessels in the Persian Gulf, Strait of Hormuz, and Gulf of Oman.

 Iran continues to develop, improve, and field a range of military capabilities that enable it to target US and allied military assets in the region and disrupt traffic through the Strait of Hormuz. These systems include ballistic missiles, unmanned explosive boats, naval mines, submarines and advanced torpedoes, armed and attack UAVs, antiship and land-attack cruise missiles, antiship ballistic missiles, and air defenses. Iran has the largest ballistic missile force in the Middle East and can strike targets as far as 2,000 kilometers from Iran’s borders. Russia’s delivery of the SA-20c SAM system in 2016 provided Iran with its most advanced long-range air defense system. Iran is also domestically producing medium-range SAM systems and developing a long-range SAM.

 In September 2018, Iran struck Kurdish groups in Iraq and ISIS in Syria with ballistic missiles in response to attacks inside Iran, demonstrating the increasing precision of Iran’s missiles, as well as Iran’s ability to use UAVs in conjunction with ballistic missiles.

30

 We assess that unprofessional interactions conducted by the Iranian Islamic Revolutionary Guards Corps (IRGC) Navy against US ships in the Persian Gulf, which have been less frequent during the past year, could resume should Iran seek to project an image of strength in response to US pressure. Most IRGC interactions with US ships are professional, but in recent years the IRGC Navy has challenged US ships in the Persian Gulf and flown UAVs close to US aircraft carriers during flight operations. Moreover, Iranian leaders since July have threatened to close the Strait of Hormuz in response to US sanctions targeting Iranian oil exports.

Saudi Arabia Saudi Crown Prince Muhammad bin Salman continues to control the key levers of power in Saudi Arabia, but his simultaneous push for economic and social reform creates potential flashpoints for internal opposition. Saudi public support for the royal family appears to remain high, even in the wake of the murder of journalist Jamal Khashoggi. Moreover, we assess that the Saudi Government remains well positioned to stifle small-scale protests and discontent; it has preemptively arrested or forcibly detained clerics, business leaders, and civil society activists who could be nodes for discontent.

The Kingdom will seek to make progress on its Vision 2030 plan of structural reforms, spearheaded by Crown Prince Muhammad bin Salman and aimed at reducing dependence on oil revenues. The plan’s initiatives include reducing subsidies, building a robust private sector, and instituting taxes, all of which upend the longstanding social contract. Some of these reforms have aggravated segments of the Saudi public, including government workers religious conservatives.

Iraq Iraq is facing an increasingly disenchanted public. The underlying political and economic factors that facilitated the rise of ISIS persist, and Iraqi Shia militias’ attempts to further entrench their role in the state increase the threat to US personnel.

 The Iraqi Government will confront a high level of societal discontent, institutional weakness, and deep-seated divisions, as well as protests over a lack of services, high unemployment, and political corruption. Baghdad lacks the resources or institutional capacity to address longstanding economic development and basic services challenges, and it faces reconstruction costs in the aftermath of the counter-ISIS campaign, estimated by the World Bank at $88 billion. Iraq’s Kurdistan region is still dealing with political discontent over economic and territorial losses to Baghdad last year.

 ISIS remains a terrorist and insurgent threat and will seek to exploit Sunni grievances with Baghdad and societal instability to eventually regain Iraqi territory against Iraqi security forces that are stretched thin.

31

Iraqi Shia militants conducted several attacks against US diplomatic facilities in Iraq in September and December 2018. Militias—some of which are also part of the Iraqi Government Popular Mobilization Committee—plan to use newfound political power gained through positions in the new government to reduce or remove the US military presence while competing with the Iraqi security forces for state resources.

Syria As the Syrian regime consolidates control, the country is likely to experience continued violence. We expect the regime to focus on taking control of the remaining rebel-held territory and reestablishing control of eastern Syria, consolidating gains, rebuilding regime-loyal areas, and increasing its diplomatic ties through 2019 while seeking to avoid conflicts with Israel and Turkey. Russia and Iran probably will attempt to further entrench themselves in Syria.

 The regime’s momentum, combined with continued support from Russia and Iran, almost certainly has given Syrian President Bashar al-Asad little incentive to make anything more than token concessions to the opposition or to adhere to UN resolutions on constitutional changes that Asad perceives would hurt his regime.

 Opposition groups, which rely on Turkey for continued support, probably are not capable of repelling a regime military operation to retake Idlib Province but may retain enough resources to foment a low-level insurgency in areas the regime recaptures in the coming year.

 The regime probably will focus increasingly on reasserting control over Kurdish-held areas. Damascus probably will seek to exploit any security vacuum and Turkish pressure on the Kurds in order to strike a favorable deal with the Kurds while also seeking to limit Turkey’s presence and influence in Syria and reclaim territory in northwestern Syria held by Turkey.

 The regime is unlikely to immediately focus on clearing ISIS from remote areas that do not threaten key military, economic, and transportation infrastructure, judging from previous regime counter-ISIS efforts.

 Damage to the Syrian economy and its infrastructure has reached almost $400 billion, according to UN estimates, and reconstruction could take at least a decade to complete. The effects of the Syrian civil war will continue to be felt by its neighbors, with approximately 5.6 million Syrian refugees registered in neighboring countries as of October 2018. Russia and Iran will try to secure rights to postwar contracts to rebuild Syria’s battered infrastructure and industry in exchange for sustained military and economic support.

32

Yemen The Huthi movement in Yemen and the Saudi-led coalition, which supports the Yemeni Government, remain far apart in negotiating an end to the conflict, and neither side seems prepared for the kind of compromise needed to end the fighting, suggesting the humanitarian crisis will continue. The coalition, buoyed by military gains in the past year, seems fixed on a Huthi withdrawal from Sanaa and significant Huthi disarmament. These terms remain unacceptable to the Huthis, who believe they can use external attacks to threaten Saudi Arabia and the UAE, undercut Saudi and UAE public support for the conflict, and draw international condemnation of the coalition’s intervention in Yemen.

33

 The humanitarian impacts of the conflict in Yemen—including, famine, disease, and internal displacement—will be acute in 2019 and could easily worsen if the coalition cuts key supply lines to Sanaa. The fighting has left more than 22 million people, or approximately 75 percent of the population, in need of assistance, with millions of people at severe risk of famine by the UN definition—numbers that are likely to rise quickly if disruptions to aid access continue.

Libya Libya is poised to remain unstable into 2019, with poor prospects for reconciliation between competing factions and ongoing threats from ISIS-Libya. Militias aligned with Libya’s key political factions fight intermittently for influence and control of resources, resulting in a high-risk security environment that threatens both rival governments and Western interests. The UN-backed, Tripoli-based Government of National Accord (GNA) and eastern-based House of Representatives (House) remain unable to agree on key posts and government structure. ISIS-Libya’s capabilities have been degraded, but it is still capable of conducting attacks on local and Western targets in Libya and possibly elsewhere in the region.

34

SOUTH ASIA

The challenges facing South Asian states will grow in 2019 because of Afghanistan’s presidential election in mid-July and the Taliban’s large-scale attacks, Pakistan’s recalcitrance in dealing with militant groups, and Indian elections that risk communal violence.

Afghanistan Stalemate We assess that neither the Afghan Government nor the Taliban will be able to gain a strategic military advantage in the Afghan war in the coming year if coalition support remains at current levels. Afghan forces generally have secured cities and other government strongholds, but the Taliban has increased large-scale attacks, and Afghan security suffers from a large number of forces being tied down in defensive missions, mobility shortfalls, and a lack of reliable forces to hold recaptured territory.

Pakistan Recalcitrance Militant groups supported by Pakistan will continue to take advantage of their safe haven in Pakistan to plan and conduct attacks in India and Afghanistan, including against US interests. Islamabad’s narrow approach to counterterrorism cooperation—using some groups as policy tools and confronting only the militant groups that directly threaten Pakistan—almost certainly will frustrate US counterterrorism efforts against the Taliban.

Indian Elections and Ethnic Tensions Parliamentary elections in India increase the possibility of communal violence if Indian Prime Minister Narendra Modi’s Bharatiya Janata Party (BJP) stresses Hindu nationalist themes. BJP policies during Modi’s first term have deepened communal tensions in some BJP-governed states, and Hindu nationalist state leaders might view a Hindu-nationalist campaign as a signal to incite low-level violence to animate their supporters. Increasing communal clashes could alienate Indian Muslims and allow Islamist terrorist groups in India to expand their influence.

India-Pakistan Tensions We judge that cross-border terrorism, firing across the Line of Control (LoC), divisive national elections in India, and Islamabad’s perception of its position with the United States relative to India will contribute to strained India-Pakistan relations at least through May 2019, the deadline for the Indian election, and probably beyond. Despite limited confidence-building measures—such as both countries recommitting in May 2018 to the 2003 cease-fire along the disputed Kashmir border—continued terrorist attacks and cross-border firing in Kashmir have hardened each country’s position and reduced their political will to seek rapprochement. Political maneuvering resulting from the Indian national elections probably will further constrain near-term opportunities for improving ties.

India-China Tensions We expect relations between India and China to remain tense, despite efforts on both sides to manage tensions since the border standoff in 2017, elevating the risk of unintentional escalation. Chinese President Xi Jinping and Indian Prime Minister Narendra Modi held an informal summit in April 2018 to defuse tension and normalize relations, but they did not address border issues. Misperceptions of military movements or construction might result in tensions escalating into armed conflict.

35

RUSSIA AND EURASIA

Russian President Vladimir Putin has the tools to navigate challenges to his rule, and he is likely to sustain an assertive, opportunistic foreign policy to advance Russia’s interests beyond its borders and contest US influence.

Russia’s Domestic Politics The Russian economy’s slow growth and most Russians’ disapproval of government officials’ performance will foster a more challenging political environment for the Kremlin, although its centralized power structure and the resonance of anti-American themes will buoy Putin, sustaining his push for international stature and challenging US global leadership.

We assess that slow growth and depressed wages are eroding the higher living standards that many Russians once saw as Putin’s greatest accomplishment, and corruption is a major issue that Putin cannot attack because his political system rests on it. Following his support for an unpopular pension reform in 2018, Putin’s public approval fell to levels not seen since before Russia’s illegal annexation of Crimea in 2014. Nevertheless, the Kremlin can rely on its traditional instruments of persuasion to navigate challenges to Putin’s control—including the media and the distribution of financial benefits—and it can turn to its security services to impede protests, crack down on the opposition, and intimidate elites.

Although we judge that Putin and other elites would like to see cooperation with the United States where US and Russian interests overlap, they view publicly blaming the United States for internal challenges as good politics. Moscow believes it can weather the impact of sanctions, and we expect Putin to remain active on the international stage because the public narrative that he has restored Russia’s great-power status remains a pillar of his domestic support.

36

Global Ambitions Russia’s efforts to expand its global military, commercial, and energy footprint and build partnerships with US allies and adversaries alike are likely to pose increasing challenges. Moscow will continue to emphasize its strategic relationship with Beijing, while also pursuing a higher profile in the Middle East, Southeast Asia, Africa, and Latin America.

We assess that Moscow will continue pursuing a range of objectives to expand its reach, including undermining the US-led liberal international order, dividing Western political and security institutions, demonstrating Russia’s ability to shape global issues, and bolstering Putin’s domestic legitimacy. Russia seeks to capitalize on perceptions of US retrenchment and power vacuums, which it views the United States is unwilling or unable to fill, by pursuing relatively low-cost options, including influence campaigns, cyber tools, and limited military interventions.

 We assess that Moscow has heightened confidence, based on its success in helping restore the Asad regime’s territorial control in Syria, but translating what have largely been military wins into a workable settlement in Syria will be one of Moscow’s key challenges in the years ahead.

 Russia seeks to boost its military presence and political influence in the Mediterranean and Red Seas, increase its arms sales, expand information operations in Europe, and mediate conflicts, including engaging in the Middle East Peace Process and Afghanistan reconciliation.

Military Capabilities Moscow views military force as key to safeguarding its vital interests and supporting its foreign policy; it is becoming more modernized and capable across all military domains and maintains the world’s largest operational nuclear stockpile.

 After decades of increased spending to support modernization, Russia’s defense budget is decreasing to about 3.8 percent of GDP in 2019, from a peak of about 5.4 percent in 2016. Because of momentum in military acquisitions, we judge that the budget is normalizing to pre- peak spending levels.

37

 In 2019, we assess that Russia will continue to modernize the entire military but particularly will make progress in its air defense, submarine, and electronic warfare capabilities.

Russia and Its Neighbors The Kremlin will seek to maintain and, where possible, expand its influence throughout the former Soviet Union countries, which it asserts are within its sphere of influence.

We assess that a major offensive by either Ukraine or Russian proxy forces is operationally feasible but unlikely in 2019, unless one side perceives the other is seriously challenging the status quo. Bilateral tensions will continue to rise in the Black and Azov Seas as each side asserts its sovereignty and naval capabilities. Russia will continue its military, political, and economic destabilization campaign against Ukraine to try to stymie Kyiv’s efforts to integrate with the EU and strengthen ties to NATO. Russia’s interception of Ukrainian ships in the Kerch Strait and detention of the ships’ sailors in November 2018 demonstrates Russia’s willingness to limit Ukrainian freedom of navigation in the area and exert political pressure on the country’s leadership, particularly in advance of Ukraine’s elections this year.

 Ukraine will hold a presidential election in March 2019 and legislative elections in the fall. The large field of presidential candidates, high levels of distrust in political elites, and lack of a clear frontrunner may provide Ukrainian President Petro Poroshenko’s rivals, as well as lesser known candidates and political newcomers, an opportunity to appeal to the largely undecided Ukrainian electorate.

 Russia is taking steps to influence these elections, applying a range of tools to exert influence and exploit Kyiv’s fragile economy, widespread corruption, cyber vulnerabilities, and public discontent in hopes of ousting Poroshenko and bringing to power a less anti-Russia parliament.

The ruling coalition of Moldova, Ukaraine’s neighbor, is focused on maintaining power in the legislative election planned for February 2019 and probably will seek to limit Russian influence and preserve a veneer of commitment to EU integration.

Tension between Armenia and Azerbaijan over the Nagorno-Karabakh region remains a potential source for a large-scale military conflict that might draw in Russia.

Russia will continue pressing Central Asia’s leaders to support Russian-led economic and security initiatives and reduce engagement with Washington. At the same time, China probably will continue to expand its outreach to Central Asia, largely to promote economic initiatives because of Beijing’s concern that regional instability could undermine China’s economic interests and create a permissive environment for extremists. Uzbekistan’s political opening under President Shavkat Mirziyoyev will improve prospects for intraregional cooperation, but poor governance and vulnerable economics will raise the risk of radicalization. EUROPE

The United Kingdom’s scheduled exit from the EU on 29 March 2019, European Parliament elections in late May, and the subsequent turnover in EU institutional leadership will limit the ability of EU and

38

national leaders to contend with increased Russian and Chinese efforts to divide them from one another and from the United States.

 If the United Kingdom’s exit from the EU takes place as scheduled, it would remove one of the institution’s key voices for strong sanctions policy toward Russia and market liberalism, as well as one of its most capable foreign and security policy actors.

 Russia and China are likely to intensify efforts to build influence in Europe at the expense of US interests, benefiting from the economic fragility of some countries, transatlantic disagreements, and a probable strong showing by anti-establishment parties in the European Parliament elections in late May 2019. Some member states favor a softening of Russian sanctions and probably will resist efforts to tighten investment screening.

Turkey Turkey’s regional ambitions, a distrust of the United States, and the growing authoritarianism of Turkey’s leaders are complicating bilateral relations and making Ankara more willing to challenge US regional goals. Turkey will continue to view as existential threats the Kurdistan Workers’ Party (PKK), including its People’s Protection Units (YPG) militia in Syria, and the movement led by Fethullah Gulen (USPER), a former AKP ally who Turkish leaders claim is responsible for the failed coup of 2016.

Balkans

The Western Balkans almost certainly will remain at some risk of low-level violence and possibly open military conflict throughout 2019. Russia will seek to exploit ethnic tensions and high levels of corruption to hinder the ability of countries in this region to move toward the EU and NATO. AFRICA

Several countries and regions in Sub-Saharan Africa are likely to face significant security, counterterrorism, democratization, economic, and humanitarian challenges. Recent political unrest in countries such as Zimbabwe and Sudan highlight the ongoing challenges facing many governments across the continent. African countries’ outreach and cooperation with external actors—such as China and Russia—will increase this year.

The Sahel Countries in the Sahel—particularly Chad, Burkina Faso, Mali, Mauritania, and Niger—almost certainly will be vulnerable to an increase in terrorist attacks in 2019 as they struggle to contain terrorist groups and improve governance and security. Al-Qa‘ida-affiliated Jama’at Nusrat al-Islam wal-Muslimin (JNIM)

39 and its extremist allies present a growing threat, with attacks increasing during the past year. Implementation of Mali’s peace accord—an essential step for extending governance into terrorist safe havens in northern and central Mali—probably will be difficult because remaining steps are politically and financially sensitive.

Nigeria Nigeria, Africa’s most populous country and the largest economy, probably will face a contentious presidential election in February 2019 and sustained attacks from Boko Haram and ISIS-West Africa (ISIS-WA). Abuja is also facing continued violence in the politically sensitive Middle Belt region. .

Sudan and South Sudan Violence and the humanitarian crisis in South Sudan are likely to persist this year, while Sudan probably wants to improve relations with the United States but will continue reaching out to other partners to boost its economy. In South Sudan, the peace agreement signed between the government and opposition groups in September 2017 faces delays and implementation difficulties. Acute food insecurity and constraints on aid access—resulting from poor infrastructure, seasonal rains, active hostilities, and government- and opposition-imposed impediments—are likely to contribute to an ongoing humanitarian crisis. Meanwhile, Khartoum, despite facing antigovernment protests over its poor economic situation, is committed to pursuing efforts to improve its relationship with the United States and wants to be removed from the US State Sponsors of Terrorism List. Sudan also will strengthen ties to other partners—including Russia and Turkey—in an effort to diversify its partnerships and improve its economic situation.

Horn of Africa The states of East Africa will confront internal tension and a continuing threat from al-Shabaab, despite improved intergovernmental relations and Ethiopian-Eritrean rapprochement. Elite competition, corruption, and poor coordination among security services in Somalia will hamper efforts to tamp down violence. The African Union Mission in Somalia (AMISOM) is unlikely to engage in aggressive offensive operations against al-Shabaab in advance of the mission’s scheduled withdrawal from Somalia by 2021. Ethiopia and Eritrea will struggle to balance political control with demands for reform from domestic constituencies.

Central Africa Political unrest across Central Africa is likely to persist through 2019, compounding humanitarian challenges and armed conflict. The Democratic Republic of the Congo (DRC) is recovering from its contentious presidential election in December 2018, as well as dealing with an ongoing Ebola outbreak and internal displacement crisis. Meanwhile, violence among armed groups in several regions of the DRC threatens regional and national stability, and violence in eastern DRC impedes efforts to respond to the Ebola outbreak. The Central African Republic (CAR) is struggling to make progress toward a peace agreement between the government and multiple armed groups. THE WESTERN HEMISPHERE

Flagging economies, migration flows, corruption, narcotics trafficking, and anti-US autocrats will present continuing challenges to US interests, as US adversaries and strategic competitors seek greater influence in the region. The hemisphere will see several presidential elections this year, including in Argentina,

40

Bolivia, El Salvador, Guatemala, Panama, and Uruguay, providing opportunities for outside candidates to exploit public frustration with stagnant economic growth, high crime, and corruption. China and Russia will pursue efforts to gain economic and security influence in the region.

Mexico Newly inaugurated Mexican President Andres Manuel Lopez Obrador almost certainly will focus on meeting steep public expectations for improvements on anticorruption and security following his landslide electoral victory in July. He is likely to pursue mostly practical approaches to US cooperation that complement his ambitious domestic agenda. Lopez Obrador has promised to reduce violence, in part by addressing socioeconomic causes, but he has publicly conceded that Mexico’s military must keep up its public security role in the near term, despite his initial preference to end it. Lopez Obrador has supported the US-Mexico-Canada Agreement (USMCA) trade deal, probably hoping to reduce trade-related uncertainty, allowing him to focus on his domestic economic agenda. However, Mexico’s $1.15 trillion economy remains vulnerable to investor uncertainty that could weaken the export sector and slow economic growth, which was just 2 percent in 2017. Declining oil revenue will limit the Mexican Government’s ability to fund Lopez Obrador’s ambitious social programs and infrastructure projects.

Central America We assess that high crime rates and weak job markets will spur additional US-bound migrants from the Northern Triangle—El Salvador, Guatemala, and Honduras—while a political crackdown in Nicaragua dims that country’s already bleak economic outlook. Illicit migration northward from the region shows no signs of abating, despite increased messaging by governments to dissuade potential migrants and stepped-up immigration enforcement by Mexico. Many migrants apparently perceive that traveling in caravans on the journey north affords a certain level of security, and the decision to do so appears to result from a combination of individual motivation, encouragement from social media postings, and politically motivated efforts by some individuals and organizations.

 Nicaraguan President Daniel Ortega’s refusal to heed calls for negotiation amid his political crackdown, which has left more than 300 people dead and contributed to allegations of human rights abuses, threatens to deepen a recession in one of the region’s weakest economies.

41 Venezuela Although the regime of Nicolas Maduro will continue to try to maintain power, he is facing persistent opposition. Falling oil production, economic mismanagement, and legal challenges almost certainly will compound the worsening economic pressure on the country. Living standards have collapsed, and hyperinflation and shortages in basic goods have gripped the country. Since 2014, the UN International Organization for Migration estimates that 2-3 million Venezuelans have left the country. Maduro continues to crack down on the political and military opposition after a failed assassination attempt against him in August 2018 and disrupted coup plots in the past 12 months, but the opposition has shown resilience, as indicated by its challenge to Maduro’s rule emerging in late January 2019.

Colombia Colombian President Ivan Duque faces a fraying peace accord with the former Revolutionary Armed Forces of Colombia (FARC) while he is working to stem violence in Colombia’s rural departments, carry out his coca eradication ambitions, and manage growing tensions with Caracas. Duque has ordered increased security operations to curb common crime, threats from Colombia’s insurgent and criminal groups, and address coca cultivation and trafficking. Coca cultivation in Colombia was at a record 209,000 hectares in 2017, and crop substitution and eradication programs face coordination challenges and local resistance.

Cuba Cuban President Miguel Diaz-Canel will adhere to former President Raul Castro’s blueprint for institutionalizing one-party rule and socialism in Cuba through constitutional reforms. Diaz-Canel has acknowledged that Raul Castro, who still commands the ruling Communist Party, remains the dominant voice on public policy.

42 OPERATIONALIZE CYBERSECURITY COLLABORATION WITH THE PRIVATE SECTOR

STRATEGIC OBJECTIVE #1: IMPROVE GOVERNMENT SUPPORT TO PRIVATE-SECTOR OPERATIONS

The U.S. government should improve government support to private-sector cyber defensive operations. However, the federal government has limited resources and capabilities, and should prioritize the defense of systemically important critical infrastructure—the critical infrastructure entities that manage systems and assets whose disruption could have cascading, destabilizing effects on U.S. national security, economic security, or public health and safety. While the U.S. government has taken steps to assist these high-risk entities through Section 9 of Executive Order 13636, that effort falls short of codifying or fully implementing the social contract of shared responsibility and partnership in cybersecurity—and it also does not empower the U.S. government with the resources and authorities necessary to defend them.

Key Recommendation 5.1 Congress should codify the concept of “systemically important critical infrastructure,” whereby entities responsible for systems and assets that underpin national critical functions are ensured the full support of the U.S. government and shoulder additional security requirements consistent with their unique status and importance.

Through Section 9 of Executive Order 13636, the attacks and in recognition of their unique national Obama administration took vital steps to recognize that security importance—and the public good they provide. not all critical infrastructure is of equal importance to While Section 9 of Executive Order 13636 recognizes the preservation of public health and safety, economic this relationship and acknowledges the social contract security, or national security.291 The systemically import- that underlies it, it does not endow the U.S. government ant critical infrastructure (SICI) entities, and their most with any new requirements, resources, or authorities to vital systems and assets, are focal points of leverage for support SICI; nor does Section 9 designation place any nation-state adversaries, allowing them to scale up the additional expectations on the entities that receive it. effects of cyber campaigns and thus the risk they can pose to the United States in peacetime and in crisis.292 Both To address this gap, Congress should codify into law the the private sector and the U.S. government have a vested concept of “systemically important critical infrastruc- interest in protecting these systems and assets and have ture,” whereby entities responsible for systemically critical unique responsibilities for their security and resilience. systems and assets are granted special assistance from the The U.S. government must be assured that these com- U.S. government and shoulder additional security and panies are taking their security responsibilities seriously, information-sharing requirements befitting their unique honoring the public trust that appertains to the services status and importance. While these entities are ulti- and functions they provide, and participating in fully mately responsible for the defense and security of their collaborative joint security efforts. Private-sector entities networks, the U.S. government can and should bring to should likewise trust that the U.S. government is fully bear its unique authorities, resources, and intelligence leveraging its unique authorities and resources to support capabilities to support these entities in their defense— their security operations, both in fulfillment of its respon- and assume greater responsibility in instances in which sibility to defend against and respond to nation-state they are directly threatened by nation-states, designated

Cyberspace Solarium Commission 97 PILLARS AND KEY RECOMMENDATIONS

transnational criminal groups, or terrorist organizations. Government Program Requirements: Congress should Separate, distinct designation and requirements should direct the executive branch to define government pro- be established for sectors that have a unique relation- grams in which entities designated as systemically import- ship with the federal government, such as the Defense ant critical infrastructure would be required to participate Industrial Base. as a consequence of their designation; this list should be updated regularly. These programs should include federal Identification and Designation:Congress should direct the government information-sharing programs, national risk executive branch, through the Department of Homeland identification and assessment efforts, and other relevant Security (DHS) and in consultation with the appropriate federal programs meant to assist the private sector in sector-specific agencies, to develop a process to identify cyber defense and security. key systems and assets underpinning certain critical functions and designate the entities responsible for their Security Certification:Congress should direct the exec- management, operations, and security as “systemically utive branch to develop a “Security Certification” for important critical infrastructure.” These designations systemically important critical infrastructure and a should be reviewed and updated as part of the regularly mechanism, devised in consultation with the private occurring National Risk Management Cycle led by DHS sector, for SICI entities to certify their compliance on a (recommendation 3.2.2). Designated entities should be consistent basis. DHS and the Department of Defense codified in an unclassified determination issued by the (DoD), in coordination with sector-specific agencies, President, while the specific systems and assets that led to should establish common and sector-specific standards the designation should be classified. and expectations for the governance and execution of security operations for this certification. In establishing In defining the critical functions by which to designate these certifications, the executive branch should seek to systemically important critical infrastructure, the U.S. gov- reduce redundancy and regulatory burden by looking ernment should focus on national critical functions that: to existing regulatory requirements or existing security • Directly support or underpin national security regimes rather than establishing new ones. programs or government or military operations. • Constitute essential economic functions or underpin Prioritized Federal Assistance: The executive branch the national distribution of goods and services. should define a process by which designated entities can, • Support or underpin public health and safety or are through DHS, request expedited federal assistance in so foundational that their disruption could endanger instances when they have been compromised or attacked human life on a massive scale. by a malicious cyber actor. This process should define the information required to submit a request, the timeline Insulation from Liability: Entities designated as systemi- for response, and the criteria used by federal departments cally important critical infrastructure would be shielded and agencies to evaluate and approve requests. from liability in instances when covered systems and assets are targeted, attacked, compromised, or disrupted Indications and Warning and Intelligence Support: through a cyberattack by a nation-state, designated Congress should explicitly establish in law that sharing transnational criminal group, or terrorist organization. To intelligence with U.S.-owned entities designated as SICI qualify, designated entities would need to have demon- does not constitute unlawful favoring of one entity strated good-faith compliance with all requirements set as over another. In addition, Congress should direct the a consequence of their designation. executive branch to define mechanisms and procedures,

98 Cyberspace Solarium Commission OPERATIONALIZE CYBERSECURITY COLLABORATION WITH THE PRIVATE SECTOR

through DHS and the Office of the Director of National identify and address key limitations in the ability of the Intelligence and in consultation with sector-specific intelligence community to provide intelligence support agencies, for enhanced collaboration among designated to the private sector. The executive branch should report entities, sector-specific agencies, and the U.S. intelligence its findings to Congress upon conclusion of its review, community. which should include specific recommendations or plans to address challenges identified in the report. The Enabling Recommendations review should: 5.1.1 Review and Update Intelligence • Examine U.S. foreign intelligence surveillance Authorities to Increase Intelligence Support authorities to identify and address limitations in to the Broader Private Sector collection for cyber defense missions supporting The U.S. intelligence community is not currently private-sector stakeholders. resourced to fully support the private sector in cyber • Review policies to identify limitations in the intelli- defense and security. While the intelligence commu- gence community’s ability to share threat intelligence nity is formidable in informing security operations in information with the private sector, including instances when the U.S. government is the defender, it accounting for instances when national security lacks appropriate policies and processes to do so when outweighs concerns over preferential treatment. primary responsibility falls outside of the U.S. gov- • Review downgrade and declassification procedures ernment. Intelligence policies and procedures remain for cyber threat intelligence to improve the speed and outdated; they have not been sufficiently modernized timeliness of its release; consider defining criteria and to account for the unique challenges of cyberspace or procedures for expedited declassification and release the flexibility and ingenuity of malicious foreign actors. of certain types of intelligence. As a result, the intelligence community continues to be • Examine current and projected mission require- significantly limited in its ability to maintain awareness ments of the National Security Agency’s (NSA) of evolving cyber threats and provide warning to U.S. Cybersecurity Directorate, identify current funding entities when they are being targeted. While codify- gaps, and recommend budgetary changes needed to ing systemically important critical infrastructure will ensure that NSA meets expectations for increased ensure stronger intelligence support and indications support to the nation’s cybersecurity effort. and warning for the most critical systems and assets, • Review cyber-related information-sharing consent the intelligence community will still be limited in its processes, including consent to monitor agreements, ability to support critical infrastructure that falls outside and assess gaps and opportunities for greater stan- of that designation. Thus the U.S. government must dardization and simplification while ensuring privacy address more general limitations in its ability to provide and civil liberty protections. intelligence support to all private sector stakeholders • Review existing statutes governing “national security and associated organizations, such as information systems”—including National Security Directive 42, sharing and analysis centers (ISACs) and the Financial which establishes executive policy on the security of Systemic Analysis and Resilience Center (FSARC). national security telecommunications and informa- tion systems—and assess their ability to provide the To that end, Congress should direct the executive National Security Agency with sufficient authority to branch to conduct a six-month comprehensive review conduct its mission in protecting systems and assets of intelligence policies, procedures, and resources to that are critical to national security.

Cyberspace Solarium Commission 99 PILLARS AND KEY RECOMMENDATIONS

5.1.2 Strengthen and Codify Processes • Run parallel with and be tied to National Risk for Identifying Broader Private-Sector Management Cycle (recommendation 3.1.1) pro- Cybersecurity Intelligence Needs and cesses for risk identification and assessment, as the Priorities same information that informs sector-specific and Understanding the intelligence needs and gaps of pri- cross-sector risk can be used to guide U.S. intelli- vate-sector entities is critical in ensuring that the U.S. gov- gence efforts to provide indications and warnings ernment is able to provide focused, actionable intelligence and more focused intelligence. in support of their cybersecurity operations. While the • Empower sector-specific agencies and make them preceding recommendations focus on removing barriers to accountable to work with their sectors, including or limitations in the collection or production of intelli- sector-coordinating councils and ISACs, to identify gence and its distribution to the private sector, they will specific critical lines of businesses, technologies, and be fundamentally hindered if the U.S. government lacks processes and work directly with the intelligence the processes to best serve the private sector and answer community to convey specific details. its security requirements. However, existing processes to • Codify legal protections for the types of information solicit private-sector input into U.S. intelligence needs that would be routinely shared as part of this process, and collection requirements are inconsistent, too narrow ensuring that such information is protected and in scope, and lack sufficient detail. For instance, existing insulated from public disclosure. processes compile self-identified intelligence gaps but do not account for common vulnerabilities, such as common 5.1.3 Empower Departments and Agencies technology or third-party services, that would be targeted to Serve Administrative Subpoenas in by an intelligent nation-state adversary. This information, Support of Threat and Asset Response if specific enough, can be used to provide indications and Activities warnings and focused intelligence to private-sector entities While the U.S. government has a unique understanding if and when the intelligence community detects they are of threat and vulnerability, there are limits to its ability being or will be targeted by a malicious actor. to systematically identify those who are vulnerable or compromised, notify them, and assist them in mitigating Congress should therefore direct and resource the federal or reducing vulnerability. In particular, the inability to government to establish a formal process to solicit and identify the owners and operators of known vulnerable compile private-sector input to inform national - or compromised online systems hinders the U.S. govern- ligence priorities, collection requirements, and more ment’s efforts to notify and, upon request, assist pri- focused U.S. intelligence support to private-sector vate-sector entities in their security operations. Current cybersecurity operations. This process should: authorities are limited exclusively to certain criminal con- • Be led by the Office of the Director of National texts, where evidence of a compromise exists, and do not Intelligence and DHS, in coordination with DoD address instances in which systems are merely vulnerable. and other sector-specific agencies. To address this gap, Congress should consider granting • Identify common technologies or interdependen- certain departments and agencies subpoena authority in cies—areas of high risk that are likely to be targeted support of their threat and asset response activities, while by intelligent nation-state adversaries. ensuring appropriate liability protections for cooperating • Seek to identify intelligence gaps, priorities, and private-sector network owners. needs across the private sector and state, local, tribal, and territorial entities.

100 Cyberspace Solarium Commission OPERATIONALIZE CYBERSECURITY COLLABORATION WITH THE PRIVATE SECTOR

Congress should extend existing law enforcement Congress should pass the Cybersecurity Vulnerability administrative subpoena authority, currently defined Identification and Notification Act of 2019 to grant tai- under 18 U.S. Code § 3486, for the Federal Bureau of lored authority to the Director of the Cybersecurity and Investigation and the United States Secret Service to Infrastructure Security Agency (CISA) to serve admin- include violations of the Computer Fraud and Abuse Act, istrative subpoenas so that the owners of online systems 18 U.S. Code § 1030. with known vulnerabilities can be identified, enabling asset response activities and preventing future intrusion.

STRATEGIC OBJECTIVE #2: IMPROVE COMBINED SITUATIONAL AWARENESS OF CYBER THREATS

The U.S. government should improve combined situational awareness of cyber threats to better support its own and private-sector cyber defensive efforts. For the better part of a decade, expanding public-private collaboration in cybersecurity was synonymous with sharing threat information. Information sharing is an important part of public-private collaboration, certainly, but it is not an end in and of itself. Rather it enables better situational awareness of cyber threats, which can then inform the actions of both the private sector and the government. Truly shared situational awareness is the foundation on which operational collaboration is built and enabled. The U.S. government should leverage its unique, comparative advantages to improve the national collective understanding of the threat, including the information available to the intelligence community and a capacity to integrate information from disparate sources— both public and private. Similarly, the U.S. government must create the structures and processes to work with private-sector entities that have unique insights of their own and a different, and in some cases more comprehensive, view of threats impacting domestic critical infrastructure.

Key Recommendation 5.2 Congress should establish and fund a Joint Collaborative Environment, a common and interoperable environment for the sharing and fusing of threat information, insight, and other relevant data across the federal government and between the public and private sectors.

While the U.S. government has taken a number of steps cross-correlated at the speed and scale necessary for rapid to develop situational awareness in cyberspace, there con- detection and identification. This fragmented approach tinue to be significant limitations on its ability to develop presents further challenges in integrating with the private a comprehensive picture of the threat. Federal depart- sector, both as a contributor to and as a beneficiary of ments and agencies each maintain a number of programs U.S. government insight, causing confusion and adding that can provide insight into threats affecting U.S. gov- significant burden for the private sector in public-private ernment networks and critical infrastructure. However, information-sharing efforts. The U.S. government must the data or information is not routinely shared or take steps to shift the burden of integration onto itself,

Cyberspace Solarium Commission 101 PILLARS AND KEY RECOMMENDATIONS

establishing the mechanisms and enforceable procedures lead agencies charged with developing and maintaining the to build the situational awareness necessary for its own environment in unclassified and classified space, respec- operations and for forging true operational collaboration tively. Where feasible, unclassified data should be routinely with the private sector. mirrored to a classified environment, and integrated with classified data, to provide enrichment, to broaden con- To that end, Congress should establish a “Joint text, and to inform and enable indications and warning. Collaborative Environment”, a common, cloud-based Analytic tools should be deployed across classification environment in which the federal government’s unclas- levels to leverage all relevant data sets as appropriate. sified and classified cyber threat information, malware forensics, and network data from monitoring programs Designation of Programs: Congress should direct the exec- are made commonly available for query and analy- utive branch to designate, as part of the environment’s sis—to the greatest extent possible.293 Initial stages will development process and on a routine basis after it is fully focus on the integration of programs across the federal operational, federal programs required to participate, government and with owners and operators of systemi- feed into, and/or be interoperable with the environment. cally important critical infrastructure, while subsequent These federal programs should include any programs that phases will focus on extending this environment to generate, collect, or disseminate data or information in larger constituencies of critical infrastructure, including the detection, identification, analysis, and monitoring of ISACs. This program would make real the promise of cyber threats, such as: a “whole-of-government” and public-private approach • Government network-monitoring and intrusion to cybersecurity, ensuring that network data, cyber detection programs. threat intelligence, and malware forensics from each • Cyber threat indicator–sharing programs. department or agency and the private sector are avail- • Government-sponsored network sensors or net- able at machine speed for comprehensive detection and work-monitoring programs for the private sector or analysis. The Joint Collaborative Environment should for state, local, tribal, and territorial governments. support federal cyber centers, an integrated cyber center • Incident response and cybersecurity technical assis- at CISA (recommendation 5.3), and a planning cell tance programs. under CISA (recommendation 5.4). • Malware forensics and reverse-engineering programs.

Design, Development, and Planning: Given the complexity Information-Sharing Protections: The law should direct of such a program, Congress should allow for a multiyear that any private-sector information-sharing programs design and development cycle that proceeds in phases. participating in the Joint Collaborative Environment Initial phases should focus on designing appropriate are extended protections analogous to those afforded by interoperable standards, affording for integration of the Cybersecurity Information Sharing Act of 2015. The all covered data programs, and ensuring that disparate availability of data within this environment is contingent databases or centers can be compatible and interoperable on these protections. When appropriate, the environment at machine speed and scale. Subsequent phases should will share raw, anonymized data to inform the work of focus on sharing high-level insights and more exquisite the Bureau of Cyber Statistics (recommendation 4.3), in data—as well as addressing challenges introduced by compliance with that bureau’s charter. wider inclusion of private-sector partners. Data Standardization and Interoperability: Congress Program Management: Congress should designate DHS should direct the executive branch to establish an and the NSA to act as the primary program managers and interagency council, chaired by the program managers,

102 Cyberspace Solarium Commission 8/21/2020 China Is Waging Cyber-Enabled Economic War on the U.S. How to Fight Back. - Barron's

Subscribe | Sign In Search News & Quotes

Topics Magazine Data Advisor Penta

ECONOMY & POLICY China Is Waging Economic War on America. The Pandemic Is an Opportunity to Turn the Fight Around.

COMMENTARY By Keith B. Alexander and Jamil N. Jaffer Aug. 4, 2020 8:30 pm ET

For all practical intents, the United States is at war with China. This may come as a surprise since no bullets have been fired nor declarations made. Yet there is little question that, for over a decade, the Chinese government has engaged in a sustained campaign of cyber-enabled economic aggression against us and our allies. They have Qilai Shen/Bloomberg targeted our most productive economic sectors and are currently winning. But as we restart our economy after Covid-19, we have a unique opportunity to shift this fight decisively back in our favor.

At the heart of this conflict is a series of grand economic competitions across key industries, including telecommunications, advanced computing, robotics, energy generation, resource extraction, aerospace, and the medical sciences, to name just a few. We are currently facing off with China on 5G technology, machine learning, quantum computing, nuclear and solar power, satellites, rare earth metals, biotechnology, and pharmaceuticals. Fundamental to the Chinese strategy for winning in each of these areas—and many more—is the rampant theft of American intellectual property.

The Chinese playbook is deceptively simple: Why spend trillions of dollars on basic science or advanced research when it can be stolen with almost no penalties? The Chinese government is stunningly good at this theft. Not only do they employ thousands of government operatives to engage in this effort, a new federal indictment charges that they have fostered a criminal hacker class that works for its personal economic gain as well as for the Chinese state.

This brazen theft is not just limited to intellectual property. It also involves the pilfering of massive amounts of data—from the likes of the U.S. Office of Personnel Management, Equifax, Marriott, and Anthem—that will fuel intelligence operations and train machine learning algorithms, generating economic and political gain for decades.

https://www.barrons.com/articles/china-is-waging-cyber-enabled-economic-war-on-the-u-s-how-to-fight-back-51596587400 1/3 8/21/2020 China Is Waging Cyber-Enabled Economic War on the U.S. How to Fight Back. - Barron's Chinese companies also look to acquire American technology through investment, Subscribe | Sign In acquisition,Search litigation, News and & bankruptcy,Quotes turning our own markets and courts against us. They masquerade as American companiesTopics while underMagazine the control Dataof the Chinese Advisor Penta government. Even worse, they take advantage of our companies looking to do business in China by extorting them into creating joint ventures, transferring intellectual property, and providing data to the Chinese Communist Party.

They likewise send students and researchers to our best research universities, all the while pressuring them to steal information for the Chinese state. The recent indictment of a Chinese military officer allegedly masquerading as a researcher at Stanford is but one such example. Chinese intelligence agencies likewise seek to co-opt American academics by providing grant funding for joint research projects and invitations to write for cash.

All of this economic warfare is directed at one key goal: to replace the United States as the global leader. Their agents do this by handing over the spoils of the state-run hacking and extortion campaign to Chinese companies which, in turn, exploit Chinese (and other) workers to make goods at reduced cost, selling them back to us and our allies, making us more reliant upon them.

We’ve all now seen the price of this reliance in the difficulty many Americans face in getting medical gear and life-saving drugs. But our reliance is hardly limited to these goods. We also rely on China for all manner of finished goods and key inputs, the loss of which could grind our economy to a virtual halt overnight. Indeed, years ago, the Chinese created a plan to make us reliant on them in a dozen key areas. They now see Covid-19 as an opportunity to surge forward. But it need not be so. We have a chance, in this very moment of economic turmoil, to regain the edge.

First, the U.S. government must stand shoulder-to-shoulder with our private sector to protect and push back. Just as the Chinese back their companies in competition with us, we must do the same for our industry. We should collect and share actionable threat intelligence and actively collaborate with the private sector to protect them through collective defense. We must also push back, using all elements of national power, to end the Chinese campaign of cyber-enabled economic warfare, including through the use of trade measures, sanctions, persistent cyber engagement, and, where necessary, more aggressive actions. We cannot allow trade deals or our desire for cheap Chinese goods to force us to sit on our hands, leaving our private sector alone to fight this war. Doing so means certain defeat.

Second, we must also work with our allies across the globe, including in the Indo- Pacific region, which the administration has identified as the single most consequential region for our future. India’s recent travails at China’s hands should be a warning to all in the region and we must reject this aggression just as we have in the South China Sea. Likewise, having brought the British back on board on 5G, we must also now convince Germany to join this unified front. America need not stand alone. Making common cause with our longstanding allies is the right approach.

Finally, as we look to restart our economy, we must incentivize Americans to invest their money here and protect our innovation base. We must create tax and regulatory incentives that encourage investment in American companies struggling to survive https://www.barrons.com/articles/china-is-waging-cyber-enabled-economic-war-on-the-u-s-how-to-fight-back-51596587400 2/3 8/21/2020 China Is Waging Cyber-Enabled Economic War on the U.S. How to Fight Back. - Barron's and protect their intellectual property. These investors should be able to take Subscribe | Sign In advantageSearch of low-cost News capital & Quotes to reorganize and reorient companies working on dual- use technologies to accelerate us into recoveryTopics and bringMagazine manufacturing Data and Advisor jobs back Penta to the United States.

If we are to preserve this nation and remain a global leader, we cannot permit the continued theft of our children’s future right from under our noses. Now is the time to act.

Gen. (Ret) Keith B. Alexander is the former director of the National Security Agency and Founding Commander of United States Cyber Command, and currently serves as chairman, president and co-CEO of IronNet Cybersecurity, a start-up technology company focused on network threat analytics and collective defense and is on the Board of Advisors for the National Security Institute at George Mason University’s Scalia Law School. Jamil N. Jaffer is the former chief counsel and senior advisor to the Senate Foreign Relations Committee and served in senior national security roles in the George W. Bush Justice Department and White House, and currently serves as senior vice president for strategy, partnerships and corporate development at IronNet Cybersecurity and as the founder and executive director of NSI.

https://www.barrons.com/articles/china-is-waging-cyber-enabled-economic-war-on-the-u-s-how-to-fight-back-51596587400 3/3 8/21/2020 Capital One Breach Highlights Challenges of Insider Threats | Decipher

Security news that informs and inspires

Jul 30, 2019

CAPITAL ONE BREACH HIGHLIGHTS CHALLENGES OF INSIDER THREATS

By Fahmida Y. Rashid

Share

There are many things to consider regarding the breach of Capital One servers that compromised personal information for about 100 million customers. What keeps getting missed is the fact that this was an inside threat situation. Defending against insider threats is different from defending against an external attacker.

Files containing personal information for about 100 million individuals were stolen from servers containing Capital One data, and posted on GitHub. The compromised data included personal information belonging to small businesses and consumers such as names, addresses, phone numbers, email addresses, birth date, self-reported income, and some Social Security numbers. About 80,000 linked bank account numbers of credit card customers and related credit information, such as credit scores, limits, balances, and payment history was also stolen, Capital One said.

Capital One said it was “unlikely” that the information had been previously used for fraud, or by other groups to also access the data.

The alleged thief, a former systems engineer with Amazon Web Services, (she had worked at Amazon between 2015 and 2016) had accessed the servers through a “misconfigured web application firewall” earlier this year, the Department of Justice said. She knew how to navigate the infrastructure and knew how to take advantage of the WAF misconfiguration to query and obtain the necessary credentials to access the data stored in Amazon Web Services (AWS) Simple Storage Service (S3) buckets. This wasn’t a case of an S3 bucket inadvertently exposed to anyone on the Internet, but rather an insider threat incident. https://duo.com/decipher/capital-one-breach-highlights-challenges-of-insider-threats 1/3 8/21/2020 Capital One Breach Highlights Challenges of Insider Threats | Decipher

There is a lot of focus on outsiders breaking in, but an insider threat where the attacker knows how the systems work, how customers maintain and access their data in the cloud, and how to navigate the infrastructure pose a different type of security challenge for defenders. As this incident shows, insider threats are not limited to just employees or ex-employees, but also includes third-party providers such as public cloud infrastructure companies and software-as-a-service vendors.

Insider threats “are the most dangerous and unpredictable threat vector,” said Michael Clauser, global head of data and trust at Access Partnership.

While it’s unlikely there was a weakness in AWS, it’s not clear whether the engineer merely exploited a weakness in the WAF that was exposed by the misconfiguration, or if the engineer had somehow retained access to AWS to still be able to connect to the Capital One servers more than three years after she left the company.

“Nearly all breaches where AWS is involved is a result of human error or intent, rather than a technical exploit,” said Leo Taddeo, CISO of Cyxtera and former head of special operations in the FBI’s New York office.

Insider threats are particularly difficult because the person has more access than someone from outside the network. Even if someone outside the organization manages to obtain privileged credentials, that person still has to figure out how to get around the network to get the data. For an insider, that knowledge is already there.

A good example is encryption. Capital One encrypts data as a standard, but because the breach was performed by an insider, the insider was able to get to the decrypted data. Data can be encrypted at rest, but the second it is being used, such as through an application, that data becomes decrypted. Or if the insider has privileged access to view everything—systems administrators are powerful figures in the network—then getting the data decrypted is not difficult.

Capital One did not just rely on encryption, however. The company tokenizes certain data fields— especially Social Security numbers and account numbers—so tokenized data remained protected.

“At last, tokenization is deployed, doing what it is supposed to do,” said Colin Bastable, CEO of Lucy Security. “Good job, Capital One, more please!”

Many organizations are rolling out “zero day start processes” to ensure that the new employee has all the equipment and all the credentials for corporate services. There isn’t always an equivalent process to remove access and credentials, and that may have been what tripped up Capital One.

“How about they also have a zero-day stop, too?” said Laurence Pitt, global security strategy director at Juniper Networks.

A final thing to note about the breach: There’s still a lot left for Capital One to figure out during the course of the investigation. When there are different teams involved—legal, forensics, incident https://duo.com/decipher/capital-one-breach-highlights-challenges-of-insider-threats 2/3 8/21/2020 Capital One Breach Highlights Challenges of Insider Threats | Decipher

response, public relations, and others—coordination is key. There is already a lot of confusion because Capital One offered contradictory information—no Social Security numbers were impacted, or 14,000 were exposed?—and that is likely because each group is working on their part of the incident and it is hard to coordinate all the different pieces. While there needs to be a consistent message, it’s also worth remembering that a evolving story means there is a lot that needs to be figured out still. All the answers aren’t there yet.

“Having peeled back the layers on multiple large scale breaches like Capital One's, there's no doubt that enterprise security remains a complicated, massive undertaking,” Taddeo said.

The state of New York has opened an investigation into the breach, which resulted in the theft of personal information of about 100 million consumers, Attorney General Letitia James said.

“We cannot allow hacks of this nature to become every day occurrences,” James said. “It is becoming far too commonplace that financial institutions are susceptible to hacks, begging the questions: Why do these breaches continue to take place? And are companies doing enough to prevent future data breaches?”

Insider Threat Data Breaches

https://duo.com/decipher/capital-one-breach-highlights-challenges-of-insider-threats 3/3 8/21/2020 Baltimore’s ransomware attack, explained - Vox

× Support our journalism:

Millions rely on Vox’s explainers to understand an increasingly chaotic world. Chip in as little as $3 to help keep it free for everyone.

Contribute

Hackers have been holding the city of Baltimore’s computers hostage for 2 weeks

A ransomware attack means Baltimore citizens can’t pay their water bills or parking tickets.

By Emily Stewart [email protected] May 21, 2019, 5:50pm EDT

Jaap Arriens/NurPhoto via Getty Images

Thirteen bitcoins are standing between the city of Baltimore and many of the services and processes its citizens rely on aer hackers seized thousands of government https://www.vox.com/recode/2019/5/21/18634505/baltimore-ransom-robbinhood-mayor-jack-young-hackers 1/4 8/21/2020 Baltimore’s ransomware attack, explained - Vox computers at the start of the month. The ordeal has been going on for two weeks, and there’s no clear end in sight.

Here’s what’s happening: On May 7, hackers digitally seized about 10,000 Baltimore government computers and demanded around $100,000 worth in bitcoins to free them back up. It’s a so-called “ransomware” attack, where hackers deploy malicious soware to block access to or take over a computer system until the owner of that system pays a ransom.

Baltimore, like several other cities that have been hit by such attacks over the past two years, is refusing to pay up. As a result, for two weeks, city employees have been locked out of their email accounts and citizens have been unable to access essential services, including websites where they pay their water bills, property taxes, and parking tickets. This is Baltimore’s second ransomware attack in about 15 months: Last year, a separate attack shut down the city’s 911 system for about a day. Baltimore has come under scrutiny for its handling of both attacks.

The ransomware attacks in Baltimore and other local governments across the US demonstrate that as ransomware attacks spread, and as common targets such as hospitals and schools beef up their online systems’ security, there are still plenty targets vulnerable to this kind of hack. It also exemplifies the conundrum that ransomware victims face: pay up and get your access back, or refuse — potentially costing much more in the long run.

What’s going on in Baltimore, briefly explained

Hackers targeted the city of Baltimore on May 7 using a ransomware called RobbinHood, which, as NPR explains, makes it impossible to access a server without a digital key that only the hackers have.

The Baltimore hackers’ ransom note, obtained by the Baltimore Sun, demanded payment of three bitcoins per system to be unlocked, which amounts to 13 bitcoins to unlock all the seized systems. The note threatened to increase the ransom if it wasn’t paid in four days, and said the information would be lost forever if it wasn’t paid in 10 days. Both deadlines have now passed.

https://www.vox.com/recode/2019/5/21/18634505/baltimore-ransom-robbinhood-mayor-jack-young-hackers 2/4 8/21/2020 Baltimore’s ransomware attack, explained - Vox “We won’t talk more, all we know is MONEY! Hurry up! Tik Tak, Tik Tak, Tik Tak!” the note said.

The city government is refusing to pay, meaning that the government email systems and payment platforms the attack took down remain offline. The attack has also harmed Baltimore’s property market, because officials weren’t able to access systems needed to complete real estate sales. (The city said transactions resumed on Monday.)

Baltimore Mayor Jack Young, who’s officially been in his office less than a month, said in a statement on Friday that city officials are “well into the restorative process” and have “engaged leading industry cybersecurity experts who are on-site 24-7 working with us.” The FBI is also involved in the investigation.

“Some of the restoration efforts also require that we rebuild certain systems to make sure that when we restore business functions, we are doing so in a secure manner,” Young said. He did not offer a timeline for when all systems will come back online.

The Baltimore City Council president also plans to form a special committee to investigate this latest attack and try to ensure it doesn’t happen again.

A similar attack using RobbinHood hit government computers in Greenville, North Carolina, in April. A spokesperson for Greenville told the Wall Street Journal that the city never wound up paying, and that while its systems aren’t entirely restored, “all of our major technology needs are now being met.”

More than 20 municipalities in the US have been hit by cyberattacks this year alone. And such attacks can be expensive, perhaps especially if targets say they won’t pay. In 2018, hackers demanded that Atlanta pay about $50,000 in bitcoins as part of a ransomware attack. The city refused, and according to a report obtained by the Atlanta Journal- Constitution and Channel 2 Action News, the attack wound up costing the city $17 million to fix.

Ransomware attacks aren’t new — but we’re still figuring out how to deal with them

In 2017, a ransomware called WannaCry targeted tens of thousands of computers using Microso Windows operating systems in more than 100 countries. Officials in the US and the United Kingdom eventually blamed North Korea for the attack. Also in 2017, https://www.vox.com/recode/2019/5/21/18634505/baltimore-ransom-robbinhood-mayor-jack-young-hackers 3/4 8/21/2020 Baltimore’s ransomware attack, explained - Vox corporations in the UK, France, Russia, Israel, and Ukraine experienced ransomware attacks. US hospitals were also targeted.

Here’s how Timothy Lee explained for Vox what was going on and how ransomware had become more prolific:

The basic idea behind ransomware is simple: A criminal hacks into your computer, scrambles your files with unbreakable encryption, and then demands that you pay for the encryption key needed to unscramble the files. If you have important files on your computer, you might be willing to pay a lot to avoid losing them.

Ransomware schemes have become a lot more effective since the invention of Bitcoin in 2009. Conventional payment networks like Visa and Mastercard make it difficult to accept payments without revealing your identity. Bitcoin makes that a lot easier. So the past four years have seen a surge in ransomware schemes striking unsuspecting PC users.

Some ransomware schemes are so sophisticated that they even invest in customer service, helping victims who want to pay their ransoms navigate the complexities of obtaining bitcoins and making bitcoin payments.

Since then, a number of sectors and organizations have made improvements to their security practices to protect against ransomware. But the latest Baltimore attack exemplifies what a whack-a-mole game this is: One area improves its practices and hackers just go looking for another.

Recode and Vox have joined forces to uncover and explain how our digital world is changing — and changing us. Subscribe to Recode podcasts to hear Kara Swisher and Peter Kafka lead the tough conversations the technology industry needs today.

https://www.vox.com/recode/2019/5/21/18634505/baltimore-ransom-robbinhood-mayor-jack-young-hackers 4/4 8/21/2020 Baltimore, $18 Million Later: 'This Is Why We Didn't Pay the Ransom'

EVENTS NEWS DIGITAL RESOURCES ABOUT US SUBSCRIBE

RANSOMWARE Baltimore, $18 Million Later: 'This Is Why We Didn't Pay the Ransom'

WED | JUN 12, 2019 | 7:30 AM PDT

What would you do in a scenario like this? By Bruce Sussman Read more about You are about to get into your car when a masked the author man pulls a gun and takes your keys.

"Here's how this is going to work," he says. "You get SUBSCRIBE × your keys back if you give me $100 right now. Stay updated with the latest security news, original articles, Otherwise, I keep the keys and I'm driving awayexpert in interviews, research, and training opportunities. your $30,000 car." Most Recent SUBSCRIBE If you think about it, a ransomware demand is kind of like that.

Just ask the City of Baltimore.

It chose to "give up the car" and now says costs of the INSIDER THREATS ransomware attack have reached $18 million including Data Breach Cover-Up: Uber's remediation, new hardware, and lost or deferred Former CSO Faces up to 8 Years revenue. Behind Bars

This has many taxpayers in Baltimore wondering: why didn't you pay hackers $80,000 in cryptocurrency for "the keys" to unlock city systems? Most Popular https://www.secureworldexpo.com/industry-news/baltimore-ransomware-attack-2019 1/5 8/21/2020 Baltimore, $18 Million Later: 'This Is Why We Didn't Pay the Ransom' Baltimore city leaders have just answered that question in statements to reporters and on social media.  Baltimore defendsEVENTS decision NEWS not to pay DIGITAL ransom RESOURCES ABOUT US SUBSCRIBE

Mayor Bernard C. Jack Young took to Twitter to defend CYBER WARFARE his decision not to pay the ransom. 'Call of Duty: Modern Warfare' Integrates Cyber War into Ironically, it's the same social media platform the hacker Latest Game used to taunt city leaders.

More Like This

EDUCATION Higher Ed Ransomware Attack: University Pays Hackers $457,000

Here is what Mayor Young had to say:

"Why don't we just pay the ransom? I know a lot of residents have been saying we should've just paid the ransom or why don't we pay the ransom? SUBSCRIBE × Well, rst, we've been advised by both the Secret Stay updated with the latest security news, original articles, Service and the FBI not to pay the ransom. Second,expert interviews, research, and training opportunities. that's just not the way we operate. We won't reward

criminal behavior. SUBSCRIBE

If we paid the ransom, there is no guarantee they can or will unlock our system.

There's no way of tracking the payment or even being able to conrm who we are paying the money to. Because of the way they requested payment, there's no way of knowing if they are leaving other malware on our system to hold us for ransom again in the future.

Ultimately, we would still have to take all the steps we have taken to ensure a safe and secure environment.

https://www.secureworldexpo.com/industry-news/baltimore-ransomware-attack-2019 2/5 8/21/2020 Baltimore, $18 Million Later: 'This Is Why We Didn't Pay the Ransom' I'm condent we have taken the best course of action." 

EVENTS NEWS DIGITAL RESOURCES ABOUT US SUBSCRIBE And the Mayor's Deputy Chief of Sta for Operations, Sheryl Goldstein, told reporters:

"The federal investigators have advised us not to pay the ransom. The data shows you have less than a 50- 50 chance of getting your data back if you pay the ransom, and, even if you pay the ransom, you still have to go within your system and make sure they’re out of it.

You couldn’t just bring it back up and believe they were gone, and so we would be bearing much of these costs regardless."

Post in comments reacting to these statements: "Where are your backups?" Paying hackers after ransomware infection: no consensus

If there is a consensus on this topic, it sure is tough to nd.

Atlanta refused to pay the ransom in its cyber incident last year.

But many other cities have decided to pay the ransom.

West Haven, Connecticut, paid the ransom and perhaps SUBSCRIBE × felt guilty about it because it told residents this was a Stay updated with the latest security news, original articles, "one-time fee" instead of using the word "ransom." expert interviews, research, and training opportunities.

"... our police IT experts determined the best course SUBSCRIBE of action, given all the available information, was to pay a one-time fee of $2,000 to unlock servers. The money was paid in digital currency. The data restoration of a critical system occurred shortly aer the completion of that transaction."

The City of Valdez, Alaska, also paid. Watch the video to see what it demanded from hackers before handing over the crypto:

https://www.secureworldexpo.com/industry-news/baltimore-ransomware-attack-2019 3/5 8/21/2020 Baltimore, $18 Million Later: 'This Is Why We Didn't Pay the Ransom'

EVENTS NEWS DIGITAL RESOURCES ABOUT US SUBSCRIBE

Sometimes, even if an organization doesn't want to pay, it may feel like it has no choice.

That's exactly what happened to Roseburg, Oregon, according to The News-Review, aer the school district said the FBI advised not paying the ransom:

“We exhausted all eorts to avoid paying the requested ransom out of concern that more damage could be caused; however, the experts ultimately determined that the solution was worth the risk,” Roseburg Public Schools Superintendent Gerry Washburn said.

But for some leaders, refusing to pay the ransom is showing support for truth, justice, and the American way. Just ask the CEO of a utility company in North Carolina, who announced this to his sta:

"Do you bow your head, weakly, and say we'll pay you and risk another attack? Or do you look 'em in the eye and say we're Americans, we're North Carolinians, and by golly, we'll survive this too. That's what we say. That's what we're telling the cybercriminals and the world."

And right now, that's the type of message Baltimore city leaders are sending to hackers, as well. SUBSCRIBE × Tags: Ransomware, Network Security Stay updated with the latest security news, original articles, expert interviews, research, and training opportunities.

SUBSCRIBE

Comments First Name*

Last Name

Email*

https://www.secureworldexpo.com/industry-news/baltimore-ransomware-attack-2019 4/5