Information Warfare on an Evolving Battlefield
Total Page:16
File Type:pdf, Size:1020Kb
INFORMATION WARFARE ON AN EVOLVING BATTLEFIELD _______________ A Thesis Presented to the Faculty of San Diego State University _______________ In Partial Fulfillment of the Requirements for the Degree Master of Science in Homeland Security _______________ by Daniel Louis Gold Fall 2012 iii Copyright © 2012 by Daniel Louis Gold All Rights Reserved iv DEDICATION This work is dedicated to my parents, Sue and Marvin Gold, my sisters, Michelle and Diane, and my brother Peter Gold. v All warfare is based on deception. -Sun Tzu vi ABSTRACT OF THE THESIS Information Warfare on an Evolving Battlefield by Daniel Louis Gold Master of Science in Homeland Security San Diego State University, 2012 Since the dawn of civilization warfare has been intrinsic to man’s existence. War has shaped cultures, given rise to empires, and decimated entire populations. The nature of warfare is a constant evolution. Since the end of the Second World War, the medieval construct of opposing nation-state actors facing each other in open battle has effectively become obsolete. The balance of power established during the cold war characterized warfare’s evolution as increasingly asymmetrical. The looming threat of mutually assured destruction gave rise to proxy-wars and covert actions. The terrorist attacks of September 11th 2001 were a testament to this progression. As such, warfare in the 21st century can be described as a multi-dimensional amalgam including the elements of global economics, the mass media, and terrorism. Intelligence, both human and signals based, has always played a central role in warfare. Due to the exponential growth of technology in recent decades, the tools of war have developed rapidly. Nearly all facets of modern warfare in the information age are now supported by the use of computers and the Internet. Whether motivated by politics, ideology, or monetary gain, criminals, spies, and terrorists all utilize computer based attacks. This work presents an analysis of emerging computer based threats in an effort to address the ongoing problem of securing our national digital infrastructure. Specifically, the case study presented will focus on the Stuxnet worm, which was arguably the first cyber- weapon to inflict significant kinetic damage. This study will examine Stuxnet, the Iranian nuclear program, and the potential that exists for similar threats to industrial control systems within the United States. vii TABLE OF CONTENTS PAGE ABSTRACT ............................................................................................................................. vi LIST OF TABLES ................................................................................................................. viii LIST OF FIGURES ................................................................................................................. ix ACKNOWLEDGEMENTS .......................................................................................................x CHAPTER 1 INTRODUCTION .........................................................................................................1 Information Warfare and Cyber Security ................................................................1 Statement of the Problem .......................................................................................22 Purpose of the Study ..............................................................................................24 Limitations of the Study.........................................................................................24 Definition of Terms................................................................................................24 Methodology ..........................................................................................................26 2 IRAN'S NUCLEAR ASPIRATIONS AND THE WAR ON TERROR ......................28 3 INDUSTRIAL CONTROL SYSTEMS .......................................................................34 4 THE STUXNET WORM .............................................................................................43 5 CONCLUSIONS AND RECOMMENDATIONS ......................................................63 REFERENCES ........................................................................................................................75 APPENDIX A STUXNET TIMELINE ...............................................................................................79 B PARTIAL ATTACK GRAPH .....................................................................................81 C CLUSTERS OF INFECTION BASED ON INITIAL INFECTION ...........................83 D STUXNET VARIANTS ..............................................................................................85 E DUQU INSTALLATION PROCESS..........................................................................87 viii LIST OF TABLES PAGE Table 1. List of Exports ...........................................................................................................48 Table 2. List of Resources .......................................................................................................49 Table 3. Process Injection ........................................................................................................50 Table 4. Comparison of Stuxnet and Duqu ..............................................................................65 ix LIST OF FIGURES PAGE Figure 1. Global infection by W32.Stuxnet .............................................................................23 Figure 2. Typical SCADA system ...........................................................................................35 Figure 3. First generation SCADA architecture ......................................................................36 Figure 4. Second generation SCADA architecture ..................................................................37 Figure 5. Third generation SCADA architecture .....................................................................38 Figure 6. Components of the SIMATIC PCS 7. ......................................................................39 Figure 7. Siemens' protocol for high security sites ..................................................................40 Figure 8. Stuxnet P2P communication.....................................................................................46 Figure 9. Control flow of export 15 .........................................................................................51 Figure 10. Infection routine flow .............................................................................................52 Figure 11. Command and control ............................................................................................55 Figure 12. Compromising the site's network ...........................................................................58 Figure 13. Geographic distribution of W32.Duqu ...................................................................64 Figure 14. Double firewalled DMZ .........................................................................................67 x ACKNOWLEDGEMENTS First, I would like to thank my parents, Marvin and Sue Gold, for their patience and support in furtherance of my academic goals. I would also like to thank the department heads of San Diego State University’s Interdisciplinary Homeland Security program, Dr. Jeffrey McIllwain and Dr. Eric Frost, for the quality of instruction they provided during my program of study. I would like to thank the members of my thesis committee for their involvement in this work: Steve Andres, for introducing me to the emerging field of cyber-security and advising me in the completion of this work, Murray Jennex for his instruction in the field of Management Information Systems, and Allen Greb, who apart from his involvement in my thesis committee, also served as my advisor during my undergraduate studies in San Diego State University’s International Security and Conflict Resolution program. 1 CHAPTER 1 INTRODUCTION In recent decades, cyberspace has grown to impact nearly every aspect of human existence. It is increasingly relied upon by citizens and policy-makers, as well as the military and federal agencies. Despite these facts, the importance of securing cyberspace is often overlooked. It is widely accepted that hackers, criminals, and foreign governments utilize the Internet for illicit purposes, but few understand the true nature of the threats facing the nation. Some describe the threat of cyber-attacks as exaggerated, while others warn of a digital doomsday. The truth is likely somewhere in between. Regardless, many find the subject matter confusing, due to its technical nature. The introductory portion of this paper will convey the essential aspects in the discourse of cyber-security, and provide a foundation for understanding the issues inherent in the field of information warfare. After this foundation is established, a review of the political theory surrounding the Iranian nuclear program will be conducted. A primer on industrial control systems will be presented along with a case-study of the Stuxnet computer worm and its effects on these critical systems. Finally, conclusions will be drawn as to the implications for blowback involved in Stuxnet’s release, especially in regard to securing domestic industrial control systems. INFORMATION WARFARE AND CYBER SECURITY The birth of information theory is an appropriate starting point in the history of information warfare. Information theory was pioneered by