Quick viewing(Text Mode)

The United States' Cyber Warfare History

The United States' Cyber Warfare History

The ’ Cyber Warfare History: Implications on Modern Cyber Operational Structures and Policymaking

Omry Haizler

This article will touch upon two main components of the United States’ cybersphere and cyber warfare. First, it will review three cyber incidents during different time periods, as the US , mechanisms, and policies were gradually evolving. It will analyze the conceptual, operational, and legislative evolution that led to the current decision-making paradigm and institutional structure of the US cybersphere. Secondly, the paper will examine the procedures and policies of the Intelligence Community (IC), and the US cyber operational structure. It will review the missions and background of the IC and its responsibilities before, during, and after a , and will touch upon the IC’s organizational architecture. The paper will also briefly review the current cyber threats in the United States and will elaborate on some of the fundamental strategies and policies that it uses to provide a suitable response. Lastly, it analyzes the cybersphere’s macro-level, addressing the data coordination of the IC’s agencies, as well as the federal, state, and private sector during a cyber crisis.

Keywords: Moonlight Maze, Morris Worm, , , United States intelligence community, cyber crisis, cyber threats, internet , cyber policy, cyber strategy

Omry Haizler is a former IDF Officer and a Prime Minister’s Office operative. He holds an MPA from Columbia University’s School of International and Public Affairs (SIPA). He currently teaches at Columbia’s School of Continuing Education.

Cyber, Intelligence, and | Volume 1 | No. 1 | January 2017 31 OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

32 History of Cyber Warfare 7KHUHDUHWKUHHKLVWRULFDOVWDJHVRIWKHHYROXWLRQRIF\EHUZDUIDUH WKH UHDOL]DWLRQSKDVHGXULQJWKHHDUO\HUDRIWKHLQWHUQHW WKHWDNHRIISKDVH GXULQJWKHLQWHULPSHULRGRISUHDQGSRVWLQZKLFKDWWDFNVZHUHVWLOO PDLQO\RIDQLQIRUPDWLRQJDWKHULQJQDWXUHDQG WKHPRGHUQPLOLWDUL]DWLRQ SKDVHGXULQJZKLFKF\EHUZDUIDUHPD\FDXVHVLPLODUGDPDJHWR86VWUDWHJLF FDSDELOLWLHVDQGFULWLFDOLQIUDVWUXFWXUHDVDNLQHWLFDWWDFNRQDFRORVVDOOHYHO )LJXUHEHORZGHVFULEHVWKHVHVWDJHV 1 | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | Stages 5HDOL]DWLRQ 7DNHRII 0LOLWDUL]DWLRQ 7LPHIUDPH  ± ±SUHVHQW Attackers have Attackers have Attackers have '\QDPLFV advantage over advantage over advantage over GHIHQGHUV GHIHQGHUV GHIHQGHUV 8QLWHG6WDWHV5XVVLD 8QLWHG6WDWHVDQG :KR+DV 8QLWHG6WDWHVDQGIHZ &KLQDDQGPDQ\PRUH 5XVVLDZLWKPDQ\ &DSDELOLWLHV" other superpowers DFWRUVZLWKVXEVWDQWLDO VPDOODFWRUV FDSDELOLWLHV Cyber, Intelligence, and Security Security and Intelligence, Cyber, 1HR+DFNWLYLVWV espionage agents, +DFNWLYLVWVSDWULRW PDOZDUHQDWLRQDO Adversaries +DFNHUV hackers, viruses, PLOLWDULHVVSLHV DQGZRUPV DQGWKHLUSUR[LHV hacktivists (OLJLEOH5HFHLYHU &XFNRRV(JJ   Titan Rain, 6RODU6XQULVH 0RUULV:RUP   (VWRQLD 0DMRU 0RRQOLJKW0D]H 'XWFK+DFNHUV   *HRUJLD ,QFLGHQWV $OOLHG)RUFH 5RPH/DEV   %XFNVKRW

Attacks as Catalyzers for Institutional Evolution (DFKRIWKHDERYHSHULRGVFKDUDFWHUL]HVDIXQGDPHQWDOO\GLIIHUHQWGRFWULQH ERWKZLWKUHVSHFWWRWHFKQRORJLFDOSURJUHVVLRQDQGW\SHRIWKUHDWVDQGWR WKHDGPLQLVWUDWLRQ¶VF\EHUSROLFLHVDWHDFKJLYHQWLPH&HUWDLQSDVWDWWDFNV HPERGLHGIXWXUHF\EHUFKDOOHQJHVVHUYLQJDVZDUQLQJVLJQVWRLQVWLWXWLRQV¶ YXOQHUDELOLWLHVDQGODFNRIVHFXULW\$VVRFLHW\¶VGHSHQGHQF\RQWHFKQRORJ\ OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

33 LQFUHDVHGWKHSRVVLEOHUDPL¿FDWLRQVRILQHI¿FLHQWVHFXULW\LQDVSHFL¿F EUHDFKDOVRLQFUHDVHG

1. Realization—the Morris Worm 7KLVF\EHULQFLGHQWDFWHGDVWKH¿UVWZDNHXSFDOOWRWKH$PHULFDQ,QWHOOLJHQFH &RPPXQLW\ ,& SROLF\PDNHUVDQGDFDGHPLFV:KLOHLWZDVQRWWKH¿UVW F\EHUDWWDFNRQ86FRPSXWHUV\VWHPV²WKH&XFNRR¶V(JJKDFNLQYROYLQJ WKH6RYLHW.*%ZDVWKH¿UVWVLJQL¿FDQWF\EHUHVSLRQDJHDWWDFN²LWLVZLGHO\

FRQVLGHUHGWKH¿UVWODUJHVFDOHDWWDFNERWKLQWHUPVRIWKHTXLFNSKDVHRI 2017 January | 1 No. | 1 Volume | HYHQWVLWVVFDOHDQGLWVLPSOLFDWLRQV/DXQFKHGDVDSUDQNIURPDODEDW&RUQHOO 8QLYHUVLW\WKH0RUULV:RUPZDVGHVLJQHGWRLQIHFWDVPDQ\PDFKLQHVDV SRVVLEOHZLWKRXWEHLQJGHWHFWHGWKHZRUPFUDVKHGFRPSXWHUV²URXJKO\ SHUFHQWRIWKHLQWHUQHWLQ 27KH86*RYHUQPHQW$FFRXQWDELOLW\ 2I¿FHDVVHVVHGWKHGDPDJHDW±LOOXVWUDWLQJWKHGLI¿FXOW\ RIDVVHVVLQJF\EHUDWWDFNGDPDJHDSUREOHPSUHYDOHQWHYHQWRGD\ 3 Despite WKHVHYHUHUDPL¿FDWLRQVWKHLQFLGHQWSURYLGHGDQLPSRUWDQWZDUQLQJWRWKH Cyber, Intelligence, and Security Security and Intelligence, Cyber, ,&KLJKOLJKWLQJWKHSRWHQWLDOGDQJHUVRIKLJKO\FRQQHFWHGFRPSXWHUQHWZRUNV DQGWKHQHHGIRULQVWLWXWLRQDOL]HGGHIHQVLEOHFDSDELOLWLHVDQGVWUXFWXUHVLQ WKHF\EHUVSKHUH 7KH0RUULV:RUPDFWHGDVDFDWDO\]HUIRUWKH¿UVWVWHSVWRZDUGVDPRUH UHJXODWHGF\EHUVSDFHDQGOHGWRGUDPDWLFFKDQJHVERWKFRQFHSWXDOO\DQG RSHUDWLRQDOO\ Paradigm Shift $WWKHWLPHRIWKHLQFLGHQWWKHLQWHUQHWZDVWDNLQJLWV ¿UVWVXEVWDQWLDOVWHSVDQGZDVFRQVLGHUHGD³IULHQGO\SODFH´ZKHUHHYHU\RQH NQRZVHYHU\RQH7KH0RUULV:RUPPDGHLWFOHDUWKDWVRPHSHRSOHLQ F\EHUVSDFHGLGQRWKDYHWKHEHVWLQWHUHVWVLQPLQGWKHLQFLGHQWZDVWKH¿UVW WLPHZKHUHF\EHULQQRYDWLRQVKLIWHGIURPIRFXVLQJVROHO\RQLQWHUFRQQHFWLYLW\ WRVHFXULW\FRQFHUQV Operations (VWDEOLVKHGDIWHUWKH0RUULV:RUPLQFLGHQWE\WKH'HIHQVH $GYDQFHG5HVHDUFK3URMHFWV$JHQF\ '$53$ DW&DUQHJLH0HOORQ8QLYHUVLW\ WKH&RPSXWHU(PHUJHQF\5HVSRQVH7HDP &(57 GHPRQVWUDWHGWKHVKLIW IURPDGKRFVROXWLRQVWRSURIHVVLRQDOWHDPVZKLFKZHUHWUDLQHGDQGHTXLSSHG WRFRRUGLQDWHHYHQWVDQGSURYLGHDVVHVVPHQWVDQGVROXWLRQVWRDJLYHQ F\EHUDWWDFN 4 Regulations $ORQJZLWKWKHFRQFHSWXDOVKLIWLQF\EHUVHFXULW\&RQJUHVV SDVVHGVHYHUDOODZVLQWKH\HDUVIROORZLQJWKH0RUULV:RUPLQFLGHQWLQFOXGLQJ OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

34 WKH(OHFWURQLF&RPPXQLFDWLRQV3ULYDF\$FWRIDQGWKH&RPSXWHU 6HFXULW\$FWRIWRHQVXUHSULYDF\LQF\EHUGRPDLQVWKURXJKOHJDO SURWHFWLRQV 5$GGLWLRQDOO\5REHUW7DSSDQ0RUULVZKRFUHDWHGWKH0RUULV :RUPZDVWKH¿UVWSHUVRQWREHFRQYLFWHGXQGHUWKHQHZ&RPSXWHU)UDXG DQG$EXVH$FWRI 

2. Takeo!—The Moonlight Maze ,Q86RI¿FLDOVDFFLGHQWDOO\GLVFRYHUHGDSDWWHUQRIVXVWDLQHGSURELQJ

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | RIWKH3HQWDJRQ¶VFRPSXWHUV\VWHPVSULYDWHXQLYHUVLWLHV1$6$(QHUJ\ 'HSDUWPHQWDQGUHVHDUFKODEV6RRQWKH\OHDUQHGWKDWWKHSURELQJKDG RFFXUUHGFRQWLQXDOO\IRUQHDUO\WZR\HDUV7KRXVDQGVRIXQFODVVL¿HG\HW VHQVLWLYHGRFXPHQWVUHODWLQJWRWHFKQRORJLHVZLWKPLOLWDU\DSSOLFDWLRQVKDG EHHQH[DPLQHGRUVWROHQLQFOXGLQJPDSVRIPLOLWDU\LQVWDOODWLRQVWURRS FRQ¿JXUDWLRQVDQGPLOLWDU\KDUGZDUHGHVLJQV 7$OWKRXJKWKH'HIHQVH 'HSDUWPHQWWUDFHGWKHWUDLOEDFNWRDPDLQIUDPHFRPSXWHULQWKHIRUPHU 6RYLHW8QLRQWKHVSRQVRURIWKHDWWDFNVUHPDLQVXQNQRZQ5XVVLDGHQLHG Cyber, Intelligence, and Security Security and Intelligence, Cyber, DQ\LQYROYHPHQWDQGWKHVXVSLFLRQVKDYHQHYHUEHHQFRQFOXVLYHO\SURYHQ  0RRQOLJKW0D]HLVZLGHO\FRQVLGHUHGWKH¿UVWODUJHVFDOHF\EHUHVSLRQDJH DWWDFNE\DZHOOIXQGHGDQGZHOORUJDQL]HGVWDWHDFWRU7KHDWWDFNZDVZHOO SODQQHGDVWKHDWWDFNHUVOHIW³EDFNGRRUV´WRHQDEOHKDFNHUVWRSHQHWUDWH WKHV\VWHPDWGLIIHUHQWWLPHVOHIWIHZWUDFHVDQGFRQWLQXHGIRUDORQJWLPH ZLWKRXWGHWHFWLRQ 90RRQOLJKW0D]HKLJKOLJKWHGWKHLQFUHDVLQJUROHRI VWDWHDXWKRULWLHVLQJHQHUDWLQJVSRQVRULQJRUDWOHDVWSDVVLYHO\WROHUDWLQJ VRSKLVWLFDWHGDQGIDUUHDFKLQJHVSLRQDJHLQFLGHQWV0RUHRYHULWVWUHVVHG WKHYXOQHUDELOLWLHVRIWKHLQIRVSKHUHLQZKLFKDGYHUVDULHVFRXOGQRWRQO\ FDXVHGLVUXSWLRQRIVHUYLFHEXWDOVRFRXOGH[SORLWVHQVLWLYHLQIRUPDWLRQ ,WHPSKDVL]HGWKHFUXFLDOQHHGIRU¿UHZDOOVDQGHQFU\SWLRQVDQGDERYH DOOWKHGLI¿FXOWLHVRILGHQWLI\LQJDQGDWWULEXWLQJDQDWWDFNWRDVSHFL¿F DGYHUVDU\0RRQOLJKW0D]HZDVDQLPSRUWDQWSURJUHVVLRQLQF\EHUZDUIDUH DQGF\EHUVHFXULW\GXHWRLWVLPSOLFDWLRQVRQIXWXUHFRQÀLFWV 10 ,WSRLQWHG RXWWKHIXWXUHVKLIWLQWKHPRGHUQEDWWOH¿HOGIURPDNLQHWLFZDU²LQZKLFK HQHPLHVKDYHQDPHVDQGSK\VLFDOORFDWLRQVDQGLQZKLFKDWWDFNVFDQEH ZLWQHVVHGDQGDVVHVVHG²LQWRDQDV\PPHWULFDOZDUIDUHZLWKRIIHQVLYHF\EHU RSHUDWLRQVZKHUHDWWDFNVPLJKWEHLQYLVLEOHDGYHUVDULHVDUHXQNQRZQDQG GDPDJHLVKDUGWRTXDQWLI\7KHLQFLGHQWOHGWRGUDPDWLFVKLIWVLQWKH86 DGPLQLVWUDWLRQ¶VDSSURDFKWRF\EHUVHFXULW\ OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

35 Paradigm Shift: 7KHDZDUHQHVVRIWHUURULVWWKUHDWVDQGVXSSRUWRI FRXQWHUWHUURULVPLQLWLDWLYHVSRVWDPRQJSROLF\PDNHUVZHUHOLPLWHG 7KH0RRQOLJKW0D]HLQFLGHQWFDXVHGDUHWKLQNLQJRIWKH86F\EHUGHIHQVH VWUDWHJ\F\EHUZDUIDUHDWWULEXWLRQF\EHUGHWHUUHQFHDQGWKHFXUUHQWGHIHQVH RIVHQVLWLYHQRQHQFU\SWHGQHWZRUNVVXFKDV1,3(5QHW 1RQ6HFXUH,QWHUQHW 3URWRFRO5RXWHU1HWZRUNWKH3HQWDJRQ¶VQRQFODVVL¿HGQHWZRUN )RUWKH ¿UVWWLPHSROLWLFDODQGFRQVWLWXWLRQDOTXHVWLRQVZHUHUDLVHGDERXWVHFXULW\ SULYDF\DQGQRWLRQVRIDFWLYHPRQLWRULQJDQGSRVVLEOHH[SRVXUHWRWUDQVQDWLRQDO

WKUHDWV 11 0RRQOLJKW0D]HFDXVHGWKH86DJHQFLHVDQGJRYHUQPHQWWRUHDOL]H 2017 January | 1 No. | 1 Volume | WKDWFOHDUSROLFLHVDQGVWUDWHJLHVZHUHQHHGHGIRUDV\PPHWULFZDUIDUHWKH ¿HOGRIIXWXUHLQWHOOLJHQFHJDWKHULQJDQGHVSLRQDJHDQGWKHWHFKQRORJLFDO LPSOLFDWLRQVWKH\HQWDLO Legislative Acts 7KH3UHVLGHQWLDO'HFLVLRQ'LUHFWLYH 3''  UHJDUGLQJFULWLFDOLQIUDVWUXFWXUHSURWHFWLRQZDVLQSDUWWKHUHVXOWRI0RRQOLJKW 0D]H7KLVZDVDVHPLQDOSROLF\GRFXPHQWVHWWLQJIRUWKUROHVUHVSRQVLELOLWLHV

DQGREMHFWLYHVIRUSURWHFWLQJWKHQDWLRQ¶VXWLOLW\WUDQVSRUWDWLRQ¿QDQFLDODQG Security and Intelligence, Cyber, RWKHUHVVHQWLDOLQIUDVWUXFWXUH 12 7KH3''OHGWRWZRVLJQL¿FDQWVWUDWHJLF LPSOLFDWLRQV2QHZDVWKHFUHDWLRQRIWKH1DWLRQDO,QFLGHQW3URWHFWLRQ&HQWHU 1,3& DQLQWHUDJHQF\ERG\ZLWKWKHSRZHUWRVDIHJXDUGWKHQDWLRQ¶VFLYLOLDQ DQGJRYHUQPHQWDOFULWLFDOLQIUDVWUXFWXUHIURPFRPSXWHUEDVHGDWWDFNV 13 The VHFRQGZDVWKHFUHDWLRQRIWKH-RLQW7DVN)RUFH&RPSXWHU1HWZRUN'HIHQVH -7)&1' DERG\HQWUXVWHGZLWKWDNLQJWKHOHDGLQFRRUGLQDWLQJDUHVSRQVH WRQDWLRQDOF\EHUDWWDFNVDQGFHQWUDOL]LQJWKHGHIHQVHRIPLOLWDU\QHWZRUNV 14 Operational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

3. —Stuxnet 7KH6WX[QHWDWWDFNLVFRQVLGHUHGRQHRIWKHPRVWVRSKLVWLFDWHGPDOZDUH DWWDFNVSXEOLFO\UHFRUGHG$OWKRXJKXQYHUL¿HGPDQ\H[SHUWVDUJXHWKDWRQO\ OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

36 DQDWLRQVWDWHFRXOGKDYHFUHDWHGDQGODXQFKHGWKHDWWDFNDQGPDQ\PHGLD RXWOHWVVXJJHVWHGLWZDVDMRLQW,VUDHOL$PHULFDQRSHUDWLRQ 15 &RQVLGHUHGDV RQHPRVWLPSDFWIXOF\EHUDWWDFNVLQYROYLQJVRYHUHLJQFRXQWULHVWKHPDOZDUH GDPDJHG,UDQ¶VFHQWULIXJHVDQGGHOD\HGLWVXUDQLXPHQULFKPHQWHIIRUWV 2QFHLQVLGHWKHQHWZRUNLWXVHGDYDULHW\RIPHFKDQLVPVWRSURSDJDWHWR RWKHUPDFKLQHVZLWKLQWKDWQHWZRUNDQGJDLQSULYLOHJHVDVVRRQDVLWKDG LQIHFWHGWKRVHPDFKLQHV7KHVHPHFKDQLVPVLQFOXGHGERWKNQRZQDQG SDWFKHGYXOQHUDELOLWLHVDVZHOODVIRXUYXOQHUDELOLWLHVWKDWZHUHXQNQRZQDQG

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | XQSDWFKHGZKHQWKHZRUPZDVUHOHDVHG DND³]HURGD\´H[SORLWV   :KLOH WKHLQWHUQDWLRQDOFRPPXQLW\UHPDLQVXQVXUHRIWKHVRXUFHDQGH[DFWSXUSRVH RIWKHYLUXVWKHLQFLGHQWUDLVHGDZDUHQHVVRIQHWZRUNV¶YXOQHUDELOLWLHV 17 ,GHQWL¿HGLQ6WX[QHW¶VLPSDFWDQGXQFOHDURULJLQKLJKOLJKWWKH GLI¿FXOW\LQQRWLFLQJDQDWWDFNDQGVXJJHVWWKDWDWDQDWLRQOHYHOLWLV LPSRVVLEOHWRIXOO\GHIHQGDOOYLWDOUHVRXUFHV  7KHUHIRUHLWEHFDPHFUXFLDO WRXQGHUVWDQGWKHG\QDPLFVRIEDWWOHOLNHVLWXDWLRQVLQPRGHUQDJHF\EHU

Cyber, Intelligence, and Security Security and Intelligence, Cyber, ZDUIDUHLQZKLFKHYHQDFRORVVDODWWDFNGRHVQRWQHFHVVDULO\KDYHDQ DWWULEXWHGDWWDFNHURUDWUDFHRIDQ\DWWDFNDWDOO7KLVPHDQVWKDWLQPRGHUQ QRQNLQHWLFEDWWOH¿HOGVSROLF\PDNHUVUHDOL]HWKHHIIHFWRIDQDWWDFN IURP GHQLDORIVHUYLFHWRWKHGHVWUXFWLRQRIDQDWLRQ¶VFULWLFDOLQIUDVWUXFWXUHV  ZLWKRXWKDYLQJDVPRNLQJJXQRUDQ\OHJDORUSROLWLFDOWRROWR¿JKWZLWK 7KLVSKHQRPHQRQUHTXLUHVOHJLVODWRUVDQGDXWKRULWLHVWRVWDUWIRUPXODWLQJ UHVSRQVHRSWLRQVDQGGHWDLOHGSURWRFROVQRZUDWKHUWKDQWU\LQJWRGHYHORS DGKRFRSWLRQVODWHUGXULQJDFULVLV 7KHF\EHUZDUIDUHRISRVWVKLIWHGWKHFRXQWHUDWWDFNDSSURDFKIURP an operational level 19 WRDVWUDWHJLFGLSORPDWLFRQHZKHUHSROLF\LQWHUQDWLRQDO ODZVLQWHUQHWJRYHUQDQFHDQGDJUHHPHQWVSOD\DVLJQL¿FDQWSDUWLQWKH RYHUO\EUHDFKHGF\EHUHQYLURQPHQW7KUHHVXEVWDQWLDOLQWHUQHWJRYHUQDQFH DJUHHPHQWVDQGFROODERUDWLYHHIIRUWVKDYHWDNHQSODFHRQDPXOWLQDWLRQDOOHYHO D 7KH8QLWHG6WDWHV&KLQD&\EHU$JUHHPHQW7KLVDJUHHPHQWHQVXUHVWKDW QHLWKHUJRYHUQPHQW³ZLOOFRQGXFWRUNQRZLQJO\VXSSRUWF\EHUHQDEOHG WKHIWRILQWHOOHFWXDOSURSHUW\LQFOXGLQJWUDGHVHFUHWVRURWKHUFRQ¿GHQWLDO EXVLQHVVLQIRUPDWLRQIRUFRPPHUFLDODGYDQWDJH´ 20 :KLOHLWLVRQO\D EDVLFDJUHHPHQWWKDWGRHVQRWHQVXUHDVDIHF\EHUHQYLURQPHQWEHWZHHQ WKHWZRVWDWHVLWVLPSRUWDQFHVWHPVIURPWKHDELOLW\WREXLOGXSRQLWLQ IXWXUH\HDUVDQGDFWDVDJHVWXUHRIJRRGZLOO OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

37 E 7KH8QLWHG1DWLRQV¶:RUOG6XPPLWRQWKH,QIRUPDWLRQ6RFLHW\SURFHVV :6,6 7KLVVXPPLWUHQHZHGWKH,QWHUQHW*RYHUQDQFH)RUXP ,*)  DYHQXHZKHUHPHPEHUVWDWHVFLYLOVRFLHW\DQGWKHSULYDWHVHFWRUGHEDWH LQWHUQHWSROLF\F\EHUVHFXULW\VXUYHLOODQFHLQWHOOHFWXDOSURSHUW\DQG FRS\ULJKW1DWLRQVKDYHVWUHQJWKHQHGGLSORPDWLFRSHQFKDQQHOVUHJDUGLQJ F\EHUSROLF\UHLWHUDWLQJWKHLUFRPPLWPHQWWREULGJHWKHGLJLWDOGLYLGH DQGLPSURYHDFFHVVWRLQIRUPDWLRQDQGFRPPXQLFDWLRQVWHFKQRORJLHV ,&7V E\UHFRJQL]LQJWKH:6,6GRFXPHQW 21

F 7KH6DIH+DUERU$JUHHPHQW7KLVDJUHHPHQWZDVVLJQHGEHWZHHQWKH 2017 January | 1 No. | 1 Volume | 86'HSDUWPHQWRI&RPPHUFHDQGWKH(XURSHDQ8QLRQDQGUHJXODWHV WKHZD\WKDW86FRPSDQLHVFDQH[SRUWDQGKDQGOHWKHSHUVRQDOGDWDRI (XURSHDQFLWL]HQVIRUWKH¿UVWWLPH 22

US Cybersphere Operational Structure 'XHWRWKHFRPSOH[LW\RIFRRUGLQDWLRQIUDJPHQWHGUHVSRQVLELOLWLHVDQG RYHUODSSLQJRYHUVLJKWWKHPXOWLIDFHWHGF\EHUVSDFHLVVDWXUDWHGZLWKPLOLWDU\ Cyber, Intelligence, and Security Security and Intelligence, Cyber, WKLQNWDQNVDFDGHPLDSULYDWHVHFWRUDQGJRYHUQPHQWLQVWLWXWLRQVEUDQFKHV DQGRI¿FHV$WWKHQDWLRQDOOHYHOLVWKH,QWHOOLJHQFH&RPPXQLW\ZKLFKKDV ERWKGHIHQVLYHDQGRIIHQVLYHFDSDELOLWLHVDQGKDVWKHXOWLPDWHUHVSRQVLELOLW\ LQDGGUHVVLQJDQGPRQLWRULQJPRGHUQF\EHUZDUIDUH:KHWKHULWLVDQDWWDFN DJDLQVWPLOLWDU\RUJRYHUQPHQWRI¿FHVRUDVLJQL¿FDQWDWWDFNDJDLQVWDSULYDWH LQVWLWXWLRQRUFULWLFDOLQIUDVWUXFWXUHWKH,&KROGVWKHRSHUDWLRQDOUHVSRQVLELOLW\ IRUDOODVSHFWVRIWKH8QLWHG6WDWHV¶F\EHUVSKHUH (VWDEOLVKHGLQWKH,&LVDIHGHUDWLRQRIVHYHQWHHQ86JRYHUQPHQW DJHQFLHVWKDWZRUNVHSDUDWHO\DQGWRJHWKHUWRFRQGXFWLQWHOOLJHQFHDFWLYLWLHV 23 0HPEHURUJDQL]DWLRQVLQFOXGHLQWHOOLJHQFHDJHQFLHVPLOLWDU\LQWHOOLJHQFH FLYLOLDQLQWHOOLJHQFHDQGDQDO\VLVRI¿FHVZLWKLQIHGHUDOH[HFXWLYHGHSDUWPHQWV DOOKHDGHGE\WKHGLUHFWRURI1DWLRQDO,QWHOOLJHQFHZKRUHSRUWVGLUHFWO\WRWKH SUHVLGHQW 24 :KLOHPRVWRIWKHDVVRFLDWHGDJHQFLHVDUHRI¿FHVRUEXUHDXVZLWKLQ IHGHUDOH[HFXWLYHGHSDUWPHQWVQLQHRIWKHPRSHUDWHXQGHUWKH'HSDUWPHQW RI'HIHQVHDQGWRJHWKHUVSHQGSHUFHQWRIWKHWRWDO86LQWHOOLJHQFHIXQGV 7UDGLWLRQDOLQWHOOLJHQFHJDWKHULQJUHOLHVRQDFRXQWHUWHUURULVP¶VLQWHOOLJHQFH F\FOHZKLFKLQFOXGHVKXPDQLQWHOOLJHQFH +80,17 VLJQDOVLQWHOOLJHQFH 6,*,17 LPDJHU\LQWHOOLJHQFH ,0,17 DQGPHDVXUHPHQWDQGVLJQDWXUH LQWHOOLJHQFH 0$6,17 :KLOHDOOGLVFLSOLQHVDUHVWLOOQHHGHGWRIRUPDQ LQFOXVLYHLQWHOOLJHQFHDVVHVVPHQWF\EHUDQGFU\SWRORJ\FDSDELOLWLHVKDYH OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

38 JDLQHGPRUHUHFRJQLWLRQDVWKHQHHGIRULQYHVWPHQWLQKXPDQFDSLWDODQG UHVRXUFHVULVHVDQGDVWKHZRUOG¶VUHOLDQFHRQWHFKQRORJ\LQFUHDVHV 7KH,&IRFXVHVRQWKUHHDVSHFWVRIPDLQWDLQLQJF\EHUVHFXULW\RUJDQL]DWLRQ GHWHFWLRQDQGGHWHUUHQFH9DULRXVRUJDQL]DWLRQVZLWKLQWKH,&SXUVXHGLIIHUHQW WDVNV 25 7KH2I¿FHRIWKH'LUHFWRURI1DWLRQDO,QWHOOLJHQFH 2'1, KHDGV DWDVNIRUFHFRRUGLQDWLQJHIIRUWVWRLGHQWLI\VRXUFHVRIIXWXUHF\EHUDWWDFNV 7KH'HSDUWPHQWRI+RPHODQG6HFXULW\ '+6 OHDGVWKHSURWHFWLRQRI JRYHUQPHQWFRPSXWHUV\VWHPV7KH'R'GHYLVHVVWUDWHJLHVIRUSRWHQWLDO

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | F\EHUFRXQWHUDWWDFNV7KH1DWLRQDO6HFXULW\$JHQF\ 16$ PRQLWRUVGHWHFWV UHSRUWVDQGUHVSRQGVWRF\EHUWKUHDWV7KH)HGHUDO%XUHDXRI,QYHVWLJDWLRQ )%, OHDGVQDWLRQDOHIIRUWVWRLQYHVWLJDWHDQGSURVHFXWHF\EHUFULPHV0DQ\ RWKHUF\EHURUJDQL]DWLRQVRXWVLGHWKH,&¶VXPEUHOODDGGUHVVF\EHUWKUHDWV WKHPRVWSURPLQHQWRIZKLFKLVWKH86&\EHU&RPPDQG 86&<%(5&20  'XULQJDFULVLVWKH,&DVVHVVHVLQWHOOLJHQFHZLWKLQLWVVHYHQWHHQDJHQFLHV DQGWKHQIRUPXODWHVRYHUDOOLQWHOOLJHQFHUHFRPPHQGDWLRQVE\WKH2'1,

Cyber, Intelligence, and Security Security and Intelligence, Cyber, ,Q-DPHV&ODSSHUWKHGLUHFWRURI1DWLRQDO,QWHOOLJHQFHZKRRYHUVHHV WKH,&DQGLVUHVSRQVLEOHIRUWKHFRPSOH[FRRUGLQDWLRQEHWZHHQDOOWKHDUPV RIWKH,&UHOHDVHGDULVNDVVHVVPHQWLQZKLFKF\EHUWKUHDWVWRSWKHOLVWRI JOREDOWKUHDWV 26 DKHDGRISK\VLFDOWHUURULVPIRUWKH¿UVWWLPHVLQFHWKHDWWDFNV RI6HSWHPEHU$OWKRXJKF\EHUDWWDFNVDJDLQVWWKH8QLWHG6WDWHVDUH constant and on the rise, 27 &ODSSHUUHIHUUHGWRWKHSRVVLELOLW\RID³F\EHU $UPDJHGGRQ´ DND³F\EHU3HDUO+DUERU´RU³F\EHU´   DVFXUUHQWO\ UHPRWH5DWKHUWKDQD³F\EHU$UPDJHGGRQ´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¿FDQWOHYHORIH[SHUWLVHWRH[HFXWHLWLWGRHVQRWQHFHVVLWDWH VWDWHOHYHO¿QDQFLDODELOLWLHVRUZRUOGFODVVRSHUDWLRQDOWDOHQW$JLYHQDFWRU ZKHWKHUDQDWLRQVWDWHRUDQRQVWDWHJURXSFDQSXUFKDVHPDOZDUHVS\ZDUH ]HURGD\VDQGRWKHUFDSDELOLWLHVRQWKHEODFNPDUNHWDQGFDQSD\H[SHUWV WRVHDUFKIRUYXOQHUDELOLWLHVDQGGHYHORSH[SORLWV,QDJOREDOHQYLURQPHQW EULPPLQJZLWKDGYHUVDULHVDVZHOODVDODFNRILQWHUQDWLRQDOF\EHUODZVDQG OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

39 clear regulations, these threats have created a dangerous and uncontrolled PDUNHWZKLFKVHUYHVPXOWLSOHDFWRUVZLWKLQWKHLQWHUQDWLRQDOV\VWHP 30 Despite the increase in F\EHU DFWLYLW\ E\ non state actors, top 86 intelligence RI¿FLDOV still EHOLHYH that state actors are the greatest threat in F\EHUVSDFH to 86 interests  The ,& LGHQWL¿HV several potential actors who PD\ cause a F\EHU crisis, including nation states with KLJKO\ sophisticated F\EHU SURJUDPV , such as Russia or &KLQD31 nations with lesser technical FDSDELOLWLHV , EXW SRVVLEO\ PRUH disruptive intent, such as ,UDQ or 1RUWK Korea  nonstate actors with

DFFHVVLELOLW\ to VLJQL¿FDQW resources and PRWLYDWLRQ to create F\EHU chaos  and 2017 January | 1 No. | 1 Volume | SUR¿WPRWLYDWHG FULPLQDOV and LGHRORJLFDOO\PRWLYDWHG hackers or H[WUHPLVWV The various SRVVLEOH targets include: D 7KH3ULYDWHVHFWRU7KLVVHFWRULVLGHQWL¿HGQRWRQO\DVDYLFWLPRI F\EHUDWWDFNVEXWDOVRDVDSDUWLFLSDQWLQLQYHVWLJDWLRQVDQGDWWULEXWLRQ *LYHQWKHLPSRUWDQFHRI¿QDQFLDOLQVWLWXWLRQV HJ*ROGPDQ6DFKV WRWKH HFRQRP\LQWKHLUGHSHQGHQF\RQWHFKQRORJ\WKLVVHFWRULVDQLPSRUWDQW 32

¿HOGWRGHIHQGLQFDVHRIDVHULRXVDWWDFN Security and Intelligence, Cyber, E &ULWLFDOLQIUDVWUXFWXUH7KHFULWLFDOLQIUDVWUXFWXUH²WKHSK\VLFDODQGYLUWXDO DVVHWVV\VWHPVDQGQHWZRUNVYLWDOWRQDWLRQDODQGHFRQRPLFVHFXULW\ KHDOWKDQGVDIHW\²LVYXOQHUDEOHWRF\EHUDWWDFNVE\IRUHLJQJRYHUQPHQWV FULPLQDOHQWLWLHVDQGORQHDFWRUV$ODUJHVFDOHDWWDFNFRXOGWHPSRUDULO\ KDOWWKHVXSSO\RIZDWHUHOHFWULFLW\DQGJDVKLQGHUWUDQVSRUWDWLRQDQG FRPPXQLFDWLRQVDQGFULSSOH¿QDQFLDOLQVWLWXWLRQV 33 F *RYHUQPHQW3HQHWUDWLQJWKH86QDWLRQDOGHFLVLRQPDNLQJDSSDUDWXV DQG,QWHOOLJHQFH&RPPXQLW\ZLOOUHPDLQSULPDU\REMHFWLYHVIRUIRUHLJQ LQWHOOLJHQFHHQWLWLHV$GGLWLRQDOO\WKHWDUJHWLQJRIQDWLRQDOVHFXULW\ LQIRUPDWLRQDQGSURSULHWDU\LQIRUPDWLRQIURP86UHVHDUFKLQVWLWXWLRQV GHDOLQJZLWKGHIHQVHHQHUJ\¿QDQFHGXDOXVHWHFKQRORJ\DQGRWKHU DUHDVZLOOEHDSHUVLVWHQWWKUHDWWR86LQWHUHVWV 34 G 0LOLWDU\DQGJRYHUQPHQWDJHQFLHV7KHVHDUHWKHIURQWOLQHRIERWKGHIHQVH DQGRIIHQVHDVLWVLQIUDVWUXFWXUHPXVWGHIHQGWKHHQWLUHQDWLRQDVZHOO DVLWVRZQUHVRXUFHVLQFDVHRIDIXOOVFDOHF\EHUFRQÀLFW,&DVVXPHV WKDWLQDF\EHUFULVLVWKLV³FRQWDFWOLQH´ZLOOEHDWWDFNHGDQGGDPDJHG

The Intelligence Community Policies 7KH,&FRQGXFWVDYDULHW\RILQWHOOLJHQFHRSHUDWLRQVRQDGDLO\EDVLV7KH 8QLWHG6WDWHVLVXQGHUFRQVWDQWF\EHUDWWDFNIURPERWKVWDWHDQGQRQVWDWH OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

40 DFWRUV2QWKHQDWLRQDOLQWHOOLJHQFHOHYHOEHLQJXQGHUF\EHUDWWDFNPHDQV QRWRQO\DGHIHQVLYHHIIRUWEXWDOVRGHVLJQLQJYDULRXVRSHUDWLRQDORSWLRQV IRUUHWDOLDWLRQ*LYHQLWVVL]HWKH,&LQWHUDFWVDQGFROODERUDWHVZLWKDJHQFLHV RQWKHRSHUDWLRQDOOHYHO PLOLWDU\'R''+6 DQGWKHVWDWHDQGIHGHUDOOHYHO SULYDWHVHFWRURQDODUJHVFDOH'HSDUWPHQWRI6WDWH:KLWH+RXVH  7KH,&¶VVWUDWHJLFSUHSDUDWLRQJRDOV 35 include: D %XLOGLQJDQGPDLQWDLQLQJUHDG\IRUFHVDQGFDSDELOLWLHVWRFRQGXFW F\EHUVSDFHRSHUDWLRQV

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | E 'HIHQGLQJLWVRZQLQIRUPDWLRQQHWZRUNVHFXULQJGDWDDQGPLWLJDWLQJ ULVNVWRPLVVLRQV F 3UHSDULQJWRGHIHQG86KRPHODQGDQG86YLWDOLQWHUHVWVDJDLQVWGLVUXSWLYH RUGHVWUXFWLYHF\EHUDWWDFNVRIVLJQL¿FDQWFRQVHTXHQFH G %XLOGLQJDQGPDLQWDLQLQJYLDEOHF\EHURSWLRQVDQGSODQQLQJWRXVHWKRVH RSWLRQVWRFRQWUROFRQÀLFWHVFDODWLRQDQGWRDFWLYHO\H[WUDFWLQIRUPDWLRQ WRSUHSDUH³WDUJHWEDQNV´

Cyber, Intelligence, and Security Security and Intelligence, Cyber, H %XLOGLQJDQGPDLQWDLQLQJUREXVWLQWHUQDWLRQDODOOLDQFHVDQGSDUWQHUVKLSV WRGHWHUVKDUHGWKUHDWVDQGLQFUHDVHLQWHUQDWLRQDOVHFXULW\DQGVWDELOLW\

,&¶VSROLF\RIF\EHUDWWDFNUHVSRQVHLVDVIROORZV D ,GHQWLI\LQJDWWDFNV$VSDUWRIWKHPRGHUQF\EHUEDWWOH¿HOGVRSKLVWLFDWHG DWWDFNHUVZLOODWWHPSWWRFRQFHDOWKHDWWDFN-XVWDVLQDFRQYHQWLRQDO FRQÀLFWLQWHOOLJHQFHLVQHHGHGWRSUHSDUHWKHEDWWOHJURXQGDQGDFFXUDWHO\ DVVHVVWKHSUREDELOLW\RIVXFFHVVDQGXWLOLW\IRUDQ\NLQGRIRSHUDWLRQ  E ,QIRUPLQJ$OWKRXJKWKH,&KDVVLJQL¿FDQWRIIHQVLYHDELOLWLHVLWVPDLQ UROHLVWRDVVHVVLQIRUPDQGUHSRUW7KH,&PXVWLQIRUPWKHRSHUDWLRQDO DUPVLWFROODERUDWHVZLWKDQGWKH6WDWH'HSDUWPHQW7KDWLVXQGHUDWWDFN WKH,&¶VVXFFHVVLVPHDVXUHGE\WKHSUHFDXWLRQVLWJDYHSULRUWRWKHDWWDFN DQGE\LWVUHVSRQVLYHQHVVFRPPXQLFDWLRQDQGJXLGDQFHGXULQJWKHDWWDFN F 3URYLGLQJ options: The ,& PXVW provide a set RI options to decision PDNHUV and HQDEOH strategic ÀH[LELOLW\ E\ providing YDOXDEOH LQIRUPDWLRQ The ,& DGPLQLVWHUV guidance during attack and provides strategic operational and political OHHZD\ with its UHFRPPHQGDWLRQV and intelligence DVVHVVPHQW G 'DPDJH $VVHVVPHQW : 8QOLNH the conventional EDWWOH¿HOG , a F\EHUDWWDFN PD\ EH hard to detect at WLPHV , even LI it is a large scale attack  The ,& PXVW assess the GDPDJH caused so that it can provide SROLF\PDNHUV with the DELOLW\ to retaliate in a PHDVXUDEOH PDQQHU This does not QHFHVVDULO\ require operational HIIRUWV during an attack, EXW rather DVVHVVPHQW , OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

41 coordination, and LQIRUPDWLRQsharing with other RI¿FHV so that there is an HI¿FLHQW ÀRZ RI LQIRUPDWLRQ

Multidimensional Cyber Response 7KH,&¶VUROHRYHUODSVLQPDQ\ZD\VZLWKGLIIHUHQWLQVWLWXWLRQVJRYHUQPHQWDO GHSDUWPHQWVDQGPLOLWDU\XQLWVPDQ\RIZKLFKLVRXWRILWVMXULVGLFWLRQ :KLOHLWGRHVQRWVLQJXODUO\KDYHUHVSRQVLELOLW\IRUF\EHUUHVSRQVHDWWKH QDWLRQDORUVWDWHOHYHOWKH,&GHPDQGVDFRPSOH[FKDLQRILQIRUPDWLRQÀRZ

DQGKLHUDUFK\2WKHULQVWLWXWLRQVWKDWSURYLGHF\EHUUHVSRQVHVDUH 2017 January | 1 No. | 1 Volume | D 'HSDUWPHQWRI+RPHODQG6HFXULW\$VSDUWRILWVUROHWRSURWHFWWKH8QLWHG 6WDWHV¶WHUULWRULHVDQGUHVSRQGWRWHUURULVWDWWDFNVPDQPDGHDFFLGHQWV DQGQDWXUDOGLVDVWHUVWKH'+6LVLQFKDUJHRI&RDVW*XDUG,QWHOOLJHQFH &*, DQGWKH2I¿FHRI,QWHOOLJHQFHDQG$QDO\VLV , $ 7KHODWWHULV UHVSRQVLEOHIRUPDQDJLQJWKHFROOHFWLRQDQDO\VLVDQGIXVLRQRILQWHOOLJHQFH 7KH2I¿FHRI, $GLVVHPLQDWHVLQWHOOLJHQFHWKURXJKRXWWKH'+6DQGWR WKHRWKHUPHPEHUVRIWKH,&FRPPXQLW\DQGLVWKH¿UVWUHVSRQGHUDWWKH Cyber, Intelligence, and Security Security and Intelligence, Cyber, VWDWHORFDODQGWULEDOOHYHOV 37 7KH2'1,LVUHVSRQVLEOHIRUDQHI¿FLHQW LQIRUPDWLRQÀRZEHWZHHQWKHUHVWRIWKHLQWHOOLJHQFHFRPPXQLW\DQG WKH'+6LQRUGHUWRFUHDWHV\QHUJ\RILQIRUPDWLRQGXULQJDF\EHUDWWDFN E 'HSDUWPHQWRI'HIHQVH 'R' &RQVLGHUHGWKHIRFDOSRLQWIRUWKH LQWHOOLJHQFHFRPPXQLW\¶VRSHUDWLRQDOVRXUFHDQGOHDGLQJQLQHRILWV DJHQFLHVLQFOXGLQJWKH16$WKH'R'LVWKH2'1,¶VPDLQVRXUFHRIF\EHU LQWHOOLJHQFH$VVXFKWKH'LUHFWRURI1DWLRQDO,QWHOOLJHQFH '1, RIWHQ UHSRUWVWRGHFLVLRQPDNHUVDQGWKH:KLWH+RXVHEDVHGRQWKHLQWHOOLJHQFH UHFHLYHGIURPWKH'R',QDGGLWLRQWKH16$DQG&<%(5&20OHGE\ $GPLUDO0LFKDHO5RJHUVDQGWKH'1,ZRUNFORVHO\WRJHWKHUGXULQJDQ DWWDFN,WLVQHFHVVDU\WKDWWKHRSHUDWLRQDOGDWDVWUHDPEHSURFHVVHGWKURXJK WKH2'1,DQGUHFHLYHGDVSROLF\UHFRPPHQGDWLRQVDWWKHIHGHUDOOHYHO F 6WDWH'HSDUWPHQW7KHJRYHUQPHQWLVGHSHQGHQWRQWKH,&GXULQJD F\EHUFULVLV8QOLNHLQFRQYHQWLRQDOFRQÀLFWVLWLVVDIHWRDVVXPHWKDW GHFLVLRQPDNHUVRIWHQGRQRWNQRZZKDWKDVKDSSHQHGDQGGRQRWNQRZ WKHRULJLQRIDQDWWDFNLQDF\EHUFULVLVVFHQDULR,WLVXSWRWKH,&WR SURYLGHDQLQWHOOLJHQFHDVVHVVPHQWLQDWLPHO\PDQQHUDQGWRSDVVRQWKH GDWD6PDOOFHQWHUVWKDWDUHWUXVWHGWRHYDOXDWHDQGFRRUGLQDWHVHUYHDV OLDLVRQVEHWZHHQVWDWHLQVWLWXWLRQVDQGWKHF\EHULQWHOOLJHQFH¿HOGVXFK DVWKH1DWLRQDO&\EHUVHFXULW\DQG&RPPXQLFDWLRQV,QWHJUDWLRQ&HQWHU OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

42 1&&,& WKH8QLWHG6WDWHV&RPSXWHU(PHUJHQF\5HDGLQHVV7HDP 86 &(57 DQGWKH&\EHU7KUHDW,QWHOOLJHQFH,QWHJUDWLRQ&HQWHU &7,,&  6WDWLRQHGLQWKH2I¿FHRIWKH'LUHFWRURI1DWLRQDO,QWHOOLJHQFHWKHODWWHU ZLOOPLUURUWKHHIIRUWVDQGDVVHVVPHQWVIRUFRXQWHUWHUURULVPLQIRUPDWLRQ VKDULQJGXULQJF\EHUDWWDFNV  G 3ULYDWH6HFWRU,QIUDVWUXFWXUHF\EHUEUHDFKHVDQGDWWDFNVKDYHEHHQ GH¿QHGDVWKHQXPEHURQHWKUHDWRIWKH8QLWHG6WDWHVLQE\WKH'1, 7KH,QIRUPDWLRQ6KDULQJDQG$QDO\VLV&HQWHU ,6$& LVWKHPDLQDFWRU

| Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | LQRYHUVHHLQJSULYDWHVHFWRUF\EHUWKUHDWVDV,6$&DVVLVWVIHGHUDODQG ORFDOJRYHUQPHQWVZLWKLQIRUPDWLRQSHUWDLQLQJWRF\EHUWKUHDWV3ULYDWH VHFWRUF\EHUFULVHVPD\DIIHFWQDWLRQDOLQWHUHVWV HJWKH6RQ\LQFLGHQW  DQGWKXVLQFROODERUDWLRQZLWK'+6'HSDUWPHQWRI6WDWHDQGWKH)%, WKHSULYDWHVHFWRUGHPDQGVWKDWDQRSHUDWLRQDOLQWHOOLJHQFHDSSURDFKEH WDNHQDWWKHQDWLRQDOOHYHO

Conclusions Cyber, Intelligence, and Security Security and Intelligence, Cyber, 7KHKLVWRU\RIF\EHUZDUIDUHSRVHVPDQ\OHVVRQVDQGPD\LQGLFDWHWKH SURJUHVVLRQDQGGLUHFWLRQRIWKHF\EHUVSKHUHDVZHOODVWKHFRPSUHKHQVLYH DWWHQWLRQUHTXLUHGE\WKH¿HOGDWDOOOHYHOV&\EHUZDUIDUH¶VQDWXUDOHYROXWLRQ LVDQLPSRUWDQWWRROWRDVVHVVPLVWDNHVDQGSURMHFWWKHIXWXUHRIWKHLQIRVSKHUH SULYDF\UHJXODWLRQVF\EHUHVSLRQDJHDQGF\EHUVHFXULW\QHHGV3ROLF\PDNHUV DUHDGGUHVVLQJWKHF\EHUVSKHUHWRGD\PRUHVHULRXVO\WKDQHYHUEHIRUHDQG LQVWLWXWLRQVDWDOOOHYHOVDUHGLUHFWLQJVXEVWDQWLDOUHVRXUFHVWRDGGUHVVF\EHU WKUHDWV,QWHOOLJHQFHDJHQFLHVFRQVWDQWO\DUHSHUIHFWLQJWKHLUGHIHQVLYHDQG RIIHQVLYHF\EHUFDSDELOLWLHV3ULYDWHLQVWLWXWLRQVHVSHFLDOO\LQWKH¿HOGVRI PHGLFLQH¿QDQFHFULWLFDOLQIUDVWUXFWXUHDQGHQHUJ\LQDGGLWLRQWRGDWDGULYHQ FRUSRUDWLRQVDOORFDWHPRUHUHVRXUFHVDQGKXPDQSRZHUWRGDWDSURWHFWLRQ DQGF\EHUVHFXULW\WKDQHYHUEHIRUH/DVWO\WKH$PHULFDQJRYHUQPHQWLV DZDUHRIWKHULVNVWRLWVRZQQHWZRUNVDQGZKLOHEUHDFKHVDUHPRUHFRPPRQ WKDQHYHULQYHVWPHQWVWRQXUWXUHDPRUHGHIHQVLEOHF\EHUVSDFHDUHDWDQ DOOWLPHSHDN 7KHUHDUHVHYHUDOIXQGDPHQWDOSROLF\UHDOL]DWLRQVDWWKHLQWHUQDWLRQDOOHYHO 0RVWSROLF\PDNHUVDQGOHJLVODWRUVGRQRWKDYHDFRPSUHKHQVLYHFDSDFLW\WR DGGUHVVLQWHUQDWLRQDOF\EHUDWWDFNV)RUH[DPSOHWKHUHLVQRWDQDOOLQFOXVLYH GH¿QLWLRQIRU³DFWVRIZDU´LQWKHQRQNLQHWLFVSKHUHDQGWKHH[LVWLQJ GH¿QLWLRQVDUHXQFOHDUDQGQRWVKDUHGDQGDJUHHGXSRQDWWKHLQWHUQDWLRQDO OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

43 OHYHO0RUHRYHUUHWDOLDWLRQPHFKDQLVPVIRUD¿QDQFLDOF\EHUFULVLVDUHQRWLQ SODFHSUHYHQWLQJQDWLRQVWDWHVIURPDWWULEXWLQJODUJHVFDOHDWWDFNVWRVSHFL¿F DWWDFNHUVDQGDOORZLQJRWKHUDFWRUVWRDYRLGDFFRXQWDELOLW\,QWHUQDWLRQDO FROODERUDWLRQDWDOOOHYHOVHVSHFLDOO\LQWKH¿QDQFLDOGLSORPDWLFDQGWKH MXGLFLDU\IURQWVDUHLQQHHGDVDODFNRIFROODERUDWLRQPD\SUHYHQWDVWDEOH IRXQGDWLRQXSRQZKLFKDFFRXQWDELOLW\PHFKDQLVPVFDQEHIRUPHG'HVSLWH WKHJURZLQJPXOWLVHFWRULQYHVWPHQWVLQF\EHUVHFXULW\PRUHVRSKLVWLFDWHG DWWDFNVKDYHWDNHQSODFHLQWKHODVWWKUHH\HDUVWKDQSUHYLRXVO\7KHUHIRUHLW

DSSHDUVWKDWRQO\PXOWLQDWLRQDOVXEVWDQWLDODQGELQGLQJF\EHUDJUHHPHQWV 2017 January | 1 No. | 1 Volume | DQGSURJUHVVLYHLQWHUQHWJRYHUQDQFHOHJLVODWLRQZLOODOORZIRUDVXEVWDQWLDOO\ VDIHUF\EHUVSKHUH 2QWKHVHFXULW\IURQWWKH,&IRUPVQDUUDWLYHDQGRSHUDWLRQDO UHFRPPHQGDWLRQVWRSROLF\PDNHUVGXHWRLWVFRRUGLQDWLRQDELOLW\DQGYDVW MXULVGLFWLRQ7KHELJJHVWFKDOOHQJHGXULQJDF\EHUDWWDFNLVWRLGHQWLI\DQG FRQQHFWWKHGLIIHUHQWGRWVIRUJHQHUDWLQJDUHVSRQVLEOHDQGPHDVXUDEOH

UHVSRQVH:LWKRXWDERG\OLNHWKH,&WKHDEXQGDQFHRIGDWDZRXOGJHWORVW Security and Intelligence, Cyber, LQDPD]HRILQIRUPDWLRQ-XVWOLNHLQDNLQHWLFEDWWOH¿HOGWKHGHIHQVHOLQH ZLOOHYHQWXDOO\EHSHQHWUDWHGJLYHQDSHUVLVWHQWDWWDFNHU8QOLNHWKHFODVVLF EDWWOH¿HOGKRZHYHUDJLYHQF\EHUDWWDFNPD\QRWEHVHHQDWWULEXWLRQPD\ QRWEHSODXVLEOHDQGWKHLPSDFWPD\QRWEHQRWLFHDEOH&\EHUWHUURULVPPD\ EHFRPHDJURZLQJFRQFHUQZLWKWLPHDQGPD\UHTXLUHJUHDWHULQWHUQDWLRQDO LQWHOOLJHQFHFROODERUDWLRQVWKDQHYHU,QWHUQDOQDWLRQDOLQWHOOLJHQFHVHFXULW\ DJHQFLHVPD\EHIRUFHGWRFKDQJHGLVFLSOLQHVDQGVKLIWWKHLUVWUDWHJLF DWWHQWLRQ,WLVWKXVSODXVLEOHWRSURMHFWWKDWLQWKHIXWXUHQXFOHDUZHDSRQV ZLOOQRORQJHUEHWKHXOWLPDWHDQGJUHDWHVWWKUHDW

Notes  -DVRQ+HDOH\HG $)LHUFH'RPDLQ&RQÀLFWLQ&\EHUVSDFHWR 9LHQQD9$&\EHU&RQÀLFW6WXGLHV$VVRFLDWLRQ   7HG(LVHQEHUJHWDO“7KH&RUQHOO&RPPLVVLRQ2Q0RUULVDQGWKH:RUP´ Communications of the ACM QR  ±KWWSSRUWDODFPRUJ FLWDWLRQFIP"LG   'XULQJWKH0RUULVDSSHDOSURFHVVWKH86&RXUWRI$SSHDOVHVWLPDWHGWKHFRVW RIUHPRYLQJWKHYLUXVIURPHDFKLQVWDOODWLRQZDVLQWKHUDQJHRI± 3RVVLEO\EDVHGRQWKHVHQXPEHUV+DUYDUGVSRNHVPDQ&OLIIRUG6WROOHVWLPDWHGWKH WRWDOHFRQRPLFLPSDFWZDVEHWZHHQWR  (LVHQEHUJHWDO³7KH&RUQHOO&RPPLVVLRQ2Q0RUULVDQGWKH:RUP´ OMRY HAIZLER | THE UNITED STATES’ CYBER WARFARE HISTORY

44  0LFKDHO5XVWDGDQG'LDQH'¶$QJHOR³7KH3DWKRI,QWHUQHW/DZ$Q$QQRWDWHG *XLGHWR/HJDO/DQGPDUNV´LQ Duke Law & Technology Review HG %HDWULFH+DKQ 'XUKDP'XNH8QLYHUVLW\6FKRRORI/DZ   8QLWHG6WDWHVY0RUULV G&LU XSKROGLQJWKHFRQYLFWLRQRIDFRPSXWHU VFLHQFHJUDGXDWHVWXGHQWXQGHUWKH&RPSXWHU)UDXGDQG$EXVH$FW 7 Hearing before Committee on Governmental Affairs, US Senate  0DUFK  WHVWLPRQ\RI-DPHV$GDPV&KLHI([HFXWLYH2I¿FHU,QIUDVWUXFWXUH'HIHQVH,QF   $GDP(ONXV³0RRQOLJKW0D]H´LQ $)LHUFH'RPDLQ&RQÀLFWLQ&\EHUVSDFH WR  5\DQ5LFKDUG*HOLQDV³&\EHUGHWHUUHQFHDQGWKH3UREOHPRI$WWULEXWLRQ ,´ | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | PDVWHU¶VWKHVLV*HRUJHWRZQ8QLYHUVLW\ KWWSSDSHUVHHEXJRUJSDSHUV $37$37B&\EHU&ULPLQDOB&DPSDJLQKLVWRULFDOJHOLQDV5\DQSGI  0DUFLD0F*RZDQ³

45  ([HFXWLYH2UGHU1R8QLWHG6WDWHV,QWHOOLJHQFH$FWLYLWLHV 'HFHPEHU  &HQWUDO,QWHOOLJHQFH$JHQF\KWWSVZZZFLDJRYDERXWFLDHRKWPO  ³7KH2UJDQL]DWLRQDO$UUDQJHPHQWVIRUWKH,QWHOOLJHQFH&RPPXQLW\´ of American Scientists )HEUXDU\KWWSIDVRUJLUSRIIGRFVLQWKWPO  (ULF5RVHQEDFKDQG$NL-3HULW]³&\EHU6HFXULW\DQGWKH,QWHOOLJHQFH &RPPXQLW\´LQ Confrontation or Collaboration? Congress and the Intelligence Community HG(ULF5RVHQEDFK +DUYDUG.HQQHG\6FKRRO%HOIHU&HQWHUIRU 6FLHQFHDQG,QWHUQDWLRQDO$IIDLUV   Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community, Senate Armed Security Committee  )HEUXDU\  VWDWHPHQWRI -DPHV5&ODSSHU'LUHFWRURI1DWLRQDO,QWHOOLJHQFH  2017 January | 1 No. | 1 Volume |  KWWSZZZGQLJRY¿OHVGRFXPHQWV8QFODVVL¿HGBB$7$B6)5BB6$6&B ),1$/SGI  ³1RUVH,QWHOOLJHQFH3ODWIRUP´1RUVHKWWSPDSQRUVHFRUSFRP  .ULVWHQ(LFKHQVHKU³&\EHUVHFXULW\LQWKH,QWHOOLJHQFH&RPPXQLW\¶V :RUOGZLGH7KUHDW$VVHVVPHQW´ JustSecurity 0DUFKKWWSVZZZ MXVWVHFXULW\RUJF\EHUVHFXULW\XVLQWHOOLJHQFHFRPPXQLW\V ZRUOGZLGHWKUHDWDVVHVVPHQW  ,ELG Cyber, Intelligence, and Security Security and Intelligence, Cyber,  'HSDUWPHQWRI'HIHQVH³7KH'R'&\EHU6WUDWHJ\´$SULO KWWSZZZGHIHQVHJRY3RUWDOVIHDWXUHVBF\EHUVWUDWHJ\)LQDOBB 'R'B&\EHUB6WUDWHJ\BIRUBZHESGI  0DUN3RPHUOHDX³,&OHDGHUV)XWXUHF\EHUDWWDFNVZLOOGRUHDOGDPDJH´ Defense Systems 6HSWHPEHUKWWSVGHIHQVHV\VWHPVFRPDUWLFOHVLF OHDGHUVPDSRXWQDWLRQVWDWHF\EHUWKUHDWVDVS[   ,ELG  $QGUHZ0HROD³&\EHUDWWDFNVDJDLQVWRXUFULWLFDOLQIUDVWUXFWXUHDUHOLNHO\WR LQFUHDVH´ Business Insider 0D\KWWSZZZEXVLQHVVLQVLGHUFRPF\EHU DWWDFNVDJDLQVWRXUFULWLFDOLQIUDVWUXFWXUHDUHOLNHO\WRLQFUHDVH  ,ELG  ,ELG  $DURQ%UDQWO\³'H¿QLQJWKHUROHRILQWHOOLJHQFHLQF\EHU´LQ Understanding the Intelligence Cycle ed  0DUN3K\WKLDQ /RQGRQDQG1HZ