INFOWAR: Introduction to Cyberwarfare
Total Page:16
File Type:pdf, Size:1020Kb
INFOWAR Class Notes INFOWAR: Overview Part 1: Introduction to Information Introduction to Warfare Part 2: Weapons Cyberwarfare Part 3: Military M. E. Kabay, PhD, CISSP-ISSMP Perspectives Part 4: Cyberdefense Professor of Computer Information Systems Policy Issues School of Business & Management Part 5: Emerging College of Professional Schools Vulnerabilities & Norwich University Threats 1 Copyright © 2016 M. E. Kabay. All rights reserved. 2 Copyright © 2016 M. E. Kabay. All rights reserved. Part 1: Introduction to Introduction Information Warfare Definition* Offensive and defensive use Introduction of information & information Vulnerabilities systems Goals and Objectives To deny, exploit, corrupt or Sources of Threats and Attacks destroy Weapons of Cyberwar An adversary’s information, NOTE: information-based processes, References to “CSH6” are to this textbook: information systems, and Bosworth, S., M. E. Kabay, & E. Whyne (2014), eds. Computer Security computer-based networks Handbook, 6th Edition. Wiley (ISBN 978-0471716525). 2 volumes, 2240 pp. AMAZON < http://www.amazon.com/Computer-Security-Handbook-Seymour- While protecting one’s own. Used with permission of Bosworth/dp/1118127064/ > or Designed to achieve Robert Duffy, Avalon5.com < http://tinyurl.com/ldg9c8r > advantages over military or business See in particular Chapter 14: “Information Warfare” by S. Bosworth. _____________adversaries. *Dr Ivan Goldberg, Institute for Advanced Study of Information Warfare 3 Copyright © 2016 M. E. Kabay. All rights reserved. 4 Copyright © 2016 M. E. Kabay. All rights reserved. Vulnerabilities Critical Infrastructure Presidential Decision Directive 63 (PDD-63) President Clinton (1998) Critical Infrastructure http://www.fas.org/irp/offdocs/pdd-63.htm COTS Software Defined US critical infrastructure includes Dissenting Views Telecommunications Rebuttal Energy Banking and finance Transportation Water systems Emergency services These systems are vulnerable to asymmetric warfare – effective attack by much weaker adversaries (e.g., Mafia Boy vs AMAZON & eBAY in 2000) 5 Copyright © 2016 M. E. Kabay. All rights reserved. 6 Copyright © 2016 M. E. Kabay. All rights reserved. Copyright © 2016 M. E. Kabay 1 All rights reserved. INFOWAR Class Notes COTS Software Dissenting Views Military and civilian sectors both depend on COTS Some critics dismiss discussion of cyberwar as FUD (commercial off-the-shelf ) software Fear, Uncertainty and Doubt Microsoft OS has become Designed to increase sales of hardware, software monoculture and consulting services Continues to be vulnerable to Personal attacks on early promulgators of information subversion warfare doctrine Allows study and exploitation by Controversial figure: Winn Schwartau adversaries Author of novel Terminal Compromise Some hardware being manufactured Nonfiction Information Warfare and in potentially hostile nations Cybershock texts Much manufacturing in PRC Lampooned as wild-eyed Some claims of hardware Trojans (e.g., self-publicist keyboard equipped with keylogger) Actually a committed security expert 7 Copyright © 2016 M. E. Kabay. All rights reserved. 8 Copyright © 2016 M. E. Kabay. All rights reserved. Rebuttal to FUD claims Goals and Objectives of IW Growing evidence of asymmetric use of information systems in conflicts Military Industrial espionage from PRC Government growing Transportation Conflicts around world demonstrate role Commerce of Internet as tool and target Financial Disruptions India/Pakistan Medical Security Bosnia Koreas Law Enforcement Iranian unrest in June 2009 International & Corporate Espionage Arab Spring ISIS/ISIL/DAESH Communications Potential remains high – e.g., PSYOP using flash crowds to Economic Infrastructure obstruct emergency personnel or create targets for terrorists 9 Copyright © 2016 M. E. Kabay. All rights reserved. 10 Copyright © 2016 M. E. Kabay. All rights reserved. Sources of IW Threats and Military Perspective Attacks US Joint Doctrine for Operations Security (OPSEC) Identifying critical information Nation-States Analyzing friendly actions in military ops Cyberterrorists Identify which ops can be observed by adversaries Corporations Determine what adversaries Activists could learn Criminals Select and apply measures to control vulnerabilities to Hobbyists minimize adversarial exploitation Some discussion of potential offensive cyberoperations US Air Force established AF Cyber Operations Command to be stood up June 2009 Image © 2009 Beatrix Kiddoe. Used under terms of service of Photobucket. US Army established 2009 Army Posture Statement on http://media.photobucket.com/image/threats/BeatrixKiddoe/motivator639310.jpg?o=19 Cyber Operations 11 Copyright © 2016 M. E. Kabay. All rights reserved. 12 Copyright © 2016 M. E. Kabay. All rights reserved. Copyright © 2016 M. E. Kabay 2 All rights reserved. INFOWAR Class Notes Nation-States: Stuxnet Nation-States: China (2010) People’s Republic of China major actor Written to subvert SCADA for People’s Liberation Army doctrine explicitly Siemens centrifuge programmable includes information warfare logic controllers (PLCs) Widespread evidence of Damaged Uranium-enrichment massive probes and attacks centrifuges in Iran originating from China Spun too fast – crashed physically through state sponsorship 60% of Stuxnet infections were in Iran Formal training for cadres Speculations that US & Israel Other countries involved in information warfare wrote Stuxnet Worm ECHELON (SIGINT) organized by UK-USA No direct proof Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United Circumstantial evidence includes codes and States) dates that might be related to Israel Documents supporting view that US involved were released by Edward Snowden in July 2013 13 Copyright © 2016 M. E. Kabay. All rights reserved. 14 Copyright © 2016 M. E. Kabay. All rights reserved. Cyberterrorists Corporations (1) Remains a theoretical possibility Potential for sabotage against rivals Individual criminal-hacker / Documented cases of interference using hobbyist attacks raise concerns computers and networks Documented interference 1999 – BUY.COM underpriced its $588 (mostly pranks) with Hitachi monitors at $164 – perhaps Ground traffic through effects of competing knowbots Emergency 911 systems 2000 – Sun accused Microsoft of corrupting Java to interfere with platform independence Air-traffic control 2000 – Steptoe & Johnson employee accused of Hospital systems…. denial-of-service attack on Moore Publishing Pranksters have been spreading 2000 – AOL accused of interfering with other false news via Twitter (deaths of ISPs by tampering with Internet settings celebrities….) Growing use of insecure wireless systems raises additional concerns for PSYOP 15 Copyright © 2016 M. E. Kabay. All rights reserved. 16 Copyright © 2016 M. E. Kabay. All rights reserved. Corporations (2) Corporations (3) 2005 – FCC investigated phone FBI deems economic espionage serious problem: < company ISP interference with Vonage VoIP https://www.fbi.gov/about- us/investigate/counterintelligence/economic-espionage > 2006 – Businessman selling t-shirts hired hacker to damage competitors using DDoS Infected 2000 PCs with slave programs in botnet Disabled Websites and online sales Jason Arabo (19 years old) sentenced to 30 months prison & $500K restitution Younger hacker (16 years old) sentenced to 5 years prison & $35K restitution 17 Copyright © 2016 M. E. Kabay. All rights reserved. 18 Copyright © 2016 M. E. Kabay. All rights reserved. Copyright © 2016 M. E. Kabay 3 All rights reserved. INFOWAR Class Notes Hacktivists (1) Hacktivists (2) Hacktivists use criminal hacking in support of 1998: Free East Timor (Indonesian Web sites) politics or ideology 1998: Legions of the Underground declared 1989: WANK (Worms cyberwar on Iraq and China Against Nuclear Killers) 1999: Jam Echelon Day: traffic with many keywords thought to spark capture by spy Infected DOE, network HEPNET & NASA networks 2000: World Trade Organization “You talk of times of peace for all, and then Hackers probed Web sites prepare for war.” 700 times 1998: Electronic Disturbance Theater Tried to penetrate barriers 54 times Indigenous peoples’ rights in Chiapas, Mexico Electrohippies launched DoS attack 19 Copyright © 2016 M. E. Kabay. All rights reserved. 20 Copyright © 2016 M. E. Kabay. All rights reserved. Hacktivists (3) Hacktivists (4) 2004: Electronic Disturbance Theater launched DoS on Anonymous (Anon) conservative Web sites during 2003 – 4chan board Republican National Convention No leaders 2008: Project Chanology Focus on defending launched against Church of Wikileaks in 2010-2011 Scientology Attacked Church of 2008: Chinese hackers attacked Scientology CNN Web sites to protest Western media bias QUESTION: doing good or not? 2009: much Web-defacement activity during attack by Israel See extensive list at on Gaza < https://en.wikipedia.org/wiki/Ti meline_of_events_associated_ Guy Fawkes Mask with_Anonymous > 21 Copyright © 2016 M. E. Kabay. All rights reserved. 22 Copyright © 2016 M. E. Kabay. All rights reserved. Hacktivists (5): Criminals (1) Recent Campaigns by Anonymous 2014 Stock manipulation: pump ‘n’ dump schemes Ferguson re shooting of Mike Brown NEI Webworld pump-and-dump (Nov 1999) Operation Hong Kong vs government repression 2 UCLA grad students & associate bought Attacks on Philippine govt for poor response to almost all shares of bankrupt NEI Super Typhoon Yolanda Webworld company 2015 Using