The Cyber Financial Wars on the Horizon: the Convergence of Financial and Cyber Warfare and the Need for a 21St Century National Security Response

The Cyber Financial Wars on the Horizon: the Convergence of Financial and Cyber Warfare and the Need for a 21St Century National Security Response

The Cyber Financial Wars on the Horizon: The Convergence of Financial and Cyber Warfare and the Need for a 21st Century National Security Response Juan C. Zarate Foreword by Stewart Baker July 2015 FOUNDATION FOR DEFENSE OF DEMOCRACIES FOUNDATION The Cyber Financial Wars on the Horizon: The Convergence of Financial and Cyber Warfare and the Need for a 21st Century National Security Response Juan C. Zarate Foreword by Stewart Baker July 2015 FDD PRESS A division of the FOUNDATION FOR DEFENSE OF DEMOCRACIES Washington, DC This report is included in the monograph, Cyber-Enabled“ Economic Warfare: An Evolving Challenge,” edited by Dr. Samantha Ravich and published by the Hudson Institute. The Cyber Financial Wars on the Horizon Table of Contents Foreword .......................................................................................................................................... 3 Introduction ..................................................................................................................................... 4 The Evolution of the Cyber Financial Threat .................................................................................... 6 The Cyber Financial Battles Underway ........................................................................................... 11 Cyber Tools and Actors...................................................................................................................................13 Private and Public Sector Response................................................................................................. 15 A New Cyber-Privateering Framework ........................................................................................... 20 Endnotes ........................................................................................................................................ 28 The Cyber Financial Wars on the Horizon Foreword aggressive adversaries have already empowered what amount to their own privateers to attack our systems. It’s a pleasure to introduce Juan Zarate’s thoughtful With formerly socialist nations showing enthusiasm and innovative monograph on the convergence of for privatized attack, it seems odd for the American financial and cyber warfare. The convergence of the government to insist that our companies should two has elements of irony. The United States has long step back and leave the fight to their government. used financial sanctions to pressure other states. Now, Especially when their government is losing that fight other states are exercising power through cyberattacks so ignominiously. on U.S. financial institutions. And U.S. efforts to protect banks through international “law of cyberwar” Organizing the retribution, in contrast, is likely to norms have only encouraged our adversaries to attack remain a task for government. And here too Juan’s us where it seems to hurt most. creativity and experience point to opportunities, especially in the financial sector. Very few nations want What should the United States do about this new threat? to encourage financial attacks that almost certainly Judging from recent history, neither international cannot be contained inside one nation’s borders. Those norms nor stronger network defenses are a complete who attack financial institutions are the enemies of answer. We can’t defend our way out of this mess any bankers everywhere. Just as the Financial Action Task more than we can defeat street crime by requiring Force set standards to combat money laundering and pedestrians to buy better body armor every year. gradually ostracized the nations that violated those standards, it may be possible to exclude those who We need to do a better job of deterring attacks, first launch network attacks on the financial system from by identifying the attacker more reliably and then by the benefits of that system. That’s in the interest of moving from attribution to retribution. This is the core every country that participates in the system. And if of Juan Zarate’s insight, and the great value of his paper is we hope to set “norms” in cyberspace, high-minded how it combines a sophisticated appreciation of financial appeals to the law of armed conflict can’t hold a candle regulatory tools with an aggressive creativity in their use. to invoking the self-interest of bankers. He recognizes that government alone lacks the resources, the knowledge, and the incentives to track and identify For anyone seeking practical but innovative solutions those who are attacking financial institutions. to one of the great international challenges of the twenty-first century, Juan Zarate’s monograph offers an Much of that knowledge is in the hands of private excellent place to start. Indeed, it may offer something forensics firms and network defenders. I agree with even rarer in this field: Hope. Juan Zarate that we should draw on the defenders’ expertise and resources. Instead of threatening to Stewart Baker prosecute defenders who follow attackers beyond Steptoe & Johnson LLP the boundaries of their own networks, the U.S. Former Assistant Secretary of Homeland Security for Policy government should encourage responsible private Former General Counsel, National Security Agency sector countermeasures. With characteristic panache, Juan calls this “cyber-privateering.” While the free-for- all battle in cyberspace that the image conjures up is daunting, it’s worth remembering that some of our most Page 3 The Cyber Financial Wars on the Horizon Introduction Some have rightly noted that if the attackers were good enough to compromise JPMorgan’s network, they may Cyberattacks and intrusions threaten U.S. private have left themselves backdoors into its servers that sector institutions on a daily basis. From low-level remain undetected. Cybersecurity experts have opined cyber fraud to sophisticated intrusions into sensitive that there is a possibility that “ghost” or undetected 3 systems, the Western private sector has been under intrusions may still be of concern. It remains unclear direct assault for years from myriad cyber actors—from exactly how much information the hackers accessed, criminal fraudsters to sophisticated state actors. Over but the number of those affected makes the breach one the years, these attacks have cost the private sector of the largest ever. Indeed, the hackers may have also billions of dollars of intellectual property and years been sending a message to the bank, industry, and U.S. of research and development and cast doubt on the government about their capabilities with the extent ability of companies to secure customers’ data and their and reach of their intrusion. systems. And now, the financial industry—namely major Western banks—finds itself at the center of this The Treasury Department, Secret Service, Federal cyber storm. Bureau of Investigation (FBI), and other U.S. intelligence agencies have worked directly with On Thursday, October 2, 2014, JPMorgan Chase & JPMorgan following the intrusion, but identifying the Co., the largest American bank by assets, announced exact identities and motivations of these hackers has that a cyberattack it had detected in mid-August been slow, grinding work. JPMorgan’s size, its complex 2014 had compromised the accounts of 76 million IT environment, and numerous third-party suppliers households and seven million small businesses. The make it particularly vulnerable and an appealing JPMorgan attack—which began in June and is believed target to attackers. Determining whether the hacking to have originated from Russia—went unnoticed for group was after notoriety or financial gain—or more two months, despite the $250 million in cybersecurity likely some combination of both—could have major that the bank expected to spend by year’s end. Hackers implications for our understanding of the attack— had gained access to the bank’s servers containing the including whether this was a new form of state- names, email addresses, phone numbers, and addresses sponsored cyber warfare. of both current and former customers. The same group of overseas hackers appears to have attempted The U.S. government understood the potential to infiltrate at least twelve other financial institutions, significance of this attack and watched the forensics including Fidelity Investments.1 unfold over the summer—concerned this could be a new stealth attack from a state actor. When briefed by JPMorgan maintains that the hackers were unable to national security officials on the ongoing JPMorgan gather detailed information that would be particularly breach, President Obama reportedly asked his team damaging to consumers and that no fraudulent activity whether this could be Putin’s retaliation for Western has been reported. Passwords, account numbers, social sanctions. The U.S. government could not provide a 4 security numbers, dates of birth, and other information definitive answer. Joel Brenner, a former inspector valuable to any cyber attacker looking for financial gain general and senior counsel of the National Security remain unperturbed. In a statement to its customers, Agency, wrote that Russia’s likely use of proxies in the the bank insisted that customer money was “safe.”2 JPMorgan case “is what the gray space between war and peace looks like.”5 Page 4 The Cyber Financial Wars on the Horizon Despite the range and years of cybersecurity initiatives states and their proxies realize that banks serve both and investments within government and the private as key systemic actors important for the functioning

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    39 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us