10.07.2015 Views

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Internal cyber actions are defined similarly as actions with effects only onsystems owned or operated by <strong>the</strong> actor. Scanning ports <strong>of</strong> an adversary’s systemin order to find vulnerabilities is an example <strong>of</strong> an external cyber action.Scanning ports on one’s own system in order to identify flaws in <strong>the</strong> network isan example <strong>of</strong> an internal cyber action. This apparently simple and basicdistinction is actually <strong>the</strong> source <strong>of</strong> much confusion in some policy debates. Whatwe have defined as external cyber operations is <strong>of</strong>ten referred to as an “<strong>of</strong>fensivecyber attack,” which is a poor description <strong>of</strong> <strong>the</strong> action from a DoD policyperspective, obscuring it with military definitions <strong>of</strong> attack and <strong>of</strong>fense. From asecurity policy perspective, internal actions (those that only affect one’s ownsystems) do not pose relevant concerns in discussion <strong>of</strong> national security orinternational relations. External actions, however, do require analysis andjustification, and are <strong>the</strong> focus <strong>of</strong> this project.Many external cyber actions, particularly those attempting to acquirein<strong>for</strong>mation, are executed through achieving unauthorized access to a computersystem, or an intrusion. For many cyber actions an attempted or successfulintrusion is <strong>the</strong> first observable event. Attempted intrusions are <strong>of</strong>tenerroneously reported as “cyber attacks.” This greatly exaggerates <strong>the</strong> threat andleads to astronomical threat reports. For example Senator Susan Collins wrote:“Every month, an estimated 1.8 billion cyberattacks target <strong>the</strong> computer systems<strong>of</strong> Congress and executive branch agencies, according to <strong>the</strong> Senate’s sergeant atarms.” 27 Senator Collins is actually referring to <strong>the</strong> suspected number <strong>of</strong>attempted intrusions (via scanning or o<strong>the</strong>r methods) and not actual cyberattacks. This type <strong>of</strong> alarmist hyperbole erodes <strong>the</strong> nuance that exists in27 (Collins, 2011)19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!