12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

186 10. INFORMATION THEFT ON THE TACTICAL BATTLEFIELDINTRODUCTIONIn Chapter 7, we discussed acts of cyber espionage that suggest Chinese involvement.These operations focused on either massive data exfiltration for the purposes of stealingintellectual property and industrial information and/or long-term moni<strong>to</strong>ring of anadversary’s information systems—most likely as a means of intelligence collection. In thischapter, we look at cyber-espionage operations that focus on exploitation of a differentsort—the exploitation of data relating from ongoing tactical military operations. The exploitationincidents described in this chapter deal with the theft of information either transmittedor received from an unmanned aerial vehicle (UAV) system. 1 Hence, as opposed <strong>to</strong> what wasdiscussed in Chapter 9, the incidents presented here are of much more immediate consequence.Further, unlike the cyber-espionage operations of Chapter 9, where the data s<strong>to</strong>lenwere normally in the “s<strong>to</strong>rage” state, the information pilfered in the operations of this chapterwas normally in the “transmission” state. Here, the opera<strong>to</strong>rs are more concerned about datatraveling <strong>to</strong> or from a UAV system than static data on a hard drive. In this chapter, we brieflydescribe the Preda<strong>to</strong>r—flagship UAV of the U.S. military—and a 2009 incident where insurgen<strong>to</strong>perating Iraq was found <strong>to</strong> intercept the video feeds of that system.We note that although this chapter focuses on cyber operations against American UAVs,the cyber-espionage methods and techniques applied in such missions could most likely beused against UAVs from other nations <strong>to</strong>o. We also note that American UAV programs areperhaps the most mature in the world. Hence, as other countries catch up in this military technology,they will most likely experience similar cyber-espionage operations against theirsystems as well.THE PREDATOR UAVThe Defense Advanced Research Projects Agency (DARPA) is an organization within theDepartment of Defense tasked with maintaining technological superiority over America’s adversaries.Unlike organizations that sponsor scientific research for the military services—suchas Army Research Labora<strong>to</strong>ries, the Office of Naval Research, and the Air Force ResearchLabs, DARPA does not conduct research in support of near-term needs of the military—but rather explore high-risk, high-payoff ideas that would allow the United States <strong>to</strong> obtain“strategic surprise” over its adversaries. Formed in 1958 in response <strong>to</strong> the Soviet launch ofthe Sputnik satellite, DARPA has been the organization responsible for military innovationssuch as stealth aircraft and the M16 rifle. 2 An even more notable technological contribution ofthis organization was known as ARPANET—which <strong>to</strong>day is better known as the Internet.In the late 1970s, a firm known as Leading Systems proposed a long-endurance unmannedaerial vehicles (UAV) design that DARPA funded in the early 1980s—resulting in an aerialplatform known as the Gnat 750. Due <strong>to</strong> a shift in priorities pertaining <strong>to</strong> UAV-technologymandated by the U.S. Congress, the focus in the research community moved <strong>to</strong> systemsdesigned for short-range missions. As a result, Leading Systems went out of business andthe long-range UAV-technology they had developed was acquired by General A<strong>to</strong>mics. Aftera successful beyond line-of-sight test, the Gnat 750 was hailed as a “Revolution in Military

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!