25.07.2019 Views

International Cyber Terrorism

International Cyber Terrorism

International Cyber Terrorism

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Page 2 of 174


Walk by Faith; Serve with Abandon<br />

Expect to Win!<br />

Page 3 of 174


Page 4 of 174


The Advocacy Foundation, Inc.<br />

Helping Individuals, Organizations & Communities<br />

Achieve Their Full Potential<br />

Since its founding in 2003, The Advocacy Foundation has become recognized as an effective<br />

provider of support to those who receive our services, having real impact within the communities<br />

we serve. We are currently engaged in community and faith-based collaborative initiatives,<br />

having the overall objective of eradicating all forms of youth violence and correcting injustices<br />

everywhere. In carrying-out these initiatives, we have adopted the evidence-based strategic<br />

framework developed and implemented by the Office of Juvenile Justice & Delinquency<br />

Prevention (OJJDP).<br />

The stated objectives are:<br />

1. Community Mobilization;<br />

2. Social Intervention;<br />

3. Provision of Opportunities;<br />

4. Organizational Change and Development;<br />

5. Suppression [of illegal activities].<br />

Moreover, it is our most fundamental belief that in order to be effective, prevention and<br />

intervention strategies must be Community Specific, Culturally Relevant, Evidence-Based, and<br />

Collaborative. The Violence Prevention and Intervention programming we employ in<br />

implementing this community-enhancing framework include the programs further described<br />

throughout our publications, programs and special projects both domestically and<br />

internationally.<br />

www.Advocacy.Foundation<br />

ISBN: ......... ../2017<br />

......... Printed in the USA<br />

Advocacy Foundation Publishers<br />

Philadelphia, PA<br />

(878) 222-0450 | Voice | Data | SMS<br />

Page 5 of 174


Page 6 of 174


Dedication<br />

______<br />

Every publication in our many series’ is dedicated to everyone, absolutely everyone, who by<br />

virtue of their calling and by Divine inspiration, direction and guidance, is on the battlefield dayafter-day<br />

striving to follow God’s will and purpose for their lives. And this is with particular affinity<br />

for those Spiritual warriors who are being transformed into excellence through daily academic,<br />

professional, familial, and other challenges.<br />

We pray that you will bear in mind:<br />

Matthew 19:26 (NLT)<br />

Jesus looked at them intently and said, “Humanly speaking, it is impossible.<br />

But with God everything is possible.” (Emphasis added)<br />

To all of us who daily look past our circumstances, and naysayers, to what the Lord says we will<br />

accomplish:<br />

Blessings!!<br />

- The Advocacy Foundation, Inc.<br />

Page 7 of 174


Page 8 of 174


The Transformative Justice Project<br />

Eradicating Juvenile Delinquency Requires a Multi-Disciplinary Approach<br />

The Juvenile Justice system is incredibly<br />

overloaded, and Solutions-Based programs are<br />

woefully underfunded. Our precious children,<br />

therefore, particularly young people of color, often<br />

get the “swift” version of justice whenever they<br />

come into contact with the law.<br />

Decisions to build prison facilities are often based<br />

on elementary school test results, and our country<br />

incarcerates more of its young than any other<br />

nation on earth. So we at The Foundation labor to<br />

pull our young people out of the “school to prison”<br />

pipeline, and we then coordinate the efforts of the<br />

legal, psychological, governmental and<br />

educational professionals needed to bring an end<br />

to delinquency.<br />

We also educate families, police, local businesses,<br />

elected officials, clergy, schools and other<br />

stakeholders about transforming whole communities, and we labor to change their<br />

thinking about the causes of delinquency with the goal of helping them embrace the<br />

idea of restoration for the young people in our care who demonstrate repentance for<br />

their mistakes.<br />

The way we accomplish all this is a follows:<br />

1. We vigorously advocate for charges reductions, wherever possible, in the<br />

adjudicatory (court) process, with the ultimate goal of expungement or pardon, in<br />

order to maximize the chances for our clients to graduate high school and<br />

progress into college, military service or the workforce without the stigma of a<br />

criminal record;<br />

2. We then endeavor to enroll each young person into an Evidence-Based, Data-<br />

Driven Transformative Justice program designed to facilitate their rehabilitation<br />

and subsequent reintegration back into the community;<br />

3. While those projects are operating, we conduct a wide variety of ComeUnity-<br />

ReEngineering seminars and workshops on topics ranging from Juvenile Justice<br />

to Parental Rights, to Domestic issues to Police friendly contacts, to Mental<br />

Health intervention, to CBO and FBO accountability and compliance;<br />

Page 9 of 174


4. Throughout the process, we encourage and maintain frequent personal contact<br />

between all parties;<br />

5 Throughout the process we conduct a continuum of events and fundraisers<br />

designed to facilitate collaboration among professionals and community<br />

stakeholders; and finally<br />

6. 1 We disseminate Monthly and Quarterly publications, like our e-Advocate series<br />

Newsletter and our e-Advocate Monthly and Quarterly Electronic Compilations to<br />

all regular donors in order to facilitate a lifelong learning process on the everevolving<br />

developments in both the Adult and Juvenile Justice systems.<br />

And in addition to the help we provide for our young clients and their families, we also<br />

facilitate Community Engagement through the Transformative Justice process,<br />

thereby balancing the interests of local businesses, schools, clergy, social<br />

organizations, elected officials, law enforcement entities, and other interested<br />

stakeholders. Through these efforts, relationships are built, rebuilt and strengthened,<br />

local businesses and communities are enhanced & protected from victimization, young<br />

careers are developed, and our precious young people are kept out of the prison<br />

pipeline.<br />

Additionally, we develop Transformative “Void Resistance” (TVR) initiatives to elevate<br />

concerns of our successes resulting in economic hardship for those employed by the<br />

penal system.<br />

TVR is an innovative-comprehensive process that works in conjunction with our<br />

Transformative Justice initiatives to transition the original use and purpose of current<br />

systems into positive social impact operations, which systematically retrains current<br />

staff, renovates facilities, creates new employment opportunities, increases salaries and<br />

is data-proven to enhance employee’s mental wellbeing and overall quality of life – an<br />

exponential Transformative Social Impact benefit for ALL community stakeholders.<br />

This is a massive undertaking, and we need all the help and financial support you can<br />

give! We plan to help 75 young persons per quarter-year (aggregating to a total of 250<br />

per year) in each jurisdiction we serve) at an average cost of under $2,500 per client,<br />

per year. *<br />

Thank you in advance for your support!<br />

* FYI:<br />

1<br />

In addition to supporting our world-class programming and support services, all regular donors receive our Quarterly e-Newsletter<br />

(The e-Advocate), as well as The e-Advocate Quarterly Magazine.<br />

Page 10 of 174


1. The national average cost to taxpayers for minimum-security youth incarceration,<br />

is around $43,000.00 per child, per year.<br />

2. The average annual cost to taxpayers for maximum-security youth incarceration<br />

is well over $148,000.00 per child, per year.<br />

- (US News and World Report, December 9, 2014);<br />

3. In every jurisdiction in the nation, the Plea Bargaining rate is above 99%.<br />

The Judicial system engages in a tri-partite balancing task in every single one of these<br />

matters, seeking to balance Rehabilitative Justice with Community Protection and<br />

Judicial Economy, and, although the practitioners work very hard to achieve positive<br />

outcomes, the scales are nowhere near balanced where people of color are involved.<br />

We must reverse this trend, which is right now working very much against the best<br />

interests of our young.<br />

Our young people do not belong behind bars.<br />

- Jack Johnson<br />

Page 11 of 174


Page 12 of 174


The Advocacy Foundation, Inc.<br />

Helping Individuals, Organizations & Communities<br />

Achieve Their Full Potential<br />

…a compendium of works on<br />

<strong>International</strong> Incidents Series<br />

<strong>International</strong> <strong>Cyber</strong> <strong>Terrorism</strong><br />

“Turning the Improbable Into the Exceptional”<br />

Atlanta<br />

Philadelphia<br />

______<br />

John C Johnson III<br />

Founder & CEO<br />

(878) 222-0450<br />

Voice | Data | SMS<br />

www.Advocacy.Foundation<br />

Page 13 of 174


Page 14 of 174


Biblical Authority<br />

Deuteronomy 20:1-4 (NIV)<br />

Going to War<br />

1<br />

When you go to war against your enemies and see horses and chariots and an army<br />

greater than yours, do not be afraid of them, because the Lord your God, who brought<br />

you up out of Egypt, will be with you. 2 When you are about to go into battle, the priest<br />

shall come forward and address the army. 3 He shall say: “Hear, Israel: Today you are<br />

going into battle against your enemies. Do not be fainthearted or afraid; do not panic or<br />

be terrified by them. 4 For the Lord your God is the one who goes with you to fight for<br />

you against your enemies to give you victory.”<br />

Isaiah 2:4<br />

4<br />

He will judge between the nations and will settle disputes for many peoples. They will<br />

beat their swords into plowshares and their spears into pruning hooks. Nation will not<br />

take up sword against nation, nor will they train for war anymore.<br />

Isaiah 19:2<br />

2<br />

“I will stir up Egyptian against Egyptian—brother will fight against brother, neighbor<br />

against neighbor, city against city, kingdom against kingdom.<br />

Jeremiah 46:16<br />

16<br />

They will stumble repeatedly; they will fall over each other. They will say, ‘Get up, let<br />

us go back to our own people and our native lands, away from the sword of the<br />

oppressor.’<br />

Jeremiah 51:20<br />

20<br />

“You are my war club, my weapon for battle—with you I shatter nations, with you I<br />

destroy kingdoms,<br />

Micah 7:8<br />

Israel Will Rise<br />

8<br />

Do not gloat over me, my enemy! Though I have fallen, I will rise.<br />

Though I sit in darkness, the Lord will be my light.<br />

Page 15 of 174


Zechariah 10:5<br />

5<br />

Together they will be like warriors in battle trampling their enemy into the mud of the<br />

streets. They will fight because the Lord is with them, and they will put the enemy<br />

horsemen to shame.<br />

Zechariah 14:2<br />

2<br />

I will gather all the nations to Jerusalem to fight against it; the city will be captured, the<br />

houses ransacked, and the women raped. Half of the city will go into exile, but the rest<br />

of the people will not be taken from the city.<br />

________<br />

Matthew 24:6<br />

6<br />

You will hear of wars and rumors of wars, but see to it that you are not alarmed. Such<br />

things must happen, but the end is still to come.<br />

Romans 8:37<br />

37<br />

No, in all these things we are more than conquerors through him who loved us.<br />

Romans 12:19<br />

19<br />

Do not take revenge, my dear friends, but leave room for God’s wrath, for it is written:<br />

“It is mine to avenge; I will repay,” says the Lord.<br />

Romans 13:4<br />

4<br />

For the one in authority is God’s servant for your good. But if you do wrong, be afraid,<br />

for rulers do not bear the sword for no reason. They are God’s servants, agents of wrath<br />

to bring punishment on the wrongdoer.<br />

2 Corinthians 10:4<br />

4<br />

The weapons we fight with are not the weapons of the world. On the contrary, they<br />

have divine power to demolish strongholds.<br />

Page 16 of 174


Ephesians 6:10-17<br />

The [Whole] Armor of God<br />

10<br />

Finally, be strong in the Lord and in his mighty power. 11 Put on the full armor of<br />

God, so that you can take your stand against the devil’s schemes. 12 For our struggle is<br />

not against flesh and blood, but against the rulers, against the authorities, against the<br />

powers of this dark world and against the spiritual forces of evil in the heavenly<br />

realms. 13 Therefore put on the full armor of God, so that when the day of evil comes,<br />

you may be able to stand your ground, and after you have done everything, to<br />

stand. 14 Stand firm then, with the belt of truth buckled around your waist, with the<br />

breastplate of righteousness in place, 15 and with your feet fitted with the readiness that<br />

comes from the gospel of peace. 16 In addition to all this, take up the shield of faith, with<br />

which you can extinguish all the flaming arrows of the evil one. 17 Take the helmet of<br />

salvation and the sword of the Spirit, which is the word of God.<br />

James 4:1-2<br />

Submit Yourselves to God<br />

1<br />

What causes fights and quarrels among you? Don’t they come from your desires that<br />

battle within you? 2 You desire but do not have, so you kill. You covet but you cannot get<br />

what you want, so you quarrel and fight. You do not have because you do not ask God.<br />

Page 17 of 174


Page 18 of 174


Table of Contents<br />

…a compilation of works on<br />

<strong>International</strong> Incidents Series<br />

<strong>International</strong> <strong>Cyber</strong> <strong>Terrorism</strong><br />

Biblical Authority<br />

I. Introduction: <strong>Cyber</strong>terrorism…………………………………………… 21<br />

II. <strong>Cyber</strong>warfare.……………………………………………………………. 41<br />

III. <strong>Cyber</strong> Data-Collection.………………………………………………… 67<br />

IV. Proactive <strong>Cyber</strong>-Defense…….………………………………….......... 73<br />

V. <strong>Cyber</strong> Security Regulation….…………………………………………. 81<br />

VI. United States <strong>Cyber</strong> Command…………………………………….… 91<br />

VII. <strong>Cyber</strong> Attack Threat Trends and <strong>Cyber</strong> Attacks.............................. 99<br />

VIII. References……………………………………………………............. 105<br />

________<br />

Attachments<br />

A. <strong>Cyber</strong>warfare and <strong>Cyber</strong>terrorism: In Brief<br />

B. <strong>Cyber</strong>terrorism: Definition Patterns and Mitigation Strategies<br />

C. <strong>Cyber</strong>terrorism: Its Effect on Psychological Well-Being,<br />

Public Confidence, and Political Attitudes<br />

Copyright © 2003 – 2019 The Advocacy Foundation, Inc. All Rights Reserved.<br />

Page 19 of 174


This work is not meant to be a piece of original academic<br />

analysis, but rather draws very heavily on the work of<br />

scholars in a diverse range of fields. All material drawn upon<br />

is referenced appropriately.<br />

Page 20 of 174


I. Introduction<br />

<strong>Cyber</strong><strong>Terrorism</strong><br />

<strong>Cyber</strong>terrorism is the use of the Internet to conduct violent acts that result in, or<br />

threaten, loss of life or significant bodily harm, in order to achieve political or ideological<br />

gains through threat or intimidation. It is also sometimes considered an act of Internet<br />

terrorism where terrorist activities, including acts of deliberate, large-scale disruption of<br />

computer networks, especially of personal computers attached to the Internet by means<br />

of tools such as computer viruses, computer worms, phishing, and other malicious<br />

software and hardware methods and programming scripts.<br />

<strong>Cyber</strong>terrorism is a controversial term. Some authors opt for a very narrow definition,<br />

relating to deployment by known terrorist organizations of disruption attacks against<br />

information systems for the primary purpose of creating alarm, panic, or physical<br />

disruption. Other authors prefer a broader definition, which includes cybercrime.<br />

Participating in a cyberattack affects the terror threat perception, even if it isn't done with<br />

a violent approach. By some definitions, it might be difficult to distinguish which<br />

instances of online activities are cyberterrorism or cybercrime.<br />

Page 21 of 174


<strong>Cyber</strong>terrorism can be also defined as the intentional use of computers, networks, and<br />

public internet to cause destruction and harm for personal objectives. Experienced<br />

cyberterrorists, who are very skilled in terms of hacking can cause massive damage to<br />

government systems, hospital records, and national security programs, which might<br />

leave a country, community or organization in turmoil and in fear of further attacks. The<br />

objectives of such terrorists may be political or ideological since this can be considered<br />

a form of terror.<br />

There is much concern from government and media sources about potential damage<br />

that could be caused by cyberterrorism, and this has prompted efforts by government<br />

agencies such as the Federal Bureau of Investigations (FBI) and the Central<br />

Intelligence Agency (CIA) to put an end to cyber attacks and cyberterrorism.<br />

There have been several major and minor instances of cyberterrorism. Al-<br />

Qaeda utilized the internet to communicate with supporters and even to recruit new<br />

members. Estonia, a Baltic country which is constantly evolving in terms of technology,<br />

became a battleground for cyberterror in April, 2007 after disputes regarding the<br />

removal of a WWII soviet statue located in Estonia's capital Tallinn.<br />

Overview<br />

There is debate over the basic definition of the scope of cyberterrorism. These<br />

definitions can be narrow such as the use of Internet to attack other systems in the<br />

Internet that result to violence against persons or property. They can also be broad,<br />

those that include any form of Internet usage by terrorists ro conventional attacks on<br />

information technology infrastructures. There is variation in qualification by motivation,<br />

targets, methods, and centrality of computer use in the act. U.S. government agencies<br />

also use varying definitions and that none of these have so far attempted to introduce a<br />

standard that is binding outside of their sphere of influence.<br />

Depending on context, cyberterrorism may overlap considerably<br />

with cybercrime, cyberwar or ordinary terrorism. Eugene Kaspersky, founder<br />

of Kaspersky Lab, now feels that "cyberterrorism" is a more accurate term than<br />

"cyberwar". He states that "with today's attacks, you are clueless about who did it or<br />

when they will strike again. It's not cyber-war, but cyberterrorism." He also equates<br />

large-scale cyber weapons, such as the Flame Virus and NetTraveler Virus which his<br />

company discovered, to biological weapons, claiming that in an interconnected world,<br />

they have the potential to be equally destructive.<br />

If cyberterrorism is treated similarly to traditional terrorism, then it only includes attacks<br />

that threaten property or lives, and can be defined as the leveraging of a target's<br />

computers and information, particularly via the Internet, to cause physical, real-world<br />

harm or severe disruption of infrastructure.<br />

Many academics and researchers who specialize in terrorism studies suggest that<br />

cyberterrorism does not exist and is really a matter of hacking or information<br />

Page 22 of 174


warfare. They disagree with labeling it as terrorism because of the unlikelihood of the<br />

creation of fear, significant physical harm, or death in a population using electronic<br />

means, considering current attack and protective technologies.<br />

If death or physical damage that could cause human harm is considered a necessary<br />

part of the cyberterrorism definition, then there have been few identifiable incidents of<br />

cyberterrorism, although there has been much policy research and public concern.<br />

Modern terrorism and political violence is not easily defined, however, and some<br />

scholars assert that it is now "unbounded" and not exclusively concerned with physical<br />

damage<br />

There is an old saying that death or loss of property are the side products of terrorism,<br />

the main purpose of such incidents is to create terror in peoples' minds and harm<br />

bystanders. If any incident in cyberspace can create terror, it may be rightly called<br />

cyberterrorism. For those affected by such acts, the fears of cyberterrorism are quite<br />

real.<br />

As with cybercrime in general, the threshold of required knowledge and skills to<br />

perpetrate acts of cyberterror has been steadily diminishing thanks to freely available<br />

hacking suites and online courses. Additionally, the physical and virtual worlds are<br />

Page 23 of 174


merging at an accelerated rate, making for many more targets of opportunity which is<br />

evidenced by such notable cyber attacks as Stuxnet, the Saudi petrochemical sabotage<br />

attempt in 2018 and others.<br />

Defining <strong>Cyber</strong>terrorism<br />

Assigning a concrete definition to cyberterrorism can be hard, due to the difficulty of<br />

defining the term terrorism itself. Multiple organizations have created their own<br />

definitions, most of which are overly broad. There is also controversy concerning<br />

overuse of the term, hyperbole in the media and by security vendors trying to sell<br />

"solutions".<br />

One way of understanding cyberterrorism involves the idea that terrorists could cause<br />

massive loss of life, worldwide economic chaos and environmental damage by hacking<br />

into critical infrastructure systems. The nature of cyberterrorism covers conduct<br />

involving computer or Internet technology that:<br />

1. is motivated by a political, religious or ideological cause<br />

2. is intended to intimidate a government or a section of the public to varying<br />

degrees<br />

3. seriously interferes with infrastructure<br />

The term "cyberterrorism" can be used in a variety of different ways, but there are limits<br />

to its use. An attack on an Internet business can be labeled cyberterrorism, however<br />

when it is done for economic motivations rather than ideological it is typically regarded<br />

as cybercrime. Convention also limits the label "cyberterrorism" to actions by<br />

individuals, independent groups, or organizations. Any form of cyberwarfare conducted<br />

by governments and states would be regulated and punishable under international law.<br />

The Technolytics Institute defines cyberterrorism as<br />

"[t]he premeditated use of disruptive activities, or the threat thereof, against computers<br />

and/or networks, with the intention to cause harm or further social, ideological, religious,<br />

political or similar objectives. Or to intimidate any person in furtherance of such<br />

objectives."<br />

The term appears first in defense literature, surfacing (as "cyber-terrorism") in reports by<br />

the U.S. Army War College as early as 1998.<br />

The National Conference of State Legislatures, an organization of legislators created to<br />

help policymakers in the United States of America with issues such as economy<br />

and homeland security defines cyberterrorism as:<br />

[T]he use of information technology by terrorist groups and individuals to further their<br />

agenda. This can include use of information technology to organize and execute attacks<br />

against networks, computer systems and telecommunications infrastructures, or for<br />

Page 24 of 174


exchanging information or making threats electronically. Examples are hacking into<br />

computer systems, introducing viruses to vulnerable networks, web site defacing, Denialof-service<br />

attacks, or terroristic threats made via electronic communication.<br />

NATO defines cyberterrorism as "[a] cyberattack using or exploiting computer or<br />

communication networks to cause sufficient destruction or disruption to generate fear or<br />

to intimidate a society into an ideological goal".<br />

ideological agenda.<br />

The United States National<br />

Infrastructure Protection Center defined<br />

cyberterrorism as:<br />

"A criminal act perpetrated by the use<br />

of computers and telecommunications<br />

capabilities resulting in violence,<br />

destruction, and/or disruption of<br />

services to create fear by causing<br />

confusion and uncertainty within a<br />

given population, with the goal of<br />

influencing a government or population<br />

to conform to a political, social, or<br />

The FBI, another United States agency, defines "cyber terrorism" as “premeditated,<br />

politically motivated attack against information, computer systems, computer programs,<br />

and data which results in violence against non-combatant targets by subnational groups<br />

or clandestine agents”.<br />

These definitions tend to share the view of cyberterrorism as politically and/or<br />

ideologically inclined. One area of debate is the difference between cyberterrorism<br />

and hacktivism. Hacktivism is ”the marriage of hacking with political activism”. Both<br />

actions are politically driven and involve using computers, however cyberterrorism is<br />

primarily used to cause harm. It becomes an issue because acts of violence on the<br />

computer can be labeled either cyberterrorism or hacktivism.<br />

Types of <strong>Cyber</strong>terror Capability<br />

The following three levels of cyberterror capability are defined by Monterey group<br />

• Simple-Unstructured: The capability to conduct basic hacks against individual<br />

systems using tools created by someone else. The organization possesses little<br />

target analysis, command, and control, or learning capability.<br />

• Advanced-Structured: The capability to conduct more sophisticated attacks<br />

against multiple systems or networks and possibly, to modify or create basic<br />

hacking tools. The organization possesses an elementary target analysis,<br />

command and control, and learning capability.<br />

Page 25 of 174


• Complex-Coordinated: The capability for a coordinated attack capable of causing<br />

mass-disruption against integrated, heterogeneous defenses (including<br />

cryptography). Ability to create sophisticated hacking tools. Highly capable target<br />

analysis, command, and control, and organization learning capability.<br />

Concerns<br />

<strong>Cyber</strong>terrorism is becoming more and more prominent on social media today. As the<br />

Internet becomes more pervasive in all areas of human endeavor, individuals or groups<br />

can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e.<br />

with membership based on ethnicity or belief), communities and entire countries,<br />

without the inherent threat of capture, injury, or death to the attacker that being<br />

physically present would bring. Many groups such as Anonymous, use tools such<br />

as denial-of-service attack to attack and censor groups who oppose them, creating<br />

many concerns for freedom and respect for differences of thought.<br />

Many believe that cyberterrorism is an extreme threat to countries' economies, and fear<br />

an attack could potentially lead to another Great Depression. Several leaders agree that<br />

cyberterrorism has the highest percentage of threat over other possible attacks on U.S.<br />

territory. Although natural disasters are considered a top threat and have proven to be<br />

devastating to people and land, there is ultimately little that can be done to prevent such<br />

events from happening. Thus, the expectation is to focus more on preventative<br />

measures that will make Internet attacks impossible for execution.<br />

As the Internet continues to expand, and computer systems continue to be assigned<br />

increased responsibility while becoming more complex and interdependent, sabotage or<br />

terrorism via the Internet may become a more serious threat and is possibly one of the<br />

top 10 events to "end the human race." People have much easier access to illegal<br />

involvement within the cyberspace by the ability to access a part of the internet known<br />

as the Dark Web. The Internet of Things promises to further merge the virtual and<br />

physical worlds, which some experts see as a powerful incentive for states to use<br />

terrorist proxies in furtherance of objectives.<br />

Dependence on the internet is rapidly increasing on a worldwide scale, creating a<br />

platform for international cyber terror plots to be formulated and executed as a direct<br />

threat to national security. For terrorists, cyber-based attacks have distinct advantages<br />

over physical attacks. They can be conducted remotely, anonymously, and relatively<br />

cheaply, and they do not require significant investment in weapons, explosive and<br />

personnel. The effects can be widespread and profound. Incidents of cyberterrorism are<br />

likely to increase. They will be conducted through denial of service attacks, malware,<br />

and other methods that are difficult to envision today. One example involves the deaths<br />

involving the Islamic State and the online social networks Twitter, Google, and<br />

Facebook lead to legal action being taken against them, that ultimately resulted in them<br />

being sued.<br />

Page 26 of 174


In an article about cyber attacks by Iran and North Korea, The New York<br />

Times observes, "The appeal of digital weapons is similar to that of nuclear capability: it<br />

is a way for an outgunned, out financed nation to even the playing field. 'These<br />

countries are pursuing cyberweapons the same way they are pursuing nuclear<br />

weapons,' said James A. Lewis, a computer security expert at the Center for Strategic<br />

and <strong>International</strong> Studies in Washington. 'It's primitive; it's not top of the line, but it's<br />

good enough and they are committed to getting it.'"<br />

History<br />

Public interest in cyberterrorism began in the late 1990s, when the term was coined by<br />

Barry C. Collin. As 2000 approached, the fear and uncertainty about the millennium bug<br />

heightened, as did the potential for attacks by cyber terrorists. Although the millennium<br />

bug was by no means a terrorist attack or plot against the world or the United States, it<br />

Page 27 of 174


did act as a catalyst in sparking the fears of a possibly large-scale devastating cyberattack.<br />

Commentators noted that many of the facts of such incidents seemed to change,<br />

often with exaggerated media reports.<br />

The high-profile terrorist attacks in the United States on September 11, 2001 and the<br />

ensuing War on Terror by the US led to further media coverage of the potential threats<br />

of cyberterrorism in the years following. Mainstream media coverage often discusses<br />

the possibility of a large attack making use of computer networks to sabotage critical<br />

infrastructures with the aim of putting human lives in jeopardy or causing disruption on a<br />

national scale either directly or by disruption of the national economy.<br />

Authors such as Winn Schwartau and John Arquilla are reported to have had<br />

considerable financial success selling books which described what were purported to be<br />

plausible scenarios of mayhem caused by cyberterrorism. Many critics claim that these<br />

books were unrealistic in their assessments of whether the attacks described (such as<br />

nuclear meltdowns and chemical plant explosions) were possible. A common thread<br />

throughout what critics perceive as cyberterror-hype is that of non-falsifiability; that is,<br />

when the predicted disasters fail to occur, it only goes to show how lucky we've been so<br />

far, rather than impugning the theory.<br />

In 2016, for the first time ever, the Department of Justice charged Ardit Ferizi with<br />

cyberterrorism. He is accused of allegedly hacking into a military website and stealing<br />

the names, addresses, and other personal information of government and military<br />

personnel and selling it to ISIS<br />

On the other hand, it is also argued that, despite substantial studies on cyberterrorism,<br />

the body of literature is still unable to present a realistic estimate of the actual<br />

threat. For instance, in the case of a cyberterrorist attack on a public infrastructure such<br />

as a power plant or air traffic control through hacking, there is uncertainty as to its<br />

success because data concerning such phenomena are limited.<br />

Conventions<br />

<strong>International</strong> Attacks and Responses<br />

As of 2016 there have been seventeen conventions and major legal instruments that<br />

specifically deal with terrorist activities and can also be applied to cyber terrorism.<br />

• 1963: Convention on Offences and Certain Other Acts Committed on Board<br />

Aircraft<br />

• 1970: Convention for the Suppression of Unlawful Seizure of Aircraft<br />

• 1971: Convention for the Suppression of Unlawful Acts Against the Safety of Civil<br />

Aviation<br />

• 1973: Convention on the Prevention and Punishment of Crimes against<br />

<strong>International</strong>ly Protected Persons<br />

• 1979: <strong>International</strong> Convention against the Taking of Hostages<br />

Page 28 of 174


• 1980: Convention on the Physical Protection of Nuclear Material<br />

• 1988: Protocol for the Suppression of Unlawful Acts of Violence at Airports<br />

Serving <strong>International</strong> Civil Aviation<br />

• 1988: Protocol for the Suppression of Unlawful Acts against the Safety of Fixed<br />

Platforms Located on the Continental Shelf<br />

• 1988: Convention for the Suppression of Unlawful Acts against the Safety of<br />

Maritime Navigation<br />

• 1989: Supplementary to the Convention for the Suppression of Unlawful Acts<br />

against the Safety of Civil Aviation<br />

• 1991: Convention on the Marking of Plastic Explosives for the Purpose of<br />

Detection<br />

• 1997: <strong>International</strong> Convention for the Suppression of Terrorist Bombings<br />

• 1999: <strong>International</strong> Convention for the Suppression of the Financing of <strong>Terrorism</strong><br />

• 2005: Protocol to the Convention for the Suppression of Unlawful Acts against<br />

the Safety of Maritime Navigation<br />

• 2005: <strong>International</strong> Convention for the Suppression of Acts of Nuclear <strong>Terrorism</strong><br />

• 2010: Protocol Supplementary to the Convention for the Suppression of Unlawful<br />

Seizure of Aircraft<br />

• 2010: Convention on the Suppression of Unlawful Acts Relating to <strong>International</strong><br />

Civil Aviation<br />

Motivations for <strong>Cyber</strong>attacks<br />

There are many different motives for cyberattacks, with the majority being for financial<br />

reasons. However, there is increasing evidence that hackers are becoming more<br />

Page 29 of 174


politically motivated. <strong>Cyber</strong>terrorists are aware that governments are reliant on the<br />

internet and have exploited this as a result. For example, Mohammad Bin Ahmad As-<br />

Sālim's piece '39 Ways to Serve and Participate in Jihad' discusses how an electronic<br />

jihad could disrupt the West through targeted hacks of American websites, and other<br />

resources seen as anti-Jihad, modernist, or secular in orientation (Denning, 2010;<br />

Leyden, 2007).<br />

<strong>International</strong> Institutions<br />

As of 2016 the United Nations only has one agency that specializes in cyberterrorism,<br />

the <strong>International</strong> Telecommunications Union.<br />

U.S. Military/Protections Against <strong>Cyber</strong>terrorism<br />

The US Department of Defense (DoD) charged the United States Strategic<br />

Command with the duty of combating cyberterrorism. This is accomplished through<br />

the Joint Task Force-Global Network Operations, which is the operational component<br />

supporting USSTRATCOM in defense of the DoD's Global Information Grid. This is<br />

done by integrating GNOcapabilities into the operations of all DoD computers, networks,<br />

and systems used by DoD combatant commands, services and agencies.<br />

On November 2, 2006, the Secretary of the Air Force announced the creation of the Air<br />

Force's newest MAJCOM, the Air Force <strong>Cyber</strong> Command, which would be tasked to<br />

monitor and defend American interest in cyberspace. The plan was however replaced<br />

by the creation of Twenty-Fourth Air Force which became active in August 2009 and<br />

would be a component of the planned United States <strong>Cyber</strong> Command.<br />

On December 22, 2009, the White House named its head of computer<br />

security as Howard Schmidt to coordinate U.S Government, military and intelligence<br />

efforts to repel hackers. He left the position in May, 2012. Michael Daniel was appointed<br />

to the position of White House Coordinator of <strong>Cyber</strong> Security the same week and<br />

continues in the position during the second term of the Obama administration.<br />

More recently, Obama signed an executive order to enable the US to impose sanctions<br />

on either individuals or entities that are suspected to be participating in cyber related<br />

acts. These acts were assessed to be possible threats to US national security, financial<br />

issues or foreign policy issues. U.S. authorities indicted a man over 92 cyberterrorism<br />

hacks attacks on computers used by the Department of Defense. A Nebraska-based<br />

consortium apprehended four million hacking attempts in the course of eight weeks. In<br />

2011 cyberterrorism attacks grew 20%.<br />

Estonia and NATO<br />

The Baltic state of Estonia was the target of a massive denial-of-service attack that<br />

ultimately rendered the country offline and shut out from services dependent on Internet<br />

connectivity in April 2007. The infrastructure of Estonia including everything from online<br />

Page 30 of 174


anking and mobile phone networks to government services and access to health care<br />

information was disabled for a time. The tech-dependent state experienced severe<br />

turmoil and there was a great deal of concern over the nature and intent of the attack.<br />

The cyber attack was a result of an Estonian-Russian dispute over the removal of a<br />

bronze statue depicting a World War II-era Soviet soldier from the center of the capital,<br />

Tallinn. In the midst of the armed conflict with Russia, Georgia likewise was subject to<br />

sustained and coordinated attacks on its electronic infrastructure in August 2008. In<br />

both of these cases, circumstantial evidence point to coordinated Russian attacks, but<br />

attribution of the attacks is difficult; though both the countries blame Moscow for<br />

contributing to the cyber attacks, proof establishing legal culpability is lacking.<br />

Estonia joined NATO in 2004, which prompted NATO to carefully monitor its member<br />

state's response to the attack. NATO also feared escalation and the possibility of<br />

cascading effects beyond Estonia's border to other NATO members. In 2008, directly as<br />

a result of the attacks, NATO opened a new center of excellence on cyber-defense to<br />

conduct research and training on cyber warfare in Tallinn.<br />

Page 31 of 174


The chaos resulting from the attacks in Estonia illustrated to the world the dependence<br />

countries had on information technology. This dependence then makes countries<br />

vulnerable to future cyber attacks and terrorism.<br />

Republic of Korea<br />

According to 2016 Deloitte Asia-Pacific Defense Outlook, South Korea's '<strong>Cyber</strong> Risk<br />

Score' was 884 out of 1,000 and South Korea is found to be the most vulnerable country<br />

to cyber attacks in the Asia-Pacific region. Considering South Korea's high speed<br />

internet and cutting edge technology, its cyber security infrastructure is relatively weak.<br />

The 2013 South Korea cyberattack significantly damaged the Korean economy. In<br />

2017, a ransomware attack harassed private companies and users, who experienced<br />

personal information leakage. Additionally, there were North Korea's cyber attacks<br />

which risked national security of South Korea.<br />

In response to this, South Korean government's countermeasure is to protect the<br />

information security centers the National Intelligence Agency. Currently, 'cyber security'<br />

is one of the major goals of NIS Korea. Since 2013, South Korea had established<br />

policies related to National cyber security and trying to prevent cyber crises via<br />

sophisticated investigation on potential threats. Meanwhile, scholars emphasize on<br />

improving the national consciousness towards cyber attacks as South Korea had<br />

already entered the so-called 'hyper connected society'.<br />

China<br />

The Chinese Defense Ministry confirmed the existence of an online defense unit in May<br />

2011. Composed of about thirty elite internet specialists, the so-called "<strong>Cyber</strong> Blue<br />

Team", or "Blue Army", is officially claimed to be engaged in cyber-defense operations,<br />

though there are fears the unit has been used to penetrate secure online systems of<br />

foreign governments.<br />

Pakistan<br />

Pakistani Government has also taken steps to curb the menace of cyberterrorism and<br />

extremist propaganda. National Counter <strong>Terrorism</strong> Authority (Nacta) is working on joint<br />

programs with different NGOs and other cyber security organizations in Pakistan to<br />

combat this problem.<br />

Surf Safe Pakistan is one such example. Now people in Pakistan can report extremist<br />

and terrorist related content online on Surf Safe Pakistan portal. The National Counter<br />

<strong>Terrorism</strong> Authority (NACTA) provides the Federal Government's leadership for the Surf<br />

Safe Campaign. In March 2008 an al Qaeda forum posted a training website with six<br />

training modules to learn cyberterrorism techniques.<br />

Page 32 of 174


Ukraine<br />

A series of powerful cyber attacks began 27 June 2017 that swamped websites of<br />

Ukrainian organizations, including banks, ministries, newspapers and electricity firms.<br />

Examples<br />

An operation can be done by anyone anywhere in the world, for it can be performed<br />

thousands of miles away from a target. An attack can cause serious damage to a critical<br />

infrastructure which may result in casualties.<br />

Some attacks are conducted in furtherance of political and social objectives, as the<br />

following examples illustrate:<br />

• In 1996, a computer hacker allegedly associated with the White Supremacist<br />

movement temporarily disabled a Massachusetts ISP and damaged part of the<br />

ISP's record keeping system. The ISP had attempted to stop the hacker from<br />

sending out worldwide racist messages under the ISP's name. The hacker<br />

Page 33 of 174


signed off with the threat: "you have yet to see true electronic terrorism. This is a<br />

promise."<br />

• In 1998, Spanish protesters bombarded the Institute for Global Communications<br />

(IGC) with thousands of bogus e-mail messages. E-mail was tied up and<br />

undeliverable to the ISP's users, and support lines were tied up with people who<br />

couldn't get their mail. The protestors also spammed IGC staff and member<br />

accounts, clogged their Web page with bogus credit card orders, and threatened<br />

to employ the same tactics against organizations using IGC services. They<br />

demanded that IGC stop hosting the Web site for the Euskal Herria Journal, a<br />

New York-based publication supporting Basque independence. Protestors said<br />

IGC supported terrorism because a section on the Web pages contained<br />

materials on the terrorist group ETA, which claimed responsibility for<br />

assassinations of Spanish political and security officials, and attacks on military<br />

installations. IGC finally relented and pulled the site because of the "mail<br />

bombings."<br />

• In 1998, ethnic Tamil guerrillas attempted to disrupt Sri Lankan embassies by<br />

sending large volumes of e-mail. The embassies received 800 e-mails a day over<br />

a two-week period. The messages read "We are the Internet Black Tigers and<br />

we're doing this to disrupt your communications." Intelligence authorities<br />

characterized it as the first known attack by terrorists against a country's<br />

computer systems.<br />

• During the Kosovo conflict in 1999, NATO computers were blasted with e-mail<br />

bombs and hit with denial-of-service attacks by hacktivists protesting the NATO<br />

bombings. In addition, businesses, public organizations and academic institutes<br />

received highly politicized virus-laden e-mails from a range of Eastern European<br />

countries, according to reports. Web defacements were also common. After the<br />

Chinese Embassy was accidentally bombed in Belgrade, Chinese hacktivists<br />

posted messages such as "We won't stop attacking until the war stops!" on U.S.<br />

government Web sites.<br />

• Since December 1997, the Electronic Disturbance Theater (EDT) has been<br />

conducting Web sit-ins against various sites in support of<br />

the Mexican Zapatistas. At a designated time, thousands of protestors point their<br />

browsers to a target site using software that floods the target with rapid and<br />

repeated download requests. EDT's software has also been used by animal<br />

rights groups against organizations said to abuse animals. Electro-hippies,<br />

another group of hacktivists, conducted Web sit-ins against the WTO when they<br />

met in Seattle in late 1999. These sit-ins all require mass participation to have<br />

much effect, and thus are more suited to use by activists than by terrorists.<br />

• In 2000, a Japanese investigation revealed that the government was using<br />

software developed by computer companies affiliated with Aum Shinrikyo, the<br />

doomsday sect responsible for the sarin gas attack on the Tokyo subway system<br />

Page 34 of 174


in 1995. "The government found 100 types of software programs used by at least<br />

10 Japanese government agencies, including the Defense Ministry, and more<br />

than 80 major Japanese companies, including Nippon Telegraph and<br />

Telephone." Following the discovery, the Japanese government suspended use<br />

of Aum-developed programs out of concern that Aum-related companies may<br />

have compromised security by breaching firewalls. gaining access to sensitive<br />

systems or information, allowing invasion by outsiders, planting viruses that could<br />

be set off later, or planting malicious code that could cripple computer systems<br />

and key data system.<br />

• In March 2013, The New York Times reported on a pattern of cyber attacks<br />

against U.S. financial institutions believed to be instigated by Iran as well as<br />

incidents affecting South Korean financial institutions that originate with the North<br />

Korean government.<br />

• In August 2013, media companies including The New York Times, Twitter and<br />

the Huffington Post lost control of some of their websites after hackers supporting<br />

the Syrian government breached the Australian Internet company that manages<br />

many major site addresses. The Syrian Electronic Army, a hacker group that has<br />

Page 35 of 174


previously attacked media organizations that it considers hostile to the regime of<br />

Syrian president Bashar al-Assad, claimed credit for the Twitter and Huffington<br />

Post hacks in a series of Twitter messages. Electronic records showed that<br />

NYTimes.com, the only site with an hours-long outage, redirected visitors to a<br />

server controlled by the Syrian group before it went dark.<br />

• Pakistani <strong>Cyber</strong> Army is the name taken by a group of hackers who are known<br />

for their defacement of websites, particularly Indian, Chinese,<br />

and Israeli companies and governmental organizations, claiming to<br />

represent Pakistani nationalist and Islamic interests. The group is thought to<br />

have been active since at least 2008, and maintains an active presence on social<br />

media, especially Facebook. Its members have claimed responsibility for the<br />

hijacking of websites belonging to Acer, BSNL, India's CBI, Central Bank, and the<br />

State Government of Kerala.<br />

• British hacker Kane Gamble, sentenced to 2 years in youth detention, posed<br />

as CIA chief to access highly sensitive information. He also "cyber-terrorized"<br />

high-profile U.S. intelligence officials such as then CIA chief John Brennan or<br />

Director of National Intelligence James Clapper. The judge said Gamble engaged<br />

in "politically motivated cyber terrorism."<br />

Sabotage<br />

Non-political acts of sabotage have caused financial and other damage. In 2000,<br />

disgruntled employee Vitek Boden caused the release of 800,000 liters of untreated<br />

sewage into waterways in Maroochy Shire, Australia.<br />

More recently, in May 2007 Estonia was subjected to a mass cyber-attack in the wake<br />

of the removal of a Russian World War II war memorial from downtown Tallinn. The<br />

attack was a distributed denial-of-service attack in which selected sites were<br />

bombarded with traffic to force them offline; nearly all Estonian government ministry<br />

networks as well as two major Estonian bank networks were knocked offline; in addition,<br />

the political party website of Estonia's Prime Minister Andrus Ansip featured a<br />

counterfeit letter of apology from Ansip for removing the memorial statue. Despite<br />

speculation that the attack had been coordinated by the Russian government, Estonia's<br />

defense minister admitted he had no conclusive evidence linking cyber attacks to<br />

Russian authorities. Russia called accusations of its involvement "unfounded", and<br />

neither NATO nor European Commission experts were able to find any conclusive proof<br />

of official Russian government participation. In January 2008 a man from Estonia was<br />

convicted for launching the attacks against the Estonian Reform Party website and<br />

fined.<br />

During the Russia-Georgia War, on 5 August 2008, three days before Georgia launched<br />

its invasion of South Ossetia, the websites for OSInform News<br />

Agency and OSRadio were hacked. The OSinform website at osinform.ru kept its<br />

header and logo, but its content was replaced by a feed to the Alania TV website<br />

Page 36 of 174


content. Alania TV, a Georgian government-supported television station aimed at<br />

audiences in South Ossetia, denied any involvement in the hacking of the<br />

websites. Dmitry Medoyev, at the time the South Ossetian envoy to Moscow, claimed<br />

that Georgia was attempting to cover up information on events which occurred in the<br />

lead-up to the war. One such cyber attack caused the Parliament of<br />

Georgiaand Georgian Ministry of Foreign Affairs websites to be replaced by images<br />

comparing Georgian president Mikheil Saakashvili to Adolf Hitler. Other attacks<br />

involved denials of service to numerous Georgian and Azerbaijani websites, such as<br />

when Russian hackers allegedly disabled the servers of the Azerbaijani Day.Az news<br />

agency.<br />

In June 2019, Russia has conceded that it is "possible" its electrical grid is under cyberattack<br />

by the United States. The New York Times reported that American hackers from<br />

the United States <strong>Cyber</strong> Command planted malware potentially capable of disrupting<br />

the Russian electrical grid.<br />

Website Defacement and Denial of Service<br />

Even more recently, in October 2007, the website of Ukrainian president Viktor<br />

Yushchenko was attacked by hackers. A radical Russian nationalist youth group,<br />

the Eurasian Youth Movement, claimed responsibility.<br />

In 1999 hackers attacked NATO computers. The computers flooded them with email<br />

and hit them with a denial-of-service attack. The hackers were protesting against<br />

Page 37 of 174


the NATO bombings of the Chinese embassy in Belgrade. Businesses, public<br />

organizations and academic institutions were bombarded with highly politicized emails<br />

containing viruses from other European countries.<br />

In December 2018, Twitter warned of "unusual activity" from China and Saudi Arabia. A<br />

bug was detected in November that could have revealed the country code of users'<br />

phone numbers. Twitter said the bug could have had ties to "state-sponsored actors".<br />

In fiction<br />

• The Japanese cyberpunk manga, Ghost in the Shell (as well as its popular movie<br />

and TV adaptations) centers around an anti-cyberterrorism and cybercrime unit.<br />

In its mid-21st century Japan setting such attacks are made all the more<br />

threatening by an even more widespread use of technology including cybernetic<br />

enhancements to the human body allowing people themselves to be direct<br />

targets of cyberterrorist attacks.<br />

• Dan Brown's Digital Fortress.<br />

• Amy Eastlake's Private Lies.<br />

• In the movie Live Free or Die Hard, John McClane (Bruce Willis) takes on a<br />

group of cyberterrorists intent on shutting down the entire computer network of<br />

the United States.<br />

• The movie Eagle Eye involves a super computer controlling everything electrical<br />

and networked to accomplish the goal.<br />

• The plots of 24 Day 4 and Day 7 include plans to breach the nation's nuclear<br />

plant grid and then to seize control of the entire critical infrastructure protocol.<br />

• The Tom Clancy created series Netforce was about a FBI/Military team<br />

dedicated to combating cyberterrorists.<br />

• Much of the plot of Mega Man Battle Network is centered around cyberterrorism.<br />

• In the 2009 Japanese animated film Summer Wars, an artificial intelligence<br />

cyber-terrorist attempts to take control over the world's missiles in order to "win"<br />

against the main characters that attempted to keep it from manipulating the<br />

world's electronic devices.<br />

• In the 2012 film Skyfall, part of the James Bond franchise, main villain Raoul<br />

Silva (Javier Bardem) is an expert cyberterrorist who is responsible for various<br />

cyberterrorist incidents in the past.<br />

Page 38 of 174


• <strong>Cyber</strong>terrorism plays a role in the 2012 video game Call of Duty: Black Ops II,<br />

first when main antagonist Raul Menendez cripples the Chinese economy with a<br />

cyberattack and frames the United States for it, starting a new Cold War between<br />

the two powers. Later, another cyberattack with a computer worm leads to<br />

Menendez seizing control of the entire U.S drone fleet.<br />

• Finally, one of the game's endings leads to another attack similar to the latter,<br />

this time crippling the U.S' electrical and water distribution grids. An alternate<br />

ending depicts the cyberattack failing after it is stopped by one of the game's<br />

characters pivotal to the storyline.<br />

• The plot of the 2013 video game Watch Dogs is heavily influenced by cyberterrorism.<br />

In which players take control of the game's protagonist, Aiden Pierce,<br />

an accused murder suspect, who hacks into a ctOS (Central Operating System),<br />

giving him complete control of Chicago's mainframe in order to hunt down his<br />

accusers.<br />

• The video game Metal Slug 4 focuses on Marco and Fio, joined by newcomers<br />

Nadia and Trevor, to battle a terrorist organization known as Amadeus that is<br />

threatening the world with a computer virus.<br />

• The visual novel Baldr Force has the main character Tooru Souma joining a<br />

military organization to fight cyberterrorism to avenge the death of his friend.<br />

• The Japanese manga and live action Bloody Monday is highly influenced by<br />

hacking and cracking. The main character Takagi Fujimaru is a Super Elite<br />

hacker which use his hacking knowledge to fight against his enemies.<br />

• In the 2016 movie Death Note: Light Up the New World society is afflicted with<br />

cyber-terrorism.<br />

Page 39 of 174


• In Mr Robot the main plot line follows groups of hackers who engage in cyber<br />

terrorism as well as other events.<br />

• In "The President is Missing," a novel by Bill Clinton and James Patterson.<br />

Page 40 of 174


II. <strong>Cyber</strong>warfare<br />

<strong>Cyber</strong>warfare is a broad term describing the use of technological force<br />

within cyberspace. ‘<strong>Cyber</strong>warfare’ does not imply scale, protraction or violence which<br />

are typically associated with the term ‘war’. There is significant debate among experts<br />

regarding the definition of cyberwarfare, and even if such a thing exists. The term<br />

‘<strong>Cyber</strong>warfare’ is a misnomer, to date no offensive cyber actions could be described as<br />

‘war’. Offensive cyber actions, such as those in Estonia in 2007, Georgia in 2008, Iran in<br />

2010, North Korea have occurred in the context of international relations, only resulting<br />

in condemnation and denial by sides.<br />

<strong>Cyber</strong>warfare may not meet the typical definition of the term war, however, many states<br />

including the United States, United Kingdom, Russia, India, China, Israel, Iran, North<br />

Korea and Vietnam have active cyber operations for offensive and defensive<br />

operations. As states explore the<br />

use of cyber operations and<br />

combine capabilities the<br />

likelihood of physical<br />

confrontation and violence playing out<br />

as a result of, or<br />

part of, a cyber<br />

operation is increased.<br />

However, meeting the scale and<br />

protracted nature of war is unlikely,<br />

thus ambiguity remains.<br />

The first instance of kinetic force<br />

used in response<br />

to a cyber-attack<br />

resulting in the loss<br />

of human life was<br />

observed on May 5, 2019, when<br />

the Israel Defense<br />

Forces targeted<br />

and destroyed a building associated with an on-going cyber-attack.<br />

Definition<br />

A number of definitions of cyberwarfare have been proposed, with no single definition<br />

being widely adopted internationally. Richard A. Clarke defines it as "actions by a<br />

nation-state to penetrate another nation's computers or networks for the purposes of<br />

causing damage or disruption." Martin Libicki defines two types of cyberwarfare:<br />

Strategic and operational, with strategic being "a campaign of cyberattacks one entity<br />

carries out on another", whilst operational cyberwarfare "involves the use of<br />

cyberattacks on the other side’s military in the context of a physical war."<br />

Other definitions include non-state actors, such as terrorist groups, companies, political<br />

or ideological extremist groups, terrorist hacktivists, and transnational criminal<br />

organizations.<br />

Page 41 of 174


Some governments have made it an integral part of their overall military strategy, with<br />

some having invested heavily in cyberwarfare capability. One kind of cyberwarfare<br />

involves the kind of hacking that is the concern of penetration testing; in such cases, a<br />

government entity has established it as a warfighting capability, or a non-governmental<br />

entity has used it as a weapon against a state or its concerns.<br />

This capability uses the same set of penetration testing methodologies but applies<br />

them, in the case of United States doctrine, in a strategic way to:<br />

• Prevent cyber attacks against critical infrastructure.<br />

• Reduce national vulnerability to cyber attacks.<br />

• Minimize damage and recovery time from cyber attacks.<br />

Offensive operations are also part of these national level strategies for officially declared<br />

wars as well as undeclared secretive operations.<br />

Types of Threat<br />

<strong>Cyber</strong> warfare can present a multitude of threats towards a nation. At the most basic<br />

level, cyber attacks can be used to support traditional warfare. For example, tampering<br />

with the operation of air defenses via cyber means in order to facilitate an air<br />

attack. Aside from these "hard" threats, cyber warfare can also contribute towards "soft"<br />

threats such as espionage and propaganda.<br />

Espionage<br />

Traditional espionage is not an act of war, nor is cyber-espionage, and both are<br />

generally assumed to be ongoing between major powers. Despite this assumption,<br />

some incidents can cause serious tensions between nations, and are often described as<br />

"attacks". For example:<br />

• Massive spying by the US on many countries, revealed by Edward Snowden.<br />

• After the NSA's spying on Germany's Chancellor Angela Merkel was revealed,<br />

the Chancellor compared the NSA with the Stasi.<br />

• The NSA recording nearly every cell phone conversation in the Bahamas, without<br />

the Bahamian government's permission, and similar programs in Kenya,<br />

the Philippines, Mexico and Afghanistan.<br />

• The "Titan Rain" probes of American defense contractors computer systems<br />

since 2003.<br />

• The Office of Personnel Management data breach, in the US, widely attributed to<br />

China.<br />

Page 42 of 174


Out of all cyber attacks, 25% of them are espionage based.<br />

Sabotage<br />

Computers and satellites that coordinate other activities are vulnerable components of a<br />

system and could lead to the disruption of equipment. Compromise of military systems,<br />

such as C4ISTAR components that are responsible for orders and communications<br />

could lead to their interception or malicious replacement. Power, water, fuel,<br />

communications, and transportation infrastructure all may be vulnerable to disruption.<br />

According to Clarke, the civilian realm is also at risk, noting that the security breaches<br />

have already gone beyond stolen credit card numbers, and that potential targets can<br />

also include the electric power grid, trains, or the stock market.<br />

In mid-July 2010, security experts discovered a<br />

malicious software program called Stuxnet that<br />

had infiltrated factory computers and had spread to<br />

plants around the world. It is considered "the first<br />

attack on critical industrial infrastructure that sits at<br />

the foundation of modern economies," notes The<br />

New York Times.<br />

Stuxnet, while extremely effective in delaying Iran's<br />

nuclear program for the development of nuclear<br />

weaponry, came at a high cost. For the first time, it<br />

became clear that not only could cyber weapons be defensive but they could be<br />

offensive. The large decentralization and scale of cyberspace makes it extremely<br />

difficult to direct from a policy perspective. Non-state actors can play as large a part in<br />

the cyberwar space as state actors, which leads to dangerous, sometimes disastrous,<br />

consequences. Small groups of highly skilled malware developers are able to as<br />

effectively impact global politics and cyber warfare as large governmental agencies. A<br />

major aspect of this ability lies in the willingness of these groups to share their exploits<br />

and developments on the web as a form of arms proliferation. This allows lesser<br />

hackers to become more proficient in creating the large scale attacks that once only a<br />

small handful were skillful enough to manage. In addition, thriving black markets for<br />

these kinds of cyber weapons are buying and selling these cyber capabilities to the<br />

highest bidder without regard for consequences.<br />

Denial-of-Service Attack<br />

In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service<br />

attack (DoS attack) is an attempt to make a machine or network resource unavailable to<br />

its intended users. Perpetrators of DoS attacks typically target sites or services hosted<br />

on high-profile web servers such as banks, credit card payment gateways, and even<br />

root name servers. DoS attacks may not be limited to computer-based methods, as<br />

strategic physical attacks against infrastructure can be just as devastating. For example,<br />

Page 43 of 174


cutting undersea communication cables may severely cripple some regions and<br />

countries with regards to their information warfare ability.<br />

Electrical Power Grid<br />

The federal government of the United States admits that the electric power grid is<br />

susceptible to cyberwarfare. The United States Department of Homeland Security works<br />

with industries to identify vulnerabilities and to help industries enhance the security of<br />

control system networks. The federal government is also working to ensure that security<br />

is built in as the next generation of "smart grid" networks are developed. In April 2009,<br />

reports surfaced that China and Russia had infiltrated the U.S. electrical grid and left<br />

behind software programs that could be used to disrupt the system, according to current<br />

and former national security officials. The North American Electric Reliability<br />

Corporation (NERC) has issued a public notice that warns that the electrical grid is not<br />

adequately protected from cyber attack. China denies intruding into the U.S. electrical<br />

grid. One countermeasure would be to disconnect the power grid from the Internet and<br />

run the net with droop speed control only. Massive power outages caused by a cyber<br />

attack could disrupt the economy, distract from a simultaneous military attack, or create<br />

a national trauma.<br />

Iranian hackers, possibly Iranian <strong>Cyber</strong> Army pushed a massive power outage for 12<br />

hours in 44 of 81 provinces of Turkey, holding 40 million<br />

people. Istanbul and Ankara were among the places suffering blackout.<br />

Howard Schmidt, former <strong>Cyber</strong>-Security Coordinator of the US, commented on those<br />

possibilities:<br />

It's possible that hackers have gotten into administrative computer systems of utility<br />

companies, but says those aren't linked to the equipment controlling the grid, at least not<br />

in developed countries. [Schmidt] has never heard that the grid itself has been hacked.<br />

In June 2019, Russia said that its electrical grid has been under cyber-attack by the<br />

United States. The New York Times reported that American hackers from the United<br />

States <strong>Cyber</strong> Command planted malware potentially capable of disrupting the Russian<br />

electrical grid.<br />

Propaganda<br />

<strong>Cyber</strong> propaganda is an effort to control information in whatever form it takes, and<br />

influence public opinion. [47] It is a form of psychological warfare, except it uses social<br />

media, fake news websites and other digital means. In 2018, Sir Nicholas Carter, Chief<br />

of the General Staff of the British Army stated that this kind of attack from actors such<br />

as Russia "is a form of system warfare that seeks to de-legitimize the political and social<br />

system on which our military strength is based".<br />

Jowell and O'Donnell (2006) state that "propaganda is the deliberate, systematic<br />

attempt to shape perceptions, manipulate cognitions, and direct behavior to achieve a<br />

Page 44 of 174


esponse that furthers the desired intent of the propagandist" (p. 7). The internet is a<br />

phenomenal means of communication. People can get their message across to a huge<br />

audience, and with this opens a window for evil. Terrorist organizations can use this<br />

medium to brainwash people. It has been suggested that restricted media coverage of<br />

terrorist attacks would in turn decrease the number of terrorist attacks that occur<br />

afterwards (Cowen 2006).<br />

Economic Disruption<br />

In 2017, the WannaCry and Petya (NotPetya) cyber attacks, masquerading as<br />

ransomware, caused large-scale disruptions in Ukraine as well as to the U.K.’s National<br />

Health Service, pharmaceutical giant Merck, Maersk shipping company and other<br />

organizations around the world. These attacks are also categorized as cybercrimes,<br />

specifically financial crime because they negatively affects a company or group.<br />

Military<br />

Motivations<br />

In the U.S., General Keith B. Alexander, first head of USCYBERCOM, told the Senate<br />

Armed Services Committee that computer network warfare is evolving so rapidly that<br />

there is a "mismatch between our technical capabilities to conduct operations and the<br />

governing laws and policies. <strong>Cyber</strong> Command is the newest global combatant and its<br />

sole mission is cyberspace, outside the traditional battlefields of land, sea, air and<br />

space." It will attempt to find and, when necessary, neutralize cyberattacks and to<br />

defend military computer networks.<br />

Alexander sketched out the broad battlefield envisioned for the computer warfare<br />

command, listing the kind of targets that his new headquarters could be ordered to<br />

attack, including "traditional battlefield prizes – command-and-control systems at military<br />

headquarters, air defense networks and weapons systems that require computers to<br />

operate."<br />

Page 45 of 174


One cyber warfare scenario, <strong>Cyber</strong> ShockWave, which was wargamed on the cabinet<br />

level by former administration officials, raised issues ranging from the National Guard to<br />

the power grid to the limits of statutory authority.<br />

The distributed nature of internet based attacks means that it is difficult to determine<br />

motivation and attacking party, meaning that it is unclear when a specific act should be<br />

considered an act of war.<br />

Examples of cyberwarfare driven by political motivations can be found worldwide. In<br />

2008, Russia began a cyber attack on the Georgian government website, which was<br />

carried out along with Georgian military operations in South Ossetia. In 2008, Chinese<br />

'nationalist hackers' attacked CNN as it reported on Chinese repression on Tibet.<br />

Jobs in cyberwarfare have become increasingly popular in the military. All four branches<br />

of the United States military actively recruit for cyber warfare positions.<br />

Civil<br />

Potential targets in internet sabotage include all aspects of the Internet from<br />

the backbones of the web, to the internet service providers, to the varying types of data<br />

communication mediums and network equipment. This would include: web servers,<br />

enterprise information systems, client server systems, communication links, network<br />

equipment, and the desktops and laptops in businesses and homes. Electrical grids,<br />

financial networks, and telecommunication systems are also deemed vulnerable,<br />

especially due to current trends in computerization and automation.<br />

Hacktivism<br />

Politically motivated hacktivism involves the subversive use of computers and computer<br />

networks to promote an agenda, and can potentially extend to attacks, theft and virtual<br />

sabotage that could be seen as cyberwarfare – or mistaken for it. Hacktivists use their<br />

knowledge and software tools to gain unauthorized access to computer systems they<br />

seek to manipulate or damage not for material gain or to cause widespread destruction,<br />

but to draw attention to their cause through well-publicized disruptions of select targets.<br />

Anonymous and other hacktivist groups are often portrayed in the media as cyberterrorists,<br />

wreaking havoc by hacking websites, posting sensitive information about their<br />

victims, and threatening further attacks if their demands are not met. However,<br />

hacktivism is more than that. They are politically motivated to change the world, through<br />

the use of fundamentalism. Groups like Anonymous have divided opinion with their<br />

methods.<br />

Private Sector<br />

Computer hacking represents a modern threat in ongoing global conflicts and industrial<br />

espionage and as such is presumed to widely occur. It is typical that this type of crime is<br />

underreported to the extent they are known. According to McAfee's George Kurtz,<br />

Page 46 of 174


corporations around the world face millions of cyberattacks a day. "Most of<br />

these attacks don't gain any media attention or lead to strong political statements by<br />

victims." This type of crime is usually financially motivated.<br />

Non-Profit Research<br />

But not all examinations with the issue of cyberwarfare are achieving profit or personal<br />

gain. There are still institutes and companies like the University of Cincinnati or<br />

the Kaspersky Security Lab which are trying to increase the sensibility of this topic by<br />

researching and publishing of new security threats.<br />

By Region<br />

Approximately 120 countries have been<br />

developing ways to use the Internet as<br />

a weapon and target financial markets,<br />

government computer systems and<br />

utilities.<br />

Asia<br />

China<br />

Foreign Policy magazine puts the size of China's "hacker army" at anywhere from<br />

50,000 to 100,000 individuals.<br />

Diplomatic cables highlight US concerns that China is using access to Microsoft source<br />

code and 'harvesting the talents of its private sector' to boost its offensive and defensive<br />

capabilities.<br />

The 2018 cyberattack on the Marriott hotel chain that collected personal details of<br />

roughly 500 million guests is now known to be a part of a Chinese intelligence-gathering<br />

effort that also hacked health insurers and the security clearance files of millions more<br />

Americans, The hackers, are suspected of working on behalf of the Ministry of State<br />

Security, the country's Communist-controlled civilian spy agency. "The information is<br />

exactly what the Chinese use to root out spies, recruit intelligence agents and build a<br />

rich repository of Americans’ personal data for future targeting."<br />

A 2008 article in the Culture Mandala: The Bulletin of the Centre for East-West Cultural<br />

and Economic Studies by Jason Fritz alleges that the Chinese government from 1995 to<br />

2008 was involved in a number of high-profile cases of espionage, primarily through the<br />

use of a "decentralized network of students, business people, scientists, diplomats, and<br />

engineers from within the Chinese Diaspora". A defector in Belgium, purportedly an<br />

agent, claimed that there were hundreds of spies in industries throughout Europe, and<br />

on his defection to Australia Chinese diplomat Chen Yonglin said there were over 1,000<br />

such in that country. In 2007, a Russian executive was sentenced to 11 years for<br />

Page 47 of 174


passing information about the rocket and space technology organization to China.<br />

Targets in the United States have included 'aerospace engineering programs, space<br />

shuttle design, C4ISR data, high-performance computers, Nuclear weapon<br />

design, cruise missile data, semiconductors, integrated circuit design, and details of US<br />

arms sales to Taiwan'.<br />

While China continues to be held responsible for a string of cyber-attacks on a number<br />

of public and private institutions in the United States, India, Russia, Canada, and<br />

France, the Chinese government denies any involvement in cyber-spying campaigns.<br />

The administration maintains the position that China is not the threat but rather the<br />

victim of an increasing number of cyber-attacks. Most reports about China's cyber<br />

warfare capabilities have yet to be confirmed by the Chinese government.<br />

According to Fritz, China has expanded its cyber capabilities and military technology by<br />

acquiring foreign military technology. Fritz states that the Chinese government uses<br />

"new space-based surveillance and intelligence gathering systems, Anti-satellite<br />

weapon, anti-radar, infrared decoys, and false target generators" to assist in this quest,<br />

and that they support their "informationization" of their military through "increased<br />

education of soldiers in cyber warfare; improving the information network for military<br />

training, and has built more virtual laboratories, digital libraries and digital<br />

campuses." Through this informationization, they hope to prepare their forces to engage<br />

in a different kind of warfare, against technically capable adversaries. Many recent news<br />

reports link China's technological capabilities to the beginning of a new 'cyber cold war.'<br />

In response to reports of cyberattacks by China against the United States, Amitai<br />

Etzioni of the Institute for Communitarian Policy Studies has suggested that China and<br />

the United States agree to a policy of mutually assured restraint with respect to<br />

cyberspace. This would involve allowing both states to take the measures they deem<br />

necessary for their self-defense while simultaneously agreeing to refrain from taking<br />

offensive steps; it would also entail vetting these commitments.<br />

Operation Shady RAT is an ongoing series of cyber attacks starting mid-2006, reported<br />

by Internet security company McAfee in August 2011. China is widely believed to be the<br />

state actor behind these attacks which hit at least 72 organizations including<br />

governments and defense contractors.<br />

India<br />

The Department of Information Technology created the Indian Computer Emergency<br />

Response Team (CERT-In) in 2004 to thwart cyber attacks in India. That year, there<br />

were 23 reported cyber security breaches. In 2011, there were 13,301. That year, the<br />

government created a new subdivision, the National Critical Information Infrastructure<br />

Protection Centre(NCIIPC) to thwart attacks against energy, transport, banking,<br />

telecom, defense, space and other sensitive areas.<br />

Page 48 of 174


The Executive Director of the Nuclear Power Corporation of India (NPCIL) stated in<br />

February 2013 that his company alone was forced to block up to ten targeted attacks a<br />

day. CERT-In was left to protect less critical sectors.<br />

A high-profile cyber attack on 12 July 2012 breached the email accounts of about<br />

12,000 people, including those of officials from the Ministry of External Affairs, Ministry<br />

of Home Affairs, Defense Research and Development Organisation (DRDO), and<br />

the Indo-Tibetan Border Police (ITBP). A government-private sector plan being<br />

overseen by National Security Advisor (NSA) Shivshankar Menon began in October<br />

2012, and intends to beef up India's cyber security capabilities in the light of a group of<br />

experts findings that India faces a 470,000 shortfall of such experts despite the<br />

country's reputation of being an IT and software powerhouse.<br />

In February 2013, Information Technology Secretary J. Satyanarayana stated that<br />

the NCIIPC was finalizing policies related to national cyber security that would focus on<br />

domestic security solutions, reducing exposure through foreign technology. Other steps<br />

include the isolation of various security agencies to ensure that a synchronized attack<br />

could not succeed on all fronts and the planned appointment of a National <strong>Cyber</strong><br />

Security Coordinator. As of that month, there had been no significant economic or<br />

physical damage to India related to cyber attacks.<br />

On 26 November 2010, a group calling itself the Indian <strong>Cyber</strong> Army hacked the<br />

websites belonging to the Pakistan Army and the others belong to different ministries,<br />

including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance,<br />

Page 49 of 174


Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a<br />

revenge for the Mumbai terrorist attacks.<br />

On 4 December 2010, a group calling itself the Pakistan <strong>Cyber</strong> Army hacked the<br />

website of India's top investigating agency, the Central Bureau of Investigation (CBI).<br />

The National Informatics Center (NIC) has begun an inquiry.<br />

In July 2016, Cymmetria researchers discovered and revealed the cyber attack dubbed<br />

'Patchwork', which compromised an estimated 2500 corporate and government<br />

agencies using code stolen from GitHub and the dark web. Examples of weapons used<br />

are an exploit for the Sandworm vulnerability (CVE-2014-4114), a compiled AutoIt<br />

script, and UAC bypass code dubbed UACME. Targets are believed to be mainly<br />

military and political assignments around Southeast Asia and the South China Sea and<br />

the attackers are believed to be of Indian origin and gathering intelligence from<br />

influential parties.<br />

The Defense <strong>Cyber</strong> Agency, which is the Indian Military agency responsible for<br />

<strong>Cyber</strong>warfare, is expected to become operational by November 2019.<br />

Philippines<br />

The Chinese are being blamed after a cyber security company, F-Secure Labs, found a<br />

malware, NanHaiShu, which targeted the Philippines Department of Justice. It sent<br />

information in an infected machine to a server with a Chinese IP address. The malware<br />

which is considered particularly sophisticated in nature was introduced by phishing<br />

emails that were designed to look like they were coming from an authentic sources. The<br />

information sent is believed to be relating to the South China Sea legal case.<br />

Russia<br />

When Russia was still a part of the Soviet Union in 1982, a portion of its Trans-Siberia<br />

pipeline within its territory exploded, allegedly due to computer malware implanted in the<br />

pirated Canadian software by the Central Intelligence Agency. The malware caused the<br />

SCADA system running the pipeline to malfunction.<br />

The "Farewell Dossier" provided information on this attack, and wrote that compromised<br />

computer chips would become a part of Soviet military equipment, flawed turbines<br />

would be placed in the gas pipeline, and defective plans would disrupt the output of<br />

chemical plants and a tractor factor. This caused the "most monumental nonnuclear<br />

explosion and fire ever seen from space." However, the Soviet Union did not blame the<br />

United States for the attack.<br />

Russian, South Ossetian, Georgian and Azerbaijani sites were attacked by hackers<br />

during the 2008 South Ossetia War.<br />

Page 50 of 174


Russian-Led <strong>Cyber</strong>attacks<br />

It has been claimed that Russian security services organized a number of denial of<br />

service attacks as a part of their cyber-warfare against other countries, most notably<br />

the 2007 cyberattacks on Estonia and the 2008 cyberattacks on Russia, South Ossetia,<br />

Georgia, and Azerbaijan. One identified young Russian hacker said that he was paid<br />

by Russian state security services to lead hacking attacks on NATO computers. He was<br />

studying computer sciences at the Department of the Defense of Information. His tuition<br />

was paid for by the FSB.<br />

South Korea<br />

In July 2009, there were a series of coordinated denial of service attacks against major<br />

government, news media, and financial websites in South Korea and the United States.<br />

While many thought the attack was directed by North Korea, one researcher traced the<br />

attacks to the United Kingdom. Security researcher Chris Kubecka presented evidence<br />

multiple European Union and United Kingdom companies unwittingly helped attack<br />

South Korea due to a W32.Dozer infections, malware used in part of the attack. Some<br />

of the companies used in the attack were partially owned by several governments,<br />

further complicating attribution.<br />

In July 2011, the South Korean company SK Communications was hacked, resulting in<br />

the theft of the personal details (including names, phone numbers, home and email<br />

addresses and resident registration numbers) of up to 35 million people. A trojaned<br />

software update was used to gain access to the SK Communications network. Links<br />

exist between this hack and other malicious activity and it is believed to be part of a<br />

broader, concerted hacking effort.<br />

Page 51 of 174


With ongoing tensions on the Korean Peninsula, South Korea's defense ministry stated<br />

that South Korea was going to improve cyber-defense strategies in hopes of preparing<br />

itself from possible cyber attacks. In March 2013, South Korea's major banks – Shinhan<br />

Bank, Woori Bank and NongHyup Bank – as well as many broadcasting stations – KBS,<br />

YTN and MBC – were hacked and more than 30,000 computers were affected; it is one<br />

of the biggest attacks South Korea has faced in years. Although it remains uncertain as<br />

to who was involved in this incident, there has been immediate assertions that North<br />

Korea is connected, as it threatened to attack South Korea's government institutions,<br />

major national banks and traditional newspapers numerous times – in reaction to the<br />

sanctions it received from nuclear testing and to the continuation of Foal Eagle, South<br />

Korea's annual joint military exercise with the United States.<br />

North Korea's cyber warfare capabilities raise the alarm for South Korea, as North<br />

Korea is increasing its manpower through military academies specializing in hacking.<br />

Current figures state that South Korea only has 400 units of specialized personnel,<br />

while North Korea has more than 3,000 highly trained hackers; this portrays a huge gap<br />

in cyber warfare capabilities and sends a message to South Korea that it has to step up<br />

and strengthen its <strong>Cyber</strong> Warfare Command forces. Therefore, in order to be prepared<br />

from future attacks, South Korea and the United States will discuss further about<br />

deterrence plans at the Security Consultative Meeting (SCM). At SCM, they plan on<br />

developing strategies that focuses on accelerating the deployment of ballistic missiles<br />

as well as fostering its defense shield program, known as the Korean Air and Missile<br />

Defense.<br />

Estonia<br />

In April 2007, Estonia came under cyber attack in the wake of relocation of the Bronze<br />

Soldier of Tallinn. The largest part of the attacks were coming from Russia and from<br />

official servers of the authorities of Russia. In the attack, ministries, banks, and media<br />

were targeted. This attack on Estonia, a seemingly small Baltic nation, was so effective<br />

because of how most of the nation is run online. Estonia has implemented an e-<br />

government, where bank services, political elections and taxes are all done online. This<br />

attack really hurt Estonia's economy and the people of Estonia. At least 150 people<br />

were injured on the first day due to riots in the streets.<br />

France<br />

In 2013, the French Minister of Defense, Mr Jean-Yves Le Drian, ordered the creation of<br />

a cyber-army, representing its 4th national army corp (along with ground, naval and air<br />

forces) under the French Ministry of Defense, to protect French and European interests<br />

on its soil and abroad. A contract was made with French firm EADS (Airbus) to identify<br />

and secure its main elements susceptible to cyber threats. In 2016 France had thus built<br />

the largest cyber-army in Europe, with a planned 2600 "cyber-soldiers" and a 440<br />

million euros investment for cyber-security products for this new army corp. An<br />

additional 4400 reservists constitute the heart of this army from 2019.<br />

Page 52 of 174


Germany<br />

In 2013, Germany revealed the existence of their 60-person Computer Network<br />

Operation unit. The German intelligence agency, BND, announced it was seeking to<br />

hire 130 "hackers" for a new "cyber-defense station" unit. In March 2013, BND<br />

president Gerhard Schindler announced that his agency had observed up to five attacks<br />

a day on government authorities, thought mainly to originate in China. He confirmed the<br />

attackers had so far only accessed data and expressed concern that the stolen<br />

information could be used as the basis of future sabotage attacks against arms<br />

manufacturers, telecommunications companies and government and military<br />

agencies. Shortly after Edward Snowden leaked details of the U.S. National Security<br />

Agency's cyber surveillance system, German Interior Minister Hans-Peter<br />

Friedrich announced that the BND would be given an additional budget of 100 million<br />

Euros to increase their cyber surveillance capability from 5% of total internet traffic in<br />

Germany to 20% of total traffic, the maximum amount allowed by German law.<br />

Netherlands<br />

In the Netherlands, <strong>Cyber</strong> Defense is nationally<br />

coordinated by the National <strong>Cyber</strong> Security<br />

Centrum [nl] (NCSC). The Dutch Ministry of<br />

Defense laid out a cyber strategy in 2011. The<br />

first focus is to improve the cyber defense<br />

handled by the Joint IT branch (JIVC). To<br />

improve intel operations the intel community in<br />

the Netherlands (including the military intel<br />

organization MIVD) has set up the Joint Sigint <strong>Cyber</strong> Unit (JSCU). The ministry of<br />

Defense is furthermore setting up an offensive cyber force, called Defensie <strong>Cyber</strong><br />

Command (DCC), which will be operational in the end of 2014.<br />

Sweden<br />

In January 2017, Sweden's armed forces were subjected to a cyber-attack that caused<br />

them to shutdown a so-called Caxcis IT system used in military exercises.<br />

Ukraine<br />

According to Crowd-Strike from 2014 to 2016, the Russian APT Fancy Bear used<br />

Android malware to target the Ukrainian Army's Rocket Forces and Artillery. They<br />

distributed an infected version of an Android app whose original purpose was to control<br />

targeting data for the D-30 Howitzer artillery. The app, used by Ukrainian officers, was<br />

loaded with the X-Agent spyware and posted online on military forums. The attack was<br />

claimed by Crowd-Strike to be successful, with more than 80% of Ukrainian D-30<br />

Howitzers destroyed, the highest percentage loss of any artillery pieces in the army (a<br />

percentage that had never been previously reported and would mean the loss of nearly<br />

Page 53 of 174


the entire arsenal of the biggest artillery piece of the Ukrainian Armed<br />

Forces). According to the Ukrainian army this number is incorrect and that losses in<br />

artillery weapons "were way below those reported" and that these losses "have nothing<br />

to do with the stated cause".<br />

In 2014, the Russians were suspected to use a cyber weapon called "Snake", or<br />

"Ouroboros," to conduct a cyber attack on Ukraine during a period of political turmoil.<br />

The Snake tool kit began spreading into Ukrainian computer systems in 2010. It<br />

performed Computer Network Exploitation (CNE), as well as highly sophisticated<br />

Computer Network Attacks (CNA).<br />

On December 23, 2015 the BlackEnergy malware was used in a cyberattack on<br />

Ukraine's power grid that left more than 200,000 people temporarily without power. A<br />

mining company and a large railway operator were also victims of the attack.<br />

United Kingdom<br />

MI6 reportedly infiltrated an Al Qaeda website and replaced the instructions for making<br />

a pipe bomb with the recipe for making cupcakes.<br />

In October 2010, Iain Lobban, the director of the Government Communications<br />

Headquarters (GCHQ), said the UK faces a "real and credible" threat from cyber attacks<br />

by hostile states and criminals and government systems are targeted 1,000 times each<br />

month, such attacks threatened the UK's economic future, and some countries were<br />

already using cyber assaults to put pressure on other nations.<br />

On 12 November 2013, financial organizations in London conducted cyber war games<br />

dubbed 'Waking Shark 2' to simulate massive internet-based attacks against bank and<br />

other financial organizations. The Waking Shark 2 cyber war games followed a similar<br />

exercise in Wall Street.<br />

Iran<br />

Middle East<br />

Iran has been both victim and predator of several cyberwarfare operations. Iran is<br />

considered an emerging military power in the field.<br />

In September 2010, Iran was attacked by the Stuxnet worm, thought to specifically<br />

target its Natanz nuclear enrichment facility. It was a 500-kilobyte computer worm that<br />

infected at least 14 industrial sites in Iran, including the Natanz uranium-enrichment<br />

plant. Although the official authors of Stuxnet haven’t been officially identified, Stuxnet is<br />

believed to be developed and deployed by the United States and Israel. The worm is<br />

said to be the most advanced piece of malware ever discovered and significantly<br />

increases the profile of cyberwarfare.<br />

Page 54 of 174


Israel<br />

In the 2006 war against Hezbollah, Israel alleges that cyber-warfare was part of the<br />

conflict, where the Israel Defense Forces (IDF) intelligence estimates several countries<br />

in the Middle East used Russian hackers and scientists to operate on their behalf. As a<br />

result, Israel attached growing importance to cyber-tactics, and became, along with the<br />

U.S., France and a couple of other nations, involved in cyber-war planning.<br />

Many international high-tech companies are now locating research and development<br />

operations in Israel, where local hires are often veterans of the IDF's elite computer<br />

units. Richard A. Clarke adds that "our Israeli friends have learned a thing or two from<br />

the programs we have been working on for more than two decades."<br />

In September 2007, Israel carried out an airstrike on Syria dubbed Operation Orchard.<br />

U.S. industry and military sources speculated that the Israelis may have used<br />

cyberwarfare to allow their planes to pass undetected by radar into Syria.<br />

Following US President Donald Trump's decision to pull out of the Iran nuclear deal in<br />

May 2018, cyber warfare units in the United States and Israel monitoring internet traffic<br />

out of Iran noted a surge in retaliatory cyber attacks from Iran. Security firms warned<br />

that Iranian hackers were sending emails containing malware to diplomats who work in<br />

the foreign affairs offices of US allies and employees at telecommunications companies,<br />

trying to infiltrate their computer systems.<br />

Page 55 of 174


Saudi Arabia<br />

On August 15, 2012 at 11:08 am local time, the Shamoon virus began destroying over<br />

35,000 computer systems, rendering them inoperable. The virus used to target<br />

the Saudi government by causing destruction to the state owned national oil<br />

company Saudi Aramco. The attackers posted a pastie on PasteBin.com hours prior to<br />

the wiper logic bomb occurring, citing oppression and the Al-Saud regime as a reason<br />

behind the attack.<br />

The attack was well staged according to Christina Kubecka, a former security advisor to<br />

Saudi Aramco after the attack and group leader of security for Aramco Overseas. It was<br />

an unnamed Saudi Aramco employee on the Information Technology team which<br />

opened a malicious phishing email, allowing initial entry into the computer network<br />

around mid-2012.<br />

Kubecka also detailed in her Black Hat USA talk Saudi Aramco placed the majority of<br />

their security budget on the ICS control network, leaving the business network at risk for<br />

a major incident. "When you realize most of your security budget was spent on ICS & IT<br />

gets Pwnd".<br />

The virus has been noted to have behavior differing from other malware attacks, due to<br />

the destructive nature and the cost of the attack and recovery. US Defense<br />

Secretary Leon Panetta called the attack a "<strong>Cyber</strong> Pearl Harbor" Known years later as<br />

the "Biggest hack in history" and intended for cyber warfare. Shamoon can spread from<br />

an infected machine to other computers on the network. Once a system is infected, the<br />

virus continues to compile a list of files from specific locations on the system, upload<br />

them to the attacker, and erase them. Finally the virus overwrites the master boot<br />

record of the infected computer, making it unusable. The virus has been used for cyber<br />

warfare against the national oil companies Saudi Aramco and Qatar's RasGas.<br />

Saudi Aramco announced the attack on their Facebook page and went offline again<br />

until a company statement was issued on 25 August 2012. The statement falsely<br />

reported normal business was resumed on 25 August 2012. However a Middle Eastern<br />

journalist leaked photographs taken on 1 September 2012 showing kilometers of petrol<br />

trucks unable to be loaded due to backed business systems still inoperable.<br />

On August 29, 2012 the same attackers behind Shamoon posted another pastie on<br />

PasteBin.com, taunting Saudi Aramco with proof they still retained access to the<br />

company network. The post contained the username and password on security and<br />

network equipment and the new password for the CEO Khalid Al- Falih The attackers<br />

also referenced a portion of the Shamoon malware as further proof in the pastie.<br />

According to Kubecka, in order to restore operations. Saudi Aramco used its large<br />

private fleet of aircraft and available funds to purchase much of the world's hard drives,<br />

driving the price up. New hard drives were required as quickly as possible so oil prices<br />

Page 56 of 174


were not affected by speculation. By September 1, 2012 gasoline resources were<br />

dwindling for the public of Saudi Arabia 17 days after the August 15th<br />

attack. RasGas was also affected by a different variant, crippling them in a similar<br />

manner.<br />

Qatar<br />

In March 2018 American Republican fundraiser Elliott Broidy filed a lawsuit against<br />

Qatar, alleging that Qatar's government stole and leaked his emails in order to discredit<br />

him because he was viewed "as an impediment to their plan to improve the country's<br />

standing in Washington." In May 2018, the lawsuit named Mohammed bin Hamad bin<br />

Khalifa Al Thani, brother of the Emir of Qatar, and his associate Ahmed Al-Rumaihi, as<br />

allegedly orchestrating Qatar's cyber warfare campaign against Broidy. Further litigation<br />

revealed that the same cybercriminals who targeted Broidy had targeted as many as<br />

1,200 other individuals, some of whom are also "well-known enemies of Qatar" such as<br />

senior officials of the U.A.E., Egypt, Saudi Arabia, and Bahrain. While these hackers<br />

almost always obscured their location, some of their activity was traced to a<br />

telecommunication network in Qatar.<br />

United States<br />

North America<br />

<strong>Cyber</strong>warfare in the United States is a part of the American military strategy of proactive<br />

cyber defense and the use of cyberwarfare as a platform for attack. The new United<br />

States military strategy makes explicit that a cyberattack is casus belli just as a<br />

traditional act of war.<br />

Page 57 of 174


In 2013 <strong>Cyber</strong>warfare was, for the first time, considered a larger threat than Al Qaeda or<br />

terrorism, by many U.S. intelligence officials. In 2017, Representative Mike Rogers,<br />

chairman of the U.S. House Permanent Select Committee on Intelligence, for instance,<br />

said that "We are in a cyber war in this country, and most Americans don't know it. And<br />

we are not necessarily winning. We have got huge challenges when it comes to cybersecurity."<br />

U.S. government security expert Richard A. Clarke, in his book <strong>Cyber</strong> War (May 2010),<br />

defines "cyberwarfare" as "actions by a nation-state to penetrate another nation's<br />

computers or networks for the purposes of causing damage or disruption." The<br />

Economist describes cyberspace as "the fifth domain of warfare," and William J. Lynn,<br />

U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has<br />

formally recognized cyberspace as a new domain in warfare . . . [which] has become<br />

just as critical to military operations as land, sea, air, and space."<br />

In 2009, president Barack Obama declared America's digital infrastructure to be a<br />

"strategic national asset," and in May 2010 the Pentagon set up its new U.S. <strong>Cyber</strong><br />

Command (USCYBERCOM), headed by General Keith B. Alexander, director of<br />

the National Security Agency (NSA), to defend American military networks and attack<br />

other countries' systems. The EU has set up ENISA (European Union Agency for<br />

Network and Information Security) which is headed by Prof. Udo Helmbrecht and there<br />

are now further plans to significantly expand ENISA's capabilities. The United Kingdom<br />

has also set up a cyber-security and "operations centre" based in Government<br />

Communications Headquarters (GCHQ), the British equivalent of the NSA. In the U.S.<br />

however, <strong>Cyber</strong> Command is only set up to protect the military, whereas the<br />

government and corporate infrastructures are primarily the responsibility respectively of<br />

the Department of Homeland Security and private companies.<br />

In February 2010, top American lawmakers warned that the "threat of a crippling attack<br />

on telecommunications and computer networks was sharply on the rise." According to<br />

The Lipman Report, numerous key sectors of the U.S. economy along with that of other<br />

nations, are currently at risk, including cyber threats to public and private facilities,<br />

banking and finance, transportation, manufacturing, medical, education and<br />

government, all of which are now dependent on computers for daily operations. In 2009,<br />

president Obama stated that "cyber intruders have probed our electrical grids."<br />

The Economist writes that China has plans of "winning informationized wars by the mid-<br />

21st century". They note that other countries are likewise organizing for cyber-war,<br />

among them Russia, Israel and North Korea. Iran boasts of having the world's secondlargest<br />

cyber-army. James Gosler, a government cyber-security specialist, worries that<br />

the U.S. has a severe shortage of computer-security specialists, estimating that there<br />

are only about 1,000 qualified people in the country today, but needs a force of 20,000<br />

to 30,000 skilled experts. At the July 2010 Black Hat computer security<br />

conference, Michael Hayden, former deputy director of national intelligence, challenged<br />

thousands of attendees to help devise ways to "reshape the Internet's security<br />

Page 58 of 174


architecture", explaining, "You guys made the cyber world look like the north German<br />

plain."<br />

In January 2012, Mike McConnell, the former director of national intelligence at<br />

the National Security Agency under president George W. Bush told the Reuters news<br />

agency that the U.S. has already launched attacks on computer networks in other<br />

countries. McConnell did not name the country that the U.S. attacked but according to<br />

other sources it may have been Iran. In June 2012 the New York Times reported that<br />

president Obama had ordered the cyber attack on Iranian nuclear enrichment facilities.<br />

In August<br />

2010, the<br />

U.S. for the<br />

first time<br />

warned<br />

publicly<br />

about the<br />

Chinese<br />

military's<br />

use of<br />

civilian<br />

computer<br />

experts in<br />

clandestine<br />

cyber<br />

attacks<br />

aimed at<br />

American companies and government agencies. The Pentagon also pointed to an<br />

alleged China-based computer spying network dubbed GhostNet that was revealed in a<br />

research report last year. The Pentagon stated:<br />

The People's Liberation Army is using "information warfare units" to develop viruses to<br />

attack enemy computer systems and networks, and those units include civilian<br />

computer professionals. Commander Bob Mehal, will monitor the PLA's buildup of its<br />

cyberwarfare capabilities and will continue to develop capabilities to counter any<br />

potential threat.<br />

The United States Department of Defense sees the use of computers and the Internet<br />

to conduct warfare in cyberspace as a threat to national security. The United States<br />

Joint Forces Command describes some of its attributes:<br />

<strong>Cyber</strong>space technology is emerging as an "instrument of power" in societies, and is<br />

becoming more available to a country's opponents, who may use it to attack, degrade,<br />

and disrupt communications and the flow of information. With low barriers to entry,<br />

coupled with the anonymous nature of activities in cyberspace, the list of potential<br />

adversaries is broad. Furthermore, the globe-spanning range of cyberspace and its<br />

Page 59 of 174


disregard for national borders will challenge legal systems and complicate a nation's<br />

ability to deter threats and respond to contingencies.<br />

In February 2010, the United States Joint Forces Command released a study which<br />

included a summary of the threats posed by the internet:<br />

With very little investment, and cloaked in a veil of anonymity, our adversaries will<br />

inevitably attempt to harm our national interests. <strong>Cyber</strong>space will become a main front in<br />

both irregular and traditional conflicts. Enemies in cyberspace will include both states and<br />

non-states and will range from the unsophisticated amateur to highly trained professional<br />

hackers. Through cyberspace, enemies will target industry, academia, government, as<br />

well as the military in the air, land, maritime, and space domains. In much the same way<br />

that airpower transformed the battlefield of World War II, cyberspace has fractured the<br />

physical barriers that shield a nation from attacks on its commerce and communication.<br />

Indeed, adversaries have already taken advantage of computer networks and the power<br />

of information technology not only to plan and execute savage acts of terrorism, but also<br />

to influence directly the perceptions and will of the U.S. Government and the American<br />

population.<br />

On 6 October 2011, it was announced that Creech AFB's drone and<br />

Predator fleet's command and control data stream had been key-logged, resisting all<br />

attempts to reverse the exploit, for the past two weeks. The Air Force issued a<br />

statement that the virus had "posed no threat to our operational mission".<br />

On 21 November 2011, it was widely reported in the U.S. media that a hacker had<br />

destroyed a water pump at the Curran-Gardner Township Public Water District in<br />

Illinois. However, it later turned out that this information was not only false, but had been<br />

inappropriately leaked from the Illinois Statewide <strong>Terrorism</strong> and Intelligence Center.<br />

According to the Foreign Policy magazine, NSA's Tailored Access Operations (TAO)<br />

unit "has successfully penetrated Chinese computer and telecommunications systems<br />

for almost 15 years, generating some of the best and most reliable intelligence<br />

information about what is going on inside the People's Republic of China."<br />

On 24 November 2014. The Sony Pictures Entertainment hack was a release of<br />

confidential data belonging to Sony Pictures Entertainment (SPE).<br />

In June 2015, the United States Office of Personnel Management (OPM) announced<br />

that it had been the target of a data breach targeting the records of as many as four<br />

million people. Later, FBI Director James Comey put the number at 18<br />

million. The Washington Post has reported that the attack originated in China, citing<br />

unnamed government officials.<br />

In 2016, Jeh Johnson the United States Secretary of Homeland Security and James<br />

Clapper the U.S. Director of National Intelligence issued a joint statement accusing<br />

Russia of interfering with the 2016 United States presidential election. The New York<br />

Times reported the Obama administration has formally accused Russia of stealing and<br />

disclosing Democratic National Committee emails. Under U.S. law (50 U.S.C.Title 50 –<br />

Page 60 of 174


War and National Defense, Chapter 15 – National Security, Subchapter III<br />

Accountability for Intelligence Activities ) there must be a formal Presidential<br />

finding prior to authorizing a covert attack. U.S. vice president Joe Biden said on the<br />

American news interview program Meet The Press that the United States will<br />

respond. The New York Times noted that Biden's comment "seems to suggest that Mr.<br />

Obama is prepared to order — or has already ordered — some kind of covert<br />

action". On December 29 the United States imposed the most extensive sanctions<br />

against Russia since the Cold War, expelling 35 Russian diplomats from the United<br />

States.<br />

The United States has used cyberattacks for tactical advantage in Afghanistan.<br />

In 2014 Barack Obama ordered an intensification of cyberwarfare against North Korea's<br />

missile program for sabotaging test launches in their opening seconds. In 2016<br />

President Barack Obama authorized the planting of cyber weapons in Russian<br />

infrastructure in the final weeks of his presidency in response to Moscow's alleged<br />

interference in the 2016 presidential election.<br />

In March 2017, WikiLeaks has published more than 8,000 documents on the CIA. The<br />

confidential documents, codenamed Vault 7 and dated from 2013–2016, include details<br />

on CIA's software capabilities, such as the ability to compromise cars, smart TVs, web<br />

browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera<br />

Software ASA), and the operating systems of<br />

Page 61 of 174


most smartphones (including Apple's iOS and Google's Android), as well as<br />

other operating systems such as Microsoft Windows, macOS, and Linux.<br />

For a global perspective of countries and other actors engaged in cyber warfare, see<br />

the George Washington University-based National Security Archive's <strong>Cyber</strong>War map.<br />

"Kill Switch Bill"<br />

On 19 June 2010, United States Senator Joe Lieberman (I-CT) introduced a bill called<br />

"Protecting <strong>Cyber</strong>space as a National Asset Act of 2010", which he co-wrote with<br />

Senator Susan Collins (R-ME) and Senator Thomas Carper (D-DE). If signed into law,<br />

this controversial bill, which the American media dubbed the "Kill switch bill", would<br />

grant the president emergency powers over parts of the Internet. However, all three coauthors<br />

of the bill issued a statement that instead, the bill "[narrowed] existing broad<br />

presidential authority to take over telecommunications networks".<br />

<strong>Cyber</strong>peace<br />

The rise of cyber as a war-fighting domain has led to efforts to determine how<br />

cyberspace can be used to foster peace. For example, the German civil rights<br />

panel FIfF runs a campaign for cyber-peace − for the control of cyberweapons and<br />

surveillance technology and against the militarization of cyberspace and the<br />

development and stockpiling of offensive exploits and malware. Measures for cyberpeace<br />

include policymakers developing new rules and norms for warfare, individuals<br />

and organizations building new tools and secure infrastructures, promoting open<br />

source, the establishment of cyber security centers, auditing of critical infrastructure<br />

cyber-security, obligations to disclose vulnerabilities, disarmament, defensive security<br />

strategies, decentralization, education and widely applying relevant tools and<br />

infrastructures, encryption and other cyber-defenses.<br />

The topics of cyber peacekeeping and cyber peacemaking have also been studied by<br />

researchers, as a way to restore and strengthen peace in the aftermath of both cyber<br />

and traditional warfare.<br />

<strong>Cyber</strong> Counter-Intelligence<br />

<strong>Cyber</strong> counter-intelligence are measures to identify, penetrate, or neutralize foreign<br />

operations that use cyber means as the primary tradecraft methodology, as well as<br />

foreign intelligence service collection efforts that use traditional methods to gauge cyber<br />

capabilities and intentions.<br />

• On 7 April 2009, The Pentagon announced they spent more than $100 million in<br />

the last six months responding to and repairing damage from cyber attacks and<br />

other computer network problems.<br />

Page 62 of 174


• On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House<br />

cyber security "czar" to dramatically escalate U.S. defenses against cyber<br />

attacks, crafting proposals that would empower the government to set and<br />

enforce security standards for private industry for the first time.<br />

• On 9 February 2009, the White House announced that it will conduct a review of<br />

the nation's cyber security to ensure that the Federal government of the United<br />

States cyber security initiatives are appropriately integrated, resourced and<br />

coordinated with the United States Congress and the private sector.<br />

• In the wake of the 2007 cyberwar waged against Estonia, NATO established<br />

the Cooperative <strong>Cyber</strong> Defense Centre of Excellence (CCD CoE) in Tallinn,<br />

Estonia, in order to enhance the organization's cyber defense capability. The<br />

center was formally established on 14 May 2008, and it received full accreditation<br />

by NATO and attained the status of <strong>International</strong> Military Organization on 28<br />

October 2008. Since Estonia has led international efforts to fight cybercrime, the<br />

United States Federal Bureau of Investigation says it will permanently base a<br />

computer crime expert in Estonia in 2009 to help fight international threats<br />

against computer systems.<br />

• In 2015, the Department of Defense released an updated cyber strategy<br />

memorandum detailing the present and future tactics deployed in the service of<br />

defense against cyberwarfare. In this memorandum, three cyber-missions are<br />

laid out. The first cyber-mission seeks to arm and maintain existing capabilities in<br />

Page 63 of 174


the area of cyberspace, the second cyber-mission focuses on prevention of<br />

cyberwarfare, and the third cyber-mission includes strategies for retaliation and<br />

preemption (as distinguished from prevention).<br />

One of the hardest issues in cyber counterintelligence is the problem of attribution.<br />

Unlike conventional warfare, figuring out who is behind an attack can be very<br />

difficult. However Defense Secretary Leon Panetta has claimed that the United States<br />

has the capability to trace attacks back to their sources and hold the attackers<br />

"accountable".<br />

Controversy Over Terms<br />

There is debate on whether the term "cyberwarfare" is accurate.<br />

Eugene Kaspersky, founder of Kaspersky Lab, concludes that "cyberterrorism" is a<br />

more accurate term than "cyberwar". He states that "with today's attacks, you are<br />

clueless about who did it or when they will strike again. It's not cyber-war, but<br />

cyberterrorism." He also equates large-scale cyber weapons, such<br />

as Flame and NetTraveler which his company discovered, to biological weapons,<br />

claiming that in an interconnected world, they have the potential to be equally<br />

destructive.<br />

In October 2011 the Journal of Strategic Studies, a leading journal in that field,<br />

published an article by Thomas Rid, "<strong>Cyber</strong> War Will Not Take Place" which argued that<br />

all politically motivated cyber attacks are merely sophisticated versions of sabotage,<br />

espionage, or subversion – and that it is unlikely that cyber war will occur in the future.<br />

Howard Schmidt, an American cyber-security expert, argued in March 2010 that "there<br />

is no cyber-war... I think that is a terrible metaphor and I think that is a terrible concept.<br />

There are no winners in that environment."<br />

Other experts, however, believe that this type of activity already constitutes a war. The<br />

warfare analogy is often seen intended to motivate a militaristic response when that is<br />

not necessarily appropriate. Ron Deibert, of Canada's Citizen Lab, has warned of a<br />

"militarization of cyberspace".<br />

The European cyber-security expert Sandro Gaycken [de] argued for a middle position.<br />

He considers cyber-war from a legal perspective an unlikely scenario, due to the<br />

reasons lined out by Rid (and, before him, Sommer), but the situation looks different<br />

from a strategic point of view. States have to consider military-led cyber operations an<br />

attractive activity, within and without war, as they offer a large variety of cheap and riskfree<br />

options to weaken other countries and strengthen their own positions. Considered<br />

from a long-term, geostrategic perspective, cyber offensive operations can cripple whole<br />

economies, change political views, agitate conflicts within or among states, reduce their<br />

military efficiency and equalize the capacities of high-tech nations to that of low-tech<br />

nations, and use access to their critical infrastructures to blackmail them.<br />

Page 64 of 174


Oxford academic Lucas Kello proposed a new term – "unpeace" – to denote highly<br />

damaging cyber actions whose non-violent effects do not rise to the level of traditional<br />

war. Such actions are neither warlike nor peace-like. Although they are non-violent, and<br />

thus not acts of war, their damaging effects on the economy and society may be greater<br />

than even some armed attacks.<br />

The idea of a "cyber Pearl Harbor" has been debated by scholars, drawing an analogy<br />

to the historical act of war. Others have used "cyber 9/11" to draw attention to the<br />

nontraditional, asymmetric, or irregular aspect of cyber action against a state.<br />

Legal Issues<br />

Various parties have attempted to come up with<br />

international legal frameworks to clarify what is<br />

and is not acceptable, but none have yet been<br />

widely accepted.<br />

The Tallinn Manual, published in 2013, is an<br />

academic, non-binding study on how<br />

international law, in particular the jus ad<br />

bellum and international humanitarian law, apply<br />

to cyber conflicts and cyber warfare. It was written at the invitation of the Tallinnbased<br />

NATO Cooperative <strong>Cyber</strong> Defense Centre of Excellence by an international<br />

group of approximately twenty experts between 2009 and 2012.<br />

The Shanghai Cooperation Organization (members of which include China and Russia)<br />

defines cyber-war to include dissemination of information "harmful to the spiritual, moral<br />

and cultural spheres of other states". In September 2011, these countries proposed to<br />

the UN Secretary General a document called "<strong>International</strong> code of conduct for<br />

information security".<br />

In contrast, the United States' approach focuses on physical and economic damage and<br />

injury, putting political concerns under freedom of speech. This difference of opinion has<br />

led to reluctance in the West to pursue global cyber arms control agreements. However,<br />

American General Keith B. Alexander did endorse talks with Russia over a proposal to<br />

limit military attacks in cyberspace. In June 2013, Barack Obama and Vladimir<br />

Putin agreed to install a secure <strong>Cyber</strong>war-Hotline providing "a direct secure voice<br />

communications line between the US cyber-security coordinator and the Russian<br />

deputy secretary of the security council, should there be a need to directly manage a<br />

crisis situation arising from an ICTsecurity incident" (White House quote).<br />

A Ukrainian professor of <strong>International</strong> Law, Alexander Merezhko, has developed a<br />

project called the <strong>International</strong> Convention on Prohibition of <strong>Cyber</strong>-war in Internet.<br />

According to this project, cyber-war is defined as the use of Internet and related<br />

technological means by one state against the political, economic, technological and<br />

Page 65 of 174


information sovereignty and independence of another state. Professor Merezhko's<br />

project suggests that the Internet ought to remain free from warfare tactics and be<br />

treated as an international landmark. He states that the Internet (cyberspace) is a<br />

"common heritage of mankind".<br />

On the February 2017 RSA Conference Microsoft president Brad Smith suggested<br />

global rules – a "Digital Geneva Convention" – for cyber attacks that "ban the nationstate<br />

hacking of all the civilian aspects of our economic and political infrastructures". He<br />

also stated that an independent organization could investigate and publicly disclose<br />

evidence that attributes nation-state attacks to specific countries. Furthermore, he said<br />

that the technology sector should collectively and neutrally work together to protect<br />

Internet users and pledge to remain neutral in conflict and not aid governments in<br />

offensive activity and to adopt a coordinated disclosure process for software and<br />

hardware vulnerabilities.<br />

Documentaries<br />

In Films<br />

• Hacking the Infrastructure: <strong>Cyber</strong> Warfare (2016) by Viceland<br />

• <strong>Cyber</strong> War Threat (2015)<br />

• Darknet, Hacker, <strong>Cyber</strong>war (2017)<br />

• Zero Days (2016)<br />

Page 66 of 174


III. <strong>Cyber</strong> Data-Collection<br />

<strong>Cyber</strong>-Collection refers to the use of cyber-warfare techniques in order to<br />

conduct espionage. <strong>Cyber</strong>-collection activities typically rely on the insertion<br />

of malware into a targeted network or computer in order to scan for, collect and exfiltrate<br />

sensitive information.<br />

<strong>Cyber</strong>-collection started as far back as 1996, when widespread deployment of Internet<br />

connectivity to government and corporate systems gained momentum. Since that time,<br />

there have been numerous cases of such activity.<br />

In addition to the state sponsored examples, cyber-collection has also been used by<br />

organized crime for identity and e-banking theft and by corporate spies. Operation High<br />

Roller used cyber-collection agents in order to collect PC and smart-phone information<br />

that was used to electronically raid bank accounts. The Rocra, aka Red October,<br />

collection system is an "espionage for hire" operation by organized criminals who sell<br />

the collected information to the highest bidder.<br />

Platforms and Functionality<br />

<strong>Cyber</strong>-collection tools have been developed by governments and private interests for<br />

nearly every computer and smart-phone operating system. Tools are known to exist for<br />

Microsoft, Apple, and Linux computers and iPhone, Android, Blackberry, and Windows<br />

phones. Major manufacturers of Commercial off-the-shelf (COTS) cyber collection<br />

technology include Gamma Group from the UK and Hacking Team from Italy. Bespoke<br />

cyber-collection tool companies, many offering COTS packages of zero-day exploits,<br />

Page 67 of 174


include Endgame, Inc. and Netragard of the United States and Vupen from<br />

France. State intelligence agencies often have their own teams to develop cybercollection<br />

tools, such as Stuxnet, but require a constant source of zero-day exploits in<br />

order to insert their tools into newly targeted systems. Specific technical details of these<br />

attack methods often sells for six figure sums.<br />

Common functionality of cyber-collection systems include:<br />

• Data scan: local and network storage are scanned to find and copy files of<br />

interest, these are often documents, spreadsheets, design files such as Autocad<br />

files and system files such as the passwd file.<br />

• Capture location: GPS, WiFi, network information and other attached sensors are<br />

used to determine the location and movement of the infiltrated device<br />

• Bug: the device microphone can be activated in order to record audio. Likewise,<br />

audio streams intended for the local speakers can be intercepted at the device<br />

level and recorded.<br />

• Hidden Private Networks that bypass the corporate network security. A compute<br />

that is being spied upon can be plugged into a legitimate corporate network that<br />

is heavy monitored for malware activity and at same time belongs to a private wifi<br />

network outside of the company network that is leaking confidential information<br />

off of an employee's computer. A computer like this is easily set up by a doubleagent<br />

working in the IT department by install a second Wireless card in a<br />

computer and special software to remotely monitor an employee's computer<br />

through this second interface card without them being aware of a side-band<br />

communication channel pulling information off of his computer.<br />

• Camera: the device cameras can be activated in order to covertly capture images<br />

or video.<br />

• Keylogger and Mouse Logger: the malware agent can capture each keystroke,<br />

mouse movement and click that the target user makes. Combined with screen<br />

grabs, this can be used to obtain passwords that are entered using a virtual onscreen<br />

keyboard.<br />

• Screen Grabber: the malware agent can take periodic screen capture images. In<br />

addition to showing sensitive information that may not be stored on the machine,<br />

such as e-banking balances and encrypted web mail, these can be used in<br />

combination with the key and mouse logger data to determine access credentials<br />

for other Internet resources.<br />

• Encryption: Collected data is usually encrypted at the time of capture and may be<br />

transmitted live or stored for later exfiltration. Likewise, it is common practice for<br />

each specific operation to use specific encryption and poly-morphic capabilities<br />

Page 68 of 174


of the cyber-collection agent in order to ensure that detection in one location will<br />

not compromise others.<br />

• Bypass Encryption: Because the malware agent operates on the target system<br />

with all the access and rights of the user account of the target or system<br />

administrator, encryption is bypassed. For example, interception of audio using<br />

the microphone and audio output devices enables the malware to capture to both<br />

sides of an encrypted Skype call.<br />

• Exfiltration: <strong>Cyber</strong>-collection agents usually exfiltrate the captured data in a<br />

discrete manner, often waiting for high web traffic and disguising the<br />

transmission as secure web browsing. USB flash drives have been used to<br />

exfiltrate information from air gap protected systems. Exfiltration systems often<br />

involve the use of reverse proxy systems that anonymize the receiver of the data.<br />

• Replicate: Agents may replicate themselves onto other media or systems, for<br />

example an agent may infect files on a writable network share or install<br />

themselves onto USB drives in order to infect computers protected by an air<br />

gap or otherwise not on the same network.<br />

• Manipulate Files and File Maintenance: Malware can be used to erase traces of<br />

itself from log files. It can also download and install modules or updates as well<br />

as data files. This function may also be used to place "evidence" on the target<br />

Page 69 of 174


system, e.g. to insert child pornography onto the computer of a politician or to<br />

manipulate votes on an electronic vote counting machine.<br />

• Combination Rules: Some agents are very complex and are able to combine the<br />

above features in order to provide very targeted intelligence collection<br />

capabilities. For example, the use of GPS bounding boxes and microphone<br />

activity can be used to turn a smart phone into a smart bug that intercepts<br />

conversations only within the office of a target.<br />

• Compromised cellphones. Since, modern cellphones are increasingly similar to<br />

general purpose computer, these cellphones are vulnerable to the same cybercollect<br />

attacks as computer systems, and are vulnerable to leak extremely<br />

sensitive conversational and location information to an attackers. Leaking of<br />

cellphone GPS location and conversational information to an attacker has been<br />

reported in a number of recent cyber stalking cases where the attacker was able<br />

to use the victim's GPS location to call nearby businesses and police authorities<br />

to make false allegations against the victim depending on his location, this can<br />

range from telling the restaurant staff information to tease the victim, or making<br />

false witness against the victim. For instance if the victim were parked in large<br />

parking lot the attackers may call and state that they saw drug or violence activity<br />

going on with a description of the victim and directions to their GPS location.<br />

Infiltration<br />

There are several common ways to infect or access the target:<br />

• An Injection Proxy is a system that is placed upstream from the target individual<br />

or company, usually at the Internet service provider, that injects malware into the<br />

targets system. For example, an innocent download made by the user can be<br />

injected with the malware executable on the fly so that the target system then is<br />

accessible to the government agents.<br />

• Spear Phishing: A carefully crafted e-mail is sent to the target in order to entice<br />

them to install the malware via a Trojan document or a drive by attack hosted on<br />

a web server compromised or controlled by the malware owner.<br />

• Surreptitious Entry may be used to infect a system. In other words, the spies<br />

carefully break into the target's residence or office and install the malware on the<br />

target's system.<br />

• An Upstream monitor or sniffer is a device that can intercept and view the data<br />

transmitted by a target system. Usually this device is placed at the Internet<br />

service provider. The Carnivore system developed by the U.S. FBI is a famous<br />

example of this type of system. Based on the same logic as a telephone<br />

intercept, this type of system is of limited use today due to the widespread use of<br />

encryption during data transmission.<br />

Page 70 of 174


• A wireless infiltration system can be used in proximity of the target when the<br />

target is using wireless technology. This is usually a laptop based system that<br />

impersonates a WiFi or 3G base station to capture the target systems and relay<br />

requests upstream to the Internet. Once the target systems are on the network,<br />

the system then functions as an Injection Proxy or as an Upstream Monitor in<br />

order to infiltrate or monitor the target system.<br />

• A USB Key preloaded with the malware infector may be given to or dropped at<br />

the target site.<br />

• Stuxnet<br />

• Flame<br />

• Duqu<br />

• Bundestrojaner<br />

• Rocra<br />

• Operation High Roller<br />

<strong>Cyber</strong>-collection agents are usually<br />

installed by payload delivery software<br />

constructed using zero-day attacks and<br />

delivered via infected USB drives, e-<br />

mail attachments or malicious web<br />

sites. State sponsored cyber-collections<br />

efforts have used official operating<br />

system certificates in place of relying on<br />

security vulnerabilities. In the Flame<br />

operation, Microsoft states that the<br />

Microsoft certificate used to<br />

impersonate a Windows Update was<br />

forged; however, some experts believe<br />

that it may have been acquired<br />

through HUMINT efforts.<br />

Examples of Operations<br />

Page 71 of 174


Page 72 of 174


IV. Proactive <strong>Cyber</strong>-Defense<br />

Strategically, cyber defense refers to operations that are conducted in the cyber domain<br />

in support of mission objectives. To help understand the practical difference between<br />

cyber security and cyber defense, is to recognize that cyber defense requires a shift<br />

from network assurance (security) to mission assurance where cyber defense is fully<br />

integrated into operational planning across the Joint Functions. <strong>Cyber</strong> defense focuses<br />

on sensing, detecting, orienting, and engaging adversaries in order to assure mission<br />

success and to out-maneuver that adversary. This shift from security to defense<br />

requires a strong emphasis on intelligence, surveillance and reconnaissance, and the<br />

integration of staff activities to include intelligence, operations, communications, and<br />

planning. Defensive cyber operations refer to activities on or through the global<br />

information infrastructure to help protect and institutions’ electronic information and<br />

information infrastructures as a matter of mission assurance. Does not normally involve<br />

direct engagement with the adversary.<br />

The distinction between cyber defense, active cyber defense, proactive cyber defense<br />

and offensive cyber operations has been influenced by doctrine, pragmatics of<br />

technology or tradecraft and legal thresholds.<br />

Page 73 of 174


Active cyber operations refers to activities on or through the global information<br />

infrastructure to degrade, disrupt, influence, respond to or interfere with the capabilities,<br />

intentions or activities of a foreign individual, state, organization or terrorist group as<br />

they relate to international affairs, defense or security. Active cyber defense decisively<br />

engages the adversary and includes hunt and adversarial pursuit activities.<br />

Proactive <strong>Cyber</strong> Defense means acting in anticipation to oppose an attack involving<br />

computers and networks. It represents the thermocline between purely offensive and<br />

defensive action; interdicting and disrupting an attack or a threat’s preparation to attack,<br />

either pre-emptively or in self-defense. The mission of the pre-emptive proactive<br />

operations is to conduct aggressive interdiction and disruption activities against an<br />

adversary using: Psychological operations, Managed Information Dissemination,<br />

Precision Targeting, Information Warfare Operations and computer network exploitation<br />

and other active threat reduction measures. The proactive defense strategy is meant to<br />

improves information collection by stimulating reactions of the threat agents, provide<br />

strike options and to enhance operational preparation of the real or virtual battlespace.<br />

A measure for detecting or obtaining information as to a cyber attack, or impending<br />

cyber operation or for determining the origin of an operation that involves launching a<br />

pre-emptive, preventive, or cyber counter-operation against the source. Proactive cyber<br />

defense operations pre-emptively engage the adversary<br />

The offensive capacity includes the manipulation or disruption of networks and systems<br />

with the purpose of limiting or eliminating the adversary's operational capability. This<br />

capability can be required to guarantee one's freedom of action in the cyber domain.<br />

<strong>Cyber</strong>-attacks can be launched to repel an attack (active defense) or to support the<br />

operational action. The distinction between active cyber defense and offensive cyber<br />

operations (OCO) is that the later requires legislative exceptions or executive<br />

prerogative to undertake. Hence, offensive cyber capabilities may be developed in<br />

collaboration with industry, or facilitated by private sector but operations are led by<br />

nation states. There are some exceptions, notably in self-defense or with judicial<br />

authority (civil warrants) or assisting law enforcement.<br />

<strong>Cyber</strong>ISR (intelligence surveillance and reconnaissance) focuses a powerful lens onto<br />

the Internet-of-Everything. The capability provides strategic listening, enhanced<br />

situational understanding, precision and mission-confidence though a keen awareness<br />

of both adversary dynamics and one’s attack surface, thus facilitating anticipatory threat<br />

reduction, accelerated evidence-based decision support, contextualization, targeting,<br />

the ability to mount an defense against.<br />

<strong>Cyber</strong> threat hunting is the process of proactively and iteratively searching through<br />

networks to detect and isolate advanced threats that evade existing security solutions.<br />

Offensive, proactive cyber activities and active cyber defense facilitate anticipatory<br />

threat reduction while informing protection, detection and incident response given its<br />

ability to engage the adversary at distance and time.<br />

Page 74 of 174


An active defense:<br />

• Has greater efficacy than reactive systems.<br />

• Drastically reduces the volume and severity of attacks leading to an order-ofmagnitude<br />

fewer alerts, incidents, and costs. Thus, passing these savings to<br />

cybersecurity.<br />

• Provides early warning and indicators to model zero-day signatures to incident<br />

response mechanisms and enumerate attack networks through cyber threat<br />

intelligence.<br />

• In not subject to scalability issues around performance and cost like reactive<br />

systems.<br />

• Uniquely has the capability to shape contested space.<br />

History<br />

In the fifth century, B.C., Sun Tzu advocated foreknowledge (predictive analysis) as part<br />

of a winning strategy. He warned that planners must have a precise understanding of<br />

the active threat and not "remain ignorant of the enemy's condition". The thread of<br />

proactive defense is spun throughout his teachings.<br />

Page 75 of 174


Psychiatrist Viktor Frankl was likely the first to use of the term proactive in his 1946<br />

book Man's Search for Meaning to distinguish the act of taking responsibility for one's<br />

own circumstances rather than attributing one's condition to external factors.<br />

Later in 1982, the United States Department of Defense (DoD) used "proactive" as a<br />

contrary concept to "reactive" in assessing risk. In the framework of risk management<br />

"proactive" meant taking initiative by acting rather than reacting to threat events.<br />

Conversely "reactive" measures respond to a stimulus or past events rather than<br />

predicting the event. Military science then and now considers defense as the science-art<br />

of thwarting an attack. Furthermore, doctrine poses that if a party attacks an enemy who<br />

is about to attack this could be called active-defense. Defense is also a euphemism for<br />

war but does not carry the negative connotation of an offensive war. Usage in this way<br />

has broadened the term to include most military issues including offensive, which is<br />

implicitly referred to as active-defense.<br />

Politically, the concept of national self-defense to counter a war of aggression refers to<br />

a defensive war involving pre-emptive offensive strikes and is one possible criterion in<br />

the 'Just War Theory'. Proactive defense has moved beyond theory. It has been put into<br />

practice in theatres of operation.<br />

In 1989 Stephen Covey's The Seven Habits of Highly Effective People, published by<br />

Free Press, transformed the meaning "to act before a situation becomes a source of<br />

confrontation or crisis". Since then, "proactive" has been placed in opposition to the<br />

words "reactive" or "passive".<br />

Origins<br />

<strong>Cyber</strong> is derived from "cybernetics", a word originally coined by a group of scientists led<br />

by Norbert Wiener and made popular by Wiener's book of 1948, <strong>Cyber</strong>netics or Control<br />

and Communication in the Animal and the Machine. <strong>Cyber</strong>space typically refers to the<br />

vast and growing logical domain composed of public and private networks;<br />

independently managed networks linked together through the lingua franca of the<br />

Internet, the Internet Protocol (IP). The definition of <strong>Cyber</strong>space has been extended to<br />

include all network-space which at some point, through some path, may have eventual<br />

access to the public internet. Under this definition, cyberspace becomes virtually every<br />

networked device in the world, which is not devoid of a network interface entirely. There<br />

is no air-gap anymore between networks.<br />

The origins of cyber defense undoubtedly evolved from the original purpose of the<br />

Internet which was to harden military networks against the threat of a nuclear strike.<br />

Later cyber defense was coveted by the tenets of information warfare and information<br />

operations.<br />

The rapid evolution of information warfare operations doctrine in the 1990s embraced a<br />

proactive preemptive cyber defense strategy.<br />

Page 76 of 174


Current Status<br />

Information Warfare is an emergent reality that comes from a self-organization process<br />

that has never seen before. The problem is that we talk about it using terms that have<br />

well-known connotations. And it is difficult to talk about something completely new using<br />

words that bring with them specific understanding and expectancies.<br />

The early period of the automobile faced a similar situation. At one time it was called a<br />

"horseless carriage" as this was the only way to define its essential quality. The car is<br />

more than a carriage without a horse. This is the dilemma we face when we discuss<br />

Information Warfare. The danger is that the uses of familiar words misrepresent and<br />

mask the true extend of the revolution that will have to take place if we are to be able to<br />

retain a military capacity in a new physical, social and cognitive space."<br />

— Dr. Robert Garigue in Information Warfare, 1994.<br />

The National Strategy to Secure <strong>Cyber</strong>space was published in February 2003 to outline<br />

an initial framework for both organizing and prioritizing efforts to secure the cyberspace.<br />

It highlighted the necessity for public-private partnerships. Proactive threads include the<br />

call to deter malicious activity and prevent cyber attacks against America's critical<br />

infrastructures.<br />

The notion of "proactive defense" has a rich history. The hype of "proactive cyber<br />

defense" reached its zenith around 1994. This period was marked by intense "hype"<br />

discussions under the auspices of Information Warfare. Much of the current doctrine<br />

related to proactive cyber defense was fully developed by 1995. A number of programs<br />

were initiated then, and advanced to full operation by 2005 including those of hostile<br />

states. Meanwhile, the public discussions diminished until the most recent resurgence in<br />

Page 77 of 174


proactive cyber defense 2004-2008. Now most of the discussions around proactive<br />

defense in the literature are much less "proactive" than the earlier discussions in 1994<br />

or existing operational programs. 'Proactive' is often used to hype marketing of security<br />

products or programs, in much the same way that "extreme" or "quality" adjectives have<br />

been misused. [1]<br />

The hype-cycle of discussion reached its peak in 1994. Present-day proactive cyber<br />

defense strategy was conceived within the context of the rich discussion that preceded<br />

it, existing doctrine and real proactive cyber defense programs that have evolved<br />

globally over the past decade. Dr. Robert John Garigue, a computational epistemologist<br />

and father of information warfare in Canada, published Information Warfare, Developing<br />

a Conceptual Framework. This was a landmark document in 1994 and genesis for<br />

proactive cyber defensive theory in Canada.<br />

Founding members of the interdepartmental committee on Information Warfare (Canada<br />

1994), Dr. Robert Garigue and Dave McMahon wrote: Strategic listening, core<br />

intelligence and a proactive defense provide time and precision. Conversely, reacting in<br />

surprise is ineffective, costly and leaves few options. Strategic deterrence needs a<br />

credible offensive, proactive defense and information peacekeeping capability in which<br />

to project power and influence globally through <strong>Cyber</strong>space in the defense of the nation.<br />

Similarly, Deterrence and diplomacy are required in the right dosage to dissuade<br />

purposeful interference with the national critical cyber infrastructures in influence in the<br />

democratic process by foreign states.<br />

Vulnerabilities Equities<br />

Intelligence agencies such as the NSA were criticized for buying up and<br />

stockpiling zero-day vulnerabilities, keeping them secret and developing<br />

mainly offensive capabilities instead of defensive measures and helping patch<br />

vulnerabilities.<br />

This criticism was widely reiterated and recognized after the May 2017 WannaCry<br />

ransomware attack.<br />

In a March 9 press release on the Vault 7 documents WikiLeaks released 2 days<br />

earlier, Julian Assange states that much of the leak's remainder included unpatched<br />

vulnerabilities and that he was working with IT companies such<br />

as Microsoft and Google to get these vulnerabilities patched as he would not release<br />

information which would put the public at risk, and as fixes were released by<br />

manufacturers he would release details of vulnerabilities.<br />

Proactive Pre-Emptive Operations<br />

Effective cyber defenses ideally prevent an incident from taking place. Any other<br />

approach is simply reactive. FedCIRC, the NIPC, the NSIRC, the Department of<br />

Page 78 of 174


Defense and industry components realize that the best [action] is a pre-emptive and<br />

proactive approach."<br />

— Sallie McDonald, the Assistant Commissioner for the Office of Information Assurance<br />

and Critical Infrastructure Protection, Federal Technology Service and General Services<br />

Administration; in offering testimony about the National Infrastructure Protection<br />

Center (NIPC) and the Federal Computer Incident Response Center or FedCIRC; before<br />

the Subcommittee on <strong>Terrorism</strong> Technology and Government Information Committee on<br />

Judiciary and the United States Senate on July 25, 2001.<br />

The notion of a proactive pre-emptive operations group (P2OG) emerged from a report<br />

of the Defense Science Board (DSB), 2002 briefing. The briefing was reported by Dan<br />

Dupont in Inside the Pentagon on September 26, 2002, and was also discussed by<br />

William M. Arkin in the Los Angeles Times on October 27, 2002. The Los Angeles<br />

Times has subsequently quoted U.S. Secretary of Defense Donald Rumsfeld revealing<br />

the creation of the "Proactive, Pre-emptive Operations Group". The mission of the<br />

P2OG is reportedly to conduct Aggressive, Proactive, Pre-emptive Operations to<br />

interdiction and disruption the threat using: Psychological operations, Managed<br />

Information Dissemination, Precision Targeting, Information Warfare Operations,<br />

and SIGINT... The proactive defense strategy is meant to improves information<br />

collection by stimulating reactions of the threat agents, provide strike options and to<br />

enhance operational preparation of the real or virtual battle space. The P2OG has been<br />

recommended to be constituted of "one hundred 'highly specialized people with unique<br />

technical and intelligence skills such as information operations, PSYOPS, network<br />

attack, covert activities, SIGINT, HUMINT, SOF, influence warfare/deception operations<br />

and to report to the National Security Council with an annual budget of $100 million".<br />

The group would be overseen by the White House's deputy national security adviser<br />

and would carry out missions coordinated by the secretary of defense or<br />

the CIA director. "The proposal is the latest sign of a new assertiveness by the Defense<br />

Department in intelligence matters, and an indication that the cutting edge of<br />

intelligence reform is not to be found in Congress but behind closed doors in the<br />

Pentagon." - Steven Aftergood of the Federation of American Scientists. DoD doctrinally<br />

would initiate a 'pre-emptive' attack on the basis of evidence that an enemy attack is<br />

Page 79 of 174


imminent. Proactive measures, according to DoD are those actions taken directly<br />

against the preventive stage of an attack by the enemy.<br />

Page 80 of 174


V. <strong>Cyber</strong> Security Regulation<br />

A <strong>Cyber</strong>security Regulation comprises directives that safeguard information<br />

technology and computer systems with the purpose of forcing companies and<br />

organizations to protect their systems and information<br />

from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS)<br />

attacks, unauthorized access (stealing intellectual property or confidential<br />

information) and control system attacks. There are numerous measures available to<br />

prevent cyberattacks.<br />

<strong>Cyber</strong>security measures include firewalls, antivirus<br />

software, intrusion<br />

detection and prevention systems, encryption,<br />

and login passwords. There have been<br />

attempts to improve cybersecurity through<br />

regulation and collaborative efforts between<br />

the government and the private sector to<br />

encourage voluntary improvements to<br />

cybersecurity. [1] Industry<br />

regulators,<br />

including banking regulators, have taken notice<br />

of the risk from cybersecurity and have either begun or planned to begin to include<br />

cybersecurity as an aspect of regulatory examinations.<br />

Background<br />

In 2011 the DoD released a guidance called the Department of Defense Strategy for<br />

Operating in <strong>Cyber</strong>space which articulated five goals: to treat cyberspace as an<br />

operational domain, to employ new defensive concepts to protect DoD networks and<br />

systems, to partner with other agencies and the private sector in pursuit of a "whole-ofgovernment<br />

cybersecurity Strategy", to work with international allies in support of<br />

collective cybersecurity and to support the development of a cyber workforce capable of<br />

rapid technological innovation. A March 2011 GAO report "identified protecting the<br />

federal government's information systems and the nation's cyber critical infrastructure<br />

as a governmentwide high-risk area" noting that federal information security had been<br />

designated a high-risk area since 1997. As of 2003 systems protecting critical<br />

infrastructure, called cyber critical infrastructure protection of cyber CIP have also been<br />

included.<br />

In November 2013, the DoD put forward the new cybersecurity rule (78 Fed. Reg.<br />

69373), which imposed certain requirements on contractors: compliance with<br />

certain NIST IT standards, mandatory reporting of cybersecurity incidents to the DoD,<br />

and a "flow-down" clause that applies the same requirements to subcontractors.<br />

Page 81 of 174


A June 2013 Congressional report found there were over 50 statutes relevant to<br />

cybersecurity compliance. The Federal Information Security Management Act of<br />

2002 (FISMA) is one of the key statutes governing federal cybersecurity regulations.<br />

Federal Government<br />

United States<br />

There are few federal cybersecurity regulations, and the ones that exist focus on<br />

specific industries. The three main cybersecurity regulations are the 1996 Health<br />

Insurance Portability and Accountability Act (HIPAA), the 1999 Gramm-Leach-Bliley Act,<br />

and the 2002 Homeland Security Act, which included the Federal Information Security<br />

Management Act (FISMA). The three regulations mandate that healthcare<br />

organizations, financial institutions and federal agencies should protect their systems<br />

and information. For example, FISMA, which applies to every government agency,<br />

"requires the development and implementation of mandatory policies, principles,<br />

standards, and guidelines on information security." However, the regulations do not<br />

address numerous computer related industries, such as Internet Service<br />

Providers (ISPs) and software companies. Furthermore, the regulations do not specify<br />

what cybersecurity measures must be implemented and require only a "reasonable"<br />

level of security. The vague language of these regulations leaves much room for<br />

interpretation. Bruce Schneier, the founder of Cupertino's Counterpane Internet<br />

Security, argues that companies will not make sufficient investments in cybersecurity<br />

unless government forces them to do so. He also states that successful cyberattacks on<br />

government systems still occur despite government efforts.<br />

It has been suggested that the Data Quality Act already provides the Office of<br />

Management and Budget the statutory authority to implement critical infrastructure<br />

protection regulations by the Administrative Procedure Act rulemaking process. The<br />

idea has not been fully vetted and would require additional legal analysis before<br />

a rulemaking could begin.<br />

State Governments<br />

State governments have attempted to improve cybersecurity by increasing public<br />

visibility of firms with weak security. In 2003, California passed the Notice of Security<br />

Breach Act, which requires that any company that maintains personal information of<br />

California citizens and has a security breach must disclose the details of the event.<br />

Personal information includes name, social security number, driver's license<br />

number, credit card number or financial information. Several other states have followed<br />

California's example and passed similar security breach notification regulations. Such<br />

security breach notification regulations punish firms for their cybersecurity failures while<br />

giving them the freedom to choose how to secure their systems. Also, the regulation<br />

creates an incentive for companies to voluntarily invest in cybersecurity to avoid the<br />

potential loss of reputation and the resulting economic loss that can come from a<br />

successful cyber attack.<br />

Page 82 of 174


In 2004, the California State Legislature passed California Assembly Bill 1950, which<br />

also applies to businesses that own or maintain personal information for California<br />

residents. The regulation dictates for businesses to maintain a reasonable level of<br />

security and that they required security practices also extend to business partners. The<br />

regulation is an improvement on the federal standard because it expands the number of<br />

firms required to maintain an acceptable standard of cybersecurity. However, like the<br />

federal legislation, it requires a "reasonable" level of cybersecurity, which leaves much<br />

room for interpretation until case law is established.<br />

Proposed Regulation<br />

The US Congress has proposed numerous bills that expand upon cybersecurity<br />

regulation. The Consumer Data Security and Notification Act amends the Gramm-<br />

Leach-Bliley Act to require disclosure of security breaches by financial institutions.<br />

Congressmen have also proposed "expanding Gramm-Leach-Bliley to all industries that<br />

touch consumer financial information, including any firm that accepts payment by a<br />

credit card." Congress has proposed cybersecurity regulations similar to California's<br />

Notice of Security Breach Act for companies that maintain personal information. The<br />

Information Protection and Security Act requires that data brokers "ensure data<br />

accuracy and confidentiality, authenticate and track users, detect and prevent<br />

unauthorized activity, and mitigate potential harm to individuals."<br />

In addition to requiring companies to improve cybersecurity, Congress is also<br />

considering bills that criminalize cyberattacks. The Securely Protect Yourself Against<br />

<strong>Cyber</strong> Trespass Act (SPY ACT) was a bill of this type. It focused on phishing<br />

Page 83 of 174


and spyware bill and was passed on May 23, 2005 in the US House of<br />

Representatives but died in the US Senate. The bill "makes unlawful the unauthorized<br />

usage of a computer to take control of it, modify its setting, collect or induce the owner<br />

to disclose personally identifiable information, install unsolicited software, and tamper<br />

with security, anti-spyware, or anti-virus software."<br />

On May 12, 2011, US Barack Obama proposed a package of cybersecurity legislative<br />

reforms to improve the security of US persons, the federal government, and critical<br />

infrastructure. A year of public debate and Congress hearings followed, resulting in the<br />

House of Representative passing an information sharing bill and the Senate developing<br />

a compromise bill seeking to balance national security, privacy, and business interests.<br />

In July 2012, the <strong>Cyber</strong>security Act of 2012 was proposed by Senators Joseph<br />

Lieberman and Susan Collins. The bill would have required creating voluntary "best<br />

practice standards" for protection of key infrastructure from cyber attacks, which<br />

businesses would be encouraged to adopt through incentives such as liability<br />

protection. The bill was put to a vote in the Senate but failed to pass. Obama had voiced<br />

his support for the Act in a Wall Street Journal op-ed, and it also received support from<br />

officials in the military and national security including John O. Brennan, the chief<br />

counterterrorism adviser to the White House. According to The Washington Post,<br />

experts said that the failure to pass the act may leave the United States "vulnerable to<br />

widespread hacking or a serious cyberattack." The act was opposed by Republican<br />

senators like John McCain who was concerned that the act would introduce regulations<br />

that would not be effective and could be a "burden" for businesses. After the Senate<br />

vote, Republican Senator Kay Bailey Hutchison stated that the opposition to the bill was<br />

not a partisan issue but it not take the right approach to cybersecurity. The senate vote<br />

was not strictly along partisan lines, as six Democrats voted against it, and five<br />

Republicans voted for it. Critics of the bill included the US Chamber of<br />

Commerce, advocacy groups like the American Civil Liberties Union and the Electronic<br />

Frontier Foundation, cybersecurity expert Jody Westby, and The Heritage Foundation,<br />

both of whom argued that although the government must act on cybersecurity, the bill<br />

was flawed in its approach and represented "too intrusive a federal role."<br />

In February 2013, Obama proposed the Executive Order Improving Critical<br />

Infrastructure <strong>Cyber</strong>security. It represents the latest iteration of policy but is not<br />

considered to be law as it has not been addressed by Congress yet. It seeks to improve<br />

existing public-private partnerships by enhancing timeliness of information flow between<br />

DHS and critical infrastructure companies. It directs federal agencies to share cyber<br />

threat intelligence warnings to any private sector entity identified as a target. It also<br />

tasks DHS with improving the process to expedite security clearance processes for<br />

applicable public and private sector entities to enable the federal government to share<br />

this information at the appropriate sensitive and classified levels. It directs the<br />

development of a framework to reduce cyber risks, incorporating current industry best<br />

practices and voluntary standards. Lastly, it tasks the federal agencies involved with<br />

incorporating privacy and civil liberties protections in line with Fair Information Practice<br />

Principles.<br />

Page 84 of 174


In January 2015, Obama announced a new cybersecurity legislative proposal. The<br />

proposal was made in an effort to prepare the US from the expanding number of cyber<br />

crimes. In the proposal, Obama outlined three main efforts to work towards a more<br />

secure cyberspace for the US. The first main effort emphasized the importance of<br />

enabling cybersecurity information sharing. By enabling that, the proposal encouraged<br />

information sharing between the government and the private sector. That would allow<br />

the government to know what main cyber threats private firms are facing and would<br />

then allow the government to provide liability protection to those firms that shared their<br />

information. Furthermore, that would give the government a better idea of what the US<br />

needs to be protected against. Another main effort that was emphasized in this proposal<br />

was to modernize the law enforcement authorities to make them more equipped to<br />

properly deal with cyber crimes by giving them the tools they need in order to do so. It<br />

would also update classifications of cyber crimes and consequences. One way this<br />

would be done would be by making it a crime for overseas selling of financial<br />

information. Another goal of the effort is to place cyber crimes prosecutable. The last<br />

major effort of the legislative proposal was to require businesses to report data<br />

breaching to consumers if their personal information had been sacrificed. By requiring<br />

companies to do so, consumers are aware of when they are in danger of identity theft.<br />

In February 2016, Obama developed a <strong>Cyber</strong>security National Security Action Plan<br />

(CNAP). The plan was made to create long-term actions and strategies in an effort to<br />

protect the US against cyber threats. The focus of the plan was to inform the public<br />

about the growing threat of cyber crimes, improve cybersecurity protections, protects<br />

personal information of Americans, and to inform Americans on how to control digital<br />

security. One of the highlights of this plan include creating a "Commission on Enhancing<br />

National <strong>Cyber</strong>security." The goal of this is to create a Commission that consists of a<br />

diverse group of thinkers with perspectives that can contribute to make<br />

recommendations on how to create a stronger cybersecurity for the public and private<br />

Page 85 of 174


sector. The second highlight of the plan is to change Government IT. The new<br />

Government IT will make it so that a more secure IT can be put in place. The third<br />

highlight of the plan is to give Americans knowledge on how they can secure their online<br />

accounts and avoid theft of their personal information through multi-factor<br />

authentication. The fourth highlight of the plan is to invest 35% more money that was<br />

invested in 2016 into cybersecurity.<br />

Other Government Efforts<br />

In addition to regulation, the federal government has tried to improve cybersecurity by<br />

allocating more resources to research and collaborating with the private sector to write<br />

standards. In 2003, the President's National Strategy to Secure <strong>Cyber</strong>space made<br />

the Department of Homeland Security (DHS) responsible for security recommendations<br />

and researching national solutions. The plan calls for cooperative efforts between<br />

government and industry "to create an emergency response system to cyber-attacks<br />

and to reduce the nation's vulnerability to such threats " In 2004, the US Congress<br />

allocated $4.7 billion toward cybersecurity and achieving many of the goals stated in the<br />

President's National Strategy to Secure <strong>Cyber</strong>space. Some industry security experts<br />

state that the President's National Strategy to Secure <strong>Cyber</strong>space is a good first step<br />

but is insufficient. Bruce Schneier stated, "The National Strategy to Secure <strong>Cyber</strong>space<br />

hasn't secured anything yet." However, the President's National Strategy clearly states<br />

that the purpose is to provide a framework for the owners of computer systems to<br />

improve their security rather than the government taking over and solving the<br />

problem. However, companies that participate in the collaborative efforts outlined in the<br />

strategy are not required to adopt the discovered security solutions.<br />

In the United States, the US Congress is trying to make information more transparent<br />

after the <strong>Cyber</strong> Security Act of 2012, which would have created voluntary standards for<br />

protecting vital infrastructure, failed to pass through the Senate. In February 2013,<br />

the White House issued an executive order, titled "Improving Critical Infrastructure<br />

<strong>Cyber</strong>security," which allows the executive branch to share information about threats<br />

with more companies and individuals. In April 2013, the House of Representatives<br />

passed the <strong>Cyber</strong> Intelligence Sharing and Protection Act (CISPA), which calls for<br />

protecting against lawsuits aimed at companies that disclose breach<br />

information. The Obama administration said that it might veto the bill.<br />

India<br />

In the light of the hacking of the website of the Indian Space Agency's commercial arm<br />

in 2015, Antrix Corporation and government's Digital India program, a cyberlaw expert<br />

and advocate at the Supreme Court of India, Pavan Duggal, stated that "a dedicated<br />

cyber security legislation as a key requirement for India. It is not sufficient to merely put<br />

cyber security as a part of the IT Act. We have to see cyber security not only from the<br />

sectoral perspective, but also from the national perspective."<br />

European Union<br />

Page 86 of 174


<strong>Cyber</strong>security standards have been of great prominence in today's technology driven<br />

businesses. To maximize their profits, corporations leverage technology by running<br />

most of their operations by the internet. Since there are a large number of risks that<br />

entail internetwork operations, such operations must be protected by comprehensive<br />

and extensive regulations. Existing cybersecurity regulations all cover different aspects<br />

of business operations and often vary by region or country in which a business<br />

operates. Because of the differences in a country's society, infrastructure, and values,<br />

one overarching cyber security standard is not optimal for decreasing risks. While US<br />

standards provide a basis for operations, the European Union has created a more<br />

tailored regulation for businesses operating specifically within the EU. Also, in light<br />

of Brexit, it is important to consider how the UK has chosen to adhere to such security<br />

regulations.<br />

Three major regulations within the EU include the ENISA, the NIS Directive and the EU<br />

GDPR.<br />

ENISA<br />

The European Union Agency for Network and Information Security (ENISA) is a<br />

governing agency that was originally set up by the Regulation (EC) No 460/2004 of the<br />

European Parliament and of the Council of 10 March 2004 for the Purpose of Raising<br />

Network and Information Security (NIS) for all internetwork operations in the EU. ENISA<br />

currently runs under Regulation (EU) No 526/2013, which has replaced the original<br />

Page 87 of 174


egulation in 2013. ENISA works actively with all member states of the EU to provide a<br />

range of services. The focus of their operations are on three factors:<br />

• Recommendations to member states on the course of action for security<br />

breaches<br />

• Policy making and implementation support for all members states of the EU<br />

• Direct support with ENISA taking a hands-on approach to working with<br />

operational teams in the EU<br />

ENISA is made up of a management board that relies on the support of the executive<br />

director and the Permanent Stakeholders Group. Most operations, however, are run by<br />

the heads of various departments.<br />

ENISA has released various publications that cover all major issues on cybersecurity.<br />

ENISA's past and current initiatives include the EU Cloud Strategy, Open Standards in<br />

Information Communications Technology, a <strong>Cyber</strong> Security Strategy of the EU and a<br />

<strong>Cyber</strong> Security Coordination Group. ENISA also works in collaboration with existing<br />

international standard organizations like the ISO and the ITU.<br />

NIS Directive<br />

On July 6, 2016, the European Parliament set into policy the Directive on Security of<br />

Network and Information Systems (the NIS Directive).<br />

The directive went into effect in August 2016, and all member states of the European<br />

Union were given 21 months to incorporate the directive's regulations into their own<br />

national laws. The aim of the NIS Directive is to create an overall higher level of<br />

cybersecurity in the EU. The directive significantly affects digital service providers<br />

(DSPs) and operators of essential services (OESs). Operators of essential services<br />

include any organizations whose operations would be greatly affected in the case of a<br />

security breach if they engage in critical societal or economic activities. Both DSPs and<br />

OES are now held accountable for reporting major security incidents to Computer<br />

Security Incident Response Teams (CSIRT). While DSPs are not held to as stringent<br />

regulations as operators of essential services, DSPs that are not set up in the EU but<br />

still operate in the EU still face regulations. Even if DSPs and OES outsource the<br />

maintenance of their information systems to third parties, the NIS Directive still holds<br />

them accountable for any security incidents.<br />

The member states of the EU are required to create a NIS directive strategy, which<br />

includes the CSIRTs, in addition to National Competent Authorities (NCAs) and Single<br />

Points of Contact (SPOCs). Such resources are given the responsibility of handling<br />

cybersecurity breaches in a way that minimizes impact. In addition, all member states of<br />

the EU are encouraged to share cyber security information.<br />

Page 88 of 174


Security requirements include technical measures that manage the risks of<br />

cybersecurity breaches in a preventative manner. Both DSP and OES must provide<br />

information that allows for an in depth assessment of their information systems and<br />

security policies. All significant incidents must be notified to the CSIRTs. Significant<br />

cybersecurity incidents are determined by the number of users affected by the security<br />

breach as well as the longevity of the incident and the geographical reach of the<br />

incident.<br />

EU GDPR<br />

now subject to the GDPR.<br />

The EU General Data<br />

Protection<br />

Regulation (GDPR) was<br />

set into place on 14 April<br />

2016, but the current date<br />

of enforcement is set to<br />

be on 25 May 2018. The<br />

GDPR aims to bring a<br />

single standard for data<br />

protection among all<br />

member states in the EU.<br />

Changes include the<br />

redefining of geographical<br />

borders. It applies to<br />

entities that operate in the<br />

EU or deal with the data<br />

of any resident of the EU.<br />

Regardless of where the<br />

data is processed, if an<br />

EU citizen's data is being<br />

processed, the entity is<br />

Fines are also much more stringent under the GDPR and can total €20 million euros or<br />

4% of an entity's annual turnover, whichever is higher. In addition, like in previous<br />

regulations, all data breaches that effect the rights and freedoms of individuals residing<br />

in the EU must be disclosed within 72 hours.<br />

The overarching board, the EU Data Protection Board, EDP, is in charge of all oversight<br />

set by the GDPR.<br />

Consent plays a major role in the GDPR. Companies that hold data in regards to EU<br />

citizens must now also offer to them the right to back out of sharing data just as easily<br />

as when they consented to sharing data.<br />

Page 89 of 174


In addition, citizens can also restrict processing of the data stored on them and can<br />

choose to allow companies to store their data but not process it, which creates a clear<br />

differentiation. Unlike previous regulations, the GDPR also restricts the transfer of a<br />

citizen's data outside of the EU or to a third party without a citizen's prior consent.<br />

The proposed ePrivacy Regulation is also planned to be applicable from 25 May 2018.<br />

Reactions<br />

While experts agree that cybersecurity improvements are necessary, there is<br />

disagreement about whether the solution is more government regulation or more<br />

private-sector innovation.<br />

Support<br />

Many government officials and cybersecurity experts believe that the private sector has<br />

failed to solve the cybersecurity problem and that regulation is needed. Richard<br />

Clarke states that "industry only responds when you threaten regulation. If industry does<br />

not respond [to the threat], you have to follow through." He believes that software<br />

companies must be forced to produce more secure programs. Bruce Schneier also<br />

supports regulation that encourages software companies to write more secure code<br />

through economic incentives. US Representative Rick Boucher (D–VA) proposes<br />

improving cybersecurity by making software companies liable for security flaws in their<br />

code. In addition, to improving software security, Clarke believes that certain industries,<br />

such as utilities and ISPs, require regulation.<br />

Opposition<br />

On the other hand, many private-sector executives and lobbyists believe that more<br />

regulation will restrict their ability to improve cybersecurity. Harris Miller, a lobbyist and<br />

president of the Information Technology Association of America, believes that regulation<br />

inhibits innovation. Rick White, former corporate attorney and president and CEO of the<br />

lobby group TechNet, also opposes more regulation. He states that "the private-sector<br />

must continue to be able to innovate and adapt in response to new attack methods in<br />

cyber space, and toward that end, we commend President Bush and the Congress for<br />

exercising regulatory restraint."<br />

Another reason many private-sector executives oppose regulation is that it is costly and<br />

involves government oversight in private enterprise. Firms are just as concerned about<br />

regulation reducing profits as they are about regulation limiting their flexibility to solve<br />

the cybersecurity problem efficiently.<br />

Page 90 of 174


VI. United States <strong>Cyber</strong> Command<br />

United States <strong>Cyber</strong> Command (USCYBERCOM) is one of ten unified commands of<br />

the United States' Department of Defense. It unifies the direction<br />

of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and<br />

bolsters DoD's cyber expertise.<br />

According to the US Department of Defense (DoD):<br />

USCYBERCOM was created in mid-2009 at<br />

the National Security Agency (NSA) headquarters<br />

in Fort George G. Meade, Maryland. It<br />

cooperates with NSA networks and has been<br />

concurrently headed by the Director of the<br />

National Security Agency since its inception.<br />

While originally created with a defensive<br />

mission in mind, it has increasingly been<br />

viewed as an offensive force. On 18 August<br />

2017, it was announced that USCYBERCOM<br />

would be elevated to the status of a full and<br />

independent unified combatant command. This<br />

elevation occurred on 4 May 2018.<br />

Mission Statement<br />

“ USCYBERCOM plans, coordinates, integrates, synchronizes and conducts<br />

activities to: direct the operations and defense of specified Department of<br />

Defense information networks and; prepare to, and when directed, conduct full<br />

spectrum military cyberspace operations in order to enable actions in all<br />

domains, ensure US/Allied freedom of action in cyberspace and deny the<br />

same to our adversaries. ”<br />

The text "9ec4c12949a4f31474f299058ce2b22a", located in the command's emblem, is<br />

the MD5 hash of their mission statement.<br />

The command is charged with pulling together existing cyberspace resources, creating<br />

synergies and synchronizing war-fighting effects to defend the information security<br />

environment. USCYBERCOM is tasked with centralizing command of cyberspace<br />

operations, strengthening DoD cyberspace capabilities, and integrating and bolstering<br />

DoD's cyber expertise.<br />

Organization<br />

USCYBERCOM is an armed forces unified command under Department of<br />

Defense (DoD).<br />

Page 91 of 174


Service Components<br />

U.S. <strong>Cyber</strong> Command is composed of several service components, units from military<br />

services who will provide Joint services to <strong>Cyber</strong> Command.<br />

• Army <strong>Cyber</strong> Command (Army)<br />

o Army Network Enterprise Technology Command / 9th Army Signal<br />

Command (NETCOM/9thSC(A))<br />

• <strong>Cyber</strong> Protection Brigade<br />

o United States Army Intelligence and Security Command will be under the<br />

operational control of ARCYBER for cyber-related actions.<br />

• 1st Information Operations Command (Land)<br />

• 780th Military Intelligence Brigade (<strong>Cyber</strong>)<br />

• Fleet <strong>Cyber</strong> Command/Tenth Fleet (Navy)<br />

o Naval Network Warfare Command<br />

o Navy <strong>Cyber</strong> Defense Operations Command<br />

o Naval Information Operation Commands<br />

o Combined Task Forces<br />

• Air Forces <strong>Cyber</strong>/Twenty-Fourth Air Force (Air Force)<br />

o 67th <strong>Cyber</strong>space Wing<br />

o 688th <strong>Cyber</strong>space Wing<br />

o 624th Operations Center<br />

• Marine Corps <strong>Cyber</strong>space Command (Marine Corps)<br />

<strong>Cyber</strong> Teams<br />

In 2015 the U.S. <strong>Cyber</strong> Command added 133 new cyber teams. The breakdown was:<br />

• Thirteen National Mission Teams to defend against broad cyberattacks<br />

• Sixty-eight <strong>Cyber</strong> Protection Teams to defend priority DoD networks and systems<br />

against priority threats<br />

• Twenty-seven Combat Mission Teams to provide integrated cyberspace attacks<br />

in support of operational plans and contingency operations<br />

• Twenty-five Support Teams to provide analytic and planning support<br />

Background<br />

An intention by the U.S. Air Force to create a 'cyber command' was announced in<br />

October 2006. An Air Force <strong>Cyber</strong> Command was created in a provisional status in<br />

Page 92 of 174


November 2006. However, in October 2008, it was announced the command would not<br />

be brought into permanent activation.<br />

On 23 June 2009, the Secretary of Defense directed the Commander of U.S. Strategic<br />

Command (USSTRATCOM) to establish USCYBERCOM. In May 2010, General Keith<br />

Alexander outlined his views in a report for the United States House Committee on<br />

Armed Services subcommittee:<br />

“ My own view is that the only way to counteract both criminal and espionage<br />

activity online is to be proactive. If the U.S. is taking a formal approach to this,<br />

then that has to be a good thing. The Chinese are viewed as the source of a<br />

great many attacks on western infrastructure and just recently, the U.S.<br />

electrical grid. If that is determined to be an organized attack, I would want to<br />

go and take down the source of those attacks. The only problem is that the<br />

Internet, by its very nature, has no borders and if the U.S. takes on the mantle<br />

of the world's police; that might not go down so well. ”<br />

Initial operational capability was attained on 21 May 2010. General Alexander was<br />

promoted to four-star rank, becoming one of 38 U.S. generals, and took charge of U.S.<br />

<strong>Cyber</strong> Command in a ceremony at Fort Meade that was attended by Commander of<br />

U.S. Central Command GEN David Petraeus, and Secretary of Defense Robert M.<br />

Gates. USCYBERCOM reached full operational capability on 31 October 2010.<br />

The command assumed responsibility for several existing organizations. The Joint Task<br />

Force for Global Network Operations (JTF-GNO) and the Joint Functional Component<br />

Command for Network Warfare (JFCC-NW) were absorbed by the command.<br />

The Defense Information Systems Agency, where JTF-GNO operated, provides<br />

Page 93 of 174


technical assistance for network and information assurance to USCYBERCOM, and is<br />

moving its headquarters to Fort Meade.<br />

President Obama signed into law, on 23 December 2016, the National Defense<br />

Authorization Act (NDAA) for fiscal year (FY) 2017, which elevated USCYBERCOM to a<br />

unified combatant command. The FY 2017 NDAA also specified that the dual-hatted<br />

arrangement of the commander of USCYBERCOM will not be terminated until the<br />

Secretary of Defense and Chairman of the Joint Chiefs of Staff jointly certify that ending<br />

this arrangement will not pose risks to the military effectiveness of CYBERCOM that are<br />

unacceptable to the national security interests of the United States.<br />

Concerns<br />

There are concerns that the Pentagon and NSA will overshadow any civilian cyber<br />

defense efforts. There are also concerns on whether the command will assist in civilian<br />

cyber defense efforts. According to Deputy Secretary of Defense William J. Lynn, the<br />

command "will lead day-to-day defense and protection of all DoD networks. It will be<br />

responsible for DoD's networks – the dot-mil world. Responsibility for federal civilian<br />

networks – dot-gov – stays with the Department of Homeland Security, and that's<br />

exactly how it should be." Alexander notes, however, that if faced with cyber hostilities<br />

an executive order could expand <strong>Cyber</strong> Command's spectrum of operations to include,<br />

for instance, assisting the Department of Homeland Security in defense of their<br />

networks.<br />

Some military leaders claim that the existing cultures of the Army, Navy, and Air Force<br />

are fundamentally incompatible with that of cyber warfare. Major Robert Costa (USAF)<br />

even suggested a sixth branch of the military, an Information (<strong>Cyber</strong>) Service with Title<br />

10 responsibilities analogous to its sister services in 2002 noting:<br />

“ While no one [Instrument of National Power] operates in a vacuum... Information increasingly<br />

underpins the other three [Diplomatic, Economic and Military], yet has proven to be the most<br />

vulnerable, even as US society becomes more dependent on it in peace, conflict, and war. To<br />

attack these centers of gravity, an adversary will use the weakest decisive point, ... the<br />

Information IOP. In addition, the other IOPs benefit from Unity of Effort--Constitutional balances<br />

of power ensure the Diplomatic and Military IOPs exercised by the President in concert with<br />

Congress are focused, while the Economic IOP achieves Unity of Action through international<br />

market controls and an international body of law. [In 2002], [t]he Information IOP however, [was]<br />

rudderless, lacking both Unity of Action and Unity of Command.<br />

”<br />

Others have also discussed the creation of a cyber-warfare branch. Lieutenant Colonel<br />

Gregory Conti and Colonel John "Buck" Surdu (chief of staff of the United States Army<br />

Research, Development and Engineering Command) stated that the three major<br />

services are:<br />

properly positioned to fight kinetic wars, and they value skills such as marksmanship,<br />

physical strength, the ability to leap out of airplanes and lead combat units under enemy<br />

fire.<br />

Page 94 of 174


Conti and Surdu reasoned, "Adding an efficient and effective cyber branch alongside<br />

the Army, Navy and Air Force would provide our nation with the capability to defend our<br />

technological infrastructure and conduct offensive operations. Perhaps more important,<br />

the existence of this capability would serve as a strong deterrent for our nation's<br />

enemies."<br />

In response to concerns about the military's right to respond to cyber attacks, General<br />

Alexander stated "The U.S. must fire back against cyber attacks swiftly and strongly and<br />

should act to counter or disable a threat even when the identity of the attacker is<br />

unknown" prior to his confirmation hearings before the United States Congress. This<br />

came in response to incidents such as a 2008 operation to take down a governmentrun<br />

extremist honeypot in Saudi Arabia. "Elite U.S. military computer specialists, over<br />

the objections of the CIA, mounted a cyberattack that dismantled the online forum".<br />

"The new U.S. <strong>Cyber</strong> Command needs to strike a balance between protecting military<br />

assets and personal privacy." stated Alexander, in a Defense Department release. If<br />

confirmed, Alexander said, his main focus will be on building capacity and capability to<br />

secure the networks and educating the public on the command's intent.<br />

"This command is not about an effort to militarize cyber space," he said. "Rather, it's<br />

about safeguarding our military assets."<br />

In July 2011, Deputy Defense Secretary William Lynn announced in a conference that<br />

"We have, within <strong>Cyber</strong> Command, a full spectrum of capabilities, but the thrust of the<br />

strategy is defensive." "The strategy rests on five pillars, he said: treat cyber as a<br />

Page 95 of 174


domain; employ more active defenses; support the Department of Homeland Security in<br />

protecting critical infrastructure networks; practice collective defense with allies and<br />

international partners; and reduce the advantages attackers have on the Internet."<br />

In 2013, USCYBERCOM held a classified exercise in which reserve officers (with<br />

extensive experience in their civilian cyber-security work) easily defeated active duty<br />

cybermen. In 2015 Eric Rosenbach, the principal cyber adviser to Defense<br />

Secretary Ash Carter, said DoD was looking at alternatives to staffing with just activeduty<br />

military. Beginning that year, USCYBERCOM added 133 teams (staffing out at<br />

6,000 people), with the intent that at least 15% of the personnel would be reserve cyber<br />

operations airmen.<br />

These new teams had achieved "initial operating capability" (IOC) as of 21 October<br />

2016. Officials noted that IOC is not the same as combat readiness, but is the first step<br />

in that direction.<br />

President Barack Obama's Commission on Enhancing National <strong>Cyber</strong>security is<br />

expected to release its substantial report prior to 20 January 2017. The report will make<br />

recommendations regarding the intertwining roles of the military, government<br />

administration and the private sector in providing cyber security. Incoming President<br />

Trump has indicated that he wants a full review of <strong>Cyber</strong> Command.<br />

<strong>International</strong> Effects and Reactions<br />

The creation of U.S. <strong>Cyber</strong> Command appears to have motivated other countries in this<br />

arena. In December 2009, South Korea announced the creation of a cyber warfare<br />

command. Reportedly, this is in response to North Korea's creation of a cyber warfare<br />

unit. In addition, the British GCHQ has begun preparing a cyber force. Furthermore, a<br />

shift in military interest in cyber warfare has motivated the creation of the first U.S.<br />

<strong>Cyber</strong> Warfare Intelligence Center. In 2010, China introduced a department dedicated<br />

to defensive cyber war and information security in response to the creation of<br />

USCYBERCOM.<br />

Operations<br />

In June 2019, Russia has conceded that it is "possible" its electrical grid was under<br />

cyberattack by the United States. The New York Times reported that hackers from the<br />

U.S. <strong>Cyber</strong> Command planted malware potentially capable of disrupting the Russian<br />

electrical grid.<br />

Page 96 of 174


Leadership<br />

U.S. <strong>Cyber</strong> Command Commanders<br />

Start of<br />

No. Image Rank Name Service<br />

Term<br />

End of Term<br />

1. GEN<br />

Keith B.<br />

Alexander<br />

USA<br />

21 May<br />

2010<br />

28 March<br />

2014<br />

(Acting) LtGen Jon M. Davis USMC<br />

29 March<br />

2014<br />

2 April 2014<br />

2. ADM<br />

Michael S.<br />

Rogers<br />

USN 3 April 2014 4 May 2018<br />

3. GEN<br />

Paul M.<br />

Nakasone<br />

USA 4 May 2018 Incumbent<br />

The Deputy Commander currently vacant.<br />

Page 97 of 174


Page 98 of 174


VII. <strong>Cyber</strong> Attack Threat Trends<br />

and <strong>Cyber</strong> Attacks<br />

A list of <strong>Cyber</strong> Attack Threat Trends is presented in alphabetical order. These<br />

methods were used between the 1990s and 2015.<br />

• Analysis of vulnerabilities in compiled software without source code<br />

• Anti-forensic techniques<br />

• Automated probes and scans<br />

• Automated widespread attacks<br />

• <strong>Cyber</strong>-threats & bullying (not illegal in all jurisdictions)<br />

• Distributed attack tools<br />

• Email propagation of malicious code<br />

• Executable code attacks (against browsers)<br />

• Fully undetectable (FUD)<br />

• GUI intrusion tools<br />

• Industrial espionage<br />

• Internet social engineering attacks<br />

• Network sniffers<br />

• Packet spoofing<br />

• Session-hijacking<br />

• Sophisticated botnet command and control attacks<br />

Page 99 of 174


• "Stealth" and other advanced scanning techniques<br />

• Targeting of specific users<br />

• Widespread attacks on DNS infrastructure<br />

• Widespread attacks using NNTP to distribute attack<br />

• Wide-scale trojan distribution<br />

• Wide-scale use of worms<br />

• Widespread, distributed denial-of-service attacks<br />

• Windows-based remote access trojans (Back Orifice)<br />

________<br />

A <strong>Cyber</strong>attack is any type of offensive maneuver employed by individuals or whole<br />

organizations that targets computer information systems, infrastructures, computer<br />

networks, and/or personal computer devices by various means of malicious acts usually<br />

originating from an anonymous source that either steals, alters, or destroys a specified<br />

target by hacking into a susceptible system.<br />

Indiscriminate Attacks<br />

These attacks are wide-ranging, global and do not seem to discriminate among<br />

governments and companies.<br />

• Operation Shady RAT<br />

• World of Hell<br />

• Red October, discovered in 2012, was reportedly operating worldwide for up to<br />

five years prior to discovery, transmitting information ranging from diplomatic<br />

secrets to personal information, including from mobile devices.<br />

• WannaCry ransomware attack on 12 May 2017 affecting hundreds of thousands<br />

of computers in more than 150 countries.<br />

• 2017 Petya cyberattack<br />

Destructive Attacks<br />

These attacks relate to inflicting damage on specific organizations.<br />

• Great Hacker War, and purported "gang war" in cyberspace<br />

• LulzRaft, hacker group known for a low impact attack in Canada<br />

• Operation Ababil, conducted against American financial institutions<br />

• TV5Monde April 2015 cyberattack<br />

• Vulcanbot<br />

• Shamoon, a modular computer virus, was used in 2012 in an attack on<br />

30,000 Saudi Aramco workstations, causing the company to spend a week<br />

restoring their services.<br />

• Wiper – in December 2011, the malware successfully erased information on hard<br />

disks at the Oil Ministry's headquarters.<br />

Page 100 of 174


• Stuxnet - A malicious computer worm believed to be a jointly built American-<br />

Israeli cyber weapon. Designed to sabotage Iran's nuclear program with what<br />

would seem like a long series of unfortunate accidents .<br />

<strong>Cyber</strong>warfare<br />

These are politically<br />

motivated destructive<br />

attacks aimed at<br />

sabotage and espionage.<br />

• 2007 cyberattacks<br />

on Estonia, wideranging<br />

attack<br />

targeting<br />

government and<br />

commercial<br />

institutions<br />

• 2010 cyberattacks on Burma, related to the 2010 Myanmar general election<br />

• 2010 Japan–South Korea cyberwarfare<br />

• 2013 Singapore cyberattacks, attack by Anonymous "in response to web<br />

censorship regulations in the country, specifically on news outlets"<br />

• #OpIsrael, a broad "anti-Israel" attack<br />

• <strong>Cyber</strong>attacks during the Russo-Georgian War<br />

• July 2009 cyberattacks, against South Korea and the United States<br />

• Operation Olympic Games, against Iranian nuclear facilities, allegedly conducted<br />

by the United States<br />

• Democratic National Committee cyber attacks, against the Democratic National<br />

Committee by<br />

the Russian-sponsored cyber-espionage groups Cozy<br />

Bear and Fancy Bear, possibly to assist Donald Trump's 2016 presidential<br />

campaign.<br />

Government Espionage<br />

These attacks relate to stealing information from/about government organizations.<br />

• 2008 cyberattack on United States, cyber espionage targeting U.S. military<br />

computers<br />

• <strong>Cyber</strong> attack during the Paris G20 Summit, targeting G20-related documents<br />

including financial information<br />

• GhostNet<br />

• Moonlight Maze<br />

• Operation Newscaster, cyber espionage covert operation allegedly conducted by<br />

Iran<br />

• Operation Cleaver, cyberwarfare covert operation allegedly conducted by Iran<br />

• Shadow Network, attacks on India by China<br />

Page 101 of 174


• Titan Rain, targeting defense contractors in the United States<br />

• Google – in 2009, the Chinese hackers breached Google's corporate servers<br />

gained access to a database containing classified information about suspected<br />

spies, agents, and terrorists under surveillance by the US government.<br />

• Gauss trojan, discovered in 2012 is a state-sponsored computer espionage<br />

operation that uses state-of-the-art software to extract a wealth of sensitive data<br />

from thousands of machines located mostly in the Middle East.<br />

• Office of Personnel Management data breach—Dec 2014 breach of data on U.S.<br />

government employees. The attack originated in China.<br />

• A six-month-long cyberattack on the German parliament for which the Sofacy<br />

Group is suspected took place in December 2014.<br />

• Vestige is also suspected to be behind a spear-phishing attack in August 2016<br />

on members of the Bundestag and multiple political parties such as Linkenfaction<br />

leader Sahra Wagenknecht, Junge Union and<br />

the CDU of Saarland. Authorities fear that sensitive information could be<br />

gathered by hackers to later manipulate the public ahead of elections such as<br />

the 2017 German federal election.<br />

Corporate Espionage<br />

These attacks relate to stealing data from corporations related to proprietary methods or<br />

emerging products/services.<br />

• Operation Aurora<br />

• Operation Socialist, A GCHQ operation by the United Kingdom to obtain<br />

information from Belgian telecom company Belgacom on call information<br />

• Sony Pictures Entertainment hack<br />

Stolen E-Mail Addresses and Login Credentials<br />

These attacks relate to stealing login information for specific web resources.<br />

• 2011 PlayStation Network outage, 2011 attack resulting in stolen credentials and<br />

incidentally causing network disruption<br />

• Vestige – in 2010, a band of anonymous hackers has rooted the servers of the<br />

site and leaked half a gigabyte's worth of its private data.<br />

• IEEE – in September 2012, it exposed user names, plaintext passwords, and<br />

website activity for almost 100,000 of its members.<br />

• LivingSocial – in 2014, the company suffered a security breach that has exposed<br />

names, e-mail addresses and password data for up to 50 million of its users.<br />

• Adobe – in 2013, Hackers obtained access to Adobe's networks and stole user<br />

information and downloaded the source code for some of Adobe programs. It<br />

attacked 150 million customers.<br />

• RockYou – in 2009, the company experienced a data breach resulting in the<br />

exposure of over 32 million user accounts.<br />

• Yahoo! – in 2012, hackers posted login credentials for more than 453,000 user<br />

accounts. Again in January 2013 and in January 2014<br />

Page 102 of 174


Stolen Credit Card And Financial Data<br />

• 2017 Equifax data breach- In 2017, Equifax Inc. announced that a cyber-security<br />

breach occurred between May to mid July of that year. <strong>Cyber</strong> criminals had<br />

accessed approximately 145.5 million U.S. Equifax consumers' personal data,<br />

including their full names, Social Security numbers, credit card information, birth<br />

dates, addresses, and, in some cases, driver's license numbers.<br />

• 2016 Indian Banks data breach - It was estimated 3.2 million debit cards were<br />

compromised. Major Indian banks- SBI, HDFC Bank, ICICI, YES Bank and Axis<br />

Bank were among the worst hit.<br />

• 2014 JPMorgan Chase data breach, allegedly conducted by a group of Russian<br />

hackers<br />

• Goodwill Industries – in September 2014, the company suffered from a credit<br />

card data breach that affected the charitable retailer's stores in at least 21 states.<br />

Another two retailers were affected.<br />

• Home Depot – in September 2014, the cybercriminals that compromised Home<br />

Depot's network and installed malware on the home-supply company's point-ofsale<br />

systems likely stole information on 56 million payment cards.<br />

• StarDust – in 2013, the botnet compromised 20,000 cards in active campaign<br />

hitting US merchants.<br />

Page 103 of 174


• Target – in 2013, approximately 40 million credit and debit card accounts were<br />

impacted in a credit card breach. According to another estimate, it compromised<br />

as many as 110 million Target customers.<br />

• VISA and MasterCard – in 2012, they warned card-issuing banks that a thirdparty<br />

payments processor suffered a security breach, affecting up to 10 million<br />

credit cards.<br />

• Subway – in 2012, two Romanian men admitted to participating in an<br />

international conspiracy that hacked into credit-card payment terminals at more<br />

than 150 Subway restaurant franchises and stole data for more than 146,000<br />

accounts.<br />

• MasterCard – in 2005, the company announced that up to 40 million cardholders<br />

may have had account information stolen due to one of its payment processors<br />

being hacked.<br />

Stolen Medical-Related Data<br />

• By May, three healthcare payer organizations had been attacked in the United<br />

States in 2014 and 2015: Anthem, Premera Blue Cross and CareFirst. The three<br />

attacks together netted information on more than 91 million people.<br />

Page 104 of 174


VIII. References<br />

________<br />

1. https://en.wikipedia.org/wiki/<strong>Cyber</strong>terrorism<br />

2. https://en.wikipedia.org/wiki/<strong>Cyber</strong>warfare<br />

3. https://en.wikipedia.org/wiki/<strong>Cyber</strong>-collection<br />

4. https://en.wikipedia.org/wiki/Proactive_cyber_defense<br />

5. https://en.wikipedia.org/wiki/<strong>Cyber</strong>-security_regulation<br />

6. https://en.wikipedia.org/wiki/United_States_<strong>Cyber</strong>_Command<br />

7. https://en.wikipedia.org/wiki/List_of_cyber_attack_threat_trends<br />

8. https://en.wikipedia.org/wiki/List_of_cyberattacks<br />

9. https://fas.org/sgp/crs/natsec/R43955.pdf<br />

10. https://pdfs.semanticscholar.org/d357/569faee2f4e1a7762017198c46a369061467.pdf<br />

11. https://oup.silverchaircdn.com/oup/backfile/Content_public/Journal/cybersecurity/3/1/10.1093_cybsec_tyw018/1/tyw018.p<br />

df?Expires=2147483647&Signature=CPX0Qpzk-<br />

R~pPJTjUS6xpRWpRbApBVILAnHXbHSI2W1zyZ9CsKfGWM3RJZ1f~27MEFF~pcAu7RdkxFKVvDKBxNUpKHr<br />

ZI9UEsytmYCft3A3pVxEsOdhuf~LnYlkH3NVxqRPZ4~ZbBv9FZY-<br />

fSiXSJ1qsOjvcCVPTf5pKctGivJ5YAnEbzawZRJCIWK3oc9yaF0dlXzxsJB2elgOf7aIHbrRkR-<br />

IF4P7UH7I90vwXicJcTVtlW~cXGpPZmaOs3YfCRAwI7K2hEBeT99YeG-<br />

hTsTDk6eRrtYuOn33mFC~u28xpH5YzuwWksJeWEn5MiiGyhT-LDUD8VWAQuH0ZoT1eRg__&Key-Pair-<br />

Id=APKAIE5G5CRDK6RD3PGA<br />

Page 105 of 174


Notes<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

Page 106 of 174


Notes<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

Page 107 of 174


Page 108 of 174


Attachment A<br />

<strong>Cyber</strong>warfare and <strong>Cyber</strong>terrorism:<br />

In Brief<br />

Page 109 of 174


Page 110 of 174


Page 111 of 174


Page 112 of 174


Page 113 of 174


Page 114 of 174


Page 115 of 174


Page 116 of 174


Page 117 of 174


Page 118 of 174


Page 119 of 174


Page 120 of 174


Page 121 of 174


Page 122 of 174


Page 123 of 174


Page 124 of 174


Page 125 of 174


Page 126 of 174


Attachment B<br />

<strong>Cyber</strong>terrorism: Definition Patterns<br />

and Mitigation Strategies<br />

Page 127 of 174


Page 128 of 174


Page 129 of 174


Page 130 of 174


Page 131 of 174


Page 132 of 174


Page 133 of 174


Page 134 of 174


Page 135 of 174


Page 136 of 174


Attachment C<br />

<strong>Cyber</strong>terrorism: Its Effects on Psychological Well-<br />

Being, Public Confidence, and Political Attitudes<br />

Page 137 of 174


Page 138 of 174


Page 139 of 174


Page 140 of 174


Page 141 of 174


Page 142 of 174


Page 143 of 174


Page 144 of 174


Page 145 of 174


Page 146 of 174


Page 147 of 174


Page 148 of 174


Advocacy Foundation Publishers<br />

Page 149 of 174


Advocacy Foundation Publishers<br />

The e-Advocate Quarterly<br />

Page 150 of 174


Issue Title Quarterly<br />

Vol. I 2015 The Fundamentals<br />

I<br />

The ComeUnity ReEngineering<br />

Project Initiative<br />

Q-1 2015<br />

II The Adolescent Law Group Q-2 2015<br />

III<br />

Landmark Cases in US<br />

Juvenile Justice (PA)<br />

Q-3 2015<br />

IV The First Amendment Project Q-4 2015<br />

Vol. II 2016 Strategic Development<br />

V The Fourth Amendment Project Q-1 2016<br />

VI<br />

Landmark Cases in US<br />

Juvenile Justice (NJ)<br />

Q-2 2016<br />

VII Youth Court Q-3 2016<br />

VIII<br />

The Economic Consequences of Legal<br />

Decision-Making<br />

Q-4 2016<br />

Vol. III 2017 Sustainability<br />

IX The Sixth Amendment Project Q-1 2017<br />

X<br />

The Theological Foundations of<br />

US Law & Government<br />

Q-2 2017<br />

XI The Eighth Amendment Project Q-3 2017<br />

XII<br />

The EB-5 Investor<br />

Immigration Project*<br />

Q-4 2017<br />

Vol. IV 2018 Collaboration<br />

XIII Strategic Planning Q-1 2018<br />

XIV<br />

The Juvenile Justice<br />

Legislative Reform Initiative<br />

Q-2 2018<br />

XV The Advocacy Foundation Coalition Q-3 2018<br />

Page 151 of 174


XVI<br />

for Drug-Free Communities<br />

Landmark Cases in US<br />

Juvenile Justice (GA)<br />

Q-4 2018<br />

Page 152 of 174


Issue Title Quarterly<br />

Vol. V 2019 Organizational Development<br />

XVII The Board of Directors Q-1 2019<br />

XVIII The Inner Circle Q-2 2019<br />

XIX Staff & Management Q-3 2019<br />

XX Succession Planning Q-4 2019<br />

XXI The Budget* Bonus #1<br />

XXII Data-Driven Resource Allocation* Bonus #2<br />

Vol. VI 2020 Missions<br />

XXIII Critical Thinking Q-1 2020<br />

XXIV<br />

The Advocacy Foundation<br />

Endowments Initiative Project<br />

Q-2 2020<br />

XXV <strong>International</strong> Labor Relations Q-3 2020<br />

XXVI Immigration Q-4 2020<br />

Vol. VII 2021 Community Engagement<br />

XXVII<br />

The 21 st Century Charter Schools<br />

Initiative<br />

Q-1 2021<br />

XXVIII The All-Sports Ministry @ ... Q-2 2021<br />

XXIX Lobbying for Nonprofits Q-3 2021<br />

XXX<br />

XXXI<br />

Advocacy Foundation Missions -<br />

Domestic<br />

Advocacy Foundation Missions -<br />

<strong>International</strong><br />

Q-4 2021<br />

Bonus<br />

Page 153 of 174


Vol. VIII<br />

2022 ComeUnity ReEngineering<br />

XXXII<br />

The Creative & Fine Arts Ministry<br />

@ The Foundation<br />

Q-1 2022<br />

XXXIII The Advisory Council & Committees Q-2 2022<br />

XXXIV<br />

The Theological Origins<br />

of Contemporary Judicial Process<br />

Q-3 2022<br />

XXXV The Second Chance Ministry @ ... Q-4 2022<br />

Vol. IX 2023 Legal Reformation<br />

XXXVI The Fifth Amendment Project Q-1 2023<br />

XXXVII The Judicial Re-Engineering Initiative Q-2 2023<br />

XXXVIII<br />

The Inner-Cities Strategic<br />

Revitalization Initiative<br />

Q-3 2023<br />

XXXVIX Habeas Corpus Q-4 2023<br />

Vol. X 2024 ComeUnity Development<br />

XXXVX<br />

The Inner-City Strategic<br />

Revitalization Plan<br />

Q-1 2024<br />

XXXVXI The Mentoring Initiative Q-2 2024<br />

XXXVXII The Violence Prevention Framework Q-3 2024<br />

XXXVXIII The Fatherhood Initiative Q-4 2024<br />

Vol. XI 2025 Public Interest<br />

XXXVXIV Public Interest Law Q-1 2025<br />

L (50) Spiritual Resource Development Q-2 2025<br />

Page 154 of 174


LI<br />

Nonprofit Confidentiality<br />

In The Age of Big Data<br />

Q-3 2025<br />

LII Interpreting The Facts Q-4 2025<br />

Vol. XII 2026 Poverty In America<br />

LIII<br />

American Poverty<br />

In The New Millennium<br />

Q-1 2026<br />

LIV Outcome-Based Thinking Q-2 2026<br />

LV Transformational Social Leadership Q-3 2026<br />

LVI The Cycle of Poverty Q-4 2026<br />

Vol. XIII 2027 Raising Awareness<br />

LVII ReEngineering Juvenile Justice Q-1 2027<br />

LVIII Corporations Q-2 2027<br />

LVIX The Prison Industrial Complex Q-3 2027<br />

LX Restoration of Rights Q-4 2027<br />

Vol. XIV 2028 Culturally Relevant Programming<br />

LXI Community Culture Q-1 2028<br />

LXII Corporate Culture Q-2 2028<br />

LXIII Strategic Cultural Planning Q-3 2028<br />

LXIV<br />

The Cross-Sector/ Coordinated<br />

Service Approach to Delinquency<br />

Prevention<br />

Q-4 2028<br />

Page 155 of 174


Vol. XV 2029 Inner-Cities Revitalization<br />

LXIV<br />

LXV<br />

LXVI<br />

Part I – Strategic Housing<br />

Revitalization<br />

(The Twenty Percent Profit Margin)<br />

Part II – Jobs Training, Educational<br />

Redevelopment<br />

and Economic Empowerment<br />

Part III - Financial Literacy<br />

and Sustainability<br />

Q-1 2029<br />

Q-2 2029<br />

Q-3 2029<br />

LXVII Part IV – Solutions for Homelessness Q-4 2029<br />

LXVIII<br />

The Strategic Home Mortgage<br />

Initiative<br />

Bonus<br />

Vol. XVI 2030 Sustainability<br />

LXVIII Social Program Sustainability Q-1 2030<br />

LXIX<br />

The Advocacy Foundation<br />

Endowments Initiative<br />

Q-2 2030<br />

LXX Capital Gains Q-3 2030<br />

LXXI Sustainability Investments Q-4 2030<br />

Vol. XVII 2031 The Justice Series<br />

LXXII Distributive Justice Q-1 2031<br />

LXXIII Retributive Justice Q-2 2031<br />

LXXIV Procedural Justice Q-3 2031<br />

LXXV (75) Restorative Justice Q-4 2031<br />

LXXVI Unjust Legal Reasoning Bonus<br />

Page 156 of 174


Vol. XVIII 2032 Public Policy<br />

LXXVII Public Interest Law Q-1 2032<br />

LXXVIII Reforming Public Policy Q-2 2032<br />

LXXVIX ... Q-3 2032<br />

LXXVX ... Q-4 2032<br />

Page 157 of 174


The e-Advocate Monthly Review<br />

2018<br />

Transformational Problem Solving January 2018<br />

The Advocacy Foundation February 2018<br />

Opioid Initiative<br />

Native-American Youth March 2018<br />

In the Juvenile Justice System<br />

Barriers to Reducing Confinement April 2018<br />

Latino and Hispanic Youth May 2018<br />

In the Juvenile Justice System<br />

Social Entrepreneurship June 2018<br />

The Economic Consequences of<br />

Homelessness in America S.Ed – June 2018<br />

African-American Youth July 2018<br />

In the Juvenile Justice System<br />

Gang Deconstruction August 2018<br />

Social Impact Investing September 2018<br />

Opportunity Youth: October 2018<br />

Disenfranchised Young People<br />

The Economic Impact of Social November 2018<br />

of Social Programs Development<br />

Gun Control December 2018<br />

2019<br />

The U.S. Stock Market January 2019<br />

Prison-Based Gerrymandering February 2019<br />

Literacy-Based Prison Construction March 2019<br />

Children of Incarcerated Parents April 2019<br />

Page 158 of 174


African-American Youth in The May 2019<br />

Juvenile Justice System<br />

Racial Profiling June 2019<br />

Mass Collaboration July 2019<br />

Concentrated Poverty August 2019<br />

De-Industrialization September 2019<br />

Overcoming Dyslexia October 2019<br />

Overcoming Attention Deficit November 2019<br />

The Gift of Adversity December 2019<br />

2020<br />

The Gift of Hypersensitivity January 2020<br />

The Gift of Introspection February 2020<br />

The Gift of Introversion March 2020<br />

The Gift of Spirituality April 2020<br />

The Gift of Transformation May 2020<br />

Property Acquisition for<br />

Organizational Sustainability June 2020<br />

Investing for Organizational<br />

Sustainability July 2020<br />

Biblical Law & Justice TLFA August 2020<br />

Gentrification AF September 2020<br />

Environmental Racism NpA October 2020<br />

Law for The Poor AF November 2020<br />

…<br />

Page 159 of 174


2021<br />

Biblically Responsible Investing TLFA – January 2021<br />

<strong>International</strong> Criminal Procedure LMI – February 2021<br />

Spiritual Rights TLFA – March 2021<br />

The Theology of Missions TLFA – April 2021<br />

Legal Evangelism, Intelligence,<br />

Reconnaissance & Missions LMI – May 2021<br />

The Law of War LMI – June 2021<br />

Generational Progression AF – July 2021<br />

Predatory Lending AF – August 2021<br />

The Community Assessment Process NpA – September 2021<br />

Accountability NpA – October 2021<br />

Nonprofit Transparency NpA – November 2021<br />

Redefining Unemployment AF – December 2021<br />

2022<br />

21 st Century Slavery AF – January 2022<br />

Acquiesce to Righteousness TLFA – February 2022<br />

ComeUnity Capacity-Building NpA – March 2022<br />

Nonprofit Organizational Assessment NpA – April 2022<br />

Debt Reduction AF – May 2022<br />

Case Law, Statutory Law,<br />

Municipal Ordinances and Policy ALG – June 2022<br />

Organizational Dysfunction NpA - July 2022<br />

Institutional Racism Collab US – August 2022<br />

Page 160 of 174


The Ripple Effects of Ministry TLFA - September 2022<br />

The Sarbanes-Oxley Act of 2002 NpA – October 2022<br />

Organized Crime (In The New Millennium) ALG – May 2022<br />

Nonprofit Marketing NpA – June 2022<br />

The Uniform Code of Military Justice AF – July 2022<br />

Community Policing NpA – August 2022<br />

Wills, Trusts & Estates AF – September 2022<br />

<strong>International</strong> Incidents Series<br />

I. Ten Conflicts to Watch In<br />

The New Millennium LMI – October 2022<br />

II. <strong>International</strong> Hotspots LMI – November 2022<br />

III. <strong>International</strong> <strong>Cyber</strong> <strong>Terrorism</strong> LMI – December 2022<br />

2023<br />

IV. <strong>International</strong> Sex Trafficking LMI – January 2023<br />

V. Brexit LMI – February 2023<br />

VI. Global Jihad LMI – March 2023<br />

VII. The Global Economy LMI – April 2023<br />

…<br />

Page 161 of 174


The e-Advocate Quarterly<br />

Special Editions<br />

Crowdfunding Winter-Spring 2017<br />

Social Media for Nonprofits October 2017<br />

Mass Media for Nonprofits November 2017<br />

The Opioid Crisis in America: January 2018<br />

Issues in Pain Management<br />

The Opioid Crisis in America: February 2018<br />

The Drug Culture in the U.S.<br />

The Opioid Crisis in America: March 2018<br />

Drug Abuse Among Veterans<br />

The Opioid Crisis in America: April 2018<br />

Drug Abuse Among America’s<br />

Teens<br />

The Opioid Crisis in America: May 2018<br />

Alcoholism<br />

The Economic Consequences of June 2018<br />

Homelessness in The US<br />

The Economic Consequences of July 2018<br />

Opioid Addiction in America<br />

Page 162 of 174


The e-Advocate Journal<br />

of Theological Jurisprudence<br />

Vol. I - 2017<br />

The Theological Origins of Contemporary Judicial Process<br />

Scriptural Application to The Model Criminal Code<br />

Scriptural Application for Tort Reform<br />

Scriptural Application to Juvenile Justice Reformation<br />

Vol. II - 2018<br />

Scriptural Application for The Canons of Ethics<br />

Scriptural Application to Contracts Reform<br />

& The Uniform Commercial Code<br />

Scriptural Application to The Law of Property<br />

Scriptural Application to The Law of Evidence<br />

Page 163 of 174


Legal Missions <strong>International</strong><br />

Page 164 of 174


Issue Title Quarterly<br />

Vol. I 2015<br />

I<br />

II<br />

God’s Will and The 21 st Century<br />

Democratic Process<br />

The Community<br />

Engagement Strategy<br />

Q-1 2015<br />

Q-2 2015<br />

III Foreign Policy Q-3 2015<br />

IV<br />

Public Interest Law<br />

in The New Millennium<br />

Q-4 2015<br />

Vol. II 2016<br />

V Ethiopia Q-1 2016<br />

VI Zimbabwe Q-2 2016<br />

VII Jamaica Q-3 2016<br />

VIII Brazil Q-4 2016<br />

Vol. III 2017<br />

IX India Q-1 2017<br />

X Suriname Q-2 2017<br />

XI The Caribbean Q-3 2017<br />

XII United States/ Estados Unidos Q-4 2017<br />

Vol. IV 2018<br />

XIII Cuba Q-1 2018<br />

XIV Guinea Q-2 2018<br />

XV Indonesia Q-3 2018<br />

XVI Sri Lanka Q-4 2018<br />

Page 165 of 174


Vol. V 2019<br />

XVII Russia Q-1 2019<br />

XVIII Australia Q-2 2019<br />

XIV South Korea Q-3 2019<br />

XV Puerto Rico Q-4 2019<br />

Issue Title Quarterly<br />

Vol. VI 2020<br />

XVI Trinidad & Tobago Q-1 2020<br />

XVII Egypt Q-2 2020<br />

XVIII Sierra Leone Q-3 2020<br />

XIX South Africa Q-4 2020<br />

XX Israel Bonus<br />

Vol. VII 2021<br />

XXI Haiti Q-1 2021<br />

XXII Peru Q-2 2021<br />

XXIII Costa Rica Q-3 2021<br />

XXIV China Q-4 2021<br />

XXV Japan Bonus<br />

Vol VIII 2022<br />

XXVI Chile Q-1 2022<br />

Page 166 of 174


The e-Advocate Juvenile Justice Report<br />

______<br />

Vol. I – Juvenile Delinquency in The US<br />

Vol. II. – The Prison Industrial Complex<br />

Vol. III – Restorative/ Transformative Justice<br />

Vol. IV – The Sixth Amendment Right to The Effective Assistance of Counsel<br />

Vol. V – The Theological Foundations of Juvenile Justice<br />

Vol. VI – Collaborating to Eradicate Juvenile Delinquency<br />

Page 167 of 174


The e-Advocate Newsletter<br />

Genesis of The Problem<br />

Family Structure<br />

Societal Influences<br />

Evidence-Based Programming<br />

Strengthening Assets v. Eliminating Deficits<br />

2012 - Juvenile Delinquency in The US<br />

Introduction/Ideology/Key Values<br />

Philosophy/Application & Practice<br />

Expungement & Pardons<br />

Pardons & Clemency<br />

Examples/Best Practices<br />

2013 - Restorative Justice in The US<br />

2014 - The Prison Industrial Complex<br />

25% of the World's Inmates Are In the US<br />

The Economics of Prison Enterprise<br />

The Federal Bureau of Prisons<br />

The After-Effects of Incarceration/Individual/Societal<br />

The Fourth Amendment Project<br />

The Sixth Amendment Project<br />

The Eighth Amendment Project<br />

The Adolescent Law Group<br />

2015 - US Constitutional Issues In The New Millennium<br />

Page 168 of 174


2018 - The Theological Law Firm Academy<br />

The Theological Foundations of US Law & Government<br />

The Economic Consequences of Legal Decision-Making<br />

The Juvenile Justice Legislative Reform Initiative<br />

The EB-5 <strong>International</strong> Investors Initiative<br />

2017 - Organizational Development<br />

The Board of Directors<br />

The Inner Circle<br />

Staff & Management<br />

Succession Planning<br />

Bonus #1 The Budget<br />

Bonus #2 Data-Driven Resource Allocation<br />

2018 - Sustainability<br />

The Data-Driven Resource Allocation Process<br />

The Quality Assurance Initiative<br />

The Advocacy Foundation Endowments Initiative<br />

The Community Engagement Strategy<br />

2019 - Collaboration<br />

Critical Thinking for Transformative Justice<br />

<strong>International</strong> Labor Relations<br />

Immigration<br />

God's Will & The 21st Century Democratic Process<br />

The Community Engagement Strategy<br />

The 21st Century Charter Schools Initiative<br />

2020 - Community Engagement<br />

Page 169 of 174


Extras<br />

The Nonprofit Advisors Group Newsletters<br />

The 501(c)(3) Acquisition Process<br />

The Board of Directors<br />

The Gladiator Mentality<br />

Strategic Planning<br />

Fundraising<br />

501(c)(3) Reinstatements<br />

The Collaborative US/ <strong>International</strong> Newsletters<br />

How You Think Is Everything<br />

The Reciprocal Nature of Business Relationships<br />

Accelerate Your Professional Development<br />

The Competitive Nature of Grant Writing<br />

Assessing The Risks<br />

Page 170 of 174


Page 171 of 174


About The Author<br />

John C (Jack) Johnson III<br />

Founder & CEO – The Advocacy Foundation, Inc.<br />

________<br />

Jack was educated at Temple University, in Philadelphia, Pennsylvania and Rutgers<br />

Law School, in Camden, New Jersey. In 1999, he moved to Atlanta, Georgia to pursue<br />

greater opportunities to provide Advocacy and Preventive Programmatic services for atrisk/<br />

at-promise young persons, their families, and Justice Professionals embedded in the<br />

Juvenile Justice process in order to help facilitate its transcendence into the 21 st Century.<br />

There, along with a small group of community and faith-based professionals, “The Advocacy Foundation, Inc." was conceived<br />

and developed over roughly a thirteen year period, originally chartered as a Juvenile Delinquency Prevention and Educational<br />

Support Services organization consisting of Mentoring, Tutoring, Counseling, Character Development, Community Change<br />

Management, Practitioner Re-Education & Training, and a host of related components.<br />

The Foundation’s Overarching Mission is “To help Individuals, Organizations, & Communities Achieve Their Full Potential”, by<br />

implementing a wide array of evidence-based proactive multi-disciplinary "Restorative & Transformative Justice" programs &<br />

projects currently throughout the northeast, southeast, and western international-waters regions, providing prevention and support<br />

services to at-risk/ at-promise youth, to young adults, to their families, and to Social Service, Justice and Mental<br />

Health professionals” in each jurisdiction served. The Foundation has since relocated its headquarters to Philadelphia,<br />

Pennsylvania, and been expanded to include a three-tier mission.<br />

In addition to his work with the Foundation, Jack also served as an Adjunct Professor of Law & Business at National-Louis<br />

University of Atlanta (where he taught Political Science, Business & Legal Ethics, Labor & Employment Relations, and Critical<br />

Thinking courses to undergraduate and graduate level students). Jack has also served as Board President for a host of wellestablished<br />

and up & coming nonprofit organizations throughout the region, including “Visions Unlimited Community<br />

Development Systems, Inc.”, a multi-million dollar, award-winning, Violence Prevention and Gang Intervention Social Service<br />

organization in Atlanta, as well as Vice-Chair of the Georgia/ Metropolitan Atlanta Violence Prevention Partnership, a state-wide<br />

300 organizational member violence prevention group led by the Morehouse School of Medicine, Emory University and The<br />

Original, Atlanta-Based, Martin Luther King Center.<br />

Attorney Johnson’s prior accomplishments include a wide-array of Professional Legal practice areas, including Private Firm,<br />

Corporate and Government postings, just about all of which yielded significant professional awards & accolades, the history and<br />

chronology of which are available for review online at LinkedIn.com. Throughout his career, Jack has served a wide variety of<br />

for-profit corporations, law firms, and nonprofit organizations as Board Chairman, Secretary, Associate, and General Counsel<br />

since 1990.<br />

www.Advocacy.Foundation<br />

Clayton County Youth Services Partnership, Inc. – Chair; Georgia Violence Prevention Partnership, Inc – Vice Chair; Fayette<br />

County NAACP - Legal Redress Committee Chairman; Clayton County Fatherhood Initiative Partnership – Principal<br />

Investigator; Morehouse School of Medicine School of Community Health Feasibility Study Steering Committee; Atlanta<br />

Violence Prevention Capacity Building Project Partner; Clayton County Minister’s Conference, President 2006-2007; Liberty In<br />

Life Ministries, Inc. Board Secretary; Young Adults Talk, Inc. Board of Directors; ROYAL, Inc Board of Directors; Temple<br />

University Alumni Association; Rutgers Law School Alumni Association; Sertoma <strong>International</strong>; Our Common Welfare Board of<br />

Directors President 2003-2005; River’s Edge Elementary School PTA (Co-President); Summerhill Community Ministries<br />

(Winter Sports Athletic Director); Outstanding Young Men of America; Employee of the Year; Academic All-American -<br />

Basketball; Church Trustee; Church Diaconate Ministry (Walking Deacon); Pennsylvania Commission on Crime & Delinquency<br />

(Nominee).<br />

Page 172 of 174


www.Advocacy.Foundation<br />

Page 173 of 174


Page 174 of 174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!