Academia.eduAcademia.edu

Cyber-security (3rd edition, 2013)

2013, in: Contemporary Security Studies, edited by Alan Collins, p. 362-378

This chapter looks at why cyber-security is considered one of the key national security issues of our times. The first section provides the necessary technical background information. The second unravels three different, but interrelated ways to look at cyber-security: the first discourse has a technical focus and is about viruses and worms. The second looks at the interrelationship between the phenomenon of cyber-crime and cyber-espionage. The third turns to a military and civil defence-driven discourse about the double-edged sword of fighting wars in the information domain and the need for critical infrastructure protection. Based on this, the third section looks at selected protection concepts from each of the three discourses. The final section sets the threat into perspective: despite heightened media attention and a general feeling of impending cyber-doom in some government circles, the level of cyber-risk is generally overstated

25 Cyber-security Myriam Dunn Cavelty Chapter Contents • Introduction 363 • Information security 101 363 • Three interlocking cyber-security discourses 364 • Reducing cyber-in-security • The level of cyber-risk 373 376 • Conclusion 377 Reader’s Guide This chapter looks at why cyber-security is considered one of the key national security issues of our times. The first section provides the necessary technical background information. The second unravels three different, but interrelated ways to look at cyber-security: the first discourse has a technical focus and is about viruses and worms. The second looks at the interrelationship between the phenomenon of cyber-crime and cyber-espionage. The third turns to a military and civil defencedriven discourse about the double-edged sword of fighting wars in the information domain and the need for critical infrastructure protection. Based on this, the third section looks at selected protection concepts from each of the three discourses. The final section sets the threat into perspective: despite heightened media attention and a general feeling of impending cyber-doom in some government circles, the level of cyber-risk is generally overstated. Cyber-security Introduction Information has been considered a signiicant aspect of power, diplomacy, and armed conlict for a very long time. Since the 1990s, however, information’s role in international relations and security has diversiied and its importance for political matters has increased, mostly due to the proliferation of information and communication technology (ICT) into all aspects of life in post-industrialized societies. The ability to master the generation, management, use but also manipulation of information has become a desired power resource since the control over knowledge, beliefs, and ideas are increasingly regarded as a complement to control over tangible resources such as military forces, raw materials, and economic productive capability. Consequently, matters of cyber-(in)-security— though not always under this name—have become a security issue. In this chapter, the cyber-(in)-security logic is unpacked in four sections as described in the Reader’s Guide, with the irst providing the necessary technical background information on why the information infrastructure is inherently insecure, how computer vulnerabilities are conceptualized, who can exploit them and in what ways. Information security 101 Cyberspace connotes the fusion of all communication networks, databases, and sources of information into a vast, tangled, and diverse blanket of electronic interchange. A ‘network ecosystem’ is created; it is virtual and it ‘exists everywhere there are telephone wires, coaxial cables, iber-optic lines or electromagnetic waves’ (Dyson et al. 1996). Cyberspace, however, is not only virtual since it is also made up of servers, cables, computers, satellites, etc. In popular usage we tend to use the terms cyberspace and Internet almost interchangeably, even though the Internet, albeit the most important one, is just one part of cyberspace. Cyber-security is both about the insecurity created by and through this new place/space and about the practices or processes to make it (more) secure. It refers to a set of activities and measures, both technical and non-technical, intended to protect the bioelectrical environment and the data it contains and transports from all possible threats. The inherent insecurity of computers and networks Today’s version of the Internet is a dynamic evolution of the Advanced Research Projects Agency Network (ARPANET), which was funded by the Defense Advanced Research Projects Agency (DARPA) of the United States Department of Defense (DoD) from 1962 onwards, mainly for optimized information exchange between the universities and research laboratories involved in DoD research. From the very beginning the network designers emphasized robustness and survivability over security. At the time there was no apparent need for a speciic focus on security, because information systems were being hosted on large proprietary machines that were connected to very few other computers. Due to the dynamic evolution of ARPANET this turned into a legacy problem. What makes systems so vulnerable today is the conluence of three factors: the same basic network technology (not built with security in mind), the shift to smaller and far more open systems (not built with security in mind), and the rise of extensive networking at the same time. In addition to this, the commercialization of the Internet in the 1990s led to a further security deicit. There are signiicant market-driven obstacles to IT-security: there is no direct return on investment, time-to-market impedes extensive security measures, and security mechanisms have a negative impact on usability so that security is often sacriiced for functionality. Also, an ongoing dynamic globalization of information services in connection with technological innovation has led to an increase of connectivity and complexity, leading to ill-understood behaviour of systems, as well as barely understood vulnerabilities. Quite simply, the more complex an IT system is the more bugs it contains and the more complex it is the harder it is for an IT system’s security to control or manage it. Computer vulnerabilities and threat agents The terminology in information security is often seemingly congruent with the terminology in national security discourses: it is about threats, agents, vulnerabilities, etc. However, the terms have very speciic meanings so that seemingly clear analogies must be used with care. One (of several possible) ways to categorize threats is to diferentiate between ‘failures’, 363 364 Myriam Dunn Cavelty ‘accidents’, and ‘attacks’. Failures are potentially damaging events caused by deiciencies in the system or in an external element on which the system depends. Failures may be due to software design errors, hardware degradation, human errors, or corrupted data. Accidents include the entire range of randomly occurring and potentially damaging events such as natural disasters. Usually, accidents are externally generated events (i.e. from outside the system), whereas failures are internally generated events. Attacks (both passive and active) are potentially damaging events orchestrated by a human adversary. They are the main focus of the cyber-security discourse. Human attackers are usually called ‘threat agents’. The most common label bestowed upon them is hacker. This catchphrase is used in two main ways, one positive and one pejorative (Erickson 2003). For members of the computing community it describes a member of a distinct social group (or sub-culture); a particularly skilled programmer or technical expert who knows a programming interface well enough to write novel software. A particular ethic is ascribed to this subculture: a belief in sharing, openness, and free access to computers and information; decentralization of government; and in improvement of the quality of life (Levy 1984). In popular usage and in the media, however, the term hacker generally describes computer intruders or criminals. In the cyber-security debate, hacking is considered a modus operandi that can be used not only by technologically skilled individuals for minor misdemeanours, but also by organized actor groups with truly bad intent, such as terrorists or foreign states. Some hackers may have the skills to attack those parts of the information infrastructure considered ‘critical’ for the functioning of society. Though most hackers would be expected to lack the motivation to cause violence or severe economic or social harm because of their ethics (Denning 2001), government oicials fear that individuals who have the capability to cause serious damage, but little motivation, could be corrupted by a group of malicious actors. Hacking tools There are various tools and modes of attack. The term used for the totality of these tools is malware. Wellknown examples are viruses and worms, computer programs that replicate functional copies of themselves with varying efects ranging from mere annoyance and inconvenience to compromise of the conidentiality or integrity of information, and Trojan horses, destructive programs that masquerade as benign applications but set up a back door so that the hacker can return later and enter the system. Often system intrusion is the main goal of more advanced attacks. If the intruder gains full system control, or ‘root’ access, he has unrestricted access to the inner workings of the system (Anonymous 2003). Due to the characteristics of digitally stored information an intruder can delay, disrupt, corrupt, exploit, destroy, steal, and modify information. Depending on the value of the information or the importance of the application for which this information is required, such actions will have diferent impacts with varying degrees of gravity. Key pOINTS • Cyberspace has both virtual and physical elements. We tend to use the terms cyberspace and Internet interchangeably, even though cyberspace encompasses far more than just the Internet. • Cyber-security is both about the insecurity created through cyberspace and about the technical and nontechnical practices of making it (more) secure. • The Internet started as ARPANET in the 1960s and was never built with security in mind. This legacy, combined with the rapid growth of the network, its commercialization, and its increasing complexity made computer networks inherently insecure. • Information security uses as vocabulary very similar to national security language, but has speciic meanings. Computer problems are caused by failures, accidents, or attacks. The latter are the main focus of the cybersecurity discourse. Attackers are generally called hackers. • The umbrella term for all hacker tools is malware. The main goal of more advanced attacks is full system control, which allows the intruder to delay, disrupt, corrupt, exploit, destroy, steal, or modify information. Three interlocking cyber-security discourses The cyber-security discourse originated in the USA in the 1970s, built momentum in the late 1980s and spread to other countries in the late 1990s. The US government shaped both the threat perception and the envisaged countermeasures with only little variation in other countries. On the one hand, the debate was decisively inluenced by the larger post-Cold War strategic context in which the notion of asymmetric Cyber-security vulnerabilities, epitomized by the multiplication of malicious actors (both state and non-state) and their increasing capabilities to do harm, started to play a key role. On the other hand, discussions about cybersecurity always were and still are inluenced by the ongoing information revolution, which the USA is shaping both technologically and intellectually by discussing its implications for international relations and security and acting on these assumptions. The cyber-security discourse was never static because the technical aspects of the information infrastructure are constantly evolving. Most importantly, changes in the technical sub-structure changed the referent object. In the 1970s and 1980s, cyber-security was about those parts of the private sector that were becoming digitalized and also about government networks and the classiied information residing in it. The growth and spread of computer networks into more and more aspects of life changed this limited referent object in crucial ways. In the mid-1990s, it became clear that key sectors of modern society, including those vital to national security and to the essential functioning of (post-)industrialized economies, had come to rely on a spectrum of highly interdependent national and international software-based control systems for their smooth, reliable, and continuous operation. The referent object that emerged was the totality of critical (information) infrastructures that provide the way of life that characterizes our societies. When telling the cyber-security-story we can distinguish between three diferent, but often closely interrelated and reinforcing discourses, with speciic threat imaginaries and security practices, referent objects, and key actors. The irst is a technical discourse concerned with malware (viruses, worms, etc.) and system intrusions. The second is concerned with the phenomena cyber-crime and cyber-espionage. The third is a discourse driven initially by the US military, focusing on matters of cyber-war initially but increasingly also on critical infrastructure protection (see Figure 25.1). Viruses, worms, and other bugs (technical discourse) The technical discourse is focused on computer and network disruptions caused by diferent types of malware. One of the irst papers on viruses and their risks was Fred Cohen’s ‘Computer viruses—Theory and Experiments’, initially presented in 1984 and published in 1987 (Cohen 1987). His work demonstrated the Figure 25.1 Three discourses Technical Main actors Crime–Espionage Computer experts Law enforcement Anti-virus industry Intelligence community Military/civil defence National security experts Military Civil defence establishment Main referent object Computers Business networks Computer networks Classiied information (government networks) Military networks, networked armed forces Critical (information) infrastructures 365 366 Myriam Dunn Cavelty universality of risk and the limitations of protection in computer networks and solidiied the basic paradigm that there can be no absolute security /no zero risk in information systems. In 1988, the ARPANET had its irst major network incident: the ‘Morris Worm’. The worm used so many system resources that the attacked computers could no longer function and large parts of the early Internet went down. Its devastating technical efect prompted DARPA to set up a centre to coordinate communication among computer experts during IT emergencies and to help prevent future incidents: a Computer Emergency Response Team (CERT). This centre, now called the CERT Coordination Center, still plays a considerable role in computer security today and served as a role model for many similar centres all over the world. Around the same time, the anti-virus industry emerged and with it techniques and programs for virus recognition, destruction and prevention. The worm also had a substantial psychological impact by making people aware just how insecure and unreliable the Internet was. While it had been acceptable in the 1960s that pioneering computer professionals were hacking and investigating computer systems, the situation had changed by the 1980s. Society had become dependent on computing in general for business practices and other basic functions. Tampering with computers suddenly meant potentially endangering people’s careers and property; and some even said their lives (Spaford 1989). Ever since, malware as ‘visible’ proof of the persuasive insecurity of the information infrastructure has remained in the limelight of the cyber-security discourse; and it also provides the back-story for the other two discourses. Table 25.1 lists some of the most prominent examples. Most obviously, the history of malware is a mirror of technological development: the type of malware, the type of targets and the attack vectors all changed with the technology and the existing technical countermeasures (and continue to do so). This development goes in sync with the development of the cyber-crime market, which is driven by the huge sums of money available to criminal enterprises at low risk of prosecution. While there was a tongue-in-cheek quality to many of the viruses in the beginning, viruses have long ago lost their innocence. While prank-like viruses have not disappeared, computer security professionals are increasingly concerned with the rising level of professionalization coupled with the obvious criminal (or even strategic) intent behind attacks. Advanced malware is targeted: A hacker picks a victim, scopes the defences and then designs malware to get around them (Symantec 2010). The most prominent example for this kind of malware is Stuxnet (see Case Study 25.2). However, some IT security companies have recently warned against overemphasizing so called advanced persistent threat attacks just because we hear more about them (Verizon 2010: 16). Only about 3 per cent of all incidents are considered so sophisticated that they were impossible to stop. The vast majority of attackers go after small to medium-sized enterprises with bad defences. These types of incidents tend to remain under the radar of the media and even law-enforcement. Key pOINTS • Theoretical research on self-replicating programs in the early history of computer networks proved that there could be no absolute security in information systems. In 1988, the Morris Worm downed large parts of the early Internet, proving the theory right and making clear that the Internet was a very insecure technology. • As a consequence, the CERT Coordination Center was founded. It is still very active today and has served as a model for similar computer emergency response teams in many countries. • There is a long list of prominent malware, which often made headlines. Over the years, malware has become more sophisticated and more clearly linked to criminal intent. • The most dangerous malware today is tailored to a speciic target. However, the large majority of attacks remains fairly unsophisticated and go after small or medium-sized enterprises with little IT security awareness and/or investment. Cyber-crooks and digital spies (crime-espionage discourse) The cyber-crime discourse and the technical discourse are very closely related. The development of IT law (and, more speciically, Internet or cyber-law) in diferent countries plays a crucial role in the second discourse because it allows the deinition and prosecution of misdemeanour. Not surprisingly, the development of legal tools to prosecute unauthorized entry into computer systems coincided with the irst serious network incidents described here (cf. Mungo and Clough 1993). Cyber-crime has come to refer to any crime that involves computers and networks, like a release of malware or spam, fraud, and many other things. Until today, notions of computer-related economic crimes Cyber-security Table 25.1 Prominent malware Name of malware year of discovery Creeper virus 1971 Bob Thomas (IT professional), USA Speciic types of computer/ Displayed message on computer screen: operating systems ‘I’m the creeper, catch me if you can!’ Elk Cloner 1981 Richard Skrenta (15-year-old high school student), USA Apple DOS 3.3 operating system Displayed poem, irst line: ‘Elk Cloner: The program with a personality’ Morris Worm 1988 Robert Morris (computer student), USA UNIX systems Slowed down machines in the ARPANET until they became unusable Huge impact on the general awareness of insecurity Michelangelo 1992 (unknown) DOS systems Overwrote the irst hundred sectors of the hard disk with nulls Caused irst digital mass hysteria Back Oriice 1998 Cult of the Dead Cow (hacker collective), USA Windows 98 Tool for remote system administration (Trojan horse) Melissa 1999 David L. Smith (programmer), USA Microsoft Word, Outlook Shut down Internet mail, clogged systems with infected e-mails I Love You 2000 Reomel Ramores and Onel de Guzman (computer students), Philippines Windows Overwrote iles with copy of itself, sent itself to the irst ifty people in the Windows Address Book Code Red 2001 (unknown) Microsoft web servers Defaced websites, used machines for DDoS-attacks Nimda 2001 (unknown) Windows workstations and servers Allowed external control over infected computers Blaster 2003 Jefrey Lee Parson (18-year-old student), USA Windows XP and 2000 DDos-attacks against ‘windowsupdate.com’ Side efects: system crash. Was suspected to have caused black-out in US (could not be conirmed) Slammer 2003 (unknown) Windows 95–XP DDoS-attacks, slowed down Internet traic worldwide Sasser 2004 Sven Jaschan (computer science student), Germany Windows XP and Windows 2000 Internet traic slow down, system crash Zeus 2007 (unknown), available to buy in underground computer forums Windows Steals banking and other information, forms botnets Conicker (several versions) 2008 (unknown) Windows Forms botnets Stuxnet 2010 US government (+ Israel) SCADA system (Siemens industrial software and equipment) Spies on and subverts industrial systems Duqu 2011 (unknown) Windows Looks for information useful in attacking industrial control systems Code almost identical to Stuxnet (copy-cat software) Creator Infected efect 367 368 Myriam Dunn Cavelty determine the discussion about computer misuse. However, a distinct national-security dimension was established when computer intrusions (a criminal act) were clustered together with the more traditional and wellestablished espionage discourse. Prominent hacking incidents—such as the intrusions into high-level computers perpetrated by the Milwaukee-based ‘414s’—led to a feeling in policy circles that there was a need for action (Ross 1991): if teenagers were able to penetrate computer networks that easily, it was assumed that better organized entities such as states would be even better equipped to do so. Other events, like the Cuckoo’s Egg incident, the Rome Lab incident, Solar Sunrise, or Moonlight Maze made apparent that the threat was not just one of criminals or juveniles, but that classiied or sensitive information could be acquired relatively easily by foreign nationals through hackers (see Table 25.2). There are three trends worth mentioning. First, tech-savvy individuals (often juveniles) with the goal of mischief or personal enrichment shaped the early history of cyber-crime. Today, professionals dominate the ield. The Internet is a near ideal playground for semi- and organized crime in activities such as theft (like looting online banks, intellectual property, or identities) or for fraud, forgery, extortion, and money laundering. Actors in the ‘cyber-crime black market’ are highly organized regarding strategic and operational vision, logistics and deployment. Like many real companies, they operate across the globe. Second, the cyber-espionage story has also changed. There has been an increase in allegations that China is responsible for high-level penetrations of government and business computer systems in Europe, North America, and Asia. Because Chinese authorities have stated repeatedly that they consider cyberspace a strategic domain and that they hope that mastering it will equalize the existing military imbalance between China and the USA more quickly, many oicials readily accuse the Chinese government of deliberate and targeted attacks or intelligence gathering operations. However, these allegations almost exclusively rely on anecdotal and circumstantial evidence. The so-called attribution problem—which refers to the diiculty to clearly determining those initially responsible for a cyber-attack plus identifying their motivating factors—is the big challenge in the cyberdomain. Due to the architecture of cyberspace, online identities can be optimally hidden. Blame on the basis of the ‘cui bono’-logic (which translates into ‘to whose beneit?’) is not suicient proof for political action. Attacks and exploits that seemingly beneit states might well be the work of third-party actors operating under a variety of motivations. At the same time, the challenges of clearly identifying perpetrators also gives state actors convenient ‘plausible deniability and the ability to oicially distance themselves from attacks’ (Deibert and Rohozinski 2009: 12). The third trend is the increased attention that hacktivism—the combination of hacking and activism— has gained in recent years. WikiLeaks, for example, has added yet another twist to the cyber-espionage discourse. Acting under the hacker-maxim ‘all information should be free’, this type of activism deliberately challenges the self-proclaimed power of states to keep information, which they think could endanger or damage national security, secret. It emerges as a cyber-security issue in government discourse because of the way a lot of the data has been stolen (in digital form) but also how it is made available to the whole world through multiple mirrors (Internet sites). Somewhat related are the multifaceted activities of hacker collectives such as Anonymous or LulzSec. They creatively play with anonymity in a time obsessed with control and surveillance and humiliate high-visibility targets by DDoS-attacks, breakins, and the release of sensitive information. Key pOINTS • The notion of computer crime and the development of cyber law coincided with the irst network attacks. Though this discourse is mainly driven by economic considerations until today, political cyber-espionage, as a speciic type of criminal computer activity, started worrying oicials around the same time. • Over the years, cyber-criminals have become wellorganized professionals, operating in a consolidated cyber-crime black market. • China is often blamed for high-level cyber-espionage, both political and economic. However, there only is anecdotal and circumstantial evidence for this. • As there is no way to clearly identify perpetrators that want to stay hidden in cyberspace (attribution problem), anyone could be behind actions that seemingly beneit certain states. States can also plausibly deny being involved. • Politically motivated or activist break-ins by hacker collectives that go after high-level targets, with the aim to steal and publish sensitive information or just ridiculing them by targeting their websites, have recently added to the feeling of insecurity in government circles. Cyber-security Table 25.2 Cyber-crime and cyber-espionage Name of incident 414s break-ins year of occurrence Description perpetrators 1982 Break-ins into high-proile computer systems in the United States Six teenage hackers from Milwaukee Hanover Hackers (Cuckoo’s Egg) 1986–1988 Break-ins into high-proile computer systems in the United States German hacker recruited by the KGB Rome Lab incident 1994 Break-ins into high-proile computer systems in the United States British teenage hackers Citibank incident 1994 $10 million siphoned from Citibank and transferred the money to bank accounts around the world Russian hacker(s) Solar Sunrise 1998 Series of attacks on DoD computer networks Two teenage hackers from California plus one Israeli Pattern of probing of high-proile computer systems Attributed to Russia Titan Rain Moonlight Maze 2003– 1998 Access to high-proile computer systems in the United States Attributed to China Zeus Botnet 2007 Trojan horse ‘Zeus’, controlled millions of machines in 196 countries International cyber-crime network, over 90 people arrested in US alone GhostNet 2009 Cyber-spying operation, iniltration of high-value political, economic, and media locations in 103 countries Attributed to China Operation Aurora 2009 Attacks against Google and other companies to gain access to and potentially modify source code repositories at these high tech, security, and defence contractor companies Attributed to China Wikileaks Cablegate 2010 251,287 leaked conidential diplomatic cables from 274 US embassies around the world, dated from 28 December 1966 to 28 February 2010 Wikileaks, not-for-proit activist organization Operations Payback and Avenge Assange 2010 Coordinated, decentralized attacks on opponents of Internet piracy and companies with perceived anti-WikiLeaks behaviour Anonymous, hacker collective Sony and other corporate as well as government attacks 2011 Highly publicized hacktivist operations LulzSec, hacker collective Theft of CO2Emmission Papers 2011 Theft of 475,000 carbon dioxide emissions allowances worth €6.9 million, or $9.3 million Attributed to organized cyber-crime (purpose probably money laundering) Cyber(ed) conlicts and vital system security (military–civil defence discourse) The Gulf War of 1991 created a watershed in US military thinking about cyber-war. Military strategists saw the conlict as the irst of a new generation of information age conlicts in which physical force alone was not suicient, but was complemented by the ability to win the information war and to secure ‘information dominance’. As a result, American military thinkers began to publish scores of books on the topic and developed doctrines that emphasized the ability to degrade or even paralyse an opponent’s 369 370 Myriam Dunn Cavelty communications systems (cf. Campen 1992; Arquilla and Ronfeldt 1993). In the mid-1990s, the advantages of the use and dissemination of ICT that had fuelled the revolution in military afairs were no longer seen only as a great opportunity providing the country with an ‘information edge’ (Nye and Owens 1996), but were also perceived as constituting an over-proportional vulnerability vis-à-vis a plethora of malicious actors. Global information networks seemed to make it much easier to attack the US asymmetrically and as such an attack no longer required big, specialized weapons systems or an army: borders, already porous in many ways in the real world, were nonexistent in cyberspace. There was widespread fear that those likely to fail against the American military would instead plan to bring the USA to its knees by striking vital points fundamental to the national security and the essential functioning of industrialized societies at home. Apart from break-ins into computer networks that contained sensitive information (see previous section), exercises designed to assess the plausibility of information warfare scenarios and to help deine key issues to be addressed in this area demonstrated that US critical infrastructure presented a set of attractive strategic targets for opponents possessing information warfare capabilities, be it terrorist groups or states. At the same time, the development of military doctrine involving the information domain continued. For a while, information warfare remained essentially limited to military measures in times of crisis or war. This began to change around the mid-1990s, when the activities began to be understood as actions targeting the entire information infrastructure of an adversary— political, economic, and military, throughout the continuum of operations from peace to war. NATO’s 1999 intervention against Yugoslavia marked the irst sustained use of the full-spectrum of information warfare components in combat. Much of this involved the use of propaganda and disinformation via the media (an important aspect of information warfare), but there were also website defacements, a number of DDoS-attacks, and (unsubstantiated) rumours that Slobodan Milosevic’s bank accounts had been hacked by the US armed forces. The increasing use of the Internet during the conlict gave it the distinction of being the ‘irst war fought in cyberspace’ or the ‘irst war on the Internet’. Thereafter, the term cyber-war came to be widely used to refer to basically any phenomenon involving a deliberate disruptive or destructive use of computers. For example, the cyber-confrontations between Chinese and US hackers plus many other nationalities in 2001 have been labelled the ‘irst Cyber World War’. The cause was a US reconnaissance and surveillance plane that was forced to land on Chinese territory after a collision with a Chinese jet ighter. In 2007, DDoS-attacks on Estonian websites were readily attributed to the Russian government, and various government oicials claimed that this was the irst known case of one state targeting another using cyber-warfare (see Case Study 25.1). Similar claims were made in the confrontation between Russia and Georgia of 2008. In other cases, China is said to be the culprit (see previous section and Table 25.3). The discovery of Stuxnet in 2010 changed the overall tone and intensity of the debate (see Case Study 25.2). CASe STUDy 25.1 estonian ‘cyber-war’ When the Estonian authorities removed a bronze statue of a Second World War-era Soviet soldier from a park a cyberspace-’battle’ ensued, lasting over three weeks, in which a wave of so-called Distributed Denial of Service attacks (DDoS) swamped various websites—among them the websites of the Estonian parliament, banks, ministries, newspapers, and broadcasters—disabling them by overcrowding the bandwidths for the servers running the sites. Even though it will likely never be possible to provide suicient evidence for who was behind the attacks, various oicials readily and publicly blamed the Russian government. Also, despite the fact that the attacks bore no truly serious consequences for Estonia other than (minor) economic losses, some oicials even openly toyed with the idea of a counter-attack in the spirit of Article 5 of the North Atlantic Treaty, which states that ‘an armed attack’ against one or more NATO countries ‘shall be considered an attack against them all’. The Estonian case is one of the cases most often referred to in government circles to prove that there is a rising level of urgency and need for action. Cyber-security Table 25.3 Instances of cyber(ed)-conlict Name of incident year of occurrence Description Actors /perpetrators Gulf War 1991 First of a new generation of conlicts where victory is no longer dependent only on physical force, but also on the ability to win the information war and to secure ‘information dominance’ US military Dutch hacker incident 1991 Intrusions into Pentagon computers during Gulf War. Access to unclassiied, sensitive information Dutch teenagers Operation ‘Allied Force’ 1999 ‘The irst Internet War’: sustained use of the full-spectrum of information warfare components in combat. Numerous hacktivism incidents US military, hacktivists from many countries 2000–2005 E-mail looding and Denial-of-Service (DoS) attacks against government and partisan websites during second Intifada Palestinian and Israeli hacktivists ‘Cyber World-War I’ 2001 Defacement of Chinese and US websites and waves of DDoS-attacks after US reconnaissance and surveillance plane was forced to land on Chinese territory Hacktivists from many nations (Saudi Arabia, Pakistan, India, Brazil, Argentina, Malaysia, Korea, Indonesia, Japan) Iraq 2007 Cyber-attack on cell phones, computers, and other communication devices that terrorists were using to plan and carry out roadside bombs US military Estonia DDoS-attacks 2007 DDoS-attacks against websites of the Estonian parliament, banks, ministries, newspapers, and broadcasters Attributed to Russian government Georgia DDoS-attacks 2008 DDoS-attacks against numerous Georgian websites Attributed to Russian government GhostNet iniltrations 2009 GhostNet related iniltrations of computers belonging to Tibetan exile groups Attributed to Chinese government Stuxnet 2010 Computer worm that might have been deliberately released to slow down Iranian nuclear programme US government (+ Israel) Korean network intrustions 2011 Botnets and DDos-attacks against government websites. Experts suspected North Korean ‘cyber-weapons’ test Attributed to NorthKorean government ‘Cyber-Intifada’ 371 372 Myriam Dunn Cavelty CASe STUDy 25.2 Stuxnet Stuxnet is a computer worm that was discovered in June 2010 and has been called ‘[O]ne of the great technical blockbusters in malware history’ (Gross 2011). It is a complex program. It is likely that writing it took a substantial amount of time, advanced-level programming skills and insider knowledge of industrial processes. Therefore, Stuxnet is probably the most expensive malware ever found. In addition, it behaves diferently from malware released for criminal intent: it does not steal information and it does not herd infected computers into so-called botnets from which to launch further attacks. Rather, it looks for a very speciic target: Stuxnet was written to attack Siemens’ Supervisory Control And Data Acquisition (SCADA) systems that are used to control and monitor industrial processes. In August 2010, the security company Symantec noted that 60 per cent of the infected computers worldwide were in Iran. Due to the attribution problem, it was impossible to know for certain who was behind this piece of code, though many suspected one or several state actors (Farwell and Rohozinski 2011). In June 2012, it was revealed that Stuxnet is part of a US and Israeli intelligence operation and that it was indeed programmed and released to sabotage the Iranian nuclear programme. For many observers, Stuxnet as a ‘digital irst strike’ marks the beginning of the unchecked use of cyber-weapons in military-like aggressions (Gross 2011). However, other reports think this unlikely (cf. Sommer and Brown 2011), mainly due the uncertain results a cyber-war would bring, the lack of motivation on the part of the possible combatants and their shared inability to defend against counterattacks. Future conlicts between nations will most certainly have a cyberspace component but they will be just a part of the battle. It is therefore more sensible to speak about cyber(ed) conlicts, conlicts ‘in which success or failure for major participants is critically dependent on computerized key activities along the path of events’ (Demchak 2010). Dubbing occurrences as ‘cyber-war’ too carelessly bears the inherent danger of creating an atmosphere of insecurity and tension and fuelling a cyber-security dilemma: many countries are currently said to have functional cyber-commands or be in the process of building one. Because cybercapabilities cannot be divulged by normal intelligence gathering activities, uncertainty and mistrust are on the rise. It was also reported that Stuxnet damaged centrifuges in the Iran nuclear programme. This evidence led several experts to the conclusion that one or several nation states—most often named are the USA and/or Israel–were behind the attack. The involvement of the US government has since been conirmed. On another note, Stuxnet provided a platform for an evergrowing host of cyber-war-experts to speculate about the future of cyber-aggression. Internationally, Stuxnet has had two main efects: irst, governments all over the world are currently releasing or updating cyber-security strategies and are setting up new organizational units for cyber-defence (and -ofence). Second, Stuxnet can be considered a ‘wake-up’ call: ever since its discovery, increasingly serious attempts to come to some type of agreement on the non-aggressive use of cyberspace between states are undertaken. Key pOINTS • The Gulf War of 1991 is considered to be the irst of a new generation of conlicts in which mastering the information domain becomes a deciding factor. Afterwards, the information warfare doctrine was developed in the US military. • Increasing dependence of the military, but also of society in general, on information infrastructures made clear that information warfare was a double-edged sword. Cyberspace seemed the perfect place to launch an asymmetrical attack against civilian or military critical infrastructures. • The US military tested its information warfare doctrine for the irst time during a NATO operation ‘Allied Force’ in 1999. It was the irst armed conlict in which all sides, including actors not directly involved, had an active online presence, and in which the Internet was actively used for the exchange and publication of conlict-relevant information. Thereafter, the term ‘cyber-war’ came to be used for almost any type of conlict with a cyber-component. • The recent discovery of a computer worm that sabotages industrial processes and was programmed by order of a state actor has alarmed the international community. Some experts believe that this marks the beginning of unrestrained cyber-war among states. • Others think that highly unlikely and warn against an excessive use of the term cyber-war. Future conlicts between states will also be fought in cyberspace, but not exclusively. One useful term for them is cyber(ed) conlicts. Cyber-security Key IDeAS 25.1 presidential Commission on Critical Infrastructure protection Following the Oklahoma City Bombing, President Bill Clinton set up the Presidential Commission on Critical Infrastructure Protection (PCCIP) to look into the security of vital systems such as gas, oil, transportation, water, telecommunications, etc. The PCCIP presented its report in the fall of 1997 (Presidential Commission on Critical Infrastructure Protection 1997). It concluded that the security, economy, way of life, and perhaps even the survival of the industrialized world were dependent on the interrelated trio of electrical energy, communications, and computers. Further, it stressed that advanced societies rely heavily upon critical infrastructures, which are susceptible to Reducing cyber-in-security The three diferent discourses have produced speciic types of concepts and countermeasures in accordance with their focus and main referent objects (see Figure 25.2), some of which are discussed later. Despite fancy concepts such as cyber-deterrence the common issue in all discourses is information assurance, which is the basic security of information and information systems. It is common practice that the entities that own a computer network are also responsible for protecting it (governments protect government networks, militaries only military ones, and companies protect their own, etc.). However, there are some assets considered so crucial to the functioning of society in the private sector that governments take additional measures to ensure an adequate level of protection. These eforts are usually subsumed under the label of critical (information) infrastructure protection. In the 1990s, critical infrastructures became the main referent object in the cyber-security debate. Whereas critical infrastructure protection (CIP) encompasses more than just cyber-security, cyberaspects have always been the main driver (see Key Ideas 25.1). The key challenge for CIP eforts arise from the privatization and deregulation of large parts of the public sector since the 1980s and the globalization processes of the 1990s, which have put many critical infrastructures in the hands of private (transnational) enterprises. This creates a situation in which market forces alone are not suicient to provide the aspired level of security in designated critical infrastructure classical physical disruptions and new virtual threats. While the study assessed a list of critical infrastructures or ‘sectors’—for example the inancial sector, energy supply, transportation, and the emergency services—the main focus was on cyber-risks. There were two reasons for this decision: irst, these were the least known because they were basically new, and second, many of the other infrastructures were seen to depend on data and communication networks. The PCCIP linked the cyber-security discourse irmly to the topic of critical infrastructures. Thereafter, CIP became a key topic in many other countries. sectors,1 but state actors are also incapable of providing the necessary level of security on their own (unless they heavily regulate, which they are usually reluctant to do). Public–Private Partnerships (PPP), a form of cooperation between the state and the private sector, are widely seen as a panacea for this problem in the policy community—and cooperation programmes that follow the PPP idea are part of all existing initiatives in the ield of CIP today, though with varying success. A large number of them are geared towards facilitating information exchange between companies and between companies and government on security, disruptions, and best practices. Mutual win–win situations are to be created by exchanging information that the other party does not have: the government ofers classiied information acquired by its intelligence services about potentially hostile groups and nation states in exchange for technological knowledge from the private sector that the public sector does not have (President’s Commission on Critical Infrastructure Protection 1997: 20). Information assurance is guided by the management of risk, which is essentially about accepting that one is (or remains) insecure: the level of risk can never be reduced to zero. This means that minor and probably also major cyber-incidents are bound to happen because they simply cannot be avoided even with perfect risk management. This is one of the main 1 The most frequently listed examples are banking and inance, government services, telecommunication and information and communication technologies, emergency and rescue services, energy and electricity, health services, transportation, logistics and distribution, and water supply. 373 374 Myriam Dunn Cavelty Figure 25.2 Countermeasures Technical Main actors Main referent object  Computer experts  Law enforcement  Anti-virus industry  Intelligence community  Computers  Business sector  Computer networks  Classified information Protection concept National level Crime–Espionage Military/civil defence  Security professionals, military, civil defence establishment  Military networks, networked forces  Critical infrastructures Information assurance  CERTs (specific for different domain, milCert, govCert etc.)  Computer law  Critical (information) infrastructure protection  Resilience  Cyber-offence; cyberdefence; cyberdeterrence International  International level CERTs  International information security standards  Harmonization of law (Convention on Cybercrime)  Mutual judicial assistance procedures  Arms control  International behavioural norms Cyber-security reasons why the concept of resilience has gained so much weight in recent debates (Perelman 2007). Resilience is commonly deined as the ability of a system to recover from a shock, either returning back to its original state or to a new adjusted state. Resilience accepts that disruptions are inevitable and can be considered a ‘Plan B’ in case something goes wrong. In the military discourse, the terms cyber-ofence, cyber-defence, and cyber-deterrence are often used as countermeasures. Under closer scrutiny, cyberdefence (and to some degree -ofence) are not much more than fancy words for information assurance practices. Cyber-deterrence on the other hand deserves some attention. Cyberspace clearly poses considerable limitations for classical deterrence. Deterrence works if one party is able to successfully convey to another that it is both capable and willing to use a set of available (often military) instruments against him if the other steps over the line. This requires an opponent that is clearly identiiable as an attacker and has to fear retaliation—which is not the case in cyber-security because of the attribution problem. However, this is not stopping US government oicials from threatening to use kinetic response in case of a cyber-attack on their critical infrastructures (Gorman and Barnes 2011). Naturally, the military discourse falls back on wellknown concepts such as deterrence, which means that the concept of cyber-deterrence, including its limits, will remain a much discussed issue in the future. In theory, efective cyber-deterrence would require a wide-ranging scheme of ofensive and defensive cyber-capabilities supported by a robust international legal framework as well as the ability to attribute an attack to an attacker without any doubt. The design of defensive cyber-capabilities and the design of better legal tools are relatively uncontested. Many international organizations and international bodies have taken steps to raise awareness, establish international partnerships, and agree on common rules and practices. One key issue is the harmonization of law to facilitate the prosecution of perpetrators of cyber-crime. While there is wide agreement on what steps are necessary to tackle international cyber-crime, states are unwilling to completely forgo ofensive and aggressive use of cyberspace. Due to this, and increasingly so since the discovery of Stuxnet, eforts are underway to control the military use of computer exploitation through arms control or multilateral behavioural norms, agreements that might pertain to the development, distribution, and deployment of cyber-weapons, or to their use. However, traditional capability-based arms control will clearly not be of much use, mainly due to the impossibility of verifying limitations on the technical capabilities of actors, especially non-state ones. The avenues available for arms control in this arena are primarily information exchange and norm-building, whereas structural approaches and attempts to prohibit the means of cyber-war altogether or restricting their availability are largely impossible due to the ubiquity and dualuse nature of information technology. Key pOINTS • There are a variety of approaches and concepts to secure information and critical information infrastructures. The key concept is a risk management practice known as information assurance, which aims to protect the conidentiality, integrity, and availability of information and the systems and processes used for the storage, processing, and transmission of information. • Critical (information) infrastructure protection (C(I) IP) has become a key concept in the 1990s. Because a very large part of critical infrastructures are no longer in the hands of government, CIP practices mainly build on public–private partnerships. At the core of them lies information sharing between the private and the public sector. • Because the information infrastructure is persuasively insecure, risk management strategies are complemented by the concept of resilience. Resilience is about having systems rebound from shocks in an optimal way. The concept accepts that absolute security cannot be obtained and that minor or even major disturbances are bound to happen. • The military concepts of cyber-defence and cyberofence are militarized words for information assurance practices. Cyber-deterrence, on the other hand, is a concept that moves deterrence into the new domain of cyberspace. • If cyber-deterrence were to work, functioning ofensive and defensive cyber-capabilities, plus the fear of retaliation, both militarily and legally, would be needed. This would also include the ability to clearly attribute attacks. • Internationally, eforts are underway to further harmonize cyber-law. In addition, because future use of cyberspace for strategic military purposes remains one of the biggest fears in the debate, there are attempts to curtail the military use of computer exploitation through arms control or multilateral behavioural norms. 375 376 Myriam Dunn Cavelty The level of cyber-risk Diferent political, economic, and military conlicts clearly have had cyber(ed)-components for a number of years now. Furthermore, criminal and espionage activities with the help of computers happen every day. Cyber-incidents are causing minor and occasionally major inconveniences. These may be in the form of lost intellectual property or other proprietary data, maintenance and repair, lost revenue, and increased security costs. Beyond the direct impact, badly handled cyber-attacks have also damaged corporate (and government) reputations and have, theoretically at least, the potential to reduce public conidence in the security of Internet transactions and e-commerce if they become more frequent. However, in the entire history of computer networks, there have been only very few examples of attacks or other type of incidents that had the potential to rattle an entire nation or cause a global shock. There are even fewer examples of cyber-attacks that resulted in actual physical violence against persons or property (Stuxnet being the most prominent). The huge majority of cyber-incidents have caused inconveniences or minor losses rather than serious or longterm disruptions. They are risks that can be dealt with by individual entities using standard information security measures and their overall costs remain low in comparison to other risk categories like inancial risks. This fact tends to be disregarded in policy circles, because the level of cyber-fears is high and the military discourse has a strong mobilizing power. This has important political efects. A large part of the discourse evolves around ‘cyber-doom’ (worst-case) scenarios in the form of major, systemic, catastrophic incidents involving critical infrastructures caused by attacks. Since the potentially devastating efects of cyberattacks are so scary, the temptation to not only think about worst-case scenarios but also give them a lot of (often too much) weight despite their very low probability is high. There are additional reasons why the threat is overrated. First, as combating cyber-threats has become a highly politicized issue, oicial statements about the level of threat must also be seen in the context of different bureaucratic entities that compete against each other for resources and inluence. This is usually done by stating an urgent need for action (which they should take) and describing the overall threat as big and rising. Second, psychological research has shown that risk perception is highly dependent on intuition and emotions, as well as the perceptions of experts (Gregory and Mendelsohn 1993). Cyber-risks, especially in their more extreme form, it the risk proile of so-called ‘dread risks’, which appear uncontrollable, catastrophic, fatal, and unknown. There is a propensity to be disproportionally afraid of these risks despite their low probability, which translates into pressure for regulatory action of all sorts and a willingness to bear high costs of uncertain beneit. The danger of overly dramatizing the threat manifests itself in reactions that call for military retaliation (as happened in the Estonian case and in other instances) or other exceptional measures. Though the last section has shown that there are many diferent types of countermeasures in place, and that most of them are in fact not exceptional, this kind of threat rhetoric invokes enemy images even if there is no identiiable enemy, favours national solutions instead of international ones, and centres too strongly on national-security measures instead of economic and business solutions. Only computer attacks whose effects are suiciently destructive or disruptive need the attention of the traditional national security apparatus. Attacks that disrupt nonessential services, or that are mainly a costly nuisance, should not. Key pOINTS • • The majority of cyber-incidents so far have caused minor inconveniences and their cost remains low in comparison to other risk categories. Only very few attacks had the potential for grave consequences and even fewer actually had any impact on property. None have ever caused loss of life. Despite this, the feeling persists in policy circles that a largescale cyber attack is just around the corner. The potential for catastrophic cyber attacks against critical infrastructures, though very unlikely, remains the main concern and the main reason for seeing cyber-security as a national security issue. • The level of cyber-risk is overstated. Reasons are to be found in bureaucratic turf battles due to scarce resources and in the fact that cyber-risks are so called ‘dread risks’, of which human beings are disproportionally afraid. Overstating the risk comes with the danger of prioritising the wrong answers. Cyber-security Conclusion Despite the increasing attention cyber-security is getting in security politics and despite the possibility of a major, systemic, catastrophic incident involving critical infrastructures, computer network vulnerabilities are mainly a business and espionage problem. Depending on their (potential) severity, however, disruptive incidents in the future will continue to fuel the military discourse, and with it fears of strategic cyber-war. Certainly, thinking about (and planning for) worst-case scenarios is a legitimate task of the national security apparatus. However, they should not receive too much attention in favour of more plausible and more likely problems. In seeking a prudent policy, the diiculty for decision makers is to navigate the rocky shoals between hysterical doomsday scenarios and uninformed complacency. Threat-representation must remain well informed and well balanced not to allow overreactions with costs that are too high and beneits that are uncertain. For example, an ‘arms race’ in cyberspace, based on the fear of other states’ cybercapabilities, would most likely have hugely detrimental efects on the way humankind uses the Internet. Also, solving the attribution problem would come at a very high cost for privacy. Even though we must expect disturbances in the cyber-domain in the future we must not expect outright disasters. Some of the cyber-disturbances may well turn into crises, but a crisis can also be seen as a turning point rather than an end state where the aversion of disaster or catastrophe is always possible. If societies become more fault tolerant psychologically and more resilient overall, the likelihood for catastrophe in general and catastrophic system failure in particular can be substantially reduced. Cyber-security issues are also challenging for students and academics more generally. Experts of all sorts widely disagree how likely future cyber-doom scenarios are—and all of their claims are based on (educated) guesses. While there is at least proof and experience of cyber-crime, cyber-espionage or other lesser forms of cyber-incidents on a daily basis, cyber-incidents of bigger proportions (cyber-terror or cyber-war) exist solely in the form of stories or narratives. The way we imagine them inluences our judgement of their likelihood; and there are an ininite number of ways in how we could imagine them. Therefore, there is no way to study the ‘actual’ level of cyber-risk in any sound way because it only exists in and through the representations of various actors in the political domain. As a consequence, the focus of research necessarily shifts to contexts and conditions that determine the process by which key actors subjectively arrive at a shared understanding of how to conceptualize and ultimately respond to a security threat. QUeSTIONS 1. Who beneits in what ways from calling malware cyber-weapons? 2. What are the pros and cons of abolishing anonymity (and therefore partially solving the attribution problem) on the Internet in the name of security? 3. What side efects does the indiscriminate use of the terms cyber-terror and cyber-war have? 4. Are hacktivism activities a legitimate way to express political or economic grievances? 5. What are the limits of traditional arms control mechanisms applied to cyber-weapons? 6. Why does the intelligence community not have more information on the cyber-capabilities of other states? 7. What are the similarities and what the diferences between information security and national security? 8. Which aspects of cyber-security should be considered a part of national security, and which aspects should not? Why? 9. What might be the next referent object in the cyber-security discourse? 377 378 Myriam Dunn Cavelty FURTHeR ReADING • Arquilla, J. and Ronfeldt, D. F. (eds) (1997), In Athena’s Camp: Preparing for Conlict in the Information Age, Santa Monica: RAND. This is one of the key texts about information warfare. • Brown, K. A. (2006), Critical Path: A Brief History of Critical Infrastructure Protection in the United States, Arlington, VA: George Mason University Press. Provides a comprehensive overview of the evolution of critical infrastructure protection in the United States. • Deibert, R. and Rohozinski, R. (2010) ‘Risking Security: Policies and Paradoxes of Cyberspace Security’, International Political Sociology 4/1: 15–32. An intelligent account of the threat discourse that diferentiates between risks to cyberspace and risks through cyberspace. • Dunn Cavelty, M. (2008), Cyber-Security and Threat Politics: US Eforts to Secure the Information Age, London: Routledge. Examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda in the USA. • Libicki, M. (2009), Cyberdeterrence and Cyberwar, Santa Monica: RAND. Explores the speciic laws of cyberspace and uses the results to address the pros and cons of counterattack, the value of deterrence and vigilance, and other defensive actions in the face of deliberate cyber-attack. • National Research Council (2009), Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, Washington, DC: The National Academies Press. Focuses on the use of cyber-attack as an instrument of US policy and explores important characteristics of cyber-attack. • Sommer, P. and Sommer, I. (2011), Reducing Systemic Cybersecurity Risk, OECD Research Report, http://www. oecd.org/dataoecd/3/42/46894657.pdf. A down-to-earth report that concludes that it is extremely unlikely that cyber-attacks could create problems like those caused by a global pandemic or the recent inancial crisis, let alone an actual war. IMpORTANT WeBSITeS • http://cipp.gmu.edu George Mason University (GMU), Critical Infrastructure Protection (CIP) Program Website: The GMU CIP program is a valuable source of information for both US and international CIP-related issues and developments. • http://www.schneier.com Schneier on Security: Bruce Schneier is a refreshingly candid and lucid computer security critic and commentator. In his blog, he covers computer security issues of all sorts. • http://www.iwar.org.uk The Information Warfare Site: an online resource that aims to stimulate debate on a variety of issues involving information security, information operations, computer network operations, homeland security, and more. • http://www.infowar.com Infowar Site: A site dedicated to tracking open source stories relating to the full-spectrum of information warfare, information security, and critical infrastructure protection. Visit the Online Resource Centre that accompanies this book for lots of interesting additional material: www.oxfordtextbooks.co.uk/orc/collins3e/