Cyber Security Review

31 downloads 163012 Views 15MB Size Report
For example, governments in Latin America are concerned with the “criminal ...... early 2000s, when spammers clogged email inboxes ... enforcement officials targeted so-called bulletproof .... Tremendous-Threat-to-Police-Departments.html.
ISSN 2055-6950 (Print) ISSN 2055-6969 (Online)

Cyber Security Review Autumn 2016

STRATEGIC INSIGHTS: CYBER (IN)SECURITY, THE AMERICAS AND U.S. NATIONAL SECURITY STAYING IN THE GAME – EMPOWERING SOC PROFESSIONALS THROUGH A METHODOLOGY DRIVEN, TECHNOLOGICAL APPROACH TO INCIDENT ANALYSIS AND ATTRIBUTION WHO’S WATCHING YOU? CYBER INSIDER RISK MITIGATION MATURITY MATRIX THE RAPID EVOLUTION OF THE RANSOMWARE INDUSTRY ACCOUNT HACKS: THE USER OR THE COMPANY – WHO’S TO BLAME? LAZARUS: DATA LEAKAGE WITH PGP AND RESURRECTION OF THE REVOKED USER JUSTIFIED PHYSICAL RESPONSE TO CYBER ATTACKS

INCORPORATING

The UK’s Flagship Event for a Global End-User Security Audience • • • •

8000+ visitors from the public and private sector 250+ exhibitors showcasing the latest security solutions Live response demonstrations and technology workshops 6 CPD certified free to attend conferences GLOBAL COUNTER TERRORISM CONFERENCE

TRANSPORT SECURITY CONFERENCE

MAJOR EVENTS CONFERENCE

Cyber Security Highlights Include: • Cyber in the boardroom • Cyber securing the built environment • Mitigating the cyber risk to aviation • The cyber threat for business

CNI CONFERENCE

DESIGNING OUT TERRORISM CONFERENCE

PROTECTING CROWDED PLACES CONFERENCE

• Collaboration and information sharing for effective cybersecurity • Cyber securing the maritime environment • Why current approaches to managing cyber risk are not enough

Plus don’t miss the demonstration of cyber security systems In association with

DESIGN | SECURE | RESPOND FREE TO ATTEND REGISTER NOW www.uksecurityexpo.com/csr

EDITORIAL CONTRIBUTORS

Cyber Security Review

Published by Delta Business Media Limited 3rd floor, 207 Regent Street London W1B 3HH United Kingdom Tel: +44 (0) 20 7193 2303 Fax: +44 (0) 20 3014 7659 [email protected] www.deltabusinessmedia.com www.cybersecurity-review.com

ISSN 2055-6950 (Print) ISSN 2055-6969 (Online)

MEDIA PARTNERS

The opinions and views expressed in the editorial content in this publication are those of the authors alone and do not necessarily represent the views of any organisation with which they may be associated. Material in advertisements and promotional features may be considered to represent the views of the advertisers and promoters. The views and opinions expressed in this publication do not necessarily express the views of the publisher. While every care has been taken in the preparation of this edition, the publisher is not responsible for such opinions and views or for any inaccuracies in the articles. © 2016. The entire contents of this publication are protected by copyright. Full details are available from the publisher. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical photocopying, recording or otherwise, without the prior permission of the copyright owner. cybersecurity-review.com

3

CONTENTS

CONTENTS IFC UK SECURITY EXPO 2016 5

CDANS - CYBER DEFENCE & NETWORK SECURITY CONFERENCE

6

ISDEF 2017 – 8TH INTERNATIONAL DEFENCE & HLS EXPO

7

9TH INTERNATIONAL CYBERSECURITY FORUM

8

WORLD CYBERSECURITY CONGRESS 2017

9

STRATEGIC INSIGHTS: CYBER (IN)SECURITY, THE AMERICAS AND U.S. NATIONAL SECURITY

16

CYBER INTELLIGENCE ASIA 2017



By Dr. Jose de Arimateia da Cruz, Professor of International Relations/Comparative Politics at Armstrong State University

17 STAYING IN THE GAME – EMPOWERING SOC PROFESSIONALS THROUGH A METHODOLOGY DRIVEN, TECHNOLOGICAL APPROACH TO INCIDENT ANALYSIS AND ATTRIBUTION

By Aaron (Ronnie) Eilat, General Manager, Custodio Pte Ltd, IAI’s cyber early warning R&D Center in Singapore

20

COMEX EXHIBITION AND CONFERENCE 2017

21 WHO’S WATCHING YOU?

By Dominic Lyons, a Senior Technical Pre-Sales Network Architect at Tellemachus

26

CONNECT:ID 2017

27 CYBER INSIDER RISK MITIGATION MATURITY MATRIX

By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL

34

MILSIM ASIA 2017

35 THE RAPID EVOLUTION OF THE RANSOMWARE INDUSTRY

By Patrick Vibert, Senior Consultant, Cyber Threat Intelligence, Control Risks

41

INTERPOL WORLD 2017

4

CYBER SECURITY REVIEW, Autumn 2016

CYBER

Proudly presents

Pre-conference workshop: 24th January 2017 | Main Conference Dates: 25th – 26th January 2017 Prospero House, London, UK

Improving national resilience to cyber threats 150+ Attendees 20+ Senior Cyber Security Speakers 14+ Hours Reserved For Networking Insight from across government, law enforcement and military

The CDANS event was valuable as I was able to meet several key personnel that face the very same problems as I do, their experience is a great reach back. The topics were all interesting and valued the discussions Branch Chief, DoD

Register online at www.cdans.org Key Speakers for 2017 include:

Major General Jim Hockenhull DCI3 UK MoD

Don Davidson Deputy Director, CS Implementation & Acquisition Integration Chief, CS Lifecycle Risk Management DoD CIO’s Office

Sherill Nicely CISO CIA

Deborah Petterson Head of Energy Cyber Security, Department of Business Energy & Industrial Strategy

Philip Quade Chief of Cyber Task Force NSA

CONTENTS

42

EUROPEAN SMART GRID CYBER SECURITY 2017

43 ACCOUNT HACKS: THE USER OR THE COMPANY – WHO’S TO BLAME?

46

By Mike Milner, CTO and Co-founder, IMMUNIO

IDEF 2017 – 13TH INTERNATIONAL DEFENCE INDUSTRY FAIR

47 LAZARUS: DATA LEAKAGE WITH PGP AND RESURRECTION OF THE REVOKED USER

By Rodrigo Ruiz, CTI Renato Archer and Rogério Winter, Brazilian Army, Campinas, Brazil

54

ISDEF 2017 – 8TH INTERNATIONAL DEFENCE & HLS EXPO

55

JUSTIFIED PHYSICAL RESPONSE TO CYBER ATTACKS

67

BIDEC 2017 - BAHRAIN’S PREMIER INTERNATIONAL TRI-SERVICE DEFENCE SHOW



By Joseph W. Smotherman, Commander in the United States Navy

OBC ISRAEL AEROSPACE INDUSTRIES - IAI

THE RIGHT place THE RIGHT time THE RIGHT people JUNE 6-8

2017 TEL- AVIV

THE 8TH INTERNATIONAL DEFENSE & HLS EXPO

VISIT OUR WEBSITE

WWW.ISDEFEXPO.COM

6

CYBER SECURITY REVIEW, Autumn 2016

Contact us now for more details Exhibition & Sponsorship Opportunities: [email protected] General Information: [email protected] Tel. +972 3 691 4564 | Fax. +972 3 691 4567

w w w. f o r u m - f i c . c o m

5 500 visitors 250 exhibit partners 250+ high level speakers 30 workshops 20 conferences

The FIC 2016 seen by visitors “ An earnest event with real intellectual and technical exchanges ” “ A very specific approach to topics ” “ On the whole, an increasingly relevant trade show ”

15 keynotes

Free registration and Free access to conferences for professionals

3rd annual

7-8 March 2017 Business Design Centre, London

PROTECTION. DETECTION. RESPONSE. For the world’s critical infrastructure CISOs

Strategic Advisor: Sir Iain Lobban, Director of Government Communications Headquarters (GCHQ) UK 2008/2014

Charles Blauner, Global Head of Information Security, Citigroup

Uday Deshpande, CISO, Tata Motors

Muhittin Hasancioglu, Vice President Information Risk Management & RDS CISO, Shell

Dr Ian Levy, Technical Director of Cyber Security at GCHQ, and Technical Director of the new National Cyber Security Centre

Scott Borg, Director (CEO) and Chief Economist, US Cyber Consequences Unit

Jaya Baloo, CISO, KPN Telecom

Michele Hanson, CISO, Transport for London (TFL)

Rich Baich, CISO, Wells Fargo

Chris Inglis, Former Deputy Director, National Security Agency (NSA)

EXCLUSIVE CYBER SECURITY REVIEW MAGAZINE DISCOUNT: SAVE 10% BY ENTERING ‘DSFQ’ AT CHECKOUT

For the latest agenda and speaker line-up visit terrapinn.com/cyber-CSR

Created by

CYBER SECURITY - U.S. PERSPECTIVE

STRATEGIC INSIGHTS: CYBER (IN)SECURITY, THE AMERICAS AND U.S. NATIONAL SECURITY By Dr. Jose de Arimateia da Cruz

A

ccording to the Organization of American States (OAS) in its report on “Latin American and Caribbean Cyber Security Trends” released in June 2014, Latin America and the Caribbean have the fastest growing Internet population in the world with 147 million users in 2013 and growing each year.1  While having more users and more network connections are great advancements for traditional developing nations, they also represent a potential threat. Audrey Kurth Cronin points out that “insurgents and terrorist groups have effectively used the Internet to support their operations for at least a decade. The tools of the global information age have helped them with administrative tasks, coordination of operations, recruitment of potential members, and communications among adherents.”2  While much of the discussion regarding potential enemy attacks on U.S. cyber critical infrastructure mainly focuses on China,3 Russia,4  and Iran,5 the Americas have been largely ignored in the literature. Why are the Americas important? Why should we be discussing its place within the U.S. national security strategic goals? The Department of Defense (DoD) Cyber Strategy (2015) recognizes the nefarious effects cyber criminals pose to the welfare of nation-states. According to the DoD’s Cyber Strategy (2015), “criminal actors pose a considerable threat in cyberspace, particularly to financial institutions, and ideological groups often use hackers to further their political objectives. State and

non-state threats often also bend together, patriotic entities often act as cyber surrogates for states, and non-state entities can provide cover for state-based operators.”6  As the nations of Latin America join the globalized and interconnected world of the 21st century, they must do everything within their power to ensure that their sovereign territory does not become a safe haven for cyber criminals. As Nathaniel Bowler, a reporter with the Global News Matters Caribbean Research, has explained: “the failure to respond [to cybercrime], not just at a local but a regional level, is precisely what is turning the Caribbean/Latin American region into a hive for cyber criminality.”7 Jane Fraser, CEO of Citigroup Latin America, also states that over half the population in Latin America and the Caribbean is online, and that the rate of growth in Internet use is among the highest in the world.8  Particularly troubling regarding cybersecurity in the Americas is the fact that as more people join the information superhighway, the Americas still lack any cybersecurity strategies or critical infrastructure plans. Again, as Fraser points out, “cybercrime in Latin America and the Caribbean is estimated to be close to $90 billion a year. Yet 80 percent of the countries in the region do not have cybersecurity strategies or critical infrastructure plans. Sixty-six percent do not have the resources or expertise.”9  Cybercrime in the Americas not only undermines the democratic progress achieved thus far, but it could also harm cybersecurity-review.com

9

CYBER SECURITY - U.S. PERSPECTIVE

Map 1: Brazil and its Neighbors. economic growth. Jane Fraser notes that “combating cybercrime and strengthening cyber resilience are imperative to economic and social development and should be considered a critical cornerstone of domestic and foreign policy.”10 In the traditional view of political realism, the nationstate is the primary unit of analysis and a sovereign hegemon. However, in the cyberworld of the 21st century, the Internet is seen as the realization of the classic international relations theory of an anarchic, leaderless world.11  The cyberworld of the 21st century could be argued as the equivalent of a Hobbesian state of nature. Given that most countries in the Americas do not have cybersecurity strategies or critical infrastructure plans, the Americas could be used by terrorist organizations and transnational organized crime cartels to launch an attack on U.S. critical infrastructure. Former Chairman of the Joint Chiefs of Staff, Army General Martin E. Dempsey, stated that “the spread of digital technology has not been without consequences. It has also introduced new dangers to our security and our safety.”12 In the new wars of the 21st century, the use of cyberpower in conjunction with kinetic military 10 CYBER SECURITY REVIEW, Autumn 2016

power will be a force multiplier. The Internet has become an essential component of terrorists’ information operations (IOs) designed to achieve offensive strategic objectives, as future conflicts in the 21st century extend from the physical domain into cyberspace. In his “International Strategy for Cyberspace,” President Obama acknowledged that “cybersecurity threats can even endanger international peace and security more broadly, as traditional forms of conflict are extended into cyberspace.”13 In secret and without fear of retaliation, Jihadist groups and terrorist organizations are using the Internet as a tool to conduct cyberplanning – the digital coordination of an integrated plan stretching across geographical boundaries that may or may not result in bloodshed.”14  Within the realm of Latin America and the Caribbean, as the Internet becomes an integral part of the globalized international system, the two “monster countries” Brazil and Mexico cannot be ignored. In his book  Around the Cragged Hill: A Personal and Political Philosophy,the late George F. Kennan explains that a “monster country” is a country endowed with an enormous territory and population.15  The characterization of Brazil as a “monster country” places Brazil in the same category of nations such as China, Britain, the United States, and Japan. A monster country is endowed with the following characteristics: continental territorial dimensions and a population of more than 150 million people, a tradition of economic development, and a diverse foreign trade policy. Brazil, the sleeping giant of South America, occupies half of the continent and is the fifth most populous country in the world with an estimated population of about 205 million people. Eighty-four percent of the Brazilian population is heavily concentrated in urban centers, especially São Paulo and Rio de Janeiro. Approximately 22 million Brazilians were victims of cybercrimes in 2012, and that number continues to grow. This large number of cyber-victimization occurs despite advanced capabilities in cybersecurity and deterring cybercrime, with numerous state institutions and agencies playing active roles. Even with these attempts of combating traditional crimes

CYBER SECURITY - U.S. PERSPECTIVE

offense.18  Max G. Manwaring, the former General Douglas MacArthur Chair and emeritus professor of Military Strategy at the U.S. Army War College, argues that “gangs are half-political and half-criminal non-state actors that actually and potentially pose a dominant, complex emergency threat in a security environment in which failing states flourish.”19 Mexico is the second “monster country” in the Americas which, due to its ongoing gang related violence and drug trafficking, represents another major concern for U.S. national security in the Internet age. Mexico has an estimated population of approximately 122 million people, with 76 percent of its Map 2: The Tri-Border Region in Latin America is composed of the population living in urban centers, mainly cities of Ciudad del Este, Alto Paraná; Puerto Iguazú, Misiones; and Mexico City. Foz do Iguaçu, Paraná. The rising levels of hacktivism throughout the world are staggering, and Mexico has and cybercrime within the state, Brazil still expresses been ranked “as one of the world’s most vulnerable concern with criminalizing cyber offenses. The lack of countries to cyberattacks.”20  It saw an estimated a cohesive corresponding legal framework that would 40 percent21  increase and a staggering 113 percent address these various offenses inhibits the prosecution increase in the number of cybercrime incidents in 2012 of those who commit recognized cybercrimes. Another and 2013, respectively. Cartels, a longitme concern for major concern regarding Brazil is its geographical the Mexican government, have embraced the Internet proximity to the Tri-Border Area (TBA). to recruit new members, complete transactions, and According to Peter J. Meyer, there are no “known search for newer and more targets to exploit.22 operational cells of [al-Qaeda] or Hezbollah related Likewise, the proliferation and anonymity of the groups in the Western Hemisphere; however, the Internet fosters hacktivist recruitment for groups such United States remains concerned that proceeds as Anonymous and improves their ability to escape from legal and illegal goods flowing through the prosecution. Combined with perceived declines in TBA could potentially be diverted to support terrorist social and economic conditions, hacktivism is likely to groups.”16  For example, in December 2010, the U.S. increase. Specifically, situations such as the retaliatory Treasury Department sanctioned Hezbollah’s chief kidnapping of a hacker with the group Anonymous, representative in South America, Bilal Mohsen Wehbe, who threatened the Los Zetas cartel and their cohorts for transferring funds collected in Brazil to a Hezbollah with cybertactics, will be more likely. Prioritization group in Lebanon.17 The ability of potential enemies of of cyberthreats has yet to rise like the other national the United States to operate without impunity within security concerns that result from the environment the TBA could result in an attack against the U.S. along the U.S.-Mexico border, such as that of traditional homeland’s critical infrastructure. This is particularly cartel violence and corruption among Mexican law troubling since, despite known activities by potential enforcement officials.23 enemies, the Brazilian government has yet to adopt In the U.S., the DoD designated cyberspace as legislation to make terrorism financing an autonomous a new domain of warfare in 2011. This elevation in cybersecurity-review.com

11

CYBER SECURITY - U.S. PERSPECTIVE

Map 3: Central Intelligence Agency, Fact Book. Available at https://www.cia.gov/library/publications/resources/the-world-factbook/geos/mx.html.

strategic importance makes cyberspace comparable to land, sea, air, or outer space as a new battle frontier. The U.S. government and its armed forces recognize cyberspace as a potential future battleground. Former Defense Secretary Leon Panetta has publicly stated that “cyberspace is the new frontier, full of possibilities to advance security and prosperity in the 21st century.

Leavenworth, Kansas, defines “cyberplanning” as “the digital coordination of an integrated plan stretching across geographic boundaries that may or may not result in bloodshed.”26 Cyberwar in the “hacked world order”27  of the 21st century is much like Carl von Clausewitz’s view of war as “a true chameleon that slightly adapts

And yet, with these possibilities, also come new perils and new dangers.”24  Former Chairman of the Joint Chiefs of Staff Army General Martin E. Dempsey stated that “the Department of Defense is adding a new mission: defending the nation, when asked, from attacks of significant consequence – those that threaten life, limb, and the country’s core critical infrastructure.”25 For international jihadists, the Internet has become without a shadow of a doubt the most cost-effective means of delivering its messages worldwide, coordinating attacks and, most importantly, allowing jihadist organizations to recruit without leaving the confines of their safe havens. Jihadist groups and terrorist organizations are using the Internet as a tool to carry out their “cyberplanning” in secret and without fear of retaliation. Lieutenant Colonel Timothy L. Thomas, an analyst at the Foreign Military Studies Office in Fort

its characteristics to the given cases.”28  Given the problem of attribution and the ability of hackers or organized criminal organizations to route their attacks, Henry Kissinger argues in his book World Order, that “cyberspace challenges all historical experiences. . . The threats emerging from cyberspace are nebulous and undefined and may be difficult to attribute.”29 The Internet is becoming an integral part of the globalized international system, part of the “new wars . . . in which the difference between internal and external is blurred; they are both global and local and they are different both from classic inter-state wars and classic civil wars.”30  In the globalized world of the 21st century, nationstates and violent non-state actors (VNSAs) alike will make use of the power of technology to advance their activities without fear of retaliation, prosecution, or concern from geographical boundaries.31

12 CYBER SECURITY REVIEW, Autumn 2016

CYBER SECURITY - U.S. PERSPECTIVE

In Latin America, governments have become extremely concerned about the proliferation of the Internet as a force multiplier in the commission of a crime. For example, governments in Latin America are concerned with the “criminal practices of individuals and crime networks connected to cyberspace with the intention of making illicit economic gains. Common examples range from e-banking scams to drug trafficking and child pornography.”32  The prevalence of drug trafficking increases in relation to “the [Internet emerging] as a critical interface in the selling and purchasing of all manner of commodities, including both prescription and illicit narcotics . . . drug profits are often laundered through the Internet through the purchasing of goods and services and the transferring of cash.”33  In the new brave world of the 21st century, a “new criminality” is emerging in cyberspace. The world of “the Internet and related social media tools have not just empowered citizens to exercise their rights, but also enabled and extended the reach of gangs, cartels, and organized criminals.”34 Given the Hobbesian nature of cyberspace, what can the United States Government and its Army do to assist the nations of Latin America in their struggle against hacktivism and cyber criminals and therefore prevent a potential enemy from attacking U.S. critical infrastructure? First, the U.S. Department of Defense

EU), and the North Atlantic Treaty Organization (NATO)-Russia Council. This is an important step that should be taken by the U.S. Government and its cybersecurity agencies since the digital world routinely ignores national and international boundaries. Third, the U.S. Government should provide the developing world with technical and foreign aid assistance tied to the development of cyber investigation methods, cyber training, cyber policing, and law enforcement cooperation and assistance. The U.S. should assist the developing world as it joins cyberspace as a latecomer. Perhaps the U.S. Government should create a Cyber Marshall Plan for the developing world similar to the Marshall Plan created for Europe in the aftermath of World War II; when critical infrastructures were destroyed, the Marshall Plan helped in the reconstruction of Europe. The U.S. Government cannot afford to allow the developing world to become a conduit for cyber attacks against the homeland’s critical infrastructure. Fourth, the U.S. Government must continue to invest in its cyber workforce despite balanced budget disputes and sequestration. As Frank J. Cilluffo, Director of the George Washington University Homeland Security Policy Institute, and Sharon L. Cardash, Associate Director at the Homeland Security Policy Institute, have stated: “there is no substitute for a human source

and its cybersecurity organizations (U.S. Cyber Command, Army Cyber Command, Navy Cyber Forces, and Air Forces Cyber/24th Air Force) must do everything within their power to stop or at least mitigate the consequences of Distributed Denial of Service (DDoS) attacks against the homeland’s critical infrastructure. Second, the U.S. Government should shore up international support for the Budapest Convention on Cybercrime and other multilateral cybersecurity arrangements including, but not limited to: the International Telecommunications Union’s World Summit on the Information Society (WSIS) and the Global Cybersecurity Agenda (GCA), the Asia-Pacific Economic Cooperation (APEC), the European Network and Information Security Agency (ENISA), the Computer Emergency Response Pre-Configuration Team (CERT-

(HUMINT). Collecting and exploiting all-sources of intelligence is therefore the most robust way forward, even in the cyber realm.”35 Finally, the U.S. Government and its federal agencies must engage the private sector in a conversation regarding their shared responsibility and accountability for the exchange of information about cyber threats and cyber terrorism via the Internet. Former Chairman of the Joint Chiefs of Staff Army General Martin E. Dempsey publicly acknowledged that “sharing information about cyber threats is one of the most important ways to strengthen cybersecurity across the private sector, but threat information primarily is shared in only one direction: from the government to critical infrastructure operators.”36 In his book,  Brave New War: The Next Stage of Terrorism and the End of Globalization,  John Robb cybersecurity-review.com

13

CYBER SECURITY - U.S. PERSPECTIVE

argues that “we have entered the age of the faceless, agile enemy. From London to Madrid to Nigeria to Russia, stateless terrorist groups have emerged to score blow after blow against us.”37  Therefore, to ignore the Western Hemisphere could result in damaging consequences to the national security of the U.S., its allies, and national critical infrastructure. As Martin Van Creveld in his seminal book,  The Transformation of War: the most radical reinterpretation of armed conflict since Clausewitz, points out: “in the future, war will not be waged by armies but by groups whom we today call terrorists, guerrillas, bandits, and robbers, but who will undoubtedly hit on more formal titles to describe themselves.”38 ■

7. Nathaniel Bowler, “Cyber Crime and Critical Infrastructure in the Americas: Only as Strong as the Weakest Link,” Global News Matters, Caribbean News, entry posted May 6, 2014, available from  https://globalnewsmatters. com/caribbean-news/cyber-crime-critical-infrastructureamericas-strong-weakest-link/, accessed on October 1, 2015. 8. Jane Fraser, “Promote Americas-wide Collaboration on Cybersecurity,” Quarterly Americas, Vol. 10, Iss. 4, 2016, p. 90. 9.  Ibid., p. 92. 10.  Ibid. 11. Eric Schmidt and Jared Cohen,  The New Digital Age: Reshaping the Future of People, Nations and Business, New York: Alfred A. Knopf, 2013. 12. Claudette Roulo, American Forces Press Service, “DOD Must Stay Ahead of Cyber Threat, Dempsey Says,” DoD News, June 27, 2013, available from http://archive.

REFERENCES 1. Symantec and The Organization of American States et al., “Latin American and Caribbean Cybersecurity Trends,” Report, Washington, DC: Organization of American States Secretariat for Multidimensional Security, June 2014, available

from

http://www.symantec.com/content/en/

us/enterprise/other_resources/b-cyber-security-trendsreportlamc.pdf, accessed on October 1, 2015. 2. Audrey Kurth Cronin, “How Global Communications Are Changing the Character of War,”The Whitehead Journal of Diplomacy and International Relations, Winter-Spring 2013, Vol. 14, Iss. 1, pp. 25-39. 3. Igor Bernik,  Cybercrime and Cyberwarfare, New York: Wiley, 2014; Daniel Ventre, ed.,Chinese Cybersecurity and Defense, New York: Wiley, 2014. 4. Greg Austin, “Russia’s Cyber Power,” EastWest.ngo Commentary, October 26, 2014, available from  https:// www.eastwest.ngo/idea/russias-cyber-power.

defense.gov/news/newsarticle.aspx?id=120379. 13. Barack Obama,  International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World, Washington, DC: The White House, May 2011. 14. Timothy L. Thomas, “Al Qaeda and the Internet: The Danger of ‘Cyberplanning’,” Parameters, Vol. XXXIII, No. 1, Spring 2003, pp. 112–23, available from http:// strategicstudiesinstitute.army.mil/pubs/parameters/ Articles/03spring/thomas.pdf. 15. George F. Kennan, Around the Cragged Hill: A Personal and Political Philosophy, New York: W. W. Norton, 1993, p. 143. 16. Peter J. Meyer,  Congressional Research Service Report for Congress: Brazil: Political and Economic Situation and U.S. Relations, No. RL33456, Washington, DC: U.S. Library of Congress, Congressional Research Service, March 27, 2014. 17.  Ibid.

5. Lieutenant Colonel Eric K. Shafa, “Iran’s Emergence as

18.  Ibid.

a Cyber Power,” Of Interest Article, Strategic Studies

19. Max G. Manwaring,  Street Gangs: The New Urban

Institute, U.S. Army War College, August 20, 2014,

Insurgency, Carlisle, PA: Strategic Studies Institute, U.S.

available

http://www.strategicstudiesinstitute.

Army War College, March 2005, available from http://

army.mil/index.cfm/articles/Irans-emergence-as-cyber-

www.strategicstudiesinstitute.army.mil/pubs/display.

from

power/2014/08/20.

cfm?pubID=597.

6. U.S. Department of Defense (DoD), The DoD Cyber Strategy,

Washington,

DC:

U.S.

Department

of

Defense, April 2015, available from http://www.defense.

20. Rebecca

Conan,

“Defending

Mexico’s

Critical

Infrastructure Against Threats,”  The Report Company, July 22, 2013.

gov/Portals/1/features/2015/0415_cyber-strategy/

21. Trend Micro and The Organization of the American

Final_2015_DoD_CYBER_STRATEGY_for_web.pdf,

States,  Latin American and Caribbean Cybersecurity

accessed on October 1, 2015.

Trends and Government Responses, Washington, DC:

14 CYBER SECURITY REVIEW, Autumn 2016

CYBER SECURITY - U.S. PERSPECTIVE

Organization of the American States Secretariat for

Conflict in the 21st Century,”  The Whitehead Journal of

Multidimensional Security, May 2013, p. 7, available

Diplomacy and International Relations, Vol. 14, No. 1,

from

http://www.trendmicro.com/cloud-content/us/pdfs/

security-intelligence/white-papers/wp-latin-americanand-caribbean-cybersecurity-trends-and-governmentresponses.pdf. Opportunity and Threat,”  InfoSec Institute, entry posted 21,

2012,

http://archive.defense.gov/news/newsarticle.

aspx?id=120379 37. John Robb,  Brave New War: the next stage of terrorism

22. José Abreu, “Mexican Drug Cartels and Cyberspace: March

Winter-Spring 2013, p. 41-47. 36. Roulo.

available

from

http://resources.

infosecinstitute.com/mexican-cartels/; and Conan. 23. With corruption reaching even the federal levels, law enforcement has been monitoring and purging corrupted officers since 2005. See Ted Galen Carpenter, “Corruption, Drug Cartels, and the Mexican Police,” The National Interest, September 4, 2012, available from http://nationalinterest.org/commentary/corruption-drugcartels-the-mexican-police-7422. 24. U.S. DoD Press Operations, “Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City,” News Transcript,

and the end of globalization, New York: John Wiley & Sons, Incorporated, 2007, p. 3. 38. Martin Van Creveld, The Transformation of War: the most radical reinterpretation of armed conflict since Clausewitz, New York: The Free Press, 1991, p. 197.

DISCLAIMER The views expressed in this article are those of the author and do not necessarily reflect the official policy or position of the Department of the Army, the Department of Defense, or the U.S. Government. This article is cleared for public release; distribution is unlimited.

October 11, 2012, available from  http://archive.defense. gov/transcripts/transcript.aspx?transcriptid=5136. 25. Roulo.

http://archive.defense.gov/news/newsarticle.

aspx?id=120379 26. Thomas, pp. 112–23. http://strategicstudiesinstitute.army. mil/pubs/parameters/Articles/03spring/thomas.pdf 27. Adam Segal,  The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age, New York: Public Affairs, 2016. 28. Carl von Clausewitz,  On War, trans. by Michael Howard and Peter Paret, New York: Oxford University Press, 2008, p. 30. 29. Henry Kissinger, World Order, New York: Penguin Press, 2014, p. 344. 30. Mary Kaldor,  New and Old Wars: Organized Violence in a Global Era, 3rd ed., Redwood City, CA: Stanford University Press, 2012, p. vi. 31. Jose de Arimateia da Cruz and Taylor Alvarez, “Cybersecurity Initiatives in the Americas: Implications for U.S. National Security,” Marine Corps University Journal, Vol. 6, No. 2, Fall 2015, p.60. 32. Gustavo Diniz and Robert Muggah,  A Fine Balance: Mapping Cyber (In)Security in Latin America, Strategic Paper 2, Rio de Janeiro, Brazil: Igarapé Institute, June 2012, p. 15. 33.  Ibid. 34.  Ibid. 35. Frank J. Cilluffo and Sharon L. Cardash, “Cyber Domain

ABOUT THE AUTHOR Dr. Jose de Arimateia da Cruz is a Professor of International Relations/Comparative Politics at Armstrong State University, Savannah, GA, where he teaches both undergraduate and graduate courses in Latin American and African Foreign Policy, Third World National Security, and Insurgency/Counterinsurgency. He also is currently a Visiting Research Professor at the U.S. Army War College, Carlisle, PA. Dr. da Cruz has a visiting teaching appointment at the Center for Latin American Studies (CLAS) at the School of Economics in Prague, Czech Republic. He has served as visiting professor at the University of Stavanger, Norway, La Serena Universidad in La Serena, Chile. Dr. da Cruz holds a B.A. in Philosophy from Wright State University, Dayton, OH; an M.A. in Professional Communications and Leadership from Armstrong State University, Savannah, GA; a M.A. in political science/ political philosophy from Miami University, Oxford, OH; an M.S. in criminal justice with an emphasis in cyber affairs and security from Armstrong State University, and a Ph.D. in political science from Miami University, Oxford, OH. cybersecurity-review.com

15

Official Supporter:

CYBER INTELLIGENCE ASIA 2017 14th – 16th March 2017, Kuala Lumpur, Malaysia Esteemed Speaker Line-up: • • • • • • • • • • • •

Dr. Amirudin bin Abdul Wahab, CEO, CyberSecurity Malaysia Meng-Fen Hung, Director, Taiwan Computer Emergency Response Team/Coordination Center (TWCERT/CC) Budi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT) Dr. Zahri Yunos, COO, CyberSecurity Malaysia Phannarith Ou, Director, Department of ICT Security, Ministry of Posts and Telecommunications (MPTC), Cambodia Wasawat Chawalitthamrong, Head of Cybercrime Sector 1, Bureau of Technology and Cybercrime, Department of Special Investigations, Thailand Police Chief Inspector Allan Cabanlong, Chief, IT Office - Police Regional Office 1, Philippine National Police Force Dr. Mingu Jumaan, Director, Sabah State Computer Services Department, Malaysia Kitisak Jirawannakool, Information Security Specialist, E-Government Agency, Thailand Zhang Hong, Senior Engineer, Operation Department, China Computer Emergency Response Team/Coordination Centre (CNCERT/CC) Mohd Shamir Hashim, Senior Vice President, International & Government Engagement, CyberSecurity Malaysia Fazlan bin Abdullah, Head of Government Engagement, CyberSecurity Malaysia

Reasons to attend: Analyse the latest cyber security strategies across Asia-Pacific Review the cybercrimes being faced to government critical infrastructures Discuss the latest threats faced to governments such as DDoS, Malware, Ransomware and Trojan Horse attacks

Sponsors & Exhibitors

Understand the importance of sharing information between the public and private sectors View the latest cyber defence solutions available to the public sector Network with 150+ participants from across the region

For more information visit – www.intelligence-sec.com Book your place by: w: www.intelligence-sec.com I e: [email protected] I t: +44(0)1582 346706

CYBER SECURITY SKILLS DEVELOPMENT

STAYING IN THE GAME – EMPOWERING SOC PROFESSIONALS THROUGH A METHODOLOGY DRIVEN, TECHNOLOGICAL APPROACH TO INCIDENT ANALYSIS AND ATTRIBUTION By Aaron (Ronnie) Eilat, General Manager, Custodio Pte Ltd, IAI’s cyber early warning R&D Center in Singapore

W

ith increasing amounts of raw data to collect and analyse, a constant stream of false positive alerts, and a deluge of generic, seldom actionable, threat intelligence reports and feeds, cyber security incident response (IR) personnel and SOC (Security Operations Center) analysts are being overwhelmed. This leads to a constant demand for skilled and experienced cyber professionals. The skill shortage or “talent crunch” in the cyber security market has been extensively discussed and is a global phenomenon. The Intel Security 2016 report – “Hacking the Skills Shortage – a Study of the International Shortage in Cyber Security Skills”, reports that high value skills are in critically short supply, the most scarce being intrusion detection, secure

software development and attack mitigation. To be effective, an IR practitioner is required to orchestrate and constantly configure a widening array of cyber security tools and appliances. Analysts need to employ the correct methodologies to prioritise and extract the relevant data from the various available sources. Real world experience, not only theoretical knowledge, is crucial (the Intel Security report states, for example, that responders ranked hands-on experience and professional certifications as a better way of acquiring cybersecurity skills than a degree). This global shortage has direct implications on an organisation’s ability to effectively respond to and analyse complex and advanced attacks. According to 71% of respondents surveyed in the report, the cybersecurity-review.com

17

CYBER SECURITY SKILLS DEVELOPMENT

cybersecurity skills shortage causes direct and process and correlate the relevant data and provide a measurable damage. One in four respondents stated framework for an early warning cyber system, effective that insufficient cybersecurity staff expertise has incident analysis and different levels of attribution. damaged their organisation’s reputation and led A number of aspects need to be considered when directly to the loss of proprietary data through cyber- dealing with complex attacks such as an advanced attack. This is leading to an increased reliance on persistence threat (APT): external services and consultation, and in many cases, • Supporting long-term attack analysis - one cannot the acquisition of additional applications and tools that effectively log and analyse all the data generated generate ever more data and alerts, thus aggravating as part of a prolonged attack. the data overload. • Covert analysis - ideally, the attack analysis should However, the challenge involves more than simply be performed without disclosing to the attacker (as finding experienced cyber professionals. Due to the well as other entities) that the attack scenario has amount of available and often complex data as well been exposed. as sometimes lengthy cyber campaigns, it is readily • Independent analysis – in order to minimize apparent that enterprises and organisations ideally the exposure, it is best to limit the dependency should try to augment their on external outsourced SOCs with professionals forensic labs. ... A MORE REASONABLE APPROACH coming from additional backgrounds, e.g. big A solution of this type IS TO STRIVE FOR A METHODOLOGYdata analysts and expert should strive to offer a DRIVEN, TECHNOLOGICAL investigators. technical framework that It is therefore logical to FRAMEWORK AIMED AT EMPOWERING will effectively support all ask – should we give up three aspects noted above, SOC OPERATORS AND ANALYSTS IN and that will incorporate on the ability of enterprises and organisations to run THEIR WORK – NOT REPLACING THEM the methodology, best an independent SOC, practices and cyber ALTOGETHER … that is able to effectively “collective memory”, that detect, identify and mitigate has previously only been complex cyber-attacks? utilized by large security Considering that outsourcing may not always be the companies and laboratories. best solution, should we turn to technology to provide In order to achieve this goal, the focus should be a solution? Can a technological solution help mitigate on identifying and verifying the most effective data the problem, as opposed to adding more data and sources, the best way in which to analyse them information requiring analysis? (different analysis models) and how to correlate them In the Intel report, nearly nine out of 10 respondents into a useful, structured, contextualised and queryable stated that cybersecurity technology can help to data set. This will enable an organisation’s analysts compensate for skill shortages, however, is it realistic to determine what happened during an attack; it will to expect a magic black-box or silver bullet solution enable them to attribute the attack - beginning with the that will act as a cure-all in this context? It would seem actual incident mapping - to the attack characteristics that a more reasonable approach is to strive for a (Indications of Compromise, Indications of Attack as methodology-driven, technological framework aimed at well as the actual infrastructure used, i.e. operating empowering SOC operators and analysts in their work system, compiler, language, exploit kit, etc.) and even – not replacing them altogether. Taking this approach, perform attacker profiling, in some cases (from TTPs to ways can be found to correctly and effectively collect, possibly even actual identification). 18 CYBER SECURITY REVIEW, Autumn 2016

CYBER SECURITY SKILLS DEVELOPMENT

Custodio Pte. Ltd, Israel Aerospace Industry (IAI)’s cyber early warning research and development (R&D) center in Singapore, is heavily invested in researching these challenges and approaches and engaged in several R&D projects and cooperation in these fields. Custodio was established in 2014 as a Singaporean R&D center for spearheading R&D activities in the fields of cyber early warning systems, cybercrime prevention as well as forensics and investigation for law enforcement agencies. Focusing on active defence approaches, cyber geo-location, identity resolution and anomalous behaviour detection, Custodio engages in novel and innovative research, with the goal of developing technologies into fully-fledged customergrade solutions for marketing in Singapore and abroad. Custodio is a Singapore-registered company with a primarily Singaporean workforce, and the recipient of a grant through the Singapore Economic Development Board’s (EDB) Research Incentive Scheme for Companies (RISC). Custodio hosts a unique blend of computer experts, cyber researchers and engineers all of whom work toward meeting the challenges of this dynamic and increasingly complex domain. Custodio is currently engaged in several innovative R&D projects that aim to develop unique technologies and products. ■

ABOUT THE AUTHOR Adv. Aaron (Ronnie) Eilat is a General Manager at Custodio Pte Ltd - IAI’s cyber early warning R&D centre in Singapore. Israel Aerospace Industries Ltd. (IAI) is a world leader in the delivery of state-of-the-art ground, air, sea, space and cyber technologies and systems for defence, commercial, and homeland security applications. Drawing on over 60 years’ experience developing and supplying innovative, cutting-edge systems for customers around the world, IAI creates optimised solutions that respond to the unique security challenges facing each customer. IAI exports its products to over 90 countries and has over 30 subsidiaries worldwide. cybersecurity-review.com

19

NETWORK SECURITY

WHO’S WATCHING YOU? By Dominic Lyons, a Senior Technical Pre-Sales Network Architect at Tellemachus

I

NTRODUCTION

Over the last 10 years, we have witnessed massive changes in the embedded Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), DCS and Physical Security (CCTV, access controls and alarms) sectors, with the adoption of IP-capable technologies through the Internet of Things (IoT) and now the Internet of Everything (IoE). However, the mindset of the creators and users of many of these technologies has not always included a coherent focus on securing them against interior and exterior breach. While some of these technologies do contain security features, many are not as developed and robust as those found in the areas of IT and networking. Additionally, the business areas using these technologies are not always accustomed to

the high levels of risk associated with connecting these systems to the Internet, thereby neglecting the adoption and application of adequate and appropriate levels of IT/cyber security.

HIDDEN IN PLAIN SIGHT! There are many embedded technologies, such as ICS and physical security systems, utilized by many industries to protect and monitor their facilities, which have now been amalgamated into the IP and Internetconnected world. ICS, SCADA and DCS systems generally refer to industrial computer systems that monitor and control specific processes. This can cover devices that include everything from temperature and humidity controls through to full factory automation. cybersecurity-review.com

21

NETWORK SECURITY

Electronic security covers many differing technologies that come together to constitute a physical security system. These include CCTV cameras, Network Video Recorders (NVR), access control systems, Intrusion Detection Systems (IDS) and alarms. All of these devices and systems offer control of a plethora of risks, be it protection from issues that are environmental (e.g., flooding and extreme temperature), human (e.g., break-ins and vandalism) or mechanical (e.g., breakdowns and service monitoring). For these technologies to be effective, they utilize the standard implementation model found in the IoT. Each device contains: • Some form of sensor – for example, fire suppression systems will monitor for smoke and heat or a CCTV’s camera footage. • A control system, usually a bare-bones Operating System (OS) programmed with a basic front end and a set of programmed rules that are enacted when the sensor is tripped. • An Internet connection linking the device to a central control and monitoring system, allowing for transfer of information from the sensors, remote control or configuration. The latter two components of these technologies are invariably where the problems lie. The OSs found in a great many of these devices are cut-down versions of the Linux OS. This OS is used because it is cost-effective and the source code is highly configurable. Unfortunately, this inevitably imports some of Linux’s weaknesses, leading to the great number of exploits that have become common in these IoE devices. More importantly, Linux is one of the key OSs utilized by a large portion of the hacking community. This means that hackers do not need to get to grips with an entirely new OS to attack these IoE systems – they are rather merely variants on a theme they know very well, often making it easy to compromise these embedded devices. The second issue is the Internet connection and how it is utilized. With a well-understood and 22 CYBER SECURITY REVIEW, Autumn 2016

accessible OS, the embedded devices utilize an Internet connection for configuration and bidirectional information exchange. The issues lie with the protocol stack used and break down into two distinct parts: the protocols installed by default and how they are secured. According to a recent study conducted by Kaspersky Labs, “91.6 per cent of all the externally available ICS devices studied use weak (normally unencrypted) Internet connection protocols”. A great proportion of embedded devices utilize very common control protocols, such as: • Telnet • FTP • HTTP These three protocols have one thing in common – they are all insecure. Telnet transmits everything in plain text, from configuration information to passwords. So, regardless of how strong your password is, if the hacker utilizes a “man-in-the-middle” attack they have everything they need to easily gain access to your systems. File Transfer Protocol (FTP) is usually utilized by embedded devices as a vector for firmware and systems updates, but provides the hacker with another potential opportunity to acquire passwords as, once again, all the data and protocol codes are transferred in plain text, including passwords and usernames. Finally, Hypertext Transfer Protocol (HTTP), which is used by installers to configure the device, is also sent in plain text and is easy to exploit with any number of web-based attacks. Each of these protocols present significant risk to the organizations that use them – when combined with devices that are not commonly considered as potential avenues of attack for the corporate network, that risk can be increased dramatically. Demonstrating the extent of this problem, in June 2016, a US security company, Sucuri, identified a 25,000-strong botnet when it was investigating a cyberattack on one of its clients. This botnet mainly comprised IoE devices, such as CCTV cameras. Risks to corporate networks from this avenue of attack include all of the notorious IT security issues we have all come to know and loath.

NETWORK SECURITY

IoT zombie botnet attack on corporate networks.

Data Leakage/Corruption – Using these devices as a beachhead, the hacker can gain access to corporate data stores and alter/damage them, or, using the inbuilt FTP, send intellectual property (IP) data out of the network covertly. Malware – Theoretically, these devices could be used to inject viruses, worms or, the recent cybercriminal trend, ransomware directly into the system, causing significant network downtime and Denial of Service. Loss of Client Trust – Attacks of this kind will cause a company to enter the spotlight but not for the right reasons. Data loss, data corruption and stops and delays in services may directly affect how your client base trusts your organization. Unfortunately, in recent years, there have been many well-publicized incidents through which companies have discovered the detrimental effect of cyberattacks on their reputation and bottom line.

WHAT’S THE ANSWER? As with all IT systems, the answer to the question of security risk assessment and mitigation starts with standards derived from an Information Security Management System (ISMS). Risk assessment processes (such as ISO 27001) are an example of an ISMS that is an adaptable, regularly updated and

well-understood security policy that identifies risks and associated avenues of attack. The security policy should identify appropriate methods of mitigating the risks inherent to these systems. First – The protocols available on embedded systems are insecure, so many standard IT systems have been replaced with more robust versions. Telnet has been replaced with SSH, HTTP has been replaced with HTTPS, and FTP (in rare instances) has been replaced with FTPS or SCP. Therefore, companies should only purchase embedded technologies that utilize these secure protocols. If such protocols are unavailable, they should acquire a network design that mitigates this weakness with, for example, a thirdparty VPN solution. The big issue with this solution is cost and supply. Many of the IoE technologies on the market that have these secure protocols are very costly in comparison to their insecure counterparts. The bigger problem, however, is that there are few embedded devices that give the customer the secure option, as the secure protocols are often simply not available. In the highly likely event that there is no inbuilt security, additional security features should be added through third-party security tools, such as firewalls and VPN systems. The downside of this solution is the additional complexity and cost that many organizations and companies cybersecurity-review.com

23

NETWORK SECURITY

Tellemachus Cyber Risk Reduction Programme.

would wish to avoid, which are essential to mitigating the security weaknesses that are endemic to IoE technologies. Second – As with all IT systems, these devices contain vulnerabilities that can be exploited. The manufacturers are responsible for providing patches via firmware updates to mitigate these vulnerabilities, as well as providing improvements to the existing functionality. Companies’ security policies should encourage the installation of patches for all these devices but with a note of caution – risk assess the updates! Some firmware updates come with nasty surprises, such as protocols turned on that were not expected or protocols reconfigured with default passwords. Additionally, some form of confirmation system, such as hashing to prove the update has not 24 CYBER SECURITY REVIEW, Autumn 2016

been modified by a third party while in transit across the Internet or supply chain, should be implemented. Third – where possible, the physical security of the devices should be assessed. If an unauthorized party is able to gain physical access to the embedded equipment, they may be able to reconfigure it or install malware, spyware or adulterated versions of the core OS, rendering it a perfect vector by which to damage the network and attached systems. Fourth – As with every IT system, it is best to assume there is a risk that some agent will attack any weakness. To mitigate this risk, the security policy should stipulate that all technologies are monitored, not just for security but also for troubleshooting and forward planning. Such monitoring should include not only SNMP, Syslog and similar protocols, but also

NETWORK SECURITY

traffic monitoring run by third-generation firewalls. These newer systems are specifically designed to identify and halt the latest threats generated by modern malware, such as the ransomware pandemic that is currently running through the IT community. For ICS and SCADA systems, it is vital to ensure that all monitoring systems understand the specific protocols in use, as they differ from their standard IT counterparts. Fifth – No system is permanently secure! The IT security landscape is ever-changing, with new backdoors, exploits and techniques of attack generated every time a new piece of software or hardware is installed. To combat this, it is recommended that wellstructured and documented risk analysis take place to identify any means by which these new tools might impair system security. Determine what measures must be enacted to ensure that there is minimal risk of system compromise. Anything in any way linked to the corporate infrastructure could be used in a variety of ways to weaken the overall security posture of an organization, and must therefore be subjected to regular, systematic risk analysis. Sixth – As an optional step to further reduce risk, an organization can employ the services of a registered penetration testing team to run a simulated cyberattack against the company’s infrastructure and staff. This will show whether the organization’s security policies would hold up to a genuine cyberattack scenario.

CONCLUSION To protect all of your network assets, a coherent and cohesive security policy covering all IP-capable equipment and software must be implemented. All IoT/IoE equipment must be treated in the same way across the length and breadth of your LAN/WAN environment, the same as any other IT asset. Finally, under this policy, the well-designed, secured and segmented LAN and WAN environment, monitored by next generation firewalls and appropriate Intrusion Prevention Systems (IPS), will significantly reduce the risk that your company or organization will suffer from breaches and exploits. ■

ABOUT THE AUTHOR Dominic Lyons is a highly trained and experienced networking and security engineer/designer/ instructor, with more than 15 years of experience of Cisco networking equipment, Linux/Microsoft operating systems and VMware virtualization, amongst many others. Now a Senior Technical Pre-Sales Network Architect at Tellemachus.     cybersecurity-review.com

25

2017 Walter E. Washington Convention Center, Washington, DC, USA

Conference: May 1–3, 2017 · Exhibition: May 2–3, 2017

One global ID event 1250 identity professionals Countless opportunities

4th Edition

Exploring next-generation identity technologies and solutions Conference

Exhibition

■ Multi-track conference - an exploration of the challenges

■ 75+ industry leaders exhibiting the latest identity

and opportunities that arise from implementing advanced identity solutions, whether used in aviation, border control, healthcare, finance, or commerce.

■ NEW – Innovators’ Platform. Plus, in-depth, non-commercial presentations, case studies and discussions by expert speakers.

■ Conference discounts for early bookers, government and selected end users.

www.connectidexpo.com

technology, services and solutions.

■ No charge for visitor entry. ■ Network with 1250 international attendees from governments, industry, NGOs, and professional service providers.

■ Compare an impressive array of identity focused products and services all under one roof.

CYBER INSIDER RISK MITIGATION

CYBER INSIDER RISK MITIGATION MATURITY MATRIX By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL Cyber security is increasingly recognised to be a people issue as much as a technical one. Boards now understand that their own employees may be the weak link in an organisation’s cyber defences. This article provides a self-assessment matrix to help organisations understand how effectively they are mitigating cyber insider risk and thus enable them to embark on a programme of improvement.

INTRODUCTION Cyber Insiders – a Board Issue (Cyber Security Review, Summer 2014 edition1) attracted considerable interest. For many readers the distinctions between cyber insiders who could be “witting or unwitting” and “malicious or non-malicious” were novel. Many had previously been unsighted on CPNI’s excellent insider threat research2 and the evidence that indicated the existence of nine factors at organisational level that enable insider acts to take place. Most readers accepted that the proposed “10 Steps to Cyber Insider Protection” were a valuable approach to addressing the organisational level factors which enable insider acts to take place. In the two years since Cyber Insiders – a Board Issue was published there have been some developments. For example: • There have been eye catching examples of the scale of harm that cyber insiders can cause. • The improvements in network defences have led to malicious actors using increasingly sophisticated and targeted attempts to turn an organisation’s employees into unwitting insiders (e.g. through social engineering, spear phishing etc). • Boards have increasingly been held to account for the consequences of cyber-attacks, including those caused by insiders. This accountability will increase in the near future through regulation (including, for example, GDPR).

In short, the need for Boards to address cyber insider risk (CIR) is now well understood. What is less well understood is what to do about it. There is still a tendency to seek to outsource CIR or to regard it as chiefly as a technical problem with a need for some additional staff awareness training. This approach is likely to leave organisations vulnerable to CIR.

CYBER INSIDER RISK MATURITY (CIRM) MATRIX Although readers of Cyber Insiders – a Board Issue saw the value of the proposed “10 Steps to Cyber Insider Protection” approach, some frustration was expressed that more was not said about how to address these issues. Above all there was a sense that it was not possible to assess what “good” looked like in the context of CIRM. This CIRM Matrix is an attempt to close that gap. It is not intended to be a quantitative assessment tool and there is scope for it to be used in a variety of ways. For example a CISO could use it as a checklist of areas to cover, while researching for detailed evidence in order to assess CIRM against each of the 10 attributes. Alternatively a board could use it to support a more subjective Board discussion of CIRM. However it is used, it is likely to provide pointers to the areas which need addressing in order to enhance an organisation’s CIRM. cybersecurity-review.com

27

CYBER INSIDER RISK MITIGATION

Low: Initial measures and awareness

Medium Low: Developing measures

Medium: Competent, business enabling measures

Governance

Board commitment to CIRM, if it exists, is neither demonstrated nor visible. No Board awareness of CIRM processes or policies.

Board commitment to CIRM is neither demonstrated nor visible. Board members aware of CIRM processes or policies in their own business silos. Collective Board engagement in CIRM only in response to incidents.

A single Board level owner of all aspects of people risk in the organisation including CIRM. Visible Board commitment to CIRM and Board awareness of CIRM processes and policies.

Roles, responsibilities and resources

No corporate CIRM policy or programme. Any CIRM activities carried out are in uncoordinated business silos and resourcing is secondary to other business priorities.

Senior members of staff have responsibility for discreet areas of CIRM. CIRM policy exists but is not shared beyond those working in the security function. Overall, CIRM is inadequately resourced.

A corporate CIRM policy which is available to the whole business. A single CIRM programme with responsible senior managers coordinating their activities and reporting collectively to the Board level owner of the CIRM programme. CIRM adequately resourced.

Assets (see Note 1)

Critical assets which may be at risk from insider events may not have been identified.

Some corporate understanding of tangible, intangible and information assets but this may not be complete and/or up to date. Criticality may not have been established.

The organisation has a comprehensive understanding of its tangible, intangible and information assets which was up to date at the time of the last CIR assessment and which includes clarity on criticality.

Risk

No process for conducting a organisation-wide CIR assessment. CIR is not on corporate risk register.

There is an organisation-wide CIR assessment but it has been carried out on the business by those with security functions and without business engagement. CIR not on corporate risk register. CIRM almost exclusively a focus area for specialists and the responsibility of only a few personnel.

An organisation-wide CIR assessment, conducted with the full engagement of the business, has assessed the risk to critical assets from a full range of insider events including cyber insiders. High risk roles across the organisation have been identified accross the organisation. The most critical CIRs are elevated to the Board on the corporate risk register.

Culture

Board has not considered the organisation’s security culture. Staff concern for organisational security does not feature in the workplace.

Board has not considered corporate security culture and senior leadership are inconsistent in their approach to developing an effective security culture. Principles for CIRM may be documented but are not incorporated into business processes. Accountabilities relating to CIRM are not clear or communicated. No promotion or culture of reporting security breaches, and no support for staff in implementing good CIRM practices.

Board has clear understanding of existing corporate security culture and clarity about the desired security culture as part of CIRM. There is a culture change programme in place to achieve the latter. Values and aspirations for CIRM are clearly communicated and are consistently understood throughout the organisation. Staff are encouraged to report security breaches and are comfortable doing so. Security is understood to be the responsibility of all members of staff and this is supported by appropriate awareness training on induction and regularly thereafter.

28 CYBER SECURITY REVIEW, Autumn 2016

CYBER INSIDER RISK MITIGATION

Medium High: Effective, quantitatively managed programme

High: Excellent and fully optimised programme

A single Board-level owner of all aspects of people risk in the organisation including CIRM. Visible Board commitment to CIRM and the Board proactively engages with the CIRM programme including monitoring KPIs.

A single Board-level owner of all aspects of people risk including CIRM. Visible Board commitment to CIRM. Full Board awareness of CIRM processes and policies. CIRM embedded as an essential element of the proactive and holistic corporate approach to security and operational capability.

Corporate CIRM policy proactively communicated to the whole business. A single CIRM programme with responsible senior managers coordinating their activities and reporting collectively to the Board level owner of the CIRM programme. Managers at all levels fully engaged and understand their role in delivering the CIRM programme. CIRM fully resourced and managed in order to deliver value for money.

Corporate CIRM policy fully integrated with other business activities, proactively communicated to the whole business and regularly reviewed. CIRM programme fully coordinated across the business. Programme governance assures compliance across the business and effective delivery of KPIs. Managers at all levels fully engaged and understand their role in delivering the CIRM programme. CIRM programme fully resourced and managed to deliver value for money and reduced CIR.

The organisation has a comprehensive understanding of its tangible, intangible and information assets and keeps this understanding under regular review in order to proactively intiate CIR assessment for critical assets when necessary.

Board has comprehensive understanding of its tangible, intangible and information assets and keeps this understanding under regular review. Impact of cyber insider events on critical assets is costed and informs both the Board’s appetite for risk tolerance and value for money delivered by the CIRM programme.

An organisation-wide CIR assessment, conducted with the full engagement of the business, has assessed the risk to critical assets from a full range of insider events including cyber insiders. The most critical CIRs are elevated to the Board on the corporate risk register. Indicators of security performance are monitored and evidence is presented to the Board to inform strategic CIRM decision making.

CIRM firmly embedded in strategic risk management including explicit clarity of the Board’s attitude to CIR tolerance. Corporate CIR assessment formally reviewed at least once every 12 months and additionally when significant changes occur within the business that may impact the risk assessment. CIR considered to be a normal business risk and routinely taken into account by managers at all levels as part of normal business activity.

Board actively monitors the culture change programme in place to achieve the desired security culture as part of CIRM. Board and managers at all levels visibly demonstrate commitment to the desired security culture. Values and aspirations for CIRM are clearly communicated and are consistently understood throughout the organisation. Security is understood to be the responsibility of all members of staff and this is supported by appropriate awareness training on induction and regularly thereafter. Staff know what good security behaviours look like and challenge and/or report bad ones when they see them.

All personnel actively identify with and take responsibility for CIRM policies and practices. Compliance with security policies and procedures (including CIRM) is managed through positive incentives as well as through enforcement practices. CIRM is treated as a core competency. Transparency and accountability are the norm. Leaders work collectively and visibly to encourage innovative ways to continuously improve CIRM. All staff are comfortable identifying risks and opportunities for improvement and new insights are acted upon collaboratively. The Board leads these behaviours through their own example and engagement.

cybersecurity-review.com

29

CYBER INSIDER RISK MITIGATION

Impact

Board has never considered the potential impact that a cyber insider act could have on the organisation. Employees do not perceive cyber insider acts as having any consequences for them.

Board may be aware of the impact that a cyber insider incident might have on both the organisation and on the Board itself but this is not sufficient for them to give any prioity to CIRM. Employees may have been warned of the possible consequences to them of engaging in a cyber insider act but are aware that previous incidents have usually been ignored.

Board is aware of the impact (including operational, financial, reputational and legal) of a cyber insider incident and therefore takes CIRM seriously. Employees are aware of the potential consequences to the organisation of them of being involved in non-malicious and unwitting cyber insider acts and understand the importance of self-reporting. Employee awareness of consequences deters them from engaging in malicious cyber insider acts.

Response

Corporate business continuity plan (if it exists) concentrates exclusively on conse-quence management and has no focus on cyber insider incidents. No procedure for investigating workplace behaviour of concern or people related security incidents.

Corporate business continuity plan focuses exclusively on consequence management and has no focus on cyber insider incidents. Cyber insider incident response processes are informal, managed within teams and have limited central oversight. No procedure for investigating workplace behaviour of concern or peoplerelated cyber security incidents.

Corporate crisis planning includes specific arrangements for responding to actual or potential cyber insider incidents. Incident recording, response and escalation processes and responsibilities are well documented and followed. Senior managemers receive reports on security incidents, measures taken to remedy them, and any disciplinary action taken. Reporting on the most serious incidents escalated to Board level.

Transparency and awareness (see Note 2)

No reliable preemployment screening processes in place. HR carry out minimum checks to ensure compliance with employment legislation and HR staff given no relevant training to carry out their duties (eg document verification). No ongoing personnel security measures in place. No ongoing monitoring or assessment of employees by technical or other means.

HR checks by appropriately trained staff ensure compliance with employment legislation. Generic pre-employment screening policy and process for all employees. If pre-employment screening outsourced, no attempt is made to audit the third-party screening provider for compliance. If pre-employment screening is carried out in-house, screening staff may lack adequate training and experience. Employees may take up employment in advance of pre-employment screening checks. Poor levels of line manager training and awareness of CIRM procedures. Reporting and other assurance activities are informal and occur only as issues (e.g. breaches) arise. No holistic monitoring or assessment of staff security awareness or security behaviours is in place. IT monitoring and/ or audit (where it occurs) takes place within the IT security silo and insider events (eg IT policy breaches) are treated as IT events. Staff job objectives do not include reference to protective security. Assurance activity is ad hoc.

Corporate pre-employment screening policy meets all employment legislation requirements. Security screening proportionate, risk-assessed and rolebased. Trained staff conduct in-house pre-employment screening checks. Outsourced pre-employment screening standards contractually specified and subject to audit. Screening not repeated on change of role. Some employees may take up employment in advance of pre-employment screening checks. Security training embedded within business as usual including appropriate training during induction, on changing roles, on major changes to security policies, and on an annual basis. Effective exit procedures in place that include the revocation of electronic access and the retrieval of assets. Holistic monitoring and assessment of staff security awareness or security behaviours by technical and other means. Reporting lines and responsibilities are clear and there is regular management reporting.

Supply chain

The organisation gives no consideration to CIR in its supply chain.

Managers responsible for discrete aspects of CIRM have extended this to parts of the organisation’s supply chain for which they are responsible. This is achieved by standard wording in contracts and is not subjected to audit.

CIRM programme extends into the organisation’s upstream and downstream supply chains in a coordinated manner which prioritises protection of the most critical assets. Standard contract wording and/or mandating compliance with agreed standards is used. Audit carried out ad hoc or reactively in response to incidents.

Audit

CIRM is not audited.

CIRM measures only audited reactively in response to incidents.

CIRM programme may be audited (including reactively in response to incidents) but not as part of the regular audit schedule.

30 CYBER SECURITY REVIEW, Autumn 2016

CYBER INSIDER RISK MITIGATION

Board is fully aware of the impact that a cyber insider incident would have. This awareness drives its attention to CIRM KPI reporting. Employee awareness of the potential consequences to the organisation of non-malicious and unwitting cyber insider acts promotes self-reporting and discussion within teams of possible concerns. Employee awareness of consequences deters them from engaging in a malicious cyber insider acts.

The Board’s clear understanding of the potential impact of the full range cyber insider incidents informs its critical decision making on CIRM and risk tolerance. Employees are deterred from engaging in malicious cyber insider incidents because of the high probability of being identified and the certainty of serious employment consequences.

Comprehensive, holistic and consistent corporate approach to cyber insider incident management, and well defined hierarchy of escalation triggers. This response plan is well understood across the organisation and is exercised regularly. Security incidents are well reported and root cause analysis is performed to inform process improvements. There is a process in place for recording and reporting on incidents, trends, risks etc.

Ongoing research into measures for preventing and managing cyber insider incidents proactively informs business processes and systems. This research draws on both detailed “lessons learned” from the organisation’s own cyber insider incidents as well as awareness of cyber insider events in other organisations. All cyber insider incidents are managed in accordance with the organisation’s established response plans.

Corporate pre-employment screening meets all employment legislation requirements. Security screening proportionate, risk-assessed and rolebased. Trained staff conduct in-house pre-employment screening checks. Outsourced pre-employment screening standards contractually specified and audited. Screening repeated on change of role on a risk-assessed basis. Employees never employed in advance of full pre-employment screening. Ongoing security training embedded within business as usual. Access to assets controlled according to job role. Exit procedures include revocation of electronic access, retrieval of assets and exit interviews. Holistic monitoring and assessment of staff security awareness or security behaviours by technical and other means. Reporting lines and responsibilities are clear and there is regular management reporting. All staff enabled to report security concerns. Monitoring, assessment and reporting outputs feed into enhanced CIRM.

Comprehensive, corporate pre-employment screening policy and procedures effectively delivered by appropriately trained staff (in-house or third-party screening provider). Security check integration with recruitment process prevents prospective employees receiving unconditional job offer which they are unable to take up on security grounds. Proposals for reallocation of responsibilities include assessment of security clearance requirements. Screening repeated on change of role. Staff commitment to corporate security policies and values, including regular training and development. Access to assets controlled according to job role. Comprehensive exit procedures include enhanced monitoring in last 30 days. Appraisal process includes assessment against a security objective. Holistic monitoring and assessment of staff security awareness or security behaviours by technical and other means. Reporting lines and responsibilities are clear and there is regular management reporting. Staff enabled to report security concerns. Monitoring, assessment and reporting outputs inform enhanced CIRM.

CIRM programme extends comprehensively into upstream and downstream supply chains. Bespoke contractual arrangements ensure CIRM of critical assets. Compliance by suppliers is assured through regular audit.

CIRM programme extends into upstream and downstream supply chains. CIRM measures championed in supplier community. Bespoke contractual arrangements ensure CIRM of critical assets. Evidence of suppliers’ CIRM programmes form part of the competitive procurement process. Compliance by suppliers assured by regular audit.

CIRM programme is subjected to regular audit, reporting back to the Board.

CIRM programme regularly audited (at least annually). Emphasis on ensuring that risks and assets are regularly reviewed and are current and that the policies and procedures involved are functioning well and are compliant with legal and regulatory frameworks.

cybersecurity-review.com

31

CYBER INSIDER RISK MITIGATION

NOTES 1. Assets: Tangible assets include people, premises and locations, plant and equipment (including IT hardware), money and e-currency, and materials. Intangible assets include reputation, business volume and staff and public well-being. Information assets include intellectual property or intelligence, commercially sensitive business information, personal data, procedures, processes and software, and access data. In the case of information assets it is critically important to have a detailed understanding of where they are stored and processed (e.g. on servers, on devices and in the cloud). 2. Transparency and awareness: All CIRM measures and procedures should be enshrined in policies which are proportionate, compliant with legal and regulatory frameworks and are fully visible to and understood by employees. This row of the maturity matrix covers mainly pre-employment screening, ongoing personnel security measures and employee monitoring. Exemplar details only are provided in this row. For 32 CYBER SECURITY REVIEW, Autumn 2016

more detailed information, the CPNI good practice guidance on these subjects is recommended (see references). Neither the CPNI guidance nor this CIRM matrix specify particular technical monitoring tools or approaches (e.g. data loss prevention, end point monitoring, behavioural analytics, psycholinguistic analysis of email message content etc). It is for the organisation to decide which tools and approach best suit its needs. However the key point is that whatever tools are used they should add value to corporate CIRM and the outputs must be firmly integrated to the holistic approach rather than being operated in an isolated IT security silo.

INTERPRETATION Use of the maturity matrix should indicate an organisation’s overall ability to mitigate CIR. If the responses to the various attributes are widely scattered, the organisation will need to reflect on why this is. However, if the responses are predominantly in a single column, the following descriptors summarise the organisation’s CIRM maturity:

CYBER INSIDER RISK MITIGATION

Low: The processes or arrangements in place for CIRM are the minimum required for compliance and are given low priority. As a result the organisation is at high risk of operational, financial and reputational damage caused by cyber insiders for which the Board is accountable.

Medium Low: There are appropriate processes or arrangements in place for managing the business risk arising from cyber insider incidents but these are purely reactive. As a result the organisation is at moderate risk of operational, financial and reputational damage caused by cyber insiders for which the Board is accountable.

Medium: There is a consistent, defined, organisation-wide approach to CIRM which addresses a wide range of influencing factors but which is not properly integrated with other aspects of corporate risk. As a result the organisation is still at some risk of operational, financial and reputational damage caused by cyber insiders for which the Board is accountable.

Medium High: The organisation manages CIR proactively, actively monitors precursor indicators and fully engages staff in responsibility for security. As a result the organisation is at low risk of operational, financial and reputational damage caused by cyber insiders for which the Board is accountable.

High: CIRM is fully integrated into the organisation’s working practices and the organisation is committed to continuous improvement. As a result the organisation is at very low risk of operational, financial and reputational damage caused by cyber insiders for which the Board is accountable.

CONCLUSION However it is used, the CIRM Matrix should enable organisations to understand better their exposure to the harmful acts which their own employees may carry out, whether intentional or unintentional and malicious or non-malicious. This understanding should enable a programme of improvement in order to mitigate risk and thus protect the organisation. ■

REFERENCES

(1) CYBER INSIDERS – A BOARD ISSUE, Cyber Security Review, Summer 2014, Available at: https://issuu.com/ deltabusinessmedialimited/docs/cyber_security_review_ summer_2014/63?e=6269486/8102039 (Accessed 28 October 2016). (2) CPNI (2013) CPNI INSIDER DATA COLLECTION STUDY: REPORT OF MAIN FINDINGS, Available at: http://www. cpni.gov.uk/documents/publications/2013/2013003insider_data_collection_study.pdf?epslanguage=en-gb (Accessed: 28 October 2016). (3) PRE-EMPLOYMENT SCREENING, A GOOD PRACTICE GUIDE, EDITION 5: JANUARY 2015, Available at: http:// www.cpni.gov.uk/documents/publications/2015/preemployment%20screening%20edition%205%20-%20 final.pdf?epslanguage=en-gb (Accessed: 28 October 2016). (4) ONGOING PERSONNEL SECURITY, A GOOD PRACTICE GUIDE, EDITION 3: APRIL 2015, Available at: http:// www.cpni.gov.uk/documents/publications/2014/2014006ongoing-personal-security.pdf?epslanguage=en-gb (Accessed: 28 October 2016). (5) HOLISTIC MANAGEMENT OF EMPLOYEE RISK (HoMER), 2012, Available at: http://www.cpni.gov. uk/documents/publications/2012/2012021-homer. pdf?epslanguage=en-gb (Accessed: 28 October 2016).

ABOUT THE AUTHOR Chris Hurran, OBE, is Senior Associate Fellow of the Institute for Security and Resilience Studies at UCL, a Director of Cyber Security Challenge, a Member of the Register of Security Engineers and Specialists and an Honorary Fellow at Warwick University. As an independent consultant, Chris advises international companies and government organisations on how to mitigate the risk of harm caused by their own employees. cybersecurity-review.com

33

t y a om d a .c to sia er a st im gi ils Re .m w w

w

The only event for the Military Simulation, Training & Education community in Asia 2 days of leading content with keynote presentations from senior military personnel delivering perspectives from across the region A unique platform providing attendees the opportunity to discuss developments in this evolving market Over 400 attendees filling a busy exhibition showcasing the very latest innovations

Image credit www.defenceimagery.mod.uk

Find out more and register to attend on www.milsimasia.com Associate Partner

Silver Sponsor

Bronze Sponsor

Endorsed by

Organisers of

16-18 May 2017 Ahoy, Rotterdam

Organised by

RANSOMWARE

THE RAPID EVOLUTION OF THE RANSOMWARE INDUSTRY By Patrick Vibert, Senior Consultant, Cyber Threat Intelligence, Control Risks

T

he ransomware industry is exploding. For cybercriminals, it’s profitable, low-risk, and easily accessible. For CEOs, it’s a nightmare that conjures images of down networks, lost productivity, bad press and angry calls from board members. Every day there seems to be a story of a new ransomware victim or variant. Hardly a week goes by without hearing about a new attack from an affected client, or from someone in our personal lives who has become infected by this weapon of mass extortion. Ransomware is a type of malware that blocks a user’s access to their data or programs until a ransom payment is made to cybercriminals. Control Risks, Dell, Symantec, and Forcepoint all rank ransomware among their top cyber threats for 2016.1 2 3 4  In May, the US Computer Emergency Readiness Team

(US-CERT) and the Canadian Cyber Incident Response Centre (CIRCC) released a joint warning on the increasing danger of ransomware to businesses and individuals.5 Further, in Q1 of 2015 McAfee Labs saw a 165% increase in ransomware. Due to its prevalence and profitability, ransomware is becoming unavoidable. As the title of this piece indicates, ransomware is an industry. Like any industry, there are profits, customers, and competitors. As a result, ransomware operators seek to maximise their return on investment (ROI), successfully engage their customers, and win market share. This paper will examine the rise of the ransomware industry through a business lens. It will also provide mitigation strategies, summarise major developments and look at where the threat might be going. cybersecurity-review.com

35

RANSOMWARE

Figure 1.

BACKGROUND INFORMATION Devices become infected with ransomware when a user unknowingly visits an infected website, or opens a malicious email attachment. Payment is typically demanded in Bitcoin, with ransoms ranging from $300$500 for individuals and much higher for businesses and other organisations. There are two main types of ransomware: locking and encrypting. Locking ransomware simply blocks access to files and applications, while encrypting ransomware applies a cipher algorithm to scramble the data, making it unusable without the decryption key. Once a device is infected, a message appears instructing the user to make a payment for the release of their data. At this point, the panicked user enters the following painful decision-making process (see Figure 1). Sometimes a victim will have a data backup system, only to find that it hasn’t been updated in over a year or, worse, is also corrupted with ransomware. As a result, the key to mitigating this threat is to have current, secure backups that are updated regularly, but are not persistently attached to the network where they could become infected. 36 CYBER SECURITY REVIEW, Autumn 2016

Many of today’s ransomware operators are likely the same people behind the pharma spam epidemic of the early 2000s, when spammers clogged email inboxes with pharmaceutical offers.6  These (mostly former Soviet) cybercriminals were experts at spamming and social engineering, which are two important skills for the large phishing  campaigns that are critical to successful ransomware operations. To combat the pharma spam menace, law enforcement officials targeted so-called bulletproof hosting services, dodgy pharmaceutical suppliers and worldwide payment processing systems. But the rise of Bitcoin and Tor  makes that almost impossible. There is now no way to stop the flow of money, and it is very difficult to identify where illicit services are hosted to shut them down.

NOTABLE RANSOMWARE CASES In 2014, cybercriminals attempted to extort the city of Detroit for $800,000. City officials deemed the files non-critical and refused to pay.7 Police departments also appear to be attractive targets for ransomware operations, with police in Illinois, Maine, Massachusetts and Tennessee all

RANSOMWARE

falling victim over the last two years.8  In 2015, local police departments in Illinois and Massachusetts were forced to pay ransoms when their data was taken over by CryptoLocker and Cryptoware respectively (the police department in Massachusetts had assistance from the FBI, Department of Homeland Security, and two separate cyber security consulting companies).9  In both cases, the backups were corrupted as well.10 This year, a South Carolina school district paid $10,000 in Bitcoin to regain access to their servers after they were infected with ransomware.11 Meanwhile, an exemplary school district in New Jersey declined to pay their cyber extortionists after becoming infected with ransomware, as they were able to restore their servers from backups.12 These two cases illustrate the importance of maintaining secure, offline backups. Also this year, we have seen several high-profile ransomware attacks on medical centres.13 No loss of life was reported as a result of the attacks, but the targeting of such a critical industry resonated with the public. The stories were widely reported in the press, and politicians began speaking out against the attacks. However, as ransomware-as-a-service

(RaaS) increases, more people will be able to engage in ransomware operations and it is only a matter of time until serious real-world consequences occur from a ransomware infection.

THE RANSOMWARE INDUSTRY As Control Risks has pointed out in the past, the cybercrime sector evolves in a similar manner to legitimate industries. It is a business driven by economics; operators are profit-driven and face stiff competition. As such, we’ve seen cybercriminals diversify their operations, segment their target markets and improve their customer service to win more business. Payment is usually demanded in Bitcoin, which most people have never used. As a result, cyber extortionists provide explicit step-by-step instructions to guide victims through the process, with one operation even offering a live-chat option.14 Cyber extortionists tend to view their victims almost as customers, so the better customer service provided, the more likely their victims are to pay the ransoms. Ransomware operations are highly profitable. A 2015 report by IT security company Trustwave estimated a cybersecurity-review.com

37

RANSOMWARE

1,425% return on investment (ROI) for ransomware operations.15  With the average ransom demand hovering around $300-$500 it doesn’t take much to break even. Profitability relies on the number of people willing to pay ransoms, and pay they do – particularly in wealthier Western countries, where victims are far more likely to send criminals money to regain access

attacks will likely lead to an expanding selection of targets, as cybercriminals diversify their operations to increase their likelihood of success. As the ransomware market matures, it will likely continue to segment. Along with widespread ‘spray and pray’ attacks aimed at infecting as many devices as possible, we should see an increase

to their data. A recent survey by Romanian security company Bitdefender found 33% of German ransomware victims paid attackers to recover their data, compared with 44% in the UK and 50% in the US.16  McAfee puts the worldwide figure much lower, with about 7% of victims paying.17 The true rate of payment is probably somewhere in the middle, but in any case it’s easy to understand why ransomware operations are so attractive to cybercriminals. The rapid evolution of ransomware operations indicates an increasing level of innovation by cybercriminals keen to find new ways to profit from these attacks. To this end, the ransomware-as-aService (RaaS) market began to emerge in 2015, with multiple variants issued for sale in cybercriminal forums. The decreasing cost of deploying ransomware

in more focused attacks. To achieve this goal, attackers will need to research individual victims to identify vulnerable targets with higher potential ROI.

38 CYBER SECURITY REVIEW, Autumn 2016

RANSOMWARE-AS-A-SERVICE Although the frequency of attacks has exploded over the last three years, ransomware has been around for over a decade, mostly targeting developed nations where businesses and individuals are more likely to pay higher ransoms.  While targeting has changed and the level of sophistication has increased, the biggest recent development is the emergence of ransomware-asa-service (RaaS).  Sold on dark web cybercriminal forums, RaaS attacks are customisable, offering the capability to select targets and set ransom terms. This

RANSOMWARE

enables cybercriminals who do not have the requisite skills to develop their own ransomware operations tailored to their needs.

MITIGATION While ransomware attacks are increasing in sophistication that does not mean victims are powerless. This section describes steps that people and organisations can take to mitigate the threat, starting with securely backing up your critical data. If the data is not securely backed up, ransomware victims are generally given two choices: pay the ransom, or lose your data. However, there are rare cases where the ransomware’s encryption keys have been broken. In 2014, the encryption of the infamous Cryptolocker malware was broken by security researchers, who provided decryption keys to many relieved victims.18  More recently, the Petya ransomware, which encrypts a computer’s boot record (rendering the device useless), was broken by a security researcher who developed applications that could crack the malware password and retrieve the decryption keys.19 Still, assuming a solution will be available in the event of an infection is a very risky bet. Aside from not getting infected in the first place, your best course of action is to have your data securely backed up. In addition, companies are advised to use application whitelisting,  to update all software patches and antivirus definitions, and to restrict users’ network access and ability to install unwanted (potentially malicious) programs. These are the best methods to protect you against ransomware in its current state.

WHERE IS THE RANSOMWARE INDUSTRY HEADING? The ransomware industry has evolved rapidly over the last three years. The combination of high profitability, low risk and low barriers to entry will likely cause a growing number of players to enter the market. This will lead to increased competition among cyber extortionists for targets, and encourage cybercriminals to adapt their operations (improved customer service, harder-to-detect malware) and targeting (more

focused attacks asking for more money, expansion into new sectors). It’s also helpful to understand ransomware in the context of its enabling technologies. Just as YouTube’s explosive growth would not have been possible without the advent of widespread broadband internet, the rise of ransomware would arguably not be possible without Bitcoin making it difficult to trace the funds and Tor making it nearly impossible to identify the perpetrators. In terms of targeting, PCs were originally the primary victims of ransomware. Later, we started seeing infected phones and servers. In 2015, cyber extortionists started locking people out of websites by encrypting page files, images and directories until a ransom was paid.20  Projecting further into the future, the rapid expansion of the Internet of Things (IoT) could lead to cyber extortionists locking people out of their cars, homes or refrigerators. In addition, we should also begin to see cyber activists using ransomware operations to further political agendas. While much has been written about the cost to victims of ransomware attacks, understanding the cost to attackers is the key to addressing this threat. Although there have been a handful of high-profile arrests in the Netherlands, Spain, the UK and the US, cyber extortionists have so far been highly effective at eluding capture and prosecution.21,22,23 Due to the low-cost, high-reward and low-risk nature of establishing a successful ransomware scheme, the laws of economics dictate that criminals will increasingly engage in this activity, as profitable ransomware operations invite copycats. Finally, with the rise of RaaS, the barriers to entry into this market are lower than ever. New dimensions of the ransomware industry are discovered each week, and the situation continues to evolve rapidly. Recently, a new ransomware marketplace surfaced that helps facilitate Bitcoin payments between attackers and victims.24  Like any profitable market with low barriers to entry, the competitive ransomware industry is driving innovation.  As long as the trends outlined above persist, the ransomware industry will continue to be a major cyber security challenge. ■ cybersecurity-review.com

39

RANSOMWARE

REFERENCES 1. http://www.symantec.com/content/en/us/enterprise/

20. http://krebsonsecurity.com/2015/11/ransomware-now-

media/security_response/whitepapers/the-evolution-ofransomware.pdf

gunning-for-your-web-sites/ 21. http://www.kaspersky.com/about/news/virus/2015/

2.  https://www.forcepoint.com/content/2015-ws-threat-report

Collaboration-between-the-Dutch-police-and-Kaspersky-

3. https://powermore.dell.com/technology/top-5-security-

Lab-leads-to-the-arrest-of-suspects-behind-the-CoinVault-

threats-2016/ 4. https://www.controlrisks.com/webcasts/studio/2015-

ransomware-attacks 22. http://thehackernews.com/2013/02/group-behind-largest-

GENERAL/Riskmap-2016/RM-2016-report-PDFs/2015-1127-RM-REPORT-2016-LR.pdf

ransomware.html 23. https://threatpost.com/dutch-police-arrest-alleged-

5.  https://www.us-cert.gov/ncas/alerts/TA16-091A 6. Krebs, B. (2014). Spam nation: The inside story of

coinvault-ransomware-authors/114707/ 24. http://www.darkreading.com/endpoint/crowdsourcing-the-

organized cybercrime – from global epidemic to your front door. Naperville, Illinois: Sourcebooks.

dark-web-a-one-stop-ran$om-shop/a/d-id/1325265

 

7. h t t p : / / w w w. d e t r o i t n e w s .co m/sto ry/n e w s/p o l i ti cs/ michigan/2014/11/17/north-american-international-cybersummit/19162001/ 8. http://www.govtech.com/security/Ransomware-PosesTremendous-Threat-to-Police-Departments.html 9. http://www.networkworld.com/article/2906983/security0/ massachusetts-police-department-pays-500-cryptolockerransom.html 10. http://www.darkreading.com/attacks-breaches/police-payoff-ransomware-operators-again/d/d-id/1319918 11. http://money.cnn.com/2016/04/04/technology/ransomware-

ABOUT THE AUTHOR

cybercrime/ 12. http://www.networkworld.com/article/2901527/microsoftsubnet/crypto-ransomware-attack-hit-new-jersey-schooldistrict-locked-up-entire-network.html 13. http://arstechnica.com/security/2016/03/two-morehealthcare-networks-caught-up-in-outbreak-of-hospitalransomware/ 14. h t t p : / / w w w. w e b r o o t . c o m / b l o g / 2 0 1 6 / 0 2 / 1 8 / n e w ransomware-padcrypt-first-live-chat-support/ 15. https://www.trustwave.com/Resources/Trustwave-Blog/ What-You-Can-Learn-from-the-Ridiculous-Money-ThatCybercriminals-Make/ 16.  http://www.bitdefender.com/media/materials/white-papers/ en/Bitdefender_Ransomware_A_Victim_Perspective.pdf 17.  http://www.mcafee.com/us/resources/reports/rp-quarterlythreat-q1-2015.pdf 18. http://www.theregister.co.uk/2014/08/06/decryptolocker/ 19. https://threatpost.com/password-generator-tool-breakspetya-ransomware-encryption/117315/

40 CYBER SECURITY REVIEW, Autumn 2016

Patrick

Vibert

is

a

Senior

Consultant on Control Risks’ Cyber Threat Intelligence (CTI) team, serving the Americas. He has extensive experience providing cyber intelligence solutions to Global 500 companies in a variety of sectors. His responsibilities at Control Risks include conducting cyber threat research and analysis, and working closely with clients to help them understand and navigate their threat landscape. Previously, Patrick worked for a major U.S. defence contractor as a Senior Cyber Threat Intelligence Analyst. He holds a B.S. in Business Administration, an M.A. in International Relations, and has lived in eight different countries around the world. This unique background enables him to understand cyber threat risks from a truly global business perspective.

REGISTER BY 31ST JANUARY TO SAVE £100

SMi present their 7th annual conference on…

European Smart Grid

Cyber Security Holiday Inn Kensington Forum, London, UK

CONFERENCE: 21ST - 22ND WORKSHOP: 23RD

MAR 2017

Security aspects of Smart Grid: Enhancing control through technological breakthroughs and stakeholder engagement

CHAIR FOR 2017: • Dieter Sarrazyn, Consultant & Managing Partner, Toreon CVBA

EXPERT SPEAKER PANEL INCLUDES:

BENEFITS OF ATTENDING: • Hear case-studies from a range of European utility companies • Understand the important regulatory standards and how to make your company compliant • Learn about the newest technological developments in cyber security • Discuss how communication and human issues can be overcome • Analyse the latest smart metering programmes

• Graham Wright, Head of Global Digital Risk & Security and CISO, National Grid • Giovanni Coppola, Program Manager, Enel SpA • Michael John, Director of Consulting Services, European Network for Cyber Security (ENCS) • Henrik Christiansen, CISO, Energinet DK • Harm van den Brink, IT Architect, ElaadNL & Enexis • Gordon Hextall, Chair: Smart Metering Security Sub-Committee and Chair: SMKI PMA, Smart Energy Code Company (SECCo) • Chris Folk, Director, National Protection & Response Division, Homeland Security Center, MITRE • José Reynaldo Formigoni Filho, Senior Technology Development Manager for Information Security and Utilities, CPqD

PLUS AN INTERACTIVE HALF-DAY POST-CONFERENCE WORKSHOP • THURSDAY 23RD MARCH 2017

Setting up defence-in-depth Holiday Inn Kensington Forum, London, UK | 08.30am – 12.45pm Workshop Leaders: Dieter Sarrazyn, Consultant & Managing Partner, Toreon CVBA and Stephen Smith, Founder, ONRIX gcv

www.smartgridcybersecurity.co.uk/cybersecurityreview Register online or fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711

@utilitiesSMi #SMARTGRIDSMi

ACCOUNT TAKEOVER ATTACKS

ACCOUNT HACKS: THE USER OR THE COMPANY – WHO’S TO BLAME? By Mike Milner, CTO and Co-founder, IMMUNIO

W

hen people choose weak passwords and reuse those same passwords across a variety of websites, they bear some responsibility for the security breaches that impact them. Historically, this was where it stopped: if you got hacked, it was your fault. But as Account Takeover (ATO) attacks become more common and more damaging to companies and websites, organizations must consider sharing responsibility for their customers’ faulty passwords. This argument may sound counterintuitive: shouldn’t individuals bear the blame if their poor choices leave the door open to cyberattackers? Perhaps. Yet since the damage caused by negligent users ripples across the entire organization, it makes sense to improve web application security broadly, throughout the software development lifecycle – long

before end users set up their credentials. This is ultimately the best way to minimize the impact of ATO and credential stuffing attacks, while also building credibility with users.

STOLEN CREDENTIALS ARE BIG BUSINESS The security problem arising from stolen credentials is only getting worse. Not a week goes by without numerous disclosures of organizations impacted by such attacks, and the damage these attacks cause can linger for years. The 2013 Adobe breach – a single attack – resulted in more than 100 million username/ password combinations being leaked to the dark web, where they were easily accessible to criminals who could then use that information to break into other personal accounts. cybersecurity-review.com

43

ACCOUNT TAKEOVER ATTACKS

The massive data breach at Yahoo is another recent since ATO and credential stuffing attacks can easily security story stealing headlines. The implications of bypass the perimeter and target web applications this breach – widely reported to be the largest of its directly from within. kind – will be wide-ranging and complex. As the Yahoo Adding to this problem is the fact that protecting hack and many others like it prove, it’s still very difficult user accounts piecemeal is all but impossible when for companies to ensure the security of their websites, every application uses custom security measures. applications and customer data. Furthermore, there’s It quickly becomes a management nightmare to no doubt that security posture is emerging as a keep these security measures up to date, but failing major factor in corporate valuations. In Yahoo’s case, to do so means web applications become security most of the passwords were hashed with the secure liabilities. algorithm bcrypt, but, while some security questions were encrypted, others were not. This was a WHERE TO START IN SAFEGUARDING WEB textbook example of a cyberattack enabling massive APPLICATIONS credential stuffing/ATO breaches – which are now Fortunately, there are proactive steps organizations the single largest attack can take right away to vector for cybercriminals, minimize the risks to ... IT’S IMPORTANT TO ADD AN EXTRA their web applications. according to researchers at Verizon. secure LAYER OF SECURITY AND IMPLEMENT Encouraging One could argue that password practices is CAPABILITIES THAT DETECT organizations have become a good place to start. too good at shielding users DECEPTIVE LOGINS AND ENSURE THAT Companies should put from the impacts of such mechanisms in place to ORGANIZATIONS HAVE SECONDARY enforce a minimum level breaches. If a user knows that Facebook is really EMAIL ADDRESSES AND/OR PHONE of password security, good at protecting his or alerting users if their NUMBERS FOR ALL USERS IN THE her account, even though chosen passwords are that individual chose a EVENT THAT THEY MUST CONTACT too weak and prompting weak password, he or she them to choose ones that might be less motivated USERS TO VERIFY THEIR IDENTITIES... are harder for attackers to to pick a stronger one. guess. If a bank automatically It’s important to note refunds any fraudulent charges resulting from in this process that each organization will have a security breaches, it might make customers different level of tolerance for relative password lazier when it comes to being cautious weakness. If a particular web application deals with of hacks. sensitive financial information, protected health data Meanwhile, insecure web applications give or other highly valuable information, it’s wise to make attackers a relatively simple mechanism by which to two-factor authentication mandatory. steal user credentials, and commonly used security In addition, companies should develop a backup tools, such as Web Application Firewalls (WAFs), fall plan for instances when password authentication short as they require developers to comb through can’t be trusted. In some cases, users can acquire lines of code to locate a single vulnerability before another user’s credentials and gain fraudulent manually fixing the issue. Security tools like WAFs access. For this reason, it’s equally important to add were designed only to protect the perimeter of an an extra layer of security and implement capabilities application, which makes things particularly difficult that detect deceptive logins. Finally, ensuring that 44 CYBER SECURITY REVIEW, Autumn 2016

ACCOUNT TAKEOVER ATTACKS

organizations have secondary email addresses and/ or phone numbers for all users covers all their bases in the event that they must contact users to verify their identities. Unfortunately, web application security breaches are a fact of life in the modern world. Yet by focusing on comprehensive user security education and performing a web application vulnerability assessment to identify cross-site scripting, SQL injection, input validation issues and other vulnerabilities, organizations can lay the groundwork for more secure web applications. In addition to putting more processes in place, organizations can also look to technology solutions that can help protect their web applications from the inside. One of these technologies is Runtime Application Self-Protection (RASP), which is designed to identify ATO attacks in real time. Just as there’s no single point of entry to the corporate enterprise, there’s no single solution that addresses all threats to an organization’s information assets. Protecting the network perimeter is critical, but with hackers increasingly targeting the low-hanging fruit of web applications, securing applications is the key to guarding against attacks that can breach the perimeter. ■

ABOUT THE AUTHOR Mike Milner is a critical thinker and technical strategist with a measured approach to effective execution, Mike is the Co-founder and Chief Technology Officer of IMMUNIO. While he’s witnessed the breadth of opportunities technology and data intelligence have created for business and government, Mike’s focus has always been on their vulnerabilities. Between fighting cybercrime for the Canadian government and working for security agencies overseas, Mike has developed a deep understanding of the global security landscape and how the underground economy dictates hacks and ultimately drives breaches. This unique experience, paired with his robust technical prowess, helped Mike uncover what the next generation of security software should look like in IMMUNIO. Prior to founding IMMUNIO, Mike was a lead member of the technical staff at Salesforce.com, where he gained insight into the business side of web applications. He also served as a software engineer at Canonical, working on the world’s most popular free operating system, Ubuntu, following his time serving both the Canadian and UK governments. cybersecurity-review.com

45

DATA SECURITY

LAZARUS: DATA LEAKAGE WITH PGP AND RESURRECTION OF THE REVOKED USER By Rodrigo Ruiz, CTI Renato Archer, Campinas, Brazil and Rogério Winter, Brazilian Army, Campinas, Brazil The cybersecurity is the issue on the international agenda. The abuse of communication and faulty software is a common practice that brings the decade of 70. Invariably technology is the great protagonist of data leakage and loss of privacy. However, issues related to cybersecurity are founded on sociotechnical approach: technology, people, processes and environment, which interact indistinctly in a sensitive relationship. In this intricate sociotechnical environment of cybersecurity, this paper discloses a flaw in Symantec Encryption Desktop (SED), which can allow the leakage of sensitive information from governments, military and research centers around the world. In this context, as an example, the National Aeronautics and Space Administration (NASA) uses the Symantec Pretty Good Privacy (PGP) Encryption Desktop (SED). The Technology is not the main culprit for data leakage. Sometimes, the users are influenced by sophisticated marketing campaigns, which reaffirms the quality of products and services. In practice, this work is focused in the design errors and past vulnerabilities which are still present in recent technological solutions and allow data leakage and loss of privacy in a general way. Keywords: Data Leakage, Privacy, Data Loss, Drive Encryption, Encryption, PGP, Symantec, NASA.

I

NTRODUCTION

First of all, we would like to explain the name of our article “Lazarus: Data Leakage with PGP and Resurrection of the Revoked User”. We used the biblical metaphor Lazarus history, regarding his return from death after a miracle. By the same token, we can resurrect a user revoked by the system administrator – as a miracle. However, user revoking resurrection have not the same consequence joy, as Lazarus resurrection. Data leakage and Loss of Privacy are often used interchangeably to refer to a type of security breach that traditionally causes great financial losses and moral damages. The privacy issue and data loss in the digital world are sometimes controversial and difficult to solve because the cause is not so easy to detect. The

intricate environment of cyber security is contaminated by issues that go beyond technology, gathering a quaternary structure composed by processes, people, environment, and technology. The reliability of a security system is based on temporally human knowledge concepts which are renewed, ratified or rectified day to day. In this paper, we test Symantec Pretty Good Privacy (PGP) Symantec Encryption Desktop (SED) and identified a vulnerability which permit information leakage. In this way, it is possible to show that the SED does not protect as it should, research laboratories, governments, agency, industry, armed forces etc. The cybersecurity is a complex problem and technology is not always accountable. The guiding principles behind cybersecurity-review.com

47

DATA SECURITY

information security are summed up in the acronym CIA, standing for Confidentiality, Integrity and Availability. We want our information to be read by only the right people (confidentiality), only be changed by authorised people or processes (integrity) and, be available to read and use whenever we want (availability). Everybody needs to keep safety secrets, such as account password, state secrets, trade secrets, weapons project, aerospace projects, and new technologies. As a solution aiming keeping secrets – protection against cybercriminals, the user acquires cybersecurity solutions software & hardware, since any loss or leakage of information may cause serious damages such as reputation, financial losses etc. Cybercriminals have stolen passwords from internet users. . . A survey conducted by InsightExpress and Cisco (CISCO, 2008), pointed out what IT professionals perceive about companies’ data loss incidents and answer why we need to protect our secrets: • 70% of IT professionals believe the use of unauthorized programs resulted in as many as half of their companies’ data loss incidents. 44% of employees share work devices with others without supervision. • 39% of IT professionals said they have dealt with an employee accessing unauthorized parts of a company’s network or facility. • 46% of employees admitted to transferring files between work and personal computers when working from home. • 18% of employees share passwords with coworkers. That rate jumps to 25% in China, India, and Italy.

Under certain circumstances, this assurance can hide threats. Some faults are difficult to detect, such as enabling revoked users in cryptosystems. In this case, attackers can enable revoked users allowing them to have access to cryptosystem again. Research Institute are attacked by hackers due to the nature of his activity. “Investigators in the United States and Europe say they have spent almost a year pursuing the case involving attacks on computer systems serving the American military, NASA and research laboratories.” (The New York Times, 2005). Recent publications on failures in many cryptographic applications systems allow access to private data. According to Security Issue on Cloned TrueCrypt Containers and Backup Headers (Ruiz, Amatte, & Park, 2014) and (Winter & Ruiz, Corrosive Secrecy and Confidence: the Paradox Among Bypassing Cryptographic Software, Loss of Privacy and Information Security, 2016) it is noteworthy how failures can compromise information security and privacy of people. This paper is organized into the following sections: Introduction, Method, Attack Scenario, Results, and Discussion. In the introduction we contextualize the subject within the cybersecurity. In the Method section is shown in a didactic way the techniques used to explore the SED failure. In the Attack Scenario, we propose a plausible attack scenario due to the form of use indicated by Symantec. In the Results section, we present the results of operations of the SED and in the Discussion section we address some possibilities to fix the problem.

Surveys such as conducted by the DSS Company (Filatovs, 2014) are very common and normally highlight special product features. A Symantec report presents that 10% of employees lost company devices such as computers and flash drives, however, 32% did not report these losses. The above researches show the existence of an environment which is dark and uncertain. Moreover, manufacturers often exaggerate with promises ensuring highly efficient protection, perhaps beyond real security.

Basically, we need three things to guarantee a privacy and protect the secrets from people or organizations: cryptography algorithms, application software, and people attitude. a. Cryptographic algorithms – This is the strongest resource. The algorithms are based on mathematical proofs which guarantee the maturity and system consistency. We may consider an attacker aiming to break an algorithm, he must expend much effort. The PGP and the Advanced

48 CYBER SECURITY REVIEW, Autumn 2016

METHOD

DATA SECURITY

the SED (Symantec Corporation, 2015) was chosen in this research the following reasons: • The SED is based on PGP which is wellknown algorithm and it has a high reliability and security. • The Symantec developed SED as a user-friendly interface to a collaborative multi-user work. According to (CISCO, 2008), the humans are also responsible by exploration of software vulnerabilities. The SED facilitates collaborative work with security, but users need to follow a few security rules; • The SED creates a protected virtual encrypted drive as a simple logical drive f:\. However, the access control of this PGP drive is assured by means of the management of cryptographic keys.

Figure 1: SED file with user segment permit the replacement. It is possible to make the revoked user returns. Encryption Standard (AES) are good examples of cryptographic algorithms. b. Application Software – Cryptographic algorithms are used in conjunction with software application. Software application facilitates the usability, and allows deploy various algorithms. Examples of software application: Symantec Encryption Desktop (SED), Truecrypt, Veracrypt, Ciphershed, Microsoft Bitlocker, and Bitdefender Total Security 2015 File Encryption. c. People attitude – People need to guarantee principles behind information security, such as: confidentiality, integrity and availability. On the other hand, they must use secure methods to store the information and to reduce the number of people that know a particular information. Moreover, a security policy will determine the rules for people and which features allowed. An analysis of the items above – a, b, c – we consider that the major weaknesses may be found in application software and people attitude. A sociotechnical approach to cybersecurity seems more appropriate. Thus,

We highlight in this paper some software application and it is possible to note that all software share the same characteristic as SED. All tested application software use the same principle that is, the header section where it is stored user information and cryptographic keys. In this case, the software application allows the header to be manipulated to insert and revoke users. However, the vulnerability discovered on SED multi-user (Figure 1) permits full access in files even after PGP key was revoked by administrator user. The method used in this article was the manipulation of the virtual encrypted drive header. The same method was applied to the software applications, such as: TrueCrypt (Ruiz, Amatte, & Park, 2014) and Bitdefender Total Encryption 2015 (Winter & Ruiz, Luke 8:17 – Errors that Compromise the Privacy and Information Security, 2015). In the mentioned article, all cryptographic system use a header to open the encrypted data. Basically, the SED file has two sections: header section and a data section. The header section has serious problems because this enables mixing of different file versions and permit to gain access to new file version. As SED cybersecurity-review.com

49

DATA SECURITY

Figure 2: Process of file handling to create Frankensfile.pgd and information disclosure. FILE

USERS

DATA

PGPOrigin.pgd

user1, user2, user3

none

PGPcopy.pgd

user1, user2, user3

none

PGPsedWork1.pgd

user1, user2, user3

Secret text

PGPsedWork2.pgd

user1, user2

Secret text

Frankensfile.pgd

user1, user2, user3

Secret text

Table 1: Files, users and data type.

Figure 3: Perl script dexter.pl and bat script brokepgp.bat description. 50 CYBER SECURITY REVIEW, Autumn 2016

is a multi-user system it needs to save in the same file all users’ keys and encrypted data. In this point, we show how to replace of headers of different versions of SED file. The method used to exploit the vulnerability exists in SED follows operation sequence below. Schematically the method follows as Figure 2 and Table 1. d. Generate PGPOrigin.pgd file and create users (user1, user2 and user3); e. Make a copy of PGPOrigin.pgd into PGPcopy.pgd. f. Save the information inside the PGPsedWork1.pgd file. User1, user2 and user3 have access; g. Delete the user3 according SED user manual (Symantec, s.d.) from PGPsedWork1.pgd file. In theory, only user1 and user2 will have access to encrypted data. h. Make the Frankensfile.pgd file, which has the header section of PGPcopy. pgd and data section from PGPOrigin.pgd (Figure 2). Based on Figure 3, it is possible to reproduce the experiment using following file: Perl script dexter.pl and bat script brokepgp.bat. i. The script Perl dexter.pl is responsible for divide files in two equal parts: header and data. On the other hand, the bat script brokepgp.bat is responsible for making the junction of header PGPcopy.pgd with data PGPOrigin.pgd file. This scripts works in specific SED file conditions of size, file system and Encryption algorithm, but the principle is the same for all file configuration.

DATA SECURITY

months, the user Sarah is fired from ACME Company and your login is deleted from the SED file (PGPsedWork2). However, it should be emphasized that Sarah still has the SED file (PGPcopy. pgd) which it was back up on the first day of the project and she can access the information. The logins of other users (Tom Figure 4: MD5 hash PGPOrigin.pgd, PGPcopy.pgd and Frankensfile.pgd. and Peter) are changed. In this case, the security issues are in ATTACK SCENARIO compliance with the guidelines of the manufacturer, When starting an important project security because the Saha user credentials do not allow access administrators of the fictitious ACME Company to the SED file (PGPsedWork2). configured a SED (PGPorigin.pgd) for the following After his resignation, Sara is hired by a competing users involved with the project: Peter, Tom and company ACME which it has interests in the same Sarah. From then on, they can save on the security of area of ACME project. As mentioned above, the important project information within the SED file. cybersecurity has an engagement areas that extend On the first day of the project, Sarah back up the beyond technological issues of software solution. In SED file (PGPcopy.pgd) in a flash memory. the Cisco Report (CISCO, 2008), 39% of companies The three users (Peter, Tom and Sarah) working surveyed had problems with employees who had for months on the important ACME project saving the access to unauthorized parties network or other files within the SED (PGPsedWork1.pgd). After six service company. In addition, the same survey showed that 44% of employees share work devices with others without supervision. In this way, it is reasonable to imagine that the file from ACME Company can be obtained by an unauthorized person. In this case, the SED file (PGPsedWork2), in which Sarah user does not have access credentials, but based on the information in the section Method, Sarah again get access to SED file. Figure 5 Frankensfile can open PGP1 file secrets with user3 revoked in pgp1.pgd.

RESULTS After of the steps method (Figure 2), user3 gained to the encrypted file Figure 5: Frankensfile can open PGP1 file secrets with user3 revoked in pgp1.pgd. Frankensfile.pgd Remembering cybersecurity-review.com

51

DATA SECURITY

reported in this article is related a bug SED project, in the same way as in other systems mentioned above. As a proposal to resolve this failure would be an encryption operation of the SED data file, when the user is deleted. In this way, it is possible to prevent the Header manipulation, as shown in the section Method. The cybersecurity is based on people, technology, Figure 6: NASA screenshot with instructions about use PGP file encryption. process and environment and the SED is basically a system that the user3 had their rights revoked earlier. The that is subject to interference from 4 dimensions. delete operation represented the resignation or Denning (E. Denning, 1987) observes that the major termination of an employee from a project. In this case, part of existing systems have vulnerabilities which make a former employee (user3) who not had access to them susceptible to attacks, invasions and other kinds PGPsedWork2.pgd file now can read the encrypted of abuse; moreover, the maintenance to avoid all such information (Frankenstyle.pgd) with a simple file deficiencies is not viable technically nor economically. operation mixing. After we discover this vulnerability, the Symantec Company was notified by protocol SSG15-044. DISCUSSION In addition, we have identified that the National The cybersecurity is often weakened by beliefs, Aeronautics and Space Administration (NASA, 2012) marketing advertisements or human behaviour. uses the encryption system of Symantec PGP (Figure According to the article published in the CIO Magazine 6). Immediately, the NASA was informed by email about (Corbin, 2016), mentions that compliance is not the only way to ensure the security of systems. Today’s attacks are extremely sophisticated and exploit the weak protection systems, which was designed for more than a decade. The goal of software testing is highlighted defects if they exist. However, the results can be subject to modification, which depends on the method and the way that tests are performed. According to Forbes (Greenberg, 2010), Symantec paid $300 Million for PGP technology. Since then, Symantec has been using the algorithm in their security products. The fame of PGP has been used to give a reliability of cryptographic systems. However, as described above it is possible to access the contents of the files encrypted with PGP, regardless of the date of creation. We discovered the flaw in the SED, it is a flaw in the application software that uses PGP to encrypt the files. Probably the failure 52 CYBER SECURITY REVIEW, Autumn 2016

this vulnerability.

CONCLUSION In this article our main goal is to alert scientists, governments and businesses around the world, just as we have done for Symantec and NASA on the risks of this type of security breach. According to TechNavio (Ellacott, 2014), the Symantec Company appears as a world leader in cybersecurity market and certainly the systems are used in thousands of government agencies, businesses and military. Although Symantec video (Symantec Corporation, 2014) share the SED security premises, unfortunately we need to review the practice of information security. People, Companies and Research Labs around the world are feeling Figure 6 NASA screenshot with instructions about use PGP file encryption. more secure

DATA SECURITY

when deploy cryptographic software to protect their information. The cybersecurity is more complex than the simple use of a cryptographic software. Scientists, governments and public institutions are living with a false sense of security using a vulnerable systems. It is recommended that vendor require the SED to redo encryption whenever a user is deleted. This simple measure would prevent parts of an old file was used as a key to opening new files. ■

REFERENCES

[1] CISCO. (2008). Data Leakage Worldwide: Common Risks and Mistakes Employees Make. Available at: Data Loss Prevention: http://www.cisco.com/c/en/us/solutions/ collateral/enterprise-networks/data-loss-prevention/white paper c11-499060.html (Retrieved: February 24, 2014). [2] Corbin, K. (2016). Cybersecurity much more than a compliance exercise. Available at CIO: http://www. cio.com/article/3025452/cyber-attacksespionage/ cybersecurity-much-more-than-a-compliance-exercise. html (Retrieved February 24). [3] Denning, D. E. (1987). “An Intrusion-Detection Model,” in IEEE (Ed.) IEEE Transactions on Software Engineering – Special Issue on Computer, Vol. 13, (Piscataway, NJ, USA: IEEE Press), 222–232.doi:10.1109/TSE.1987.232894 [4] Ellacott, J. (2014). Leading Email Encryption Vendors Respond to Heartbleed Bug Threat. (Infiniti Research Limited). Available at: TechNavio: http://www.technavio. com/report/global-email-encryptionmarket-2014-2018 (Retrieved February 22, 2015). [5] Filatovs, A. (2014). Data Security Solutions. Available at: Slide Share: http://pt.slideshare.net/AndSor/dsssymantec-pgp-encryption-fortress-2014-arrowecsroadshow-baltics (Retrieved February 25, 2015). [6] Greenberg, A. (2010). Symantec Acquires Encryption Provider PGP For $300 Million. (Forbes) Retrieved February 24, 2015, from Forbes Magazine: http://www. forbes.com/sites/firewall/2010/04/29/symantecacquiresencryption-provider-pgp-for-300-million/ [7] NASA. (2012). NASA Data At Rest (DAR) Symantec Pretty Good Privacy (PGP) Desktop Encryption. (NASA). Available at: NASA SHARED SERVICESCENTER:https:// answers.nssc.nasa.gov/app/answers/detail/aid/6235/∼/ nasa-data-at-rest-%28dar%29-symantec-pretty-goodprivacy-%28pgp%29-desktop-encryption (Retrieved April 24, 2015). [8] Ruiz, R., Amatte, F. P., and Park, K. J. (2014). Security Issue on Cloned TrueCrypt Containers and Backup Headers. Kuala Lumpur, Malaysia: SDIWC. Available at: https://www.researchgate.net/publication/271498536 [9] Symantec Corporation. (2014). Symantec Endpoint Encryption – Protect Your Data. (Google Inc.) Available at: You Tube: https://www.youtube.com/ watch?v=NtGSX3pYkLQ (Retrieved February 24, 2015).

[10] Symantec Corporation. (2015). How Endpoint Encryption Works. Available at: from Symantec Enterprise: http:// www.symantec.com/content/en/us/enterprise/white papers/how-endpoint-encryption-works WP 21275920.pdf (Retrieved February 24, 2015). [11] The New York Times. (2005). Nytimes. Available at: http:// www.nytimes.com/2005/05/10/technology/internet-attackcalled-broad-and-long-lasting-by-investigators.html? r=0 (Retrieved 01 05, 2016). [12] Winter, R., and Ruiz, R. (2015). Luke 8:17 – Errors that Compromise the Privacy and Information Security. Def. camp. Bucharest. [13] Winter, R., and Ruiz, R. (2016). Corrosive secrecy and confidence: the paradox among bypassing cryptographic software, loss of privacy and information security. Cyber Security Review. 66–74.

ABOUT THE AUTHORS Rordrigo Ruiz is researcher of CTI – Information Technology Center – Renato Archer, Campinas, Brazil, also he is a member of the SDIWC (The Society of Digital Information and Wireless Communications) have some papers about privacy and he is co-author of Apoc@lypse: The End of Antivirus and he is author of papers about privacy and security. https://www.researchgate.net/profile/Rodrigo Ruiz3 Rogerio Winter is colonel at the Brazilian Army with more than 25 years of experience in military operations and cybersecurity. He is master degree in Electronic Engineering and Computation by Aeronautics Technological InstituteITA, also he is a member of the SDIWC (The Society of Digital Information and Wireless Communications) and at present, one dedicates to the warfare issues, cybernetics, command and control, and decision-making process and he is co-author of Apoc@ lypse: The End of Antivirus.

Acknowledgement

This article also appeared in the Journal of Cyber Security, Vol. 5 2, 1–14. doi: 10.13052/jcsm22451439.521

cybersecurity-review.com

53

THE RIGHT place THE RIGHT time THE RIGHT people

THE 8TH INTERNATIONAL DEFENSE & HLS EXPO

JUNE 6-8

2017 TEL- AVIV

Military

Police

Special Forces

Homeland Security

VISIT OUR WEBSITE

Counter - Terrorism

For details on exhibition space & sponsorship opportunities contact: [email protected] For general information on ISDEF 2017 contact: [email protected] T. +972-3-691-4564 | F. +972-3-691-4567

WWW.ISDEFEXPO.COM

RESPONSE TO CYBER ATTACKS

JUSTIFIED PHYSICAL RESPONSE TO CYBER ATTACKS By Joseph W. Smotherman If attacks in cyberspace are assaults of one state against another, then the framework of Just War theory should still apply. Michael Walzer’s Legalist Paradigm provides a rationale for determining the circumstances under which an armed response to a cyber-attack is morally permissible. While some parts of Just War theory directly apply to responses to Cyber Attacks, the others do not. Walzer describes Just Cause in terms of the natural rights of the citizens of a state. When a cyber-attack interrupts the ability of those citizens to make a life together or the “safe space” they create, then a physical response to a cyber-attack could be justified. This essay examines the relationship between Walzer’s Legalist Paradigm and justifications for physical response to cyber-attacks. Keywords: Cyberspace Operations, Just War Theory, Just Cause

A

s the character of warfare evolves, new technology continues to push the limits of acceptability. The consequences of warfare in the cyber world do not fit neatly into society’s paradigm of right versus wrong and what is just. Despite the old adage, not all is fair in war. In the rapidly developing world of cyberspace, each action will push the boundaries of propriety. Questions that previously had easy answers are no longer black and white: When Saddam Hussein’s Iraqi Army pushed across the border of Kuwait on August 2, 1990, there was no doubt that his aggression was a cause for war, but today, if one country were to

use attacks in cyberspace to cripple the infrastructure of another, the decision to retaliate is not so clear. All states should reserve the right to respond to a cyberattack with force as a deterrent, and the United States has stated that it will consider physical responses to cyber-attacks. Deputy Defense Secretary William Lynn said “The United States reserves the right, under the laws of armed conflict, to respond to serious cyberattacks with a proportional and justified military response at the time and place of its choosing.”1 If a nation (not just the United States) must decide when to respond to a cyber-attack with physical force, then cybersecurity-review.com

55

RESPONSE TO CYBER ATTACKS

an appropriate framework must be established for war”).4 Because of the futuristic aspect of “cyberwar,” recognizing cyber-attacks as armed attacks. If cyber- it becomes a phrase that is used in parlor discussions attacks are assaults by one state on another then the without specificity and is often shortened to just Just War framework should still apply, and as a more “cyber.”5 For the sake of clarity, all definitions employed contemporary conception of Just War, Michael Walzer’s herein are adapted from Department of Defense Joint basic premise of the Legalist Paradigm provides a Publications. The first and most basic definition is clearer lens for determining when an armed response that of cyberspace. Cyberspace is “A global domain is morally permissible. In terms of political sovereignty within the information environment consisting of the and territorial integrity, cyber-attacks can be a form of interdependent networks of information technology aggression and, therefore, just cause for war. infrastructures and resident data, including the Attacks using cyber warfare have been examined Internet, telecommunications networks, computer from the perspective of the Law of Armed Conflict, systems, and embedded processors and controllers. and legal guidelines have been established. In spite [Emphasis added]”6 The highlight of this definition is of this, when a cyber-attack occurs, the leadership of that cyberspace is a domain: “a sphere of knowledge, the victimized country must decide when a physical influence, or activity.”7 Cyberspace becomes a location, response is justified.2 This article explores when that albeit virtual, on par with the maritime, land, air, and is the case. The first section describes the cyber space domains. Operations conducted in cyberspace domain and makes the distinction between operations are “employment of cyberspace capabilities where in the cyber domain and the primary purpose is cyber-attacks. Following ... “CYBER” IS A NEW ASPECT OF THE to achieve objectives in the discussion of the cyber or through cyberspace. domain, it briefly reviews MODERN BATTLEFIELD. ITS EVOLUTION Cyberspace operations classic Just War Theory (COs) are composed of AND ARRIVAL FOLLOWS THE (JWT) and examines the the military, intelligence, application of JWT to cyber- CLAUSEWITZIAN CONSTRUCT OF THE and ordinary business attacks through the lens of NATURE AND CHARACTER OF WAR… operations of DOD in 8and Michael Walzer’s Legalist through cyberspace.” In Paradigm and theory of short, cyber operations are aggression.3 The discussion of JWT theory begins any activities that take place in cyberspace, whether with the aspects of JWT that are straightforward, day-to-day activities or attacks. Cyber Operations regardless of the nature of the attack and continues can assume many forms. They can take the form with an analysis of just cause – the lynchpin of the of Information Operations (IO), or they can be fulllast three criteria. After a determination of just cause, fledged cyberspace attacks. In the past, all CO were the final three criteria of JWT are evaluated in the considered subsets of IO, but have recently been context of whether or not the cause for retribution separated as a unique form of warfare. is sufficient. Separating cyberspace attacks from other operations conducted in cyberspace is a useful analytic OPERATIONS IN CYBERSPACE tool.9 Cyberspace attacks are those operations in “Cyber” is a new aspect of the modern battlefield. cyberspace “that create various direct denial effects Its evolution and arrival follows the Clausewitzian in cyberspace (i.e., degradation, disruption, or construct of the nature and character of war: The destruction) and manipulation that leads to denial that use of cyberspace in war is a new tool and method of is hidden or that manifests in the physical domains.”10 fighting (the “character of war”) with the end of forcing If the actions taken in cyberspace are not intended to an enemy to bend to the attackers will (the “nature of deny or manipulate an adversary or enemy’s capability, 56 CYBER SECURITY REVIEW, Autumn 2016

RESPONSE TO CYBER ATTACKS

then they are not attacks. Another definition, offered by the Tallinn Manual,11 describes the application of international law to attacks in cyberspace.12 The Tallinn Manual defines an attack as “a cyber operation, whether offensive or defensive, that is reasonably expected to cause injury or death to persons or damage or destruction to objects.”13 The data stolen from defense contractors Boeing and Lockheed-Martin by Chinese hackers, for example, would not qualify as an attack due to the intent to acquire information rather than deny or manipulate U.S. systems.14 A physical operation with the same effects would simply be espionage: treated as a criminal enterprise rather than a use of force. Because of the relatively low entry cost to the cyber domain, it is accessible to many different actors, which contrasts with the assumption of classic JWT that war is an activity between established states.15 In the modern world, although non-state actors may take part in war-like activity, warfare in its classic sense is still the providence of states, as evidenced by the United States quandary in dealing with fighters captured in the Global War on Terrorism. They do not represent any state and are therefore not subject to any of the moral or legal protections of warfare. In any case, a physical, armed response to non-state actors is still an act of war against the state in which they reside and any physical response to cyber-attacks must be considered in the same fashion. An analogy with the war in Afghanistan holds: the United States entered into war with the ruling Taliban because of their relationship with al Qaeda. If a non-state actor (or actors) performs an act of terrorism or a cyberattack, any response against that actor in their location becomes an act against that state. Additionally, it could be expected that two states previously in a state of war would not have any moral quandary when

deciding to respond to any attack with force. Because of this, examining responses to cyber-attacks through the lens of non-warring states provides clarity as a starting point, but extrapolation from state on state attacks to non-state actors become more closely aligned with recent principles developed in the Global War on Terrorism. New problems sometimes do not require new principles as much as they require an examination of the basics. As a working definition, the Tallinn Manual is most restrictive, but it also leaves open the possibility of an adversary “working around the edges” by using temporary effects. The U.S. Department of Defense Joint Doctrine on Cyber Operations, Joint Publication (JP) 3-12 definition considers both intent (denial or manipulation) and permanent or temporary effects that may remain hidden or exist in the physical realm. Consequently, the JP 3-12 definition is more complete and allows for both deontological and teleological consideration of an attack.16 Unfortunately, neither the Tallinn Manual (as an examination of international law) nor U.S. military joint doctrine affords adequate instruction for cyber-attacks that do not have physical effects but leave the leadership and populace of a country with the sense that a strong response is required.

JUST WAR THEORY The basis for international law surrounding the conduct of war began with the philosophical Just War Tradition that traces its roots to Aristotle, Cicero, and more popularly, Augustine.17 Over the course of time, this tradition has been considered from three perspectives: Jus ad bellum, jus in bello, and jus post bellum. These phrases persist in both Just War tradition and in international law and each have specific conditions.18 For this analysis, jus ad bellum (conditions for going to war) is the most salient. cybersecurity-review.com

57

RESPONSE TO CYBER ATTACKS

The beginnings of a coherent Just War Theory were articulated by Saint Thomas Aquinas in Summa Theologica. He addresses what are generally considered to be the conditions necessary for a war to be “just:” 1. War must be declared by a nation state (legitimate authority). 2. There must be a just cause for which the war is being fought. 3. The intent of fighting must be morally worthy as well (right intention). Later scholars added other criteria. 4. War must be a last resort. 5. There must be a reasonable likelihood of success. 6. The cost of fighting a war must be proportional to the wrong redressed (proportionality of ends). 7. Any war must not only be just in its cause, but also fought with just means (jus in bello).19 The jus in bello criterion is sometimes separated from the broader jus ad bellum. Jus in bello applies to the individual soldier fighting the war, but it also applies to those directing

War Theory (legitimate authority, right intention and probability of success) are essential, they change very little for responses to a cyber-attack. A state, rather than individuals acting alone, must respond in a fashion aligned with moral ends and be likely to achieve them. The question of legitimate authority is easily applied, even to attacks waged in cyberspace. Since war is an activity, an armed conflict, between political entities it requires that those engaging in such activities represent such an entity.20 The most common is the state, but an insurgency can represent populations as well. The preWestphalian world of Saint Thomas Aquinas did not recognize states as we know them; war was waged by and between princes. These princes controlled territory and were political rulers, and today this concept has evolved into the modern states. Modern day war remains an activity between those states. A state (and since only a state may wage war) that desires the ... IN A CYBER-ATTACK, THE ONLY moral and legal protections EVIDENCE MAY BE THE DESTRUCTION of jus ad bellum must be a recognizable (if not OF INFORMATION, OR FINANCIAL recognized) political entity. IMPACT, OR IN SOME CASES CRITICAL Otherwise, any response is INFRASTRUCTURE THAT CONTINUES simply a criminal activity to be dealt with internally.21 TO MALFUNCTION WITH Right Intention is an issue

DELETERIOUS EFFECTS …

the war in a larger sense. For the purposes of cyberattacks, any actions must conform to jus in bello criteria as a whole, even though jus in bello is beyond the scope of this analysis. Many of these criteria apply to attacks in cyberspace in much the same fashion they do to physical attacks (legitimate authority, right intention, probability of success), but others (just cause, last resort, proportionality of ends, and just means) are more difficult to shape because of evidence of an attack. In a world of physical warfare, the effects left behind by any act of aggression are easily identifiable. In a cyber-attack, the only evidence may be the destruction of information, or financial impact, or in some cases critical infrastructure that continues to malfunction with deleterious effects. While the first three criteria of Just 58 CYBER SECURITY REVIEW, Autumn 2016

that applies to responses to cyber-attacks in the same manner as traditional, physical uses of force. The intent of any response to a cyber-attack must be morally just. While this requirement follows from just cause, one state must act with an intent that – if motivated during any other form of warfare – would still pass the test. The ways, or manners, of response become less important. As with any type of attack, one must be able to expect a reasonable chance of success. Whatever the espoused cause and desired ends of a response, there must be some chance that it may be successful, and must be related to proportionality of ends. While this criterion does not demand certainty of success, the degree of surety of a desired outcome must exist to the same degree as an attack for any other form of aggression.

RESPONSE TO CYBER ATTACKS

The Central Problem: Just Cause While the previous demands of Just War Theory change little for attacks in cyberspace, the others are less clearly defined. Just cause, last resort, and proportionality of ends are all more difficult to apply when dealing with attacks in cyberspace. One of the most prominent political philosophers currently considering contemporary issues in Just War Theory is Michael Walzer.22 Walzer attempts to refine the Just War Theory for modern times. His most profound contribution is a definition of “just cause” in terms of the natural rights that man binds together in states to protect: rights such as life, liberty, and property. According to Walzer, war is justified when those natural rights are threatened. In the cyber domain, the most problematic of the classic Just War Theory criteria for waging war is “just cause.” Early Just War Theorists such as Augustine of Hippo approached the warfare from the pacifist beginnings of the Christian Church, where killing was prohibited, but war became a necessary evil in order to govern the empire as Christianity spread.23 This is considered the most important of the criteria,

and a foundation for every other criteria. This often is broken down into two separate categories of “wrongs received:” self-defense and punishment for a grievous, uncorrected wrongdoing.24 The first of these, self-defense, is viewed as the only just cause for war in international law in which a state may take unilateral action.25 This right of selfdefense applies not just to a country protecting itself, but also includes collective self-defense: the defense of other states.26 Philosophers have long attempted to define the bounds of self-defense, and when applying “self-defense” to cyber-attacks, it becomes even more difficult. How does one determine self-defense when there are no invading armies? Can a war waged against a state that does not cross into another’s territory be considered self-defense? These questions become more critical in an age of expeditionary warfare. The United States, for example, has not fought a foreign nation on her shores since the Mexican American War in the 1840s, but the United States has fought in wars that were considered “just.” As an example, the beginning of the current conflict in Afghanistan is generally considered a just cause, but the government

cybersecurity-review.com

59

RESPONSE TO CYBER ATTACKS

of Afghanistan did not invade the United States international one is what Walzer terms the “Domestic in the traditional sense. That government, on the Analogy.”33 This analogy leads to the Legalist Paradigm other hand, offered aid and protection to those who and has six propositions. attacked the U.S. The second traditional cause for just war is the 1. There exists an international society of independent punishment of a state for some wrongdoing. The states. framework for punishment as just cause has always 2. The international society has a law that establishes been problematic. Very little has been agreed upon, the rights of its members – above all, the rights of either in customary or international law, or even the the territorial integrity and political sovereignty. basic premise behind what this punishment is intended 3. Any use of force or imminent use of force by one to accomplish.27 Walzer describes it simply as the state against the political sovereignty or territorial international analogue to punishment for domestic integrity of another constitutes aggression and is crime: to prevent future aggression.28 a criminal act. Unfortunately, cyber-attacks do not fit nicely into 4. Aggression justifies two kinds of violent response: either of these categories. Even if a cyber-attack has a war of self-defense by the victim and a war of law the same effects as an armed attack (perhaps an attack enforcement by the victim and any other member commands infrastructure to destroy itself, thereby of international society. causing the deaths of a 5. Nothing but aggression large number of people), can justify war. declaring it to be an attack ... VERY LITTLE HAS BEEN AGREED 6. Once the aggressor that requires defense state has been militarily UPON, EITHER IN CUSTOMARY OR is difficult if there is no repulsed, it can also be realistic threat of continued punished.34 INTERNATIONAL LAW, OR EVEN action that an armed THE BASIC PREMISE BEHIND WHAT physical response would Since states are the interrupt. Walzer links his THIS PUNISHMENT IS INTENDED TO collectivization of the rights specific theory to traditional of their citizens, then a

ACCOMPLISH …

Just War Theory, saying “there is no reason why it can’t work”29 in current times and explains that his is an attempt to describe the new character of war as it relates to Just War Theory. His question (and answer): “Do the same rules apply [to asymmetric war]?30 I want to say that they do, but that requires an argument.”31 Walzer’s argument is centered on what he refers to as the “Legalist Paradigm.” The basis for this argument is that just cause for war is the maintenance of law and order in the international realm. In Walzer’s world, the only crime that a state may commit is termed “aggression.”32 He compares it to domestic crimes, and lists a range of different categories among individuals, but when a violation of international rights occurs there is no other name for it than simply “aggression.” The comparison of violations on an individual level and an 60 CYBER SECURITY REVIEW, Autumn 2016

state must have a claim to natural rights, a concept drawn from John Locke’s writings on the nature of government. The two primary forms of these natural rights for a state are territorial integrity and political sovereignty. Any threat to either of the conditions is a threat to the state and constitutes aggression: the only just cause for war. When viewed from the perspective of territorial integrity and political sovereignty, then cyber-attacks can be aggression and just cause for war. According to Walzer, since the members of the international order are states, and the only crime a state may commit against another state is aggression, therefore, that is “the name we give to the crime of war.”35 While aggression may be fighting, whether in a warring or other sense, the key to identifying

RESPONSE TO CYBER ATTACKS

aggression is that it interrupts the peace. “Peace” in this sense is not a world without fighting, but “peace with rights, a condition of liberty and security that can exist only in the absence of aggression.”36 The crux of Walzer’s theory of aggression is that people band together to form states, and these states represent the collective natural rights of its citizens: “the duties and rights of states are nothing more than the duties and rights of the men who compose them.”37 These duties and rights are the natural rights Americans are familiar with from Locke’s natural rights of man: life, liberty, and property (possessions).38 Walzer declares threats to these rights as simply “aggression.” Life and liberty in their collective form are political sovereignty and the collective property is territorial integrity. The political sovereignty is a long established contract: rather than a “transfer” of rights, the state protects the common lives of its citizens, which gives the state a moral standing to exist. If the state will not protect its citizens, then it loses that moral standing.39 In addition to protecting political

if the effects are comparable to a non-cyber-attack, then it may be considered an armed attack.42 While this is an excellent starting point for identifying aggression, very few cyber-attacks will “look like” a physical armed attack in their results. A bomb leaves a large crater, while a cyber-attack may leave all equipment in place but in a non-working status. Evaluating these attacks from Walzer’s Legalist Paradigm and determining if an attack violates the natural rights of a state in the form of political sovereignty and territorial integrity, its “life, liberty, and property,” will help clarify whether these cyber-attacks that may not leave a “smoking hole” constitute aggression. Many cyber-attacks are attacks on the political sovereignty of a state. The right of a people to be free from foreign “control and coercion”43 is the keystone of political sovereignty. In a conventional war ideal, this would seem to mean physical occupation or perhaps even an assassination of a leader by a foreign nation, although if “assassination tends to become the norm of political affairs--

sovereignty, the state must also guard its territorial integrity. While protecting territorial integrity is not the same as ownership, Walzer compares it to the individual’s right of property even in a home that she does not own. She must have some place safe from intrusion, and the existence of a state provides that space.40 As cyber technology continues to integrate with every aspect of daily lives, the likelihood of two adversaries using cyber operations to wage a war against each other grows. This is especially true if one side has a distinct military disadvantage but desires a first strike or feels that a preemptive strike is justified.41 Some legal writings, most notably the Tallinn Manual, consider only the physical effects of a cyber-operation:

indeed, civil politics would thus crumble into barbaric plots and conspiracies (as did Rome in its last centuries) in a race to gain power and mastery over others rather than to forge justifiable sovereignty.”44 In the world of cyberspace, attacks may take many forms with the intent of coercing and controlling the targeted group with behavior change. In the extreme, a cyberattack could be used to install a government favorable to an adversary. This is a circumstance to which a liberal democracy would be especially vulnerable. In other cases, this could take the form of an attack to terrorize a population in the way it institutes or enforces laws. Recently, a foreign entity tried to use cyber operations to coerce a corporation not to market a product it had cybersecurity-review.com

61

RESPONSE TO CYBER ATTACKS

created. In November 2014, the computer network aggressor installing a government favorable to itself. at Sony Entertainment Pictures was penetrated by In the 2016 election, caucus chairs in both Iowa and hackers. These hackers, calling themselves the Nevada reported results using a specially designed “Guardians of Peace” demanded that Sony stop the Microsoft smartphone application.49 Imagine the release of The Interview, a comedy critical of North chaos that would follow if a vote count was changed. Korean leader Kim Jong Un. If Sony released the The faith in decisions for a nation would be shaken film, then the Guardians of Peace would publicize severely, especially in a democracy that relies on the documents and emails embarrassing to Sony officials consent of the people to follow the rule of law rather and employees. The FBI attributed the attack to the than being ruled by an authoritarian government. Any North Korean government and confirmed that it was in of these examples, in the proper circumstances, could response to the film.45 While this example is directed represent an attack on the political sovereignty of a at a private sector company, government officials – state and therefore, aggression against them. especially elected officials – could be just as, if not The clearest form of aggression is a violation of more, vulnerable to such embarrassing revelations. territorial integrity. While the prototypical ideal of a Consider the 2007 Estonian Distributed Denial violation of territorial integrity would be an invasion of Service where online with great armies crossing systems in Estonia were ... AS TECHNOLOGY INSERTS ITSELF borders, it is not simply rendered useless in a about the possession of cyber-attack.46 This attack AS A VEHICLE FOR THE DEMOCRATIC land. Territorial integrity was a response to political PROCESS, AN ILL INTENDED ACTOR is a function of national action to move a memorial existence: the “coming COULD USE TECHNOLOGY TO to Russian soldiers from together of a people that World War II. While the INFLUENCE THE POLITICAL PROCESS establishes50the integrity of attack was never fully a territory.” In the earlier THROUGH DIRECT MEANS … attributed to anyone analogy about a house specifically (it originated in being robbed, territorial Russia, but it was not clear if the attack was the act of integrity is about the safe space a nation creates for individuals or sponsored by the Russian government), it itself. When a cyber-attack occurs, it threatens that was a clear attempt to coerce the Estonian government safe space. Just as in our own homes we assume we and people to change their intended action by outside are safe from intrusion, we should be able to assume individuals, a clear assault on the internal political that activities that occur within our state will be allowed sovereignty of Estonia.47 to continue. If that safe space is violated, then the Regardless of whether or not Russia actually method used to perform the intrusion is of less concern perpetrated the cyber incursion on the U.S. Democratic than the intrusion happening in the first place. National Committee in an attempt to influence the 2016 In remarks to the United States Cyber Command Presidential election, the event clearly demonstrates Interagency Legal Conference, Harold Hongju Koh the need to prepare for similar eventualities.48 Cyberreferenced attacks may be used to indirectly influence (most likely) [c]ommonly cited examples of cyber activity or directly alter the internal workings of a state. As that would constitute a use of force include, for technology inserts itself as a vehicle for the democratic example, (1) operations that trigger a nuclear process, an ill intended actor could use technology to plant meltdown, (2) operations that open a dam influence the political process through direct means. above a populated area causing destruction, or (3) It would be conceivable that a cyber-attack could operations that disable air traffic control resulting actually change the outcome of an election with an in airplane crashes.51 62 CYBER SECURITY REVIEW, Autumn 2016

RESPONSE TO CYBER ATTACKS

While Mr. Koh was discussing these attack in a legal sense, he chose examples that are clear uses of force, but do not involve a direct violation of territorial integrity in the sense of foreign invaders. On the other hand, they are still violating Walzer’s “safe space” concept. As one begins to explore less clear examples in terms of violence, the domestic analogy becomes more important. Nations should be able to expect that property, equipment or possessions are not in jeopardy52 when fairly acquired and safe within a state’s territory. A recent example of a cyber-attack destroying property is the Stuxnet virus: a cyber operation against Iranian nuclear enrichment centrifuges. The virus consisted of malware that replicated itself on computers and media with which it came in contact. The virus was limited in duration and number of times it would replicate, and it searched for a specific combination of software on the infected computer in order to target the specific controllers for the Iranian centrifuges. When the conditions were met, the virus caused the centrifuges to spin out of control, thereby destroying them and the uranium they were enriching. Ryan Jenkins describes this not as an invasion of physical space, but rather an invasion of Iran’s cyber territory.53 While this may be confusing at first glance, it follows the idea of the safe space: digital infrastructure is the cyber territory that should be regarded in the same fashion as physical territory. The expectation is that property (whether the individual’s property or the state’s) should be safe within these territories, much as Walzer’s analogy of territorial integrity is the collective right of a home’s resident to not expect her possession to be in jeopardy. Jenkins also compares this destruction to a special warfare-style raid on the facility.54 The circumstance

that the territory was invaded by electronic instructions on a computer rather than individuals with weapons is less important than the safe space that was violated.

Proportionality of Ends and Last Resort As one state violates the sovereignty of another and the victim of aggression considers a response, the “good” of the response must be compared to the “wrong” inflicted. Positive outcomes must be considered in terms of the overall effect: not simply from the perspective of the state pursuing the action.55 In other words, a state may not wage war for any triviality. While this concept holds for responding to cyber-attacks, the difficulty lies in applying the ideals directly. If an attack is simply a nuisance: a Denial of Service attack that makes the internet run slowly, it is hardly proportional to opt for war simply because life is made difficult. The problem of proportionality is ever present, but cyber exacerbates the concern. Decisions to go to war are clearer when counting bodies, but become less so when deciding if it permissible to destroy infrastructure, causing suffering, or killing people simply because electronic data was manipulated on a computer. Responses are less clear when results look like a physical attack, but no loss of life happens: a power supply is taken down, the banking or financial institutions are destroyed, the water supply is polluted, or aircraft are grounded because they cannot be controlled safely. All of these are effects of attacks that could happen with a physical attack or by using electronic means. In any of these cases the means of the attack is less important than the effect on a population: attacks in cyberspace must be framed in terms of their effects, rather than the means used. Additionally, since the proportionality clause is concerned with ends desired compared to evils present, the actors must consider cybersecurity-review.com

63

RESPONSE TO CYBER ATTACKS

the degree to which cyber-attacks are ongoing and if any retaliation would stop attacks. Furthermore, will retaliation prevent future attacks? While concerned about proportionality regarding the short term effects of a response, one must also consider the long term effects. Will an immediate response lead to a larger war? The means of response may change how any response is perceived. If one state is considering a physical response to any attack, then this decision to wage war must not be taken lightly. While the ends must be proportional, war should also not be the first choice: an essential jus ad bellum condition is that war must be a last resort. If killing in war is abhorrent, one must ensure that no other appropriate response exists. In many modern conflicts, the parties involved are at tensions for some time prior to any actual conflict. Orend describes the simplest definition: “when it seems the last practical and reasonable shot at effectively resisting aggression.”56 Orend’s conception is direct, but it leaves much to the judgment of the actors with very little guidance. Walzer discusses the idea of last resort in the context of preemptive attacks, but he gives a clear framework that aligns nicely with the Legalist Paradigm and, by extension, just cause. “States may use military force in the face of threats of war, whenever the failure to do so would seriously risk their territorial integrity or political independence.”57 While Walzer’s definition still requires some degree of reasoned judgment, it outlines parameters: if action is not taken, would an actor commit aggression, or continue to commit it in the case of ongoing attacks? From the perspective of the cyber domain, if an attack is ongoing, and the only way to stop that attack is through a physical response as opposed to cyber defense, then it becomes an acceptable case of last resort, an emerging act of aggression that cannot be stopped otherwise. On the other hand, in the absence of continuing aggression in the cyber domain, the decision is more challenging. Would failure to act leave political sovereignty or the safety of cyber territory under threat in a reasonable horizon? If the answer is no, then any response is unlikely to pass the test of last resort. 64 CYBER SECURITY REVIEW, Autumn 2016

CONCLUSION For a leader who is responsible for the collective rights of their population, a decision to initiate an act of war, especially one that changes the character of a conflict from a cyber-war to a physical one, cannot be taken lightly. Leaders must decide when it is both moral and legal to respond physically to a virtual attack. A slight change in the perspective will clarify matters. Walzer’s logic and reasoning clarifies the ideas of territorial integrity and political sovereignty resulting in a more tangible approach. When the cyber domain is viewed as cyber territory, and the effects are considered in relation to their effects on Walzer’s description of a state’s “safe space” (territorial integrity) or ability to govern itself (political sovereignty), a leader can articulate when it is appropriate to attack another nation after being victimized in the cyber domain. As technology continues to advance, the ability of aggressors, whether nation states or individuals, to attack other nations with nothing but electronic means will continue to increase. The effects of such attacks will have more and more profound consequences to the victims, even in the absence of death and destruction. Nations will need to continue to determine how best to respond to such attacks. The most elemental question in future world of cyber-attacks will be whether or not these attacks are an affront to political sovereignty and/or territorial integrity. If the determination of “just cause” is affirmative, then an option to use physical force could justifiably be on the table. Fulfilling these two criteria does not alleviate the responsibility for adherence to the rest of Just War Theory, rather they present a most useful perspective for analyzing an appropriate response. ■

REFERENCES 1 Tom Gjelten, “Pentagon Strategy Prepares for War in Cyberspace,” NPR, July 15, 2011, http://www. npr.org/2011/07/15/137928048/u-s-military-unveilscyberspace-strategy. 2 Paul Nakasone, “Cyber Domain,” in Theater Strategy and Campaigning (Carlisle Barracks, PA: U.S. Army War College, 2015). 3 Michael Walzer, Just and Unjust Wars, 5th ed. (New York: Basic Books, 2015).

RESPONSE TO CYBER ATTACKS

4 U.S. Army Maneuver Center of Excellence, “Maneuver

19 George R. Lucas, Jr. and Rick Rubel, eds., Ethics for

Leaders Self Study Program: Nature and Character of

the Military Professional: The Moral Foundations of

War and Warfare,” http://www.benning.army.mil/mssp/

Leadership, 4th ed. (Boston: Pearson Learning Solutions,

Nature%20and%20Character/.

2011), 232-233.

5 Joint Publication 1-02, Figure B-3 identifies “cyber” as one

20 R. Craig Nation, “History, Theory, War, and Strategy,”

of the most commonly misused terms in joint warfare. U.S.

lecture, U.S. Army War College, Carlisle Barracks,

Joint Chiefs of Staff, Department of Defense Dictionary

September 9, 2015, cited with permission.

of Military and Associated Terms, Joint Publication 1-02

21 For clarity and simplicity, any political entity will be referred

(Washington, DC: U.S. Joint Chiefs of Staff, November 8,

to as a “state.” In the complex world of asymmetric warfare,

2010), B5.

many groups claim to be legitimate governments, but they

6 U.S. Joint Chiefs of Staff, Cyberspace Operations, Joint

are rarely attacked from outside (and when they are, the

Publication 3-12 (Washington, DC: U.S. Joint Chiefs of

outside agents are typically asked to intervene by the

Staff, February 5, 2013), GL4.

ruling government, such as Russia’s involvement in the

7 Interestingly, DoD Joint Publications use the term

2015 Syrian Civil War), making civil wars or insurgencies

“domain” regularly but never define it. This definition, from

internal

the Merriam-Webster online dictionary, applies to most, if

Philosophy, “War.”

not all, uses of “domain” in the Joint Publications. Genaro

Phillips,

“Unpacking

Cyberwar:

See

Stanford

Encyclopedia

of

22 Institute for Advanced Study, “Michael Walzer,” https://

8 U.S. Joint Chiefs of Staff, Cyberspace Operations, II-1. 9 Kyle

questions.

The

www.ias.edu/people/faculty-and-emeriti/walzer. 23 Lucas and Rubel, Ethics for the Military Professional, 232.

Sufficiency of the Law of Armed Conflict in the Cyber

24 Stanford Encyclopedia of Philosophy, “War.”

Domain,” Joint Force Quarterly 70 (3rd Quarter 2013):

25 Jeff McMahan, “Just Cause for War,” Ethics & International

72-73.

Affairs 19, no. 3 (Fall 2005): 1, http://www.philosophy.

10 U.S. Joint Chiefs of Staff, Cyberspace Operations, II-5. 11 Published by NATO’s Cooperative Cyber Defence Centre of Excellence.

rutgers.edu/joomlatools-files/docman-files/Just_Cause_ for_War.pdf. 26 U.N. Charter, chapter 7, art 51. Chapter seven of

12 Michael N. Schmitt, ed., Tallinn Manual on the International

the U.N. Charter allows for warfare in the case of

Law Applicable to Cyber Warfare (Cambridge, UK:

international agreement through the UN, but absent

Cambridge University Press, 2013), 1.

an

international

agreement,

self-defense

is

the

13 Ibid., 106.

only permissible cause for war. The First Gulf War

14 “Su Bin, Chinese Man Accused by FBI of Hacking,

in 1991 is an excellent demonstration of collective

in Custody in B.C.,” CBC News, July 12, 2014,

self-defense: Iraq invaded neighboring Kuwait, and the

http://www.cbc.ca/news/canada/british-columbia/su-bin-

expulsion of Saddam Hussein’s forces was sanctioned

chinese-man-accused-by-fbi-of-hacking-in-custody-in-

by the United Nations Security Council and led by

b-c-1.2705169.

the United States.

15 While the writings of Saints Augustine and Thomas Aquinas became Classic JWT predating the Westphalian

27 Michael Walzer, Just and Unjust Wars, 5th ed. (New York: Basic Books, 2015), 62.

conception of states, they treated war as an activity

28 Ibid., 63.

between princes. Such wars were more personality

29 Ibid., xiv.

driven,

pre-Westphalian

30 Walzer specifically refers to “armies and insurgents”

princes and States, generally speaking, applies across

as modern war, but it seems fair to extrapolate his

but

the

analogy

between

the ages.

commentary to all forms of asymmetric warfare.

16 U.S. Joint Chiefs of Staff, Cyberspace Operations, II-5.

31 Walzer, Just and Unjust Wars, xiv.

17 Stanford Encyclopedia of Philosophy, “War,” July 28,

32 Ibid., 51.

2005,

http://plato.stanford.edu/archives/fall2008/entries/

33 Ibid., 58.

war/.

34 Ibid., 61-63.

18 Ibid.

35 Ibid., 58, 51.

cybersecurity-review.com

65

RESPONSE TO CYBER ATTACKS

48 Amanda Taub, “D.N.C. Hack Raises a Frightening

36 Ibid., 51. 37 John Westlake, Collected Papers, ed. L. Oppenheim

Question: What is Next?” New York Times, July 29, 2016,

(Cambridge, England: 1914), 78, quoted in Walzer, Just

http://www.nytimes.com/2016/07/30/world/europe/dnchack-russia.html

and Unjust Wars, 53. 38 John Locke, The Works of John Locke: A New Edition, ed.

49 Emily Cadei, “Iowa Caucuses Go High Tech,” Newsweek

Rod Hay (London, England: McMaster University Archive

Online, January 8, 2016, http://www.newsweek.com/iowa-

of the History of Economic Thought, 1823), 107.

caucuses-go-high-tech-412958; Mario Trujillo, “Nevada

39 Walzer, Just and Unjust Wars, 54.

GOP to Report Caucus Results With Smartphones,”

40 Ibid., 55.

The Hill Online, February 22, 2016, http://thehill.com/

41 Many Just War theorists (although not all) consider a preemptive strike justifiable, although both sides will likely disagree in any specific case. Arguing that a cyber attack is a justified as a preemptive move is difficult unless it directly prevents some form of aggression.

policy/technology/270257-nevada-gop-to-report-caucusresults-with-phone-and-pictures. 50 Walzer, Just and Unjust Wars, 57. 51 Harold Hongju Koh, “International Law in Cyberspace,” Harvard International Law Journal 54 (December 2012): 4, http://www.harvardilj.org/wp-content/uploads/2012/12/

42 Schmitt, Tallinn Manual, 45.

Koh-Speech-to-Publish1.pdf.

43 Walzer, Just and Unjust Wars, 89. 44 Alexander Moseley, “Just War,” http://www.iep.utm.edu/ justwar/. 45 Oliver Laughland, “FBI Director Stand by Claim that North Korea was Source of Sony Cyber-Attack,” The Guardian Online, January 7, 2015, http://www.theguardian.com/ world/2015/jan/07/fbi-director-north-korea-source-sonycyber-attack-james-comey. 46 Beal defines a Distributed Denial of Service as follows: “DDoS is a type of DOS attack where multiple

52 The assumption is that there is not a declared state of war. If a declared state of war exists, then the use of violence is legal and to be expected. 53 Ryan Jenkins, “Is Stuxnet Physical? Does It Matter?” Journal of Military Ethics 12, no. 1 (2013): 72. 54 Ibid. 55 Stanford Encyclopedia of Philosophy, “War.” 56 Ibid. 57 Walzer, Just and Unjust Wars, 84.

compromised systems are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack. According to . . . eSecurityPlanet, in a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.” See Vangie Beal, “DDoS Attack – Distributed Denial of Service,” http://www.webopedia.com/ TERM/D/DDoS_attack.html. 47 Joywang, “The 2007 Estonian Cyberattacks: New Frontiers in International Conflict,” On Cyber WarFreshman

Seminar

43Z-Internet

Law,

blog

entry

posted December 21, 2012, https://blogs.harvard.edu/ cyberwar43z/2012/12/21/estonia-ddos-attackrussiannationalism/.

66 CYBER SECURITY REVIEW, Autumn 2016

ABOUT THE AUTHOR Joseph W. Smotherman (M.S.S. United States Army War College) is a Commander in the United States Navy. An earlier version of this article, written under the direction of Chaplain (Colonel) John Kallerson, earned a prestigious Army War College Foundation Daniel M. Lewin Cyber-Terrorism Technology Writing Award for the USAWC Class of 2016.

HELD UNDER THE PATRONAGE OF HIS MAJESTY KING HAMAD BIN ISA AL KHALIFA

‫معرض ومؤتمر الدفاع الدولي البحرين‬

BIDEC

Bahrain International Defence Exhibition & Conference

16-18 October 2017 | Bahrain International Exhibition & Convention Centre

bahrain’s premier international tri-service defence show 16-18 October 2017 Bahrain International Exhibition & Convention Centre

100+ Exhibitors 3000+ Industry Visitors Fully-Hosted International VIP Delegation Programme

www.bahraindefence.com For more information contact: Thomas Gaunt T: +971 4 435 6101 M: +971 55 314 3339 E: [email protected] Media Partners

Officially Supported by

Bahrain Defence Force

Organised by

Taking cyber solutions to the next level

IAI’s Cyber Defense, Intelligence and Early Warning Solutions • Cyber and off-the-air Accessibility solutions • Training, Testing, Simulation & Forensics • Cyber Analytics- Identity Resolution, Geo Location, Anomaly Detection • Modular Cyber Centers: Cyber Security Operation Centers (CSOC), Intelligence Centers and Early Warning Centers

www.iai.co.il [email protected]