Showing posts with label Cybersecurity. Show all posts
Showing posts with label Cybersecurity. Show all posts

Saturday, January 24, 2009

Waiting For Cybergeddon

In the United States, the FBI (which is responsible for detecting and investigating Internet based crime) is warning that America is becoming ever more vulnerable to "cybergeddon" (a massive attack via the Internet that would cripple the economy, government and military.)
The FBI admits that it has a hard time getting more money for their Internet security efforts. And reason is because the threat is largely invisible. A picture of a nuclear bomb going off, or of enemy tanks and warships ready to attack, makes a much more effective impression on the politicians who dole out the money.
The FBI also wants to get the Department of Defense Internet defense operations more involved in national level defense against network based attacks. But the four services have a hard time agreeing to coordinate their efforts to defend military use of the Internet when under massive hacker attack. Thus the FBI plea for help sort of falls on distracted ears.

There hasn't been a proper, all-out Cyber War yet. There have been lots of skirmishes, but nothing approaching what an all out battle, via the Internet, would be. What would the first Cyber War be like? Let's be blunt, no one really knows. But based on the cyber weapons that are known to exist, and the ones that are theoretically possible, one can come up with a rough idea.
First, there are three kinds of Cyber War possible. Right now, we have limited stealth operations (LSO), as Chinese, Russian, and others, use Cyber War techniques to support espionage efforts. China is the biggest practitioner, or at least they have been caught most often.

Next comes Cyber War only (CWO). This is open use of a full range of Cyber War weapons. No one has done this yet, but it's potentially less dangerous than firing missiles and unleashing tank divisions. It is believed that Russia indulged in this in 2007, when Estonia infuriated the Russians by moving a World War II statute memorializing the Soviet "liberation" of Estonia (which didn't want to be liberated by the Soviet Union.) Russia denied responsibility for the massive Cyber War assaults on Estonia, which nearly shut down the nations Internet infrastructure. Estonia accused Russia of being responsible, and tried to invoke the NATO mutual-defense pact. NATO Cyber War experts went to Estonia, and shortly thereafter the attacks stopped. Apparently Russia got the message that this sort of thing could escalate in something more conventional, and deadly.

Then we have Cyber War in support of a conventional war. Technically, we have had this sort of thing for decades. It has been called "electronic warfare" and has been around since World War II. But the development of the Internet into a major part of the planets commercial infrastructure, takes "electronic warfare" to a whole other level. Cyber War goes after strategic targets, not just the electronic weapons and communications of the combat forces.
A successful Cyber War depends on two things; means and vulnerability. The "means" are the people, tools and cyberweapons available to the attacker. The vulnerability is the extent to which the enemy economy and military use the Internet and networks in general. We don't know who has what Cyber War capabilities exactly, although China and the U.S. have openly organized Cyber War units, and both nations have lots of skilled Internet experts.

Vulnerability is another matter. The United States is the most exposed to Cyber War attack because, as a nation, we use the Internet more than any other country. That's the bad news. The good news is that if an attacker ever tried to launch a Cyber War by assaulting the U.S., it could backfire. This risk has to be kept in mind when considering what a Cyber War might do. Recall military history. The Pearl Harbor attack in 1941 actually backfired on the Japanese, by enraging Americans and unleashing a bloodthirsty response that left Japan in ruins. The lesson of the original Pearl Harbor is, if you're going to hit someone this way, better make it count. If your opponent is bigger than you, and gets back up, you could be in some serious trouble.
The big problem with Cyber War is that there has not been a lot of experience with it. Without that, no one is really sure what will happen when someone attempts to use it at maximum strength. But unlike nuclear weapons, there is far less inhibition about going all-out with Cyber War weapons. That is the biggest danger. Cyber War is a weapon of growing might, and little restraint by those who wield it. Things are going to get a lot worse.

Friday, December 5, 2008

U.S. Air Force CIO says cybersecurity federal "Achilles' heel"

Until best practices in information security become pervasive across all aspects of the enterprise, agencies' networks remain at risk, said a top technology chief with the Air Force at a conference Wednesday, calling cybersecurity one of the federal government's most overlooked and critical weaknesses.

"There's too much fighting about cyber -- how big [a concern] it is, who owns it," said Lt. Gen. Michael Peterson, chief information officer at the Air Force, during a keynote at Air Force IT Day, sponsored by the Armed Forces Communications and Electronics Association of Northern Virginia.

"This is our Achilles' heel," he said. "It's not about a denial-of-service attack; it's about the information on the network -- ensuring it's accurate, protected, and available. [But] we're still fighting over what patch to put on."

Despite Russia's cyberwarfare tactics against Estonia and Georgia, Peterson said an all-out cyberwar won't happen; instead, cyberattacks will become one of many combat strategies used by adversaries to bring government to its knees.

"It won't be a pure fight," he said. "It will incorporate all domains … The battle is ongoing and these guys are very good."

To combat cyberattacks, information security needs to become more pervasive across agencies and across government, Peterson said. Too often it is managed separately from other operations, he said, but an enterprisewide approach is necessary to ensure that daily processes that traditionally receive less oversight do not introduce security vulnerabilities. Standards should be engrained across all disciplines, he added.

"Good security practices are not just good security practices," he said. "They're required security practices … This is too important to not [be] embraced in the broadest view possible."

Peterson said the incoming administration is well aware of the threat, noting he plans to brief the transition team about cybersecurity later in the afternoon. President-elect Barack Obama has already met with John Grimes, chief information officer and assistant secretary of networks and information infrastructure at the Defense Department.


The Air Force has changed its strategy for cybersecurity in recent months. In December 2007, former Secretary Michael Wynne signed a directive to stand up the Air Force Cyber Command that would work alongside the space, air combat and other commands. That plan was scrapped after lapses in the security of the nation's nuclear arsenal prompted the reallocation of resources to a Global Strike Command.

In October 2008, the same month the Cyber Command was scheduled to begin operation, the Pentagon announced that cyber operations would instead be organized within the Air Force Space Command and named the 24th Air Force. About 6,000 people are expected to work in the cyber component.