Tag Archive for: Cyber

Cyber wrap

2568510756_c1a4620ed8_z

We’re kicking off this week over the ditch with our Kiwi friends who have been very busy on the cyber policy front. In Auckland last Friday, Communications Minister Amy Adams launched an updated version of the country’s national Cyber Security Strategy. The NZ government also produced an accompanying ‘living’ Action Plan that will be updated annually, and a National Plan to Address Cybercrime. The strategy aims to deepen public–private engagement on cyber issues building upon the already successful Connect Smart initiative, which reaches out to private residences, schools and businesses. Other initiatives include a ‘cyber security tick’ scheme, similar to those used to indicate healthy foods, which will recognise businesses with good cyber security practices. New Zealand will also establish a stand-alone national Computer Emergency Response Team (CERT). Currently CERT responsibilities lie within the National Cyber Security Centre, but the decision has been made to bring New Zealand ‘into alignment’ with its key international partners by creating the new body. The decision mirrors that of the UK government, which successfully launched their first national CERT early last year.

Australia’s national CERT has released a survey of the cyber security postures and attitudes present amongst its major Australian businesses partners. The survey found that over half of the respondents had experienced an incident that had compromised ‘confidentiality, integrity or availability of a network’s data or systems in the last year’. Positively, the survey found that in response many businesses had introduced or improved their information security practices including both policy and technical responses. Mirroring stories throughout the media this year, major Australian businesses reported being subject to a substantial amount of Ransomware attacks—four times as many as were reported in 2013.

Twitter has warned a number of its users this week that their accounts may have been targeted by something a bit more malicious than the usual run-of-the-mill spam. The social media giant informed several account holders via email that their Twitter accounts were part of ‘a small group of accounts that may have been targeted by state-sponsored actors’. Those affected included activists, security specialists and privacy advocates, in what Twitter believes was an attempt to gain access to personal information including phone numbers and email addresses. While Twitter claims there was no evidence that the attempts were successful, it recommended that those affected use identity protections measures, such as the Tor browser.

Joe Nye had an interesting piece published on Project Syndicate on deterrence in cyber space, where he discusses how the traditional difficulties surrounding attribution have hampered effective deterrence and tipped the see-saw in favour of attackers. But he stresses that increased technological capability, more robust encryption and economic enmeshment may tip the advantage back to the defenders and eventually enable more effective cyber deterrence.

And finally, just in time for the holiday break, the US Department of Homeland Security has put out a useful tip sheet on good cybersecurity practices to use while travelling. It includes advice on connecting to Wi-Fi, data protection and maintaining the physical security of personal devices.

Learning lessons from the UK’s confident approach to cyber

An aerial image of the Government Communications Headquarters (GCHQ) in Cheltenham, Gloucestershire.

The launch of the 2015 SDSR provided evidence that UK Defence and Security agencies are being re-invigorated after a period of extensive cuts. Over the next ten years £178 billion will be spent on a range of military platforms. While this won’t elevate the UK to the peak of global military powers, it will reassure allied partners that it’s a reliable security partner.

Large quantities of money are often associated with ‘big ticket’ military hardware, yet the UK has spent comparable sums on its cyber capabilities. At the launch of the 2010 SDSR, the sting of looming cuts were softened by the announcement that the Government would invest £500 million in cyber security. In the intervening period, that’s risen to an £860 million investment in a growing area of national security concern and potential advantage.

The 2015 SDSR announced that spending on cyber security will grow again with a commitment to invest a further £1.9 billion (A$S3.9 billion) over the next five years. When that sum is added to the core spending on cyber security capabilities to protect UK networks, the total spend amounts to more than £3.2 billion (A$6.5 billion).

The clear and concise wording of the document is just as significant as the money attached to it. The 2015 SDSR weaves together a clear articulation of the UK’s strategic goals in cyber along with a comprehensive narrative about the importance of cyber security to national and economic security, and introduces measures to enhance capability and skills in both areas. It commits the UK to remaining a world leader in cyber security to protect critical networks, to maintain high levels of confidence in its ability to protect business from cyber threats, to bolstering the digital economy to help it reap the economic rewards of high value cyber security technology and skills.

The lead component of the cyber section of the SDSR is the newly formed National Cyber Centre established under GCHQ’s leadership. This centre will have charge over operational responses to cyber incidents. Not only will it have an operational lead but it will also act as a focal point for companies seeking advice on cyber issues, simplifying previous arrangements.

There are three areas worthy of specific comment. First, the UK has worked hard over the past 10 years to mature the Government’s relationship with the private sector on cyber.. There’s a clear commitment to ‘share knowledge with British industry and with allies’, ‘help companies and the public do more to protect their own data’, and ‘simplifying private sector access to government cyber security advice’. That’s evidenced most strongly in the promise to develop a ‘series of measures to actively defend…against cyber attacks’, alluding to active defence tactics which aim to disrupt attackers prior to, or while they’re attacking a network. The SDSR states that those capabilities will be ‘developed and operated by the private sector’, which is a leap forward in coordination between the UK’s public and private sectors.

Despite efforts to build stronger relationships with the private sector on cyber, Australia is some way off being able to make these kinds of statements. There’s a continuing journey that needs to be undertaken in order to reach the same level of maturity that the UK has achieved.

Second, the SDSR details a significant investment in creating highly qualified and skilled personnel, including £20 million to open an Institute of Coding to fill the current gap in higher education. A £165 million Defence and Cyber Innovation Fund was also announced to support innovative procurement across government, alongside two new cyber ‘start-up’ centres where new companies can incubate their tech in the early stages of development.

Finally, one of the most striking aspects of the plan was the emphasis placed on developing offensive cyber capability. The UK has firmly stated that it has this capability and will use it as a tool of national power and to respond to security threats. George Osborne used strong words to underscore this part of the plan:

‘Part of establishing deterrence will be making ourselves a difficult target…We need to destroy the idea that there is impunity in cyberspace…We are building our own offensive cyber capability—a dedicated ability to counter-attack in cyberspace.’

Following on from the US admission in 2010, this further illustrates an emerging trend among Australia’s allies to publically state their capacity to conduct or develop offensive cyber operations. A clear statement of the way Australia views the use of offensive cyber capabilities would be a welcome addition to the Australian Defence White Paper when it emerges.

There are lessons for Australia on the cyber front here. First is the use of committed, firm ideas and language which are backed financially. We are yet to see how much the Australian Government will invest in this important area of national security. Second, there’s a clear articulation of the linkage between cyber security, economic security, digital innovation and national security. Australian cyber strategy will hopefully follow suit. Finally, there’s evidence of a mature and trusted relationship between Government and the private sector built over time, which Australia can afford to do much better at. With both a Cyber Review and a Defence White Paper due imminently, expectations will be high that Australia can deliver on both fronts.

War and peace in China’s cyber space

13334080323_641e55ab35_z

China’s top spy and Politburo member, Meng Jianzhu, made a highly unusual four-day visit to the US in early September where he forged an agreement between China and the US to cooperate more deeply on cyber security issues. The Meng visit was intended to smooth the way for the visit of President Xi and to allow him to announce with President Obama on 25 September new progress by senior officials in this area.

The two countries agreed to investigate complaints by each other about malicious cyber activity, to cooperate more on resolving criminal investigations, and not to undertake commercial espionage. On this last issue, they agreed not to ‘conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors’.

There’s clear distinction, as the two countries agree, between economic espionage for national purposes and commercial espionage intended only to benefit a firm in the civil economy. It’s a declared US policy to conduct economic espionage in order to maintain its technological edge over other countries; and China does it to catch up.

New disputes about the September 2015 cyber agreement will inevitably arise, and sooner rather than later. The saving grace, and the most solid diplomatic achievement on this front, was the agreement to set up at Cabinet level a Working Group to resolve disputes. On the US side, the Secretary of Homeland Security and the Attorney General announced on 25 September that they would be the leads and that their counterparts on the Chinese side would also participate.

This new Working Group follows a failed attempt beginning in April 2013 to set up a working level mechanism between the foreign ministries of the two countries on cyber security. This was suspended by China in May 2014 when the US brought indictments against five personnel from China’s armed services for industrial espionage.

The agreements will provide a brief respite in diplomatic angst around China and cyber space. But some of this concern is misplaced, as leading scholars and I have argued at length elsewhere in respect of the economic impacts of Chinese cyber espionage.

Yet, regardless of the estimates of impact on the US economy, there is little likelihood that China’s PLA will change tack on cyber-enabled economic espionage. Its internal security agencies may be watching more closely any illegal relationships between PLA cyber units and the Chinese ‘commercial sector’.

The US and China are locked in a fierce struggle in cyber space. It’s intensifying, even as the two sides manage to agree occasional elements of détente to defuse the tension. The stakes are high; at the extreme end of the list of concerns, the command and control of nuclear weapons (especially intelligence, surveillance and targeting aspects) depend in part on a securable cyber space.

For its part, China sees the cyber struggle with the US in three dimensions: internal security to support the continued rule of the Communist Party, China’s relative military backwardness in cyber space; and its overall technological backwardness in cyber space aspects of the civil economy. As outlined in my book, Cyber Policy in China, Beijing sees this struggle as asymmetrical, a situation that imposes on it an obligation to ‘push the envelope’ in all areas of policy while trying to maintain functional cooperation with the US in important areas of economic policy.

While pushing the envelope, there are several reasons why economic considerations force China to maintain a cap on its cyber confrontations with the US. The biggest reason is that China badly needs US investment and advanced know-how in the information technology sector. China has only a weakly developed cyber security industry.

This imperative is captured in a gem of understatement by the Chinese foreign ministry when it said in a summary of the Xi visit that future cyber strategies by both sides ‘should be consistent with WTO agreements, …take into account international norms, be nondiscriminatory, and not impose nationality-based conditions or restrictions’ on bilateral ICT trade and technology transfer—at least not ‘unnecessarily’.

The final sentence above is important for Australia. The US and China have agreed to limit the use of national security as a criterion for evaluating bilateral cyber trade and investments. Australia now needs to abandon its blind belief in US propaganda about the exaggerated economic impact of China’s cyber espionage. It needs to pursue more aggressively the opportunities for investment in China’s ICT sector, including in cyber security.

Most importantly, it needs to emulate the recent US move and set up a high level working group with China led by our Attorney General to address deeper cyber cooperation, as well as malicious activity.

Cybersecurity: escaping future shock

11407107023_b52fa108f7_z

Mike Burgess, Telstra’s Chief Information Security Officer, claims that attributing blame for cyberattacks is a ‘distraction’. It’s hard not to empathise with his views when, according to the Australian Centre for Cyber Security, 85% of the threat of intrusion could be mitigated by the implementation of baseline protection measures. Burgess also pointed out that while attributing blame is an important component of preventing attacks, they are too often discussed in amorphous and hyperbolic terms when describing their sophistication.

Burgess has decades of experience in intelligence and security and unlike many others is well past the future shock of cybersecurity. At present, the capability of actors to penetrate networks is increasing, as is their ability to do damage. If you ever want to induce a sense of utter helplessness in your CEO, just show them this raw feed of cyberattacks from Norse. The reality is that good intelligence on actors and their capabilities is fairly useless unless a company has a strong understanding of what it’s exposed to. Context is everything when it comes to raw data.

It doesn’t help that many leading cybersecurity researchers fail to discuss these events within their wider context; and many of the top cybersecurity programs treat the subject matter as an extension of computer science and engineering. To security studies, cybersecurity is one area, amongst a range of others where threats exist in asymmetric terms. Authors are largely yet to work across these disciplines when discussing such threats. An example of this is found in Sandria’s work on Cyber Threat Metrics, which attempts to reinvent the wheel rather than work within the existing context of existing security threats. In Clausewitzian terms, cybersecurity is just security by other means. The literature on security, threat, perception, signaling and a range of other areas is sitting there waiting to be leveraged rather than reinvented.

There’s a great deal to be gained by discussing cybersecurity as an extension of existing trends. The relative youth of cybersecurity as a subject area means that it hasn’t yet been integrated into the wider literature. While that’s not unexpected it is something that needs to be addressed. In the early days of nuclear weapons, Oppenheimer had to reach for the Bhagavad Gita for an eloquent expression of future shock. Today’s cybersecurity researchers have no need to reach so far back for a meaningful comparison. Science transforming the security environment is nothing new: nuclear weapons were first discussed by the scientists that invented them, then by the military and then finally harnessed by statesmen. A similar thing is naturally occurring in cyberspace.

In reckoning with present trends, cybersecurity faces an uphill battle where opponents are increasing in capability and responses are uneven. While it is all well and good to proactively deter attack, if a company has a flat network architecture and never updates its software, it probably won’t do very much to limit exposure in the medium to long term. A few years ago US retail giant Target had invested over a million dollars in malware detection tools from FireEye. So despite possessing functioning notification tools, Target did nothing when they detected an attack. The breach compromised 40 million debit cards and the personal details of 70 million people, and cost the company more than US$146 million. Spending money on the right tool is useless if the company isn’t getting the basics right.

Another area of potential change is the ongoing debate over when to report an attack. Companies are not convinced that it will be to their benefit if they disclose attacks, and an increasing number in Australia don’t. Companies also fear a loss of confidence by investors if they disclose an attack. There’s presently a move in the European Union towards mandatory reporting. In 2013, Pricewaterhouse Coopers estimated that in the course of a year some 93% of large British companies had suffered a cybersecurity breach. The same report lists the median number of breaches per company at 113 over the same period, with the average cost of a large company’s worst breach coming in at over £400k.

So we understand, to some degree, the context and scope of the threat. And while it’s a threat that’s increasing, the vast majority of cybersecurity conundrums are manageable at present. New methods of attack aren’t a distraction but they are a second order problem and ought to be treated as such. The first step is to recognise the risk and implement the already identified best practice strategies to manage the threat. Moving on from there, the second order debates of reporting, classifying threats and auditing systems will take place. Burgess is right when he notes that second order problems currently dominate the discussion, but can this be seen as a natural extension of the uneven development of cybersecurity as a field? Many companies, for their part, must work to escape the future shock—cyber threats are real but so are the basic strategies on how to manage the risks they pose.

Australia’s in a strong position to close the gap between awareness and response. Under Burgess, Telstra has proactively produced industry-based reporting on the present situation. Along with this, the Australia Cyber Security Centre was launched in November 2014. That same organisation has produced an unclassified threat report that represents a good first step. Finally, CERT Australia is attempting to develop the space between government and industry where effective collaboration can flourish.

Each of the organisations mentioned above has constructed the beginnings of a collective response to cybersecurity. Being overwhelmed by risks is an extension of not understanding their context. Australia is on a strong path to cooperatively and proactively respond to cyber threats if those problems are tackled in order and in a collaborative manner.

Cyber wrap

T-Mobile

Researchers in Singapore have demonstrated how hackers can use a smartphone mounted on a drone to steal data intended for wireless printers. The technology detects an insecure printer and intercepts documents by establishing a fake access point that mimics the printer, tricking the computer into sending potentially sensitive data straight to the hacker’s device. Thankfully, this research springs from benevolent motivations and the ‘Cybersecurity Patrol’ app that has been produced is a cost-effective way to scan office spaces and alert corporations to any insecure printers. However, it’s a good reminder for companies to address a vulnerability that’s frequently overlooked. Watch a video exhibiting both the malicious and beneficial uses of this technology here.

Speaking of hackers, Russian hacker Dimitry Belorossov has been sentenced to four and a half years in prison for distributing and operating part of the infamous ‘Citadel’ botnet. Also known as ‘Rainerfox’, Belorossov used the banking Trojan to infect and remotely control more than 7,000 computers of unsuspecting individuals and financial institutions. The US Department of Justice estimates that Citadel reached over 11 million computers worldwide and resulted in more than US$500 million in losses. The 22 year old was sentenced this week after being arrested in Spain in 2013 and pleading guilty to conspiracy to commit computer fraud last year.

In Washington DC, Ari Schwartz this week stepped down as Senior Director for Cybersecurity on the National Security Council. Schwartz joined the White House in 2013 as Director for Cybersecurity Privacy, Civil Liberties and Policy, has been a vocal advocate of information sharing and became a trusted advisor to the Obama administration. The administration has a successor in mind so watch this space for an announcement.

A ruling from the European Court of Justice is pending on the future of ‘Safe Harbour’, an agreement that enables the transfer of customer data from the EU to the US. Since 2000, Safe Harbour has allowed US companies to self-certify that they fulfil EU data security standards and today is used by some of the world’s biggest technology groups including Facebook and Amazon. Concerns over the US’ laissez-faire approach to privacy, exemplified by recent NSA whistle-blower Edward Snowden, have elevated the sustainability of this agreement to the highest court in the EU. The ruling could give national data protection authorities the power to challenge data transfers or even void the agreement altogether. Those outcomes would have massive implications for international technology companies, and some fear it may contribute to the widening cyber policy gap across the Atlantic.

The personal details of roughly 15 million T-Mobile customers have been compromised in a massive data breach this week. Names, addresses, birthdates, encrypted social security numbers, drivers’ license and passport numbers have been stolen from Experian, a vendor T-Mobile uses to process its customer credit applications. Fortunately the compromised data contained no credit card or banking information, however the details could be used to commit identity theft. CEO John Legere has said he will undertake a ‘thorough review’ of T-Mobile’s relationship with Experian and is offering affected customers two years of free credit monitoring.

Ironically for T-Mobile, the first week of October marked the beginning of America’s National Cybersecurity Awareness Month. President Obama designated the tenth month of every year as a time to ‘engage and educate public and private sector partners’ of the importance of cybersecurity. Sponsored by the Department of Homeland Security, this month-long awareness campaign promotes cybersecurity as a ‘shared responsibility’. Stay tuned for related events, speeches and weekly themes.

War at sea 1914-15: The virtual unreality (Part 2)

Ship radio

Command and control were key naval unknowns in August 1914. What hadn’t been properly appreciated in set-piece, largely visually conducted exercises before the war were the problems with radio. The full conceptual and practical difficulties associated with its use really only became apparent in the Grand Manoeuvres. These were neither frequent nor long enough to fully make the point. This would have fundamental implications for naval operations.

The potential of wireless to coordinate widely separated forces was appreciated almost from the first, just as the telegraph cable had been recognised in the nineteenth century. Before 1914, the Admiralty made heroic efforts to develop ‘network enabled’ warfare, with an Admiralty War Room as the operational command centre. But radios had problems of range, reception, wavelength, mutual interference and reliability, while there were difficulties with security, the encryption and decryption of signals and, above all, with the combined true and relative errors of navigation which meant that the ‘pool of errors’ was often very much greater than the prevailing visibility, particularly in the North Sea. Even if you were told were the enemy was and where he was heading, there was no guarantee—or even probability—that you would find him.

The greatest difficulty with radio, however, was that it created a ‘virtual unreality’, an unreality that navies were all too ready to immerse themselves within. Too many acted as though their commander were in sight—and this mattered.

Navies had a bi-polar culture of command, perhaps most extreme at the beginning of the twentieth century. Andrew Gordon has written an extraordinary book called The Rules of the Game examining the failures at Jutland. Gordon presents a compelling picture of the way that an over-controlling approach to tactics and manoeuvres created a system of operating a fleet at sea incapable of managing events under the actual stress of combat.

By their nature, however, navies arguably always operate this way. If ships are in company, then the culture is one of obedience to allow the admiral to coordinate the force to achieve the operational intent. This is still the case, because it generally works—and disobedience by a subordinate, such as Nelson’s apparent disobedience at the Battle of Cape St Vincent in 1797, is the exception that proves the rule. Such control is, of course, more effective if achieved by ensuring prior understanding of the intent, rather than frequent signalling.

Some of the British problems would be caused by more than the tight control of formations at sea, because this actually extended to control of everything. Following the flagship’s movements and routines was compulsory. If the flagship spread awnings, so did you. If the flagship declared a rest afternoon, so did you. This sort of thing, continued for day after day in every fleet or squadron when assembled, created not so much a culture of ‘senior officer veneration’, as one of ‘the senior officer present’.

This idea of ‘presence’ making the difference is important. The other part of the naval split personality was very different. If officers were out of visual contact, then they were expected to exercise their initiative. And they generally did. During the century of the Pax Britannica, such enterprise was consistently demonstrated, creating an expectation summed up by Lord Palmerston’s declaration that he would send a naval officer to solve a problem in distant lands.

There was at least partial awareness of the situation. We tend in 2014 to think of communication as practically instantaneous, but in the navy of the last century it was not, even for radio. A 1906 expert estimated that visual signalling speed rarely exceeded two and a half miles per minute in effect—and was often slower. Early experience of radio showed that its problems—even when ciphers weren’t in use—meant that its effective speed was often not much better and sometimes, much worse. The greater the distance, the greater the delay.

Furthermore, neither the language nor the concepts for communication by radio existed. This was why Army observers of naval manoeuvres had good reason to criticise. One senior observer noted that ‘the preparation of orders is not understood in the Navy, making all allowance for the general differences inherent’. The Navy had yet to develop a system for coordinating remote formations in a tactical environment, something with which the Army had been struggling for more than a century.

There were key aspects to be resolved. Before the radio, all tactical reporting was visual. This meant that the enemy had to be so close (either on the horizon or just over it) that absolute positional errors did not matter—what a commander was interested in was what the enemy bore and in what direction he was steaming. A remote report required not only much more precision—and the greater the distance the more important precision was – but also much more information. This was not fully understood. The first British radio format for an enemy contact report didn’t include either the enemy or reporting unit’s position, while the concept and practice of a tactical plot would take years to formulate.

However, the ‘virtual unreality’ came in the fact that, despite the limitations of radio, many commanders behaved as though their remote senior officer always knew more than they did, sometimes in direct contradiction of what they themselves were seeing. In the pre-war Grand Manoeuvres there were multiple instances of officers failing to act on their own initiative because they thought that higher authority somehow knew more.

Learning to use the new technology and changing the culture of command would take more than just the First World War to achieve. After the failures of the 1916 Battle of Jutland, an effort to return to the ideals of Nelson would be one of the principal concerns of the Royal Navy between 1919 and 1939. Events of the Second World War, starting with the Battle of the River Plate, suggest that this work to achieve cultural change wasn’t wasted.

History doesn’t repeat itself, but it does rhyme, and one particular rhyme of 2015 with 1914-15 is apparent to me. The ever greater reliance upon networks and the instantaneous exchange of information in what have, since the end of the Cold War, been largely uncontested electronic environments may have created a new ‘virtual unreality’ with an expectation that higher command will always be accessible, not only to give direction but to be consulted. Thus, commanders at sea may complain they are being micro-managed, but at the same time become reluctant to do anything without first clearing it with their seniors.

Will such a culture work in a cyber war?

Cyber wrap

Anonymous

China and the US have stolen the show this week with their negotiations of what may become the world’s first major arms control agreement for cyberspace. Bilateral discussions focus on establishing a no first use policy in regards to the targeting a state’s critical national infrastructure during peacetime. While potentially ground breaking, the agreement would bear no relevance to China’s alleged hacking of either US corporations or the Office of Personnel Management.

It’s a promising turn of events for what’s been a highly sensitive topic in the bilateral relationship. Obama has also refrained from enacting the proposed economic sanctions on Chinese corporations for the cyber theft of US intellectual property. There’s been a noticeable drop in the frequency of Chinese cyber attacks against US corporations recently, which may be an effort to build  good will in the lead up to Xi’s first state visit to Washington later this week. Unfortunately, tensions are far from resolved. At the same time as Xi’s visit, China will host a tech forum in Seattle where it’ll pressure US corporations to adopt a ‘pledge of compliance’ regarding company networks within China. The pledge requires companies to make their data ‘secure and controllable’, a condition that may involve providing authorities with backdoors to systems for surveillance. By successfully drawing large players such as Apple, Facebook, IBM, Google and Uber to the forum despite current bilateral tensions, the Chinese are set to demonstrate the leverage they wield over any cybersecurity discussion.

Two US Democratic Senators have shone the spotlight on automakers’ responsibility to secure their increasingly networked vehicles. Edward Markey and Richard Blumenthal requested information about cyber security policy from 18 large automakers this week, including BMW, Fiat Chrysler and Toyota Motor Co. A similar survey was conducted in December 2013, however, the recent hacking of a Jeep Cherokee in July has returned attention to the vulnerabilities of vehicle connectivity. Intel, which provides infotainment technology to some of the largest automakers and is a key target for potential hackers, has this week revealed its interest in the issue by establishing a new Automotive Security Review Board. This board will conduct security audits on its products and has already released a ‘white paper’ outlining automotive cybersecurity best practice.

There was a win for cybercrime fighters this week, with infamous Russian hacker Vladimir Drinkman pleading guilty to criminal charges. Drinkman and four other defendants are on trial in the US for stealing 160 million credit card numbers from corporations including Diners Singapore, Nasdaq, JCP, 7-Eleven, Dow Jones and Jet Blue. The group exploited SQL database vulnerabilities in order to install ‘packet sniffers’—malware that monitors and documents network traffic. Drinkman initially pled not guilty when captured in 2010 but has now confessed to his cybercrimes and is facing up to 30 years in prison. The theft incurred a corporate cost of $300 million, plus enormous private losses, and has been deemed the largest data breach scheme ever prosecuted.

The US has announced plans to post a prosecutor at Europol in order to facilitate greater international cooperation in the fight against cybercrime. US Attorney General Loretta Lynch said that the representative will be a day-to-day presence, aiding investigations into botnet networks and dark web marketplaces. Europol Director, Rob Wainwright, is hopeful that the presence of a US prosecutor will encourage the support of large US technology companies in international cybercrime investigations.

Anonymous has been busy this week, hacking government websites of both Vietnam and the Philippines. The infamous hacktivist group defaced the homepage of the Philippines’ National Telecommunications Commission (NTC) as a demonstration against poor internet service delivery. The group’s hack left a message protesting against the ‘over promised, under delivered system’ that it believes is an obstacle to equality of internet access. The breach came days after the agency’s service test which revealed ISPs falling short of advertised speeds, and has prompted the NTC to guarantee an increase in the monitoring of internet speeds starting in October.

Across the South China Sea, Vietnam suffered a blow to its government portal on its recent National Day thanks to the collaborative hacking efforts of Anonymous, AntiSec and HagashTeam. The cyber vandalism was an attempt to pressure the Vietnamese government to include political activists, journalists, bloggers and human rights defenders in their recent mass pardoning of more than 15,000 prisoners, including drug traffickers and murderers.

We’re (not really) under cyber attack

Not under attack

Last week’s release of the first Australian Cyber Security Centre (ACSC) Threat Report provides some sobering statistics and interesting case studies on the cyber threats facing Australia. It outlines the problem well, but beyond the usual missives to implement ASD’s Top Four Mitigation Strategies, it’s relatively mute on the response. This is a task that has likely been left for the Government’s Cyber Security Review to complete in the coming weeks.

It’s unsurprising to most that Australia endures constant attempts to breach public and private networks. The combined 12,204 incidents that either ASD or CERT Australia responded to in 2014, around 33 each day, provides some insight to the scale of cyber intrusions that the ACSC handles. The threat is also growing in sophistication, as cybercrime groups begin to rival the capability of some state-sponsored actors, demonstrating the enormous resources they’ve accumulated from their successes.

The ACSC has categorised cyber adversaries into three tiers: foreign state-sponsored, serious and organised crime, and issue motivated groups. The motivations of those groups vary, as does their capabilities. State-sponsored actors are the most capable, closely followed by the larger cybercrime syndicates. Those two actors have the most sophisticated capability and potentially the biggest effect on our national security and economic well-being. Issue motivated groups use less complex, more readily available capabilities, such as DDOS, to bring attention to their cause, without causing serious damage or harm. The ACSC predicts that terrorist groups will continue to be a nuisance in cyber space by defacing websites and using DDOS capabilities to draw attention to their cause, rather than pursuing the use of more destructive cyber capability as the financial and technical barriers to these more sophisticated tools lower further. .

The careful definition of the term cyber-attack is of particular interest to policy wonks. Used colloquially to describe just about any malicious act in cyberspace, for Government—and in particular the Defence-dominated ACSC—the term is defined as an act that seriously compromise national security. The report notes that Australia has never suffered an event that Government would consider to be a cyber-attack, but if it did, it may be considered to be an act of war. The imprecision of the common usage of ‘cyber-attack’ would be unsettling for an agency that’s primarily responsible for responding to armed attacks on Australia. Careful definition provides greater clarity about how and when Defence is involved in responding to the many thousands of cyber intrusions Australia is subject to.

Government’s efforts appear to be bearing some fruit as the number of incidents ASD responded to has grown at a slower pace than in previous years, and the confirmed number of significant breaches of Australian Government networks has . The biggest hole in the statistics noted in the report is intrusions against the private sector, which the ACSC admits it has a more limited understanding of. This means that there’s potentially more cyber intrusion attempts occurring than is known, with attempts going undetected and unreported.

CERT’s statistics show that the energy, banking and financial services, and the communications, defence industry and transport sectors have reported the most cyber intrusion attempts. These sectors are more likely to have implemented the required capabilities to identify cyber intrusions as they are well aware of the impact of cyber threats on their business. Other industry sectors, like mining and resources and agriculture, also face similar risks, but report far fewer incidents. Government is encouraging the private sector to implement adequate measures and share information. However, without adequate understanding of the risk, there’s often little incentive to invest in expensive cyber security capabilities until a major incident has damaged a business’ reputation and bottom line. This is a shared problem, and many of our key partners such as the United States are struggling with the same issue.

While the Government’s work to build stronger cyber defences appear to be successful in the face of more numerous and sophisticated cyber adversaries, it seems that the private sector is still struggling to come to terms with cyber threats. ACSC offers its usual advice—that implementing ASD’s Top Four Mitigation Strategies will assist in deflecting all but the most determined adversary—but Government can do more. Better two-way information sharing with businesses will highlight the need for investment in cyber defence, a task made difficult by the classified nature of much of the cyber threat intelligence Government holds, and the sensitive nature of ACSC’s current accommodation which it shares with ASIO. This makes it difficult for business to engage with ACSC and to use the information it can furnish. The forthcoming Cyber Security Review should provide greater clarity on how Government intends to address the threats outlined in ACSC’s report, and hopefully how it will work with the private sector to make all of Australia a difficult cyber target.

ISIS pushes for offensive cyber capability

The nature of ISIS’s online presence is intended to do three things. Firstly, and most importantly for the longevity of its existence, it’s intended as a mechanism to attract and recruit members to its ranks. Secondly it’s a means through which ISIS aims to strike fear into the hearts of all that come across its frequently gruesome propaganda. Both objectives are well documented, but a third dimension to the ISIS presence online is emerging: their attempts to use cyberspace for offensive purposes.

By ‘offensive’ I don’t mean delivering cyber attacks that involve some kind of kinetic impact, but rather I refer to attempts to use the cyber domain to disrupt services, damage reputations and reveal sensitive data.

Over the past five months we’ve seen an uptick in offensive cyber activities by groups claiming an association with ISIS. In January US CENTCOM Twitter and YouTube accounts were suspended after  CyberCaliphate—a group claiming to support ISIS—had hacked into both, defacing them with pro-ISIS messages. While the hacks didn’t have a direct impact on CENTCOM’s operations, they were certainly embarrassing and akin to acts of ‘hacktivism’ we’ve seen from groups like Anonymous. Following up in February, the same group hacked into Newsweek and, of all things, Taylor Swift’s twitter account, defacing both with pro-ISIS messages and sending threatening messages to President Obama.

In March a group claiming to be the Islamic State Hacking Division published on JustPaste.it a list of photos, names, addresses and branch of US service personnel, which it claimed was taken from US military data servers. Accompanying the data was a statement from the group:

With the huge amount of data we have from various different servers and databases, we have decided to leak 100 addresses so that our brothers in America can deal with you…Kill them in their own lands, behead them in their own homes, stab them to death as they walk their streets thinking that they are safe.

In April we saw the most significant effort from a group purporting to be part of ISIS. The group managed to orchestrate a complete three-hour blackout of the French channel TV5Monde. They hacked into all 11 channels run by the company, along with its website and social media outlets. While the attack took place, the hackers placed documents on TV5Monde’s Facebook page, which they claimed were identity cards and CVs of relatives of French soldiers involved in fighting ISIS, accompanied by threats against the troops themselves. The Islamic State Hacking Division again claimed responsibility.

What this attack illustrated was the group’s increased degree of sophistication. There had clearly been an amount of pre-attack planning, including a degree of social engineering that had gone on in order to completely shut down the stations computer systems.

This isn’t the first time we’ve seen terrorist groups utilise the power of online systems and networks in their operations. In February 2010 Rajib Karim, an IT employee for British Airways (BA), was arrested for terrorism offenses. Having been in contact with radical preacher, Anwar al-Awlaki, he explained that he had access to BA’s servers and could erase all the data, causing massive disruption and financial loss of £20 million per day. Luckily he was arrested before he was able to carry out any kind of nefarious activity. Giving evidence at a UK House of Commons hearing on Cyber Security in 2013, Thomas Rid was asked the question, ‘Why hasn’t al-Qaeda carried out a cyber attack on a national infrastructure delivery point?’ He replied that ‘al-Qaeda are too stupid… You need skills and intelligence. Right now militants don’t have that.’ But ISIS, or at least those claiming to support the group, are now looking to take their cyber offensive to the next level.

Should we be worried about the self-styled CyberCaliphate and the potential for ISIS to launch highly sophisticated attacks against sensitive networks, similar to the STUXNET virus that was unleashed on Iran? At present, despite a clear elevation in capability, the answer would be ‘not yet’. Attacks of the magnitude of STUXNET require a level of financing, highly-skilled personnel and human intelligence gathering that an organisation such as ISIS simply can’t . The more likely scenario is that we continue to see websites defaced and social media accounts hacked.

But that’s no reason to be complacent about ISIS’ capabilities and its intent. The cyber domain provides the group with a low-cost means of harassing their enemies and publicising their cause. They’ve demonstrated an ability to utilise modern technology and unleash effective propaganda; and they’ve proven attractive to ‘tech savvy’ youngsters. With their successful take down of a major television company, confidence will have increased and the next attack will be planned with greater ambition. There’s no reason that ISIS won’t work to mature what has so far been a successful strategy and capability. In many ways this reflects what we’re seeing in the broader cyber threat environment: the cyber domain is becoming a key part of offensive operations for any group, be it a government, criminal organisation or terrorist group. Over the last five months ISIS have shown us that they are pushing to close the knowledge and capability gap when it comes to offensive cyber operations. We’d be wise to keep a close watch.

Cyber wrap

CIA director John Brennan

The CIA is set to undertake one of its largest-ever internal restructures since its inception in 1947. The reorganisation will see a new ‘Directorate of Digital Innovation’ join the agency’s four existing directorates. CIA head John Brennan explained in a public memo:

Digital technology holds great promise for mission excellence, while posing serious threats to the security of our operations and information, as well as to U.S. interests more broadly…We must place our activities and operations in the digital domain at the very centre of all our mission endeavours.

The new directorate will play in the space between NSA’s traditional SIGINT role and Cyber Command’s warfighting remit. Jim Lewis elaborated, ‘If you think of NSA as a vacuum cleaner and Cyber Command as a hammer, this is a little more precise, and it’s about supporting human operations’. Read more

Tag Archive for: Cyber

Nothing Found

Sorry, no posts matched your criteria