Since October is National Cybersecurity Awareness Month, I thought it appropriate to open this thread.
Some quotes;
Working Definitions
Cyberwarfare. Defensive (Cybersecurity) and offensive (Cyberattack) measures, carried
out in the Internet domain, to achieve anonymous advantage over information.
Cyberattack refers to the digital penetration of telecommunications or Internet systems by a nation-state, NGO, corporations or individuals; for the purposes of data theft, espionage, harassment, or the sabotage of computer systems or the physical infrastructure they control.
Cyber counter-intelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions.
Cybersecurity. Also known as information security. The objectives of CS includes protection of information and property from theft, corruption and attack, while allowing the information and property to remain accessible and productive to its intended users. Cybersecurity includes the identification of system vulnerabilities, the hardening of networks, and the detection and prevention of intrusion.
Hackers. In reference to Cyberwarfare, the term hacker normally signifies someone who circumvents a computer system's security with malicious or criminal intent (also: Cracker). In a more general context, however, hacker is also used as a slang synonym for computer expert or hobbyist - usually suggesting an antiauthoritarian and free-Internet philosophy.
There are two main cyber-security organizations in the US;
Homeland Security, a cabinet department of the United States federal government, is responsible for domestic, infrastructure and commerce protection under NCSD, The DHS National Cyber Security Division.
NCSD is responsible for the response system, risk management program, and requirements for domestic cyber-security in the U.S. The division is home to US-CERT (Office of Cybersecurity and Communications) operations and the National Cyber Alert System. The DHS Science and Technology Directorate helps government and private end-users transition to new cyber-security capabilities. This directorate also funds the Cyber Security Research and Development Center, which identifies and prioritizes research and development for NCSD. The center works on the Internet's routing infrastructure (the SPRI program) and Domain Name System (DNSSEC), identity theft and other online criminal activity, Internet traffic and networks research. On October 30, 2009, DHS opened the National Cybersecurity and Communications Integration Center. The center brings together government organizations responsible for protecting computer networks and networked infrastructure.
United States Cyber Command (USCYBERCOM), located at Ft. Meade, is led by USA General Keith B. Alexander. "Cyber Command" centralizes military command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks.
USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to it's adversaries.
Other government agencies, like the FBI's Computer Investigations and Infrastructure Threat Assessment Center (CITAC), the Marine Corps Forces Cyberspace Command, or commercial entities like McAfree, Microsoft or Norton, are either part of DHS and CyberCom, or work closely with them.
Items of interest;
Problems and controversy;
There has been debate on whether the term "Cyberwarfare" (formerly "Infowar") is accurate. Despite efforts by the language police however, Cyberwar is now the most commonly used term to describe Internet and telecomunications attacks, penetrations, sabotage and espionage.
The problem of Attribution - Who did it? Cyberattacks can be launched from literally anywhere, including cybercafés, open Wi-Fi nodes, and suborned third-party computers - especially at universities. They do not require expensive or rare machinery. They leave next to no unique physical trace. Thus, attribution is difficult, often guesswork.
Escalation. Even if retaliation is in kind, counterretaliation may not be. A fight that begins in cyberspace might spill over into the real world with grievous consequences.
Vulnerability. Targetted systems must possess weakness that can be identified, penetrated and manipulated to the attacker's advantage. Cybersecurity's intent is to eliminate vulnerabilities.
There are concerns that the Pentagon and NSA will overshadow any civilian cyber defense efforts. There are also concerns on whether Cyber Command will assist in civilian cyber defense efforts. There are traditional Big Government and Big Brother concerns and questions about American civil liberties, privacy, constitutional protections and Internet freedom. "The only problem is that the Internet, by its very nature, has no borders and if the U.S. takes on the mantle of the world's police; that might not go down so well." - General Alexander
The question of Cyberwar talent. In the United States most college campuses are hostile to military recruiting programs. The best computer talent (grads) goes to private industry which pays higher salaries. There are also salary caps to civilians in Homeland Security. Concerns are that US Cyber defense will be composed of amateurs. As has been the traditional case with military pilots - military cybertechs - just as they become experienced and most effective, will leave the service to find better paying jobs in the commercial world.
Conclusion
Clausewitz said, "War is the continuation of Policy by other means". I would paraphrase Clausewitz and say, "Cyberwar is the continuation of warfare by other means". To strike at your enemy without bullets or bombs - or to defend yourself from his cyber attack, is a higher level of asymetrical warfare.
Some quotes;
Spoiler :
"Like everyone else who is or has been in a US military uniform, I think of cyber as a domain. It is now enshrined in doctrine: land, sea, air, space, cyber. It trips off the tongue, and frankly I have found the concept liberating when I think about operationalizing this domain. But the other domains are natural, created by God, and this one is the creation of man. Man can actually change this geography, and anything that happens there actually creates a change in someone’s physical space. Are these differences important enough for us to rethink our doctrine?"
-General Michael V. Hayden, USAF, Retired.
"The establishment of the U.S. Cyber Command marks the ascent of cyberspace as a military domain. As such, it joins the historic domains of land, sea, air, and space. All this might lead to a belief that the historic constructs of war—force, offense, defense, deterrence—can be applied to cyberspace with little modifcation. Not so. Instead, cyberspace must be understood in its own terms, and policy decisions being made for these and other new commands must relect such understanding.
-Cyberdeterence And Cyberwar, MARTIN C. LIBICKI
"Adding an efficient and effective cyber branch alongside the Army, Navy and Air Force would provide our nation with the capability to defend our technological infrastructure and conduct offensive operations. Perhaps more important, the existence of this capability would serve as a strong deterrent for our nation's enemies." - Gregory Conti and John Surdu (USARDC)
-General Michael V. Hayden, USAF, Retired.
"The establishment of the U.S. Cyber Command marks the ascent of cyberspace as a military domain. As such, it joins the historic domains of land, sea, air, and space. All this might lead to a belief that the historic constructs of war—force, offense, defense, deterrence—can be applied to cyberspace with little modifcation. Not so. Instead, cyberspace must be understood in its own terms, and policy decisions being made for these and other new commands must relect such understanding.
-Cyberdeterence And Cyberwar, MARTIN C. LIBICKI
"Adding an efficient and effective cyber branch alongside the Army, Navy and Air Force would provide our nation with the capability to defend our technological infrastructure and conduct offensive operations. Perhaps more important, the existence of this capability would serve as a strong deterrent for our nation's enemies." - Gregory Conti and John Surdu (USARDC)
Working Definitions
Cyberwarfare. Defensive (Cybersecurity) and offensive (Cyberattack) measures, carried
out in the Internet domain, to achieve anonymous advantage over information.
Cyberattack refers to the digital penetration of telecommunications or Internet systems by a nation-state, NGO, corporations or individuals; for the purposes of data theft, espionage, harassment, or the sabotage of computer systems or the physical infrastructure they control.
Cyber counter-intelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions.
Cybersecurity. Also known as information security. The objectives of CS includes protection of information and property from theft, corruption and attack, while allowing the information and property to remain accessible and productive to its intended users. Cybersecurity includes the identification of system vulnerabilities, the hardening of networks, and the detection and prevention of intrusion.
Hackers. In reference to Cyberwarfare, the term hacker normally signifies someone who circumvents a computer system's security with malicious or criminal intent (also: Cracker). In a more general context, however, hacker is also used as a slang synonym for computer expert or hobbyist - usually suggesting an antiauthoritarian and free-Internet philosophy.
There are two main cyber-security organizations in the US;
Homeland Security, a cabinet department of the United States federal government, is responsible for domestic, infrastructure and commerce protection under NCSD, The DHS National Cyber Security Division.
NCSD is responsible for the response system, risk management program, and requirements for domestic cyber-security in the U.S. The division is home to US-CERT (Office of Cybersecurity and Communications) operations and the National Cyber Alert System. The DHS Science and Technology Directorate helps government and private end-users transition to new cyber-security capabilities. This directorate also funds the Cyber Security Research and Development Center, which identifies and prioritizes research and development for NCSD. The center works on the Internet's routing infrastructure (the SPRI program) and Domain Name System (DNSSEC), identity theft and other online criminal activity, Internet traffic and networks research. On October 30, 2009, DHS opened the National Cybersecurity and Communications Integration Center. The center brings together government organizations responsible for protecting computer networks and networked infrastructure.
United States Cyber Command (USCYBERCOM), located at Ft. Meade, is led by USA General Keith B. Alexander. "Cyber Command" centralizes military command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks.
USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to it's adversaries.
Other government agencies, like the FBI's Computer Investigations and Infrastructure Threat Assessment Center (CITAC), the Marine Corps Forces Cyberspace Command, or commercial entities like McAfree, Microsoft or Norton, are either part of DHS and CyberCom, or work closely with them.
Items of interest;
Spoiler :
Current US military strategy makes explicit that a cyberattack is a casus belli, just as a traditional act of war.
In 2011 there were 403 million unique variants of malware, compared to 286 million in 2010. (Source: Symantec ISTR, April 2012)
At 54% combined, the government/public sector, manufacturing and finance were the most targeted industries when it came to email cyber attacks in 2011. (Source: Symantec)
Companies are increasingly using cloud applications instead of company-managed software to store files or communicate. Although there are benefits to cloud computing, there are also cyber security and legal risks involved. (Source: Symantec ISTR, April 2012.)
In 2011 there were 403 million unique variants of malware, compared to 286 million in 2010. (Source: Symantec ISTR, April 2012)
At 54% combined, the government/public sector, manufacturing and finance were the most targeted industries when it came to email cyber attacks in 2011. (Source: Symantec)
Companies are increasingly using cloud applications instead of company-managed software to store files or communicate. Although there are benefits to cloud computing, there are also cyber security and legal risks involved. (Source: Symantec ISTR, April 2012.)
Problems and controversy;
There has been debate on whether the term "Cyberwarfare" (formerly "Infowar") is accurate. Despite efforts by the language police however, Cyberwar is now the most commonly used term to describe Internet and telecomunications attacks, penetrations, sabotage and espionage.
The problem of Attribution - Who did it? Cyberattacks can be launched from literally anywhere, including cybercafés, open Wi-Fi nodes, and suborned third-party computers - especially at universities. They do not require expensive or rare machinery. They leave next to no unique physical trace. Thus, attribution is difficult, often guesswork.
Escalation. Even if retaliation is in kind, counterretaliation may not be. A fight that begins in cyberspace might spill over into the real world with grievous consequences.
Vulnerability. Targetted systems must possess weakness that can be identified, penetrated and manipulated to the attacker's advantage. Cybersecurity's intent is to eliminate vulnerabilities.
There are concerns that the Pentagon and NSA will overshadow any civilian cyber defense efforts. There are also concerns on whether Cyber Command will assist in civilian cyber defense efforts. There are traditional Big Government and Big Brother concerns and questions about American civil liberties, privacy, constitutional protections and Internet freedom. "The only problem is that the Internet, by its very nature, has no borders and if the U.S. takes on the mantle of the world's police; that might not go down so well." - General Alexander
The question of Cyberwar talent. In the United States most college campuses are hostile to military recruiting programs. The best computer talent (grads) goes to private industry which pays higher salaries. There are also salary caps to civilians in Homeland Security. Concerns are that US Cyber defense will be composed of amateurs. As has been the traditional case with military pilots - military cybertechs - just as they become experienced and most effective, will leave the service to find better paying jobs in the commercial world.
Conclusion
Clausewitz said, "War is the continuation of Policy by other means". I would paraphrase Clausewitz and say, "Cyberwar is the continuation of warfare by other means". To strike at your enemy without bullets or bombs - or to defend yourself from his cyber attack, is a higher level of asymetrical warfare.