Govt 11: Cybercrime and Cyber warfare (v1.0)

Key reference is Prof Paul Rosenzweig of George Washington University.  

The world woke up in July 2010 to a new era. The cyber mantra up to that point was effects of cyber-attacks would be restricted to the cyber domain. Symantec discovered more than 400 million pieces of malware in 2011 and rendered them harmless. But a new malware arrived in 2010 called STUXNET that ushered the world into a new era. STUXNET was very sophisticated, and managed to penetrate all the defenses, and rendered at least 1000 centrifuges inoperable in the Iranian uranium enrichment plant in Natanz. It required a great deal of insider knowledge of the actual systems involved. It is estimated to have set back the Iranians by at least 2 years in their nuclear quest. More than the actual damage, it was a clear warning by hostile powers to Iran that it was vulnerable. Malware like that could cause immense harm to just about any system controlled by computers including power plants, drones, missiles, aircraft, weapons, dams, water systems, electric GRID, financial institutions, etc. Since computers are ubiquitous, they threaten the whole world. 

The internet was enormously successful because it was simple (and somewhat dumb) and open, transparent, and interoperable and very flexible and very easy to use. Access to it is not controlled. No one person controls it. Anyone can extend it by purchasing a DNS name. Security and identity were not a major focus.  It is therefore vulnerable. There are over 2.5 billion users worldwide. There are over 630 million domain names with 22% in the US. Every minute 1800 terabytes of new information are created. Every 2 days we create as much information as from the dawn of civilization up until 2003!! The network itself is made up of much hardware and infrastructure and physical communication links located across geography and highly distributed and is gigantic.  Anything connected to the internet is potentially hackable.

 There are five features of the internet that make it especially vulnerable. It is borderless - it is hard to control the flow of information across borders. It allows anonymous action and there is also the problem of attribution - identification is hard to do. It allows instantaneous action at a distance. It is an asymmetric system where small actors at low cost can have disproportionate effects.  Lastly all the information is 1's an 0's and there is no distinction between different types. Now a days a lot of attention is being focused on how to defend critical systems from cyber-attacks. At the same time countries or even criminals or hacking groups are devoting a lot of effort to attack the systems of an enemy or ransom or theft target. You as a user should also take actions to protect yourself. 

Malware exploit security flaws in software at the OS, networking, or application level. Once the flaw is known, it could be fixed with a software security update. A newly discovered flaw is very valuable to a hacker. When that attack is launched, it is called a zero-day attack and is frequently used in highly consequential attacks. The first virus to ever infect a PC was a harmless demonstration virus called Brain.A in Jan 1986. Today there is an attack taking place every day. They disable, disrupt, degrade, or destroy. The simplest is a DDoS attack (Distributed denial of service attack). It makes a huge number of fake requests from many infected hosts stealthily controlled by the instigator (called botnets) to overwhelm a website. The website’s data though is fine. Botnets can also do other things like send spam. Web crawlers or spiders may crawl through the internet to capture information like your email address. The Conficker botnet was over 9 million strong!! An infected host tries to spawn itself to other hosts possibly through a email. In Trojan, the malware is hidden inside a legitimate program that you download. Do NOT click on links or open attachments in emails or download programs you are not sure of!! "Phishing" refers to an attempt to steal sensitive information by masquerading as a reputable source with an enticing request to lure the victim in order to trick them. Spear-phishing attacks target a specific victim, and messages are modified to specifically address that victim, purportedly coming from an entity they are familiar with and containing personal information. Spywares are threats that reside for a long time and makes the computer vulnerable to continuous monitoring from the outside including monitoring all keystrokes, turn on webcam, or monitor voice input. A logic bomb is a string of malicious code inserted into a program to cause harm when certain conditions are met. Adware is software that automatically displays or downloads advertising material (often unwanted) when a user is online.

How prevalent are these attacks? We don't really know. Government does not count anymore. A limited study in Canada estimated that there were 80,000 zero day exploits a day. That there were 1.5 million compromised computers on any day. These attempted 21 million botnet connections a day. It is estimated military systems are probed thousands of times and scanned millions of times a day. It was estimated in 2021 that worldwide losses due to cyber-crime could be about 6 trillion dollars a year and could increase to 10.5 trillion by 2025. Intellectual property theft losses constitute a significant part of it. 

A big segment of cybercrimes/fraud is theft of money or identity or documents/information/media of high value. It is endemic and pervasive. Many of these cybercrimes are like regular crimes. Most are covered by existing laws. Some though are much harder to prosecute. The Nigerian scam is an example that is custom tailored to cyberspace that is hard to prosecute. The dupe is promised a large sum but is asked for a small upfront charge that increases over time for various reasons. This is sent to millions of people. Even if only a small percent fall for it, it is still very profitable.  There are many scams. Economic espionage is another driver including intellectual property theft that sometimes originates in China. Many attacks today are launched by organized crime syndicates that are sometimes based in Russia. 

Another category of crimes is computer crimes. Assuming a fake identity that is not allowed by that social media, or an employee emailing a confidential document that was not allowed, hate posts that are not allowed, etc. This is covered by the CFAA (Computer Fraud and Abuse Act). But CFAA likely makes hack back a crime (an aggressive defensive measure a company can use). 

Hacktivism is a phenomenon where many protesters or activists of some policy of government decide to launch a coordinated attack on a country's government website to protest or show their displeasure. This happened in Estonia with a DDoS attack from Russian hackers, and it brought the government to its knees. These typically are simple in form like a DDoS attack or defacement of a website.  Wikileaks and anonymous are other examples which were more sophisticated. Anonymous borders on cyber insurgency. Many more have sprung up. There are also counter "good" groups like the happy Ninjas who focus on fighting these other groups.  Much of the internet is physically in private hands. Corporations that object to some government policy can potentially cause the parts they control to "malfunction". 

Nations are increasingly considering cyberspace as a separate domain for conflict. There is no clear consensus on what exactly it is and its scope. But some form of Cyberwar is inevitable. The pentagon's policy is that if there is a cyber-attack that can be categorized as an act of war then the US will use absolutely any means at its disposal for a proportional response. But the hard part is deciding what is an act of war in cyber space. 

So what are the defenses available? That will have to wait for a later essay. 


Comments