Pages

23 January 2015

Are the Chinese Capable of Mounting a “Cybergeddon” Attack on the US?

January 21, 2015

An American government official, Xiafen Chen, was arrested in October and charged with supplying China with classified data about American dams. This is part of a Chinese effort to collect detailed data on American infrastructure and other economic targets to support preparations for Internet based attacks on these facilities in wartime, or anytime. Xiafen Chen and her husband moved to the U.S. from China in 1992 and later became American citizens. The FBI found emails in which Xiafen Chen discusses the data she took from U.S. government databases and passed to senior Chinese officials.

The U.S. government has been aware of this Internet threat for over a decade and has been trying to develop a way to respond to a serious Cyber War attack, one in which the attacker does not reveal who they are. The data the Chinese received from Xiafen Chen could be used for such an attack.

Back in 2010 American officials created lists of the types of kind of attacks that would qualify as an “act of war”, and thus deserving of a violent response. That was easy enough if there was substantial physical damage from the attack. This was the case in Iran during 2010 after the Stuxnet worm got finished with their uranium enrichment centrifuges. Similar damage could be done to electrical power systems, water and sanitation utilities and some kinds of industrial facilities (steel making, chemical, refineries, and so on.)

The big problem is not proving some malignant software was inserted in a facility and did damage. The big problem is proving who did it. While you can trace an attack, you can also, as the attacker, leave a false trail to another location (in another country). What the Americans are apparently trying to do is establish criteria for “network forensics” (investigating an attack and tracing where who came from where for what purpose) that will be widely accepted. At present, there are no such generally accepted criteria for proving who carried out a Cyber War attack.

The United States is apparently seeking to establish a method of identifying those who make these attacks and obtain international recognition of that guilt, so that America can then deliver some kind of retribution. This may involve nuclear weapons, but that would be a last resort. There are many other punishments that can be used, from diplomatic, economic, and up through non-nuclear military actions. Meanwhile, the United States is hustling, at least as far as press releases go, to improve American defenses against Cyber War class attacks. Catching Chinese spies and finding out what kind of data they were dealing in helps with this.

Meanwhile there is growing resistance to calls for more government regulations and mandates meant to protect America from this Internet based aggression. Civilian organizations fear that the government intervention will hurt network security. Worse, it’s difficult to get a rational discussion going on the subject, not with all the fear mongering by the mass media and government officials, plus defense contractors looking for more money.

For example, the FBI (which is responsible for detecting and investigating Internet based crime) has been issuing increasingly scary warnings that America is becoming ever more vulnerable to “cybergeddon” (a massive attack via the Internet that would cripple the economy, government and military.) The FBI admits that it has a hard time getting more money for their Internet security efforts. And a major reason is that the threat is largely invisible. A picture of a nuclear bomb going off, or of enemy tanks and warships ready to attack, makes a much more effective impression on the politicians who dole out the money. The NSA (National Security Agency) actually gets a lot of money for this work, but their effort is largely classified and no press releases are involved.

The FBI also wants to get the Department of Defense Internet defense operations more involved in national level defense against network based attacks. But the four services have a hard time agreeing to coordinate their efforts to defend military use of the Internet when under massive hacker attack. Thus the FBI plea for help sort of falls on distracted ears. But a growing number of politicians, and headline hungry journalists, are seeking to change that. The problem is, no one is exactly sure of how to do that.

While the politicians are eager to “do something,” there is little consensus on exactly what the something should be, and to what degree the government should be involved. For example, Internet technology changes far more quickly than new laws can be passed to adapt and keep up. Companies fear that government interference will drive their operating costs up, while providing little, or no, protection from Cyber War attacks.

A big problem is that there hasn’t been a proper, all-out Cyber War yet. There have been lots of skirmishes, but nothing approaching what a no-holds-bared battle, via the Internet, would be. What would the first Cyber War be like? Let’s be blunt, no one really knows. But based on the cyber weapons that are known to exist, and the ones that are theoretically possible, one can come up with a rough idea.

First, there are three kinds of Cyber War possible. Right now, we have limited stealth operations (LSO), as Chinese, Russian, and others, use Cyber War techniques to support espionage efforts. China is the biggest practitioner, or at least they have been caught most often. But getting caught carrying out Cyber War operations does not mean you have any human prisoners, just a pile of computer forensics. The Chinese simply deny everything and carry on.

Next comes Cyber War only (CWO). This is open use of a full range of Cyber War weapons. No one has admitted doing this yet, and it’s potentially less dangerous than firing missiles and unleashing tank divisions. It is believed that Russia indulged in this in 2007, when Estonia infuriated the Russians by moving a World War II statue memorializing the Soviet “liberation” of Estonia (which didn’t want to be liberated by the Soviet Union.) Russia denied responsibility for the massive Cyber War assaults on Estonia, which nearly shut down the nation’s Internet infrastructure. Estonia accused Russia of being responsible, and tried to invoke the NATO mutual-defense pact. NATO Cyber War experts went to Estonia, and shortly thereafter the attacks stopped. Apparently Russia got the message that this sort of thing could escalate into something more conventional, and deadly. This sort of thing is being cited by the United States as a reason for coming up with “this is war” criteria. Russia again used such tactics against Georgia in 2008 and Ukraine in 2014-15.

Then we have Cyber War in support of a conventional war. Technically, we have had this sort of thing for decades. It has been called “electronic warfare” and has been around since World War II. But the development of the Internet into a major part of the planet’s commercial infrastructure, takes “electronic warfare” to a whole other level. Cyber War goes after strategic targets, not just the electronic weapons and communications of the combat forces.

A successful Cyber War depends on two things; means and vulnerability. The “means” are the people, tools and cyber weapons available to the attacker. The vulnerability is the extent to which the enemy economy and military use the Internet and networks in general. We don’t know who has what Cyber War capabilities exactly, although China and the U.S. have openly organized Cyber War units, and both nations have lots of skilled Internet experts.

Vulnerability is another matter. The United States is the most exposed to Cyber War attack because, as a nation, Americans use the Internet more than any other country. That’s the bad news. The good news is that if an attacker ever tried to launch a Cyber War by assaulting the U.S., it could backfire. This risk has to be kept in mind when considering what a Cyber War might do. Recall military history. The Pearl Harbor attack in 1941 actually backfired on the Japanese, by enraging Americans and unleashing a bloodthirsty response that left Japan in ruins. The lesson of the original Pearl Harbor is, if you’re going to hit someone this way, better make it count. If your opponent is bigger than you, and gets back up, you could be in some serious trouble.

The big problem with Cyber War is that there has not been a lot of experience with it. Without that, no one is really sure what will happen when someone attempts to use it at maximum strength. But unlike nuclear weapons, there is far less inhibition about going all-out with Cyber War weapons. That is the biggest danger. Cyber War is a weapon of growing might, and little restraint by those who wield it. Things are going to get a lot worse.

No comments:

Post a Comment