This week in cyber conflict: July 18th – July 22nd

 The week started pretty much as we would expect with more discussion of the 24k files lost by the Department of Defense as disclosed by the Deputy Secretary Defense William Lynn in the previous week. The loss of classified information is not necessarily an act of war though and the rhetoric spinning up is interesting but not necessarily viable. James Lewis from CSIS wrote an interesting piece about what constitutes an attack. Though I have a tendency to pillory him (he won’t speak to me at conferences anymore) his piece does have a semblance of reason. I think he goes a bit far down a particular path but he’ll find his way to reason after a bit.

Throughout the week there are lots of articles showing up discussing how to “prepare” for cyber warfare. Most of these pieces are really about good information security practices and realistically most people can only hope to accomplish that. War is an attack on sovereignty and few incidents of network exploitation are going to be able to rise to that level of attack. More importantly cyber warfare is like naval warfare. It is a strategic suite of tools and techniques encompassing a variety of weapons and systems to accomplish military activities in a particular domain. It isn’t merely packet sniffing or spoofing Internet Protocol addresses. Few civilians or corporations are going be prepared to deal with naval warfare and why would we suddenly expect them to be ready to deal with cyber warfare. This is one of those logical fallacies so many people fall into so quickly. That cyber is so different that we can expect people to have ‘super’ powers or something.

There is another element to the rhetoric of cyber warfare that continues this week. The defense industrial base or colloquially the military industrial complex are out in force to sell their wares to the government and people. Which brings up the question of whether the rhetoric is nothing more than a push to sell more stuff to the military and government. Coupled with the nearly incomprehensible call for a “Internet kill switch” and legislation to authorize the president to push it (the President already has that power so we need legislation to say he has it again because…?). Now we have big dollars on the line and freedoms in the balance. If the efforts of the Transportation Security Administration (TSA) are any indicators freedoms will lose out to the boogeyman threat. Not that we had the freedoms in the first place.

The use of “attack” is taking on new connotations too. On the one hand we have an attack against Lady Gaga’s website and on the other hand the Gaza flotilla had their server farm attacked or more likely faced a denial of service. Neither case rises to cyber war and though in the second case a state proxy or sponsor may have been involved (wild speculation) in the first case it is more in the thread of hacktivism or hooliganism. What isn’t needed is articles like the Seattle Times put out referring to a cyber Pearl Harbor. More distant than 9/11 but lauded in movies and the national narrative the Pearl Harbor analogy is right up there with idiotic. Pearl Harbor happened as part of a long political struggle between peer competitors over substantial resources and rights of passage across numerous domains. Hawaii wasn’t even a state at the time of the attack (statehood was 1959) and though an ally and protectorate it wasn’t like the Japanese attacked Iowa. Pearl harbor for the time represented a projection of naval air power as a nation state took arms against another which was a relatively new concept but one we were well prepared to defend against. The element of surprise also is suspect even if the results aren’t. The cyber Pearl Harbor construct is no more relevant to the discussion than a cyber 9/11 or “remember the Maine”. Whatever happens in the future will be something new and unexpected. It won’t be even close to something that happened before.

There were arrests in the LulzSec and Anonymous cases. Much like I’ve said before the Internet is NOT anonymous and attribution is possible it just takes time. Like any forensics the process of evaluating and examining evidence even if it is computers simply takes a lot of time. I will not be surprised to see more arrests in the coming weeks. I do think that there are still individuals who have obscured their trail sufficiently to avoid arrest and prosecution but I also think they are in such a minority as to be simply not an issue.

Monday July 18th

24000 data files stolen from defense contractor in massive cyber attack
The Warner Robins Patriot
by Gene Rector Deputy Defense Secretary Bill Lynn said Thursday a massive cyber attack by a “foreign intelligence service” could force redesign of a new, developmental weapon system. Lynn said 24000 data files were stolen from an undisclosed defense 
See all stories on this topic »
The false cries and fog of ‘cyber war
GCN.com
This fog unfortunately applies not only to war but also to much that is being written today about war, and cyber war in particular. James Lewis, a senior fellow at the Center for Strategic and International Studies, has written a thoughtful commentary 
See all stories on this topic »
US Military System Design Badly Compromised in March Cyber Attack?
IEEE Spectrum
Secretary Lynn did state, however, that that cyber attack “… was done, we think, by a foreign intelligence service.” “In other words, a nation state was behind it.” Secretary Lynn declined to state which nation state he thought it was, or what the US 
See all stories on this topic »
MT Expert’s Ten Top Tips: Defending against cyber attack
Management Today
By Malcolm Marshall Friday, 15 July 2011 We’ve heard plenty about the impact hackers (of the non-phone variety) can have on a company. So how do you prevent it? With Sony, and even the CIA having fallen foul of hackers lately, we’re all aware of the 
See all stories on this topic »
Will Obama sign ‘Kill Switch Bill’ after theft of 24000 classified files?
The News International
A research conducted by The News International reveals that this is not the first time when the Pentagon has been hit by a cyber attack, as a similar offensive had also inflicted quite a lot of damage to its secrecy in 2008. 
See all stories on this topic »
Warp Pipe: Pentagon’s cyber war strategy
Newsday (subscription)
Click here Warp Pipe: Pentagon’s cyber war strategy Published: July 15, 2011 2:36 PM THE ASSOCIATED PRESS Facing escalating risks of cyberattacks by hackers, criminals and other nations, the Pentagon is developing more resilient computer networks so 
See all stories on this topic »
iBrowse: Pentagon’s cyber war strategy
Newsday (subscription)
Click here iBrowse: Pentagon’s cyber war strategy Originally published: July 15, 2011 2:36 PM Updated: July 15, 2011 5:00 PM THE ASSOCIATED PRESS Facing escalating risks of cyberattacks by hackers, criminals and other nations, the Pentagon is 
See all stories on this topic »
Northrop Grumman Discusses Cyber Security At BRIDEX Exhibition And Conference 
Science 2.0 (press release)
Northrop Grumman Corporation is participating as a keynote conference speaker on cyber warfareand is providing a series of cyber awareness seminars during the Brunei International Defence Exhibition (BRIDEX) and Conference, highlighting its 
See all stories on this topic »
Thoughts On The Era of Cyberwar
All Things Digital (blog)
But we’re still unfamiliar with the concept of cyberwar. In 1998, John Arquilla, professor at the Naval Postgraduate School, tried to envision it in a piece for Wired Magazine, The Great Cyberwar of 2002, in which a loose coalition of rogue states, 
See all stories on this topic »
U.S. Pentagon Recent Cyber Attack
Secaucus New Jersey News
There were 24000 sensitive data that were stolen due to the cyber attack made by a foreign government. The United States Department of Defense secretary, William Lynn, had said that the Pentagon’s sensitive data was stolen “from the computers of a 
See all stories on this topic »
Let Slip the Dogs of Cyberwar
Windows IT Pro (blog)
This week, we had the Pentagon both admitting that they had a major breach in multiple systems in March and putting forth a strategy for stronger response to future attacks. Deputy Defense Secretary William Lynn said that over 24000 files were stolen 
See all stories on this topic »
America Faced With Wave of Chinese Espionage
Daily Beast
Defense Department officials are struggling to plan for a massive cyber-attack from Beijing – and fend off spies in the meantime. Tara McKelvey reports on the secret warfare. Deputy Defense Secretary William Lynn III never said the word China in his 
See all stories on this topic »

Daily Beast
Lady Gaga’s Website Hacked by Swagsec
International Business Times
The cyber attack took place on June 27. But the attackers did not make it public until recently this week. The attackers also called the singer Homophobic and issued a death threat to her. “She’s upset and hopes police get to the bottom of how this was 
See all stories on this topic »

International Business Times
Ship to Gaza hit by cyber attack
The Local.se
The website of Swedish Ship to Gaza has been subjected to a cyber attack, in the latest setback to befall the aid and protest convoy the Freedom Flotilla II. The group were forced to shut down their website on Friday after a so-called overload attack 
See all stories on this topic »

The Local.se
Pentagon Working On Cyber Warfare
iNEWP- Freedom of Speech
After initial uproar over the news of an unknown robbery of nearly 24000 files back in March 2011 subsided, the United States Department of Defense, namely the Joint Chiefs of Staff, decided to work on a new strategy for both its cyber defense and 
See all stories on this topic »
Cyber attack on Gaga
gulfnews.com
The cyber attack happened on June 27 but those responsible didn’t make the information public until this week. The hackers, who also issued a death threat against the singer, bizarrely branded her homophobic. “The hackers took a content database dump 
See all stories on this topic »

gulfnews.com
One if by Land, Two if by Sea and Three if by Cyberspace
AllGov
For now, the Pentagon is taking a low-key public approach to “cyber war,” opting for cooperative strategies of “cyber hygiene” and data sharing rather than confrontational poses. And, in fact, last year White House Cyber Czar Howard Schmidt denied 
See all stories on this topic »

AllGov
Anticipating the Pearl Harbor of the digital age
The Seattle Times
Cyber war is the new Cold War, nations and corporations vying against each other. The… (July 17, 2011, by Pheanor) Read more We need to come up with a better response to cyber attacks than we did in the “War… (July 17, 2011, by ddraig) Read more 
See all stories on this topic »

Tuesday July 19th

Cyberwar Strategy: Will Dual-Hatted NSA Plug Holes in Leaky Pentagon?
Network World
The DoD cyberspace strategy calls for five strategic initiatives to sustain “good cyber hygiene,” but also maintains a destructive cyberattack could be considered an “act of war.” While it also further empowers the NSA, will even the super spy agency 
See all stories on this topic »
US Cyberwar Plan Has New Focus on Deterrence
Huffington Post
We needed to Cyber warfare & domestic cyber policing are going to be new arms of both the Military & the FBI or domestic police, it may be unwanted but it’s necessary.Human nature is such that people simply won’t play nice, they are slaves to the Ego. 
See all stories on this topic »
News International faces threats over hacked emails
Telegraph.co.uk
News International faces threats from hackers that they will publish emails taken from servers at The Sun and The News of the World during a cyber attack last night. The Lulzsec logo. The hacker group has been implicated in several security breaches in 
See all stories on this topic »

Telegraph.co.uk
GCHQ spooks get poached by google and microsoft
Birmingham Mail (blog)
The parliamentary Intelligence and Security Committee (ISC) said it was “concerned” GCHQ was unable to retain a “suitable cadre of internet specialists” to deal with the growing threat of cyber warfare. In its annual report, the committee – made up of 
See all stories on this topic »

Wednesday July 20th

US arrests 14 for roles in PayPal cyber attack
Reuters UK
By Jeremy Pelofsky and Diane Bartz WASHINGTON (Reuters) – US authorities on Tuesday arrested 16 people on charges they participated in major cyber attacks, including an attempt to cripple eBay’s PayPal website as retribution for dropping WikiLeaks as a 
See all stories on this topic »
Senators: US needs to define acts of cyberwar
The Hill (blog)
That document, however, does not define what the Obama administration considers an act ofcyberwar, nor does it detail how the military would respond to a major electronic attack. It also features no description of the kinds of actions the military is 
See all stories on this topic »
FBI Arrests 16 in Broad Cyber Attack Crackdown
National Journal
By Michael Catalini In a sweeping crackdown against cyber crime, the FBI on Tuesday arrested 14 people on charges stemming from their alleged involvement in a November attack on PayPal’s website, the Department of Justice announced. 
See all stories on this topic »
US arrests 14 for roles in PayPal cyber attack
Reuters Canada
FBI agents arrested 14 people in nine states and Washington, DC specifically for the PayPal attack coordinated by the vigilante hacking group Anonymous, the biggest take down so far tied to the high-profile cyber attack. (Reporting by Jeremy Pelofsky, 
See all stories on this topic »
Las Cruces man suspected of cyber attack
ABQ Journal (subscription)
By Patrick Lohmann / Journal Staff Writer on Tue, Jul 19, 2011 Tweet A Las Cruces man was arrested Tuesday for allegedly posting confidential AT&T documents on a public file-sharing site, part of a string of more than a dozen arrests nationwide that 
See all stories on this topic »
INFORMATION WARFARE: America Has A War Plan
Strategy Page
July 20, 2011: The United States has developed a new strategy for Cyber War, and hopes that it will enable America to better deal with Internet based espionage from China (and others), as well as potential Cyber War itself. The first goal is to get the 
See all stories on this topic »
Arrests made in PayPal hack attack
San Jose Business Journal
More than a dozen people nationwide were arrested Tuesday on charges related to a cyber attack on PayPal Inc. ‘s website, as federal agents conducted a broad sweep of alleged computer hackers. Agents from the Federal Bureau of Investigation arrested 14 
See all stories on this topic »
The Circuit: Hackers hit the Sun; mobile moms; kids’ privacy
Washington Post (blog)
By Hayley Tsukayama LEADING THE DAY: LulzSec, the hacking group that hit went after the Senate, US intelligence agencies and PBS, came out of retirement Monday to wage a cyber attackon the Sun, The Washington Post reported. 
See all stories on this topic »
Hackers blitz government computers
Stuff.co.nz
As New Zealand investigates whether or not the security of the police national computer has been compromised, the Pentagon is still grappling with the fallout from a 2008 cyber-attack labelled the most significant breach of United States military 
See all stories on this topic »

Stuff.co.nz
India Signs Agreement With US To Improve Cyber Security
Penn Olson
by Willis Wee on July 20, 2011 in Asia, Tech Amid widespread headlines about cyber warfare and hacking around the world, the US and India have signed an agreement yesterday to allow both nations to coordinate and collaborate on cyber security issues.
See all stories on this topic »

Penn Olson

Thursday July 21st

Cyber attack‘ schoolboy held by cops
The Sun
By ANTHONY FRANCE A BOY of 16 suspected of launching global cyber attacks from a computer in his bedroom has been arrested. He was held as cops in three countries launched a crackdown on hacking groups LulzSec and Anonymous – who have hit the websites 
See all stories on this topic »
Senators Demand Answers on U.S. Cyber Warfare Policy
Bloomberg
By David Lerman – Wed Jul 20 19:34:53 GMT 2011 The Defense Department has failed to deliver to Congress a report on US cyber warfare policy that would clarify the legal authorities and rules of engagement to be used in the event of a cyber attack
See all stories on this topic »
Learning to defend against cyber warfare
Los Angeles Times
At Cyber Challenge Camp in Pomona, computer whizzes are shown how to protect a weak system and how to break into one. They’re also taught hackers’ tricks and cyberspace ethics. Cyber Challenge Camp participants get ready for virtual capture the flag. 
See all stories on this topic »

Los Angeles Times
ABC15 takes you inside a cyber attack
ABC15.com (KNXV-TV)
He can’t say for sure, but he thinks it was likely connected to the Sony cyber attack. He contacted his email provider and had it fixed. A week later, it was hacked again. After that, Stephens took drastic steps and had his bank account numbers 
See all stories on this topic »

ABC15.com (KNXV-TV)
Book Review: Cyber Warfare
Slashdot
Clarke and Knake’s book, Cyber War: The Next Threat to National Security and What to Do about It, discusses how weak the US network defenses are and offers suggestions about how to improve. Carr’s book, Inside CyberWarfare: Maping the Cyber Underworld, 
See all stories on this topic »
Cyber Attack Steals $28000 from Small Town
eSecurity Planet
By eSecurityPlanet Staff “The case once again highlights the mismatch between the sophistication of today’s attackers and the weak security measures protecting many commercial online banking accounts,” writes Krebs on Security’s Brian Krebs. 
See all stories on this topic »
Are NSA InfoSec Efforts Enough to Defend America in Cyber Warfare?
Top Secret Writers
These areas are not found on foreign soil or even outer space. The new frontier of warfare is Cyber Space. The methods and technologies used in this new virtual warfare are advancing on a daily basis. These advancements are being made so quickly that 
See all stories on this topic »
Nation’s fight against cyber intruders goes local
BusinessWeek
An explosion in threats against the nation’s cyber networks has led the Pentagon to develop a cyber war strategy and states to open cyber security offices. The Pentagon revealed last week that it sustained, earlier this year, one of its largest-ever 
See all stories on this topic »
Dimasoft MD on hacking into the mind of a thief
nebusiness.co.uk
by John Hill, The Journal AN increasing number of companies are recognising the need to protect themselves from cyber attack, but sometimes forget to check whether someone’s just wandering in through the front door. As a certified ethical hacker, 
See all stories on this topic »

Friday July 22nd

Ship to Gaza website in ‘cyber attack
IceNews
Activists on the Swedish Ship to Gaza have claimed that a cyber attack on their website is the latest attempt to sabotage the aid mission of the Freedom Flotilla II. The organisation’s server company was forced to pull the plug and the website was shut 
See all stories on this topic »

IceNews
Cyber Threat Will Force Pentagon to Buy Computers Faster and Change Culture
ABC News
(Getty Images) There is no doubt that the Pentagon is gearing up for a cyber war and they’re planning to purchase new computers with the speed and efficiency that would make Google proud. Last week, the Department of Defense disclosed a cyber attackin 
See all stories on this topic »

ABC News
Sony insurer seeks hack opt-out
BBC News
One of the company’s insurers has asked a judge to rule that it is not liable for losses related to thecyber attack. In April, Sony discovered that hackers had gained access to 77 million accounts on its PlayStation Network. 
See all stories on this topic »
Cyberspace is the nation’s indelible ink
Malaysia Kini
Susah Kes: Higher Education Miniser Mohamed Khaled Nordin, Umno also lost the cyberwar in 2008. Since then, many Umno cyber-troopers and bloggers got on the bandwagon. Even Umno apologists from the MCA and the Star took up blogging. 
See all stories on this topic »

 

Leave a Reply