throbber
COMMENTARY
`
`ANGELYN FLOWERS
`AND SHERALI ZEADALLY
`
`Cyberwar: The What,
`When, Why, and How
`
`C yberwar is insidious, invisible to most,
`
`and is fought out of sight. It takes place
`in cyberspace, a location that cannot be
`seen, touched, nor felt. Cyberspace has
`been defined as the fifth domain of war [1]. We can
`see the physical instruments, such as computers, rout-
`ers, cables, however these instruments interact in a vir-
`tual and unseen realm. This facilitates a reach that can
`extend from one part of the world to attacks on public or
`private sector entities in another part of the world, while
`perpetrator remains unknown in a legally
`provable sense. The defining questions for
`life in the 21st century may be: what is
`cyberwar? Will we know it when we see
`it? If so, what do we do in response?
`The lack of precision in the terminol-
`ogy helps to cloud the issue. Terms such
`as cybercrime, cyberespionage and cyber-
`attack are often used interchangeably. We
`speak of hackers, cybercriminals, and
`cyberterrorists as if they were identical. In many cases,
`they may be, or at least they may be closely related.
`The term cyberwar has been used in a variety of differ-
`ent contexts. Since war itself is generally considered as
`a military enterprise, cyberwar has often been linked
`to a conceptual framework associated with traditional
`notions of warfare. These notions generally involve
`force, physical harm, and violence. In this work, we
`examine the challenges this definition presents in a 21st
`century cyber-connected and cyber-dependent world,
`and we propose an expanded conceptual framework for
`cyberwar.
`Underlying factors, such as the level of activity or
`behavior involved in cyberwar, and how many or what
`type of cyberattacks it takes for it to be defined as a
`cyberwar, become important. In recognizing the role
`that cyberattacks will play in future military conflicts,
`
`Digital Object Identifier 10.1109/MTS.2014.2345196
`Date of publication: 17 September 2014
`
`14 |
`
`Cyberwar is
`insidious and
`is fought out
`of sight, invisible
`to most.
`
`two threshold requirements have been identified when
`nation-states assess the consequences and their poten-
`tial response. first, what is the threshold for consider-
`ing a cyber-event an act of war or comparable to the
`use of force? Second (which will not be addressed in
`this article), what is the threshold between tactical and
`strategic applications of cyberattacks [2]?
`This evolution of war is particularly important when
`addressing cyberwar, which can include both kinetic and
`non-kinetic activities. Kinetic activities are associated
`with motion. In the military arena, this
`typically includes armed attacks, bombs
`dropping, etc. Non-kinetic cyberwar
`actions are typically directed towards tar-
`geting any aspect of an opponent’s cyber
`systems such as communications, logis-
`tics, or intelligence. When used in con-
`junction with a kinetic battle, non-kinetic
`cyber activities can include disruption of
`an opponent’s logistical supply chain or
`diversion of essential military supplies. Other types of
`non-kinetic cyber activity can include the destabilization
`of a government’s financial system, interference with a
`government’s computer systems, or infiltrating a com-
`puter system for the purposes of espionage. The ongoing
`debate discusses the extent to which these non-kinetic
`activities should be considered as cyberwarfare when
`they are not associated with an actual physical battle.
`
`How Can Cyberwar Be Defined?
`Efforts have been made to address the definition of
`cyberwar. The recently completed Tallinn Manual on
`International Law Applicable in Cyberwarfare [3] was
`developed at the request of the North Atlantic Treaty
`Organization (NATO) and the Cooperative Cyber
`Defense Center of Excellence (CCD-COE). The dif-
`ficulty is that nation-states and non-state actors do not
`always follow laws when it comes to war. More impor-
`tantly, increases in asymmetrical warfare, and the expo-
`nentially evolving nature of the Internet, tend to make
`
`IEEE TECHNOLOGY AND SOCIETY MAGAZINE | fALL 2014
`IPR2015-01973
`SIPCO, LLC
`Exhibit 2008
`
`

`
`Non-Govermental
`Organizations vs
`Nation-State
`
`Nation-State vs
`Nation-State
`
`As Part of
`Non-Kinetic Battle
`
`Cyberattack
`
`As Part of Traditional
`Kinetic Battle
`
`Attacks On
`Electrical Grids
`
`Attacks On
`Financial Institutions
`
`Targeting
`Opponent’s “War Fighting”
`Systems
`
`Targeting
`Government Websites
`
`Military
`Logistical Systems
`
`Attacks On
`Other Critical Infrastructure/
`Including Private Sector
`Businesses
`
`Military
`Intelligence Systems
`
`Fig. 1. Cyberattacks and organizational typology.
`
`attacks in cyberspace more prevalent. In this type of
`environment, the impact of a Law of Cyberwarfare, as
`a regulatory mechanism, may therefore be limited. The
`Tallinn Manual defines cyberwar as a cyberattack, in
`either an offensive or defensive cyber operation, that
`is reasonably expected to cause death to persons, dam-
`age, or cause destruction to objects. Excluded from
`this definition, are psychological cyber-operations
`or cyberespionage [3]. A major drawback with this
`definition is its use of the term cyberattack, which is
`often synonymous with cyberwar and with the accom-
`panying narrow definition of cyberwar. for example,
`it excludes cyber-operations designed to destabilize a
`nation-state’s financial system, since the attack did not
`directly result in death or physical destruction.
`Traditionally, violence has been viewed as a nec-
`essary correlate of a cyberattack, placing cyberwar
`within the context of an armed conflict. The focus
`was the equivalence of the effects of a cyberattack to
`the effects of an armed attack using physical means
`
`[2]. This approach to cyberwar has been adapted by
`those who view cyberattacks in military campaigns
`as a motive to target an opponent’s communications,
`intelligence, as well as other Internet or network-
`based logistic operations [4]. The linkage of cyberwar
`with the use of force and armed conflict may be the
`current prevailing position in some international sec-
`tors. However, it fails to take into account the extent
`of non-physical damage that can be inflicted through
`cyberspace in a world that is becoming increasingly
`networked, up to and including nuclear facilities.
`The Geneva Center for the Democratic Control
`of Armed forces (DCAf) adopted a more inclusive
`definition of cyberattacks in its DCAF Horizons
`2015 Working Paper. This definition distinguishes
`between state-sponsored and non-state-sponsored
`cyberattacks, and also includes cybervandalism,
`cybercrime, and cyberespionage within its defini-
`tion of cyberattacks [1]. The DCAf defines cyber-
`war as warlike conduct conducted in virtual space
`
`IEEE TECHNOLOGY AND SOCIETY MAGAZINE | fALL 2014
`
`| 15
`
`

`
`using information, communications technology, and
`networks, with the intention of disruption or destruc-
`tion of the enemy’s information and communications
`systems. It is targeted at influencing the
`decision-making capacity of an oppo-
`nent’s political leadership and armed
`forces [1]. It is, therefore, distinguished
`in two key areas. first, it recognizes that
`there is a non-physical impact to cyber-
`war, and second, it recognizes the sig-
`nificance of political leaders in making
`this determination.
`A pure military-target definition of cyberwar is no
`longer realistic in the context of modern geo-political
`instabilities and a global environment of asymmetri-
`cal warfare. When a smaller force is in conflict with a
`larger entity, an armed conflict will most likely not be
`successful for the smaller force. In addition, the reality
`of the conflict proves that the determinations of when a
`nation-state declares war, and the precursor interpreta-
`tion of events leading up to that determination, are deci-
`sions made by its political leadership. As a result, the
`terms cyberattack and cyberwar must be decoupled so
`that cyberattacks are not defined exclusively in terms of
`the use or effect of physical force causing death, dam-
`age, or destruction. Or, if the terms cyberattack and
`cyberwar are going to continue to be synonymous, then
`it’s important to acknowledge that cyberattacks, and
`hence cyberwar, can include non-kinetic cyber activity
`without a co-requirement of kinetic military action.
`
`Table I
`Top 15 Source Countries for Cyberattacks in
`May 2013 [5]
`
`Source of Attack
`
`Number of Attacks
`
`Russian Federation
`United States
`Germany
`Taiwan
`Bulgaria
`Hungary
`Poland
`China, The Peoples’
`Republic of
`Italy
`Argentina
`Romania
`Venezuela, Bolivarian
`Republic of
`Brazil
`Colombia
`Australia
`
`1 153 032
`867 933
`831 218
`764 141
`358 505
`271 949
`269 626
`254 221
`
`205 196
`167 379
`153 894
`140 559
`
`140 281
`124 851
`120 157
`
`It is virtually
`impossible to
`identify every
`cyberattack
`that occurs.
`
`When Does Cyberwar Occur?
`It is virtually impossible to identify every cyberat-
`tack that occurs. Some can operate undetected for
`years. Others are brief, but still leave no
`detectable trace. This section describes
`a European-based effort aimed at
`measuring the frequency and source
`of attempted infiltrations over a one-
`month period. It also describes a few
`selected global examples of cyberat-
`tacks. Growing concerns with the secu-
`rity of Supervisory Control and Data
`Acquisition (SCADA) systems are discussed later in
`this article.
`
`Frequency of Cyberattacks
`Deutsche Telekom AG (DTAG), a German Telecom-
`munications company, established a network of 97
`sensors to serve as an early warning system to provide
`a real-time picture of ongoing cyberattacks. Although
`the majority of the sensors are located in Germany,
`DTAG also locates honeypots and sensors in other
`non-European countries. The top fifteen countries
`recorded as the source of cyberattacks by the DTAG
`sensors are listed in Table I. Approximately, 20% of
`the cyberattacks listed originated in the Russian fed-
`eration. The first four countries listed, including the
`U.S., Germany, and Taiwan, accounted for 62% of the
`cyberattacks represented. These instances provide a
`snapshot in time of attacks primarily targeted towards
`a particular geographic area, in this instance, Europe.
`On a broader international and historical scale, the
`DCAF Horizons 2015 Working Paper describes histori-
`cal instances of what they identify as cyber conflict and
`which clearly should be considered as cyberattacks.
`The attacks have been summarized in Table II. It should
`be noted that, for many of the cyberattacks described,
`the perpetrator is indicated as “alleged.” This reflects
`the difficulty in ascertaining responsibility.
`Of the fourteen cyberattacks described in Table II,
`five occurred within the context of an actual kinetic or
`“hot” war, one occurred within the context of a “cold”
`war, and the remainder occurred within the context of
`ongoing tensions between nation-states, or between a
`nation-state and non-state actors that may or may not
`have been supported by another nation-state. The tem-
`poral trend in these identified conflicts is the utilization
`of cyberattacks in the absence of a kinetic battle. When
`considered with the subsequent cyber occurrences
`described in Table III, the trend is towards attacks
`against a nation-state’s critical infrastructure [24].
`
`Why Does Cyberwar Occur?
`for smaller nations, or terrorist organizations, the use
`of DDoS attacks are much cheaper to launch than con-
`ventional warfare tools against an enemy possessing
`
`16 |
`
`IEEE TECHNOLOGY AND SOCIETY MAGAZINE | fALL 2014
`
`

`
`Table II
`History of Cyberattacks as Reported by the Center For the Democratic Control of Armed Forces (DCAF) [1]
`
`Year
`
`1982
`
`Perpetrator
`
`United States
`
`1991
`
`United States
`
`Target
`
`Incident
`
`(then) Soviet
`Union
`
`Iraq (first Iraq
`War)
`
`Embedded logic bombs caused malfunctions in
`pump speeds and valve settings in oil pipelines
`[note: The CIA “permitted” the software to be
`stolen by the Soviets in Canada].
`
`Airstrikes against Iraq’s command and control
`systems, telecommunications systems, and
`portions of its national infrastructure; supported
`by communication and satellite systems.
`
`1994
`
`Pro-Chechen separatist movement and pro-
`Russian forces
`
`Both sides engaged in a virtual Internet war
`simultaneously with a kinetic ground war.
`
`1997 – 2001
`
`(breakaway region of) Chechnya and the
`Russian Federation
`
`2002
`
`Russian Federation
`(alleged)
`
`Chechnya
`
`1999 – 2002
`
`Israeli and Palestinian cyberconflict
`
`April – May,
`2007
`
`Russian Federation
`(alleged)
`
`Estonia
`
`August 2007
`
`The People’s Republic of
`China (alleged)
`
`September 6,
`2007
`
`Israel
`
`June – July,
`2008
`
`Russian nationalist
`hackers
`
`August 2008
`
`Russian Federation
`(attacks also launched
`from Lithuania)
`
`England
`France
`Germany
`
`Syria
`
`Lithuania
`
`Georgia
`
`January 2009
`
`Russian Federation
`(alleged)
`
`Kyrgyzstan
`
`Simultaneous with a kinetic war – use of
`Internet for propaganda by both sides.
`Russia also accused of hacking into Chechen
`websites.
`
`The Russian Federal Security System allegedly
`knocked out two Chechen websites hosted in the
`U.S. immediately prior to the Russian Spetsnaz
`Special Forces storming a Moscow theater that
`was under siege by Chechen terrorists.
`
`Israeli teen hackers launching a sustained
`Distributed Denial of Service (DDoS) attack
`that successfully jammed six websites operated
`by the Hezbollah and Hamas organizations in
`Lebanon and the Palestinian National Authority.
`In response, hackers attacked sites belonging to the
`Israeli Parliament, the Ministry of Foreign Affairs,
`and the Israeli Defense Force information site; later
`striking the Israeli Prime Minister’s Office, the Bank
`of Israel, and the Tel Aviv Stock Exchange.
`
`Series of DDoS attacks first against Estonian
`government agencies, and then private sites and
`servers. Some attacks lasted weeks. The botnet
`utilized in the DDoS attacks employed up to
`100 000 zombie PCs.
`
`Intrusions into government networks.
`
`Israeli airstrike destroyed a nuclear reactor
`under construction to process plutonium. It
`is alleged that prior to the airstrike Syria’s air
`defense network was deactivated by Israel
`activating a secret built-in switch.
`
`Hacking of hundreds of Lithuanian government
`and corporate websites some of which were
`covered in digital Soviet-era graffiti.
`
`Cyberattack directly coordinated with a kinetic
`land, sea and air attack.
`Main attack vectors: Botnets attacked Georgian
`media, DDoS attacks targeted command and
`control systems. DDoS, Structured Query
`Language (SQL) injection, and cross-site
`scripting (XSS).
`Main targets: Government websites, financial
`and educational institutions, business
`associations, news media websites (including
`the BBC and CNN).
`
`DDoS attacks focused on three of the four
`Internet Service Providers (ISP) in Kyrgyzstan
`disrupting all internet traffic. Russia was the
`source of most of the DDoS attacks.
`
`IEEE TECHNOLOGY AND SOCIETY MAGAZINE | fALL 2014
`
`(Continued)
`
` | 17
`
`

`
`Table II
`(Continued)
`
`Year
`
`July 4 – 8,
`2009
`
`2009 – 2010
`
`Perpetrator
`
`Target
`
`Incident
`
`Unknown – North Korea
`has been suggested
`since the attacks begin
`on the date of a North
`Korean missile test
`launch and concluded
`on the 15th anniversary
`of the death of North
`Korea’s Kim II Sung.
`Unknown
`
`South Korea &
`United States
`
`Iran
`
`Coordinated attacks against South Korean
`and U.S. government and business websites,
`including the public websites for the U.S. stock
`exchanges: New York Stock Exchange (NYSE)
`and NASDAQ.
`A botnet built using the early 2004 MyDoom
`worm, and rudimentary DDoS attacks were
`used. The attacks originated from 86 IP
`addresses in 16 countries.
`Stuxnet, a cyber worm, caused damage to
`centrifuges of Iran’s nuclear reactors. Stuxnet
`attacked and disabled Siemens type Supervisory
`Control and Data Acquisition (SCADA) systems
`in a manner that disguises the damage from the
`operators until it is too late to correct.
`
`greater resources in terms of weapons, money, and
`troops. Imagine a drone, not only intercepted, but
`also then re-routed back towards its originator. fewer
`resources are required, but yet, on the other hand,
`increased specialized training is required. Cyberat-
`tack for hire is a lucrative business for those who have
`
`been previously overlooked as merely cybercrimi-
`nals. As noted by many, including Richard Clarke,
`former National Coordinator for Security, Infrastruc-
`ture Protection, and Counterterrorism for the United
`States, cybercriminals can become rental cyberwar-
`riors [8]. This easy transition from cybercriminality
`
`Table III
`Recent Cyberattacks on Critical Infrastructure
`
`Year
`
`2010
`[first
`discovered]
`
`Perpetrator
`
`Unknown
`
`Target
`
`Cyberattack
`
`Iran and other parts
`of the Middle East
`
`Flame has been described as a backdoor
`with Trojan and worm-like characteristics.
`Its purpose was to gather information
`from infected PCs. After gathering the
`information it uploads it to command
`and control computers. It is more
`complex and is believed to be much
`more dangerous than the Stuxnet virus.
`Flame can attack critical infrastructure
`and the United Nations International
`Telecommunications Union has warned
`other nations to be on/ the alert for its
`appearance [19].
`
`For a one week period in September 2012
`five major U.S. banks were subjected
`to ongoing Distributed Denials of
`Service (DDoS) attacks which prohibited
`customers from accessing their bank’s
`website. These attacks were believed to be
`part of an ongoing and continuing attack
`on the financial sector of the US [20].
`
`The Sharmoon virus infected 30 000
`ARAMCO computers is a form of malware
`that overwrites the Master Boot Record
`(MBO) placing the data with a jpg file,
`in this instance, a picture of a burning
`American flag [21]–[22].
`
`2012
`
`Originated in the
`Middle East
`
`United States
`
`2012
`
`“The Cutting
`Sword of
`Justice” (claimed
`responsibility)
`
`Saudi Arabia’s state oil
`company ARAMCO
`
`2012
`
`Unknown
`
`Qatar state owned oil
`company RasGas
`
`Sharmoon virus [22].
`
`18 |
`
`IEEE TECHNOLOGY AND SOCIETY MAGAZINE | fALL 2014
`
`

`
`Cyberattacks
`use a variety of
`vectors, both
`technological and
`organizational.
`
`to cyberwarriors for hire suggests that reliance on a
`strict delineation between the two activities. Cyber-
`crime and cyberattacks may, in the long run, lead to
`increased cyberattacks.
`Cyberattacks have the ability to disrupt the way in
`which ordinary individuals live their lives (e.g., the
`chaos that would arise if none of the automatic teller
`machines (ATMs) in a country were operational).
`The interconnectedness of global financial institu-
`tions, enabled by modern communications technol-
`ogy, increases this risk [23]. A few
`years ago, we witnessed the impact of
`the 2003 northeastern blackout in the
`U.S. that affected electrical grids span-
`ning from Ohio to New York, and even
`stretching to the Canadian province of
`Ontario. While it lasted for only a few
`days, it’s important to ask what would
`be the impact of something similar,
`or on a larger scale, that was deliberately caused for
`a prolonged period of time. When Estonia was sub-
`jected to a barrage of cyberattacks, it was forced to cut
`its external Internet connections so that people within
`the country could continue to use their conventional
`services [9]. With external Internet service access dis-
`abled, an Estonian traveler in another country could
`not retrieve money from an ATM machine or use a
`bank issued credit card. Despite taking 30 000 com-
`puters off-line, the Sharmoon virus was ultimately not
`successful in that it did not significantly disrupt oil
`production in either Saudi Arabia or Qatar. But, what
`if it had? What would the impacts have been?
`The United States has identified cyberattacks on its
`critical infrastructure as a matter of national security, and
`has declared cyberspace a domain of war [10]. Critical
`infrastructures are physical or virtual systems and assets
`that are so crucial to a nation that any harm done to them
`will have a drastic effect on security, national economic
`security, national public health, or safety [11]. Spe-
`cifically, these attacks are referring to agriculture, food,
`water, public health, emergency services, government,
`defense, industrial base, information and telecommu-
`nications, energy, transportation, banking and finance,
`chemical industries, and postal and shipping systems
`[12]. It is the potential destabilizing effects of disrup-
`tions to these infrastructures that concern the political
`decision-makers who ultimately label such disruptions
`as a cyberattack or a cyberwar. This is why cyberattacks,
`or cyberwar, often extend beyond a physical battlefield.
`Although the above-mentioned disruptions cause no
`physical injury or damage, they can nevertheless be con-
`sidered acts of war (i.e., by political leaders).
`
`How Cyberwar Occurs
`Cyberattacks use a variety of vectors, both technolog-
`ical and organizational. They seek out vulnerabilities
`
`in any of the entities that comprise cyberspace. Moura
`found that certain types of attacks were more likely to
`originate from certain nations or regions. for instance,
`75% of the Internet Service Providers (ISPs) contain-
`ing the most phishing scams are located in the United
`States. Ordinary spam primarily originates in India
`and Vietnam, while the largest concentration of spam-
`mers per Internet address is in Nigeria [15]. Moura
`argues that analyzing where malicious hosts are con-
`centrated could enhance prediction of future attacks.
`Several technological methods are
`used to launch attacks in cyberspace.
`In this section, we briefly present some
`methods used for attacks in cyber-
`space. We also present a sample heu-
`ristic diagram for the classification of
`cyberattack types.
`
`Methodological Approaches
`The DTAG honeypot system also identified the five
`most popular types of attacks detected in May 2013.
`These tended to be targeted towards cyber or Internet
`technologies. As illustrated in Table IV, 78% of these
`attacks were on Server Message Block (SMB) pro-
`tocols. SCADA systems are particularly vulnerable
`to attacks, and hence attractive to potential cyberat-
`tackers. Known as the “workhorses of the information
`age,” computer control systems are also the weak link
`in critical infrastructure systems [10], [24]. These sys-
`tems regulate the operation of the infrastructure. for
`instance, they manage the flow of natural gas through
`a pipeline, or they manage the production of chemi-
`cals, etc. SCADA systems are increasingly being
`connected to other networks, including the Internet,
`making them vulnerable to external cyberattacks.
`Given the extent of damages, such as serious injuries,
`deaths, unavailability of crucial daily services that can
`result if the operations of a SCADA system are dis-
`rupted, it is not surprising that these attacks are con-
`sidered cyberterrorism or cyberwar. SCADA systems
`
`Table IV
`Top 5 Attack Types in May 2013 [5]
`
`Description
`
`Number of Attacks
`
`Attack on Server Message
`Block (SMB) protocol
`
`5 970 973
`
`Attack on Secure Shell (SSH)
`protocol
`
`Honeytrap Attacker on
`Port 161
`
`Attack on Port 5353
`Attack on Netbios protocol
`
`660 350
`
`439 981
`
`288 136
`269 211
`
`IEEE TECHNOLOGY AND SOCIETY MAGAZINE | fALL 2014
`
` | 19
`
`

`
`operate electrical grids, open and close dams, as well
`as regulate a host of other unseen yet vital, critical
`infrastructure operations. It was the SCADA system
`in Iran’s nuclear centrifuge facility that was suc-
`cessfully targeted by Stuxnet. The danger for highly
`industrialized countries is that their computerized crit-
`ical infrastructure makes them vulnerable to similar
`attacks. The United States has one of the most devel-
`oped, computerized critical infrastructure systems in
`the world, making it highly vulnerable [8]. Cyberat-
`tacks are not the only danger to these systems. Among
`the SCADA attacks worldwide that have made it to
`court, many have been found to be the work of a dis-
`gruntled employee with no political motivation [24].
`A recurring question is whether there may be
`instances where DDoS attacks could be considered
`acts of war. for those requiring a military context,
`it has been argued that cyberwar can be understood
`through the context of maritime commerce warfare
`[16]. Waterways are the most efficient mechanism for
`transporting tangible goods. The Internet is the most
`efficient mechanism for transporting intangible goods.
`Therefore, just as naval blockades and attacks on ship-
`ping lanes were considered acts of war in both World
`Wars because they prevented the transport of tangible
`goods, DDoS attacks block the transport of intangible
`goods [16]. This definition, while still analogous to
`traditional warfare, provides a definition for cyberwar,
`which circumvents the co-requisite of a kinetic battle.
`Manipulation of increasingly automated informa-
`tion systems, insecurity of the supply chain, and cross-
`platform malware are among the emerging cyberthreats
`identified for 2013 [17]. The ability to manipulate
`automated information systems is a direct threat to the
`security of any nation’s supply chain. few people are
`aware of the extent to which agribusiness, the process
`by which food is harvested, transported, and sold in
`stores, is automated. When combined with a “just in
`time” marketing system designed to deliver produce
`and supplies to the stores with little or no surplus,
`manipulation of a distributor’s information system can
`result in deliveries not being made. This can potentially
`lead to food shortages in some locales. Cross-platform
`malware has also become more common. This can be
`partially attributed to the rapid increase in the number
`of smart phones and other hand-held, mobile devices,
`along with the emergence of applications. Many of the
`applications are designed to infect the device and trans-
`fer the malware wirelessly to other devices. Unrelated
`to cyberattacks, but also present, are internal end-user
`vulnerabilities confronting critical infrastructure.
`
`Heuristic Classification of Cyberattacks
`Cyberattacks are launched at multiple levels. This
`list is not intended to be hierarchical, or all-inclusive.
`Among the levels where cyberattacks can occur are:
`
`■■ Government versus Government (within the con-
`text of a kinetic battle)
`■■ Asymmetrical warfare: Non-state actor versus
`the agencies or contractors of its own, or another
`government
`■■ Government against another Government’s criti-
`cal infrastructure (non-kinetic battle)
`■■ Criminally inspired hackers versus individual
`users
`As previously stated, cyberattacks between nation-
`states can occur within the context of kinetic and non-
`kinetic battles. This overlap is illustrated in fig. 1. In
`the case of the nation-state of Georgia, described in
`Table II, while the cyberattacks occurred as adjunct
`to a kinetic war with the Russian federation, it was
`believed that Russia had hired virtually every crimi-
`nal hacker in Europe, both to assist in perpetrating
`the cyberattacks, as well as to deprive Georgia of an
`opportunity to retaliate in kind [18].
`
`Non-Kinetic Cyberattacks Increasing
`Non-kinetic cyberattacks appear to be increasing both
`in frequency and in severity in terms of the potential
`damage they cause. It is particularly feared that ter-
`rorists fighting an asymmetrical war against a larger,
`more powerful opponent, will utilize this attack
`mechanism. They may or may not occur within the
`context of a traditional kinetic war. Nation-states have
`also been accused of utilizing cyberattacks, both dur-
`ing, and in the absence of a kinetic battle. An impor-
`tant emerging distinction is that political leaders and
`military leaders do not necessarily utilize the same
`definitions. Political leaders are more apt to consider
`non-kinetic cyber-operations, targeting government,
`financial, or other critical national infrastructure as
`cyberattacks, and hence cyberwar, even in the absence
`of the use of force, injury, death, or physical damage.
`At present, the greatest difficulty nation-states and
`organizations face is identifying perpetrators with con-
`fidence. In the absence of an admission, all that is ini-
`tially available is speculation. To date, despite frequent
`allegations by nation-states as to who did what, or rhet-
`oric from the political leaders of those nation-states, no
`nation-state has yet responded to a non-kinetic cyber-
`attack with a kinetic operation. While the future of
`cyberwarfare in the 21st century will likely show cyber-
`attacks that occur, not in conjunction with traditional
`armed conflict, but rather stand alone in a non-kinetic
`battle, it is equally as likely that these increased non-
`kinetic battles will have kinetic repercussions.
`
`Author Information
`Angelyn flowers is a Professor and the Graduate Pro-
`gram Director of the Homeland Security Program at
`the University of the District of Columbia, Washing-
`ton, DC. Email: aflowers@udc.edu.
`
`20 |
`
`IEEE TECHNOLOGY AND SOCIETY MAGAZINE | fALL 2014
`
`

`
`Sherali Zeadally is an Associate Professor in
`the College of Communication and Information at
`the University of Kentucky, Lexington, KY. Email:
`szeadally@uky.edu.
`
`Acknowledgment
`The authors express gratitude to Katina Michael and
`to the anonymous reviewers for their useful com-
`ments and suggestions, which helped us to improve
`the quality and presentation of this paper.
`
`References
`[1] f. Schreier, On Cyberwarfare: DCAF Horizons 2015 Working
`Paper. Geneva: Defense Center for Armed forces, 2013.
`[2] J. Lewis, “Cyberwar thresholds and effects,” IEEE Security and
`Privacy, pp. 23–29, Sept./Oct. 2011.
`[3] M. Schmitt, Ed., Tallinn Manual on The International Law Applicable
`to Cyberwarfare, Cambridge, U.K.: Cambridge Univ. Press, 2013.
`[4] W. Jones, “Declarations of cyberwar: What the revelations about
`the U.S.-Israeli origin of Stuxnet mean for warfare,” IEEE Spectrum,
`pp. 18, Aug. 2012.
`[5] Deutsche Telekom AG, “Overview of current cyber attacks;” http://
`www.sicherheitstacho.eu/, accessed June 6, 2013.
`[7] Daily Mail Reporter, “Cyber attacks now fourth biggest threat to
`global stability,” Mail Online, Jan. 12, 2012; http://www.dailymail.
`co.uk/news/article-2085876/Cyber-attacks-fourth-biggest-threat-glob-
`al-stability-says-World-Economic-forum.html, accessed June 6, 2013].
`[8] R. Clarke and R. Knake, Cyberwar: The Next Threat to National
`Security and What to Do AboutIt. New York, NY: Harper Collins, 2010.
`[9] M. Lesk, “The new front line: Estonia under cyberassault,” IEEE
`Security and Privacy, vol. 5, no. 4, pp. 76–79, July-Aug. 2007.
`[10] R. O’Harrow, Jr., Zero Day: The Threat in Cyberspace. New York,
`NY: Diversion Books, Washington Post E-Book, 2013.
`
`[11] B. Obama, “Executive order 13636: Improving critical infrastruc-
`ture cybersecurity,” Federal Register, vol. 78, no. 33, part III, feb.19,
`2013.
`[12] D. Warfield, “Critical infrastructures: IT security and threats from
`private sector ownership,” Information Security J.: A Global Perspec-
`tive, vol. 21, no. 3, pp. 127–136, 2012.
`[15] G. Moreira Moura, Internet Bad Neighborhoods. The Nether-
`lands, University of Twente, dissertation, 2013.
`[16] J. Laprise, “Cyberwarfare seen through a mariner’s spyglass,”
`IEEE Technology and Society Mag., vol. 25, no. 3, pp. 26–33, 2006.
`[17] Georgia Tech Information Security Center and the Georgia Tech
`Research Institute, Emerging Cyber Threats Report 2013, presented at
`the Georgia Tech Cyber Security Summit, 2012.
`[18] R. Haddick, “This week at war: Lessons from cyberwar I,” Foreign
`Policy, Jan. 28, 2011; http://www.foreignpolicy.com/articles/2011/01/28/
`this_week_at_war_lessons_from_cyberwar_i?print=yes&hidecomments
`=yes&page=full, accessed May 21, 2013.
`[19] J. Newman, “The flame Virus: Your fAQS answered,” PC World, May
`30, 2012; http://www.pcworld.com/article/256508/the_flame_virus_your_
`faqs_answered.html, accessed June 4, 2013.
`[20] J. Menn, “Middle East cyber attacks on US banks were highly sophis-
`ticated,” Huffington Post, Oct. 2, 2012; http://www.huffingtonpost.com/
`2012/10/02/middle-east-cyber-attacks-us-banks_n_1933943.html, ac-
`cessed May 23, 2013.
`[21] N. Perlroth, “In cyberattack on Saudi firm, U.S. sees Iran striking
`back,” NY Times, Oct. 23, 2012; http://www.nytimes.com/2012/10/24/
`business/global /cyberattack-on-saudi-oil-firm-disquiets-us.
`html?pagewanted=all, accessed June 8, 2013.
`[22] D. Sanger, and N. Perloth, “Cyberattacks against U.S. corporations are
`on the rise,” NY Times, May 12, 2013; http://www.nytimes.com/2013/05/13/
`us/cyberattacks-on-rise-against-us-corporations.html?pagewanted=all&_
`r=0, accessed June 5, 2013.
`[23] L. Orman, “Te

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket