Cyber Operations in DOD Policy and Plans: Issues For Congress
Cyber Operations in DOD Policy and Plans: Issues For Congress
Summary
Cyberspace is defined by the Department of Defense as a global domain consisting of the
interdependent networks of information technology infrastructures and resident data, including
the Internet, telecommunications networks, computer systems, and embedded processors and
controllers. Attacks in cyberspace have seemingly been on the rise in recent years with a variety
of participating actors and methods. As the United States has grown more reliant on information
technology and networked critical infrastructure components, many questions arise about whether
the nation is properly organized to defend its digital strategic assets. Cyberspace integrates the
operation of critical infrastructures, as well as commerce, government, and national security.
Because cyberspace transcends geographic boundaries, much of it is outside the reach of U.S.
control and influence.
The Department of Homeland Security is the lead federal agency responsible for securing the
nations non-security related digital assets. The Department of Defense also plays a role in
defense of cyberspace. The National Military Strategy for Cyberspace Operations instructs DOD
to support the DHS, as the lead federal agency, in national incident response and support to other
departments and agencies in critical infrastructure and key resources protection. DOD is
responsible for defensive operations on its own information networks as well as the sectorspecific agency for the defense of the Defense Industrial Base. Multiple strategy documents and
directives guide the conduct of military operations in cyberspace, sometimes referred to as
cyberwarfare, as well as the delineation of roles and responsibilities for national cybersecurity.
Nonetheless, the overarching defense strategy for securing cyberspace is vague and evolving.
This report presents an overview of the threat landscape in cyberspace, including the types of
offensive weapons available, the targets they are designed to attack, and the types of actors
carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist
and a brief overview of recent attacks. The report then describes the current status of U.S.
capabilities, and the national and international authorities under which the U.S. Department of
Defense carries out cyber operations. Of particular interest for policy makers are questions raised
by the tension between legal authorities codified at 10 U.S.C., which authorizes U.S. Cyber
Command to initiate computer network attacks, and those stated at 50 U.S.C., which enables the
National Security Agency to manipulate and extrapolate intelligence dataa tension that
Presidential Policy Directive 20 on U.S. Cyber Operations Policy manages by clarifying the
Pentagons rules of engagement for cyberspace. With the task of defending the nation from
cyberattack, the lines of command, jurisdiction, and authorities may be blurred as they apply to
offensive and defensive cyberspace operations. A closely related issue is whether U.S. Cyber
Command should remain a sub-unified command under U.S. Strategic Command that shares
assets and its commander with the NSA. Additionally, the unique nature of cyberspace raises new
jurisdictional issues as U.S. Cyber Command organizes, trains, and equips its forces to protect the
networks that undergird critical infrastructure. International law governing cyberspace operations
is evolving, and may have gaps for determining the rules of cyberwarfare, what constitutes an
armed attack or use of force in cyberspace, and what treaty obligations may be invoked.
Contents
Introduction...................................................................................................................................... 1
Background ...................................................................................................................................... 2
Cyberspace: The Operating Environment ................................................................................. 2
Cyber Weapons .......................................................................................................................... 3
Malware............................................................................................................................... 3
Botnets................................................................................................................................. 3
Distributed Denial of Service Attacks ................................................................................. 4
Automated Defense Systems ............................................................................................... 5
Targets ....................................................................................................................................... 5
Government and Military Networks.................................................................................... 5
Critical Infrastructure and Industrial Control Systems ........................................................ 6
Actors and Attribution ............................................................................................................... 6
Nation States ....................................................................................................................... 6
Politically Motivated Hacktivists ........................................................................................ 7
Terrorists and Organized Crime .......................................................................................... 7
Advanced Persistent Threats ............................................................................................... 7
Attribution Issues ................................................................................................................ 7
Threat Environment ................................................................................................................... 8
Cyberattack Case Studies .................................................................................................... 8
The DOD and U.S. Cyber Command ............................................................................................ 13
Cyber Command Mission and Force Structure ....................................................................... 13
USCYBERCOM and Information Sharing ....................................................................... 15
Authorities ..................................................................................................................................... 15
Legislative Authorities............................................................................................................. 16
Executive Authorities .............................................................................................................. 17
International Authorities .......................................................................................................... 21
The U.S. Position on International Authorities ................................................................. 21
International Consensus-Building Activities ..................................................................... 22
Existing International Instruments That Bear on Cyberwarfare........................................ 23
Issues for Congress ........................................................................................................................ 27
Authorities: Is Current Law Enough? ...................................................................................... 27
How Do DOD and Cyber Command Responsibilities for Cybersecurity Fit Within the
Interagency and Private Sector? ........................................................................................... 28
Should U.S. Cyber Command Be Its Own Unified Combatant Command? ........................... 28
Is a Separate Cyber Force Necessary? ..................................................................................... 28
What Are the Authorizing and Oversight Committees and Jurisdictional Implications? ........ 28
Current Legislation .................................................................................................................. 28
Appendixes
Appendix. Timeline of International Attacks ................................................................................. 30
Contacts
Author Contact Information........................................................................................................... 33
Introduction1
Cyberspace has taken on increased strategic importance as states have begun to think of it as yet
another domainsimilar to land, sea, and airthat must be secured to protect their national
interests. Cyberspace is another dimension, with the potential for both cooperation and conflict.
The Obama Administrations 2010 National Security Strategy identifies cybersecurity threats as
one of the most serious national security, public safety, and economic challenges.
Cyberattacks are now a common element of international conflict, both on their own and in
conjunction with broader military operations. Targets have included government networks, media
outlets, banking services, and critical infrastructure. The effects and implications of such attacks
may be small or large; cyberattacks have defaced websites, temporarily shut down networks and
cut off access to essential information and services, and damaged industrial infrastructure.
Despite being relatively common, cyberattacks are difficult to identify at their source and thwart,
in particular because politically motivated attacks are often crowd-sourced,2 and online criminal
organizations are easy to join. Suspicions of state-sponsored cyberattacks are often strong but
difficult to prove. The relative anonymity under which actors operate in cyberspace affords a
degree of plausible deniability.
This report focuses specifically on cyberattacks as an element of warfare, separate and distinct
from diplomatic or industrial espionage, financially motivated cybercrime, or state-based
intimidation of domestic political activists.3 However, drawing clean lines between cyberwar,
cyberterrorism, cyberespionage, and cybercrime is difficult. State and non-state actors carry out
cyberattacks every day. When and under what conditions cyberattacks rise to the level of
cyberwar is an open question. Some experts contend that all warfare, including cyberwarfare, by
definition includes the destruction of physical objects. According to this point of view, to be an
act of cyberwarfare, the attack must originate in cyberspace and result in the destruction of
critical infrastructure, military command-and-control capabilities, and/or the injury or death of
individuals.4 On the other hand, some analysts have a more inclusive view of cyberwarfare. These
experts would include, in addition to cyberattacks with kinetic effects, the exfiltration or
corruption of data, the disruption of services, and/or manipulation of victims through distraction.
As our military becomes increasingly information dependent, potential vulnerabilities in networkcentric operations are crystalized. A cyberattack on a military asset may be considered an act of
war to which the military will respond under the Law of Armed Conflict. However, there may
also be attacks on civilian systems which would warrant a military response.
Information contained in this report is derived from unclassified open source material and discussions with senior
government officials and industry technology and security experts.
2
Crowd-sourcing refers to the use of online communities to obtain ideas, information, and services.
3
Industrial espionage events are widely covered and notorious: attacks on Target, Home Depot, and Sony have caught
national attention and have serious economic implications. Such events, however challenging, are not considered
warfare for purposes of this report.
4
Bruce Schneier, Schneier on Security (Indianapolis: Wiley, 2008); Michael Schmitt et al., Tallinn Manual on the
Internationl Law Applicable to Cyber Warfare, prepared by the International Group of Experts at the invitation of the
NATO Cooperative Cyber Defence Centre of Excellence, Cambridge: Cambridge University Press, 2013.
Background
Cyberspace: The Operating Environment
The Internet represents a portion of the global domain of cyberspace; however, there are networks
and systems that are not connected to the Internet. Included among these are national strategic
assets whose compromise could have serious consequences. In its 2010 Quadrennial Defense
Review, the Department of Defense (DOD) identified cyberspace as a global commons or
domain, along with air, sea and space. Previous views of cyberspace had focused mainly on the
enabling or force multiplier aspects of information technology and networked workfare.
Cyberspace is currently defined by the DOD as a global domain within the information
environment consisting of the interdependent networks of information technology infrastructures
and resident data, including the Internet, telecommunications networks, computer systems, and
embedded processors and controllers.5 It is also described in terms of three layers: (1) a physical
network, (2) a logical network, and a (3) cyber-persona:6
The logical network consists of related elements abstracted from the physical
network, (e.g., a website that is hosted on servers in multiple locations but
accessed through a single URL).
The cyber-persona layer uses the rules of the logical network layer to develop a
digital representation of an individual or entity identity.
Because one individual or entity can have multiple cyber personae, and vice versa, attributing
responsibility and targeting attacks in cyberspace is challenging. Another challenge lies in insider
threats, when an authorized user or users exploits legitimate access to a network for nefarious
purposes.
From a military perspective, the operational environment is a composite of the conditions,
circumstances, and influences that affect the employment of capabilities and bear on the decisions
of the commander.7 The information environment is the aggregate of individuals, organizations,
and systems that collect, process, disseminate, or act on information, further broken down into the
physical, informational, and cognitive dimensions.
Cyberspace operations employ capabilities whose primary purpose is to achieve objectives in or
through cyberspace. The following section gives examples of some of the tools through which
these objectives may be achieved.
Cyber Weapons
There are several tools through which effects in cyberspace are achieved. Effects can range in
severity from disrupting or slowing down access to online goods and services, to degrading and
destroying entire network operations. The actors who employ these tools can range from
individual hacker groups to nation states and their proxies. The following section describes the
most common attack tools, or cyber weapons, that these actors employ.
Malware
Malware is a general term for malicious software. Bots, viruses, and worms are varieties of
malware. Bots, as described below, are used to establish communication channels among personal
computers, linking them together into botnets that can be controlled remotely. Botnets are one
way that other forms of malware, such as viruses and worms, spread. As the names imply, viruses
spread by infecting a host. They attach themselves to a program or document. In contrast, worms
are stand alone, self-replicating programs.8
The first known malware aimed at PCs, a virus, was coded in 1986 by two brothers in Pakistan.
They named the virus Brain after their computer shop in Lahore and included their names,
addresses, and phone numbers in the code. Calling Brain malware is slightly misleading because
the brothers had no ill intentions. They were simply curious to find out how far their creation
could travel. Within a year it had traveled around the globe.9
Malware that targets the internal networks of particular companies are often spread by infecting
watering-holes, a term for public websites frequented by employees. Another common method
is spearphishingsending emails to targeted individuals that contain malicious links. The
email appears to be innocuous and sent from a trusted source, but clicking on the link opens a
virtual door to outsiders.10 So-called air-gapped networks, computer systems that are not
connected to the Internet, are not vulnerable to these types of attacks; however, such networks can
be infected by viruses and worms when an external device, such as a thumb drive, is inserted into
a networked computer.
Botnets
Robotic networks, commonly known as botnets, are chains of home and business PCs linked
together by a script or program. That program (the bot) enables a single operator to command all
of the linked machines. Botnets are not necessarily malicious. The computer code botnets use also
enables desirable communication across the Internet, such as the chat rooms that were popular in
the 1990s. However, programmers have figured out how to exploit vulnerabilities in widely used
Microsoft Windows operating platforms to degrade, destroy, and manipulate computer
CRS Report R41524, The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability, by Paul K. Kerr,
John W. Rollins, and Catherine A. Theohary.
9
Joshua Davis, John McAfee Fled to Belize, But He Couldnt Escape Himself, Wired, December 24, 2012,
http://www.wired.com/2012/12/ff-john-mcafees-last-stand/all.
10
Chris Strohm, Hedge-Fund Hack Part of Wall Street Siege Seen by Cyber-Experts, BloombergGovernment, June
23, 2014.
networksoften without the knowledge of the machines owner or local operator.11 Because they
are automated programs, when released, bots lurk on the Internet and take over computers,
turning them into a network of zombies that can be operated remotely. The majority of email
spam is generated by botnets without the host computers knowledge.12 In fact, owners are often
not aware that their computers are part of a botnet, the only indication of which is sluggish
response time.13
Early botnet operators were often skilled coders. In contrast, today an underground industry of
skilled botnet providers exists, but operators no longer have to be fluent coders. Starting in 2004,
bots got considerably easier to use as the result of new applications that allowed hackers to build
bots by pointing and clicking, resulting in a bloom of spam in email inboxes across the globe.14 In
addition to unwanted advertising, botnets can generate denial-of-service (DoS) attacks and spread
malware.
11
Zheng Bu, Pedro Bueno, Rahul Kashyap, et al., The New Era of Botnets, McAfee: An Intel Company, white paper,
Santa Clara, CA, 2010, pp. 3-4, http://www.mcafee.com/us/resources/white-papers/wp-new-era-of-botnets.pdf.
12
John Markoff, A Robot Network Seeks to Enlist Your Computer, New York Times, October 20, 2008.
13
Richard A. Clark and Robert K. Knake, Cyber War: The Next Threat to National Security and What to Do about It
(New York: HarperCollins, 2010), p. 13.
14
Zheng Bu, Pedro Bueno, Rahul Kashyap, et al., The New Era of Botnets, McAfee: An Intel Company, White Paper,
Santa Clara, CA, 2010, pp. 3-4, http://www.mcafee.com/us/resources/white-papers/wp-new-era-of-botnets.pdf.
15
Ziv Gadot, Eyal Benishti, Lior Rozen, et al., Radware Global Application & Network Security Report 2012,
Radware, White Paper, Mahwah, NJ, 2013, p. 1, file:///C:/Users/aharrington/Downloads/a7b991da-b96e-4cd7-bf8c236b1e7e4c67.pdf.
redundant and decentralized nature of the Internet makes attribution difficult.16 In theory, a DDoS
attack could temporarily take down the entire web by simultaneously targeting the 13 root servers
on which all Internet traffic depends.17 In practice, this has not yet happened.
Targets
Attacks on information technology destroy, degrade, and/or exfiltrate data from a host computer.
The intended effect of a cyberattack can be related to the attack target. Within the context of
cyberwarfare, two areas are attractive targets for a potential adversary: government and military
networks, and critical infrastructure and industrial control systems.
16
Ziv Gadot, Eyal Benishti, Lior Rozen, et al., Radware Global Application & Network Security Report 2012,
Radware, white paper, Mahwah, NJ, 2013, p. 18.
17
http://www.root-servers.org/.
18
18 U.S.C. 1030.
19
Ellen Nakashima, Cyber-intruder sparks response, debate Washington Post, December 8, 2011,
http://www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/
gIQAxLuFgO_story.html.
Nation States
Cyberwarriors are agents or quasi-agents of nation states who develop capabilities and undertake
cyberattacks to support a countrys strategic objectives.21 These entities may or may not be acting
on behalf of the government with respect to target selection, attack timing, or type(s) of
cyberattack. Moreover, cyberwarriors are often blamed by the host country when the nation that
has been attacked levies accusations against that country. Typically, when a foreign government is
presented with evidence that a cyberattack is emanating from its country, the nation that has been
attacked is told that the perpetrators acted of their own volition, not at the behest of the
government.
20
Critical Infrastructure is defined in 42 U.S.C. 5195c(e) as: systems and assets, whether physical or virtual, so vital to
the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on
security, national economic security, national public health or safety, or any combination of those matters.
21
For additional information, see CRS Report RL31787, Information Operations, Cyberwarfare, and Cybersecurity:
Capabilities and Related Policy Issues, by Catherine A. Theohary.
Attribution Issues
Analysts trying to determine the origin of a cyberattack are often stymied by the use of botnets.
First, computers infected by a botnet may be located in countries around the world, obscuring the
country of origin of the botnets commander, known as the bot herder. Second, the identity of the
server controlling the botnet may be obscured by the prevalence of peer-to-peer software24. In
22
For additional background information, see archived CRS Report RL33123, Terrorist Capabilities for Cyberattack:
Overview and Policy Issues, by John W. Rollins and Clay Wilson.
23
Accessed at http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf.
24
Peer-to-peer software refers to computer networks in which each computer can act as a server for the others,
(continued...)
addition to these concerns, Internet provider (IP) addresses that might otherwise trace the location
of a computer that launched an attack can be faked (known as spoofing), and even with a valid
IP address, it may be virtually impossible to verify who was behind the computer at the time an
attack was launched. This uncertainty is also true of a computer that has been infected
unbeknownst to the user. At the nation-state level, a certain amount of deniability in terms of
cybersecurity and network control is plausible. Given the proliferation of hacker organizations
and the cyber weapons at their disposal, states can easily claim a lack of responsibility for rogue
cyber actors and attacks that appear to stem from within state borders.
Threat Environment
Cyberattack is a persistent threat. This section describes events that have provoked a political
and/or military response from leaders in one or more state. The case studies provided are not
exhaustive; excluded are many instances of cyber espionage that could arguably be considered
international incidents. Instead, this section focuses primarily on cyberattacks that (1) have had
strategic effects, (2) play a tactical role in a larger military operation, (3) carry implications for
the ability of a state to carry out future military operations, or (4) threaten public trust in the
reliability and security of information on the Internet.
single site over the course of days, this attack brought communication and commerce in a
sovereign nation to a halt for weeks.26
The 2007 cyberattacks appear to have originated in Russia. On April 27, 2007, Estonian officials
carried out a controversial plan to relocate a World War II-era statue of a Red Army soldier from a
central location in Tallinn, the nations capital, to a military cemetery in a suburb. Despite
ominous warnings from the Russian government that removing the statue honoring the sacrifice
of Russian soldiers would prove disastrous for Estonians, Estonia, after 16 years of
independence, decided to move the reminder of Soviet occupation.27
What role, if any, the Russian government actually played in the attack is unclear. The Russian
government claimed the attack was an online version of an angry mob. Evidence suggests that
patriotic hackers played an important role in the attack. The Pro-Putin movement Nashi (Ours),
which organizes political events for young adults, claimed at least partial responsibility for
engaging in cyber activities to counter anti-Fatherland forces.28 Suspicion remains about
government involvement, though. Patriotic hacking can provide cover for behind-the-scenes
coordination efforts.
The attacks followed instructions posted in Russian language Internet chat rooms on how to
generate DoS attacks. The posts included calls for a coordinated attack at the stroke of midnight
on May 9, the day Russians celebrate their World War II victory. At exactly midnight in Moscow,
11p.m. in Tallinn, nearly 1 million computers around the globe navigated to Estonian websites.
Surging at 4 million packets per second, Internet traffic in Estonia increased 200-fold, squeezing
the bandwidth of an entire nation.29
Prepared for the surge, the head of the Estonian computer emergency response team enlisted the
help of individuals responsible for the health and care of the Internet root server system to follow
attacks back to their source and block specific computers from accessing the servers. This
strategy mitigated the effects of the attack. Then suddenly the surges in traffic stopped as
suddenly as they had started.30
Because Estonia is a member of NATO and the European Union, this event exposed how
unprepared those organizations may have been to respond to a cyberattack against a member
state. Had Estonia invoked NATOs Article V collective security provision, doing so would have
raised several thorny questions about what kind of attack triggers those alliance obligations. The
fact that the cyberattack was targeted at a member state and prompted an official state response
was complicated by the inability to identify the aggressor. Moreover, the attack did no physical
damage, and in the end did no permanent damage to Estonias web-based infrastructure. The
damage was measurable only in terms of short-lived commercial losses.31 This kind of
26
Richard A. Clark and Robert Knake, Cyber War: The Next Threat to National Security and What to Do About It
(New York: HarperCollins, 2010).
27
Ibid.
28
Peter Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford: Oxford
University Press, 2013), pp. 110-111.
29
Joshua Davis, Hackers Take Down the Most Wired Country in Europe, Wired, August 21, 2007,
http://archive.wired.com/politics/security/magazine/15-09/ff_estonia?currentPage=all.
30
Ibid.
31
Ibid.
cyberattack is sometimes likened to a weather event. Snow storms, although a temporary crisis,
rarely have any lasting effects. How serious a threat the storm presents depends, at least in part,
on ones capability to weather the storm.32 Although Estonian Defense Ministers viewed this
event in terms of a national security crisis, other security analysts described it as a cyber riot or
costly nuisance, comparing it to an electronic sit-in where traffic to public and commercial sites
is slowed or blocked to make a political point.
32
Martin C. Libicki, Conquest in Cyberspace: National Security and Information Warfare (Washington, DC: RAND,
2007).
33
John Markoff, Before the Gunfire, Cyberattacks, New York Times, August 12, 2008, http://www.nytimes.com/
2008/08/13/technology/13cyber.html?_r=0.
34
David Hollis, Cyberwar Case Study: Georgia 2008, Small Wars Journal, January 6, 2011.
35
For further discussion, see CRS Report RL34618, Russia-Georgia Conflict in August 2008: Context and Implications
for U.S. Interests, by Jim Nichol
36
Mikheil Saakashvili, Let Georgia be a lesson for what will happen to Ukraine, The Guardian, March 14, 2014.
37
Stephen W. Korns and Joshua E. Kastenberg, Georgias Cyber Left Hook, Parameters, Winter 2008, p. 65,
http://strategicstudiesinstitute.army.mil/pubs/parameters/articles/08winter/korns.pdf.
38
David Hollis, Cyberwar Case Study: Georgia 2008 Small Wars Journal, January 6, 2011, p. 3
39
Ibid.
10
moved in, Georgians were unable to access 54 local websites with critical information related to
communications, finance, and the government.40
Georgian officials transferred critical Internet resources to U.S., Estonian, and Polish host servers.
Refuge for some websites, including those of the President and Ministry of Defense, was granted
by an American executive from the privately owned web-hosting company Tulip Systems, but
without the knowledge or authority of the U.S. government. Tulip Systems reported experiencing
attacks on its servers, a fact that raises troubling questions about sovereignty in the age of
cyberwarfare.41
The fighting lasted five days. During that time, Georgias Internet connection was besieged by
attacks and unable to communicate via web with the media. Reportedly, cyberattacks followed
the same target patterns as the land and air invasions, with DDoS attacks taking out the
communications prior to bombing or ground troop movements. Perhaps most importantly, the
cyberattacks and the air attack spared critical infrastructure associated with Georgias energy
sector.42
David Hollis, Cyberwar Case Study: Georgia 2008, Small Wars Journal, January 6, 2011, p. 2.
Stephen W. Korns and Joshua E. Kastenberg, Georgias Cyber Left Hook, Parameters, Winter 2008, p. 65,
http://strategicstudiesinstitute.army.mil/pubs/parameters/articles/08winter/korns.pdf.
42
David Hollis, Cyberwar Case Study: Georgia 2008, Small Wars Journal, January 6, 2011, p. 4.
43
P. Mittal, How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History, Wired, July 11,
2011, http://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/all/.
44
In his memoir, Thomas Reed, a former U.S. Air Force secretary who served in the National Security Council during
President Reagans tenure, describes a successful CIA plot to sabotage the Soviet Unions Siberian pipeline in 1982 by
tricking Moscow into stealing booby-trapped software. The faulty ICS software overpressurized the system causing
the most monumental non-nuclear explosion and fire ever seen from space. Alec Russell, CIA plot led to huge blast
in Siberian gas pipeline The Telegraph, February 28, 2004, http://www.telegraph.co.uk/news/worldnews/
northamerica/usa/1455559/CIA-plot-led-to-huge-blast-in-Siberian-gas-pipeline.html; Michael Joseph Gross, A
Declaration of Cyber-War, Wired, April 2011, http://www.vanityfair.com/culture/features/2011/04/stuxnet-201104.
41
11
to the Internet, the worm would automatically begin sending information back to one of two
domain names hosted on servers in Denmark and Malaysia. Once cybersecurity experts realized
that infected computers were phoning home, they redirected that traffic into a sinkhole they
controlled. By analyzing the collected data, the experts were able to map the pattern of infection.
Unlike most malware, which spreads rapidly through densely networked countries like the United
States and South Korea, Stuxnet was overwhelmingly concentrated in Iran. Of the first 38,000
infected computers, 22,000 were located in Iran.45
The second clue as to Stuxnets intended target was that, reportedly starting in 2009, International
Atomic Energy Agency inspectors noticed the significantly higher-than-average rate at which Iran
was removing and repairing centrifuges in its uranium enrichment facility at Natanz.46
Centrifuges built to process natural uranium into a form capable of fueling a nuclear power plant,
or building a nuclear warhead, are extremely delicate. Among the fastest spinning objects on
earth, any irregularities in a centrifuges rotor will cause imbalances. Even a fingerprint on the
rotor would cause it to spin out of control and do irreparable damage.47 As cybersecurity
specialists dug deeper into the code, they identified commands that were specific to the industrial
control system Simatic WinCC Step7, produced by the German company Siemens. This is the
same controller Iran uses in its uranium-enrichment facilities to control its centrifuges. Once
Stuxnet identified its target, the malware automatically commanded the centrifuges to spin at
frequencies significantly faster and then slower than normal, doing damage to the delicate rotors.
Meanwhile, Stuxnet evaded detection by making it appear to the operators monitoring the system
(via a computer screen) that nothing had changed.48
The overall effect of Stuxnet on the Iranian nuclear program is unclear. Iran has since
acknowledged the attack but maintains that Stuxnet did not change the rate at which it was able to
increase its stockpile of enriched uranium.49 David Albright and Christina Walrond of the Institute
for Science and International Security argue that although the rate of production has not changed,
starting in late 2009, Iran required more centrifuges to perform the same amount of work.
Albright and Walrond did not definitively argue that Stuxnet caused Irans efficiency to decline,
45
Eventually, specialists identified over 100, 000 corrupted devices. For more see P. Mittal, How Digital Detectives
Deciphered Stuxnet, the Most Menacing Malware in History, Wired, July 11, 2011, http://www.wired.com/2011/07/
how-digital-detectives-deciphered-stuxnet/all/; Ralph Langer, To Kill a Centrifuge: A Technical Analysis of What
Stuxnets Creators Tried to Achieve, November, 2013, http://www.langner.com/en/wp-content/uploads/2013/11/Tokill-a-centrifuge.pdf; William J. Broad, John Markoff, and David Sanger, Israeli Test on Worm Called Crucial in Iran
Nuclear Delay, New York Times, January 15, 2011, http://www.nytimes.com/2011/01/16/world/middleeast/
16stuxnet.html?pagewanted=all&_r=0; Paul Kerr, John Rollins and Catherine Theohary, The Stuxnet Computer
Worm: Harbinger of an Emerging Warfare Capability, Congressional Research Service Report, December 9, 2010.
46
P. Mittal, How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History, Wired, July 11,
2011, http://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/all/.
47
Anne Harrington and Matthias Englert, How Much is Enough? The Politics of Technology and Weaponless Nuclear
Deterrence in International Relations and the Global Politics of Science and Technology, eds. Mariana Carpes and
Maximilian Mayer, Berlin: Springer, 2014.
48
The cybersecurity company Symantec has since established that there were multiple variants of Stuxnet. The earlier
variant closed valves, causing a build-up of pressure that will make the centrifuge wobble and damage the rotors, rather
than directly affecting the rate at which the centrifuge spins. For more, see Institute for Science and International
Security, Basic Attack Strategy of Stuxnet 0.5 rev. 1, Institute for Science and International Security, Washington, DC,
February 28, 2013, http://isis-online.org/isis-reports/detail/basic-attack-strategy-of-stuxnet-0.5/.
49
Dr. Fereydoun Abassi, Vice President of the Islamic Republic of Iran and Head of Atomic Energy Organization of
Iran, Statement at the IAEA 56th General Conference, September 17, 2012; P. Mittal, How Digital Detectives
Deciphered Stuxnet, the Most Menacing Malware in History, Wired, July 11, 2011, pp. http://www.wired.com/2011/
07/how-digital-detectives-deciphered-stuxnet/all/.
12
nor did they discount that possibility, instead stating, It is likely that multiple factors have played
a role in the diminished effectiveness of the FEP [fuel enrichment plant].... The available data are
too general to determine the actual situation.50
No one has claimed responsibility for the attack, but in January 2011, but the New York Times
reported that Stuxnet was a joint venture of the United States and Israel. Reportedly, Israel
constructed a centrifuge plant at Dimona identical to the one in Natanz to simulate the attack. The
United States allegedly provided information about vulnerabilities in the Siemens controller,
access to which had been gained through a cybersecurity collaboration between Siemens and the
Idaho National Lab.51
David Albright and Christina Walrond, Performance of the IR-1 Centrifuge at Natanz, Institute for Science and
International Security, Washington, DC, October 18, 2011, http://isis-online.org/isis-reports/detail/test1/8.
51
William J. Broad, John Markoff, and David Sanger, Israeli Test on Worm Called Crucial in Iran Nuclear Delay,
New York Times, January 15, 2011, http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html?
pagewanted=all&_r=0.
52
Source: Internal Department of Defense budget documents.
13
Admiral Michael S. Rogers, tapped to become the head of U.S. Cyber Command, described the
duties of the Cyber Commander thusly:
The Commander, U. S. Cyber Command (USCYBERCOM) is responsible for executing the
cyberspace missions specified in Section 18.d.(3)of the Unified Command Plan (UCP) as
delegated by the Commander, U.S. Strategic Command (USSTRATCOM) to secure our
nations freedom of action in cyberspace and to help mitigate risks to our national security
resulting from Americas growing dependence on cyberspace. Subject to such delegation and
in coordination with mission partners, specific missions include: directing DODIN
operations, securing and defending the DODIN; maintaining freedom of maneuver in
cyberspace; executing full-spectrum military cyberspace operations; providing shared
situational awareness of cyberspace operations, including indications and warning;
integrating and synchronizing of cyberspace operations with combatant commands and other
appropriate U.S. Government agencies tasked with defending the our nations interests in
cyberspace; provide support to civil authorities and international partners. All these efforts
support DoDs overall missions in cyberspace of defending the nation against cyber attacks,
supporting the combatant commands, and defending Department of Defense networks.53
Operators at the U.S. Cyber Command are sometimes referred to as cyber warriors, although
this term does not appear in official Department of Defense definitions. Reports of
USCYBERCOM-planned workforce structures yield clues regarding the activities a so-called
cyber warrior might undertake. First reported in the Washington Post, The plan calls for the
creation of three types of Cyber Mission Forces under the Cyber Command: national mission
forces to protect computer systems that undergird electrical grids, power plants and other
infrastructure deemed critical to national and economic security; combat mission forces to help
commanders abroad plan and execute attacks or other offensive operations; and cyber protection
forces to fortify the Defense Departments networks.54
These multiservice Cyber Mission Forces numbered under 1,000 in 2013, when DOD announced
plans to expand them to roughly 5,000 soldiers and civilians. The target number has since grown
to 6,200, with a deadline at the end of FY2016. In early November 2014, a leaked classified
document was reported to have stated that additional capability may be needed for both surge
capacity for the [Cyber Mission Forces] and to provide unique and specialized capabilities for a
whole-of-government and nation approach to security in cyberspace.55 USCYBERCOM
Commander Admiral Michael S. Rogers has said that overall, Cyber Mission Forces will be about
80% military and 20% civilian. At a recent conference, Deputy Commander of USCYBERCOM
Lieutenant General James McLaughlin said the Cyber Mission Force was being formed into 133
teams of tactical units that will 56support all Combatant Commands, and that at least half of these
teams would be used for defensive measures.
53
Advanced Questions for Vice Admiral Michael S. Rogers, Nominee for Commander, United States Cyber
Command, Senate Armed Services Hearing of March 11, 2014, http://www.armed-services.senate.gov/imo/media/doc/
Rogers_03-11-14.pdf.
54
From http://www.washingtonpost.com/world/national-security/pentagon-to-boost-cybersecurity-force/2013/01/27/
d87d9dc2-5fec-11e2-b05a-605528f6b712_story.html.
55
http://www.defensenews.com/article/20141103/TRAINING/311030018/As-cyber-force-grows-manpower-detailsemerge.
56
Wyatt Olson, Cyber Command trying to get running start, add staff, Stars and Stripes, December 11, 2014.
14
Each of the four military services provides cyber mission forces to USCYBERCOM. All of the
services cyber divisions plan to steadily increase their number of cyber operators over the next
two years.
Authorities
Authorities for U.S. military operations in cyberspace are not currently organized according to the
nature of the perceived threat, whether espionage, crime, or war. Instead, authorities are organized
according to the domain (.mil, .gov, .com, etc.) in which the activity is taking place, as opposed to
its motivations or effects. Presidential Policy Directive 20, discussed in greater detail below,
distinguishes between network defense on the one hand and offensive and defensive cyberspace
operations on the other.
U.S. policy on network defense is to adopt a risk-management framework published by the
Department of Commerces National Institute of Standards and Technology. Responsibility for
implementing the framework is shared among different government departments and agencies,
with U.S. Cyber Command responsible for the .mil domain and the Department of Homeland
Security responsible for the .gov domain. Adoption of the NIST framework is voluntary for
private companies and their own network defense.
One of the instruments through which offensive cyberspace operations are conducted may be a
classified Execute Order, defined by DOD as an order issued by the Chairman of the Joint
Chiefs of Staff, at the direction of the Secretary of Defense, to implement a decision by the
President to initiate military operations.57 According to The Federation of American Scientists
Secrecy News, Air Force Instruction 10-1701, entitled Command and Control (C2) for
Cyberspace Operations, dated March 5, 2014, states, Classified processes governing C2
[command and control] of AF [Air Force] offensive and defensive cyberspace operations
conducted by AF Cyber Mission Forces are addressed in a classified CJCS [Chairman, Joint
Chiefs of Staff] Execute Order (title classified) issued on 21 Jun 13.58 Then-Vice Admiral
Michael Rogers, as a nominee for Commander, U.S. Cyber Command (and NSA Director), said
57
15
before the Senate Armed Services Committee that geographic combatant commanders already
have authority to direct and execute certain Defensive Cyberspace Operations (DCO) within their
own networks. However, the Execute Order suggests that there may be standing orders to
conduct offensive cyberspace operations as well.
The following section provides a brief overview of evolving norms in cyberspace and the
authorities that govern network defense and cyberspace operations.
Legislative Authorities
Section 941of the National Defense Authorization Act for Fiscal Year 2013 (P.L. 112-239),
affirms the Secretary of Defenses authority to conduct military activities in cyberspace. The
provisions language is similar to that in Section 954 of final conference report to accompany
H.R. 1540, the National Defense Authorization Act for Fiscal Year 2012. In this version, this
section reaffirms that the Secretary of Defense has the authority to conduct military activities in
cyberspace. In particular, it clarifies that the Secretary of Defense has the authority to conduct
clandestine cyberspace activities in support of military operations pursuant to a congressionally
authorized use of force outside of the United States, or to defend against a cyberattack on an asset
of the DOD.59 The section highlights the blurred lines between military operations and
intelligence activities, particularly with respect to cyberspace. In general, Title 10 and Title 50 of
the U.S. Code refer to distinct chains of command and missions belonging to the armed forces
and intelligence agencies, respectively. The U.S. Cyber Command, the military entity responsible
for offensive operations in cyberspace and subject to Title 10 authorities, is co-located with and
led by the Director of the National Security Agency, a Title 50 intelligence organization.
Computer Network Attack, the military parlance for offensive operations, is closely related to and
at times indistinguishable from Computer Network Exploitation, which is used to denote data
extrapolation or manipulation.
According to DOD, a clandestine operation is one that is sponsored or conducted by
governmental departments or agencies in such a way as to assure secrecy or concealment. A
clandestine operation differs from a covert operation in that emphasis is placed on concealment of
the operation rather than on concealment of the identity of the sponsor.60 Under Title 50, a
covert action is subject to presidential finding and Intelligence Committee notification
requirements. Traditional military activity, although undefined, is an explicit exception to the
Title 50 U.S.C. covert action definition in Section 913 as the identity of the sponsor of a
traditional military activity may be well known.
According to the Joint Explanatory Statement of the Committee of Conference, H.R. 1455, July
25, 1991, traditional military activities
59
The previous version would have given the Secretary of Defense the authority to conduct clandestine cyberspace
activities in support of military operations pursuant specifically to the Authorization for the Use of Military Force (P.L.
107-40; 50 U.S.C. 1541 note) outside of the United States or to defend against a cyberattack on an asset of the
Department of Defense.
60
Department of Defense Dictionary of Military and Associated Terms, Joint Publication1-02, as amended through
August 15, 2014. [reconcile with similar footnote above]
16
include activities by military personnel under the direction and control of a United States
military commander (whether or not the U.S. sponsorship of such activities is apparent or
later to be acknowledged) preceding and related to hostilities which are either anticipated
(meaning approval has been given by the National Command Authorities for the activities
and or operational planning for hostilities) to involve U.S. military forces, or where such
hostilities involving United States military forces are ongoing, and, where the fact of the U.S.
role in the overall operation is apparent or to be acknowledged publicly.
By this reading, a clandestine operation falls under the traditional military activity rubric, because
the identity of the sponsor is not concealed. Hence, by referring only to clandestine operations
rather than covert operations, the provision distinguishes between approval and reporting
requirements for military-directed cyberspace operations and those conducted by the intelligence
community. By requiring quarterly briefings to the congressional defense committees, the
language would also appear to address concerns that a clandestine or traditional military
activity designation for a cyber operation would skirt the strict oversight requirements of its
covert counterpart. However, confusion may remain regarding the proper role and requirements
of the military, because some cyber operations may contain both covert and clandestine elements.
Another consideration is the militarys responsibility to notify congressional intelligence
committees of computer network exploitation activities undertaken as operational preparation of
the environment.
Executive Authorities
In December 2008, President-elect Obama offered details about the cybersecurity goals his
Administration would pursue, including strengthening federal leadership on cybersecurity,
developing next-generation secure computers and networking for national security applications,
and protecting the IT infrastructure to prevent corporate cyberespionage.61 In February 2009, he
initiated a 60-day interagency review with the goal of developing a strategic framework to
ensure that federal cybersecurity initiatives are appropriately integrated, resourced, and
coordinated with Congress and the private sector.62 The White House released the Cyberspace
Policy Review in May 2009.63 At that time, the President announced64 that the Administration
would pursue a new comprehensive approach to securing Americas digital infrastructure, and
that he was creating a new White House office to be led by a Cybersecurity Coordinatora
senior cybersecurity policy official, often referred to as the Cyber Czar, assigned to the Office
of the President and responsible for coordinating the nations cybersecurity-related policies.
While many security observers saw these initial efforts by the Obama Administration as a positive
step, others were concerned that government-wide collaborative efforts were not keeping pace
61
Report: White House should oversee cybersecurity, CNN, December 8, 2008, http://www.cnn.com/2008/TECH/12/
08/cyber.security/.
62
The White House, President Obama Directs the National Security and Homeland Security Advisors to Conduct
Immediate Cyber Security Review, press release, February 9, 2009, http://www.whitehouse.gov/the-press-office/
president-obama-directs-national-security-and-homeland-security-advisors-conduct-im.
63
The White House, Cyberspace Policy Review, May 29, 2009, http://www.whitehouse.gov/assets/documents/
Cyberspace_Policy_Review_final.pdf; the White House, Cyberspace Policy Review [Supporting Documents], May
2009, http://www.whitehouse.gov/cyberreview/documents/.
64
The White House, Remarks by the President on Securing Our Nations Cyber Infrastructure, press release, May 29,
2009, http://www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-CyberInfrastructure/.
17
with the threats directed at U.S. technological global interests. Between 2009 and 2013, cyber
threats to U.S. infrastructure and other assets became a growing concern to policy makers.65
In the absence of legislative action, in 2012 the Obama Administration announced a new
Presidential policy directive related to U.S. Cyber Operations, the contents of which remain
classified, and began drafting an executive order on cybersecurity practices, Executive Order
13636, Improving Critical Infrastructure Cybersecurity, released after a year of interagency
debate and review.
At the federal level, five executive orders and Presidential directives authorize offensive and
defensive action in cyberspace:
The article went on to quote an unnamed senior administration official on the distinction between
defense and offense, clarifying that network defense is what youre doing inside your own
65
CRS Report R41674, Terrorist Use of the Internet: Information Operations in Cyberspace, by Catherine A.
Theohary and John W. Rollins; CRS Report R42507, Cybersecurity: Authoritative Reports and Resources, by Topic, by
Rita Tehan.
66
The Comprehensive National Cybersecurity Initiative, http://www.whitehouse.gov/issues/foreign-policy/
cybersecurity/national-initiative; National Security Presidential Directive 54 / Homeland Security Presidential Directive
23 (NSPD-54/HSPD-23).
67
CRS Report R40427, Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy
Considerations, by John W. Rollins and Anna C. Henning.
68
Joshua Eaton, American cyber-attack list uncovered, Al Jazeera, http://america.aljazeera.com/articles/multimedia/
timeline-edward-snowden-revelations.html, accessed August 12, 2014.
18
networks.... Cyber-operations is stuff outside that space, and recognizing that you could be doing
that for what might be called defensive purposes. 69
PPD-20 closes a perceived gap in the authorities necessary for DOD to defend the nation in
cyberspace, a gap that has not been addressed by Congress. The directive does not create new
powers for federal agencies or the military; however, by distinguishing between network defense
and cyber operations, it provides a policy framework for the Pentagons rules of engagement for
cyberspace. As specifically described in the White House fact sheet, PPD-20:
takes into account the evolution of the threat and growing experience with the
threat;
establishes principles and processes for using cyber operations so cyber tools are
integrated with the full array of national security tools;
mandates that the United States take the least action necessary to mitigate threats;
and
expands information sharing and collaboration between the government and the
private sector, including sharing classified information by broadening a program
developed for the defense industrial base to other CI sectors;
identifies CI with especially high priority for protection, using the consultative
process;
69
Ellen Nakashima, Obama Signs Secret Directive to Help Thwart Cyberattacks Washington Post, November 14,
2012.
70
Cheryl Pellerin, DOD Readiness Elements Crucial to Cyber Operations U.S. Department of Defense, American
Forces Press Service, http://www.defense.gov/news/newsarticle.aspx?id=120381.
19
incorporates privacy and civil liberties protections in activities under the order.
In addition to codifying the DECS program, the order provides specific responsibilities to DHS
and the sector-specific agencies, as well as the Departments of Commerce, Defense, and Justice,
the intelligence community, the General Services Administration, and the Office of Management
and Budget, addressed below.
organizing research and development (R&D) to enable secure and resilient CI,
enhance impact-modeling capabilities, and support strategic DHS guidance.
The directive provides specific responsibilities to DHS and the sector-specific agencies, as well as
the Departments of Commerce, Interior, Justice, and State; the intelligence community; the
General Services Administration; and the Federal Communications Commission.
20
response to a domestic cyber incident.72 This plan fits into DHSs National Response Framework,
a tiered response guide for local, state, and federal governments with respect to major disasters or
emergencies. A 2010 memorandum of agreement between DOD and DHS also guides
cooperation between the two entities with respect to securing national cyber assets.73
International Authorities
The DODs role in defense of cyberspace follows the body of laws, strategies, and directives
outlined above. For the military to respond to an act of cyberterrorism or cyberwar, a presidential
finding must be issued and an order must be executed. However, discussions have been underway
in various international fora that may affect how the U.S. government views certain actions in
cyberspace and when a military response is warranted. Although the President still decides
ultimately what the military will do, the decisions made in the international arena could affect
how the Department of Defense organizes, trains, and equips its forces in order to fulfill treaty
obligations.
As of yet, no international instruments have been drafted explicitly to regulate inter-state relations
in cyberspace. One apparent reason for the absence of such a treaty is that the international
governance of cyberspace has largely been the purview of private, professional organizations
such as the Internet Engineering Task Force (IETF) and the Internet Corporation for Assigned
Names and Numbers (ICANN). However, politically motivated cyberattacks are increasingly
common and, although difficult to attribute, often raise strong suspicion of government
involvement. More importantly, perhaps, states have become targets of cyberattack, provoking a
sense of urgency regarding the creation of national strategies and capabilities for cyberdefense
and cyberoffense.
Department of Homeland Security, National Cyber Incident Response Plan, Interim Version, September 2010.
Accessed at https://www.dhs.gov/xlibrary/assets/20101013-dod-dhs-cyber-moa.pdf.
74
The White House, International Strategy for Cyberspace, May 2011, http://www.whitehouse.gov/sites/default/files/
rss_viewer/international_strategy_for_cyberspace.pdf.
75
Remarks of Harold Hongju Koh, Legal Advisor U.S. Department of State, at a USCYBERCOM Inter-Agency Legal
Conference, Ft. Meade, MD, September 18, 2012.
73
21
a nuclear plant, opening a dam and causing flood damage, and causing airplanes to crash by
interfering with air traffic control. By focusing on the ends achieved rather than the means with
which they are carried out, this definition of cyberwar fits easily within existing international
legal frameworks. If an actor employs a cyber weapon to produce kinetic effects that might
warrant fire power under other circumstances, then the use of that cyber weapon rises to the level
of the use of force.
However, the United States recognizes that cyberattacks without kinetic effects are also an
element of armed conflict under certain circumstances. Koh explained that cyberattacks on
information networks in the course of an ongoing armed conflict would be governed by the same
principles of proportionality that apply to other actions under the law of armed conflict. These
principles include retaliation in response to a cyberattack with a proportional use of kinetic force.
In addition, computer network activities that amount to an armed attack or imminent threat
thereof may trigger a nations right to self-defense under Article 51 of the U.N. Charter. Here
Koh cites the International Strategy for Cyberspace, which affirmed that when warranted, the
United States will respond to hostile acts in cyberspace as we would to any other threat to our
country. The International Strategy goes on to say that the U.S. reserves the right to use all
means necessary diplomatic, informational, military, and economic as appropriate and
consistent with applicable law, and exhausting all options before military force whenever
possible.
22
measures, including for the exchange of information. Unlike the work done at Tallinn under the
auspices of NATO, this U.S.-led process includes both China and Russia.
23
80
differences between the United States and Russia about various aspects of cybersecurity. In
December 2001, the General Assembly approved Resolution 56/183, which endorsed the World
Summit on the Information Society (WSIS) to discuss on information society opportunities and
challenges. This summit was first convened in Geneva, in 2003, and then in Tunis, in 2005, and
a10-year follow-on in Geneva in May 2013. Delegates from 175 countries took part in the first
summit, where they adopted a Declaration of Principlesa road map for achieving an open
information society. The Geneva summit left other, more controversial issues unresolved,
including the question of Internet governance and funding. At both summits, proposals for the
United States to relinquish control of ICANN were rejected.
Law of War
The so-called Law of War embodied in the Geneva and Hague Conventions and the U.N.
Charter may in some circumstances apply to cyberattacks, but without attempts by nation states to
apply it, or specific agreement on its applicability, its relevance remains unclear. It is also
complicated by difficulties in attribution, the potential use of botnets (see the Malware section
above), and possible harm to third parties from cyber-counterattacks, which may be difficult to
contain. In addition, questions of territorial boundaries and what constitutes an armed attack in
cyberspace remain. The laws application would appear clearest in situations where a cyberattack
causes physical damage, such as disruption of an electric grid. As mentioned above, the Tallinn
81
Manual addresses many of these questions.
Since the 2007 attack on Estonia, NATO has established authorities relating to cyberdefense,
with the goals of advancing strategy and centralizing defense capabilities across members. A
80
Oona Hathaway et al., The Law of Cyber-Attack, California Law Review 100, no. 4 (2012), http://papers.ssrn.com/
sol3/papers.cfm?abstract_id=2134932.
81
For a detailed discussion, see Hathaway et al., The Law of Cyber-Attack. See also CRS Report RL31787,
Information Operations, Cyberwarfare, and Cybersecurity: Capabilities and Related Policy Issues, by Catherine A.
Theohary; James A. Lewis, Conflict and Negotiation in Cyberspace (Center for Strategic and International Studies,
February 2013), https://csis.org/files/publication/130208_Lewis_ConflictCyberspace_Web.pdf; Mary Ellen OConnell
and Louise Arimatsu, Cyber Security and International Law (London, UK: Chatham House, May 29, 2012),
http://www.tsa.gov/sites/default/files/assets/pdf/Intermodal/pipeline_sec_incident_recvr_protocol_plan.pdf.
82
Hathaway et al., The Law of Cyber-Attack, p. 857.
83
See CRS Report RL31787, Information Operations, Cyberwarfare, and Cybersecurity: Capabilities and Related
Policy Issues, by Catherine A. Theohary.
24
84
policy on cyberdefense and an associated action plan were adopted in 2011, and the NATO
Communications and Information Agency (NCIA) was established in 2012 to facilitate the
centralization effort.85 The NATO Cyber Center of Excellence located in Tallinn, Estonia, is
another source of legal analysis.
Defense Instruments
The United States has signed 16 treaties and other agreements with 13 other countries and the
European Union that include information security, mostly of classified military information, or
defense-related information assurance and protection of computer networks. According to news
reports, the United States and Australia have agreed to include cybersecurity cooperation within a
88
defense treaty, declaring that a cyberattack on one country would result in retaliation by both.
25
However, none of the documents issued by these organizations appear to be binding in effect.
89
For summaries, see International Telecommunication Union, Global Cybersecurity Agenda (GCA): Global Strategic
Report, 2008, http://www.itu.int/osg/csd/cybersecurity/gca/global_strategic_report/global_strategic_report.pdf.
90
Ministry of Foreign Affairs of the Peoples Republic of China, China, Russia and Other Countries Submit the
Document of International Code of Conduct for Information Security to the United Nations, September 13, 2011,
http://www.fmprc.gov.cn/eng/zxxx/t858978.htm.
91
Among the concerns cited were the absence of provisions on international law enforcement and combating
cyberespionage; its call for international cooperation relating to curbing dissemination of information relating to
political, economic, and social stability and spiritual and cultural environment; and ambiguity with respect to
censorship policy (Jeffrey Carr, 4 Problems with China and Russias International Code of Conduct for Information
Security, Digital Dao, September 22, 2011, http://jeffreycarr.blogspot.com/2011/09/4-problems-with-china-andrussias.html).
92
Aliya Sternstein, U.S., Russia, Other Nations Near Agreement on Cyber Early-Warning Pact, Nextgov:
Cybersecurity, December 5, 2012, http://www.nextgov.com/cybersecurity/2012/12/us-russia-other-nations-nearagreement-cyber-early-warning-pact/59977/; Aliya Sternstein, Cyber Early Warning Deal Collapses After Russia
Balks, Nextgov: Cybersecurity, December 7, 2012, http://www.nextgov.com/cybersecurity/2012/12/cyber-earlywarning-deal-collapses-after-russia-balks/60035/.
93
Goldsmith, Cybersecurity Treaties: A Skeptical View.
26
94
Deep packet inspection allows the content of a unit of data to be examined as it travels through an inspection point, a
process which enables data mining and eavesdropping programs.
27
Current Legislation
The National Defense Authorization Act for Fiscal Year 2015 (P.L. 113-291) contains some
provisions related to DOD cybersecurity and cyber operations. These provisions:
28
direct a program of decryption to inspect content for threats and insider activity
within DOD networks.
state the Sense of Congress that as ICANN turns to global community for
leadership, support should be given only if assurances are provided for current
legacy IP numbers used by DOD and the U.S. government.
direct that a new mission forces, training, manning and equipping plan and
associated programmatic elements be submitted to Congress.
29
Unless otherwise noted, these events are cited in Significant Cyber Events Washington, DC: Center for Strategic
and International Studies, http://csis.org/program/significant-cyber-events; accessed August 7, 2014.
96
Kenneth Geers, Cyberspace and the Changing Nature of Warfare, keynote speech, Japan, 2008,
http://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Geers/BlackHat-Japan-08-Geers-Cyber-WarfareWhitepaper.pdf.
97
Jeffrey Carr, Real Cyber Warfare: Carrs Top Five Picks, Forbes, February 4, 2011, http://www.forbes.com/sites/
jeffreycarr/2011/02/04/real-cyber-warfare-carrs-top-five-picks/; Kenneth Geers, Cyberspace and the Changing Nature
of Warfare, keynote speech, Japan, 2008, http://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Geers/BlackHatJapan-08-Geers-Cyber-Warfare-Whitepaper.pdf.
98
Kenneth Geers, Cyberspace and the Changing Nature of Warfare, keynote speech, Japan, 2008,
http://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Geers/BlackHat-Japan-08-Geers-Cyber-WarfareWhitepaper.pdf.
99
Joshua Davis, Hackers Take Down the Most Wired Country in Europe, Wired, August 21, 2007,
http://archive.wired.com/politics/security/magazine/15-09/ff_estonia?currentPage=all.
100
Significant Cyber Events Washington, DC: Center for Strategic and International Studies, http://csis.org/program/
significant-cyber-events; accessed August 7, 2014.
101
Brian Krebs, Lithuania Weathers Cyberattack, Braces for Round 2, The Washington Post, July 3, 2008,
http://voices.washingtonpost.com/securityfix/2008/07/lithuania_weathers_cyber_attac_1.html.
30
January 2009: DoS attacks originating in Russia shut down Kyrgyzstans two main Internet
servers on the same day that the Russian government pressured Kyrgyzstan to bar U.S. access to a
local airbase.103
July 2009: Servers in South Korea and the United States sustained a series of attacks, reportedly
by North Korea.104
June 2010: Stuxnet worm damaged an Iranian nuclear facility. The United States and Israel
were implicated in the attack.105
September 2011: Keylogger malware was found on ground control stations for U.S. Air Force
unmanned aerial vehicles (UAVs) and reportedly infected both classified and unclassified
networks at Creech Air Force Base in Nevada.
May 2012: An espionage worm called Flame, allegedly 20 times more complex than Stuxnet,
was discovered on computers in the Iranian Oil Ministry, as well as in Israel, Syria, and Sudan.
August 2012: Gauss worm infected 2,500 systems worldwide. The malware appeared to have
been aimed at Lebanese banks, and contained code whose encryption has not yet been broken.
August 2012: The Cutting Sword of Justice, a group reportedly linked to the government of
Iran, used the Shamoon virus to attack major oil companies including Aramco, a major Saudi
oil supplier, and the Qatari company RasGas, a major liquefied natural gass (LNG) supplier. The
attack on Aramco deleted data on 30,000 computers and infected (without causing damage)
control systems.
September 2012-June 2013: The hacker group Izz ad-Din al-Qassam launched DoS attacks
against major U.S. financial institutions in Operation Ababil. Izz ad-Din al-Qassam is believed
to have links to Iran and Hamas.
January 2013: The New York Times, Wall Street Journal, Washington Post, and Bloomberg News
revealed that they were targeted by persistent cyberattacks. China was the suspected source.
May 2013: Israeli officials reported a failed attempt by the Syrian Electronic Army to
compromise water supply to the city of Haifa.
(...continued)
102
John Markoff, Before the Gunfire, Cyberattacks, New York Times, August 12, 2008, http://www.nytimes.com/
2008/08/13/technology/13cyber.html?_r=0.
103
Daniel McLaughlin, Lithuania accuses Russian hackers of cyber assault after collapse of over
300 websites (Irish Times, July 2, 2008) p. 10, http://lumen.cgsccarl.com/login?url=http://proquest.umi.com/pqdweb?
did=1503762091&sid=2&Fmt=3&cl
ientld=5094&RQT=309&VName=PQD.
104
Significant Cyber Events Washington, DC: Center for Strategic and International Studies, http://csis.org/program/
significant-cyber-events; accessed August 7, 2014.
105
Ralph Langer, To Kill a Centrifuge: A Technical Analysis of What Stuxnets Creators Tried to Achieve,
November, 2013, http://www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdf.
31
August 2013: Leaks revealed that the U.S. government purportedly conducted 231 cyber
intrusions in 2011 against Russia, China, North Korea, and Iran. Most of the intrusions were
related to nuclear proliferation.
April 2014: The disclosure of the Heartbleed bug revealed vulnerability in the OpenSSL protocol
previously considered the standard for Internet security. Canada reported more than 900
compromised social security numbers.106
May 2014: The United States indicted five Chinese military officers on charges of computer
hacking, economic espionage, and other offenses against six targets in the United States nuclear
power, metals, and solar power industries. China has denied the charges.107 According to U.S.
Attorney General Eric Holder, This is a case alleging economic espionage by members of the
Chinese military and represents the first ever charges against a state actor for this type of
hacking.108
July 2014: The United States charged a Chinese entrepreneur with breaking into the computer
systems of the U.S. defense giant Boeing and other firms to steal data on military programs
concerning warplanes, including C-17 cargo aircraft, and the F-22 and F-35 fighter jets.109 At the
same time, the security firm Kapersky reported a massive cyber operation dubbed Energetic
Bear, which targeted more than 2,800 industrial firms around the globe. Although some reports
identified a Russian hacker group as the source, Kapersky refrained from attributing the attack to
any one country.110
December 2014: U.S. cybersecurity firm Cylance reported that an Iranian hacker group has
breached airlines, energy and defense firms, and the U.S. Marine Corps intranet in an attack
known as Operation Cleaver.111
106
http://heartbleed.com/; OpenSSL Heartbleed Vulnerability Cyber Security Bulletins. Public Safety Canada. April
11, 2014, retrieved April 14, 2014. SSL (Secure Sockets Layer) is the standard security technology for establishing an
encrypted link between a web server and a browser.
107
Song Sang-ho, Concerns rise over militarization of cyberspace, The Korean Herald, July 13, 2014,
http://www.koreaherald.com/view.php?ud=20140713000188.
108
Office of Public Affairs, U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S.
Corporations and a Labor Organization for Commercial Advantage, Department of Justice, May 19, 2014,
http://www.justice.gov/opa/pr/2014/May/14-ag-528.html.
109
Dan Levine, US Charges Chinese Man with Hacking into Boeing, Reuters, July 11, 2014,
http://www.reuters.com/article/2014/07/11/boeing-china-cybercrime-idUSL2N0PM2FV20140711.; Song Sang-ho,
Concerns rise over militarization of cyberspace, The Korean Herald, July 13, 2014, http://www.koreaherald.com/
view.php?ud=20140713000188.
110
See http://www.darkreading.com/attacks-breaches/energetic-bear-under-the-microscope/d/d-id/1297712.
111
See http://www.defensenews.com/article/20141202/DEFREG04/312020030/Report-Iran-Hackers-InfiltratedAirlines-Energy-Defense-Firms.
32
Anne I. Harrington
APSA Congressional Fellow
33