Uploaded by yeh10705

The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs Is Strategic Cyber Deterrence the Key to Solving the Problem

advertisement
Asia-Pacific Review
ISSN: 1343-9006 (Print) 1469-2937 (Online) Journal homepage: http://www.tandfonline.com/loi/capr20
The Escalation of State Sponsored Cyberattack and
National Cyber Security Affairs: Is Strategic Cyber
Deterrence the Key to Solving the Problem?
Jun Osawa
To cite this article: Jun Osawa (2017) The Escalation of State Sponsored Cyberattack and
National Cyber Security Affairs: Is Strategic Cyber Deterrence the Key to Solving the Problem?,
Asia-Pacific Review, 24:2, 113-131, DOI: 10.1080/13439006.2017.1406703
To link to this article: https://doi.org/10.1080/13439006.2017.1406703
Published online: 21 Dec 2017.
Submit your article to this journal
Article views: 20
View related articles
View Crossmark data
Full Terms & Conditions of access and use can be found at
http://www.tandfonline.com/action/journalInformation?journalCode=capr20
Download by: [Gothenburg University Library]
Date: 09 January 2018, At: 03:00
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
Asia-Pacific Review, 2017
Vol. 24, No. 2, 113–131, https://doi.org/10.1080/13439006.2017.1406703
The Escalation of State
Sponsored Cyberattack
and National Cyber
Security Affairs: Is
Strategic Cyber
Deterrence the Key to
Solving the Problem?
JUN OSAWA
During the past decade, nation-states have started to utilize the cyber domain as
a means to serve their national interest. An overview of the trend of cyberattacks
in the last decade reveals that cyberattacks frequently follow incidents of
international discord or conflict. Some nation-states have engaged in a
cyberattack for the purpose of intervening in the domestic affairs of a nearby
country. Therefore, cyber security has become a top priority in national and
international security. In order to stop potential state adversaries conducting
cyberattacks against national interest, strong national security policy
measures, such as cyber deterrence, collective cyber security, and information
sharing, have to be taken to prevent calamities of severe cyberattack.
Introduction
nformation infrastructure, from satellites orbiting in space to undersea cables,
plays an increasingly indispensable role in both economic activities and
national security in the past quarter century. Our daily life is completely dependent
on information technology and the Internet of Things (IoT), from GPS guided
navigation systems to smartphones in our hands. We depend more and more on
I
# 2017 Institute for International Policy Studies
113
Jun Osawa
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
the cyber domain, and this dependency makes a country and society more vulnerable to cyberattack. Since business worldwide is developing through digital transformation, a global cyberattack could trigger a huge economic loss. The UK-based
reinsurance entity Lloyd’s estimates1 an extreme cyberattack could cost US$53.1
billion, as high as the cost of economic damage inflicted by Hurricane Sandy in
2012. A cyberattack could cost our society as much as a severe natural disaster.
On June 27, 2017 a large scale ransomware outbreak of “Petya/NotPetya,”
almost a global cyber pandemic, spread across the world from Ukraine, victimizing several ministries of the Ukrainian government, critical infrastructure operating companies in Ukraine, and multinational companies with a branch or
subsidiary company in Ukraine, such as American multinational food and beverage company Mondelez International, the largest container ship operator A.P.
Moller-Maersk of Denmark, American multinational pharmaceutical company
Merck, British multinational advertising company WPP, American courier delivery service company FedEx, and so on. This cyber pandemic had tremendous
negative impact on corporate profits of targeted companies.
Economic cost, however, is not the only fundamental issue. The real problem
lies in the fact that a nation-state has engaged in a cyberattack for the purpose of
intervening in the domestic affairs of a nearby country. The Security Service of
Ukraine accused the Russian Federation of involvement in the cyberattack for
the sake of “destroying important data and fomenting disorder in state and
private institutions in Ukraine to spread panic among the population.”2
During the past decade, not only Russia but also other countries have started
to utilize the cyber domain as a means to serve their national interest. The purpose
of this article is firstly to uncover new trends in the cyber domain, and, in particular what and how nation states utilize the cyber domain in peacetime to achieve
their national interests. Secondly, it looks at how nation states try to shape strategies and policies that are helpful in stopping or deterring malevolent behavior
of states in the cyber domain. As the number of state-sponsored cyberattack
grows, strong measures, rather than cyber security or passive cyber defense,
have to be taken to prevent calamities of severe cyberattack.
Threats of state-sponsored cyberattacks in the past
decade
Computer viruses, hacking, and malicious cyber activities have been nothing out
of the ordinary from the beginning of ARPANET in the 1970s, an ancestral
network before the INTERNET. A computer program named “Creeper” which
was originally written by Bob Thomas in 1971 was the first self-replicating computer worm in the computer network of ARPANET and is regarded as the first
114
A SIA -P ACIFIC R EVIEW
V
2017
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs
computer virus.3 At that time the program was not a malicious program and displayed only a funny message on the screen, “I’m creeper. Catch me if you can!”
Those good old days are long gone. The more that the importance of the cyber
domain increases, the more serious and numerous threats to cyber security
become. An overview of the trend of cyber-attacks in the last decade reveals
that cyberattacks frequently follow incidents of international discord or conflict.
Risks of state-sponsored cyberattacks are becoming more serious with the intent
to steal classified information, disrupt critical infrastructure, obstruct military
systems, and shake the foundations of democracy of other countries with black
propaganda, or false information from the opposing side of a conflict. In addition
to targeted attacks with the objective of stealing classified information, signs of
attacks designed to paralyze the control systems of vital social infrastructure
have begun to appear in recent years. With the realization that successful
attacks on electrical grids, transportation facilities, industrial sites, or other
infrastructure would have an adverse impact on people’s actual daily lives,
detecting and preventing attacks on control systems has become the top cyber
defense priority.
Table 1 shows the trend of state-sponsored cyberattacks in the past decade.
The first known instance of a state-sponsored massive cyberattack occurred in
the context of an international dispute that emerged in Estonia, one of the three
Baltic countries, a decade ago.4 In the Estonian case, a nationalistic confrontation
between Russia and Estonia over the removal of a Bronze Soviet Red Army
Soldier symbolizing Soviet oppression triggered large scale distributed denialof-service (DDoS) cyberattacks targeting the country’s infrastructure, causing a
shutdown of the websites of government authorities, political parties, and institutions in the financial sector.5 At that time Estonia depended heavily on information technology and was one of the countries with the most advanced
information infrastructure in Europe, so that the attack was quite successful. In
the second wave of DDoS attacks on May 10, 2007, nearly one million computers
abroad requested Estonian servers to respond to external communications and
filled the network of Estonia with meaningless packets. As a result, online
banking services and ATMs of Estonia’s two big banks came to a standstill.
Estonian Prime Minister Andrus Ansip blamed Russia for being responsible
for the attack.6 Despite insufficient evidence of direct involvement of the
Russian authority, cyber security experts are almost positive that the attack was
a Russian information operation or that Russian authority let “Proxies”7 attack
Estonia.8
There were three other similar9 state-sponsored “cyber sabotage” attacks in
2008 –09, aiming to paralyze servers or network service temporarily with an overwhelming volume of data traffic by using the method of DDoS attacks. In June and
July 2008, Lithuania became a victim of a suspected Russian cyberattack. Soon
A SIA -P ACIFIC R EVIEW
V
V OLUME 24, N UMBER 2
115
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
A SIA -P ACIFIC R EVIEW
V
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
.
.
.
.
.
.
.
Major State-sponsored Cyber Attacks (2007-2017)
(Year/Month)
2007.4 Estonia; cyber sabotage targeting government, media, financial sector.
2008.7 Lithuania; cyber sabotage targeting government, private sector.
2008 U.S. DoD; cyber intrusion and espionage.
2008.8 Georgia; cyber sabotage targeting government, media, financial sector.
2009.1 Kyrgyzstan; cyber sabotage targeting Internet Service Providers.
2009.7 ROK and U.S.; cyber sabotage targeting government.
2009.12 Google, cyber intrusion on its core system. Google retreated from business in China.
2010.8 Iran; Stuxnet, cyber subversion targeting Iranian uranium-enrichment plant.
2011.9 Japan; cyber espionage targeting defense industry, including MHI and IHI.
2011.10 Japan; cyber espionage targeting parliament member.
2011 – 12 U.S.; Iranian state-sponsored actor conducted cyber sabotage against financial sector.
2012.8 Saudi Arabia and Quarter; cyber subversion targeting energy industry, Saudi Aramco, RasGas.
2012.12 – 13.1 U.S.; cyber espionage targeting major newspapers and think tanks.
2013.3 ROK; cyber sabotage targeting media and financial sector.
2014.3 Ukraine; cyber sabotage targeting government and telecommunication company.
2014.5 Belgium; cyber espionage targeting Ministry of Foreign Affairs
cf. 2010- European countries; cyber espionage targeting government, int’l organization.
2014.8 U.S.; cyber intrusion and financial cyber crimes targeting JP Morgan, etc.
2014.10 U.S.; cyber intrusion and espionage targeting White House and State Department.
2014.11 U.S.; cyber subversion targeting Sony Pictures Entertainment. U.S. government identified the attacking group and sanctioned
North Korea (the first attributed state-sponsored attack).
2015.4 France; cyber subversion targeting TV5.
2015.4 U.S.; cyber intrusion and espionage targeting U.S. Office of Personnel Management, resulted in the theft of sensitive information of
21.5 million individuals.
2015 Germany; cyber espionage targeting Germany. Germany BND accused Russia.
Jun Osawa
116
Table 1.
2017
.
.
.
V
.
V OLUME 24, N UMBER 2
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
.
.
.
.
.
.
.
2015.5 Japan; cyber espionage targeting Pension Service, 1.25 million records breached.
2015.12 Ukraine; cyber subversion targeting power grid company. (the first officially attributed state-sponsored attack on Critical
Infrastructure)
2016.2 Bangladesh; cyber theft targeting the central bank, $81 million stolen.
2016.3 Sweden; cyber sabotage targeting media sector.
2016.4 Lithuania; cyber sabotage targeting its parliament.
2016.8 Viet Nam; cyber sabotage targeting international airports.
2016.11 Saudi Arabia; cyber subversion targeting government and private sector.
2016.11 U.S.; Russian cyber intrusion and espionage targeting Democratic National Committee.
2016.12 Ukraine; cyber subversion targeting power grid company in Kiev.
2017.4 Japan; new style cyber espionage operation named “Cloud Hopper” by APT10.
2017.5 World-wide; cyber subversion by the Wannacry ransomware cyber pandemic.
2017.6 World-wide; cyber subversion by the Petya/Not-Petya ransomeware cyber pandemic.
Source: Author, using open source materials.
117
The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs
A SIA -P ACIFIC R EVIEW
.
Jun Osawa
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
after the enactment of the law banning the use of Soviet Symbol, a huge number of
websites in the country suffered aggression; as a consequence, more than 300 websites were compromised and defaced with the Soviet flag and anti-Lithuanian
messages.10
Georgia was a constituent country of the Soviet Union and regained independence in 1991. After independence, Georgia has become embroiled in two ethnic
conflicts in South Ossetia and Abkhazia, where the ethnic minority supported by
Russia agitated for independence from the Georgian majority, resulting in an eruption of ethnic violence and conflict. On July 20 and August 8, 2008, large-scale
DDoS attacks occurred in Georgia.11 The attack on July 20 targeted news and government websites, and the latter attack, which was launched to coincide with the
invasion of Russian troops, extensively locked on the financial industry, business
in Georgia, and the website of the Georgian president and parliament.
In Kyrgyzstan, two major Internet Service Providers fell victim to a DDoS
cyberattack and were forced to shut down more than 80% of the country’s Internet
access. The background of the attack is believed to be due primarily to the
Moscow’s dissatisfaction with Kyrgyzstan allowing the U.S. Air Force to use
Manas Airport near Bishkek.
Estonia, Lithuania, Georgia, and Kyrgyzstan gained formal independence
from Russia, caused by the dissolution of the Soviet Union in 1991. All of
these four countries had diplomatic confrontations with Russia at that time.
Cyber security analysts consider the series of DDoS cyberattacks against the
four countries to have been covert information warfare or so-called “hybridwarfare”12 conducted by Russian Federation.
The U.S. Department of Defense created a Cyber Command in June 2009,
soon after the series of Russian hybrid-warfare campaigns. Then-Deputy Secretary
of Defense William Lynn said, "One of the reasons we’re looking at a Cyber
Command is to unify all aspects of cyber defense, so that you don’t separate
out offense, defense, intelligence, so that all of the various aspects work together,"
while emphasizing that more than 100 countries have the ability to conduct cyberattack and that the cyberattacks in Estonia and Georgia were quite successful.13
In addition to cyber sabotage attacks in these four countries with the objective
of jeopardizing political and economic stability in targeted countries, signs of
attacks designed to paralyze the control systems of vital social infrastructure
have begun to appear in recent years.
South Korea faced cyberattacks more severe and sophisticated than DDoS in
2013. On the afternoon of March 20, internal computer networks of television
broadcasters and three major banks were forced to shut down, caused by a premeditated malware assault on servers and tens of thousands of computers in the networks. The banks’ ATMs and the broadcasters’ news distribution systems were
118
A SIA -P ACIFIC R EVIEW
V
2017
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs
paralyzed for several hours. South Korea’s official investigation team blamed14
North Korea for masterminding the cyberattacks and the government estimated
the damage to South Korea of the March attack and a subsequent June attack to
be at least USD800 million, according to a ruling party legislator.15 After eight
months of careful preparation, Pyongyang apparently put a mass cyberattack
plan into action, coinciding with increasing military tension on the Korean Peninsula after Democratic People’s Republic of Korea’s (DPRK, North Korea) third
nuclear test on February 12, 2013.
One year later, in November 2014, Sony Pictures Entertainment was attacked
by a hacking group self-proclaimed “Guardian of Peace,” but afterwards it transpired that the group was actually North Korea itself. The outcome of the attack
was awful, almost half of company’s PCs (3262/6797) and servers (837/1555)
were wiped-off, and all the confidential material of the company, from unscreened
movie scripts to salary lists with 47,000 social security numbers, was dumped into
the public domain.16
Soon after the attack, the FBI started an investigation and confirmed one
month later, on December 19, that North Korea was behind the Sony attack.17
The Obama administration blamed North Korea; then-Secretary of Homeland
Security Jeh Johnson charged18 that the attack was not just an attack against a
company and employees, but also an attack on US freedom of speech and way
of life, and tightened sanctions on North Korea. The US Obama administration
regarded the cyberattack from North Korea as not just a usual cyberattack on a
private company but an unusual attack that breached a core value of freedom of
speech and violated US sovereignty. The administration announced19 new financial sanctions against North Korea on January 2, 2015.
On December 23, 2015, at the last minute before Christmas Day, more than
two hundred thousand people were deprived of light. A power grid company in
western Ukraine, Prykarpattyaoblenergo and two other companies were targeted
in a cyberattack, and the result was that several electric power substations were
forced off. The Ukrainian state security service SBU denounced that Russian
security services were responsible for the attack.20 It is the first cyber subversion
attack targeting power grid critical infrastructure and sent shockwaves through the
cyber security community. Three months later, the Ukraine-US joint investigation
team detected solid evidence of the malware that caused the blackout by wrecking
computers and wiping out sensitive control systems of the Ukrainian power grid
company. 21 According to the E-ISAC technical report on the attack, the attackers
used spear phishing e-mails to drop Black Energy variant malware and succeeded
in delivering remote access tools (RATs) that enable the attacker to access the
power-grid Supervisory Control And Data Acquisition (SCADA) system.22
Almost one year later, in an exactly similar way, a power grid in the Ukrainian
capital Kiev faced an outage of one-fifth of its energy consumption of the capital,
A SIA -P ACIFIC R EVIEW
V
V OLUME 24, N UMBER 2
119
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
Jun Osawa
caused by a cyberattack.23 Ukrainian President Petro Poroshenko condemned Russia
as “the investigation of a number of incidents indicated the complicity directly or
indirectly of Russian security services waging a cyberwar against our country.”24
And six months after the blackout in Kiev, a ransomware outbreak of a
“Petya” variant hit Kiev again. A wide range of governmental and private entities
in Ukraine, including governmental ministries and agencies, central bank and
private banks, national power grid company, and the national railway and
subway system in Kiev, were affected significantly by the outbreak.25 This
series of cyberattack campaigns against Ukraine coincided with the Russo-Ukrainian conflict since 2014. The cyberattack is now regarded as “hybrid warfare” and
causes serious concern among US cyber experts.
In a U.S. Senate Select Committee on Intelligence hearing, James R. Clapper,
the Director of National Intelligence, named26 the four most cyber-capable adversary states: China, Russia, Iran, and North Korea. As Clapper noted, these four
countries are very active in many aspects in the cyber arena.
Type of state-sponsored cyberattacks and changes
in the pattern
As shown in Table 2, state-sponsored cyberattacks are can be defined in five types
as follows: 1) Cyber Espionage, 2) Cyber Sabotage, 3) Cyber Subversion, 4)
Cyber Propaganda / Manipulation, and 5) Military Cyber Attack (Hybrid Cyber
Warfare).
Table 2.
Types of State-sponsored Cyberattack
† Cyber Espionage: steal confidential information, secrets or intellectual property, by
using methods of advanced persistent threat (spear phishing, watering hole attack,
etc.) or indiscriminate attacks.
† Cyber Sabotage: paralyze servers or network service temporarily with overwhelming
volume of data traffic, by using the method of distributed denial of service attacks.
† Cyber Subversion: disrupt or destroy function of computer network, including critical
infrastructure, by means of deleting or manipulating digital data after intrusion of
network by using methods of APT, indiscriminate attacks or Zero-Day
vulnerabilities.
† Cyber Propaganda/Manipulation: undermine or manipulate public opinion in western
allies by means of propaganda in cyber media or fake news spread by proxy actor to
cover or hide real purpose.
† Military Cyber Attack (Hybrid Cyber Warfare): disrupt or destroy adversary’s military
cyber-based C4ISR assets or critical infrastructure along with military operation.
Source: Author, using open source materials.
120
A SIA -P ACIFIC R EVIEW
V
2017
The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs
It is apparent that there have recently been three changes in the nature of
cyberattacks: a transition from non-targeted to targeted attacks designed to steal
classified information; the commencement of concerted cyberattacks targeting
control systems of infrastructure providers; and a new phenomenon of undermining or manipulating public opinion in democratic countries by means of propaganda in cyber media, fake news in social network services, or betraying
secrets on the Web.
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
Cyber Espionage/Spying
Since around 2006, cyberattacks have switched from prank attacks aimed at
infecting an unspecified, large number of hosts to targeted attacks with the objective of stealing top-secret information from specific organizations and individuals.
Ministries and agencies, governmental organizations, think tanks, and scholars
have faced sophisticated cyberattacks, so-called “Advanced Persistent Threat”
(APT), aimed at stealing top-secret information from specific organization and
individuals. State-sponsored cyberattacks have become not only a real threat to
national security but also a threat to economic activities of the private sector of
our countries. Risks of state-sponsored cyberattacks with the intent to steal classified information, disrupt critical infrastructure and obstruct military systems, are
becoming more serious.27 State-sponsored APT groups intend to make cyber
espionage of stealing secret information or theft of intellectual properties a
serious threat to national security.
Cyberattacks designed to paralyze control systems
In addition to targeted attacks, the telltale signs of attacks designed to paralyze the
control systems of vital social infrastructure have begun to appear in recent years,
such as the cyberattacks in Ukraine. Since attacks on control systems would have
an adverse impact on people’s actual lives, this has become the top-priority cyberspace defense issue in the US and other countries.
In this regard, the attention of information security experts was drawn in particular in 2010 to the Stuxnet worm, which targeted control machinery in Iranian
nuclear facilities.28 Officials at the major security company Symantec, which conducted detailed analysis of Stuxnet, characterized Stuxnet as the most significant
phenomenon in computer security of the past 20 years and as the first instance of
malware that actually attacks physical facilities. Analysis revealed that, in operation, Stuxnet consists of 15 different modules and that it must have taken not a
few engineers a period of time ranging from a few months to a few years to
develop. That it was sophisticated enough to hijack control of high-frequency converters which regulate centrifugal separators used for uranium enrichment over a
period of at least two years indicates that these cyberattack modules must have
been developed with nation-state support.
A SIA -P ACIFIC R EVIEW
V
V OLUME 24, N UMBER 2
121
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
Jun Osawa
Since the year 2000, the telltale signs of attacks designed to paralyze control
of vital social infrastructure such as electric power, gas, and water supplies have
been evident in the US and other countries. The industrial control systems for vital
infrastructure providers consist of field control equipment, such as PLCs (programmable logic controllers), actuators, and valve control devices, and a whole
plethora of information technology devices, such as server and client PCs,
which are used in the observation and measurement of conditions. It is claimed
that, normally, control systems are not too susceptible to cyberattack, since as a
security measure they are either not ordinarily connected to networks or are connected to them through a firewall. It has also been thought that since each system is
customized for the particular enterprise using it and is thus unique to that enterprise, it would be difficult to attack without thorough knowledge of the inner
workings of the system, and that such systems are also immune to ordinary computer viruses. In fact, however, it has recently become clear that these control
systems are highly susceptible to cyberattack since, in most cases, they are
running the same operating system as a PC and are periodically receiving data
input or update modules. Actually, there is a high incidence of country-level
cyberattacks aimed at critical infrastructure in the last decade.
Cyber Propaganda/Manipulation
During the US presidential campaign in 2016, we saw a quite new type of cyberattack against the Democratic National Committee (DNC). It is a new phenomenon of manipulating US public opinion by using propaganda media and fake
news in social network services written by “troll troops” and leaking inside information of the DNC on the Web. According to the intelligence report29 and the
joint analysis report30 on Russian hacking, two separate Russian espionage
groups, APT28/Fancy Bear and APT29/Cozy Bear, intruded into the information
system of the DNC in 2015 and April 2016.
State-sponsored actors undermine or manipulate public opinion in western
allies by means of propaganda in cyber media or fake news spread by proxy
actor to cover or hide the real purpose. This kind of cyberattack has now
become a grave challenge to the democracy of Western countries.
Cyber: 5th domain for warfare or essential platform
for all?
Cyber security has been one of the top priorities of national and international
security, even if some experts send a skeptical look at the real possibility of
cyber war. Former Secretary of Defense, Leon E. Panetta, delivered a speech
on cyber security to Business Executives in New York City, stating that “A cyberattack perpetrated by nation states and violent extremist groups could be as
122
A SIA -P ACIFIC R EVIEW
V
2017
The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
destructive as the terrorist attack on 9/11.” Then he sent an alert to the audience of
business executives that “the collective result of these kinds of attacks could be a
cyber Pearl Harbor; an attack that would cause physical destruction and the loss of
life.”31
During the presidential election campaign, Mr. Trump also emphasized the
importance of the cyber domain and the enhancement of US offensive capabilities.
On October 3, 2016, Mr. Trump told military veterans, “as a deterrent against
attacks on our critical resources, the United States must possess the unquestioned
capacity to launch crippling cyber counter-attacks.”32 After the presidential election, President Trump released an Executive Order on “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” on May 11, 2017.33 In
the EO, President Trump ordered strengthening of cyber security of the federal
government and US critical infrastructure. Three months later, President Trump
elevated the Cyber Command to the status of a Unified Combatant Command
focused on cyber space operations.34
On September 30, 2017, The Washington Post revealed that the President
Trump signed a directive to bring greater pressure on North Korea and lead to
the use of military cyber capability.35
Is a cyber war really around the corner? Many cyber experts have been debating the possibility of a war in the cyber arena for more than a decade.36 The question has yet to be answered. It is true that countries face cyber espionage, cyber
sabotage, and subversive activity, varying from cyber espionage aimed at news
media and think tanks by China37 to the cyber sabotage aimed at the production
facilities of Saudi Aramco by Iran.38 We have, however, not seen any cyber
warfare “hurting, injuring, and killing human beings, even a single one,” as
Thomas Rid argued in a panel discussion at The Brookings Institution. 39
“Cyber war” in the future might be far from the kind of war that we imagine.
It is sure that cyber war will not be in the category of war, when applying the
rigid social scientific definition of war to cyber warfare, as those defined by the
long-standing notable “Correlates of War Project (COW)”40 which was
established by David Singer and Melvin Small: defined as “sustained combat,
involving organized armed forces, resulting in a minimum of 1,000 battlerelated fatalities.”41
Although fatalities are not expected in a future cyber war, experts have
seriously concern about possible catastrophic results of a cyberattack on our
social infrastructure, as argued by Secretary Panetta: “the most destructive scenarios involve cyber actors launching several attacks on our critical infrastructure at
one time, in combination with a physical attack on our country.”42
Even if cyber war is not just around the corner, many national security experts
view the cyber domain as the fifth domain of warfare, after land, air, sea and
A SIA -P ACIFIC R EVIEW
V
V OLUME 24, N UMBER 2
123
Jun Osawa
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
space.43 In reality, however, any operations in these four domains rely entirely
upon cyber space, as shown in Figure 1. Thus, the cyber domain has become
necessary for national security, and cyber security has become a top priority in
national and international security.
As early as 1999, China advanced the doctrine of “unrestricted warfare” in
reference to cyber war, and, since around 2002, it has been establishing an information-war militia and forming combined teams comprised of private-sector IT
companies, universities, and People’s Liberation Army computer network task
forces within the military forces under the control of each military district.
Even North Korea is believed to have several-thousand-strong cyber units consisting of cyber combat personnel who have been selected as early as elementary
school and trained from then onwards. In the USA, an increasing sense of the
danger of cyber war has seen the establishment of the United States Cyber
Command and the formation within the four armed-services branches (the US
Army, Navy, Air Force, and Marine Corps) of the Army Cyber Command, the
Twenty-Fourth Air Force, the Tenth Fleet, and the Marine Corps Forces Cyberspace Command.
The National Security Strategy of the Government of Japan also describes “in
recent years, risks that can impede the utilization of and free access to global
domains, such as the sea, outer space, and cyberspace, have been spreading and
become more serious.” Further, “Risks of cyber-attacks with the intent to steal
classified information, disrupt critical infrastructure and obstruct military
systems, are becoming more serious.”
Richard Clarke, the former US Special Advisor to the US President on Cyber
Security and Cyber Terrorism, has written, “cyber war is real” and that “cyber war
Figure 1. The cyber domain has become a platform for military operations
124
A SIA -P ACIFIC R EVIEW
V
2017
The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs
has begun,” stating that there is “the potential to change the world military balance
and thereby fundamentally alter political and economic relations.”44 In fact, preparations for cyberwar are already underway in several countries.
Conclusion and policy recommendation: Cyber
deterrence and collective cyber security or alliance
for future cyber deterrence
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
Cyber deterrence
In order to stop potential state adversaries conducting cyberattacks against national
interest, the United States has employed a new strategy of “cyber deterrence” in
which the US applies deterrence theory to the cyber domain. The U.S. DoD
2015 Cyber Strategy calls for “deterrence in the Future Security Environment,”
saying the “Department of Defense must contribute to the development and
implementation of a comprehensive cyber deterrence strategy to deter key state
and non-state cyber actors from conducting cyberattacks against U.S. interests.”45
The U.S. Government seeks to establish a cyber deterrence strategy46 through
a trial and error process in recent years. President Obama gave a warning of the
growing threat in the cyber domain in his State of the Union Address on February
12, 2013.47 He pointed out that “America must also face the rapidly growing threat
from cyberattacks” and “Now our enemies are also seeking the ability to sabotage
our power grid, our financial institutions, and our air traffic control systems.” He
then revealed that he signed a new Executive Order “that will strengthen our cyber
defenses by increasing information sharing, and developing standards to protect
our national security, our jobs, and our privacy.”
Since then, the Obama administration adopted all policy tools that could deter
state-sponsored-cyberattacks.
Regarding the cyber espionage operations from China, the U.S. Department
of Justice prosecuted five Chinese military officers in 2014.48 In another case of
prosecution, a Chinese businessman was arrested in Canada and charged with
criminal conspiracy to steal military technical data, including Boeing C-17 strategic transport aircraft, by means of cyber espionage. And finally, Obama’s diplomatic pressure on Chinese president Xi in September 2015 to not engage in
economic cyber espionage evolved into a joint agreement in which neither the
US nor the Chinese Government will conduct or knowingly support cyberenabled theft of intellectual property, including trade secrets or other confidential
business information for commercial advantage.49
After the cyberattack against Sony Pictures Entertainment, the Obama administration imposed additional sanctions with respect to North Korea. The sanction is
the first case of the US introducing retaliatory financial sanctions against a stateA SIA -P ACIFIC R EVIEW
V
V OLUME 24, N UMBER 2
125
Jun Osawa
sponsored cyberattack. The Executive Order on January 2, 2015 says that for the
reason of the provocative, destabilizing, and repressive action and policies of the
government of North Korea, the US president orders sanctions on three North
Korean organizations and ten individuals.50
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
Collective cyber defense
To make good use of diplomatic pressure, like-minded countries have to promote
norms of state behavior in cyberspace, such as to refrain from cyber-enabled theft
of intellectual property for commercial gain, not to attack critical infrastructure
and not to interfere in internal affairs by means of cyber manipulation. In
Europe, NATO extends Article 5, the principle of collective defense, to cyber
domain. At the press conference on June 14, 2016, NATO Secretary General
Jens Stoltenberg said, “Cyber defense is part of collective defense. [. . .] We
have decided that a cyberattack can trigger Article 5, meaning that a cyberattack
can trigger collective defense, because we regard cyberattacks as something that
can cause a lot of damage and can be very dangerous.”51
In this context of collective cyber security, Japan and the US are working
closely to enhance cooperation between the two in the cyber domain. On
October 3, 2013, U.S. State Secretary Kerry and Defense Secretary Hagel and
their Japanese counterparts, Foreign Minister Kishida and Defense Minister
Onodera, gathered for a meeting of the U.S.-Japan Security Consultative Committee (SCC) in Tokyo. The SCC meetings, so-called “2+2”, are convened on an irregular basis usually in DC and rarely with 2 Ministers + 2 Secretaries, rather with
2+ State Secretary or +Defense Secretary in the usual case. After the 2+2
meeting in Tokyo, Secretaries and Ministers released the joint statement52 to
which they agreed in Tokyo covers a wide range of alliance-related concerns
but focuses especially on the cyber domain as one of five topics: revising the
U.S.-Japan 1997 Defense Guidelines by the end of 2014 in a way that reflects
new challenges, such as in the space and cyber domains, and enhancing the alliance for covering a more active international role. Following the commitment
of the defense ministers of Japan and the United States, both governments have
promoted cyber cooperation between the MoD and DoD, and the established of
the U.S.-Japan Cyber Defense Policy Working Group (CDPWG) in October 2013.
The U.S.-Japan Cyber Defense Policy Working Group published a joint statement53 pledging deep cooperation in the cyber domain, such as “if such a cyber
incident occurs as a part of an armed attack against Japan, the MOD and DOD
will consult closely and take appropriate cooperative actions.”
Adding to the cooperation between the ministries and agencies, it is desirable
for the U.S. and Japan to officially declare extension of Article 5 of the U.S.-Japan
Security Treaty covering the cyber domain and establish “collective cyber
defense,” as such as NATO’s declaration of cyber collective defense in 2014.
126
A SIA -P ACIFIC R EVIEW
V
2017
The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs
Information sharing
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
In order to protect cyberspace, early detection of cyberattacks is essential and
warnings must be shared without delay among like-minded countries. These partners should make effective use of classified meetings for an exchange of views on
cyber threat situation awareness and potential cyber adversaries. As any digital
signal, whether good or bad such as malware, can circle the world in a flash in
the cyber domain, it is indispensable for like-minded countries to introduce a
real-time or near real-time automated cyber threat information sharing system
that contains a joint database of cyber-attack threat information and cyberattack
indicators.
To protect cyberspace, it is essential that it first detect signs of cyberattacks
without delay and widely share early warnings among like-minded countries. At
the same time, we realize that it is difficult to defend against cyberattack and cyber
espionage through defensive measures alone. It will also be necessary to invade
attackers’ networks in return as measures of “cyber-counterattacks in self-defense”
for the purpose of identifying enemies’ activities and striking back at them.
In the context of collective cyber security, like-minded countries have to
enhance the foundation to all of this information security and information protection more broadly. So that’s also an important line of effort for Western allies,
ensuring that our practices, our standards, and our procedures are as strong and
robust as they can be, because that’s the thing—that’s the foundation for everything else that we do together.
Notes
1
2
3
4
5
Lloyd’s and CYENCE, “Counting the Cost: Cyber Exposure Decoded,”
Emerging Risks Report 2017. September 15, 2017, https://www.lloyds.
com/~/media/files/news-and-insight/risk-insight/2017/cyence/emergingrisk-report-2017—counting-the-cost.pdf
News release of Security Service of Ukraine, “SBU establishes involvement
of RF special service into Petya.A virus-extorter attack,” July 1, 2017.
Thomas M. Chen and Jean-Marc Robert “The Evolution of Viruses and
Worms,” In: William W.S. Chen (ed.) Statistical Methods in Computer
Security (CRC Press, 2004), 265 –285.
Adam Segal defines the Estonian case as the first “cyber conflict.” See
Adam Segal, The Hacked World Order: How Nations Fight, Trade,
Maneuver, and Manipulate in the Digital Age (New York: Public Affairs,
2016), 60.
Richard A. Clarke and Robert K. Knake, Cyber War: The Next Threat to
National Security and What to Do About It (New York; Harper Collins
Publishers, 2010), 13 – 16.
A SIA -P ACIFIC R EVIEW
V
V OLUME 24, N UMBER 2
127
Jun Osawa
6
7
8
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
9
10
11
12
13
14
15
16
17
18
19
128
BBC News, “Estonia Hit by ‘Moscow Cyber War’,” May 17, 2007.
September 23, 2017, http://news.bbc.co.uk/2/hi/europe/6665145.stm
“Proxy” is a new technical term in cyber security. To hide its true
perpetrator, state, especially Russia, recently tend to hire “Proxies”;
patriotic hackers, hacktivist and cyber criminals.
Rain Ottis, “Analysis of the 2007 Cyber Attacks Against Estonia from the
Information Warfare Perspective,” In: Proceedings of the 7th European
Conference on Information Warfare and Security (Plymouth. Reading:
Academic Publishing Limited), 163 – 168.
Andrzei Kozlowski, “Comparative Analysis of Cyberattacks on Estonia,
Georgia and Kirgizstan,” Europoean Scientific Journal, February 2014,
237 – 245.
Reuters, “Lithuanian Tax Office Website Hit by Cyber Attack,” July 21,
2008. September 24, 2017, http://www.reuters.com/article/lithuaniaweb-attacks/lithuanian-tax-office-website-hit-by-cyber-attackidUSMAR14153920080721
New York Times, “Before the Gunfire, Cyberattacks,” August 12, 2008.
September 23, 2017, http://www.nytimes.com/2008/08/13/technology/
13cyber.html
Andre Radin, Hybrid Warfare in the Baltics (Rand Corporation, 2017). See,
pp.5 – 12.
Voice of America, “US Creates Military Cyber Command to Defend
Computer Networks,” November 02, 2009. September 23, 2017, https://
www.voanews.com/a/a-13-2009-06-15-voa64-68693937/409147.html
Yonhap News, “Gov’t confirms Pyongyang link in March cyber attacks,”
April 10, 2013. Retrieved September 24, 2017, from http://english.
yonhapnews.co.kr/northkorea/2013/04/10/49/
0401000000AEN20130410007352320F.HTML
Yonhap News, “Damage from N.K. Cyber Attacks Estimated at 860 bln
Won: Lawmaker,” October 15, 2013. September 24, 2017, http://english.
yonhapnews.co.kr/northkorea/2013/10/15/16/
0401000000AEN20131015003200315F.html
Peter Elkind, “Sony Pictures: Inside the Hack of the Century,” Fortune, July
1, 2015. September 25, 2017, http://fortune.com/sony-hack-part-1/,
http://fortune.com/sony-hack-part-two/ and http://fortune.com/sonyhack-final-part/
FBI Press Release, “Update on Sony Investigation,” December 19, 2014.
September 25, 2017, https://www.fbi.gov/news/pressrel/press-releases/
update-on-sony-investigation
New York Times, “Obama Vows a Response to Cyber Attack on Sony,”
December 19, 2014. September 25, 2017, https://www.nytimes.com/
2014/12/20/world/fbi-accuses-north-korean-government-in-cyberattackon-sony-pictures.html
U.S. Department of the Treasury Press Release, “Treasury Imposes
Sanctions Against the Government of the Democratic People’s Republic
of Korea”, January 2, 2015. September 25, 2017, https://www.treasury.
gov/press-center/press-releases/Pages/jl9733.aspx
A SIA -P ACIFIC R EVIEW
V
2017
The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs
20
21
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
22
23
24
25
26
27
28
29
30
31
32
33
Reuters, “Ukraine to Probe Suspected Russian Cyber Attack on Grid,”
December 31, 2015. September 27, https://www.reuters.com/article/usukraine-crisis-malware/ukraine-to-probe-suspected-russian-cyber-attackon-grid-idUSKBN0UE0ZZ20151231
CNN, “U.S. Investigators Find Proof of Cyberattack on Ukraine Power
Grid,” February 4, 2016. September 27, 2017, http://edition.cnn.com/
2016/02/03/politics/cyberattack-ukraine-power-grid/index.html And also
see, US-CERT ALERT (IR-ALERT-H-16-065-01), “Cyber-Attack Against
Ukrainian Critical Infrastructure” February 25, 2016. https://ics-cert.uscert.gov/alerts/IR-ALERT-H-16-056-01
SANS-ICS and E-ISAC, “Analysis of the Cyber Attack on the Ukrainian
Power Grid,” March 18, 2016. https://ics.sans.org/media/E-ISAC_SANS_
Ukraine_DUC_5.pdf
Reuters, “Ukraine Investigates Suspected Cyber Attack on Kiev Power
Grid,” December 21, 2016. September 27, 2017, https://www.reuters.
com/article/us-ukraine-crisis-cyber-attacks/ukraine-investigatessuspected-cyber-attack-on-kiev-power-grid-idUSKBN1491ZF
Reuters, “Ukraine Hit by 6,500 Hack Attack, sees Russian ‘Cyberwar,’”
December 30, 2016. September 27, 2017, http://www.reuters.com/
article/us-ukraine-crisis-cyber/ukraine-hit-by-6500-hack-attacks-seesrussian-cyberwar-idUSKBN14I1QC
Reuters, “Ukrainian Banks, Electricity Firm Hit by Fresh Cyber Attack,”
June 27, 2017. September 28, 2017, https://www.reuters.com/article/usukraine-cyber-attacks/ukrainian-banks-electricity-firm-hit-by-fresh-cyberattack-idUSKBN19I1IJ
Office of DNI, “Remarks as Delivered by The Honorable James R. Clapper
Director of National Intelligence, Senate Armed Services Committee
Hearing – IC’s Worldwide Threat Assessment Opening Statement,”
February 9, 2016. September 9, 2017, https://www.dni.gov/files/
documents/2016-02-09SASC_open_threat_hearing_transcript.pdf
Gordon Corera, Cyber Spies: The Secret history of Surveillance, Hacking,
and Digital Espionage (New York: Pegasus Nooks, 2016).
Kim Zetter, Countdown to ZeroDay: Stuxnet and the Launch of the
World’s First Digital Weapon (New York: Crown Publishers, 2014).
Office of the Director of National Intelligence, “Assessing Russian
Activities and Intentions in Recent US Elections,” January 6, 2017. https://
www.dni.gov/files/documents/ICA_2017_01.pdf
DHS and FBI, “Grizzly Steppe – Russian Malicious Cyber Activity,”
December 29, 2016. https://www.us-cert.gov/sites/default/files/
publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
Remarks by Secretary Panetta on Cybersecurity to the Business Executives
for National Security, New York City, October 11, 2012.http://archive.
defense.gov/transcripts/transcript.aspx?transcriptid=5136
Franz-Stefan Gady, “Trump and Offensive Cyber Warfare,” The Diplomat,
January 16, 2017.
The White House, “Presidential Executive Order on Strengthening the
Cybersecurity of Federal Networks and Critical Infrastructure,” May 11,
A SIA -P ACIFIC R EVIEW
V
V OLUME 24, N UMBER 2
129
Jun Osawa
34
35
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
36
37
38
39
40
41
42
43
44
45
46
47
48
49
130
2017. https://www.whitehouse.gov/the-press-office/2017/05/11/
presidential-executive-order-strengthening-cybersecurity-federal
The White House, “Statement by President Donald J. Trump on the
Elevation of Cyber Command,” August 18, 2017. https://www.
whitehouse.gov/the-press-office/2017/08/18/statement-donald-j-trumpelevation-cyber-command
The Washington Post, “Trump Signed Presidential Directive Ordering
Actions to Pressure North Korea,” September 30, 2017. October 1, 2017,
https://www.washingtonpost.com/world/national-security/trumpsigned-presidential-directive-ordering-actions-to-pressure-north-korea/
2017/09/30/97c6722a-a620-11e7-b14f-f41773cd5a14_story.html
See. Richard A. Clarke, Cyber War: The Next Threat to National Security
and What to Do About It (New York: Harper Collins Publishers, 2010).
Thomas Rid, Cyber War Will Not Take Place, London; C. Hurst & Co., 2013.
See Mandiant, “APT1: Exposing One of China’s Cyber Espionage Units,”
February, 2013. http://intelreport.mandiant.com/Mandiant_APT1_
Report.pdf
See. Christopher Bronk, Enekenand, Tikk-Ringas, “The Cyber Attack on
Saudi Aramco,” Survival, 55 (2), (2013), 81 – 96.
http://www.brookings.edu/events/2013/09/09-cyber-war-will-not-takeplace
David Singer founded COW as a project in the University of Michigan in
1963. After his retirement, Penn State has archived all data and materials
of COW. http://www.correlatesofwar.org/
Meredith Reid Sarkees, “The COW Typology of War: Defining and
Categorizing Wars,” and Frank Wayman (2010). Resort to War: 1816 2007. CQ Press.
Remarks by Secretary Panetta, Ibid.
“The Armed Forces must have the ability to operate across the air, land,
sea, space and cyberspace domains of the battlespace”, US Joint of Staff,
The National Military Strategy of the United States of America: 2004, 18.
Richard Clarke, Cyber War: The Next Threat to National Security and
What to Do About IT (New York: Harper Collins Publishers, 2010), 30 – 32.
U.S. Department of Defense, The DoD Cyber Strategy, April 2014, 10.
Scott Jasper, Strategic Cyber Deterrence: The Active Cyber Defense
Option (Lanham; Rowman & Littilefield, 2017).
The White House, Office of the Press Secretary, “President Barack
Obama’s State of the Union Address”, February 12, 2013. http://www.
whitehouse.gov/the-press-office/2013/02/12/president-barack-obamasstate-union-address
U.S. Department of Justice, News Release, “U.S. Charges Five Chinese
Military Hackers for Cyber Espionage Against U.S. Corporations and a
Labor Organization for Commercial Advantage,” May 19, 2014. https://
www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyberespionage-against-us-corporations-and-labor
The White House Press Release, “Remarks by President Obama and
A SIA -P ACIFIC R EVIEW
V
2017
The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs
50
Downloaded by [Gothenburg University Library] at 03:00 09 January 2018
51
52
53
President Xi of the People’s Republic of China in Joint Press Conference,”
September 25, 2015. https://obamawhitehouse.archives.gov/the-pressoffice/2015/09/25/remarks-president-obama-and-president-xi-peoplesrepublic-china-joint
Executive Order—Imposing Additional Sanctions with Respect to North
Korea, January 2, 2015. https://obamawhitehouse.archives.gov/thepress-office/2015/01/02/executive-order-imposing-additional-sanctionsrespect-north-korea
NATO Press conference by NATO Secretary General Jens Stoltenberg
following the North Atlantic Council meeting at the level of NATO
Defence Ministers, on June 14, 2016. http://www.nato.int/cps/en/natohq/
opinions_132349.htm
MOFA, “JOINT STATEMENT OF THE SECURITY CONSULTATIVE
COMMITTEE: Toward a More Robust Alliance and Greater Shared
Responsibilities,” October 3, 2017. http://www.mofa.go.jp/files/
000016028.pdf
Japanese Ministry of Defense and U.S. Department of Defense, “Joint
Statement of the U.S.-Japan Cyber Defense Policy Working Group,” May
30, 2015. http://www.mod.go.jp/j/press/news/2015/05/30a_1.pdf
About the author
Mr. OSAWA Jun, Senior Research Fellow, Institute for International Policy Studies
(IIPS).
Jun Osawa joined IIPS as a research fellow in April 1995. In 2009, he was appointed
a senior research fellow. He received an M.A. degree in political science from Keio
University. He also served concurrently in government and academic positions:
2004-2006 analyst (WMD issue) for the Intelligence and Analysis Service, Ministry
of Foreign Affairs; 2007-2009 policy planning advisor for the Policy Planning Division, Foreign Policy Bureau, Ministry of Foreign Affairs; 2013 visiting fellow at the
Brookings Institution; 2012-2016 visiting scholar at GRIPS; 2014-2016 Deputy
Counsellor, National Security Secretariat, Cabinet Secretariat; 2017- present
Senior Fellow at National Security Secretariat.
A SIA -P ACIFIC R EVIEW
V
V OLUME 24, N UMBER 2
131
Download