Center for the Study of American Government The Johns Hopkins University Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats BY Thomas H. Stanton Center for the Study of American Government The Johns Hopkins University Washington, D.C. Center 1717 Massachusetts Avenue, NW 1 2 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton Foreword On May 8 and 7, 2008, cybersecurity experts, staff from Capitol Hill, academics, and a variety of stakeholders met in Washington, DC, to share information about the growing threat of cyberattacks and cyberespionage in the United States and worldwide. The conference on Defending Cyberspace 2008 was produced by the Park City Center for Public Policy and Imadgen, LLC. The Park City Center for Public Policy (www.parkcitycenter.org) is a bi-partisan, non-profit organization founded on the principle that the most effective policy solutions are created through a collaborative process and tested in the real-world. Imadgen, LLC (www.imadgen.com) is a strategic management consulting firm with specialized practices in cyber security and identity management. Defending Cyberspace was co-hosted by the Johns Hopkins University, the National Association of Manufacturers, and the Information Technology Association of America. Speakers included several former state Governors, CEOs, and current and past federal officials serving at the policy level. The Johns Hopkins Washington, D.C. Center offers a range of advanced academic programs leading to M.A. and M.B.A. degrees. The Johns Hopkins M.A. in Government Program offers concentrations in security studies, legal studies, and political communication. The courses are designed to give students comprehensive knowledge of governmental institutions, their political development, and how they interact in the policy-making process. With this knowledge, students are better equipped to examine governmental and social institutions, assess prospects for reform, effect change, and become tomorrow’s leaders. Students may also pursue a Certificate in National Security Studies, which offers a unique approach to the study of the vital national security field by bringing together experts from science, engineering, international relations, political science, and public policy. The certificate is tailored to the needs of professionals who seek to broaden their knowledge of this field without committing to the full degree program. Center for the Study of American Government The Johns Hopkins University Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats I. The Evolving Threat It’s a conspiracy of apathy. For the criminals, this is great news. They stand blinking into the dawn of a golden age of criminal enterprise. Like Barbary Pirates in the 18th century, and like Colombian drug cartels in the 1970s, malicious hackers will run amok, unfettered, unafraid and perhaps even protected. Only they won’t use muskets or mules. They’ll use malicious code to run syndicates that will be both less violent and more scalable than in the past. Scott Berinato, “Who’s Stealing Your Passwords? Global Hackers Create a New Online Crime Economy,” www.cio.com, September 17, 2007 Business Week journalist Keith Epstein started to do a story on what he expected would be the “cyber-industry complex,” contractors and policymakers who boosted each other’s fortunes by hyping the threat. As he explored further Epstein realized that the opposite was true: business executives and federal policymakers are seriously underestimating the threat of cyber intrusions.1 This is a report on the growing threat of cyberattacks to individuals, government agencies, and private companies. It draws on insights gained at a Washington, DC conference on Defending Cyberspace 2008, co-hosted by the Johns Hopkins University, the National Association of Manufacturers, the Information Technology Association of America, Imadgen LLC, and the Park City Center for Public Policy. The agenda for that conference is reproduced in Appendix A. This report focuses on cyberdefenses rather than on the equally important tasks of prosecuting cybercrime or conducting operations otherwise to bring down cybercriminals.2 The report looks first at the nature of the threat and then at reasons why it has been so difficult to mount an effective defense. A major reason has been a lack of awareness by many leaders in both the public and private sectors. Dr. John Hamre of the Center for Strategic and International Studies told the conference, “If I could walk in to a CEO and say this is your pricing data that we found in a machine in X country, you have a problem, 1 Brian Epstein, remarks, Defending Cyberspace 2008 Conference, Washington, DC, May 6, 2008. Mr. Epstein’s reports on cybersecurity include a cover story, Brian Grow, Keith Epstein, and Chi-Chu Tschang, “The New E-Spionage Threat: a Business Week Investigation,” Business Week, April 21, 2008, pp. 30-41. 2 The issue of cybercrime prosecution is addressed e.g., in U.S. Government Accountability Office, Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats, GAO=07-705, June 2007. 1 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton 2 they will do something. But we have not done that. …We have just not engaged in the dialogue with business in the right way.” In contrast to other forms of theft or attack, it often can be difficult for a victim to realize that a cyberintrusion is occurring. The most effective cyberattack may surreptitiously obtain information or commit other harm without the victim knowing until much later. Indeed there is evidence that some of the recent drop off in reported incidents reflects the increased cunning of the attackers rather than a reduction in the number of intrusions.3 Among the most important losses that a cyberattack can cause are loss of intellectual property such as plans, proprietary processes and trade secrets, financial manipulation, and overt harm such as an effort to shut down cyberdependent systems. Only the last can be clearly related to a cyberattack, and even then the vulnerabilities might have been caused well before the overt attack occurs. The report then looks at the elements of effective defense against cyberattack. Cybercriminals and nation states constantly improve the sophistication, scale and nature of their intrusions. Perhaps most importantly, an effective defense cannot afford to be static in the face of evolving threats: protection needs to come in layers that are constantly reviewed and upgraded. Defenders must share information and resources to protect one another and the networks that join them. Another critical issue involves the cost of good cyberprotection. In the vernacular, to become cost-effective, cybersecurity must be “baked in” rather than “bolted on” to each relevant process or activity. Protective measures such as user authentication must become part of the organizational culture. After looking at the elements of effective defense, the report suggests next steps for individuals and leaders in business and government. One of the critical issues facing policymakers and business leaders is how to make cyberdefenses attractive without imposing restrictions that stifle creativity and make organizational processes more rigid without providing offsetting benefits. Top managers and policymakers cannot usefully make such tradeoffs without being informed enough to understand their implications. Becoming fully aware of the threat is the first and most important step. The question then becomes how best to distribute responsibility for cyberdefenses between individuals and organizations on the one hand and government on the other. Our political system fosters fragmented responses rather than centralized coordinated action. This has both strength and weakness with respect to cybersecurity. The strength is that many different organizations and approaches have emerged to perform important functions in cybersecurity, such as sharing information about threats and promising practices and, in some industries, active collaboration to assure minimum standards of protection. The weakness results from the dynamics of cybersecurity: often the security of responsible individuals and firms depends critically on addressing vulnerabilities in systems of weaker entities. Uncoordinated action can leave these weaker entities vulnerable, and thereby potentially add to the vulnerability of others. While government can help, whether by creating positive incentives, by using its purchasing power, or by imposing requirements, the primary responsibility for cyberdefense continues to rest with individuals and organizations, which ignore vulnerabilities at their peril. The report concludes by suggesting areas of further study to attempt to determine the tools of government that are most suitable for promoting a common defense and the areas where particular tools are best applied.4 Once we have created a sound plan, we must commit resources, individually and collectively, to make effective cyberdefenses a reality. 3 Aaron Turner, “The Business of Cybervulnerabilities,” http://www.dtic.mil/ndia/2008dib_cip/Turner.pdf, accessed August 12, 2008. 4 See, Lester M. Salamon, Editor, Tools of Government: A Guide to the New Governance, Oxford University Press, 2002. Center for the Study of American Government The Johns Hopkins University II. Nature of the Threat [This] represents the shift taking place in Internet crime, from software-based attacks to a service-based economy. Electronic crime has evolved, from an episodic problem, like bank robberies carried out by small gangs, to a chronic one, like drug trafficking run by syndicates. Scott Berinato, “Who’s Stealing Your Passwords? Global Hackers Create a New Online Crime Economy,” www.cio.com, September 17, 2007 China’s strategy…if I could be so bold, they sort of have a privateer’s mentality. They seem to have a very large number of highly trained people with sophisticated tools, who seem to work in small freelance groups. Alan Paller, “Cyberthreats,” The Diane Rehm Show, June 25, 2008 Whenever there is political tension, there is a cyber aftermath. Cybersecurity Expert Gadi Evron, quoted in “Digital Fears Emerge After Data Siege in Estonia” New York Times, May 29, 2007 In military terms, cyberspace is a domain, comparable to the maritime domain. Threats in cyberspace, as on the ocean, can come from pirates intent on private gain or from nation states or subnational groups intent on political or economic gain. Just as countries rushed to build a large naval capability, the United States and other countries are doing so in cyberspace.5 Consider first the types of cyberattack and then the potential sources. Types of Cyberattack Cyberspace lends itself to a wide variety of kinds of attack. At the moment, there are several basic methods and many variations of each. New forms of attack emerge with great frequency. One form of cyberattack is direct, such as intruding into a computer or computer network to steal information or manipulate data or disable or deface a website or to pose enough of a threat that the target may be willing to pay protection money. The ability to manipulate data is a new and worrying development. One can imagine the consequences of altering a bank system to make improper payments. The military and others could worry if an intruder altered GPS (global positioning coordinates) of a guidance system. Another direct attack comes from websites that contain malicious software (so-called “malware”) which an unsuspecting person downloads from a site. Aaron Turner of Idaho National Laboratories estimates that perhaps 30 percent of search results create exposure to sites with the potential to download malware. A second form of attack proceeds indirectly through multiple other computers that are taken over with intrusive code known as a “bot” (short for robot) and coordinated by a so-called “bot herder” in a “botnet.” The bot herder can direct the computers in a botnet to send e-mail messages simultaneously to target computers, websites and servers. The bot herder can use the botnet to send huge volumes of spam, potentially to hundreds of thousands of consumers. Another more destructive use is to send so many e-mail messages that they overwhelm the capacity of a website or server and potentially take it out of service. This kind of attack is called a “distributed denial of service” attack.6 A third form of attack, known as “phishing,” relies on the user of a computer to respond to a deceptive website or e-mail message and voluntarily submit confidential financial or business information. A consumer may be directed to a website that purports to be the consumer’s bank, for example. Nine out of ten phishing sites 5 Clay Wilson, “Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues,” Congressional Research Service, March 20, 2007; “US reveals plans to hit back at cyber threats: The US Air Force Cyber Command is just as interested in attack as defence, according to a senior general,” ZDNet.co.uk, April 2, 2008, http://news.zdnet.co.uk/security/0,1000000189,39378374,00.htm, accessed August 13, 2008. But see, Pamela Hess, “Pentagon puts hold on USAF cyber effort,” Associated Press, August 13, 2008. 6 See, e.g., Roger A. Grimes, “Bots and DDoS attacks: a primer; Knowing the inner workings of botnets and their attack styles can help you formulate a defense -- or outlast an attack,” InfoWorld, February 23, 2007, http://www.infoworld.com/article/07/02/23/09OPsecadvise_1.html, accessed November 7, 2007. 3 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton 4 may be directed at the financial services sector.7 Or, an e-mail message can be tailored to the expectations of an unsuspecting recipient. This kind of targeted attack is called “spear-phishing.” For example, an executive of defense contractor Booz Allen Hamilton received an e-mail message purporting to come from a colleague at the Pentagon with an attachment listing weapons that India sought to purchase. In fact the message was a fake that would have downloaded malware onto the executive’s computer if he had opened the attachment: “Had the Booz Allen executive clicked on the attachment, his every keystroke would have been reported back to a mysterious master at the Internet address cybersyndrome.3322.org, which is registered through an obscure company headquartered on the banks of China’s Yangtze River.”8 Finally, a fourth form of attack is emerging, based on building vulnerabilities into hardware systems. Experts increasingly believe that manufacturers of computers and other IT-based systems can build vulnerabilities into the hardware and associated systems that allow cyberattacks to elude defensive software that the user might add afterwards. While concrete examples are not public, Richard Clarke, a former national security advisor to President Clinton, in his book, Your Government Failed You, provides a foretaste of this form of attack. His example concerns malware built into digital picture frames sold at electronics stores across the country, including, he says, Best Buy: “When you connected the digital picture frame to your computer to download your photos, the picture frame uploaded a program onto your computer that disabled antivirus programs, found all of your passwords, and sent them to China. The picture frame was, of course, made in China.”9 While supply chain controls can protect against many vulnerabilities built into systems, this form of attack may well become more prevalent in the future. In contrast to physical attacks, the perpetrator of a cyberattack may not be known for certain. This is the problem of attribution, knowing where an attack came from: “So there are really two aspects of attribution. There’s a technical attribution problem which is what’s the last box of origin or where is the box physically located? The box might be located on an educational network or a commercialized PC in some other country, but then there is the problem of actor attribution, whose fingers are on the keyboard. And that gets into who’s causing that box to be a problem for you, and they may be sitting somewhere else.”10 That can make it difficult to determine whether the source of an attack is a criminal organization, a government, or some other type of bad actor. A report published by the SANS Institute, a leading source for information security training, certification and research, provides a useful summary of the types of devices that intruders use to obtain information, control computers or cause disruption.11 This is presented in Figure 1, on the following page. Such summaries are likely to need updating from time to time as attacks vary their form and become more sophisticated. 7 Catherine A. Allen, “Detecting and Containing Attacks: A Compliance View,” The Santa Fe Group, presentation to the Defending Cyberspace Conference, May 7, 2008. 8 Brian Grow, Keith Epstein, and Chi-Chu Tschang, “The New E-Spionage Threat: a Business Week Investigation,” Business Week, April 21, 2008, p. 33. 9 Richard A. Clarke, Your Government Failed You: Breaking the Cycle of National Security Disasters, HarperCollins, 2008, p. 315. 10 China’s Proliferation Practices, and The Development of Its Cyber and Space Warfare Capabilities, Hearing before the U.S.-China Economic and Security Review Commission, May 20, 2008, p. 75. Testimony of … 11 Aman Hardikar, “Malware 101 – Viruses,” April 12, 2008, Table 2, p. 9, available at http://www.sans.org/reading_room/whitepapers/incident/, accessed August 17, 2008. Center for the Study of American Government The Johns Hopkins University Potential Sources of Attack: Cybercriminals Early privateers often worked on a business model common to the sixteenth and seventeenth centuries: they obtained royal charters and agreement from the crown that they could keep a percentage of spoils that they captured on the high seas.12 Today’s pirates also use up-to-date business models. As one bank security professional officer describes cybercrime organizations, “[T]hey’re better run and managed than many organizations. They’re properly funded, they have a clear goal, they’re performance driven, focused on a single mission. It’s like an MBA case study of success.”13 Cybercriminals frequently operate in networks. They screen members of the network and enforce codes of conduct. Entry-level hackers are recruited to join the network. The complexity of information technology makes it useful for attackers to work in teams of individuals, each of whom specializes in penetrating certain kinds of systems. Members may go to secure chat rooms and buy and sell access to services, including, for example, access to computers that a bot herder has enlisted as bots. Subscribers may be offered 30 days of access to botinfected computers that the subscriber can mine for financial data. Depending what kind of information the unsuspecting computer owner might enter within the 30 day period, the subscriber might gain not only financial information (credit card numbers, etc.) but also details about the identity of the computer owner. The subscriber then could sell the information on the black market or use it himself. Figure 1 Types of Malware T yp e P r o p e rt y E xa m p le s Virus Copies itself to other files; Needs a host file to propagate and execute. CIH, Virut, Redlof, Autorun.abt, Peacomm, NewHeur_PE Worm Exploits the vulnerabilities that are present and can spread over the network. Code red, Netsky, Stration, Sasser, Bagle, Skipi, no_virus Logic Bomb Triggers a specific code on meeting conditions as per the logic written by its author. Michelangelo Backdoor Listens on certain ports so that the attacker can gain access through them later. Xhaker, sub7, Beast, Ginwui, Rexob, Hupigon Trojan Deceptive program that spoofs a harmless or useful program; but, actually stores other malware. Limbo/NetHell, Pidief, ZeuS/PRG , Banker.bdn, PGPCoder, Torpig, Gozi Spyware Software used to spy on victim’s activities and also used to steal sensitive information. WhenUSave, PuritySCAN Virtumonde, SecurityToolbar 12 Thus, the United States Constitution, Article I, Section 8, authorizes the Congress, “To declare war, grant letters of marque and reprisal, and make rules concerning captures on land and water.” 13 Quoted in Scott Berinato, “Hacker Economics 2: The Conspiracy of Apathy,” www.cio.com, October 8, 2007. 5 6 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton T y pe P r o p e rt y E xa m p le s Rootkit Set of programs that alter the OS functionality to hide themselves. LRK, AFX, SInAR, Rustock, Mebroot Bot / Botnet Program that does the work on behalf of its master. A master may control millions of such bots and can use them for malicious purposes. Agobot, Slackbot, Mytob, Rbot, SdBot, poebot, IRCBot, VanBot, MPack, Storm The new system of selling services rather than products such as stolen information has advantages to both parties. The vendor essentially acts as a middle man. He need not handle stolen information. It is the subscriber that decides what use to make of it. In a country with lax cybercrime laws such as Russia, the vendor may be left alone because he has not actually caused anyone any harm. The subscriber also gains from the transaction. He purchases access to the identity of the computer owner, and not merely a stolen credit card number. “For example, a credit card number alone might be worth $5, but add the three- or four-digit security code associated with that card and the value triples. Add billing address, phone number, cardholder names and so forth which allow a buyer to create new lines of credit and the value can reach into the hundreds of dollars. “Grab the primary and secondary authentication forms used for financial services login in addition to all that, and you’ve hit the jackpot: a real person’s full financial identity. Everything that person had entered into forms online would create an avatar that could be used in the real world to buy goods, apply for credit and passports, buy cell phones, open new bank accounts and manipulate old ones. A dossier like that would be one of the most valuable commodities available on the information black market.”14 Access to newly infected computer would be rented at much higher prices, perhaps $ 1,000 each, than access to computers that had already been rented out to other subscribers. The subscriber purchases access to multiple machines as a way of balancing risk: some owners of infected computers might enter more valuable financial information into their computers than others. Other subscribers may want to rent access to large numbers of infected computers for other criminal purposes. Thus, a subscriber might request access to perhaps 20,000 computers for one hour on a Saturday afternoon. The subscriber then mobilizes the computers, linked in a botnet, to direct a huge volume of e-mail messages to a target such as, say, an offshore gambling site. This is a classic distributed denial of service attack. The volume of e-mail 14 Scott Berinato, “Who’s Stealing Your Passwords? Global Hackers Create a New Online Crime Economy,” www.cio.com, September 17, 2007, http://www.cio.com/article/135500/Who_s_Stealing_Your_Passwords_Global_Hackers_Create_a_New_Online_Crime_Economy?contentId =135500&slug=&page=2&, accessed 08-07-2008. Center for the Study of American Government The Johns Hopkins University traffic is large enough to bring down the servers of the target. The subscriber then contacts the target company and makes a simple proposition: he is willing to offer protection in return for a payment of, say, a million dollars.15 The beauty of the new business model is its flexibility. Buyers and sellers come together in an active market. Buyers may purchase software, support services, or access to specific targeted computers, besides being able to subscribe to botnets. Vendors also offer so-called “executive phishing services,” which provide information about key executives and the types of queries that would be most likely to appeal to the target and allow the download of malware to infiltrate systems and obtain confidential information. Each customer has its own criminal purposes that can be satisfied through selective purchases or rentals, as the case may be. The sellers offer both core products and services, and also ancillary support services, tailored to their customers’ needs. Vendors also may adopt a form of risk-based pricing: if a customer uses products or services in a way that attracts unwelcome attention and requires countermeasures, the price is higher than for a customer who regularly is discrete. Relying on cyberspace to communicate allows cybercriminals to adopt flexible organizations that often are international in scope. Consider the Russian Business Network, a syndicate of cybercriminals: “In one sense, RBN (Russian Business Network) does not exist. It has no legal identity; it is not registered as a company; its senior figures are anonymous, known only by their nicknames. Its web sites are registered at anonymous addresses with dummy e-mails. It does not advertise for customers. Those who want to use its services contact it via internet messaging services and pay with anonymous electronic cash.”16 The Russian Business Network has been extremely profitable. One major phishing scam tricked gullible internet users into entering personal financial information such as bank account details and garnered $150 million in 2006. When public exposure became too great, the Russian Business Network simply closed its St. Petersburg cyberaddresses and shifted their location, possibly to somewhere in China.17 Cybercriminals seem to have adopted the latest organizational models, using cyberspace to help flatten their organizational hierarchies: “Cybercrime requires less personal contact, less need for formal organization, and no need for control over a geographical territory. Therefore, some researchers argue that the classical hierarchical structures of organized crime groups may be unsuitable for organized crime on the Internet. Consequently, online criminal activity may emphasize lateral relationships and networks instead of hierarchies.”18 The creation of markets offering the sale or rental of tools to accomplish acts of cybercrime helps extend the reach of criminals that earlier might have worked alone or who might have used other methods.19 The prevalence of intellectual property crimes involving theft of confidential information is unknown, but some 15 Stephen Spoonamore, a cybersecurity consultant, provided this example on the Diane Rehm Show, “Cyber Threats,” June 25, 2008. 16 “A walk on the dark side: These badhats may have bought your bank account,” The Economist, August 30, 2007, http://economist.com/displaystory.cfm?story_id=9723768, accessed 11/08/2007; Gregg Keizer, “Russian Hackers Behind Attack PDFs: The Russian Business Network, a notorious hacker gang, is responsible for ongoing spam attacks using malicious PDF files,” Computerworld, October 25, 2007, http://www.pcworld. com/article/id,138892/article.html, accessed 11/07/2007. 17 Gregg Keizer, “Russian Hackers Go Dark to Relocate, Computer World,” Computerworld, November 08, 2007, http://www.pcworld.com/ article/id,139465-page,1-c,privacysecurity/article.html, accessed 08-13-2008. 18 Clay Wilson, “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,” Congressional Research Service, January 29, 2008, p. 30. 19 See, e.g., Julian E. Barnes, “P.& G. Said to Agree to Pay Unilever $10 Million in Spying Case,” New York Times, September 7, 2001, http://query. nytimes.com/gst/fullpage.html?res=9A0CE1DB1039F934A3575AC0A9679C8B63&sec=&spon=&pagewanted=print, accessed 08-14-2008 7 8 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton believe it to be a serious issue. When undertaken as a cybercrime and done carefully, theft of intellectual property can leave no traces.20 Potential Sources of Attack: Nation States and Their Surrogates It can be difficult to distinguish an attack by a nation-state from an attack by its surrogates. Easy availability of support from cybercriminals further complicates efforts to ascertain the real source of an attack. Conversely, it appears that nation states can develop systems for cyberattacks, use them, and then offer them in the criminal market to help recoup the costs. While the following examples concern Russia and China, it must be understood that cyberintrusions are a global phenomenon. “U.S. counterintelligence officials reportedly have stated that about 140 different foreign intelligence organizations regularly attempt to hack into the computer systems of U.S. government agencies and U.S. companies.”21 In August 2008 Russia and Georgia, once a Soviet republic, went to war over South Ossetia, an ethnic enclave within Georgia’s borders. Apparently for the first time, the war was preceded by cyberattacks, in this case against Georgia. Servers were taken down that largely prevented the Georgian government from communicating by the Internet either with its citizens or internationally. The attacks disabled Georgia’s foreign ministry website except for a collage that compared the Georgian president with Adolf Hitler. The source of the attacks was not clear. The Russian government denied it was responsible, and suggested that people unhappy with Georgia’s attack on South Ossetia might have initiated the cyberattacks. Some experts saw the attacks as reflecting the methods and coming from computers controlled by the Russian Business Network. Because Georgia is not overly dependent on the Internet for commercial and other operations, it suffered little harm except to government websites. However, experts were quick to point out how cyberattacks offer an inexpensive and effective complement to other forms of warfare.22 One lesson was how hard it can be to identify the source of a cyberattack. Not only was one of the attacking computers located in the United States, an ally of Georgia, but also surrogates outside of the Russian government itself were able to help if not conduct the entire attack by themselves. This was not the first time that serious international attacks occurred that could not be attributed conclusively to Russia rather than to Russia’s surrogates. An attack on Estonia in spring 2007 was much more devastating than the 2008 cyberattack on Georgia. Unlike Georgia, Estonia was heavily dependent on the Internet for commerce, and for dealings with the government such as voting and paying taxes. The Estonia incident occurred after the country’s government decided to move a statue commemorating the Soviet defeat of Nazi Germany from a central location to a suburb. There were massive distributed denial of service attacks, on government sites and bank, newspaper, and other commercial sites, which came close to shutting down the country’s Internet infrastructure. It appears that criminal organizations helped carry out the attack. Experts speculate that up to a million computers were enlisted for the attacks and that the attackers rented time on botnets to supplement their strength. Indeed, as the New York Times reports, “the attackers’ time on the rented servers expired, and the 20 “Corporate espionage: Not if, but when,” ZDNet.co.uk, March 11, 2008, http://resources.zdnet.co.uk/articles/features/0,1000002000,39365959,00.htm, accessed 08-13-2008 21 Clay Wilson, “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,” Congressional Research Service, January 29, 2008, p. 12. 22 John Markoff, “Before the Gunfire, Cyberattacks,” New York Times, August 13, 2008, http://www.nytimes.com/2008/08/13/ technology/13cyber.html?_r=2&sq=russia%20georgia%20ossetia&st=cse&oref=slogin&scp=17&pagewanted=print&oref=slogin, accessed 08-13-2008; Kim Hart, “Long Time Battle Lines Are Recast in Russia and Georgia’s Cyberwar,” Washington Post, August 14, 2008, p. D-1. Center for the Study of American Government The Johns Hopkins University botnet attacks fell off abruptly.” The Internet also allowed the attackers to enlist other supporters. Even before the attacks began Russian-language forums and chat groups offered “detailed instructions on how to send disruptive messages, and which Estonian Web sites to use as targets.”23 Other attacks, such as the Booz Allen Hamilton spear-phishing incident above, can be traced back to computers located in China. Again, it is difficult to determine the extent that such attacks are backed by the government and the extent that they represent the work of surrogates or specific groups within the government such as the People’s Liberation Army. General James E. Cartwright, then the commander of the United States Strategic Command, told the U.S.-China Economic and Security Review Commission in 2007 that China actively probes computer networks of federal agencies and private companies. These intrusions help the Chinese with, “identifying weak points in the networks, understanding how leaders in the United States think, discovering the communication patterns of American government agencies and private companies, and attaining valuable information stored throughout the networks.” General Cartwright observed that this reconnaissance is comparable to strategic intelligence in pre-electronic days, except that “in today’s information environment, the exfiltration that once took years can be accomplished in a matter of minutes in one download session.”24 A massive case of cyberespionage occurred in Germany in 2007. German intelligence officials found that computers in the Chancellor’s Office, and the Foreign, Economics, and Research ministries had been compromised. Mounting what the officials called “the biggest digital defense ever mounted by the German state,” German officials prevented some 160 gigabytes of data from leaving the compromised computers; the German government has no idea how much information had already been taken before the intrusions were detected in May 2007. While the German government did not describe the content of the stolen information, it appears that the secrets related to leading-edge economic information. Germany is the world’s leading exporter (ahead of China), especially in high-technology manufactured products. The stolen information was tracked to three sites in China. “The scale and the nature of the data being stolen suggest, the investigators say, that the operation must have been steered by the State and, in particular, the People’s Liberation Army.”25 A German reporter for the weekly newsmagazine Der Spiegel first broke the story of the Chinese cyberattacks to obtain German economic information.26 The same reporter also covered the 2008 China earthquakes and pointed out shortcomings in government building codes that allowed many schools to collapse with tragic result. At that point the China state security service posted a photo of the Spiegel reporter and his home address on the Internet stating that he was hostile to China. It took the intervention of the German Ambassador to get the posting removed. This cyberattack is an example of how a nation state can post information on the Internet to create a climate for private citizens, or others masquerading as private citizens, to conduct a physical attack on a specified target. Cyberspace lends itself to such collaboration between government and private actors. In the cyberattacks on Georgia, for example, a Russian language website, stopgeorgianow.ru offered software that Russia’s supporters could use for distributed denial of service attacks. This allowed private attackers more easily to supplement the large-scale attacks being conducted as a part of Russia’s conflict with Georgia. 27 23 Mark Landler and John Markoff, “Digital Fears Emerge After Data Siege in Estonia” New York Times, May 29, 2007. 24 U.S.-China Economic and Security Review Commission, 2007 Report to Congress, June 2007. 25 Roger Boyes, “China accused of hacking into heart of Merkel administration,” Timesonline, August 27, 2007, at http://timesonline.co.uk/ tol/news/world/europe/article2332130.ece, accessed August 27, 2007. 26 ������������������������������������������������������������������������������������������������������������ „Prinzip Sandkorn: Unternehmen aus der Volksrepublik greifen Hochtechnologie-Produkte aus Deutschland an,“ Der Spiegel, August 27, 2008. 27 Mark Landler and John Markoff, “Digital Fears Emerge After Data Siege in Estonia” New York Times, May 29, 2007. 9 10 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton The expense of intrusion It is simply impossible to determine the economic costs of cyberintrusions directed against companies or government organizations in the United States. The Congressional Research Service concluded in 2004 that a limited amount of survey data were available that even the compilers described as being anecdotal.28 There are good reasons why statistical data are simply unavailable. One involves the source of information: many firms and organizations have strong incentives to conceal information about cyber-attacks. Thus, in its semi-annual survey of incidents, Symantec notes that different sectors may face different reporting requirements. Symantec singles out government as one sector that is most likely to report breaches. By contrast, “organizations that rely on consumer confidence may be less inclined to report such breaches for fear of negative consumer, industry, or market reaction.”29 Secondly, as the Congressional Research Service concluded in 2004, there are significant uncertainties and measurement difficulties that limit the ability to specify the dollar amount at risk from particular breaches. “[A]ssigning an overall figure to the cost of cyber-attacks remains highly speculative.”30 There is no reason to believe that better data are available today. Indeed, the problem of measuring the harm caused by cyberintrusions probably has grown much worse. Cyberattacks designed to obtain confidential information have become increasingly sophisticated. That means that the amount of damage from lost intellectual property may well be even less susceptible to measurement than before. Even though the numbers cannot be accurately estimated, the nature of the threat is large and growing. Available statistics are not reassuring. For example, the Privacy Rights Clearinghouse, a nonprofit consumer rights organization, reports that over 230 million data records of U.S. residents were compromised through security breaches since January 2005.31 The New York Times reports that “a consensus estimate among experts is that 11 percent of the more than 650 million computers connected to the Internet are infected” with so-called bots that can be used for espionage or destructive attacks.32 Other estimates, such as by Greg Garcia, Assistant Secretary for Cybersecurity and Communication in the Department of Homeland Security, are even higher.33 The National Research Council reviewed available studies and concluded in 2007: “The documentation of the nature of cybersecurity incidents provided in these reports is fragmented and incomplete…Yet, the available data are sufficient to make assertions about the seriousness of the threat that are more than just statements taken on faith….Taken together, they paint a clear picture of growing impacts, including lost production, operational disruptions, and direct economic costs from fraud and lost business, measured on the scale of several billions of dollars annually. The impact is already very large and growing, and the threat is expanding.”34 28 Brian Cashell, William D. Jackson, Mark Jickling, and Baird Webel, “The Economic Impact of Cyber-Attacks,” Congressional Research Service, April 1, 2004. 29 “Symantec Global Internet Security Threat Report: Trends for July–December 07,” Volume XII, Published April 2008, p. 12. 30 Brian Cashell, William D. Jackson, Mark Jickling, and Baird Webel, “The Economic Impact of Cyber-Attacks,” Congressional Research Service, April 1, 2004. For one example of a study that attempts to deal with some of the methodological issues, see, Scott Dynes, Eva Andrijcic, M. Eric Johnson, “Costs to the U.S. Economy of Information Infrastructure Failures: Estimates from Field Studies and Economic Data,” Forthcoming in Proceedings of the Fifth Workshop on the Economics of Information Security, Cambridge University, undated, 2006. 31 Privacy Rights Clearinghouse, http://www.privacyrights.org/, accessed August 17, 2008. 32 New York Times, “Wake up your Computer,” January 12, 2007. 33 “We also see that on any given day, there are an estimated 40% of the 800 million computers connected to the internet worldwide are bots [in] bot nets, …which are designed to distribute spam, steal personal information, conduct denial of service attacks.” Greg Garcia, Assistant Secretary Assistant Secretary for Cybersecurity and Communication in the Department of Homeland Security, remarks, Defending Cyberspace 2008 Conference, Washington, DC, May 7, 2008. 34 National Research Council, Toward a Safer and More Secure Cyberspace, 2007 (prepublication manuscript), p. 2-17. Center for the Study of American Government The Johns Hopkins University The threat of destructive programs is potentially large and particularly hard to measure. Because a destructive program is largely a single-strike weapon, adversaries may wait for an opportune moment, whether political, economic, or military, to launch an attack. The cost of compromised systems becomes clear mostly in retrospect, if then. III. Barriers to Effective Response You are fighting a war. It is an advanced persistent threat. It never goes away, the tools change everyday. You do one thing the enemy does another. You do another thing, they do another. It is a continuous thing that will not go away in my lifetime. That’s why it is called an advanced persistent threat… Thomas W. Shelman, Defending Cyberspace 2008 Conference, May 7, 2008. To be honest, most CEOs don’t understand cyberspace and most IT guys don’t know how to talk to them about it either. Dr. John Hamre, Defending Cyberspace 2008 Conference, May 7, 2008. Mounting an effective response to the proliferation of cyberattacks has not been easy. Some of the barriers to effective response relate to the way that technology facilitates constant evolution of the forms of cyberattack. Other barriers relate to the difficulty of making potential victims aware of their vulnerabilities and the need to improve their defenses. Even if they become aware, victims may believe it is easier to cope with attacks than to bear the expense of improving their information systems and defenses. Another issue relates to the focus of many effective attacks, which use weak partners or weak systems of a company or agency as the entry point to infect systems that otherwise may be well defended. This “weak link” problem can greatly increase the cost of defense. Moreover, the weak-link problem may mean that the system that is vulnerable doesn’t belong to the organization that will bear the major costs of an attack. This leads then to the need for common defense in many cases and the difficulty that organizations often have in working together to achieve common goals. Complacency The threshold problem is that many forms of malware, and especially those forms designed to steal intellectual property, are not detected without making a special effort. Thomas Shelman of Northrop Grumman Information Technology, who has spoken to hundreds of corporate chief information officers (CIOs), is concerned about the lack of awareness: “I worry about corporate America because they think that they are safe. The smartest CIOs and these aren’t bad people, these are good people, they are great leaders, but they don’t know. They don’t know the vulnerabilities.”35 35 Thomas W. Shelman, remarks, Defending Cyberspace 2008 Conference, Washington, DC, May 7, 2008. 11 12 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton Then when a possible intrusion is discovered, the CIO has a significant incentive to apply the least burdensome solution and declare the problem over. Again Mr. Shelman: “The typical CIO goes through a learning process, and I went through this learning process. And the first part of it ....starts with denial, you say my firewalls protect me I am okay. Then you go through this thing where you are in shock and say I can’t believe that that’s happening. At some point you think you have the problem fixed because you put the fire fighting team on it and you go do something and maybe you disconnect from the internet, reset everyone’s passwords and say, I am okay. Well, no, you still didn’t get it.”36 By contrast, Mr. Shelman believes that many parts of government, and especially the Department of Defense, do understand the nature of cyberthreat and the need to detect threats and deal with them both preventatively and in an effective response. The question for many government agencies, as discussed below, is whether they have the resources and have assigned cyberdefenses a high enough priority in allocating their resources. The Problem as an Advanced Persistent Threat Constant improvements in information technology benefit not only companies and governments, but also attackers. Professional use of targeted attacks to harvest trade secrets and national secrets are superseding amateur attacks that had used viruses and worms to cause destruction. Bots are the current scourge; the next form of attack is just over the horizon. That means that cyber defense must be a continuing process rather than a one-time cure. For every defensive measure, attackers, whether nation-states or criminals, can develop countermeasures. Intruders constantly adopt new sophisticated approaches, such as so-called client-side attacks that involve e-mail, instant messaging, media streaming, and other interactions with a hostile server. They also defend themselves better against countermeasures, for example with so-called “fast-flux service networks” of compromised computer systems that change their architecture constantly so as to make it hard to track their operations.37 This constant evolution of attack methods means that defense too is a continuing effort. The Costs of Defense To build an effective defense requires effort and resources. Companies often do not see the value of expending such effort and resources. If the perceived costs of intrusion are small, a firm may simply pass on the costs in its prices. Or a bank or other firm may be able to limit its exposure by setting contractual limits on its liability to its customers for losses from third-party fraud. This relates to what economists call “externalities.” The party that bears the costs of an intrusion, in terms of ID theft, theft of proprietary information, or a distributed denial of service attack, for example, may not be the party whose weak defenses allowed the breach to occur. The costs of shoring up a weak defense may fall on a party that is not harmed much at all by the initial intrusion. A classic example of externalities would be a destructive attack to bring down a piece of critical infrastructure such as an electric power system. The power system might go out of business at a cost to its owners, but the 36 Ibid. 37 For examples of the arms race between cyberattackers and defenders, see, e.g., Scott Berinato, “Hacker Economics 2: The Conspiracy of Apathy,” www.cio.com, October 8, 2007; and Scott Berinato, “Hacker Economics 3: MPACK and the Next Wave of Malware,” www.cio.com, October 8, 2007.. Center for the Study of American Government The Johns Hopkins University costs to all people and organizations from the power failure could possibly end up being very much greater.38 The particular power company itself might not see enough economic value in upgrading its defenses to a high enough level, unless there were a common effort, for example through regulatory requirements that prevented competitors that spent less on cyberdefense from taking economic advantage. The problem of “weak links” can create externalities. In other words, successful cyberintrusions often occur through legacy systems at a firm or agency or through the weakly defended systems of a business partner, whose systems provide a conduit for the intruder to bypass the defenses of an otherwise well defended firm or agency. One can imagine a small business, for example, that partners with a large company that possesses strong defenses. The small business might simply not have the financial strength to bring itself up to the same standards that its larger partner can meet. The Difficulty of Achieving Joint Action In short, there are many reasons to believe that joint action is needed to deal with many aspects of cyberdefenses. While individual efforts are important, joint effort is also needed, both to enhance protection and to reduce the collective cost of improved cybersecurity. For example, a joint effort can: • Establish minimum standards so that firms and their business partners, or government agencies and their partners, do not place each other’s systems at risk; • Encourage expanded availability of certification so that companies and agencies can properly assess the quality of their cyberdefenses and the quality of partners’ systems; • Provide appropriate incentives so that organizations that can improve cybersecurity at least cost, such as Internet Service Providers (ISPs) or banks or telecommunications companies, provide appropriate levels of protection for their customers rather than requiring customers to undertake individual efforts at a much greater total cost; • Protect critical infrastructure, whether owned by the public or private sector; • Share information about the nature and possible timing of major threats; and • Provide effective support to assist firms or agencies to recover from the effects of a cyberattack. These benefits of joint action are clear. However, it can be difficult to translate the need for cooperation into effective action. For example, an earlier Johns Hopkins report on identity management systems seemed optimistic that parties might find a way to come to agreement on common standards, certification procedures, and interoperable systems.39 However, that has not happened. There always are tradeoffs, among parties who benefit or lose from a particular proposal, and among desired levels of protection compared to potential risks. The latter is especially problematic in the cyber domain because of the difficulty of understanding the actual level of risk that accompanies each level of protection. Some economic sectors may be more resistant to adoption of cyberprotection than others. The underlying industrial organization of each particular sector may exert a strong influence on the rate of adoption of common standards. To take a different example from the healthcare sector, the disparate interests of many 38 For a striking example of a successful destructive intrusion into a power generator, see, CNN, “Mouse click could plunge city into darkness, experts say,” September 27, 2007, http://www.cnn.com/2007/US/09/27/power.at.risk/#cnnSTCVideo, accessed August 17, 2008. 39 This is discussed in Thomas H. Stanton, “Improving Federal Relations with States, Localities, and Private Organizations on Matters of Homeland Security: The Stakeholder Council Model,” Chapter 13 in Thomas H. Stanton, ed., Meeting the Challenge of 9/11: Blueprints for Effective Government, M.E. Sharpe Publishers, 2006. 13 14 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton different actors have impeded adoption of healthcare information technologies and standards despite the major benefits that this could provide to the sector as a whole.40 Overlaid on these issues are legal issues: to what extent do the antitrust laws allow competing companies to collaborate on cyberdefenses? To what extent do federal laws protect companies that share information about cybervulnerabilities with the federal government? Is that protection assured, or might it depend on the discretion of a federal official to decide whether or not to share something? What is the legal liability of a company that discloses that it has been successfully attacked? And what is the legal liability of a company that fails to disclose a successful attack, and to whom does it have a duty to disclose, and how much information? Increasing amounts of information are available to assist firms in establishing policies to deal with such questions.41 On the other hand, the federal government has not yet created a legal framework for many issues. Some 38 states, following the lead of California that enacted such a law in 2003, have enacted disclosure laws that require companies to notify consumers whose personal information has been compromised. Federal legislation is pending but has not yet been enacted. Internal and external organizational issues also play a role. Many companies and agencies relegate issues of cybersecurity to the chief information officer or to a chief information security officer who reports to the CIO. This level of a company may be too low to allow for consideration of the kinds of tradeoffs that are needed to decide how much and what kind of cybersecurity to adopt. For example, a large number of cyberincidents can be traced back to a company or agency insider; yet, the CIO alone may not be in a good position to opine about many of the personnel-related security measures, discussed below, that could help bolster cyberdefenses. Externally, many organizations may find it difficult to collaborate with one another. As the Government Accountability Office reports, “…private sector officials stated that their organizations continued to be hesitant to share information on vulnerabilities and threats because of the fear that such sharing might negatively affect their financial bottom line. For example, private sector officials stated that it was difficult to share unfiltered information with their respective infrastructure sector ISAC [information sharing and analysis center] because a competitor operated the ISAC…”42 Within the federal government, collaboration may be especially hard to achieve across organizational boundaries.43 With some exceptions directly relevant to cyberdefense, this has proved to be especially true in national security and national intelligence. Given these obstacles, what will it take to improve our defenses, for people, organizations, and the country, against cyberattack? 40 “Since 2003 we have witnessed a national effort to advance health IT through a newly developed public-private standard-setting process. This process has proved (1) complex and burdened by too many goals, (2) easy for entrenched interests to dominate, and (3) reluctant to frame issues dealing with disruptive technology aimed at consumers.” David C. Kibbe and Curtis P. McLaughlin, “Alternative: Hanging out the Unmentionables for Better Decision Making in Health Information Technology,” Health Affairs, September/October 2008; vol. 27, no. 5, pp. 396-398; see also, Carol C. Diamond and Clay Shirky, “Health Information Technology: A Few Years Of Magical Thinking?” Health Affairs, September/October 2008, vol. 27, no. 5, pp. 383-390. 41 See, e.g., Tim Proffitt,” Creating and Maintaining Policies for Working with Law Enforcement,” the SANS Institute, http://www.sans.org/ reading_room/whitepapers/incident/32803.php, accessed August 17, 2008. 42 U.S. Government Accountability Office, Cyber Analysis and Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability, GAO-08-588, July 31, 2008, p. 44. 43 See, e.g., Thomas H. Stanton, “Improving Collaboration By Federal Agencies: An Essential Priority For The Next Administration,” working paper, National Academy of Public Administration, August 2008, http://www.napawash.org/pmc/papers/collaboration.html, accessed August 17, 2008. Center for the Study of American Government The Johns Hopkins University IV. Building an Effective Defense Our approach in the Department of Defense is based on defense-in-depth. In other words, we do not believe that there is any one thing that you can do to go out and buy cyber security. We believe it spans the spectrum of technology, tactics, techniques, procedures, policy, and most importantly, it requires a culture change. China’s Proliferation Practices, and The Development of Its Cyber and Space Warfare Capabilities, Hearing before the U.S.-China Economic and Security Review Commission, May 20, 2008, pp. 51-52. Testimony of Col. Gary D. McAlum, Director of Operations, Joint Task Force for Global Network Operations, U.S. Strategic Command, May 20, 2008. The control of the information resource and flexibility for the business to get the job done are of paramount importance. Each one must be satisfied while not overpowering the other. Sara Sinclair, et al., “Information Risk in Financial Institutions: Field Study and Research Roadmap,” 2008 Effective cyberdefense requires both individual and joint efforts. On the one hand, each person and organization must be responsible for its own security. Government and other collective efforts cannot substitute for individual action. On the other hand, collective action also is needed. People and organizations need to work together, to share promising practices, raise standards of weak partners with vulnerabilities that endanger more secure organizations, and provide testing, certification, and other support that is done more effectively and economically on a collective basis. Effective defense involves a range of actions that, taken together, could greatly enhance protection, both individually and collectively. Some sectors, such as financial services or defense and national security, seem much farther along in fostering collective action than others. Develop a Culture of Cybersecurity Awareness Both individuals and organizations need to adopt a culture of security awareness. Too many individuals still fail to take basic security precautions when going on the Internet. While government has tried to make people more aware, individuals must bear some of the responsibility for protecting themselves.44 This includes antivirus protection and firewalls as well as increased awareness of Phishing and other scams. For organizations an enterprise-wide sensitivity to security issues is essential. The risk of vulnerability to cyberattack can be seen as a subset of overall enterprise risk management. Note in the following definition how the obligation to ensure appropriate risk management is placed on top management: “Enterprise risk management is a process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives.”45 For cybersecurity, as with other risks that potentially go to the core of mission assurance, the right “tone at the top” of the enterprise is critical. It is top management that can decide on the risk appetite of the enterprise and that must make decisions about tradeoffs between security and other aspects of mission success. The most successful companies manage these tradeoffs in a way that attempts to optimize security and mission assurance without impeding the shorter term effectiveness of the enterprise. 44 Brian Krebs, “’A Lot of People Just Don’t Take the Basic Precautions,’” Washington Post, August 19, 2008, p. A11. 45 Committee of Sponsoring Organizations, Executive Summary, Enterprise Risk Management — Integrated Framework, September 2004, p. 2, available at http://www.coso.org/documents/COSO_ERM_ExecutiveSummary.pdf, accessed August 19, 2008. 15 16 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton The CIO cannot make the needed tradeoffs and cannot set the appropriate tone at the top. General Robert Elder of the United States Air Force Cybercommand believes that the Chief Operating Officer (COO) of a company or agency must be responsible for mission assurance, including cybersecurity.46 This can be seen in the problem that statistically “trusted insiders” pose the most significant threat to an organization’s cybersecurity.47 Catherine Allen, Chairman and CEO of the Santa Fe Group, notes that insider fraud often is committed by new employees and usually by people with no prior convictions.48 Examples abound. In the year 2000 a hacker in Australia caused a computerized waste-management system to dump millions of gallons of raw sewage into rivers and parks. The hacker was a former employee of the company that had installed the system.49 Sometimes the vulnerability occurs from insider negligence rather than malice, as when the Department of Veterans Affairs reported that computer equipment containing personally identifiable information on approximately 26.5 million veterans and active duty members of the military was stolen from the home of a VA employee. To deal with the problem of vulnerabilities created by insiders requires a change in organizational culture so that each person in the organization understands the nature of security requirements and their validity. The human relations office will need to help to build security compliance into the system for evaluating employee performance. The administrative office will need to work with the CIO to implement appropriate controls such as identity management systems for access to physical locations and to information systems. A company interdepartmental committee will need to struggle with the question of “need to know” and the means of adjusting employees’ access to specific information as they shift positions or leave the company. All of this requires a tone at the top that emphasizes the importance of security and encourages members of the organization to report issues and suggest solutions.50 Finally, both individuals and organizations need to become aware of the need for back-up measures and suitable recovery plans. Cybersecurity is not the only reason to establish a recovery plan. The possibility of physical loss of a system, natural disasters such as Katrina, homeland security events, and cyberattacks all provide good reason to create redundancies in information systems and continuity of operations generally. Individuals are well advised to back up their hard drives, a small cost compared to the potential impact on the career of someone who relies on a computer for work. Companies and agencies are increasingly establishing so-called “hot sites” to allow for continuity of operations in the event of a problem. Many firms, especially in the financial sector are adopting two “hot sites” to back themselves up. The financial sector is especially attentive to continuity of operations planning. The federal bank regulators, acting through the Federal Financial Institutions Examination Council (FFIEC), set continuity of operations standards and enforce them.51 Again, as with other aspects of mission assurance, prudent steps are a simple part of doing business in the Internet age.52 46 Lt. General Robert J. Elder, “Cyberdomain Protection and the National Defense,” presentation to the National Defense Industrial Association conference on the Defense Industrial Base Critical Infrastructure Protection, April 8, 2008. 47 Eric A. Fischer, Creating a National Framework for Cybersecurity: An Analysis of Issues and Options, Congressional Research Service, February 22, 2005, p. 22; John Rollins, Terrorist Capabilities for Cyberattack: Overview and Policy Issues, Congressional Research Service, January 22, 2007, p. 19.; ZDNet.co.UK, “The top five internal security threats: It’s widely known that internal staff are the biggest threat to IT security, but what specifically should an employer watch out for?” March 6, 2008, http://resources.zdnet.co.uk/articles/features/0,1000002000,39363097,00.htm, accessed August 20, 2008 . 48 Catherine A. Allen, “Detecting and Containing Attacks: A compliance View,” The Santa Fe Group, presentation to the Defending Cyberspace Conference, May 7, 2008. 49 Ibid., p. 13. 50 M. Eric Johnson and Eric Goetz, “Embedding Information Security Into the Organization,” IEEE Security and Privacy, May/June 2007. 51 See, e.g., Federal Financial Institutions Examination Council, “Business Continuity Planning,” part of the FFIEC IT Examination Handbook, March 2008, http://www.ffiec.gov/ffiecinfobase/booklets/bcp/bus_continuity_plan.pdf, accessed August 20, 2008. 52 For a useful overview of relevant literature, see, e.g., Stacy Jordan, “Mining gold…A primer on incident handling and response,” June 23, 2008, http://www.sans.org/reading_room/whitepapers/incident/32818.php, accessed August 20, 2008. Center for the Study of American Government The Johns Hopkins University The Economics of Cybersecurity: Bake it in; Don’t Bolt it on Once a culture of cybersecurity is established, the economics can be appropriately understood. “Bake it in; don’t bolt it on,” is an expression that summarizes the inclusion of cybersecurity in business decisions. Building considerations of cybersecurity into each business activity can reduce costs and increase effectiveness. Take, for example, the process of mergers and acquisitions. Given the vulnerability of “weak links” to cyberattack, consideration of cyber security during the planning process can help to shore up the most significant vulnerabilities before they cause harm. Indeed, a good review of cybervulnerabilities before an acquisition may be an important factor in setting the price. The same is true of relations with business partners. Screening potential partners for vulnerabilities before linking systems with one another can help to build an appropriate level of protection into the relationship from the beginning. Again, due diligence in this regard may factor into pricing; a more secure partner is worth more than one that creates unacceptable vulnerability. Day-to-day operations also require consideration of cybersecurity. Creation of a sound process for taking account of cybervulnerabilities can help to reduce the burdens (i.e., costs, in terms of dollars and management flexibility) of cybersecurity while enhancing the level of protection. Instead of imposing rigid rules, management may be able to devise more flexible approaches to cybersecurity that maintain security while allowing managers the freedom to carry out their work. However, this requires that security professionals develop increased “soft” interpersonal skills so that they can articulate technical issues and explore tradeoffs and options with company managers.53 The cultural change will need to work both ways, including both security professionals and line managers so that they can fruitfully talk with one another. The issue of building cybersecurity into regular business operations is of strategic importance to an enterprise: “In today’s Web 2.0 world, people require instantaneous access to information. They demand instant connectivity. That creates a natural tension with the cyber security folks. So as you try to make a more secure environment to conduct military operations and support military operations, adequate security measures needed to be factored in to the equation. There is some inherent tension in that effort that we’re experiencing in the DOD as we try to find the right balance.” 54 Consider the relations of the Department of Defense with its contractors. One approach to cybersecurity would be to create a separate network between DOD and trusted partners. As is true of the Internet in countries such as South Korea and Japan, members of the network might pay a user fee that could pay for monitoring and enforcement. Members of the network would be licensed and required to meet specified standards. They and their partners would be checked to assure that those standards were being met. In other words, recognizing the vulnerabilities of the Internet, DOD would simply move relations with its business partners into a separate and more secure domain.55 This approach raises a number of issues. DOD units frequently must interface with other nonsecure partners. For example, in the course of tsunami relief in South and Southeast Asia, U.S. naval vessels needed to link to nonprofit organizations and foreign government organizations. This creates the need for a so-called DMZ (demilitarized zone) so that relations with insecure partners may proceed while protecting more secure networks. Second, the building of a separate secure network creates burdens on day-to-day work of the 53 Alex Clayton, “Successfully Building Security into Business Projects,” the SANS Institute, http://www.sans.org/reading_room/whitepapers/ leadership/32863.php, accessed August 20, 2008. 54 Col. Gary D. McAlum, Director of Operations, Joint Task Force for Global Network Operations, U.S. Strategic Command, “China’s Proliferation Practices, and The Development of Its Cyber and Space Warfare Capabilities,” Hearing before the U.S.-China Economic and Security Review Commission, May 20, 2008. 55 Lt. General Robert J. Elder, “Cyberdomain Protection and the National Defense,” presentation to the National Defense Industrial Association conference on the Defense Industrial Base Critical Infrastructure Protection, April 8, 2008. 17 18 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton Department of Defense and its partners. The building of redundant systems entails significant costs, both in dollars and in loss of workplace flexibility. Another problem involves the small business partners of large defense contractors. Because of the “weak-link” problem, large contractors may need to build up the security of their smaller partners who cannot afford to do it by themselves. What are the tradeoffs between spending effort and resources to upgrade small business partners versus dealing mostly with larger firms instead? Some in DOD would prefer instead to find more flexible ways to build cybersecurity into regular operations. Under this conception people with different levels of clearance would have access to different portions of stored information. This approach would require identity management, screening for a few key attributes, and tags on data to allow access according to the clearance level of the requester. The underlying idea is that the benefits of collaboration are so great that one should not confine collaboration unnecessarily or rigidly.56 Approaches to baking in cybersecurity will vary according to available technology, resources, and preferences of top management. The nature of tradeoffs will continue to evolve, as will the nature of costs that must be paid for mission assurance and cybersecurity. Ultimately, as Chris Rouland of IBM ISS puts it, “Our strategy is we have to figure out how you do business with an infected computer. How do you secure a transaction with an infected machine? Whoever figures out how to do that first will win.”57 Finally, the federal government needs to increase the level of its funding for unclassified IT research. Richard Clarke notes that much of the research should focus on how to write computer code that does not contain errors, adding that “current tools that find vulnerabilities…identify only about one-third of the total that are eventually found; moreover, these tools are also available to our adversaries.” 58 Share Threat Information and Best Practices Thus far, the discussion of protective measures has concerned individual action by people and organizations and the creation of trusted partnerships and networks of trusted partners. However, it is clear that economies of scale exist in cyberdefenses that deserve to be shared. A number of organizations exist to share information and best practices. These include: • Th e United States Computer Emergency Readiness Team (US-CERT), a partnership between the Department of Homeland Security and the public and private sectors, which helps to develop and promote the use of appropriate technology and systems management practices to resist attacks on networked systems, to limit damage, and to ensure continuity of critical services.59 • Th e CERT coordination center of Carnegie-Mellon University, which is a federally funded research and development center (FFRDC) originally established by the Defense Advanced Research Projects Agency (DARPA). It responds to major security incidents and analyzes product vulnerabilities and is now part of the larger US-CERT Program. • I nfraGard, which is a partnership between the FBI and the private sector, is an association of businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to 56 David Wennergren, Deputy Chief Information Officer, Networks and Information Integration at the Department of Defense, briefing, Center for Strategic and International Studies, July 28, 2008. 57 Scott Berinato, “Hacker Economics 3: MPACK and the Next Wave of Malware,” www.cio.com, October 08, 2007. 58 Richard A. Clarke, Your Government Failed You: Breaking the Cycle of National Security Disasters, HarperCollins, 2008, p. 316. 59 U.S. Government Accountability Office, Cyberanalysis and Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability, GAO-08-588, July 2008. Center for the Study of American Government The Johns Hopkins University sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.”60 • I nformation Sharing and Analysis Centers (ISACs) serving major critical infrastructure sectors, including information technology, communications, electricity, supply chain management, water, surface transportation, and public transit. The ISACs operate with varying degrees of effectiveness. They “enable industry experts to establish working relationships, build trust, share sensitive vulnerability, threat, and mitigation information, conduct informed analysis, and collaborate with other sectors and government in an organized manner.”61 •N IST National Vulnerability Database, which “is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.”62 The database reports on some 30,000 vulnerabilities and has about 50 million hits each year.63 • The SANS Institute is a cooperative research and education organization that serves over 165,000 security professionals worldwide, including auditors, network administrators, and chief information security officers, who share lessons and solutions. Free SANS resources include the Internet Storm Center (an Internet early warning system), weekly news and vulnerability digests, flash security alerts and over 1,200 research papers. • Th e Transglobal Secure Collaboration Program (TSCP) is a government-industry partnership serving the aerospace and defense sector. Through adoption of common standards it helps members to mitigate risks related to compliance, complexity, cost and IT needed for collaboration and sharing of sensitive information in international defense and aerospace programs. Members include BAE Systems, Boeing, EADS, Raytheon, Lockheed Martin, Northrop-Grumman, Rolls-Royce, the Netherlands Department of Defence, the U.S. Department of Defense and the U.K. Ministry of Defence, Numerous other organizations also help to promote collaboration among public and private sector users of the Internet. That said, and recognizing the high quality of many collaborative efforts, knowledgeable people continue to call for improved collaboration, especially between the public and private sectors. Former Governor John Engler, now President and CEO of the National Association of Manufacturers, suggests a three-part approach to improved communication between the private sector and government: “For industry and government to work in coordination, creating an effective cyberdefense strategy, we believe three goals are essential. • “Open communication between government and industry on the nature of threats and the speed with which they evolve; • “True collaboration through work on best practices and the tools of technology; • “A government that follows through with clear points of contact and incentives – government incentives for industry to protect itself. I would include shields from liability in this area, as well.”64 60 “What is Infragard?” http://www.infragard.net/about.php?mn=1&sm=1-0, accessed August 20, 2008. 61 John T. Sabo, President, Information Technology-Information Sharing and Analysis Center (IT-ISAC) Before the Committee on Oversight and Government Reform Subcommittee on Information Policy, Census, and National Archives, United States House of Representatives, October 23, 2007. 62 The National Vulnerability Database, “About NVD,” http://nvd.nist.gov/about.cfm, accessed August 20, 2008. 63 Daniel J Chenok, Chair, Information Security and Privacy Advisory Board, “Bridging the Gap Between Government and Industry: The Private-Public Link,” presentation to the Defending Cyberspace Conference, May 7, 2008. 64 John Engler, Opening Comments, Defending Cyberspace Conference, Washington, D.C, May 8, 2008. 19 20 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton The United Kingdom provides perhaps the best recent example of clear communication between government and the private sector about threats. In late 2007 the Director-General of M.I.5, the UK’s internal security agency sent a warning to 300 CEOs and heads of security at banks, accounting firms, and law firms, warning them that they were under attack from “Chinese state organisations” : “The document gives warning that British companies doing business in China are being targeted by the Chinese Army, which is using the internet to steal confidential commercial information…. Another source familiar with the MI5 warning said…that known attacks had not been limited to large firms based in the City of London. Law firms and other businesses in the regions that deal even with only small parts of Chinese-linked deals are being probed as potential weak spots… The MI5 letter includes a list of known “signatures” that can be used to identify Chinese Trojans and a list of internet addresses known to have been used to launch attacks.”65 This warning had critical characteristics that made it useful: it was precise about the likely set of vulnerable firms and the electronic indicators that firms should consider especially dangerous. The United States does not have an internal security agency. However, it sometimes is possible for U.S. intelligence sources to provide assistance. Thus, in January 2008 a CIA analyst issued a warning to 300 U.S. and international security officials from government and from electric, water, oil, and gas companies who were attending a conference. Tom Donahue, the CIA’s top cybersecurity analyst, said that utility companies outside the United States had been subjected to cyberattacks. In one case the attack resulted in a power outage that affected multiple cities. The identity of the attackers was not known, Donahue said, but it was known that the attackers made extortion demands. “’We suspect, but cannot confirm, that some of the attackers had the benefit of inside knowledge,’” Donahue said. He did not specify where or when the attacks took place, their duration or the amount of money demanded.” 66 It is clear that such warnings can greatly assist both government and the private sector to take significant preventative steps. As the various public-private working groups and other organizations build personal trust, it may be possible to share information more extensively. This is an issue that deserves further study to determine the conditions under which the most effective collaboration can take place without sacrificing other values. Always in this area, tradeoffs must be understood and designed to optimize the benefits and costs. Often, understanding the nature of the underlying problem is necessary to solve the problem that presents itself. Thus, rapid turnover of cybersecurity officials has reduced the ability of DHS to maintain trusted collaborative relationships with other organizations.67 One may not be able to solve the collaboration problem without addressing the underlying human resources issue. 65 Rhys Blakely, Jonathan Richards, James Rossiter and Richard Beeston, “ MI5 alert on China’s cyberspace spy threat,” The Times, December 1, 2007, http://business.timesonline.co.uk/tol/business/industry_sectors/technology/article2980250.ece, accessed 08-05-2008. 66 Ellen Nakashima and Steven Mufson, “Hackers Have Attacked Foreign Utilities, CIA Analyst Says,” Washington Post, January 19, 2008, p. A04. 67 U.S. Government Accountability Office, Information Security: Despite Reported Progress, Federal Agencies Need To Address Persistent Weaknesses, GAO-07-837, July 2007; U.S. Government Accountability Office, Information Security: Progress Reported, but Weaknesses at Federal Agencies Persist, GAO-08-571T, March 12, 2008. Center for the Study of American Government The Johns Hopkins University Require Partners to Meet Key Standards The importance of assuring the security of trusted partners has already been noted. A good example of joint establishment and management of standards comes from the payment card industry. In 2006 American Express, Discover Financial Services, JCB International, MasterCard Worldwide, and Visa Inc., established the PCI Security Standards Council. The council develops PCI Security Standards, including: the Data Security Standard (DSS), Payment Application Data Security Standard (PA-DSS), and Pin-Entry Device (PED) Requirements. It manages the standards, provides education, and promotes awareness of the standards. “All of the five founding members have agreed to incorporate the PCI DSS as the technical requirements of each of their data security compliance programs. Each founding member also recognizes the QSAs and ASVs certified by the PCI Security Standards Council as being qualified to validate compliance to the PCI DSS….Other industry stakeholders are encouraged to join the group and review proposed additions or modifications to the standards.”68 The payment card industry is economically much more concentrated than other industries. Also, payment transactions must be interoperable across payment systems, which creates some interdependence among companies. These factors make it easier for the PCI Security Standards Council to operate, compared to other industries with larger numbers of companies that vary significantly in size and capacity from one another and that do not need to rely on collaboration across the industry to succeed. For such industries, to the extent that they represent critical infrastructure, federal intervention may be necessary. Governor Engler and the National Association of Manufacturers believe that one effective tool for the federal government would be to build cybersecurity requirements into federal procurement standards: “Government can use its market power, instead of its regulatory power by more prominently including security, along with cost, into its procurement process.”69 This is an important approach for many industries whose level of cybersecurity is essential not only for the particular economic sector, but also for government agencies that the industries relate to. The Department of Defense, for example, is beginning to incorporate increasingly stringent cybersecurity performance standards into its procurement requirements. This can supplement the role of public-private organizations, such as the Transglobal Secure Collaboration Program (TSCP) in setting standards for the defense industrial base.70 However, much of the rest of government is not yet at work to use its procurement power to raise standards of cybersecurity. Many agencies themselves continue to have spotty records with respect to vulnerability to cyberattack.71 For example, the current governmentwide initiative to reduce the number of federal Internet connections and standardize their levels of security has met with a range of responses, from agencies that appear ready or nearly ready to adopt Trusted Internet Connections (TICs) to those that have a long way to go.72 Richard Clarke makes several recommendations: • All federal networks should use two-factor authentication systems and everyone interacting with federal networks also be required to use authentication; 68 “About the PCI Security Standards Council,” https://www.pcisecuritystandards.org/about/index.shtml, accessed August 20, 2008. 69 John Engler, Opening Comments, Defending Cyberspace Conference, Washington, D.C, May 8, 2008 70 See, www.tscp.org. 71 U.S. Government Accountability Office, Information Security: Despite Reported Progress, Federal Agencies Need To Address Persistent Weaknesses, GAO-07-837, July 2007; U.S. Government Accountability Office, Information Security: Progress Reported, but Weaknesses at Federal Agencies Persist, GAO-08-571T, March 12, 2008. 72 http://www.whitehouse.gov/omb/egov/documents/2008_TIC_SOC_EvaluationReport.pdf, accessed September 27, 2008. 21 22 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton • All data, e-mails and laptops should be encrypted; and • The size of the OMB staff enforcing federal IT security should be expanded substantially from the current two people and be given authority to require agencies to upgrade their security standards. 73 Also, many government agencies do not assure the performance of their partners. The Office of Management and Budget reviewed the compliance of 25 federal agencies with the Federal Information Security Management Act of 2002. OMB reported that, in Fiscal Year 2007, it asked agency inspectors general to confirm “whether the agency ensures information systems used or operated by a contractor of the agency or other organization on behalf of the agency meet the requirements of FISMA, OMB policy, and NIST guidelines.” OMB found that the number of inspectors general answering that question as “almost always” decreased from 2006 to 2007 from 15 agencies to 12 agencies.74 There is a clear need for government to be more forceful in using its purchasing power to raise the quality of cybersecurity in critical industries. But to be credible, each agency must ensure that it, rather than its business partner, is not the weak link. Create Incentives for Critical Sectors to Improve Cybersecurity Government can apply various tools to help create incentives. One approach is to use grant funds to encourage adoption of standards. To be effective, the requirement for federal partners to adopt standards likely must be built into federal grant programs that support much larger activities than mere cybersecurity alone. One positive example, from a different homeland security sphere was the SAFECOM Interoperable Wireless Communications Program of the Department of Homeland Security. By leveraging federal grant funds for first responders, especially in major urban areas, DHS was able to encourage adoption of standards for interoperable digital two-way wireless communications products.75 Another area where grants have been beneficial relates to the continuing federal need for employees with high technical skills and knowledge of cybersecurity. The Scholarship for Service program provides grants to students who commit to work for the federal government in return for their grants.76 Again, this grant program is likely effective because of the difference it can make in encouraging behavior, here the opportunity to introduce highly skilled graduates to federal service. Another major tool of government is regulation.77 As Governor Engler and others have pointed out, regulation is a cumbersome process that generally lags behind market developments. The lag is especially substantial in the fastmoving world of information technology and cybersecurity. That said, regulation may be an important tool for economic sectors that are especially critical and manifest an industrial organization that might preclude companies from adopting adequate cybersecurity on their own. One justification for setting minimum standards is that companies should not benefit competitively from skimping on IT security, including cybersecurity. Otherwise, without standards and regulatory supervision, the result could be a race to the bottom.78 73 Richard A. Clarke, Your Government Failed You: Breaking the Cycle of National Security Disasters, HarperCollins, 2008, p. 316. 74 Office of Management and Budget, Fiscal Year 2007 Report to Congress on Implementation of The Federal Information Security Management Act of 2002, p. 6. 75 http://www.safecomprogram.gov/SAFECOM/ 76 https://www.sfs.opm.gov/StudentBrochureWeb.pdf. 77 See, generally, Malcolm K. Sparrow, The Regulatory Craft, Brookings, 2000 78 Stephen Malphrus, Board of Governors of the Federal Reserve System, remarks to the Conference on Defending Cyberspace, May 8, 2008. Center for the Study of American Government The Johns Hopkins University The electric power industry would appear to be such a critical infrastructure sector. Early in 2008 the Federal Energy Regulatory Commission issued eight standards for electric utilities, including identity controls, training, security perimeters, physical security of critical cyber equipment, and incident reporting and recovery. Given the mixed record of the electric power industry in assuring system reliability, additional standards could well be warranted, as well as assurance that any standards in fact are promptly implemented. Another area where regulation is likely warranted relates to internet service providers (ISPs). Richard Clarke recommends that, “The Federal Communications Commission should require internet service providers to take specific measures to reduce spam, worms, viruses, denial-of-service attacks, phishing, botnets, and other malicious activity.”79 This is a critical area where appropriate regulations can place much of the burden of improved cybersecurity onto the industry that is best positioned to deal effectively with it. It makes much more sense for ISPs to apply protective measures than for millions of individuals and enterprises to attempt to replicate that protection on a computer-by-computer basis. Mr. Clarke also believes that the federal bank regulators should require two-factor authentication for all online banking and stock trading. There is at least anecdotal evidence that online banking is inadequately protected, and this recommendation too would seem to be cost-effective.80 Once again, careful analysis is needed to select those sectors where regulation is needed because (1) the sector is critical to the well being of the United States, and (2) the industrial organization of the industry or other factors preclude industry wide adoption of appropriate standards. Then careful thought is needed to design regulations, and enabling legislation if necessary, to attempt to shift regulatory responsibilities to those firms that are best placed to assure minimum standards of cybersecurity in the most cost effective manner. Other important issues involve the need to optimize tradeoffs of security against other important values such as innovation. Merely to list these factors indicates how difficult a legislative or regulatory process can be. Regulation is fundamentally a political issue. Different types of firms attempt to shape the contents of regulations – always in the name of protecting consumers and markets – to shift burdens to their competitors.81 79 Richard A. Clarke, Your Government Failed You: Breaking the Cycle of National Security Disasters, HarperCollins, 2008, p. 316. 80 Scott Berinato, “Hacker Economics 2: The Conspiracy of Apathy,” www.cio.com, October 8, 2007; and Scott Berinato, “Hacker Economics 3: MPACK and the Next Wave of Malware,” www.cio.com, October 8, 2007. 81 Bruce M. Owen and Ronald Braeutigam, The Regulation Game: Strategic Use of the Administrative Process, Ballinger Publishers, 1978. 23 24 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton V. Conclusion This review of cybersecurity suggests that, threats to cybersecurity are real and significant, both for individuals and for firms and government agencies. The form of cyberattacks is constantly evolving. Perpetrators are developing increasingly sophisticated forms of harmful attack, whether for theft of intellectual property, fraud, or political purposes. Cyberattacks are especially pernicious because perpetrators of the most effective attacks may seek deliberately to hide the success of the attack so as to obtain much greater benefit than if the attack were discovered. The findings of this report lead to recommendations82: 1. Cyberdefense is not a problem solely for government to solve; firms and individuals in the private sector must recognize their responsibility for protecting their intellectual property and other assets from cyberattack. • Individuals and firms need to increase their awareness of the threat of cyberattack • Organizations must build cybersecurity into their daily activities and a culture of cybersecurity • S ecurity should become an integral part of systems and processes: bake it in, don’t try just to bolt it on. • Because attackers try to exploit weak links in security, organizations need to require their business partners to meet appropriate standards. 2. That said, government must play an important role in encouraging coordinated improvement in both government and the private sector. 3. Government and the private sector need to improve the sharing of information on many levels, including best practices and alert warnings. • Economies of scale in cyberdefense mean that effective information sharing can reduce cost for all participants. • Information sharing often requires personal trust; organizations such as the Department of Defense find it easier to build trust relationships with business partners than organizations with frequent turnover of personnel such as DHS. 4. The government’s approach of looking at cybersecurity in terms of critical infrastructure sectors makes sense, given the different nature of each sector, in terms of industrial organization and current regulatory context. However, some sectors lag seriously behind others in their vulnerability to cyberattack. • Research grants and training should recognize the importance of each sector adopting norms of responsible behavior and changing the cultures of individual organizations, and not merely encourage adoption of software and hardware tools to prevent cyberattacks. 82 One other important set of issues relates to the need to engage in diplomatic and other means of increasing international cooperation to counter global cybercrime organizations. At the Conference on Defending Cyberspace, May 8, 2008, Michael Aisenberg stressed both the importance and promising prospects for such efforts. For example, he points out that parts of the Chinese government are likely to be open to partnering with organizations in the United States to reduce the level of global cyberattacks, especially given the significant number of such attacks that originate in each country. Center for the Study of American Government The Johns Hopkins University 5. Careful analysis is needed to develop an effective layered defense for the country as a whole, through a combination of approaches. Important tradeoffs exist, between security and other values such as innovation, flexibility to carry out the organization’s mission, and cost. So far, this type of analysis has been lacking for many aspects of cybersecurity. 6. Some private actors, such as internet service providers, are in a position to implement improvements in cybersecurity at much less cost than if the burden were placed on all of their customers. Government should play a role in helping to assure that responsibility for cybersecurity shifts to those places that are best able to implement it cost-effectively. 7. There is a role for government to apply several tools of government, including grants, requirements in procurement contracts, and regulation. • Setting requirements in procurement contracts is potentially very effective, especially in sectors such as defense and national security where government is able to bear some of the cost of the improved cybersecurity standards that it requires. • Where grant programs are large enough to make a difference, grants also can play a role in promoting improved cybersecurity. Grants are likely to be most useful in focused areas such as encouraging a stream of graduates with technical knowledge of cyberdefense to enter public service. • Because of the weak link problem, regulation may be required to address shortcomings in cybersecurity in a number of economic sectors. 8. The next administration needs to make cybersecurity a major priority, especially because of the nation’s increased vulnerability at a time of growing financial weakness. This should be a part of enhancing the capacity in the Executive Office of the President to lead the government in addressing such critical issues.83 Needed now is to make these lessons and recommendations more concrete in their application. This should include a compilation of promising practices to help inform the nation’s cyberstrategy: a review of approaches by government and the private sector that have been most effective in promoting cybersecurity, with an analysis of the conditions under which each approach works best. But study alone is not enough. With increased leadership from the Executive Office of the President, and from leaders in the private sector, the public and private sectors must work together to devise effective cyberdefense plans, especially for critical sectors that currently lag in cybersecurity, and then implement them. While this effort will involve a significant commitment of resources, the alternative could be much more costly for us all. 83 Thomas H. Stanton, “Improving Managerial Capacity of the Federal Government: A Public Administration Agenda for the Next President,” Public Administration Review, in press; and Thomas H. Stanton, Working Paper, “Improving Collaboration by Federal Agencies: An Essential Priority for the Next Administration,” August 2008, available at http://www.napawash.org/about_academy/ImprovingCollaborationbyFederalAgencies.pdf, accessed September 28, 2008. . 25 26 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton Acknowledgements The author wishes to thank the many people who provided insights for this report and the conference sponsors that helped to fund this study. Special thanks go to Michael Aisenberg, Catherine A. Allen, Liesyl Franz, Gov. James Geringer, Gary Glickman, Gov. Jim Hodges, James Lewis, Mary Mitchell, Frank Reeder, Marc-Anthony Signorino, James Souby, Thomas Stack, and Keith Ward. The author is solely responsible for this report and its contents. Center for the Study of American Government The Johns Hopkins University Appendix A Defending Cyberspace 2008 Conference Agenda May 6-7, 2008 Washington, DC 8:30 – 8:45 AM 8:45 – 9:15 AM Introduction The Advanced Persistent Threat – Industry View Jim Souby President, Park City Center for Public Policy Opening Remarks An overview of the growing threat of cyber espionage to corporate America. The attacks, perpetrated by organized foreign and domestic entities, threaten our economic well being and our global innovative advantage. Defending against these attacks requires new technologies to be implemented individually and collectively. Corporations need to address critical legal, audit and technology-based issues to ensure their future viability. John Engler President & CEO, National Association of Manufacturers, and former Governor, Michigan 8:45 – 9:45 AM The Advanced Persistent Threat Cyber attacks threaten governments, corporations and individuals to extract financial or strategic information. Using increasingly sophisticated methods, sometimes combined with coercion and more traditional corporate espionage, hostile organizations gain access to critical intellectual property, trade and national secrets. This information, in the wrong hands, threatens our national security and our industrial future – their officers and directors, their shareholders and their customers. Once attacked, government organizations and corporations are understandably reluctant to discuss the impact on their business or mission. Those that do speak publicly talk only in the most general terms. Thomas W. Shelman President, Defense Group, Northrop Grumman Information Technology 9:15 – 9:45 AM The Advanced Persistent Threat – Government View Greg Garcia Assistant Secretary for Cyber Security and Communication, National Protection and Programs Directorate, Department of Homeland Security 9:45 – 10:00 AM Break 10:00 – 11:00 AM Detecting and Containing Attacks – Technology View This panel of experts explores where the attacks are coming from, how they are being done, and what can be done to detect and defeat them. They will discuss the escalating nature of the attacks and the need for leadership, diligence and perseverance on the part of CEOs, CIOs, and CISOs. Jeremy Grant (Moderator) Senior Vice President, Stanford Group Company Greg Wilshusen Director, Information Security Issues, Government Accountability Office Michael Aisenberg Counselor to the President of Information & Infrastructure Technologies, Inc. Valerie Abend Deputy Assistant Secretary for Critical Infrastructure Protection and Compliance Policy, U.S. Department of the Treasury 27 28 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton 11:00 AM – Noon 1:30 – 2:30 PM Detecting and Containing Attacks – Compliance View Current Methods for Information Sharing The panel will drill down into the complexities of dealing with the attacks, both publicly and organizationally. Issues that will be discussed include: International Trade • Director & Officer Liability • Offshore Outsourcing • Supply Chain Management. Cathy Allen (Moderator) Chairman and CEO, The Santa Fe Group David Bartlett Senior Vice President Levick Strategic Communications, LLC Steve Malphrus Staff Director for Management, Board of Governors of the Federal Reserve System Randy V. Sabett, J.D., CISSP Sonnenschein Nath & Rosenthal LLP Noon – 1:30 PM Keynote Luncheon Gary Glickman President, Imadgen, LLP Keynote: John J. Hamre President & CEO, Center for Strategic and International Studies Topics include: Current Cyber Security Initiatives • Limitations Among Business and Government • IT Sector Coordinating Council • Information Sharing and Analysis Centers (ISACs) for IT, Communications, and Other Sectors • Partnership for Critical Infrastructure Security (PCIS) • National Infrastructure Protection Centre (NIPC) • DoD Initiatives for Information Sharing • Information Sharing and Security Initiatives within Key Network Operations Centers Serving the Government and Private Sectors. Phil Bond (Moderator) President and CEO, Information Technology Association of America Alan Wade Founder, Wade Associates, Inc. Ken Watson Chair, Partnership for Critical Infrastructure Security and Senior Manager, Critical Infrastructure Assurance Group, Cisco Systems, Inc. 2:30 – 3:15 PM View from the Privacy Community Cyber espionage targets are not limited to company sensitive financial and product information, but to customer and employee personal information as well. Building defenses against cyber attacks helps protect this information from unauthorized use. However, the maintenance and storage of this information, how it is used and how trade-offs between privacy and security must be addressed are part of any solution. These experts will discuss how industry guidelines can help build trust between government, industry, employees and customers. Ari Schwartz Deputy Director, Center for Democracy and Technology Rich Baich, CISSP, CISM Principal, Deloitte & Touche LLP Center for the Study of American Government The Johns Hopkins University 3:15 – 3:30 PM 4:15 – 5:15 PM Break Developing an Action Plan 3:30– 4:15 PM Bridging the Gap Between Government and Industry What is the role of government in helping to protect our industrial base against foreign and domestic cyber attacks? Our Federal government is taking substantive action to safeguard national security. Exercises such as Cyber Storm II demonstrate how government plans to react to a real attack. The Department of Defense, the intelligence agencies and the Department of Homeland Security plan to invest over $6 Billion in building our cyber defense networks. How can this investment be leveraged to help protect the US corporate base? And similarly, how can information gleaned from corporate attacks be funneled back to the government to improve their own readiness? David Hoffman (Moderator) Group Counsel & Director of Security & Privacy Policy, Intel Corporation Jacob Olcott Staff Director, Subcommittee on Emerging Threats, Cybersecurity, Science & Technology, Committee on Homeland Security, U.S. House of Representatives Dan Chenok Chair of the Information Security and Privacy Advisory Board and Senior Vice President & General Manager, Pragmatics, Inc. This is a “call for action” session that will present and discuss methods to address confidentiality and secrecy, cross-agency information sharing and planning, best practices, promising solutions and their adequacy to combat cyber threats. What community-wide solutions could be put in place? • What public/private processes are indicated? • What legislative/policy changes appear necessary? • How can a bridge be built between the public and private sectors? • What are the objectives? • Who can lead? • Federal and Private Roles and Responsibilities • What will it take? Planning – Time – People – Training – Investment – Infrastructure • Need for legislation/Change to the Sarbanes-Oxley Act • Suggested Strategic/Policy Action Agenda • How do we communicate? • How do we define “success”? Facilitators: Governor Jim Geringer, Director, ESRI Tom Stanton Fellow, Center for the Study of American Government, Johns Hopkins University 5:15 – 5:30 PM Closing Remarks and Next Steps 29 Center for the Study of American Government The Johns Hopkins University 31 32 Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats by Thomas H. Stanton Center for the Study of American Government The Johns Hopkins University Washington Center 1717 Massachusetts Avenue, NW