Computer Network Defense

advertisement
College of Aerospace
Doctrine, Research,
and Education
Legal Aspects
of IO
IW 230
“The Big Picture”
The law lags evolution of technology
 Find answers in existing principles
 Our actions affect evolution of the law
 Shape legal framework to further national
interest
 Governmental actors must consider spirit
not just letter of the law

AFDD 2-5
INFORMATION SUPERIORITY
INFORMATION OPERATIONS
INFORMATION-in-WARFARE
gain
exploit
INFORMATION WARFARE
attack
defend
COUNTERINFORMATION
Precision
Nav & Position
ISR
Other Info Collection/
Dissemination Activities
Weather
DEFENSIVE
COUNTERINFORMATION
PAO
Information CounterAssurance Intelligence
Successfully executed
Information Operations
achieve information superiority
OFFENSIVE
COUNTERINFORMATION
PSYOP
Physical
Attack
OPSEC
CounterPropaganda
Military
Deception
Electronic
Warfare
Electronic
Protect
CounterDeception
CNA
PAO
CND
PAO
Information Operations

Joint: Actions taken to affect adversary
information and information systems while
defending one’s own information and
information systems
• Offensive and Defensive IO

The Air Force believes that in practice a more
useful working definition is:
those actions taken to gain, exploit, defend, or
attack information and information systems
• Information Warfare and Information-In-Warfare
Information Warfare

“Information operations conducted during time of
crisis or conflict to achieve or promote specific
objectives over a specific adversary or adversaries. …
The Air Force believes that, because the defensive
component of IW is always engaged, a better
definition is: Information operations conducted to
defend one’s own information and information
systems, or to attack and affect an adversary’s
information and information systems.”
AFDD 2-5, Aug 98
USSPACECOM: DoD’s Lead
for CND and CNA

JTF CND
• Chartered in 1998 as an interim
organization to handle coordination of
DoD’s Computer Network Defense

JTF CNO
• CINCSPACE received the mission for
Computer Network Attack in Oct 00
• Decision to expand JTF CND
• 2 Apr 2001, JTF redesignated JTF
Computer Network Opertions
The Future
“It seems to me that, philosophically, rather
than conducting information operations as
ends in themselves, we want to ‘operate in
the information age….’ By that I mean
integrating, and not ‘stovepiping,’ the various
areas of information operations into our
overall military plans and operations….”
--General Ed Eberhart, USCINCSPACE
AF Future Capabilities Game 2001:
An Introduction to Network
Warfare of the Future

Computer Network Operations
• Computer Network Defense
• Computer Network Exploitation
• Computer Network Attack
CNO Taxonomy

Computer Network Defense:
• Those measures, internal to the protected
entity, taken to protect and defend
information, computers and networks from
intrusion, exploitation, disruption, denial,
degradation or destruction.
CNO Taxonomy

Computer Network Defense:
• Actions taken to protect, monitor, analyze, detect,
and respond to unauthorized activity within . . .
information systems and computer networks.
(DoDD O-8530.1)
• Defensive measures to protect and defend
information, computers, and networks from
disruption, denial, degradation, or destruction.
(JP1-02)
CNO Taxonomy

Computer Network Attack:
• Operations using computer hardware or
software, or conducted through computers
or computer networks, with the intended
objective or likely effect of disrupting,
denying, degrading or destroying,
information resident in computers or
computer networks, or the computers and
networks themselves.
CNO Taxonomy

Active CND (Computer Network
Response):
• Those measures, that do not constitute
CNA, taken to protect and defend
information, computers, and networks from
disruption, degradation, denial, destruction,
or exploitation, that involve activity external
to the protected entity. CNR, when
authorized, may include measures to
determine the source of hostile CNA or
CNO Taxonomy

Computer Network Exploitation:
• Intelligence collection operations that obtain
information resident in files of threat
automated information systems (AIS) and
gain information about potential
vulnerabilities, or access critical information
resident within foreign AIS that could be
used to the benefit of friendly operations.
(CJCSI 6510.01C)
Overview


Part I: Computer Network Defense (CND)
• Computer Monitoring
• Computer Crime
• Active Defense / Computer Network
Response
Part II: Computer Network Attack (CNE/CNA)
• Development of International Law
• The Use of Force in Peacetime
• US/Foreign Domestic Laws
• The Law of War
Part I: Computer Monitoring
(Part of CND)
IO Law Outline, p. 1-15
 System
Administrators
• Monitoring, Encryption,
Intelligence Oversight
 Law
Enforcement / FISA
 Intelligence Community
Information Infrastructure
DEFENSE
BANKING
TELECOMMUNICATION
TRANSPORTATION
ENERGY
Information Security-Monitoring


One of the first lines of defense in protecting
AF information systems
Monitoring performed for different reasons;
by different actors
• systems protection / network
professionals
• operational security / TMAP assets
• evidentiary interception / law enforcement
investigators
Analytical Blueprint

Analysis starts with the three “Ws”
• Who?
• What?
• Why?

Different ROEs based on answers
• Law Enforcement interceptions
• Intel-counterintel surveillance
• Systems protection monitoring
Monitoring: Legal Constraints
 4th
Amendment Right to
Privacy
 Electronic Communications
Privacy Act
Legal Principles-Constitutional Law

Fourth Amendment prohibition against
Unreasonable Search & Seizure
• Protects people; not places
• Is there a reasonable expectation of privacy?
• If so, is the search reasonable?
 Governed by totality of circumstances
 Degree of protection proportional to
expectation of privacy

Summary of Case Law, p. 1-37
U.S. v. Monroe
(AFCCA Feb 5, 1999)



Court found Monroe had no expectation of
privacy in an e-mail account on a
government server as to his supervisors and
the system administrator (Banner)
E-mail accounts were given for official
business, although users were authorized to
send and receive limited textual and morale
messages to and from friends and family
Monroe did not have a government
computer, but had a personal computer in
his dorm room
Monroe...


Court used the analogy of an unsecured
file cabinet in the member’s superiors’
work area in which an unsecured drawer
was designated for his/her use in
performing his/her official duties with the
understanding that his superiors had free
access to the cabinet, including the
drawer
Affirmed by CAAF, 13 March 2000
Electronic Communications
Privacy Act (ECPA)




Statutorily conferred an expectation of privacy in
electronic and wire communications
Interception of electronic communications
Access into stored communications
Generally prohibits interception of electronic
communications, or access into stored
communications, without court order
• aimed at law enforcement
• numerous “exceptions”
 systems provider exception
 consent
 court order
ECPA: Rights and Limitations
May monitor and disclose traffic data
 May access electronic communications
stored on his or her system
 May disclose the contents of those
communications to others unless he or
she is providing electronic
communications services to the public

Real Time Monitoring-- The
provider exception



May monitor in real-time (and thereafter
disclose) wire and electronic
communications,
so long as such monitoring and
disclosure is conducted “in the normal
course of his employment
while engaged in any activity which is a
necessary incident to the rendition of his
service or to the protection of the rights or
property of the provider of that service.”
Disclosure to Law Enforcement
May disclose real-time
communications he or she has
monitored (or stored
communications he or she has
accessed) with the consent of an
appropriate party, normally an
individual who is a party to the
communication, or when
 Evidence of crime is apparent and
inadvertantly obtained

PATRIOT Act of 2001
IO Law Outline, p. 1-17


Section 212 of the amends subsection
2702(b)(6) (ECPA) to permit, but not
require, a service provider to disclose to
law enforcement either content or noncontent customer records in emergencies
involving an immediate risk of death or
serious physical injury to any person.
This section also allows providers to
disclose information to protect their rights
and property.
PATRIOT Act of 2001
IO Law Outline, p. 1-18

Although the wiretap statute allows
computer owners to monitor the
activity on their machines to protect
their rights and property, until
Section 217 of the Patriot Act was
enacted it was unclear whether
computer owners could obtain the
assistance of law enforcement in
conducting such monitoring
Consent: Banners are our
friend
 Promotes
awareness for
users (ECPA exceptions not
necessarily obvious)
 2nd exception under ECPA
Limits on Consent
 Defined
by what banner says
 Limited to provider’s own
network
 Duration must be short term,
then get Wiretap Order (DoJ)
OPSEC/COMSEC Surveillance
IO Law Outline, p. 1-19

AFI 33-219
• authority given only to HQ AIA
TMAP elements
• consent monitoring / banners
• certification process
SJA must review detailed summary of
consent notification actions
 determines if actions legally
sufficient to constitute consent

ROEs--Search (con’t)

Is the search/seizure reasonable?
• consent
• search authorization or warrant

AFOSI vs Security Forces
ROEs--Interceptions

AFI 71-101, Vol 1 Requires Approval
for Interceptions
• AFOSI/CC
• SAF/GC
• DOJ (nonconsensual)
Tips on Handling Computer Abuse
Cases

SYSAD usually identifies govt. I.P.
addresses where abuse taking place
• Does Not Need to Monitor Real-Time


Appropriate commander/senior leader
should be briefed, then assemble all users
to notify them of impropriety, warn
If it continues, SYSAD, commander, and
SF can mount a “sting” to catch perp in
the act
Computer Crime
IO Law Outline, p. 1-23

Federal Computer Crime Statutes
• 18 USC 1029, 1030
• 18 USC 1028 (Identity Theft)
• 18 USC 2251, 2252, 2252A (Sexual
Exploitation of Children)
• 18 USC 2511, 2701… (Wiretap Statute and
ECPA)

UCMJ Articles
• General Article (134)
• Failure to Obey Order or Regulation (92)
USA PATRIOT ACT of 2001
Uniting and Strengthening America by
Providing Appropriate Tools Required
to Intercept and Obstruct Terrorism Act
Nationwide Search Warrants for
E-mail: Sec 220


Old: Search warrant
needed to compel
disclosure of
unopened e-mail less
than six months old in
Electronic Computing
Service or Remote
Computing Service
(i.e. ISP)
Had to be issued by
court within district
where e-mail was
stored



New: nationwide
search warrants for email
Allows court with
jurisdiction over the
offense to issue single
search warrant
Subject to sunset
Intercepting Voice Comms in
Hacking Cases: Sec 202


Old: Could not get
wiretap order to
intercept wire
communications
(involving human
voice) for violations of
the Computer Fraud
and Abuse Act (18
U.S.C. § 1030)
Hackers have stolen
teleconferencing
services to plan and
execute hacks


New: Adds felony
violations of
Computer Fraud and
Abuse Act to list of
offenses that support
a voice wiretap order
Sunsets December
2005
Obtaining Voice-mail and Stored
Voice Comms: Sec 209

Old: LE could use
search warrant for
voice recording on
answering machine
inside criminal’s home
(easier), but needed
wiretap order for
voice comms with a
third party provider


New: Stored voice
(“wire”) comms
acquired under 18
USC § 2703 (including
search warrant)
Sunsets December
2005
Subpoenas for Electronic
Evidence: Sec 210


Old: Subpoena
limited to
customer’s name,
address, length of
service, and
means of payment
In many cases,
users register with
ISPs under false
names



New: Update and
expand records
available by subpoena
Old list, plus means and
source of payment,
credit card or bank
account number,
records of session
times and durations,
and any temporarily
assigned network
address
Not subject to sunset
Intelligence Oversight




Improved Intelligence
Inclusion of international terrorist
activities within scope of foreign
intelligence under the National Security
Act of 1947.
Law enforcement to notify the intelligence
community when a criminal investigation
reveals information of intelligence value.
Reconfigures the Foreign Terrorist Asset
Tracking Center.
FISA Elec Surveillance
Sec. 218


Old: required
certification that
obtaining foreign
intelligence was ‘the’
purpose of search
FISA Court interpreted
to mean primary
purpose of
investigation was
obtaining foreign
intelligence and not
criminal prosecution



New: obtaining
foreign intel is “a
significant purpose”of
the search
Allows intelligence
agents to better
coordinate with
criminal investigators
Subject to sunset
What is “Active Defense”?

Approved joint term in DoD Dictionary
• Active Defense: The employment of limited
offensive action and counterattacks to deny a
contested area or position to the enemy.
• Passive Defense: Measures taken to reduce the
probability of and to minimize the effects of
damage caused by hostile action without the
intention of taking the initiative.

No consensus in computer network context

“Active defense”
 Current U.S. Policy….
“The fact is that right now my authority [for active
defense measures] is very limited. I believe in this area
the wisest course of action is to pursue the policy and
procedural issues at or ahead of the pace of
technological capabilities, because whether or not to use
an attack as an active defense measure or as a weapon
system is a decision that needs to be operationally
defined at the national policy levels first and foremost.”
Maj Gen James Bryan, JTF-CND/CC,
Federal Computer Week, 4 Dec 2000
DoD Deploys Cyber-Defense
Defense News, November 12-18, 2001, Pg.


Faced with a near doubling of attacks on
military computers in the past year, the
guardian of the U.S. military’s information
systems has asked Pentagon leaders for
permission to strike back.
"We are no longer going to be passive. If
they hit us, we’ll be hitting them back real
soon," U.S. Army Maj. Gen. Dave Bryan,
commander, Joint Task Force-Computer
Network Operations (JTF-CNO),
Part II: Computer Network
Attack (CNA)
IO Law Outline, p. 1-42
•
•
•
•
•
•
Development of International Law
The Law of War
The Use of Force in Peacetime
Space Law
Telecommunications Law
US/Foreign Domestic Laws
Development of International
Law
Consists of Binding Legal
Obligations among Sovereign States
 Sovereign States are Legally Equal
and Independent Actors
 They Assume Legal Obligations only
by Affirmatively Agreeing To Do So
 General Rule: Unless Prohibited by
Law a Course of Action is Allowed

Internat’l Development Of
Territoriality in Air & Space

Air Law: Post WW II
• Sovereign Control Over National Airspace

Space Law: Post Sputnik I & Explorer
I
• No Objections to Overflight of Spacecraft
• Reconnaissance Satellites OK
• Outer Space Treaty Enshrines Principle

Information Operations??
United Nations Charter
The first use of armed force by a
state…shall constitute prima facie
evidence of an act of aggression
 What kinds of information attacks are
likely to be considered by the world
community to be armed attacks and
uses of force?
 Peacetime Rules of Engagement

United Nations Charter--1945

Article 2(4)
• Refrain From the Threat or Use of Force
Against the Territorial Integrity of Any
State, or in Any Manner Inconsistent With
the Purposes of the UN

Article 51
• Inherent Right of Self-Defense Recognized
When an “Armed Attack” Occurs
– Space Control -- Information Operations?
Use of Force Authorized?
Authorized by UN Security Council
 Self-defense
 Humanitarian intervention
 Treaty-sanctioned interventions
 Enforcement of international judgments

What is Force?

The traditional view is that force
means armed force, rather than other
potentially coercive vehicles of state
policy
• Negotiating history of UN Charter
• UNGA Resolution on Aggression
• Nicaragua v. United States
China’s Unrestricted Warfare

This kind of war means that all means will
be in readiness, that information will be
omnipresent, and the battlefield will be
everywhere. It means that all weapons
and technology can be superimposed at
will … that all the boundaries lying
between the two worlds of war and
nonwar, of military and nonmilitary, will be
totally destroyed … the rules of war may
need to be rewritten.
Does CNA = Force?
Focus on Consequences of CNA
• Consider Severity/Nature
• No Bright Lines
 Some Tools/Targets May Constitute
Force

International Law
Triggers for self-defense right?
 Intruder defeats security and gains
entry into computer systems
 Significant damage to attacked system
or data
 System is critical to national security
 Intruder’s conduct or context clearly
manifests malicious intent

Computer Responses
Launching responsive CNA to
disable intruder’s equipment
 May not defeat state-sponsored ops
 May serve as shot across the bow
 Useful for shaping conflict
 Reciprocal

Kinetic Responses
Response to CNA need not be CNA
 Lack of target, access etc. may limit
options
 Traditional LOAC analysis:
• Military necessity
• Proportionality

Attribution
Huge technical challenge
 Intelligence data/analysis critical
 Links to other events
 State sponsored or not?
 Identity and intent

Remedies
If not state-sponsored, law enforcement
authorities are primary response
 If nation unable or unwilling to prevent
recurrence, use self-defense
 Providing safe refuge can be complicity
 Complicity can be state action

Legal/Policy
Considerations
Continuing threat to national
security
 Demonstration of resolve
 World opinion
 Reciprocity

Domestic Law-No Military Exclusion
18 USC 1367: Felony to intentionally
or maliciously interfere with a
communications or weather satellite,
or to obstruct or hinder any satellite
transmission.
 10 USC 1030: Misdemeanor to
intentionally access a computer
without authorization or exceed
access

Domestic Law (cont)

18 USC 2511: prohibits intercept and
disclosure of wire, oral, electronic
communications.
• FISA exception

DOJ/GC opinion: domestic criminal
law does not apply to actions of US
military members executing
instructions of the NCA
LOAC: Customary Legal
Principles and IW






Military Necessity
Distinction
Proportionality (possible problem)
Humanity (unlawful weapons)
Chivalry (Perfidy)
[Law of Neutrality]
Military Necessity
 Military
Infrastructures: Lawful
Target
 Purely Civilian Infrastructure:
Unlawful, Maybe...
• Stock Exchanges
• Banks
• Universities
Distinction
 Combatants
 Computer
vs. Noncombatants
Network Attack
• Our “cyber-warriors” are required
to be part of military
• Attack from .mil??
Proportionality

During Desert Storm one of the earliest
targets was the electrical power system
• Lawful target: military use

Iraqi response: Coalition’s attack
constituted attempted genocide
• City’s sewage system backed up, threat of
epidemic disease
Humanity: Unlawful Weapons
 Illegal Per Se (by Treaty)
• Poisons
• Glass projectiles
• DumDum Bullets
 Illegal by treaty because of
indiscriminate effects
• Biological/Bacteriological weapons
• Chemical weapons
Indiscriminate Weapons?
Lasers (earth/space based)
 Malicious Logic
 Worms/Viruses
 EMP Devices

Chivalry

The waging of war in accordance with wellrecognized formalities and courtesies
• Permits lawful “ruses and stratagems” intended to
lawfully mislead the enemy
• Prohibits perfidy -- treacherous acts intended to
take unlawful advantage of the enemy’s “good faith”

What about taking over your enemy’s
computer network:
• to send supplies to the wrong place?
• to declare an end to the war?
Perfidy
Improper use of
Flags of Truce
Protected Status
Distinctive Emblems
Uniforms of Neutrals
Law of Neutrals
- Neutrality by a State means refraining from
all hostile participation in the armed
conflict
- It is the duty of belligerents to respect the
territory and rights of neutral States
Switzerland
Austria
Jordan
Hague V, Art. 1
 Prohibits any unauthorized entry into
the territory of a neutral State, its
territorial waters, or the airspace
over such areas by troops or
instrumentalities of war
 If one belligerent enters neutral
territory, the other belligerent, or
neutral State may attack them there
Law of Neutrals
Neutrality under UN Charter?
 1907 Hague Convention--Facilities are
provided impartially to both sides
 Systems that generate information v.
merely relay communications

Summary
Interplay of different International Law
Regimes
 If it is not prohibited, it is permitted
 What we do will have tremendous effect
on how this area of the law develops

Relevant Directives
(To name a few!)












PDD 62, Combating Terrorism
PDD 63, Critical Infrastructure Protection
JP3-13, Joint Doctrine for Information Operations
DoDD S 3600.1, Information Operations
DOD Memorandum on Web Site Administration, 7 Dec 98
DOD Memorandum on Communications Security and
Information Systems Monitoring, 27 Jul 97
AFDD 2-5, Information Operations
AFI 33-129, Transmission of Information via the Internet
AFI 33-119, Electronic Mail Management and Use
AFI 33-219, Telecommunications Monitoring and Assessment
Program
AFI 14-104, Intelligence Oversight
TJAG Policy Letter 31, Legal Information Services
Download