Monday, 29 July 2013

Battle line: Cyberspace

Cyber warfare refers to politically-motivated attacks to conduct espionage and hacking. A form of information warfare, cyber warfare is now considered to be a critical pillar of military operations along with land, sea, air and space.
Nation states that are formally or otherwise in a state of war with each other are often thought to be behind efforts to penetrate each other’s networks and cyber space to cause damage and disruption.
National cyber warfare strategy
Keeping in view the strategic and military importance of cyber security, many countries across the globe including Pakistan are working to make their digital front more secure.
In May 2010, Pentagon set up its new US Cyber Command (USCYBERCOM), headed by General Keith B. Alexander, director of the National Security Agency (NSA). The aim was to defend American military networks and to strike back in case of a national threat.
Similarly, the European Union has set up ENISA (European Network and Information Security Agency) who are now aiming to significantly expand ENISA's capabilities in order to safeguard its socio-economic interests in the region.United Kingdom has also set up an operations centre for cyber-security, based in the Government Communications Headquarters (GCHQ).
Similarly Pakistan, which has been the victim of cyber attacks by neighbouring India, has been working on an effective cyber security system as well. The program reportedly called "Cyber Secure Pakistan" was launched in April 2013 by the Pakistan Information Security Association, and aims not only to secure military and government spaces but has been expanded to the country's universities, which are often targeted by Indian hackers.
Cyber warfare methodologies
Unlike other politically-motivated attacks amongst nation states, cyber warfare has greater strategic value to it. These attacks often target civil, military and private institutions, including telecommunication, transport, finance and the energy sector.
Different methodologies are adopted to carry out these attacks. DDoS (Dedicated Denial of Service) attacks are carried out to make a machine or service unavailable for intended users. Although, denial of service attacks are often deemed computer generated, they can target high profile servers like government sites, banks, credit card payment gateways etcetera.
Cutting off electronic installments such as undersea communication cables also comes under the category of cyber attacks.
With the growing dependence on digital infrastructure, network breaches and cyber espionage are the shiny new tools of cyber warfare. Attackers hack into targeted systems by various means and often sabotage and modify industrial infrastructure.
Such methods not only disrupt the digital infrastructure, but also temper with the existing functionalities of the systems and networks. Stuxnet, along with its many variants, is a fine example of espionage and national security sabotage.
Stuxnet, the game changer
In 2010, Iranian nuclear facilities were infected by a unique computer virus, which pushed back the Iranian nuclear program by about three years. Stuxnet, reportedly the first malware with an ability to mask itself over a network, spies on and critically destabilises industrial systems, and is probably the first malware to include a programmable logic controller (PLC) rootkit (such software has a malicious nature, and is designed to hide certain processes from normal detection methods).
Israel and the United States were reportedly behind the cyber attack targeting the Iranian nuclear infrastructure.
Stuxnet computer malware is undeniably a work of genius, and once you learn about its functionality, you can start picturing the atmosphere of the next generation’s cyber warfare capabilities. The malware spread indiscriminately into the Iranian nuclear facilities network, but included a specialised malware payload that was designed to target specifically Siemens supervisory control and data acquisition systems (aka SCADA). These industrial systems monitor and control high-valued industrial processes.
Spread initially via USB, the malware took over the network by working silently in the background without being detected by normal processes. Stuxnet in this case was programmed to target SCADA configurations that met specific criteria; once the criterion was met it changed the rotational frequency of the attached motors, hence disrupting industrial equipment and causing heavy losses. Although there was no official statement from any side, in May 2011, Gary Samore, White House Coordinator for Arms Control and Weapons of Mass Destruction, in his television interview exclaimed,
"We're glad they [the Iranians] are having trouble with their centrifuge machine and that we – the US and its allies – are doing everything we can to make sure that we complicate matters for them."
Similarly, according to The Daily Telegraph, at the retirement party for the chief of staff of the Israeli Defence Forces (IDF), Gabi Ashkenazi, references to Stuxnet were made, as one of the operational successes of the retiring IDF chief of staff.
Stuxnet, along with its various variants, does exist in the black market and will remain a threat to all countries that are running critical industrial facilities of a similar nature.
Pakistan vs. India
Pakistan and India are often in conflict with each other over the disputed territory of Kashmir, among many other issues. Cyber attacks are the latest way to dismantle each country’s infrastructure and operations. There are two such notable cases, where India and Pakistan meddled in serious cyberspace conflicts, initiated back in the late 90’s. Initially the cyber attacks started to show their face in 1999, at a time when India and Pakistan were engaged in the Kargil conflict.
Historical facts indicate that hackers from both countries have been repeatedly involved in attacking private and government websites. The number of attacks has considerably grown with the passage of time. In 2010, at least 36 Pakistani government database websites were hacked by a group who go by the name of "Indian Cyber Army".
The official website of the Election Commission of Pakistan was attacked in 2013 by the same group in an attempt to retrieve sensitive database information. In response, Pakistani hackers, also known as "True Cyber Army", hacked and defaced around 1,059 websites of Indian election bodies.
In a similar incident in December 2010, a group of Pakistani hackers attacked and took down the website of India's top investigating agency, the Central Bureau of Investigation (CBI). This was also in response to the attack by Indian hackers who attacked websites belonging to the Pakistani Army and government websites including Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology etcetera.
Cyber war in the Middle East
Similar to the situation on ground, the actors of the Palestinian crisis are often found clashing in the virtual world. In late 2000, Israeli hackers launched a DDoS attack on the websites of both Hezbollah and Hamas. In retaliation, Palestinian hackers chocked down the access to several Israeli websites. Interestingly, in 2007 Israel carried out an airstrike on Syria. The fighter planes managed to enter the Syrian airspace undetected. This security breach is considered as a cyber attack targeting Syrian radar and air defence network.
China vs. USA
Along with the conventional enemies that engage each other on various fronts, China is considered to be a strategic enemy by many nations including the United States. Both countries view each other as a cyber threat and equip their hackers with the latest tools to deal with a possible cyber attack. This virtual cold war is evident from the fact that top American websites are unwelcome in China, including Facebook and Google. China even has its own version of Twitter.
The Internet, along with other technological advancements has proven to be a great medium of learning and global unity, where netizens, irrespective of their nationality, work hand in hand for the progress of technology, art, medicine and economy. It’s about time that stakeholders of the Internet develop a consensus to keep the internet free and secure from politically-motivated attacks by any state or individual actors.

No comments:

Post a Comment