The United States' Cyber Warfare History: Implications On Modern Cyber .

Transcription

The United States’ Cyber WarfareHistory: Implications on Modern CyberOperational Structures andPolicymakingOmry HaizlerThis article will touch upon two main components of the UnitedStates’ cybersphere and cyber warfare. First, it will review three cyberincidents during different time periods, as the US infrastructure,mechanisms, and policies were gradually evolving. It will analyzethe conceptual, operational, and legislative evolution that led to thecurrent decision-making paradigm and institutional structure of theUS cybersphere. Secondly, the paper will examine the proceduresand policies of the Intelligence Community (IC), and the US cyberoperational structure. It will review the missions and background ofthe IC and its responsibilities before, during, and after a cyberattack,and will touch upon the IC’s organizational architecture. The paperwill also briefly review the current cyber threats in the United Statesand will elaborate on some of the fundamental strategies and policiesthat it uses to provide a suitable response. Lastly, it analyzes thecybersphere’s macro-level, addressing the data coordination ofthe IC’s agencies, as well as the federal, state, and private sectorinstitutions during a cyber crisis.Keywords: Moonlight Maze, Morris Worm, Stuxnet, cyberattacks,United States intelligence community, cyber crisis, cyber threats,internet governance, cyber policy, cyber strategyOmry Haizler is a former IDF Officer and a Prime Minister’s Office operative. He holdsan MPA from Columbia University’s School of International and Public Affairs (SIPA).He currently teaches at Columbia’s School of Continuing Education.Cyber, Intelligence, and Security Volume 1 No. 1 January 201731

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYCyber, Intelligence, and Security Volume 1 No. 1 January 201732History of Cyber Warfare7KHUH DUH WKUHH KLVWRULFDO VWDJHV RI WKH HYROXWLRQ RI F\EHU ZDUIDUH WKH UHDOL]DWLRQ SKDVH GXULQJ WKH HDUO\ HUD RI WKH LQWHUQHW WKH WDNHRII SKDVH GXULQJ WKH LQWHULP SHULRG RI SUH DQG SRVW LQ ZKLFK DWWDFNV ZHUH VWLOO PDLQO\ RI DQ LQIRUPDWLRQ JDWKHULQJ QDWXUH DQG WKH PRGHUQ PLOLWDUL]DWLRQ SKDVH GXULQJ ZKLFK F\EHU ZDUIDUH PD\ FDXVH VLPLODU GDPDJH WR 86 VWUDWHJLF FDSDELOLWLHV DQG FULWLFDO LQIUDVWUXFWXUH DV D NLQHWLF DWWDFN RQ D FRORVVDO OHYHO )LJXUH EHORZ GHVFULEHV WKHVH VWDJHV 1Stages5HDOL]DWLRQ7DNHRII7LPHIUDPH Attackers haveadvantage overGHIHQGHUV Attackers haveadvantage overGHIHQGHUV'\QDPLFV:KR DV &DSDELOLWLHV"Adversaries0DMRU ,QFLGHQWV86 'RFWULQH0LOLWDUL]DWLRQ SUHVHQWAttackers haveadvantage overGHIHQGHUV8QLWHG 6WDWHV 5XVVLD 8QLWHG 6WDWHV DQG 8QLWHG 6WDWHV DQG IHZ &KLQD DQG PDQ\ PRUH 5XVVLD ZLWK PDQ\ other superpowersDFWRUV ZLWK VXEVWDQWLDO VPDOO DFWRUVFDSDELOLWLHV1HR DFNWLYLVWV espionage agents, DFNWLYLVWV SDWULRW PDOZDUH QDWLRQDO DFNHUVhackers, viruses,PLOLWDULHV VSLHV DQG ZRUPVDQG WKHLU SUR[LHV hacktivists(OLJLEOH 5HFHLYHU &XFNRRV (JJ Titan Rain,6RODU 6XQULVH 0RUULV :RUP (VWRQLD 0RRQOLJKW 0D]H 'XWFK DFNHUV *HRUJLD OOLHG )RUFH 5RPH /DEV %XFNVKRW DQNHH&KLQHVH 3DWULRW &LWLEDQN 6WX[QHW DFNHUV,QIRUPDWLRQ ZDUIDUH,QIRUPDWLRQ &\EHU ZDUIDUHoperationsFigure 1: Phases of Cyber Conflict HistoryAttacks as Catalyzers for Institutional Evolution(DFK RI WKH DERYH SHULRGV FKDUDFWHUL]HV D IXQGDPHQWDOO\ GLIIHUHQW GRFWULQH ERWK ZLWK UHVSHFW WR WHFKQRORJLFDO SURJUHVVLRQ DQG W\SH RI WKUHDWV DQG WR WKH DGPLQLVWUDWLRQ¶V F\EHU SROLFLHV DW HDFK JLYHQ WLPH &HUWDLQ SDVW DWWDFNV HPERGLHG IXWXUH F\EHU FKDOOHQJHV VHUYLQJ DV ZDUQLQJ VLJQV WR LQVWLWXWLRQV¶ YXOQHUDELOLWLHV DQG ODFN RI VHFXULW\ V VRFLHW\¶V GHSHQGHQF\ RQ WHFKQRORJ\

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYLQFUHDVHG WKH SRVVLEOH UDPL¿FDWLRQV RI LQHI¿FLHQW VHFXULW\ LQ D VSHFL¿F EUHDFK DOVR LQFUHDVHG 1. Realization—the Morris Worm 7KLV F\EHU LQFLGHQW DFWHG DV WKH ¿UVW ZDNH XS FDOO WR WKH PHULFDQ ,QWHOOLJHQFH &RPPXQLW\ ,& SROLF\PDNHUV DQG DFDGHPLFV :KLOH LW ZDV QRW WKH ¿UVW F\EHUDWWDFN RQ 86 FRPSXWHU V\VWHPV²WKH &XFNRR¶V (JJ KDFN LQYROYLQJ WKH 6RYLHW .*% ZDV WKH ¿UVW VLJQL¿FDQW F\EHU HVSLRQDJH DWWDFN²LW LV ZLGHO\ FRQVLGHUHG WKH ¿UVW ODUJH VFDOH DWWDFN ERWK LQ WHUPV RI WKH TXLFN SKDVH RI HYHQWV LWV VFDOH DQG LWV LPSOLFDWLRQV /DXQFKHG DV D SUDQN IURP D ODE DW &RUQHOO 8QLYHUVLW\ WKH 0RUULV :RUP ZDV GHVLJQHG WR LQIHFW DV PDQ\ PDFKLQHV DV SRVVLEOH ZLWKRXW EHLQJ GHWHFWHG WKH ZRUP FUDVKHG FRPSXWHUV²URXJKO\ SHUFHQW RI WKH LQWHUQHW LQ 2 7KH 86 *RYHUQPHQW FFRXQWDELOLW\ 2I¿FH DVVHVVHG WKH GDPDJH DW LOOXVWUDWLQJ WKH GLI¿FXOW\ RI DVVHVVLQJ F\EHUDWWDFN GDPDJH D SUREOHP SUHYDOHQW HYHQ WRGD\ 3 DespiteWKH VHYHUH UDPL¿FDWLRQV WKH LQFLGHQW SURYLGHG DQ LPSRUWDQW ZDUQLQJ WR WKH ,& KLJKOLJKWLQJ WKH SRWHQWLDO GDQJHUV RI KLJKO\ FRQQHFWHG FRPSXWHU QHWZRUNV DQG WKH QHHG IRU LQVWLWXWLRQDOL]HG GHIHQVLEOH FDSDELOLWLHV DQG VWUXFWXUHV LQ WKH F\EHUVSKHUH 7KH 0RUULV :RUP DFWHG DV D FDWDO\]HU IRU WKH ¿UVW VWHSV WRZDUGV D PRUH UHJXODWHG F\EHUVSDFH DQG OHG WR GUDPDWLF FKDQJHV ERWK FRQFHSWXDOO\ DQG RSHUDWLRQDOO\ Paradigm Shift W WKH WLPH RI WKH LQFLGHQW WKH LQWHUQHW ZDV WDNLQJ LWV ¿UVW VXEVWDQWLDO VWHSV DQG ZDV FRQVLGHUHG D ³IULHQGO\ SODFH ZKHUH HYHU\RQH NQRZV HYHU\RQH 7KH 0RUULV :RUP PDGH LW FOHDU WKDW VRPH SHRSOH LQ F\EHUVSDFH GLG QRW KDYH WKH EHVW LQWHUHVWV LQ PLQG WKH LQFLGHQW ZDV WKH ¿UVW WLPH ZKHUH F\EHU LQQRYDWLRQ VKLIWHG IURP IRFXVLQJ VROHO\ RQ LQWHUFRQQHFWLYLW\ WR VHFXULW\ FRQFHUQV Operations (VWDEOLVKHG DIWHU WKH 0RUULV :RUP LQFLGHQW E\ WKH 'HIHQVH GYDQFHG 5HVHDUFK 3URMHFWV JHQF\ ' 53 DW &DUQHJLH 0HOORQ 8QLYHUVLW\ WKH &RPSXWHU (PHUJHQF\ 5HVSRQVH 7HDP &(57 GHPRQVWUDWHG WKH VKLIW IURP DG KRF VROXWLRQV WR SURIHVVLRQDO WHDPV ZKLFK ZHUH WUDLQHG DQG HTXLSSHG WR FRRUGLQDWH HYHQWV DQG SURYLGH DVVHVVPHQWV DQG VROXWLRQV WR D JLYHQ F\EHUDWWDFN 4Regulations ORQJ ZLWK WKH FRQFHSWXDO VKLIW LQ F\EHUVHFXULW\ &RQJUHVV SDVVHG VHYHUDO ODZV LQ WKH \HDUV IROORZLQJ WKH 0RUULV :RUP LQFLGHQW LQFOXGLQJ Cyber, Intelligence, and Security Volume 1 No. 1 January 201733

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYCyber, Intelligence, and Security Volume 1 No. 1 January 201734WKH (OHFWURQLF &RPPXQLFDWLRQV 3ULYDF\ FW RI DQG WKH &RPSXWHU 6HFXULW\ FW RI WR HQVXUH SULYDF\ LQ F\EHU GRPDLQV WKURXJK OHJDO SURWHFWLRQV 5 GGLWLRQDOO\ 5REHUW 7DSSDQ 0RUULV ZKR FUHDWHG WKH 0RUULV :RUP ZDV WKH ¿UVW SHUVRQ WR EH FRQYLFWHG XQGHU WKH QHZ &RPSXWHU )UDXG DQG EXVH FW RI 2. Takeoff—The Moonlight Maze,Q 86 RI¿FLDOV DFFLGHQWDOO\ GLVFRYHUHG D SDWWHUQ RI VXVWDLQHG SURELQJ RI WKH 3HQWDJRQ¶V FRPSXWHU V\VWHPV SULYDWH XQLYHUVLWLHV 1 6 (QHUJ\ 'HSDUWPHQW DQG UHVHDUFK ODEV 6RRQ WKH\ OHDUQHG WKDW WKH SURELQJ KDG RFFXUUHG FRQWLQXDOO\ IRU QHDUO\ WZR \HDUV 7KRXVDQGV RI XQFODVVL¿HG \HW VHQVLWLYH GRFXPHQWV UHODWLQJ WR WHFKQRORJLHV ZLWK PLOLWDU\ DSSOLFDWLRQV KDG EHHQ H[DPLQHG RU VWROHQ LQFOXGLQJ PDSV RI PLOLWDU\ LQVWDOODWLRQV WURRS FRQ¿JXUDWLRQV DQG PLOLWDU\ KDUGZDUH GHVLJQV 7 OWKRXJK WKH 'HIHQVH 'HSDUWPHQW WUDFHG WKH WUDLO EDFN WR D PDLQIUDPH FRPSXWHU LQ WKH IRUPHU 6RYLHW 8QLRQ WKH VSRQVRU RI WKH DWWDFNV UHPDLQV XQNQRZQ 5XVVLD GHQLHG DQ\ LQYROYHPHQW DQG WKH VXVSLFLRQV KDYH QHYHU EHHQ FRQFOXVLYHO\ SURYHQ 0RRQOLJKW 0D]H LV ZLGHO\ FRQVLGHUHG WKH ¿UVW ODUJH VFDOH F\EHUHVSLRQDJH DWWDFN E\ D ZHOO IXQGHG DQG ZHOO RUJDQL]HG VWDWH DFWRU 7KH DWWDFN ZDV ZHOO SODQQHG DV WKH DWWDFNHUV OHIW ³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¿UHZDOOV DQG HQFU\SWLRQV DQG DERYH DOO WKH GLI¿FXOWLHV RI LGHQWLI\LQJ DQG DWWULEXWLQJ DQ DWWDFN WR D VSHFL¿F DGYHUVDU\ 0RRQOLJKW 0D]H ZDV DQ LPSRUWDQW SURJUHVVLRQ LQ F\EHU ZDUIDUH DQG F\EHUVHFXULW\ GXH WR LWV LPSOLFDWLRQV RQ IXWXUH FRQÀLFWV 10 ,W SRLQWHG RXW WKH IXWXUH VKLIW LQ WKH PRGHUQ EDWWOH¿HOG IURP D NLQHWLF ZDU²LQ ZKLFK HQHPLHV KDYH QDPHV DQG SK\VLFDO ORFDWLRQV DQG LQ ZKLFK DWWDFNV FDQ EH ZLWQHVVHG DQG DVVHVVHG²LQWR DQ DV\PPHWULFDO ZDUIDUH ZLWK RIIHQVLYH F\EHU RSHUDWLRQV ZKHUH DWWDFNV PLJKW EH LQYLVLEOH DGYHUVDULHV DUH XQNQRZQ DQG GDPDJH LV KDUG WR TXDQWLI\ 7KH LQFLGHQW OHG WR GUDPDWLF VKLIWV LQ WKH 86 DGPLQLVWUDWLRQ¶V DSSURDFK WR F\EHUVHFXULW\

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYParadigm Shift: 7KH DZDUHQHVV RI WHUURULVW WKUHDWV DQG VXSSRUW RI FRXQWHUWHUURULVP LQLWLDWLYHV SRVW DPRQJ SROLF\PDNHUV ZHUH OLPLWHG 7KH 0RRQOLJKW 0D]H LQFLGHQW FDXVHG D UHWKLQNLQJ RI WKH 86 F\EHU GHIHQVH VWUDWHJ\ F\EHU ZDUIDUH DWWULEXWLRQ F\EHU GHWHUUHQFH DQG WKH FXUUHQW GHIHQVH RI VHQVLWLYH QRQ HQFU\SWHG QHWZRUNV VXFK DV 1,3(5QHW 1RQ 6HFXUH ,QWHUQHW 3URWRFRO 5RXWHU 1HWZRUN WKH 3HQWDJRQ¶V QRQ FODVVL¿HG QHWZRUN )RU WKH ¿UVW WLPH SROLWLFDO DQG FRQVWLWXWLRQDO TXHVWLRQV ZHUH UDLVHG DERXW VHFXULW\ SULYDF\ DQG QRWLRQV RI DFWLYH PRQLWRULQJ DQG SRVVLEOH H[SRVXUH WR WUDQVQDWLRQDO WKUHDWV 11 0RRQOLJKW 0D]H FDXVHG WKH 86 DJHQFLHV DQG JRYHUQPHQW WR UHDOL]H WKDW FOHDU SROLFLHV DQG VWUDWHJLHV ZHUH QHHGHG IRU DV\PPHWULF ZDUIDUH WKH ¿HOG RI IXWXUH LQWHOOLJHQFH JDWKHULQJ DQG HVSLRQDJH DQG WKH WHFKQRORJLFDO LPSOLFDWLRQV WKH\ HQWDLO Legislative Acts 7KH 3UHVLGHQWLDO 'HFLVLRQ 'LUHFWLYH 3'' UHJDUGLQJ FULWLFDO LQIUDVWUXFWXUH SURWHFWLRQ ZDV LQ SDUW WKH UHVXOW RI 0RRQOLJKW 0D]H 7KLV ZDV D VHPLQDO SROLF\ GRFXPHQW VHWWLQJ IRUWK UROHV UHVSRQVLELOLWLHV DQG REMHFWLYHV IRU SURWHFWLQJ WKH QDWLRQ¶V XWLOLW\ WUDQVSRUWDWLRQ ¿QDQFLDO DQG RWKHU HVVHQWLDO LQIUDVWUXFWXUH 12 7KH 3'' OHG WR WZR VLJQL¿FDQW VWUDWHJLF LPSOLFDWLRQV 2QH ZDV WKH FUHDWLRQ RI WKH 1DWLRQDO ,QFLGHQW 3URWHFWLRQ &HQWHU 1,3& DQ LQWHU DJHQF\ ERG\ ZLWK WKH SRZHU WR VDIHJXDUG WKH QDWLRQ¶V FLYLOLDQ DQG JRYHUQPHQWDO FULWLFDO LQIUDVWUXFWXUH IURP FRPSXWHU EDVHG DWWDFNV 13 TheVHFRQG ZDV WKH FUHDWLRQ RI WKH -RLQW 7DVN )RUFH &RPSXWHU 1HWZRUN 'HIHQVH -7) &1' D ERG\ HQWUXVWHG ZLWK WDNLQJ WKH OHDG LQ FRRUGLQDWLQJ D UHVSRQVH WR QDWLRQDO F\EHUDWWDFNV DQG FHQWUDOL]LQJ WKH GHIHQVH RI PLOLWDU\ QHWZRUNV 14Operational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ilitarization—Stuxnet7KH 6WX[QHW DWWDFN LV FRQVLGHUHG RQH RI WKH PRVW VRSKLVWLFDWHG PDOZDUH DWWDFNV SXEOLFO\ UHFRUGHG OWKRXJK XQYHUL¿HG PDQ\ H[SHUWV DUJXH WKDW RQO\ Cyber, Intelligence, and Security Volume 1 No. 1 January 201735

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYCyber, Intelligence, and Security Volume 1 No. 1 January 201736D QDWLRQ VWDWH FRXOG KDYH FUHDWHG DQG ODXQFKHG WKH DWWDFN DQG PDQ\ PHGLD RXWOHWV VXJJHVWHG LW ZDV D MRLQW ,VUDHOL PHULFDQ RSHUDWLRQ 15 &RQVLGHUHG DV RQH PRVW LPSDFWIXO F\EHUDWWDFNV LQYROYLQJ VRYHUHLJQ FRXQWULHV WKH PDOZDUH GDPDJHG ,UDQ¶V FHQWULIXJHV DQG GHOD\HG LWV XUDQLXP HQULFKPHQW HIIRUWV 2QFH LQVLGH WKH QHWZRUN LW XVHG D YDULHW\ RI PHFKDQLVPV WR SURSDJDWH WR RWKHU PDFKLQHV ZLWKLQ WKDW QHWZRUN DQG JDLQ SULYLOHJHV DV VRRQ DV LW KDG LQIHFWHG WKRVH PDFKLQHV 7KHVH PHFKDQLVPV LQFOXGHG ERWK NQRZQ DQG SDWFKHG YXOQHUDELOLWLHV DV ZHOO DV IRXU YXOQHUDELOLWLHV WKDW ZHUH XQNQRZQ DQG XQSDWFKHG ZKHQ WKH ZRUP ZDV UHOHDVHG DND ³]HUR GD\ H[SORLWV :KLOH WKH LQWHUQDWLRQDO FRPPXQLW\ UHPDLQV XQVXUH RI WKH VRXUFH DQG H[DFW SXUSRVH RI WKH YLUXV WKH LQFLGHQW UDLVHG DZDUHQHVV RI QHWZRUNV¶ YXOQHUDELOLWLHV 17,GHQWL¿HG LQ 6WX[QHW¶V LPSDFW DQG XQFOHDU RULJLQ KLJKOLJKW WKH GLI¿FXOW\ LQ QRWLFLQJ DQ DWWDFN DQG VXJJHVW WKDW DW D QDWLRQ OHYHO LW LV LPSRVVLEOH WR IXOO\ GHIHQG DOO YLWDO UHVRXUFHV 7KHUHIRUH LW EHFDPH FUXFLDO WR XQGHUVWDQG WKH G\QDPLFV RI EDWWOH OLNH VLWXDWLRQV LQ PRGHUQ DJH F\EHU ZDUIDUH LQ ZKLFK HYHQ D FRORVVDO DWWDFN GRHV QRW QHFHVVDULO\ KDYH DQ DWWULEXWHG DWWDFNHU RU D WUDFH RI DQ\ DWWDFN DW DOO 7KLV PHDQV WKDW LQ PRGHUQ QRQ NLQHWLF EDWWOH ¿HOGV SROLF\PDNHUV UHDOL]H WKH HIIHFW RI DQ DWWDFN IURP GHQLDO RI VHUYLFH WR WKH GHVWUXFWLRQ RI D QDWLRQ¶V FULWLFDO LQIUDVWUXFWXUHV ZLWKRXW KDYLQJ D VPRNLQJ JXQ RU DQ\ OHJDO RU SROLWLFDO WRRO WR ¿JKW ZLWK 7KLV SKHQRPHQRQ UHTXLUHV OHJLVODWRUV DQG DXWKRULWLHV WR VWDUW IRUPXODWLQJ UHVSRQVH RSWLRQV DQG GHWDLOHG SURWRFROV QRZ UDWKHU WKDQ WU\LQJ WR GHYHORS DG KRF RSWLRQV ODWHU GXULQJ D FULVLV 7KH F\EHU ZDUIDUH RI SRVW VKLIWHG WKH FRXQWHUDWWDFN DSSURDFK IURP an operational level19 WR D VWUDWHJLF GLSORPDWLF RQH ZKHUH SROLF\ LQWHUQDWLRQDO ODZV LQWHUQHW JRYHUQDQFH DQG DJUHHPHQWV SOD\ D VLJQL¿FDQW SDUW LQ WKH RYHUO\ EUHDFKHG F\EHU HQYLURQPHQW 7KUHH VXEVWDQWLDO LQWHUQHW JRYHUQDQFH DJUHHPHQWV DQG FROODERUDWLYH HIIRUWV KDYH WDNHQ SODFH RQ D PXOWLQDWLRQDO OHYHOD 7KH 8QLWHG 6WDWHV &KLQD &\EHU JUHHPHQW 7KLV DJUHHPHQW HQVXUHV WKDW QHLWKHU JRYHUQPHQW ³ZLOO FRQGXFW RU NQRZLQJO\ VXSSRUW F\EHU HQDEOHG WKHIW RI LQWHOOHFWXDO SURSHUW\ LQFOXGLQJ WUDGH VHFUHWV RU RWKHU FRQ¿GHQWLDO EXVLQHVV LQIRUPDWLRQ IRU FRPPHUFLDO DGYDQWDJH 20 :KLOH LW LV RQO\ D EDVLF DJUHHPHQW WKDW GRHV QRW HQVXUH D VDIH F\EHU HQYLURQPHQW EHWZHHQ WKH WZR VWDWHV LWV LPSRUWDQFH VWHPV IURP WKH DELOLW\ WR EXLOG XSRQ LW LQ IXWXUH \HDUV DQG DFW DV D JHVWXUH RI JRRGZLOO

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYE 7KH 8QLWHG 1DWLRQV¶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¿UVW WLPH 22US Cybersphere Operational Structure'XH WR WKH FRPSOH[LW\ RI FRRUGLQDWLRQ IUDJPHQWHG UHVSRQVLELOLWLHV DQG RYHUODSSLQJ RYHUVLJKW WKH PXOWL IDFHWHG F\EHUVSDFH LV VDWXUDWHG ZLWK PLOLWDU\ WKLQN WDQNV DFDGHPLD SULYDWH VHFWRU DQG JRYHUQPHQW LQVWLWXWLRQV EUDQFKHV DQG RI¿FHV W WKH QDWLRQDO OHYHO LV WKH ,QWHOOLJHQFH &RPPXQLW\ ZKLFK KDV ERWK GHIHQVLYH DQG RIIHQVLYH FDSDELOLWLHV DQG KDV WKH XOWLPDWH UHVSRQVLELOLW\ LQ DGGUHVVLQJ DQG PRQLWRULQJ PRGHUQ F\EHU ZDUIDUH :KHWKHU LW LV DQ DWWDFN DJDLQVW PLOLWDU\ RU JRYHUQPHQW RI¿FHV RU D VLJQL¿FDQW DWWDFN DJDLQVW D SULYDWH LQVWLWXWLRQ RU FULWLFDO LQIUDVWUXFWXUH WKH ,& KROGV WKH RSHUDWLRQDO UHVSRQVLELOLW\ IRU DOO DVSHFWV RI WKH 8QLWHG 6WDWHV¶ F\EHUVSKHUH (VWDEOLVKHG LQ WKH ,& LV D IHGHUDWLRQ RI VHYHQWHHQ 86 JRYHUQPHQW DJHQFLHV WKDW ZRUN VHSDUDWHO\ DQG WRJHWKHU WR FRQGXFW LQWHOOLJHQFH DFWLYLWLHV 230HPEHU RUJDQL]DWLRQV LQFOXGH LQWHOOLJHQFH DJHQFLHV PLOLWDU\ LQWHOOLJHQFH FLYLOLDQ LQWHOOLJHQFH DQG DQDO\VLV RI¿FHV ZLWKLQ IHGHUDO H[HFXWLYH GHSDUWPHQWV DOO KHDGHG E\ WKH GLUHFWRU RI 1DWLRQDO ,QWHOOLJHQFH ZKR UHSRUWV GLUHFWO\ WR WKH SUHVLGHQW 24 :KLOH PRVW RI WKH DVVRFLDWHG DJHQFLHV DUH RI¿FHV RU EXUHDXV ZLWKLQ IHGHUDO H[HFXWLYH GHSDUWPHQWV QLQH RI WKHP RSHUDWH XQGHU WKH 'HSDUWPHQW RI 'HIHQVH DQG WRJHWKHU VSHQG SHUFHQW RI WKH WRWDO 86 LQWHOOLJHQFH IXQGV 7UDGLWLRQDO LQWHOOLJHQFH JDWKHULQJ UHOLHV RQ D FRXQWHUWHUURULVP¶V LQWHOOLJHQFH F\FOH ZKLFK LQFOXGHV KXPDQ LQWHOOLJHQFH 80,17 VLJQDOV LQWHOOLJHQFH 6,*,17 LPDJHU\ LQWHOOLJHQFH ,0,17 DQG PHDVXUHPHQW DQG VLJQDWXUH LQWHOOLJHQFH 0 6,17 :KLOH DOO GLVFLSOLQHV DUH VWLOO QHHGHG WR IRUP DQ LQFOXVLYH LQWHOOLJHQFH DVVHVVPHQW F\EHU DQG FU\SWRORJ\ FDSDELOLWLHV KDYH Cyber, Intelligence, and Security Volume 1 No. 1 January 201737

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYCyber, Intelligence, and Security Volume 1 No. 1 January 201738JDLQHG PRUH UHFRJQLWLRQ DV WKH QHHG IRU LQYHVWPHQW LQ KXPDQ FDSLWDO DQG UHVRXUFHV ULVHV DQG DV WKH ZRUOG¶V UHOLDQFH RQ WHFKQRORJ\ LQFUHDVHV 7KH ,& IRFXVHV RQ WKUHH DVSHFWV RI PDLQWDLQLQJ F\EHUVHFXULW\ RUJDQL]DWLRQ GHWHFWLRQ DQG GHWHUUHQFH 9DULRXV RUJDQL]DWLRQV ZLWKLQ WKH ,& SXUVXH GLIIHUHQW WDVNV 25 7KH 2I¿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¶V XPEUHOOD DGGUHVV F\EHU WKUHDWV WKH PRVW SURPLQHQW RI ZKLFK LV WKH 86 &\EHU &RPPDQG 86& %(5&20 'XULQJ D FULVLV WKH ,& DVVHVVHV LQWHOOLJHQFH ZLWKLQ LWV VHYHQWHHQ DJHQFLHV DQG WKHQ IRUPXODWHV RYHUDOO LQWHOOLJHQFH UHFRPPHQGDWLRQV E\ WKH 2'1, ,Q -DPHV &ODSSHU WKH GLUHFWRU RI 1DWLRQDO ,QWHOOLJHQFH ZKR RYHUVHHV WKH ,& DQG LV UHVSRQVLEOH IRU WKH FRPSOH[ FRRUGLQDWLRQ EHWZHHQ DOO WKH DUPV RI WKH ,& UHOHDVHG D ULVN DVVHVVPHQW LQ ZKLFK F\EHU WKUHDWV WRS WKH OLVW RI JOREDO WKUHDWV 26 DKHDG RI SK\VLFDO WHUURULVP IRU WKH ¿UVW WLPH VLQFH WKH DWWDFNV RI 6HSWHPEHU OWKRXJK F\EHUDWWDFNV DJDLQVW WKH 8QLWHG 6WDWHV DUH constant and on the rise,27 &ODSSHU UHIHUUHG WR WKH SRVVLELOLW\ RI D ³F\EHU UPDJHGGRQ DND ³F\EHU 3HDUO DUERU RU ³F\EHU DV FXUUHQWO\ UHPRWH 5DWKHU WKDQ D ³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¿FDQW OHYHO RI H[SHUWLVH WR H[HFXWH LW LW GRHV QRW QHFHVVLWDWH VWDWH OHYHO ¿QDQFLDO DELOLWLHV RU ZRUOG FODVV RSHUDWLRQDO WDOHQW JLYHQ DFWRU ZKHWKHU D QDWLRQ VWDWH RU D QRQ VWDWH JURXS FDQ SXUFKDVH PDOZDUH VS\ZDUH ]HUR GD\V DQG RWKHU FDSDELOLWLHV RQ WKH EODFN PDUNHW DQG FDQ SD\ H[SHUWV WR VHDUFK IRU YXOQHUDELOLWLHV DQG GHYHORS H[SORLWV ,Q D JOREDO HQYLURQPHQW EULPPLQJ ZLWK DGYHUVDULHV DV ZHOO DV D ODFN RI LQWHUQDWLRQDO F\EHU ODZV DQG

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYclear regulations, these threats have created a dangerous and uncontrolledPDUNHW ZKLFK VHUYHV PXOWLSOH DFWRUV ZLWKLQ WKH LQWHUQDWLRQDO V\VWHP 30Despite the increase in F\EHU DFWLYLW\ E\ non state actors, top 86 intelligenceRI¿FLDOV still EHOLHYH that state actors are the greatest threat in F\EHUVSDFH to86 interests The ,& LGHQWL¿HV several potential actors who PD\ cause a F\EHUcrisis, including nation states with KLJKO\ sophisticated F\EHU SURJUDPV, suchas Russia or &KLQD 31 nations with lesser technical FDSDELOLWLHV, EXW SRVVLEO\PRUH disruptive intent, such as ,UDQ or 1RUWK Korea non state actors withDFFHVVLELOLW\ to VLJQL¿FDQW resources and PRWLYDWLRQ to create F\EHU chaos andSUR¿W PRWLYDWHG FULPLQDOV and LGHRORJLFDOO\ PRWLYDWHG hackers or H[WUHPLVWV The various SRVVLEOH targets include:D 7KH 3ULYDWH VHFWRU 7KLV VHFWRU LV LGHQWL¿HG QRW RQO\ DV D YLFWLP RI F\EHUDWWDFNV EXW DOVR DV D SDUWLFLSDQW LQ LQYHVWLJDWLRQV DQG DWWULEXWLRQ *LYHQ WKH LPSRUWDQFH RI ¿QDQFLDO LQVWLWXWLRQV H J *ROGPDQ 6DFKV WR WKH HFRQRP\ LQ WKHLU GHSHQGHQF\ RQ WHFKQRORJ\ WKLV VHFWRU LV DQ LPSRUWDQW ¿HOG WR GHIHQG LQ FDVH RI D VHULRXV DWWDFN 32E &ULWLFDO LQIUDVWUXFWXUH 7KH FULWLFDO LQIUDVWUXFWXUH²WKH SK\VLFDO DQG YLUWXDO DVVHWV V\VWHPV DQG QHWZRUNV YLWDO WR QDWLRQDO DQG HFRQRPLF VHFXULW\ KHDOWK DQG VDIHW\²LV YXOQHUDEOH WR F\EHUDWWDFNV E\ IRUHLJQ JRYHUQPHQWV FULPLQDO HQWLWLHV DQG ORQH DFWRUV ODUJH VFDOH DWWDFN FRXOG WHPSRUDULO\ KDOW WKH VXSSO\ RI ZDWHU HOHFWULFLW\ DQG JDV KLQGHU WUDQVSRUWDWLRQ DQG FRPPXQLFDWLRQV DQG FULSSOH ¿QDQFLDO LQVWLWXWLRQV 33F *RYHUQPHQW 3HQHWUDWLQJ WKH 86 QDWLRQDO GHFLVLRQ PDNLQJ DSSDUDWXV DQG ,QWHOOLJHQFH &RPPXQLW\ ZLOO UHPDLQ SULPDU\ REMHFWLYHV IRU IRUHLJQ LQWHOOLJHQFH HQWLWLHV GGLWLRQDOO\ WKH WDUJHWLQJ RI QDWLRQDO VHFXULW\ LQIRUPDWLRQ DQG SURSULHWDU\ LQIRUPDWLRQ IURP 86 UHVHDUFK LQVWLWXWLRQV GHDOLQJ ZLWK GHIHQVH HQHUJ\ ¿QDQFH GXDO XVH WHFKQRORJ\ DQG RWKHU DUHDV ZLOO EH D SHUVLVWHQW WKUHDW WR 86 LQWHUHVWV 34G 0LOLWDU\ DQG JRYHUQPHQW DJHQFLHV 7KHVH DUH WKH IURQW OLQH RI ERWK GHIHQVH DQG RIIHQVH DV LWV LQIUDVWUXFWXUH PXVW GHIHQG WKH HQWLUH QDWLRQ DV ZHOO DV LWV RZQ UHVRXUFHV LQ FDVH RI D IXOO VFDOH F\EHU FRQÀLFW ,& DVVXPHV WKDW LQ D F\EHU FULVLV WKLV ³FRQWDFW OLQH ZLOO EH DWWDFNHG DQG GDPDJHG The Intelligence Community Policies7KH ,& FRQGXFWV D YDULHW\ RI LQWHOOLJHQFH RSHUDWLRQV RQ D GDLO\ EDVLV 7KH 8QLWHG 6WDWHV LV XQGHU FRQVWDQW F\EHUDWWDFN IURP ERWK VWDWH DQG QRQ VWDWH Cyber, Intelligence, and Security Volume 1 No. 1 January 201739

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYCyber, Intelligence, and Security Volume 1 No. 1 January 201740DFWRUV 2Q WKH QDWLRQDO LQWHOOLJHQFH OHYHO EHLQJ XQGHU F\EHUDWWDFN PHDQV QRW RQO\ D GHIHQVLYH HIIRUW EXW DOVR GHVLJQLQJ YDULRXV RSHUDWLRQDO RSWLRQV IRU UHWDOLDWLRQ *LYHQ LWV VL]H WKH ,& LQWHUDFWV DQG FROODERUDWHV ZLWK DJHQFLHV RQ WKH RSHUDWLRQDO OHYHO PLOLWDU\ 'R' ' 6 DQG WKH VWDWH DQG IHGHUDO OHYHO SULYDWH VHFWRU RQ D ODUJH VFDOH 'HSDUWPHQW RI 6WDWH :KLWH RXVH 7KH ,&¶V VWUDWHJLF SUHSDUDWLRQ JRDOV35 include:D %XLOGLQJ DQG PDLQWDLQLQJ UHDG\ IRUFHV DQG FDSDELOLWLHV WR FRQGXFW F\EHUVSDFH RSHUDWLRQV E 'HIHQGLQJ LWV RZQ LQIRUPDWLRQ QHWZRUN VHFXULQJ GDWD DQG PLWLJDWLQJ ULVNV WR PLVVLRQV F 3UHSDULQJ WR GHIHQG 86 KRPHODQG DQG 86 YLWDO LQWHUHVWV DJDLQVW GLVUXSWLYH RU GHVWUXFWLYH F\EHUDWWDFNV RI VLJQL¿FDQW FRQVHTXHQFHG %XLOGLQJ DQG PDLQWDLQLQJ YLDEOH F\EHU RSWLRQV DQG SODQQLQJ WR XVH WKRVH RSWLRQV WR FRQWURO FRQÀLFW HVFDODWLRQ DQG WR DFWLYHO\ H[WUDFW LQIRUPDWLRQ WR SUHSDUH ³WDUJHW EDQNV H %XLOGLQJ DQG PDLQWDLQLQJ UREXVW LQWHUQDWLRQDO DOOLDQFHV DQG SDUWQHUVKLSV WR GHWHU VKDUHG WKUHDWV DQG LQFUHDVH LQWHUQDWLRQDO VHFXULW\ DQG VWDELOLW\ D E F G ,&¶V SROLF\ RI F\EHUDWWDFN UHVSRQVH LV DV IROORZV,GHQWLI\LQJ DWWDFNV V SDUW RI WKH PRGHUQ F\EHU EDWWOH¿HOG VRSKLVWLFDWHG DWWDFNHUV ZLOO DWWHPSW WR FRQFHDO WKH DWWDFN -XVW DV LQ D FRQYHQWLRQDO FRQÀLFW LQWHOOLJHQFH LV QHHGHG WR SUHSDUH WKH EDWWOH JURXQG DQG DFFXUDWHO\ DVVHVV WKH SUREDELOLW\ RI VXFFHVV DQG XWLOLW\ IRU DQ\ NLQG RI RSHUDWLRQ ,QIRUPLQJ OWKRXJK WKH ,& KDV VLJQL¿FDQW RIIHQVLYH DELOLWLHV LWV PDLQ UROH LV WR DVVHVV LQIRUP DQG UHSRUW 7KH ,& PXVW LQIRUP WKH RSHUDWLRQDO DUPV LW FROODERUDWHV ZLWK DQG WKH 6WDWH 'HSDUWPHQW 7KDW LV XQGHU DWWDFN WKH ,&¶V VXFFHVV LV PHDVXUHG E\ WKH SUHFDXWLRQV LW JDYH SULRU WR WKH DWWDFN DQG E\ LWV UHVSRQVLYHQHVV FRPPXQLFDWLRQ DQG JXLGDQFH GXULQJ WKH DWWDFN 3URYLGLQJ options: The ,& PXVW provide a set RI options to decision PDNHUVand HQDEOH strategic ÀH[LELOLW\ E\ providing YDOXDEOH LQIRUPDWLRQ The ,&DGPLQLVWHUV guidance during attack and provides strategic operational andpolitical OHHZD\ with its UHFRPPHQGDWLRQV and intelligence DVVHVVPHQW 'DPDJH VVHVVPHQW: 8QOLNH the conventional EDWWOH¿HOG, a F\EHUDWWDFNPD\ EH hard to detect at WLPHV, even LI it is a large scale attack The ,&PXVW assess the GDPDJH caused so that it can provide SROLF\PDNHUV withthe DELOLW\ to retaliate in a PHDVXUDEOH PDQQHU This does not QHFHVVDULO\require operational HIIRUWV during an attack, EXW rather DVVHVVPHQW,

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYcoordination, and LQIRUPDWLRQ sharing with other RI¿FHV so that there isan HI¿FLHQW ÀRZ RI LQIRUPDWLRQ Multidimensional Cyber Response7KH ,&¶V UROH RYHUODSV LQ PDQ\ ZD\V ZLWK GLIIHUHQW LQVWLWXWLRQV JRYHUQPHQWDO GHSDUWPHQWV DQG PLOLWDU\ XQLWV PDQ\ RI ZKLFK LV RXW RI LWV MXULVGLFWLRQ :KLOH LW GRHV QRW VLQJXODUO\ KDYH UHVSRQVLELOLW\ IRU F\EHU UHVSRQVH DW WKH QDWLRQDO RU VWDWH OHYHO WKH ,& GHPDQGV D FRPSOH[ FKDLQ RI LQIRUPDWLRQ ÀRZ DQG KLHUDUFK\ 2WKHU LQVWLWXWLRQV WKDW SURYLGH F\EHU UHVSRQVHV DUHD 'HSDUWPHQW RI RPHODQG 6HFXULW\ V SDUW RI LWV UROH WR SURWHFW WKH 8QLWHG 6WDWHV¶ WHUULWRULHV DQG UHVSRQG WR WHUURULVW DWWDFNV PDQ PDGH DFFLGHQWV DQG QDWXUDO GLVDVWHUV WKH ' 6 LV LQ FKDUJH RI &RDVW *XDUG ,QWHOOLJHQFH &*, DQG WKH 2I¿FH RI ,QWHOOLJHQFH DQG QDO\VLV , 7KH ODWWHU LV UHVSRQVLEOH IRU PDQDJLQJ WKH FROOHFWLRQ DQDO\VLV DQG IXVLRQ RI LQWHOOLJHQFH 7KH 2I¿FH RI , GLVVHPLQDWHV LQWHOOLJHQFH WKURXJKRXW WKH ' 6 DQG WR WKH RWKHU PHPEHUV RI WKH ,& FRPPXQLW\ DQG LV WKH ¿UVW UHVSRQGHU DW WKH VWDWH ORFDO DQG WULEDO OHYHOV 37 7KH 2'1, LV UHVSRQVLEOH IRU DQ HI¿FLHQW LQIRUPDWLRQ ÀRZ EHWZHHQ WKH UHVW RI WKH LQWHOOLJHQFH FRPPXQLW\ DQG WKH ' 6 LQ RUGHU WR FUHDWH V\QHUJ\ RI LQIRUPDWLRQ GXULQJ D F\EHUDWWDFN E 'HSDUWPHQW RI 'HIHQVH 'R' &RQVLGHUHG WKH IRFDO SRLQW IRU WKH LQWHOOLJHQFH FRPPXQLW\¶V RSHUDWLRQDO VRXUFH DQG OHDGLQJ QLQH RI LWV DJHQFLHV LQFOXGLQJ WKH 16 WKH 'R' LV WKH 2'1,¶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ÀLFWV LW LV VDIH WR DVVXPH WKDW GHFLVLRQ PDNHUV RIWHQ GR QRW NQRZ ZKDW KDV KDSSHQHG DQG GR QRW NQRZ WKH RULJLQ RI DQ DWWDFN LQ D F\EHU FULVLV VFHQDULR ,W LV XS WR WKH ,& WR SURYLGH DQ LQWHOOLJHQFH DVVHVVPHQW LQ D WLPHO\ PDQQHU DQG WR SDVV RQ WKH GDWD 6PDOO FHQWHUV WKDW DUH WUXVWHG WR HYDOXDWH DQG FRRUGLQDWH VHUYH DV OLDLVRQV EHWZHHQ VWDWH LQVWLWXWLRQV DQG WKH F\EHU LQWHOOLJHQFH ¿HOG VXFK DV WKH 1DWLRQDO &\EHUVHFXULW\ DQG &RPPXQLFDWLRQV ,QWHJUDWLRQ &HQWHU Cyber, Intelligence, and Security Volume 1 No. 1 January 201741

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYCyber, Intelligence, and Security Volume 1 No. 1 January 2017421&&,& WKH 8QLWHG 6WDWHV &RPSXWHU (PHUJHQF\ 5HDGLQHVV 7HDP 86 &(57 DQG WKH &\EHU 7KUHDW ,QWHOOLJHQFH ,QWHJUDWLRQ &HQWHU &7,,& 6WDWLRQHG LQ WKH 2I¿FH RI WKH 'LUHFWRU RI 1DWLRQDO ,QWHOOLJHQFH WKH ODWWHU ZLOO PLUURU WKH HIIRUWV DQG DVVHVVPHQWV IRU FRXQWHUWHUURULVP LQIRUPDWLRQ VKDULQJ GXULQJ F\EHUDWWDFNV G 3ULYDWH 6HFWRU ,QIUDVWUXFWXUH F\EHU EUHDFKHV DQG DWWDFNV KDYH EHHQ GH¿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onclusions7KH KLVWRU\ RI F\EHU ZDUIDUH SRVHV PDQ\ OHVVRQV DQG PD\ LQGLFDWH WKH SURJUHVVLRQ DQG GLUHFWLRQ RI WKH F\EHUVSKHUH DV ZHOO DV WKH FRPSUHKHQVLYH DWWHQWLRQ UHTXLUHG E\ WKH ¿HOG DW DOO OHYHOV &\EHU ZDUIDUH¶V QDWXUDO HYROXWLRQ LV DQ LPSRUWDQW WRRO WR DVVHVV PLVWDNHV DQG SURMHFW WKH IXWXUH RI WKH LQIRVSKHUH SULYDF\ UHJXODWLRQV F\EHU HVSLRQDJH DQG F\EHUVHFXULW\ QHHGV 3ROLF\PDNHUV DUH DGGUHVVLQJ WKH F\EHUVSKHUH WRGD\ PRUH VHULRXVO\ WKDQ HYHU EHIRUH DQG LQVWLWXWLRQV DW DOO OHYHOV DUH GLUHFWLQJ VXEVWDQWLDO UHVRXUFHV WR DGGUHVV F\EHU WKUHDWV ,QWHOOLJHQFH DJHQFLHV FRQVWDQWO\ DUH SHUIHFWLQJ WKHLU GHIHQVLYH DQG RIIHQVLYH F\EHU FDSDELOLWLHV 3ULYDWH LQVWLWXWLRQV HVSHFLDOO\ LQ WKH ¿HOGV RI PHGLFLQH ¿QDQFH FULWLFDO LQIUDVWUXFWXUH DQG HQHUJ\ LQ DGGLWLRQ WR GDWD GULYHQ FRUSRUDWLRQV DOORFDWH PRUH UHVRXUFHV DQG KXPDQ SRZHU WR GDWD SURWHFWLRQ DQG F\EHUVHFXULW\ WKDQ HYHU EHIRUH /DVWO\ WKH PHULFDQ JRYHUQPHQW LV DZDUH RI WKH ULVNV WR LWV RZQ QHWZRUNV DQG ZKLOH EUHDFKHV DUH PRUH FRPPRQ WKDQ HYHU LQYHVWPHQWV WR QXUWXUH D PRUH GHIHQVLEOH F\EHU VSDFH DUH DW DQ DOO WLPH SHDN 7KHUH DUH VHYHUDO IXQGDPHQWDO SROLF\ UHDOL]DWLRQV DW WKH LQWHUQDWLRQDO OHYHO 0RVW SROLF\PDNHUV DQG OHJLVODWRUV GR QRW KDYH D FRPSUHKHQVLYH FDSDFLW\ WR DGGUHVV LQWHUQDWLRQDO F\EHUDWWDFNV )RU H[DPSOH WKHUH LV QRW DQ DOO LQFOXVLYH GH¿QLWLRQ IRU ³DFWV RI ZDU LQ WKH QRQ NLQHWLF VSKHUH DQG WKH H[LVWLQJ GH¿QLWLRQV DUH XQFOHDU DQG QRW VKDUHG DQG DJUHHG XSRQ DW WKH LQWHUQDWLRQDO

OMRY HAIZLER THE UNITED STATES’ CYBER WARFARE HISTORYOHYHO 0RUHRYHU UHWDOLDWLRQ PHFKDQLVPV IRU D ¿QDQFLDO F\EHU FULVLV DUH QRW LQ SODFH SUHYHQWLQJ QDWLRQ VWDWHV IURP DWWULEXWLQJ ODUJH VFDOH DWWDFNV WR VSHFL¿F DWWDFNHUV DQG DOORZLQJ RWKHU DFWRUV WR DYRLG DFFRXQWDELOLW\ ,QWHUQDWLRQDO FROODERUDWLRQ DW DOO OHYHOV HVSHFLDOO\ LQ WKH ¿QDQFLDO GLSORPDWLF DQG WKH MXGLFLDU\ IURQWV DUH LQ QHHG DV D ODFN RI FR

United States intelligence community, cyber crisis, cyber threats, internet governance, cyber policy, cyber strategy Omry Haizler is a former IDF Officer and a Prime Minister's Office operative. He holds an MPA from Columbia University's School of International and Public Affairs (SIPA).