ISCS 570 Case Study 4
Description
CNBC – Cyber Espionage: The Chinese ThreatLinks to an external site.
Bloomberg Article: (this article is very long, scanning it to get an idea of what it is about is probably sufficient – but it is a great read if you have time to digest it completely)
Supply Chain Computer Hardware Attack.pdf Download Supply Chain Computer Hardware Attack.pdf
CASE
Cyberespionage is very different from cyberwarfare. The objective in cyberespionage is to, without detection, gain access to computer systems that contain valuable commercial and/or military information; to remain in place for continuous data gathering; and to remove data from the target system. The point is not to destroy enemy systems, but instead to colocate inside them and continuously drain information. This is similar to the goals of the British intelligence agency MI6 during World War II, when they broke the military codes of the Germans quite early in the war. MI6 spent a great deal of effort to ensure the Germans never discovered their communications were being closely monitored and intercepted for over four years. In contrast, the objective of cyberwarfare is to destroy and disrupt enemy capabilities. When cyberwarfare succeeds, the very fact of succeeding permits the enemy to become aware of the intrusion and take steps to defend itself.
In a report on foreign economic espionage in cyberspace by the National Counterintelligence and Security Center (NCSC), national security officials concluded that foreign collectors of sensitive economic information are able to operate in cyberspace with relatively little risk of detection by their private sector targets. The proliferation of malicious software, prevalence of cybertool sharing, use of hackers as proxies, and routing of operations through third countries make it difficult to attribute responsibility for computer network intrusions. Cybertools have enhanced the economic espionage threat, and the Intelligence Community (IC) judges the use of such tools is already a larger threat than more traditional espionage methods.
The threat comes from adversaries as well as partners. Allegedly, according to American and European media and governments, Chinese actors are the worldàmost active and persistent perpetrators of economic espionage. U.S. private sector firms and cybersecurity specialists have reported an onslaught of computer network intrusions that have originated in China, but the intelligence community cannot definitively confirm who is responsible because of the possibility that the attacks originate elsewhere but use compromised Chinese computers to implement the attacks. Russiaàintelligence services come in second place. They are also conducting a range of activities to collect economic information and technology from U.S. targets. In addition, some U.S. allies and partners use their broad access to U.S. institutions to acquire sensitive U.S. economic and technology information, primarily through aggressive elicitation and other human intelligence (HUMINT) tactics.
In Europe, both France and the U.S. military are accused of leading the largest cyberespionage operations against European countries, even larger than China or Russia. According to leaked U.S. diplomatic cables (WikiLeaks) from the U.S. embassy in Berlin, ²ench espionage is so widespread that the damages it causes the German economy are larger as a whole than those caused by China or Russia. erry Smutny, the head of German satellite company OHB Technology, is quoted in the diplomatic note as saying: ²ance is the Empire of Evil in terms of technology theft, and Germany knows it. he United States is also the object of commercial and military espionage originating from its major Middle Eastern ally, Israel. U.S. national security officials consider Israel to be, at times, a frustrating ally and a genuine counterintelligence threat.
Reviewing all the various reports and allegations, from the United States, to Europe, and China, it appears that all nation states, and their commercial affiliates, engage in a variety of activities that be could called espionage, or intelligence gathering. In some cases these activities are illegal, or skirt the laws of both the target and the initiating states. The size of these cyberespionage activities reflects both the economic strength of the nations involved (advanced countries like the United States and European
countries arguably have the largest and most sophisticated programs), and the demand in developing countries for stolen intellectual property.
It is also difficult to estimate the economic cost of these thefts to the U.S. economy. In a report to Congress from the Office of National Counterintelligence, intelligence experts concluded that the economic cost was in excess of $600 billion annually.
The potential impact of cyberespionage is illustrated in the following examples.
Google Attack: Commercial Espionage and Punishment
Google announced in 2010 that it had been the target of a highly sophisticated Chinese cyberattack. At least 34 other companies, including Yahoo, Symantec, Adobe, Northrop Grumman, and Dow Chemical, were attacked at the same time. According to the experts, the attacks at defense contractors were aimed at obtaining information on weapons systems, while those on technology companies sought out valuable source code that powers these companies3oftware applications. At Google, the attackers also gained access to the Gmail accounts of Chinese human rights advocates in the United States, Europe, and China.
Experts say that the attacks followed the familiar (ishing4echnique. A recipient opens a message that purports to be from someone he knows and, not suspecting malicious intent, opens an attachment containing a malicious program that embeds in his computer. That program then paves the way for downloading and concealing additional programs that allow the attacker to gain total control over the recipientàcomputer.
Subsequent investigation determined that the Google break-in started with an instant message sent to a Google employee in China who was using MicrosoftàMessenger program. By clicking on a link within this instant message, the employee inadvertently downloaded malware that allowed the attackers to gain access to the employeeàcomputer and then, through that computer, access to the computers of a critical group of software developers at Google headquarters.
Joint Strike Fighter
The Joint Strike Fighter, also known as the F-35 Lightning II, is reportedly the costliest and most technically challenging weapons program the DoD has ever attempted. Intruders apparently entered this program repeatedly during the 2007°09 period through vulnerabilities in the networks of contractors working on the program. These include Lockheed Martin, Northrop Grumman, and BAE Systems. One example of the sophistication of these attacks is that the intruders inserted technology that encrypts the data as it is being stolen. As a result, investigators cannot determine exactly what data has been taken. The source of the attacks was traced back to China.
GhostNet
Information Warfare Monitor, a Canadian research organization, conducted a detailed investigation of Chinese cyberespionage against the Tibetan community and Tibetan Government-in-Exile during 2008 to 2009. It identified an extensive network of cyberpenetration of Tibetan targets that it called GhostNet. This is relevant here not just because of the successful penetration of Tibetan targets, but for what was learned about successful penetration of other targets during a second phase of this investigation.
This investigation led to the discovery of four commercial Internet access accounts located in Hainan, China, that received data from, and sent instructions to at least 1,295 infected computers in 103 different countries. Almost 30 percent of the infected computers were what might be considered high-value intelligence targets. This included the ministries of foreign affairs of Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados, and Bhutan; embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, Portugal, Germany, and Pakistan; the ASEAN (Association of Southeast Asian Nations) Secretariat, SAARC (South Asian Association for Regional Cooperation), and the Asian Development Bank; news organizations; and an unclassified computer located at NATO headquarters.
The GhostNet system allowed the attackers to gain complete, real-time control over the infected computers. This includes searching and downloading specific files and covertly operating any attached devices, including microphones and web cameras. It is not known whether all of the infected computers were actually being exploited by the attackers. It is possible that some of the infected computers were infected coincidentally through emails received from an infected computer.
References
(e Cost of Malicious Cyber Activity to the U.S. Economy, ouncil of Economic Advisors, March 5, 2018.
°18 Foreign Economic Espionage in Cyberspace, he NationalCounterintelligence and Security Center, July 26, 2018.
¯reign Economic Espionage in Cyberspace, he National Counterintelligence and Security Center, 2018.
¯reign Spies Stealing US Economics Secrets in Cyberspace, ffice of the National Counterintelligence Executive, Washington D.C., November 3, 2011.
Questions:
1. Identify and describe at least 2 steps manufacturers can take to prevent the type of supply chain attacks outlined in the Bloomberg article.
2. Encryption of data is a double-edged sword. Data owners use it to protect their assets from unauthorized viewing. Data theives use it to hide what they’re exfiltrating (like in the Joint Strike Fighter example). Criminal gangs use encryption as the core component of the ransomware attacks that are currently so pervasive in our information systems domain. Given what you know about counterintelligence and good/bad uses of encryption, should companies be encrypting their data? Support your position.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."