Click here to find out more!
http://www.csoonline.com/http://www.csoonline.com/magazinenewsletterscareerfeaturesresourcessearch

June 2003 CSO Magazine







Access, Unlimited
If your company's name badges merely get employees through the front door, you're out of date.

Read More

 
Information Warfare:What Is It Good For?
In this case, the best offense is a good defense     BY SIMSON GARFINKEL


THE SKY HASN'T FALLEN yet, but it soon may. At least that's been the message repeated for more than a decade by computer security professionals, military planners and multiple blue-ribbon commissions. All have warned of an impending "Digital Pearl Harbor" in which U.S. computers will be hit hard by foreign governments or terrorists employing a variety of electronic attacks. The result, we're told, will be damage to critical infrastructures, massive economic loss and perhaps worse.

Let's face it: Cyberattacks are easy. In August 2000, an employee at an Internet news service published a fake press release for Emulex and caused the company's market capitalization to drop by $2.5 billion. SQL Slammer used a vulnerability that had been known about for months, causing significant damage, and it could have wiped the hard drive of every infected system—if only its author had been more vindictive.

Since the early 1990s, it's been clear that an organized attack over the Internet or other data networks could seriously disrupt not just civilian but military targets as well, thanks to increased interconnections. In the 1980s, a group of West German hackers broke into more than 40 sensitive computer systems at the departments of Defense and Energy, and NASA. During the first Gulf War, hackers from the Netherlands broke into 34 DoD systems—including the computers that abort ships in the theater of operations. In 1995, an Argentinean hacker broke into DoD, NASA and Los Alamos National Labs systems that contain information on aircraft design, radar technology and satellite control systems. In February 1998, two teenagers from California, tutored in the art of hacking by an 18-year-old Israeli, broke into other DoD systems. In each of these cases, had the hackers been suitably motivated, they could have caused substantial damage to U.S. national security.

Given all that, why didn't the Iraqi military start attacking us in cyberspace when we started bombing their country? At the very least, why didn't Iraqi sympathizers and angry youths walk in from the Arab Street and start pounding us from their keyboards? When I called my friends in Washington and asked them that question, their answer was simple: The nation's digital security has gotten a lot better in the past two years.

Lines of communication that did not exist even two years ago have opened between law enforcement, the military, commercial providers and businesses. Administrators and software providers have become far more aggressive about deploying security technology like virus scanners and applying security patches. As a result, those running the national information infrastructure are now in a much better position to deal with current attacks. Yes, we're still vulnerable to worms and viruses, but those attacks are less likely to jeopardize lives. The Hoover Dam is secure.

And yes, some teenage hacker with a few hundred "zombies" on the Internet can use those assets to launch a distributed denial-of-service attack against a website. With just a few mouse clicks, the teenager might cause 6Gbps of traffic to bear down on some hapless victim. But aggressive monitoring now picks up these attacks shortly after they start. Once identified, it takes only a few phone calls to update a router configuration and neutralize the onslaught.

During the war in Iraq we experienced an upsurge in low-level denial-of-service attacks against websites, but for the most part these attacks appear to have been the work of relatively unsophisticated and underfunded sympathizers.

Iraq of the 1990s simply wasn't a good place for aspiring information warriors to develop their skills. What's more, those individuals with highly marketable computer skills were more likely to leave the country than to serve the regime. Countries such as China, England, France and Russia all have info-war capabilities; Iraq didn't.

Ironically, probably the most successful cyberspace attack of the 2003 Gulf War appears to have been a U.S.-originated attack against the English language version of the Al Jazeera website; whether it was an official attack of the U.S. military or the act of homegrown hackers sympathetic to the U.S. position remains unclear.


Lessons from the Front
To understand what all this means for CSOs, it's helpful to look closer at the U.S. military's own thinking, planning and response.

Within the U.S. military, the phrase "information warfare" really covers a broad spectrum: blowing up bridges that contain fiber-optic cables, dropping leaflets urging troops not to use weapons of mass destruction or using intelligence to aim 2,000-pound bombs on "leadership targets." For the military, "information warfare" really means using information to multiply the effectiveness of traditional war-fighting capability. It includes the millions of e-mails and text messages sent to Iraqi commanders. It also includes the practice of deception against the enemy and the use (or manipulation) of the news media. The decision to embed journalists with its forward troops, for example, was a marvelously successful part of the U.S. military's information warfare strategy.

When computer geeks think of information warfare, their minds turn to hacking and cracking: shutting down communications networks by penetrating their routers and wiping out configuration files; planting viruses inside enemy e-mail systems; grounding enemy aircraft by diverting fuel trucks to the wrong bases. Most military planners classify these operations as cyberwar.

It's hard to write knowledgeably about our government's offensive information warfare capability; the capability is largely classified. But sources tell me that much more money is spent on defensive measures than offensive ones. That's because every military installation is responsible for defending its own computers. But because cyberwar is so new, relatively untested and specialized, a decision to launch a cyberweapon could be made only at the military's highest levels. If a commander in the field wanted to shut down an enemy e-mail server, it would be far easier to simply bomb a building than go through channels to do something digital. Top brass would likely feel the same way: Our military officials understand the political fallout of accidentally bombing the wrong building; they don't know what would happen if they released a computer worm that "accidentally" shut down the Internet for a few days.

The U.S. military actually has a huge incentive to have politicians group cyberweapons in the same category as poison gas and germs—that is, weapons that are simply too terrible to use. That's because cyberweapons are cheap: If their use against the enemy is legitimized, then their use against our own civilian infrastructure is potentially legitimized as well. That's why if we are attacked with cyberweapons, our military is probably more likely to respond with conventional weapons.

Surprisingly, CSOs are faced with this same calculus when their systems are attacked in cyberspace. If a hostile customer shows up at your office with a gun and starts shooting, it's entirely appropriate for an armed security guard to respond with deadly force—in fact, the courts would see this as an exercise in self-defense. But if that same hostile customer were to launch a cyberspace attack against your servers, it would be utterly inappropriate to respond by hacking that customer's desktop computer or DSL modem. A more reasonable approach would be to report the attack to law enforcement or sue the customer in the civil courts.

That is a decision you might need to make some day. Like the military, many businesses are essentially developing an offensive cyberwar capability as part of their effort to defend themselves. If you have an antivirus system, then you have a collection of intercepted viruses that you could easily e-mail to your attacker. Many of today's network scanners will happily launch destructive scans at the click of a button. In order to effectively audit their systems, most security administrators have learned how to hack.

What's more, businesses are increasingly finding themselves in situations where "hacking back" seems like the only reasonable alternative. Law enforcement won't care that your organization has been attacked unless you have significant monetary damage. Meanwhile, you may not be able to file a lawsuit unless you can identify the perpetrator, which may be difficult if the attack originates from a server in China. Wouldn't it be much easier, cheaper and faster to type a few commands and shut down the enemy system?

Perhaps, but any organization that takes the law in its own hands by hacking back has far more to lose than its attacker. Hacking is illegal; breaking the law opens the organization up to legal liability and criminal prosecution. It's safer to simply add a few rules to your firewall and hope that the attacker will go elsewhere. And with any luck, the sky won't fall after all.end


Simson Garfinkel, CISSP, is a technology writer based in the Boston area. He is also CTO of Sandstorm Enterprises, an information warfare software company. He can be reached at machineshop@cxo.com.





Add a Comment:

Name:
Title:
Corp:
Email:
Subject *
Your Comment: *

* Required fields.
Selected comments may be published in CSO magazine.
We will neither sell nor display your personal information.










advertiser
CSOonline.com

   2002-2003 CXO Media Inc.                             Privacy Policy

June 2003