- The Strategist - https://aspistrategist.ru -
Understanding the cyber threat: defence, response, democracy
Posted By Alexander Vipond on February 6, 2017 @ 12:30
As Russia’s campaign to influence the US election falls out of the news cycle, it’s important to maintain a focus on the key lessons from the Democratic National Committee hack in order to understand what could’ve prevented it. The main takeaway is that any actor with enough resources and determination can compromise almost any system using an extraordinary range of tools (see here [1], here [2] and here [3]). The other is a fundamental change of thinking: total security is currently impossible to obtain and that there’s always a risk of your system being penetrated. With operations and data breaches increasingly being used to embarrass [4], extort [5] and influence, [6] there are several ways to better understand and manage the risk.
Nefarious actors waging information operations come from diverse backgrounds and have different agendas, from foreign governments and private enterprise to NGOs and lone actors. And sometimes they’ll “work” together, like [7] when Russian military and domestic intelligence allegedly [7] used a fake lone actor (Guccifer 2.0) to leak stolen government information to a real NGO (WikiLeaks). Hacker Andres Sepulveda and his team sold their services [8] through private enterprises to political parties across Latin America seeking to infiltrate rivals and manipulate elections. Such examples highlight the complexity of information operations. To establish credibility or plausible deniability, the real mastermind may hide under many layers of intermediaries.
For those engaged in information warfare, the theft of data is one thing, but it’s getting the information out that’s key [9]. For such operations to work effectively [10] an adversary needs broad dissemination, acceptance of legitimacy and internalisation by the target audience. This was two-fold in the case of Russia’s influence campaign. First the perpetrators had to gain enough credibility to be picked up by mainstream US media, which was why WikiLeaks was used to get the word out. (A previous dissemination point, a website called DC Leaks [11], was set up in April but failed to gain traction.) WikiLeaks had the profile and produced the veneer of legitimacy needed for mainstream media sites to disseminate to the second audience, the US electorate. Internalisation—when your message or content is voluntarily used by actors within your target audience—occurred [12] when Donald Trump used the leaked material during the second presidential debate to threaten Hillary Clinton with jail. The execution of this information loop helped Russia’s preferred candidate get elected. The operation was a success.
If the majority of media resources and effort go to covering the breach and the scoops found in the leaked data, then the adversary has “won” because they’ve reshaped the narrative. Government responses are then formed in reaction to the adversary’s information, allowing them to set the parameters of the game. Instead of investigating the source, the FBI chose to investigate the leaked information. It was only a month after the election that the White House ordered a separate investigation [13], which revealed the source as Russian intelligence.
When faced with information warfare on the scale of the DNC hack [14], focusing on the cause of the breach rather than the dissemination and exploitation of the stolen data is self-defeating. Inviting [15] the foreign intelligence service to hack your country again is also counterproductive because it further legitimises the opponent and their narrative.
So, what to do? In terms of passive defence, network compartmentalisation [16] and resiliency-building [17] can reduce the amount and quality of data available, so decreasing the value of penetration. Building in network redundancy can also assist by keeping vital parts of the network away from attackers and reducing the time a network is down. Low-tech offset strategies, like using typewriters [18] for sensitive communications, can also reduce exposure.
The other side is active defence. Having well-trained and well-resourced computer emergency response teams is crucial. The quicker they can detect, mitigate and neutralise the hack the less damage it can do in both the cyber and public relations realms. Forensic analysis of intrusions is also crucial in tracing the culprit, who can then be named and shamed to discredit their narrative.
These efforts are symbiotically attached to the need for much stronger strategic communications. Establishing a coherent, unified platform is crucial to reveal and defeat that narrative. Cyber units and the affected organisation must coordinate and deliver a unified message. The confusion [19] around the Australian Census DDoS [20] attack is an example of where this could have been applied. Attempts should also be made to create nuanced policies to deal with fake news, with several approaches being tried by countries [21] and companies [22] alike.
Discrediting or denying the adversary legitimacy is crucial to minimising the significance of an attack. Part of that relies on seeing the bigger picture and calling out intrusions for what they are. A breach represents a cyber-attack, but if the end goal of that attack is to destabilise an election or compromise an individual, it’s imperative that the scope of the attack be acknowledged transparently. This helps orientate discourse around the true intent of the malevolent actor. If their information can’t build traction, it’ll quickly be left behind as the news cycle moves on.
Focusing strategic efforts at the dissemination-end of information operations reduces the overall appeal of mounting an attack. A concerted response can form an implied deterrent which doesn’t risk escalation or miscalculation [23]. If actors can’t produce the range or scale of effects they seek, their attacks are rendered impotent. With elections in France and Germany imminent it’s crucial we learn from attacks like this to tighten cyber security and protect democratic processes.
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /understanding-cyber-threat-defence-response-democracy/
URLs in this post:
[1] here: https://www.wired.com/2016/06/clever-attack-uses-sound-computers-fan-steal-data/
[2] here: https://www.hackread.com/how-to-steal-data-and-information-from-computers-via-heat/
[3] here: http://www.computerweekly.com/news/4500272941/Social-engineering-is-top-hacking-method-survey-shows
[4] embarrass: https://www.ft.com/content/effd1712-f6af-11e1-827f-00144feabdc0
[5] extort: https://www.wired.com/2016/03/ransomware-why-hospitals-are-the-perfect-targets/%20information
[6] influence,: http://www.latimes.com/world/la-fg-us-russia-cyber-20161031-story.html
[7] like: https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
[8] sold their services: https://www.bloomberg.com/features/2016-how-to-hack-an-election/
[9] that’s key: https://www.cia.gov/kids-page/6-12th-grade/who-we-are-what-we-do/the-intelligence-cycle.html
[10] work effectively: https://medium.com/@thegrugq/security-cyber-and-elections-part-3-9398f639aa28#.8xq3yccfu
[11] a website called DC Leaks: http://www.esquire.com/news-politics/a49791/russian-dnc-emails-hacked/
[12] occurred: https://www.theguardian.com/us-news/2016/oct/10/debate-donald-trump-threatens-to-jail-hillary-clinton
[13] a separate investigation: https://www.theatlantic.com/technology/archive/2016/12/obama-orders-full-review-of-election-related-hacking/510149/
[14] DNC hack: https://www.bloomberg.com/news/articles/2016-10-25/how-experts-traced-the-dnc-hack-to-russian-spies
[15] Inviting: https://www.theguardian.com/us-news/2016/jul/27/donald-trump-russia-hillary-clinton-emails-dnc-hack
[16] compartmentalisation: https://www.google.com.au/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&cad=rja&uact=8&ved=0ahUKEwjmrZOKh-7RAhVBTJQKHa_9CMUQFggyMAQ&url=https%3A%2F%2Fcrypto.stanford.edu%2Fcs155%2Flectures%2F05-secure-architecture.pdf&usg=AFQjCNF9ISZFZY8dlxPUIovfVW06tYE5ow
[17] resiliency-building: http://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf
[18] typewriters: http://www.spiegel.de/international/world/russian-intelligence-seeks-typewriters-for-secret-documents-a-910677.html
[19] confusion: http://www.abc.net.au/news/2016-08-10/abs-website-not-attacked-or-hacked:-mccormack/7713002
[20] DDoS: https://www.youtube.com/watch?v=OhA9PAfkJ10
[21] countries: http://qz.com/865964/facebook-fb-could-face-e500000-fines-for-each-fake-news-post-in-germany/
[22] companies: https://www.wired.com/2016/12/fake-news-will-go-away-tech-behind-ads-wont-pay/?mbid=social_twitter
[23] which doesn’t risk escalation or miscalculation: https://www.google.com.au/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwiK4ZjZqdLQAhVIw7wKHUsFBwQQFggcMAA&url=https%3A%2F%2Fwww.aspistrategist.ru%2Fpublications%2Fdeterrence-in-cyberspace-different-domain%2C-different-rules%2FSR92_deterrence_cyberspace.pdf&usg=AFQjCNE6pEp_RpEmu3xLu73NCwmTOV9mlw
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.