Articles

Cyber Triggers and The First Strike Dilemma

 October is Cyber Security Month.

“I think at the moment that there’s not a significant price to pay [for cyber attacks] and so you see actors, nation states, individuals willing to do more.” 1  Admiral Michael Rogers, Director, National Security Agency, Commander, U.S. Cyber Command 

“Until we redefine warfare in the age of information, we will continue to be viciously and dangerously attacked with no consequences for those attackers.”2 Lieutenant General (Retired) Michael Flynn, Former Director, Defense Intelligence Agency

 NATO Secretary-General Jens Stoltenberg, during a March 2015 public statement, declared: “NATO has made clear that cyber attacks can potentially trigger an Article 5 [allied military] response.”  The Secretary-General was reportedly reacting to recent Russian “hybrid” activities (cyber attacks perpetrated prior to and in conjunction with conventional military operations) in Crimea and Ukraine3, but the implications of his statement are much broader. Is it possible that an adversarial cyber event could trigger the onset of a larger cyber and/or kinetic conflict? If so, what would it look like? Can such an event be identified in time for effective response? If not, is it possible that a “missed” cyber trigger in the form of a surprise cyber first strike could ultimately influence the fate of nations?

The potential for devastating cyber attacks against the United States has been the number one global threat listed within the 2013,4 2014,5 and 20156 Worldwide Threat Assessments provided annually to Congress by the Director of National Intelligence (DNI).  The DNI’s 2013 assessment followed a year of warnings, provided at unclassified venues by cabinet-level officials.

Former U.S. Secretary of Defense (SECDEF) Leon Panetta, during an interview with ABC News in May of 2012, identified examples of cyber attacks that could trigger a war. “There’s no question,” he stated, “that if a cyber attack . . . crippled our power grid in this country, took down our financial systems, took down our government systems, that that would constitute an act of war.”7  In a speech delivered to the Business Executives for National Security later the same year, SECDEF admitted: “We know that foreign cyber actors are probing America’s critical infrastructure networks. They are targeting the computer control systems that operate chemical, electricity and water plants, and those that guide transportation throughout the country. We know of specific instances where intruders have successfully gained access to these control systems.”8

Former Secretary of Homeland Security Janet Napolitano, in a January 2013 speech at the Wilson Center (Washington DC), warned of a “cyber 9/11” against critical infrastructure for which we should be preparing.  “There are things we can and should be doing right now that, if not prevent, would mitigate the extent of damage,” she said while noting the potential for a large-scale loss of electricity.9  A few days later, during a PBS interview, she admitted that “cyber threats [have] moved to a new level,” identifying Iran, Russia and China as the biggest perpetrators of cyber attacks. She specifically mentioned her concerns associated with “the nation’s core critical infrastructure” – energy, telecommunications, and banking.10

It is thus evident that a cyber trigger or first strike from an adversarial perspective, is expected to be an attack on critical infrastructure. The question, however, remains – how big and how effective does such an attack have to be to trigger a response?

The Department of Homeland Security’s (DHS) Industrial Control System-Cyber Emergency Response Team (ICS-CERT), within their end-of-year (2012) statistical review, stated that 41% of the year’s reported cyber attacks were aimed at the energy sector. Indications derived from the study pointed to a change in adversarial focus to the more vulnerable aspects of infrastructure – those that would be more devastating to the public if disrupted for long periods of time.  The attackers “zeroed in on computer systems run by power grid operators and natural gas pipeline companies.”  Adding to the estimation of malicious intent, the 2012 statistics included “a successful attack against a key supplier of energy control systems.”11 Furthermore, in an announcement that was lacking in specifics, DHS confessed “that an American power station . . . was crippled for weeks by cyberattacks.”12

Apparently while the ICS-CERT end of year report was being prepared, “a secret legal review” on America’s use of “cyberweapons” was held.  According to a February 2013 New York Times article, the legal assessment concluded that the authority to “order a pre-emptive strike” exists within the Office of the President — provided there is “credible evidence of a [pending] major digital attack”]13 against U.S. equities.  Executive Order 13636 Improving Critical Infrastructure Cybersecurity,14 and Presidential Policy Directive 21 (PPD-21) Critical Infrastructure Security and Resilience 15 were released on the heels of further press coverage of the “secret review.”  Both were signed on February 12th (2013) – the day of President Obama’s State of the Union Address, which also contained warnings of enemy attacks against the financial sectors and the power grid.16

Executive Order 13636 was not without detractors. In response to its release, Brookings published Bound to Fail: Why Cyber Security Risk Cannot Simply be ‘Managed’ Away.  The authors criticized the Executive Order as insufficient because of its reliance on risk management and voluntary participation. “Business logic ultimately gives the private sector every reason to argue the always hypothetical risk away, rather than solving the factual problem of insanely vulnerable cyber systems that control the nation’s most critical installations.”17 The same could be said for government. Mitigation against catastrophic critical infrastructure collapse – a “worst case” scenario, yet entirely achievable and desirable by adversaries 18 — must not depend on risk management.  History tells us that worst case does happen; and in the context of conflict, worst case is usually intentional.

Passive and patchy cyber defense is no longer enough to thwart major cyber attacks.19 “We won’t succeed in preventing a cyber attack through improved defenses alone.”20 Reliance on cyber security professionals to locate, identify, and keep up with cyber threats is an increasingly expensive and “unsustainable” option. 21Additionally, cyber defense models can’t catch everything. The threat to the energy sector alone can be seen in the level of support provided by ICS-CERT, which, as reported in their Year In Review for 2014, was more than double that of the previous year.  Also, the report noted with “great concern” the ICS-CERT response to “multiple newly discovered cyber campaigns that had been ongoing for several years.”22

Detection of imminent threat cannot depend on the chance finding of ongoing “cyber campaigns.” As former SECDEF Panetta said, “If we detect an imminent threat of attack that will cause significant physical destruction or kill American citizens, we need to have the option to take action to defend the nation when directed by the President.”23 If the “secret legal review” did indeed examine and acknowledge that the President had such authority, is the United States now well protected in the cyber realm?

Some might say yes.  In January 2015, President Obama imposed new sanctions on North Korea as a result of the “hack” on Sony Pictures24 after vowing: “We will respond proportionately and in a space, time and manner that we choose.”25  He later signed an Executive Order, authorizing     sanctions on those “responsible for or complicit in malicious cyber-enabled activities” that can pose “significant threat to the national security, foreign policy, economic health, or financial stability of the United States.”26

Others might disagree. In addition to the 2014 discoveries of long-term malware insertions,27 cumulative attacks and delayed attribution continue to be a problem. The DNI’s testimony for the 2015 Worldwide Threat Assessment 28 included this admonition:

“The muted response by most victims to cyber attacks has created a permissive environment in which low-level attacks can be used as a coercive tool short of war, with relatively low risk of retaliation. Additionally, even when a cyber attack can be attributed to a specific actor, the forensic attribution often requires a significant amount of time to complete. Long delays between the cyber attack and determination of attribution likewise reinforce a permissive environment.”

Lieutenant General Flynn’s comment (at the beginning of this article) about hackers being encouraged because there are “no consequences”29 reveals similar frustration.

Although increases in cyber intrusions have been noted in open-source for years, little (to the public’s knowledge) has been done offensively in the cyber or physical realms by the West (with the possible exception of Stuxnet30). Even with the most recent revelations of data theft,31 the public remains unaware of the extent to which any counterattack has been attempted.

From hacker groups like “Anonymous” to actors (officially recognized or not) of nation-states, cyber attackers have been waging unofficial cyberwar at rising levels across the network.  There has, however, been no definitive “line in the sand” – a point at which response is assured.

It is understood that regardless of attacker intent, there can be unintended consequences of adverse activities, especially if attacks have been sequential and cumulative. Unpredictability in adversarial attack modes and capabilities is something that must always be considered.  Similarly, a consequence of response is the possibility of introducing or reacting to an event that might trigger a larger, less controlled cyber conflict – one that could lead to a full-scale kinetic war.  This is no doubt a possibility that the White House is trying to avoid.

Yet, the process of verifying a Presidential pre-emptive authority against impending cyber attacks would also indicate an understanding that a “worst case” cyber scenario has been considered, if not yet conceived, by potential adversaries.  As indicated by SECDEF Panetta, an attack against the electric grid, 32 if well-coordinated and sufficiently resourced, could have catastrophic effects on the population. Long-term regional or national power-outages might mean large numbers lost to malnutrition, disease, and chaos.  A year without power could result in the death of over two-thirds of the population within the affected area.33 Such an attack is worthy of being labeled a trigger event in what would probably be a “cyber first strike.”

Counterattack under this type of scenario would be difficult and probably too late to be relevant.  Similar to the “not fully successful” 2008 Russian invasion of Georgia,34a cyber first strike is intended to leave victims vulnerable for a kinetic follow-on attack.  Theoretically, a successful cyber first strike would leave a nation without hope of allied assistance and ultimately, unable to maintain sovereignty.

The leaders of NATO have reason to be concerned.  The U.S. is already seeing adversaries in its critical infrastructure.  These infiltrators have been allowed the opportunity to test their capabilities with the mere realization that sanctions may eventually be applied.

Cyber triggers have already been “missed.”  What’s next?  Will sanctions be applied? Will pre-emptive action be taken?  Or will the enemies’ cyber first strike (or cyber “take down”) spell the demise of U.S. national sovereignty in an inevitable – albeit short — cyber war?

Ms. Ayers was a speaker at The Mackenzie Institute’s recent conference on “Resilient Critical Infrastructure & Cyber Security”. This article was originally published in the first edition of The Mackenzie Institute magazine “Security Matters”.  Please click here to view the magazine.

 

References


  1. Walter Isaacson, David Sanger, & Michael Rogers, Beyond the Build: Leveraging the Cyber Mission Force, A Presentation before a Conference at the Aspen Institute, July 23, 2015, http://aspensecurityforum.org/wp-content/uploads/2015/07/Beyond-the-Build-Leveraging-the-Cyber-Mission-Force.pdf
  2. Bill Gertz, “US Intelligence Community Report: America’s Weak Response to Cyber Attacks Will Encourage More Breaches,” Business Insider, July 28, 2015, http://www.businessinsider.com/us-response-to-cyber-attacks-will-encourage-more-2015-7.
  3. Paul McLeary, “NATO Chief: Cyber Can Trigger Article 5,” DefenseNews, March 25, 2015, http://www.defensenews.com/story/defense/policy-budget/warfare/2015/03/25/nato-cyber-russia-exercises/70427930/.
  4. James R. Clapper, Statement for the Record, Worldwide Threat Assessment of the US Intelligence Community, Senate Select Committee on Intelligence, March 12, 2013, http://www.dni.gov/files/documents/Intelligence%20Reports/2013%20ATA%20SFR%20for%20SSCI%2012%20Mar%202013.pdf
  5. James R. Clapper, Statement for the Record, Worldwide Threat Assessment of the US Intelligence Community, Senate Select Committee on Intelligence, January 29, 2014, http://www.dni.gov/files/documents/Intelligence%20Reports/2014%20WWTA%20%20SFR_SSCI_29_Jan.pdf
  6. James R. Clapper, Statement for the Record, Worldwide Threat Assessment of the US Intelligence Community, Senate Select Committee on Intelligence, February 26, 2015,
    http://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf
  7. Jake Tapper, “Leon Panetta: A Crippling Cyber Attack Would Be ‘Act of War’,” ABC News, May 27, 2012, http://abcnews.go.com/blogs/politics/2012/05/leon-panetta-a-crippling-cyber-attack-would-be-act-of-war/
  8. Leon E. Panetta, Defending the Nation from Cyber Attack, Speech Presented to Business Executives for National Security, Washington D.C.: U.S. Department of Defense, Office of the Assistant Secretary of Defense (Public Affairs), October 12, 2012.
  9. Deborah Charles, “U.S. homeland chief: cyber 9/11 could happen ‘imminently’,” Reuters, January 24, 2013 http://www.reuters.com/article/2013/01/24/us-usa-cyber-threat-idUSBRE90N1A320130124
  10. Ray Suarez, “Examining Cyber Security With Homeland Security Secretary Janet Napolitano,” PBS Newshour, February 15, 2013 http://www.pbs.org/newshour/bb/science/jan-june13/cybersecurity_02-15.html
  11. Mark Clayton, “Energy sector cyberattacks jumped in 2012. Were utilities prepared?” Christian Science Monitor, January 7, 2013, http://www.csmonitor.com/Environment/Energy-Voices/2013/0107/Energy-sector-cyberattacks-jumped-in-2012.-Were-utilities-prepared?nav=627893-csm_article-leftColRelated
  12. David E. Sanger and Thom Shanker, “Broad Powers Seen for Obama in Cyberstrikes,” The New York Times,
    February 3, 2013, http://www.nytimes.com/2013/02/04/us/broad-powers-seen-for-obama-in-cyberstrikes.html?_r=2&.
  13. Ibid.
  14. Barak Obama, Executive Order: Improving Critical Infrastructure Cybersecurity, February 12, 2013 http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity.
  15. The White House, Presidential Policy Directive/PPD-21: Critical Infrastructure Security and Resilience, February 12, 2013, http://www.fas.org/irp/offdocs/ppd/ppd-21.pdf
  16. The White House, Remarks by the President in the State of the Union Address, February 12, 2013, http://www.whitehouse.gov/the-press-office/2013/02/12/remarks-president-state-union-address.
  17. Ralph Langner and Perry Pederson, Bound to Fail: Why Cyber Security Risk Cannot Simply Be ‘Managed’ Away, February 2013, http://www.brookings.edu/research/papers/2013/02/cyber-security-langner-pederson.
  18. Cynthia E. Ayers, “EMP Effects and Cyber Warfare (Parts I and II),” The Jewish Voice, February 26, 2014 and March 6, 2014, http://jewishvoiceny.com/index.php?option=com_content&id=6777:emp-effects-and-cyber-warfare--part-i&Itemid=301 and http://jewishvoiceny.com/index.php?option=com_content&id=6882:emp-effects-and-cyber-warfare--part-ii&Itemid=301
  19. Verizon, 2013 Data Breach Investigations Report, 2013, http://www.secretservice.gov/Verizon_Data_Breach_2013.pdf, p. 59
  20. Leon Panetta, “Defending the Nation from Cyber Attack.”
  21. Prescott E. Small and Pedro Bueno, Defense-in-Depth: An Impractical Strategy for a Cyber World, SANS Institute, November 14, 2011, http://www.sans.org/reading-room/whitepapers/warfare/defense-depth-impractical-strategy-cyber-world-33896.
  22. Department of Homeland Security and the National Cybersecurity and Communications Integration Center, ICS-CERT Year in Review, 2014, https://ics-cert.us-cert.gov/sites/default/files/documents/Year_in_Review_FY2014_Final.pdf, p. 4.
  23. Leon Panetta, “Defending the Nation from Cyber Attack.”
  24. Warwick Ashford, “Obama Threatens Foreign Cyber Attackers With Sanctions,” Computer Weekly, February 13, 2015, http://www.computerweekly.com/news/4500243644/Obama-threatens-foreign-cyber-attackers-with-sanctions.
  25. BBC News, “Sony Hack: Obama Vows Response as FBI Blames North Korea,” BBC.com, December 19, 2014, http://www.bbc.com/news/world-us-canada-30555997.
  26. Michael Daniel, Our Latest Tool to Combat Cyber Attacks: What You Need to Know, April 1, 2015, https://www.whitehouse.gov/blog/2015/04/01/our-latest-tool-combat-cyber-attacks-what-you-need-know.
  27. Anya Litvak and Deborah M. Todd, “BlackEnergy Malware Threat Has Some Uneasy,” Pittsburg Post-Gazette, November 11, 2014, http://powersource.post-gazette.com/powersource/companies/2014/11/11/BlackEnergy-spooks-nation/stories/201411110080; Lucian Constantin, “New Havex Malware Variants Target Industrial Control Systems and SCADA Users,” IDG News Service, June 24, 2014, http://www.pcworld.com/article/2367240/new-havex-malware-variants-target-industrial-control-system-and-scada-users.html.
  28. James R. Clapper, Statement for the Record, Worldwide Threat Assessment of the US Intelligence Community, Senate Select Committee on Intelligence, February 26, 2015.
  29. Bill Gertz, “US Intelligence Community Report: America’s Weak Response to Cyber Attacks Will Encourage More Breaches.”
  30. Ralph Langner, To Kill A Centrifuge: A Technical Analysis of What Stuxnet’s Creators Tried to Achieve, The Langner Group, November 2013, http://www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdf
  31. Hal Schwartz, “6 Times U.S. Agencies Were Hacked Before the Pentagon,” DCInno, August 8, 2015, http://dcinno.streetwise.co/2015/08/08/federal-cybersecurity-hacks-opm-pentagon-irs-white-house/.
  32. Jake Tapper, “Leon Panetta: A Crippling Cyber Attack Would Be ‘Act of War’.”
  33. Congressional EMP Commission, Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures, Washington, DC, 2008; and The Committee on the Societal and Economic Impacts of Severe Space Weather Events, Severe Space Weather Events: Understanding Societal and Economic Impacts, The National Research Council of the National Academies, Washington, DC: The National Academies Press, 2008.
  34. David J. Smith, “Russian Cyber Strategy and the War Against Georgia,” Infocus Quarterly, January 17, 2014, http://www.atlanticcouncil.org/blogs/natosource/russian-cyber-policy-and-the-war-against-georgia
Previous ArticleNext Article
Cynthia Ayers
Cynthia Ayers is currently a consultant working with the Mission Command and Cyber Division of the Center for Strategic Leadership & Development, U.S. Army War College. Ms. Ayers retired from the National Security Agency (NSA) in 2011 with over 38 years of government service. Her intelligence community career included a position as an NSA Representative to the DCI’s Counterterrorism Center at CIA headquarters, where she worked throughout the attack on the USS Cole and the attacks of 9/11 (2000-2002). Her government service culminated in an eight-year assignment as the National Security Agency’s Visiting Professor to the U.S. Army War College (USAWC), where she taught electives on contemporary threats to national security from an intelligence perspective, and advised students on research concerning strategic intelligence, counterterrorism, cyber warfare, the Middle East, and critical infrastructure protection. Post-retirement, Ms. Ayers was employed as Vice President of EMPact America, a bipartisan, not-for-profit group, and is currently a Director (Deputy to the Executive Director) of a congressionally-sponsored task force working critical infrastructure issues.