Advertisement

Coder, Hacker, Soldier, Spy

  • Kenneth Geers
Chapter
Part of the Intelligent Systems, Control and Automation: Science and Engineering book series (ISCA, volume 78)

Abstract

A cyber attack is best understood not as an end in itself, but as a means to a wide variety of ends, some of which have serious legal, political, military, or economic ramifications. Cyber attacks may be employed for any purpose: espionage, crime, activism, terrorism, or war. They are used for competitive advantage in any and every form of human conflict. This chapter seeks to help cyber defenders classify attacks appropriately so that they can most efficiently allocate finite resources to combat this rising threat.

Keywords

Critical Infrastructure South Korean Government North Korean Defector Advanced Persistent Threat Intellectual Property Theft 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Albanesius C (2011) Norway cyber attack targets country’s oil gas systems. PCMag. http://www.pcmag.com/article2/0,2817,2396611,00.asp. Accessed 17 Nov 2013
  2. Albanesius C (2013) Tango messaging app targeted by Syrian Electronic Army. PCMag. http://www.pcmag.com/article2/0,2817,2422129,00.asp. Accessed 17 Nov 2013
  3. Ashford W (2013) Syrian hacktvists hit second mobile app in a week. Computer Weekly. http://www.computerweekly.com/news/2240201656/Syrian-hacktvists-hit-second-mobile-app-in-a-week. Accessed 17 Nov 2013
  4. Bencsáth B (2012) Duqu, flame, gauss: followers of stuxnet. BME CrySyS Lab RSA. http://www.rsaconference.com/writable/presentations/file_upload/br-208_bencsath.pdf. Accessed 17 Nov 2013
  5. Borak D (2009) Source in Iran views Marine One blueprints. Marine Corps Times. http://www.marinecorpstimes.com/article/20090303/NEWS/903030307/Source-in-Iran-views-Marine-One-blueprints. Accessed 17 Nov 2013
  6. Carroll W (2007) Israel’s cyber shot at Syria. Defense Tech. http://defensetech.org/2007/11/26/israels-cyber-shot-at-syria/. Accessed 17 Nov 2013
  7. Charette R (2011a) ‘Spectacular’ cyber attack gains access to France’s G20 files. IEEE Spectrum. http://spectrum.ieee.org/riskfactor/telecom/internet/spectacular-cyber-attack-gains-access-to-frances-g20-files. Accessed 17 Nov 2013
  8. Charette R (2011b) DigiNotar certificate authority breach crashes e-government in the Netherlands. IEEE Spectrum. http://spectrum.ieee.org/riskfactor/telecom/security/diginotar-certificate-authority-breach-crashes-egovernment-in-the-netherlands. Accessed 17 Nov 2013
  9. China-based servers in Japan cyber attacks (28 Oct 2011) The Indian Express. http://www.indianexpress.com/news/chinabased-servers-in-japan-cyber-attacks/866665/. Accessed 17 Nov 2013
  10. Choe S-H, Markoff J (2009) Cyberattacks jam government and commercial web sites in US and South Korea. The New York Times. http://www.nytimes.com/2009/07/09/technology/09cyber.html?_r=0. Accessed 17 Nov 2013
  11. Clayton M (2013) Exclusive: cyberattack leaves natural gas pipelines vulnerable to sabotage. The Christian Science Monitor. http://www.csmonitor.com/Environment/2013/0227/Exclusive-Cyberattack-leaves-natural-gas-pipelines-vulnerable-to-sabotage. Accessed 17 Nov 2013
  12. Espionage report: Merkel’s China visit marred by hacking allegations (2007) Spiegel. http://www.spiegel.de/international/world/espionage-report-merkel-s-china-visit-marred-by-hacking-allegations-a-502169.html. Accessed 17 Nov 2013
  13. Finkle J (2011) ‘State actor’ behind slew of cyber attacks. Reuters. http://www.reuters.com/article/2011/08/03/us-cyberattacks-idUSTRE7720HU20110803. Accessed 17 Nov 2013
  14. Fisher M (2013) South Korea under cyber attack: is north Korea secretly awesome at hacking? The Washington Post. http://www.washingtonpost.com/blogs/worldviews/wp/2013/03/20/south-korea-under-cyber-attack-is-north-korea-secretly-awesome-at-hacking/. Accessed 17 Nov 2013
  15. Fisher M, Keller J (2011) Syria’s digital counter-revolutionaries. The Atlantic. http://www.theatlantic.com/international/archive/2011/08/syrias-digital-counter-revolutionaries/244382/. Accessed 17 Nov 2013
  16. Four years of DarkSeoul cyberattacks against South Korea continue on anniversary of Korean war (2013) Symantec. http://www.symantec.com/connect/blogs/four-years-darkseoul-cyberattacks-against-south-korea-continue-anniversary-korean-war. Accessed 17 Nov 2013
  17. Gallagher S (2013) US, Russia to install ‘cyber-hotline’ to prevent accidental cyberwar. Ars Technica. http://arstechnica.com/information-technology/2013/06/us-russia-to-install-cyber-hotline-to-prevent-accidental-cyberwar/. Accessed 17 Nov 2013
  18. Geers K (2008) Cyberspace and the changing nature of warfare. SC Magazine. http://www.scmagazine.com/cyberspace-and-the-changing-nature-of-warfare/article/115929/. Accessed 17 Nov 2013
  19. Geers K, Kindlund D, Moran N, Rachwald R (2013) World war C: understanding nation-state motives behind today’s advanced cyber attacks. FireEye Labs. http://www.fireeye.com/resources/pdfs/fireeye-wwc-report.pdf. Accessed 17 Nov 2013
  20. Gerth J, Risen J (1999) 1998 report told of lab breaches and China threat. The New York Times. http://www.nytimes.com/1999/05/02/world/1998-report-told-of-lab-breaches-and-china-threat.html?pagewanted=all&src=pm. Accessed 17 Nov 2013
  21. Gertz B (2013) Dam! sensitive army database of US dams compromised; Chinese hackers suspected. The Washington Times. http://www.washingtontimes.com/news/2013/may/1/sensitive-army-database-us-dams-compromised-chines/?page=all. Accessed 17 Nov 2013
  22. Global warning: New Climategate leaks (2011) RT. http://rt.com/news/global-warming-climate-controversy-009/. Accessed 17 Nov 2013
  23. Gobry P-E (2011) South Korea will replace all paper with tablets in schools by 2015. Business Insider. http://www.businessinsider.com/south-korea-tablets-in-schools-by-2015-2011-7. Accessed 17 Nov 2013
  24. Goodin D (2012) Crypto breakthrough shows flame was designed by world-class scientists. Ars Technica. http://arstechnica.com/security/2012/06/flame-crypto-breakthrough/. Accessed 17 Nov 2013
  25. Gorman S (2011) China hackers hit US chamber. Wall Street Journal. http://online.wsj.com/news/articles/SB10001424052970204058404577110541568535300. Accessed 17 Nov 2013
  26. Gorman S, Yadron D (2013). Iran hacks energy firms, US says. Wall Street Journal. http://online.wsj.com/news/articles/SB10001424127887323336104578501601108021968. Accessed 17 Nov 2013
  27. Gorman S, Cole A, Dreazen Y (2009a) Computer spies breach fighter-Jet project. Wall Street Journal. http://online.wsj.com/news/articles/SB124027491029837401. Accessed 17 Nov 2013
  28. Gorman S, Dreazen Y, Cole A (2009b) Insurgents hack US drones. Wall Street Journal. http://online.wsj.com/news/articles/SB126102247889095011. Accessed 17 Nov 2013
  29. Gorshenin V (2013) Russia to create cyber-warfare units. Pravda. http://english.pravda.ru/russia/politics/29-08-2013/125531-cyber_warfare-0/. Accessed 17 Nov 2013
  30. Gross MJ (2011) Enter the cyber-dragon. Vanity Fair. http://www.vanityfair.com/culture/features/2011/09/chinese-hacking-201109. Accessed 17 Nov 2013
  31. Hackers infiltrate German police and customs service computers (2011) Infosecurity Magazine. http://www.infosecurity-magazine.com/view/19494/hackers-infiltrate-german-police-and-customs-service-computers/. Accessed 17 Nov 2013
  32. Hille K (2013) China claims ‘mountains of data’ on cyber attacks by US. Financial Times. http://www.ft.com/intl/cms/s/0/921f47cc-cdce-11e2-a13e-00144feab7de.html#axzz2kwXMwlAz. Accessed 17 Nov 2013
  33. Hopkins N (2012) Hackers have breached top secret MoD systems, cyber-security chief admits. The Guardian. http://www.theguardian.com/technology/2012/may/03/hackers-breached-secret-mod-systems. Accessed 17 Nov 2013
  34. India and Pakistan in cyber war (2010) Al-Jazeera. http://www.aljazeera.com/news/asia/2010/12/20101241373583977.html. Accessed 17 Nov 2013
  35. Ingersoll G (2013) Russia turns to typewriters to protect against cyber espionage. Business Insider. http://www.businessinsider.com/russia-turns-to-typewriters-for-secrets-2013-7. Accessed 17 Nov 2013
  36. Kastrenakes J (2013) Syrian Electronic Army alleges stealing ‘millions’ of phone numbers from chat app Tango. The Verge. http://www.theverge.com/2013/7/22/4545838/sea-giving-hacked-tango-database-government. Accessed 17 Nov 2013
  37. Khare A (2013) Syrian Electronic Army hacks truecaller database, gains access codes to social media accounts. iDigital Times. http://www.idigitaltimes.co.uk/articles/492337/20130719/syrian-electronic-army-hacks-truecaller-database-gains.htm. Accessed 17 Nov 2013
  38. Krukowska E, Carr M (2011) EU carbon trading declines after alleged hacking suspends spot market. Bloomberg. http://www.bloomberg.com/news/2011-01-20/carbon-trading-declines-as-eu-regulator-halts-spot-market-on-hacking-probe.html. Accessed 17 Nov 2013
  39. Leppard D (2010) China bugs and burgles Britain. The Sunday Times. http://www.thesundaytimes.co.uk/sto/news/uk_news/article196465.ece. Accessed 17 Nov 2013
  40. Lynn WJ (2010) Defending a new domain: the Pentagon’s cyberstrategy. Foreign Aff 89(5):97–108. http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain. Accessed 17 Nov 2013
  41. Manzoor S (2013) Slaves to the algorithm: are stock market math geniuses, or quants, a force for good? Ottawa Citizen. http://www.ottawacitizen.com/business/Slaves+algorithm+stock+market+math+geniuses+quants+force+good/8707964/story.html. Accessed 17 Nov 2013
  42. Marquis-Boire M (2012) Iranian anti-censorship software ‘Simurgh’ circulated with malicious backdoor. Citizenlab. https://citizenlab.org/2012/05/iranian-anti-censorship-software-simurgh-circulated-with-malicious-backdoor-2/. Accessed 17 Nov 2013
  43. McCurry J (2011) Japan anxious over defence data as China denies hacking weapons maker. The Guardian. http://www.theguardian.com/world/2011/sep/20/china-denies-hacking-attack-japan. Accessed 17 Nov 2013
  44. McDonald M (2011) Home internet may get even faster in South Korea. The New York Times. http://www.nytimes.com/2011/02/22/technology/22iht-broadband22.html. Accessed 17 Nov 2013
  45. Mick J (2011) Chinese hackers score heist of 35 million South Koreans’ personal info. Daily Tech. http://www.dailytech.com/Chinese+Hackers+Score+Heist+of+35+Million+South+Koreans+Personal+Info/article22284.htm. Accessed 17 Nov 2013
  46. Nakashima E, Mufson S (2008) Hackers have attacked foreign utilities, CIA analyst says. Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2008/01/18/AR2008011803277.html. Accessed 17 Nov 2013
  47. Operation hangover: Q&A on attacks (2013) Symantec. http://www.symantec.com/connect/blogs/operation-hangover-qa-attacks. Accessed 17 Nov 2013
  48. Overview by the US-CCU of the cyber campaign against Georgia in August of 2008 (2009) A US-CCU special report, U.S. Cyber Consequences Unit. http://www.registan.net/wp-content/uploads/2009/08/US-CCU-Georgia-Cyber-Campaign-Overview.pdf. Accessed 17 Nov 2013
  49. Perlroth N (2012) In cyberattack on Saudi firm U.S. sees Iran firing back. The New York Times. http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html. Accessed 17 Nov 2013
  50. Perlroth N (2013a) Washington post joins list of news media hacked by the Chinese. The New York Times. http://www.nytimes.com/2013/02/02/technology/washington-posts-joins-list-of-media-hacked-by-the-chinese.html. Accessed 17 Nov 2013
  51. Perlroth N (2013b) Wall Street Journal announces that it too was hacked by the Chinese. The New York Times. http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attack-by-china-hackers.html. Accessed 17 Nov 2013
  52. Pfeffer A (2009) Israel suffered massive cyber attack during Gaza offensive. Haaretz. http://www.haaretz.com/news/israel-suffered-massive-cyber-attack-during-gaza-offensive-1.278094. Accessed 17 Nov 2013
  53. Pidathala V, Kindlund D, Haq T (2013) “Operation Beebus,” FireEye advanced threat report—2H 2012. FireEye Labs. http://www2.fireeye.com/rs/fireye/images/fireeye-advanced-threat-report-2h2012.pdf. Accessed 17 Nov 2013
  54. Pubby M (2012) China hackers enter Navy computers plant bug to extract sensitive data. The Indian Express. http://www.indianexpress.com/news/china-hackers-enter-navy-computers-plant-bug-to-extract-sensitive-data/968897/. Accessed 17 Nov 2013
  55. Rapoza K (2013) U.S. hacked China universities, mobile phones, Snowden tells China Press. Forbes. http://www.forbes.com/sites/kenrapoza/2013/06/22/u-s-hacked-china-universities-mobile-phones-snowden-tells-china-press/. Accessed 17 Nov 2013
  56. Report: Plans for Australia spy HQ hacked by China (2013) USA Today. http://www.usatoday.com/story/news/world/2013/05/28/china-hackers-australia-spy-agency-headquarters/2364863/. Accessed 17 Nov 2013
  57. Riley M, Lawrence D (2012) Hackers linked to China’s Army seen from EU to D.C. Bloomberg. http://www.bloomberg.com/news/2012-07-26/china-hackers-hit-eu-point-man-and-d-c-with-byzantine-candor.html. Accessed 17 Nov 2013
  58. Rochford O (2013) European space, industrial firms breached in cyber attacks: report. Security Week. http://www.securityweek.com/european-space-industrial-firms-breached-cyber-attacks-report. Accessed 17 Nov 2013
  59. Sanger D (2012) Confront and conceal: Obama’s secret wars and surprising use of American power. Broadway Books, New York, pp 188–225Google Scholar
  60. Sanger D, Markoff J (2011) I.M.F. reports cyberattack led to ‘very major breach’. New York Times. http://www.nytimes.com/2011/06/12/world/12imf.html. Accessed 17 Nov 2013
  61. Sanger D, Barboza D, Perlroth N (2013) Chinese army unit is seen as tied to hacking against U.S. The New York Times. http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us. Accessed 17 Nov 2013
  62. Schneier B (1998) Click here to bring down the internet. Schneier on Security. https://www.schneier.com/essay-003.html. Accessed 17 Nov 2013
  63. ‘Serious’ cyber attack on EU bodies before summit (2011) BBC. http://www.bbc.co.uk/news/world-europe-12840941. Accessed 17 Nov 2013
  64. Shanker T, Sanger D (2013) U.S. helps allies trying to battle Iranian hackers. New York Times. http://www.nytimes.com/2013/06/09/world/middleeast/us-helps-allies-trying-to-battle-iranian-hackers.html. Accessed 17 Nov 2013
  65. Significant cyber incidents since 2006 (2013) Center for strategic and international studies. http://csis.org/publication/cyber-events-2006. Accessed 17 Nov 2013
  66. Simonite T (2012) Bungling cyber spy stalks Iran. MIT Technology Review. http://www.technologyreview.com/news/429046/bungling-cyber-spy-stalks-iran/. Accessed 17 Nov 2013
  67. Smith T (2001) Hacker jailed for revenge sewage attacks. The Register. http://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/. Accessed 17 Nov 2013
  68. Stewart W, Delgado M (2009) Were Russian security services behind the leak of ‘Climategate’ emails? Daily Mail. http://www.dailymail.co.uk/news/article-1233562/Emails-rocked-climate-change-campaign-leaked-Siberian-closed-city-university-built-KGB.html. Accessed 17 Nov 2013
  69. Syrian Electronic Army (2013) Wikipedia. http://en.wikipedia.org/wiki/Syrian_Electronic_Army. Accessed 17 Nov 2013
  70. Tracking GhostNet: Investigating a cyber espionage network (2009) Information warfare monitor. http://www.nartv.org/mirror/ghostnet.pdf. Accessed 17 Nov 2013
  71. Tsukayama H (2013) Attacks like the one against the New York Times should put consumers on alert. The Washington Post. http://articles.washingtonpost.com/2013-08-28/business/41530263_1_hackers-security-researchers-fireeye. Accessed 17 Nov 2013
  72. Ungerleider N (2010) South Korea’s power structure hacked, digital trail leads to China. Fast Company. http://www.fastcompany.com/1696014/south-koreas-power-structure-hacked-digital-trail-leads-china. Accessed 17 Nov 2013
  73. Vijayan J (2010) Update: report sounds alarm on China’s rerouting of U.S. Internet traffic. Computerworld. http://www.computerworld.com/s/article/9197019/Update_Report_sounds_alarm_on_China_s_rerouting_of_U.S._Internet_traffic. Accessed 17 Nov 2013
  74. Wai-yin Kwok V (2010) Baidu hijacked by cyber army. Forbes. http://www.forbes.com/2010/01/13/baidu-cyber-attack-markets-technology-china.html. Accessed 17 Nov 2013
  75. Walker D (2013) Hacktivists plan to resume DDoS campaign against U.S. banks. SC Magazine. http://www.scmagazine.com/hacktivists-plan-to-resume-ddos-campaign-against-us-banks/article/283474/. Accessed 17 Nov 2013
  76. Warren P (2006) Smash and grab, the hi-tech way. The Guardian. http://www.theguardian.com/politics/2006/jan/19/technology.security. Accessed 17 Nov 2013
  77. Willsher K (2009) French fighter planes grounded by computer virus. The Telegraph. http://www.telegraph.co.uk/news/worldnews/europe/france/4547649/French-fighter-planes-grounded-by-computer-virus.html. Accessed 17 Nov 2013
  78. Yagna Y (2013) Ex-General denies statements regarding Syrian cyber attack. Haaretz. http://www.haaretz.com/news/diplomacy-defense/ex-general-denies-statements-regarding-syrian-cyber-attack.premium-1.525941. Accessed 17 Nov 2013
  79. Zetter K (2012) Mahdi, the Messiah, found infecting systems in Iran, Israel. WIRED. http://www.wired.com/threatlevel/2012/07/mahdi/. Accessed 17 Nov 2013

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.FireEyeRestonUSA

Personalised recommendations