8/14/2019 Cyber Warfare Infrastructure
1/15STRATEGIC
BR
IEFING
by
TheTechnolyticsInstitu
te
C
yberWarfareInfras
tructure
8/14/2019 Cyber Warfare Infrastructure
2/15STRATEGIC
BR
IEFING
Conflict
ThePrussianphilosopher
KarlvonClau
switz
theorized:
"Everyageh
asitsownkin
dofwar,itso
wn
limitingcond
itionsanditsownpeculiar
preconceptio
ns."
Weliveinan
ageofinform
ationfocused
warfareCy
berWarfare!
8/14/2019 Cyber Warfare Infrastructure
3/15STRATEGIC
BR
IEFING
Intr
oduction
Cyberattacksandcyberespiona
gearecostingbusinesses
billionsofdollars
ayearandhavenowbecomea
National
Securityissue!Nationalsecurity
andcybersecurityexperts
believetheU.S.
Governmentanditscontractorsarethe
targetsofagrow
ingcyberwarfareeffortthatthey
suspectis
beingconducted
bynationstates
andtheirproxie
swiththe
aimofstealingm
ilitaryandindus
trialsecrets.Ithasbeen
discoveredthathackersandvirusesinfiltratedDHS
and
DoDsystems,"e
xfiltrating"orcopyingandsendin
goutdata.
Thisapproachs
ignificantlyreduc
estheexfiltrationofdata
withoutdisruptin
gintelligencega
theringaboutthe
cyber
attackersandtheirtools.
8/14/2019 Cyber Warfare Infrastructure
4/15STRATEGIC
BR
IEFINGSettin
gtheStage
Governmentsus
evastamountsofinformationtechnologyto
conductoperatio
nsandtointerfa
cewithcitizens.
Operations
mustbeconductedsecurelyand
withanassurancethat
informationisac
curateandprote
ctedfromunauth
orized
accessanddisclosure.Governm
entsmustalsoe
nsurethe
safetyandsecurityofitscitizens
andthenation.
Information
technologycanaidinthisarea.T
hisbriefingexam
inesthe
cyberwarfareinfrastructurethatsupportsthedefenseand
intelligencesect
ors.
8/14/2019 Cyber Warfare Infrastructure
5/15STRATEGIC
BR
IEFING
DEF
ENSE&INTELCO
MMUNITY
Surprisecyberattacker
swithnovelcounter-me
asures.
Avoidstandardiz
ationofcyb
erdefenses
.
Developdiverseoverlap
pingcyberdefensetechniques.
ThoughtLeadership
8/14/2019 Cyber Warfare Infrastructure
6/15STRATEGIC
BR
IEFING
W
arning
Animagefroma
lQaeda'swebsitefeaturesa"cra
cked"orbroken
computer
whichinourmindsindicatesapotentialcyberattack!
8/14/2019 Cyber Warfare Infrastructure
7/15STRATEGIC
BR
IEFING
Bac
kground
Cyberwarfa
reisbeingwa
gedonamas
sivescalethe
world
over.Ostensiblyfriendlyn
ationsattackeachothers'e
lectronic
nervoussys
temsfrequently,andwithre
cklessabandon.
Onasingle
dayin2008,the
Pentagonwashitbywould-beintruders6
milliontime
sina24-hourpe
riod.
In2007the
Pentagonssystemswerehacked
andreportedlybetween20
and27tera
bytesofdatawasstole.AlthoughChinawasblame
dforthe
attackviaindirectchannels,
thereisnoconclu
siveevidencethatthey
werebehin
dthebreach.
8/14/2019 Cyber Warfare Infrastructure
8/15STRATEGIC
BR
IEFING
Bac
kground
TheUKMinistry
ofDefense(MoD),theDoDequivalentin
Britain,hasbeguntoinvestigate
whathasbeenc
alledthe
mostsignificant
cybersecuritybr
eachafterinform
ationand
evidencesurfacesthatallemails
sentfrommultip
leRoyal
AirForcestation
sweresenttoIP
addressestracedbackto
Russia.
Over24RAF
basesand75%of
RoyalNavyships
were
impacted.
Outofthe24
RAFstationsithit,
somewererecentlyusedby
theMoDtosc
ramblefighterairc
rafttoheadoffRussian
bomberstestingBritishairdefen
ses.
Thissecurityevent
resultedintheneed
tobringdownsystem
sandhaltemailcommunication
acrossmos
t,ifnotall,ofthemilitary.
8/14/2019 Cyber Warfare Infrastructure
9/15STRATEGIC
BR
IEFING
UKunderAttack
SecurityministerLordWesttoldtheHouseofLor
dsthatthe
UKcontinuesto
betargetedbya
"largenumbero
fattacks"
andthatthegov
ernmentis"takin
gaction"todealw
iththose
backedbyhostileregimes.Thegovernmenthas
saiditis
engagedintacklingongoingstate-sponsoredcyberattacks
onUKnationalinfrastructure.
LordWestrefusedtoconfirmthe
natureororigin
ofthese
attacksbutsaid
cybersecurityis
a"verydangerousarea"
andthattheUK
hasbecome"mo
revulnerableas
we
becomemoreconnected.
8/14/2019 Cyber Warfare Infrastructure
10/15STRATEGIC
BR
IEFING
Transition
CyberWea
ponsEvolut
ion
LowHigh
Basic
Research
Applied
R
esearch
Early
Adopters
RapidAdvanceme
nt
1994
19
98
2002
2004
2008
2012
2020
BasicW
eapons
AdvancedWeapons
8/14/2019 Cyber Warfare Infrastructure
11/15STRATEGIC
BR
IEFING
AdvancedW
eaponsAna
lysis
Theseattacks
weresophisticated.Thehybride
xploithad
severalfunctio
nsandfeaturesincluding:
Self-defending
Rootlevelatta
cks
Morphingevery35seconds
Phonehomeforinstructions
Eachwormkn
owsaboutotherworm
s
Programmedtoworkoffpeakopera
tionalhours
Turningoffco
mputerdefensesandchangingsettings
Leverageath
reepartarchitecturelikethatofamissile.
Implicationsofadvancedexplo
its
Controlling1millionhostscancauseenormousdamage
DDoSAttack
Stealingandm
odifyingdata
Canbelevera
gedforcyber-warfare
Conductspre-operationalsurveillance
Wormscanbeusedtogainsuchco
ntrolinaveryshortpe
riodoftime.
8/14/2019 Cyber Warfare Infrastructure
12/15STRATEGIC
BR
IEFING
Netw
orkConnection
CyberInfras
tructureDia
gram
Alerts
What
When
Who
Where
Why
Tec
hnical
Profile
Enemy
Profile
Basic
Intermediate
Ad
vanced
D
ecision
Support
Dashboard
Cyber
Intelligence
Cyber
R
econnaissance
Cyber
Countermeasu
res
O
ffensiveCyber
Weapons
Cyber
Command&
Control
Traditional
Command&
Control
Cyber
Analysis
CyberWarfare
Infrastructure
Version:
1.25
Date:02/12/09
8/14/2019 Cyber Warfare Infrastructure
13/15STRATEGIC
BR
IEFING
ClosingThought
TheUnitedStat
esmusttreatcybersecurityas
oneofthemos
timportant
nationalsecurit
ychallengesitfaces!Thisisa
strategicissue
onparwith
weaponsofm
assdestruction
andglobaljiha
d,wherethego
vernment
b
earsprimaryre
sponsibilityfor
defendingournationscritical
information
infrastructure
andinformatio
nassets.
8/14/2019 Cyber Warfare Infrastructure
14/15STRATEGIC
BR
IEFING
QUESTIONS&ANSWERS ?
?
?
?
?
?
?
?
?
?
?
?
?
? ?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
8/14/2019 Cyber Warfare Infrastructure
15/15
TRATEGIC
BR
IEFINGAboutT
echnolytics
vinG.Coleman
7WashingtonRoad
lStop#348
Murray,PA15317
888-650-0800
12-818-7656
412-260-2773
kgcoleman@technolyticscom
TheTechnolyticsIn
stitute(Technolytics)wasestablishedin2000a
sanindependent
executivethink-tan
k.Ourprimarypurpose
istoundertakeoriginalresearchand
developsubstantiv
epointsofviewonstrategicissuesfacingexecutivesin
businesses,governmentandindustryarou
ndtheworld.
Ourstrategicgoals
focusonimprovingcriticalmeasuresofperform
ance,creating
sustainablecompe
titiveadvantage,deliveringinnovationandtechnology,and
managingsecurity
andrisk.Weoperatethreecenters:[Business&
Commerce]
[Security&Intellige
nce]and[Science&Te
chnology]andserveclientinbusiness,
governmentandin
dustry.
KevinG.Coleman
isahighlyskilledexecu
tive,managementcons
ultantandcyber
warfarestrategistw
ithsignificantknowledg
eandexperienceinmu
ltipleindustries.He
currentlyholdsanactivesecurityclearancewiththeDepartmentofDefenseandisa
recognizedauthorityincomputersecurity,crimeandcyberterroris
m.ACertified
ManagementCons
ultant(CMC),heisane
xpertinthetechnology
andcompliance
areas.CMCisthe
certificationmarksawar
dedbytheInstituteofM
anagement
ConsultantsUSAa
ndrepresentsevidence
ofthehigheststandard
sofconsultingand
adherencetothee
thicalcanonsoftheprofession.Fewerthan1%
ofallconsultants
haveachievedthis
levelofexcellence.He
hasexperienceinsecurityandcompliance
withinmultipleindu
striesincluding:hightechnology,financialservices,manufacturing,
defense,retail/consumerproductsandene
rgy.