L7 - cyber and space security Flashcards

1
Q

intro shit

A

important point: it is really young, polsci and politicians don’t know that much about it

  • you don’t have to know the details of how cyber works to apply it to traditional security
  • basically take traditional concepts like war and put cyber in front of it (e.g. also not armageddon, but armaggedon)

if it is possible for a state to wage cybergeddon, why hasn’t it happened?
- similar to last weeks’ question on the possibility of a doomsday machine/bomb

  • interconnectedness
  • we don’t know the exact consequences

story: NORAD 1979 + 1980 (North American Aerospace Defense Command)

  • soviet attack simulation in the computer -> computer started to respond = they stopped it in time, but still
  • year later: yet again really close to sending bomb to SU
  • simulation gets fed and people respond as if it is real, danger of escalation
  • War Operation Plan Response (WOPR) that can simulate thousands of scenarios

-> nuclear demand control network largely of the grid + kept apart of AI for fear of such mistakes

!!cybersecurity is a recognition that human societies r going through sea of change in communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is cyberspace?

A

“global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers”

  • stakeholders include businesses, gov agencies, civil society = we are all stakeholders

Cyber is best understood as a descriptive prefix, an adjective conveying the digital or computer-like nature of the noun to which it is attached

compare cyber (i.e. digital nature) with non-cyber (i.e. off the network grid)

  • e.g. cash payments vs digital transfers
  • e.g. hard copy vs soft copy

e.g. military concern: what happens if the GPS go down -> still learn how to read a map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cyberspace - the problem of translation

A

big diff in terminology and definitions (e.g. btwn US, Russia and China)

  • US used to talk about ‘information warfare’, (esp 1990s) -> cyber increasingly used in the 2000s onwards
  • Russia and China still focus on ‘information’ rather than ‘cyber’

however, even within govs there has been an evolution (e.g. US definitions from the early 2000s are diff from today)

these diff in translation have direct bearing on policy formulation

we use cyber bc it sounded more cool, it was basically a rebrand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cyber security, relevant terminology

A

Bot
DDOS (Distributed Denial of Service)
Deepfakes
Malware
Phishing and Spear Phishing
Ransomware
Social Engineering
Spyware
Trojan Horse
Trolls
Virus
Watering Hole
Worm
Zero day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cyber deterrence

A

= use of cyber operations to deter actions within other domains of conflict or the deterrence of adversary cyberspace operations within the cyber domain

  • can threat of cyber ‘punishment’ deter conventional military aggression?
  • can defensive cyber activities raise sufficient costs to make an adversary’s offensive cyber action prohibitively expensive?
  • can offensive ‘retaliatory; cyber activities deter an adversary’s offensive cyber actions?
  • can non-cyber threats of punishment deter an adversary’s cyber attack?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

cyber war and conflict

A

we haven’t seen it yet

“hostile actions in cyberspace that have effects that amplify or are equivalent to major kinetic violence”

  • Utilized by state and non-state actors (e.g. Hamas used cyber attacks against Israel + ISIS against global coalition against ISIS)
  • Involves direct attacks in cyberspace that are not necessarily aimed at military forces per se, but are directed at opponents digitally enabled systems in general

Usually launched in tandem with conventional military operations (e.g. during Russo-Georgia war + Russia-Ukraine war)
-> confused some theorists of war: there was a belief there would be a pure cyber war, with solely cyber elements

Can also be utilized in peacetime (Stuxnet virus attack causes physical damage in Iranian nuclear centrifuges 2008-10)

These types of acts are rare compared to financial crimes, espionage, and information operations (e.g. hybrid or grey zone war) – more than half of all cyber operations are aimed at collecting information or disseminating information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cybersecurity and armed conflict

A

Offense has advantage over defense

All recent conflicts have cyber dimension

  • E.g. ISIS gets into mobile devices of opposition groups - used for murders/kidnapping

Will there be such a thing as a pure cyber-war?

  • So far, despite hype, there is no indication of this
  • So far, only major cyber attacks of limited duration (Stuxnet, 2015 Ukraine power grid)
  • Rules of the road/laws of war difficult to establish = key problem people are focusing on now + e.g. are there cyber war crimes and can we punish them

Erik Gartzke: “shutting down power grids, closing airports, or derailing communication could be extremely costly, but most damage of this type will be fixed quickly and at comparatively modest investment of tangible resources”

Also ‘mutually assured destruction’ deterrence equivalent (didn’t say this at all)

Main emphasis of government cyber ops is reconnaissance, making adversary aware of presence = getting into adversary’s system as part of deterrence effort

if politicians have choice between cyber attack and physical attack, they will pick physical bc they don’t really know how cyber works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cyber power and non-state actors

A

Groups such as ISIS use digital technologies to recruit, train, fundraise and purchase supplies

ISIS only able to conduct small-scale denial of service attacks

Terrorist attacks produce shock (explosions, casualties) whereas cyber operations take time, money, and technical skill

  • Terrorist groups focus on what is cheap, noticeable and deadly

cyber terrorism?: mostly use digital presence for recruiting
offensive cyber operations = limited success

keep in mind = why not just pure cyber terrorism: most groups not really effective (uses money, time, technical skills) -> just work with what works (bombings etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what level of cyber attack would lead to a response?

A

A single or cumulative set of malicious cyber activities; or hostile operations to, from, or within space; could reach the level of armed attack and could lead the North Atlantic Council to invoke Article 5 of the North Atlantic Treaty. We recognise the applicability of international law and will promote responsible behaviour in cyberspace and space. We will also boost the resilience of the space and cyber capabilities upon which we depend for our collective defence and security.”
NATO Strategic Concept, 2022

no one really knows when the line is crossed

  • how bad to lead to cyber retaliation?
  • how bad to lead to use of kinetic/physical force?
  • how bad to lead to nuclear use?

(put this in the art 5 for deterrence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Russian cyberattacks on Estonia

A

!!same as in the reading -> add some notes

2007

Russian attacks (on gov websites, etc.) followed decision by Estonian government to move Soviet-era statue and graves

Cyber campaign over several weeks includes denial of service, attacks on government websites, banks and media organizations

Concurred alongside street protests by ethnic Russians living in Estonia

Estonia does not invoke NATO’s Article 5 (not clear why: either thought it was not necessary or were told that members would not go along with it)

After attack Estonia makes major investments in cyberdefense (public and private sector)

  • didn’t want to see repeat -> started investing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ukraine’s IT army

A

After 2022 Ukraine emerges as 12th biggest cyber power; Russia ranks third

  • Q: why is Russia struggling so much to achieve cyber-related effects in Ukraine?
  • Ukraine developed effective defenses + had a lot of help: IT Army

IT Army created on 26 February 2022 as part of Ministry of Digital Transformation

  • Hundreds of thousands of supporters aid Ukraine (~300.000)
  • Manages by a team of senior military and intelligence officers
  • Use distributed denial-of-service attacks (DDoS) and other cyber attacks against Russia’s digital infrastructure (banks, businesses, government websites)
  • Imposes economic costs on Russian businesses but not terribly decisive + also places limits on some civilian targets (e.g. hospitals)
  • Ukraine cybersecurity supported by firms such as Microsoft, Google, and Amazon (trying to keep Ukraine’s cyber security going despite Russian cyber attacks)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how to assess impact of cyber conflict?
- Russia - Ukraine

A

Ukraine IT army: causes some disruption to Russian society but strategic impact is marginal
= tactical successes

but strategic impact?

Russian cyberattacks fail to have decisive impact in support of invasion = no massive decisive impact

However, it would be worse for both sides in absence of heavy investment in cyber security
(if Ukraine hadn’t invested so much it would be a lot worse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how to assess impact of cyber conflict?
- Israel-Gaza

A

Hamas use of cyber acquired intel helps with attack planning

Hamas/Iran/sympathizers launch cyber-attacks on Israel = !!minimal impact

  • cyber offensive
  • lot of international support

Israel cyberattacks on Hamas limited because it doesn’t rely much on internet

Israel can turn on/off internet connectivity in Gaza (telecommunications blackout leads to international condemnation)

  • terrible for e.g. hospital
  • turning of lights and electricity in hospitals is technically a war crime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cyber example - North Korea

A

country you wouldn’t immediately think of as an important cyber actor

‘If warfare was about bullets and oil until now, warfare in the twenty-first century is about information. War is won and lost by who has greater access to the adversary’s military technical information in peacetime, how effectively one can disrupt the adversary’s military command-and-control information, and how effectively one can utilize one’s own information.’
Kim Jong-il, 2010 about the future of warfare
(remember information = our cyber)

-> dev. big cyber presence
(also important for fundraising: cyberattacks e.g. help fund nuclear dev)

According to South Korean sources, North Korean leader Kim Jong-un views cyber power as central to modern political and military competition

Reportedly has a cyber army of 7,000 personnel skilled in ransomware, cyber bank heists and data espionage

From 2014 onwards, experts detected, and attributed to North Korea, a series of complex extortion schemes and attacks on financial institutions and cryptocurrency dealers. A UN report in 2019 estimated that the gains from such operations totalled US$2 billion

In 2020 the UN Security Council Sanctions Committee on North Korea published a detailed report on the country’s criminal activities in cyberspace, which consisted of stealing money from banks to fund the nuclear-weapons and missile-development programs that are subject to UN sanctions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

North Korea - Nov 2014 Sony Pictures Attack

A

President Obama promises ‘proportional’ response – several days later North Korean internet goes down for 9.5 hours – unclear if it was a US counterattack

Sony computer system experienced extensive and debilitating attack

Company employees unable to use their computers, forced to shut down the entire system

Group named ‘Guardians of the Peace’ claim credit for attack, citing objection to an upcoming Sony comedy about North Korea – The Interview

Attack conducted in several stages: denial of service attacks, leaks of unreleased films, leaks of internal information including personnel files, leak of financial data

Sony cancels opening of the film
US Government publicly charges North Korea as responsible

  • cyber forensics = difficult, but US gov said it was really clear

US Treasury overtly responds with additional economic sanctions
(shows you don’t have to respond with cyber means)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hack-and-Leak (2016 US Presidential Election)

A

emails from officials were leaked
-> convenient for Clinton to explain why they lost, it was bc intervention

Russia’s intelligence services conducted cyber operations against targets associated with the 2016 US presidential election, including targets associated with both major US political parties.

Russian messaging strategy blended covert intelligence operations—such as cyber activity—with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or “trolls”

Russian military intelligence relayed material it acquired from the Democratic National Committee and senior Democratic officials to WikiLeaks

17
Q

intro - space

A

space been around for a long time, but increasingly important
most attention to space security just since the last 15y

In recent years, US and other countries raise profile of Space within their militaries

  • US first established a Space Command in 1985
  • Upgraded to full military service in 2019 (space force created by Trump)
  • 2020: France renames Air Force to become Air and Space Force
  • 2021: UK establishes a Space Command
  • 2021: Germany creates a Space Command

In 2019, NATO Allies adopt Space Policy and recognize space as a new operational domain, alongside air, land, maritime and cyberspace

18
Q

Outer Space Treaty

A

1967

states parties to the treaty undertake not to place in orbit around the Earth any objects carrying nuclear weapons or any other kinds of weapons of mass destruction, install such weapons on celestial bodies, or station weapons in outer space in any other manner

  • concerns abt arming satellites with nuclear weapons: don’t have to launch, can just drop at any time
  • SU and US agreed they wouldn’t put nukes in space
19
Q

military use of space

A

US first uses satellites in Vietnam war

Maintains three space programs (NASA civil space; National Reconnaissance Office spy satellites, military satellites for communications, navigation, early warning)

  • spy satellites most important satellites in the cold war: to find out what exactly was going on = as early warning systems

Satellite reconnaissance completely changes nuclear (and international) landscape – provides stability in arms race, facilitates arms control, reduces fear of sneak attack

after 1991:
Become more central to warfighting during 1991 Gulf War, especially to enable communications and GPS guided precision strikes

Key Trend: Anti-satellite weapons + massive growth in commercial use of space (and military reliance on private sector satellites)

  • raises question if anti-satellite weapons are useful as there are so many satellites + it creates debree that makes it diff to put up new satellites
  • blowing stuff up in space is frowned upon

China 2007 ASAT test, Russia 2021 ASAT test

But so many commercial satellites this may negate effectiveness of ASAT systems

Low Earth Orbit satellites more likely targets but cause significant debris

Attacks on ground-based systems instead

To go after Geostationary Earth Orbit nuclear command and control satellites would risk nuclear escalation

20
Q

satellites

A

crucial for intelligence: not so worried about sudden attacks, know where the enemy is, better targeting

= changed nature of the cold war, did take a while

(originally satellites took pics and had to be sent to earth to be seen)

before (1950s): vliegtuigplaatje slides, weet de naam niet?

last 15y: increased attention to space bc increasing size of activity there

  • has big implications for what militaries can do with the assets in space
21
Q

GEO, MEO, LEO

A
  • most activity in the LEO (low earth o..) = e.g. Musk satellites
  • nuclear satellites etc. is at the GEO level = far in outer space
  • important bc anti-satellite weapons mostly for LEO rather than GEO bc attacks on common satellites in the lower orbits not immediately seen as act of war
22
Q

space - Ukraine War

A

satellites crucial for Ukraine

most importantly: intelligence + keeping Ukraine’s communications going when Russia is attacking it

also valuable for providing data for drones and other missile strikes

  • Commercial satellite imaging delivers crucial intelligence to Ukraine
  • Starlink satellites provide connectivity for Ukrainian military and vital for drone strikes

war began with huge Russian offensive
Himars project: Ukrainian artillery can shoot further and more accurately than Russia -> Russia’s offensive to a hold

  • system operates with real-time data passed to military base in Germany with access to spy satellites -> communicate location and details -> can attack
23
Q

US threatens to cut Starlink access in Ukraine if no rare earth minerals deal signed

A

shutting of Starlink for Ukraine would be catastrophic, massive blow (niet onoverkombaar)

= used as blackmailing for peace negotiations

24
Q

space - another major security problem from space

A

“here to save the day”

Space security is not only looking down to earth from space!

Also need to think about protecting earth from asteroids and comets (Near Earth Objects)

Not only nuclear war and climate change can produce extinction level effects!

-> might it be useful to keep some nukes around for planetary defense?

25
Q

Starfish Prime - exploding things in space

A

tests over the years: this was the first one

US exploded nuke in space over the pacific
-> started to understand electromagnetic pulse: if you launch enough of these the effect is so big you can can potentially make the entire (nuclear( control system of the adversary

July 1962 high-altitude (280 miles above sea level) 1.45 megaton nuclear test 900 miles away from Hawaii

Results in Electromagnetic Pulse (EMP) that affects Hawaii

Also damages one third of satellites then in orbit

26
Q

Reagan and Strategic Defense Initiative - Star Wars

A

proposal for laser that would be send from earth, be reflected from a mirror in space and then go back to earth surface

Initiates land and space-based strategic missile defense program in 1983

Reagan refuses to abandon it as part of US-Soviet arms control

  • Probably helped delay end of Cold War and prevented deeper cuts = probably plays into why we still have nukes now?

had immediate effect on SU?

27
Q

satellites and missile defense

A

!!this process is still ongoing, new things we can do with satellites

Originally satellites only allowed for systems to detect missile launches; now able to accurately track

System reliant on hundreds of satellites in low earth orbit designed to track advanced missile threats through all phases of flight

Feeds intelligence/tracking data

  • decoys can be identified and taken down

Increases ability of interceptors to hit, potentially to include separating decoys from real missiles

28
Q

impact of AI on security: some examples

A
  • Automated targeting/behavioral prediction
  • Create/detect fake media + deep fakes
  • Support decision-making through virtual assistants (emerging for military uses)
  • Attack other side’s AI systems
  • Command and control of drone swarms

Ukraine: manual drones

fear of the future = thousands of drones being operated by AI over a battle field

-> race in massively producing/developing drones + race between offense and defense

29
Q

AI in Russia-Ukraine War

A

2025 “will significantly increase the percentage of autonomous drones with targeting. We might see the first real drone swarm uses, though not on a massive scale. The first steps will happen.”
- Mykhailo Fedorov, Ukrainian Minister of Digital Transformation (guy who set up Ukraine IT Army)

  • Ukraine massive increase in drone production capacity
  • maybe 2025 the year to use it
  • combine drones and AI and you have a very lethal weapon

in general terms: mainstream consensus that Ukraine is more effective in using AI in this war than Russia, Russia has means but hasn’t employed it in useful/decisive ways

AI is used to geolocate and analyze open-source data such as social media content to identify Russian soldiers, weapons, systems, units or their movements

Neural networks are used to combine ground-level photos, video footage from numerous drones and UAVs, and satellite imagery to provide faster intelligence analysis and assessment to produce strategic and tactical intelligence advantages

= useful for intelligence, targeting, communication, more efficient than human analysis

Private companies support Ukrainian targeting by providing timely information from satellites and social media feeds to visualize friendly and enemy positions, to understand troop movements and to conduct battlefield damage assessments

Ukrainian cyber defenses were successful due to advances in AI-enhanced threat intelligence and the quick distribution of protective software to cloud services and other computer networks

30
Q

AI in Isreal-Gaza

A

May 2021: 11-day bombing campaign against Hamas labelled Israel’s ‘First AI War’

Use of AI tools for identifying targets for potential strikes

Speeds up intelligence analytical process:

  • Lavender system uses data to rank people = 0-100 ranking, if you are high you are likely Hamas or militant
  • identifying adversaries

Speeds up decision-making

  • IDF used to take a team of 20 to review and approve a single strike
  • IDF today approving hundreds per week

Many examples highlight problems of faulty data and algorithms

+ Israel’s Iron dome is so succesfull bc it operates at much faster rate: targeting incoming missiles

31
Q

next generation technology - quantum revolution?

A

2010s scientific community started talking about it
recently much investment -> why?
can have tremendous effect on lots of stuff (e.g. cracking codes, detecting submarines)

Emerging Quantum revolution is at hand

Expected to revolutionize sensing, imaging, precise positioning, navigation and timing, communications, computing, etc.

It will transform cybersecurity
Potential to protect data (make it un-hackable)

Or, potential to crack codes
Quantum sensors can allow underground mapping, see around corners, make oceans transparent

Can be used to detect submarines and stealth aircraft

  • if we can track nuclear submarines, it makes that component of deterrence irrelevant/useless
32
Q

conclusion

A

all domains are connected: there is no thing as cyber deterrence or cyber war, there is a cyber domain of war and of deterrence

  • you can’t separate what goes on in space from what is going on on the ground

Broad security concepts of war, deterrence, etc. can be applied to cyberspace

Cyberspace can be viewed as its own domain but it rarely exists separate from other domains

This is also true of the Space domain – e.g. hard to separate deterrence of attacks in space from broader problem of deterrence on earth

MAIN = No indication any single domain is ‘decisive’ – e.g. a ‘victory’ in cyberspace does not equate with a victory in war

  • no silver bullets that crack the case

Advances in AI and Quantum tech likely to have important implications for the military in decades ahead BUT unlikely to completely change the nature of war and conflict

  • advances in offensive come with same advances in defensive area
  • it will be new, but he doesn’t think it will change anything decisively

(lot of attention to deterrence, bc unclear what the law does with new developments)