Lecture 7: Cyber and Space Flashcards
Cybergeddon
Cybergeddon refers to a catastrophic, widespread cyberattack that disrupts critical infrastructure, economies, and global security, causing massive and potentially irreversible damage.
cyber security
not isolated anymore, Human societies going through sea change in communications.
Stakeholders include businesses, government agencies, civil society
Cyber Deterrence
Cyber Deterrence
- Refers to the use of cyber operations to deter actions in other domains or prevent adversary cyber operations.
- Involves using cyber punishment, defensive activities, and retaliatory actions to raise the costs of adversary attacks, as well as using non-cyber threats to deter cyber-attacks.
cyberspace
“Global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers”
Cyber War
“hostile actions in cyberspace that have effects that amplify or are equivalent to major kinetic violence”
* Utilized by state and non-state actors: Hamas, Isis, against Israel etc.
* Involves direct attacks in cyberspace that are not necessarily aimed at military forces per se, but are directed at opponents digitally enabled systems in general
* Usually launched in tandem with conventional military operations (e.g. during Russo-Georgia war)
* Can also be utilized in peacetime (Stuxnet attack causes physical damage in Iranian nuclear centrifuges)
* These types of acts are rare compared to financial crimes, espionage, and information operations (e.g. hybrid or grey zone war) – more than half of all cyber operations are aimed at collecting information or disseminating information
–> gray zone, and not necessarily any form of war.
Cyber power and non-state actors
- Groups such as ISIS use digital technologies to recruit, train, fundraise and purchase supplies
- ISIS only able to conduct small-scale denial of service attacks
- Terrorist attacks produce shock (explosions, casualties) whereas cyber operations take time, money, and technical skill
- Terrorist groups focus on what is cheap, noticeable and deadly
Russian cyberattacks on Estonia (2007)
Russian attacks followed decision by Estonian government to move Soviet-era statue and graves
Cyber campaign over several weeks includes denial of service, attacks on government websites, banks and media organizations
Concurred alongside street protests by ethnic Russians living in Estonia
Estonia does not invoke NATO’s Article 5
After attack Estonia makes major investments in cyberdefense (public and private sector)
–> NATO had not really thought about it before. It invested money in cybersecurity: now leader in building of those technologies.
Ukraine’s IT Army
- After 2022 Ukraine emerges as 12th biggest cyber power; Russia ranks third
- IT Army created on 26 February 2022 as part of Ministry of Digital Transformation
- Hundreds of thousands of supporters aid Ukraine
- Manages by a team of senior military and intelligence officers
- Use distributed denial-of-service attacks and other cyber-attacks against Russia’s digital infrastructure (banks, businesses, government websites)
- Imposes economic costs on Russian businesses but also places limits on some civilian targets (e.g. hospitals)
- Ukraine cybersecurity supported by firms such as Microsoft, Google, and Amazon
Ukraine developed a lot and got a lot of help. They created an IT army: 300,000 supporters around the world in support of Ukraine and securing their banks and businesses.
How does North Korea use cyber operations?
North Korea’s 7,000-strong cyber army conducts ransomware attacks, bank heists, and espionage to fund its nuclear and missile programs, raising an estimated $2 billion by 2019.
1967 Outer Space Treaty
The 1967 Outer Space Treaty was an agreement between the US and Soviet Union (SU), along with other nations, to prevent the placement of nuclear weapons in outer space and ensure space would be used for peaceful purposes. It also prohibited military bases or installations on celestial bodies.
Military use of space
- US first uses satellites in Vietnam war
- Maintains three space programs (NASA civil space; National Reconnaissance Office spy satellites, military satellites for communications, navigation, early warning)
- Satellite reconnaissance completely changes nuclear (and international) landscape – provides stability in arms race, facilitates arms control, reduces fear of sneak attack
- Become more central to warfighting during 1991 Gulf War, especially to enable communications and GPS guided precision strikes
- Key Trend: Anti-satellite weapons + massive growth in commercial use of space (and military reliance on private sector satellites)
- China 2007 ASAT test, Russia 2021 ASAT test
- But so many commercial satellites this may negate effectiveness of ASAT systems
- Low Earth Orbit satellites more likely targets but cause significant debris
- Attacks on ground-based systems instead
- To go after Geostationary Earth Orbit nuclear command and control satellites would risk nuclear escalation
Ukraine war and satellites
Commercial satellite imaging offers vital intelligence to Ukraine.
Starlink satellites provide connectivity for the Ukrainian military, supporting drone strikes.
Satellites are essential for gathering intelligence and making progress against Russian forces.
´´here to save the day´´
- Space security is not only looking down to earth from space!
- Also need to think about protecting earth from asteroids and comets (Near Earth Objects)
- Not only nuclear war and climate change can produce extinction level effects!
Starfish Prime (1962)
A 1.45 megaton nuclear test detonated 280 miles above sea level, generating an Electromagnetic Pulse (EMP) that affected Hawaii and damaged one-third of satellites in orbit at the time
What was Reagan’s Strategic Defense Initiative (SDI) and its impact?
The SDI, initiated in 1983, was a missile defense program aimed at protecting the U.S. from nuclear missile attacks using land and space-based systems. Reagan’s refusal to abandon it during arms control talks likely delayed the end of the Cold War and prevented deeper nuclear weapons reductions.
How is AI used in the Russia-Ukraine War?
AI is used by Ukraine for geolocation and analysis of open-source data (e.g., social media) to identify Russian forces and movements. Neural networks analyze drone footage and satellite imagery to provide faster intelligence. Private companies assist by visualizing positions and assessing battlefield damage. AI also enhances Ukrainian cyber defense by enabling quick distribution of protective software. Russia is developing AI for analysis and data gathering but hasn’t deployed it effectively yet.
What role did AI play in the May 2021 Israel-Gaza conflict?
In the May 2021 conflict, Israel’s military, the IDF, used AI tools to identify and target Hamas. The AI sped up the intelligence analysis and decision-making processes, allowing hundreds of strikes to be approved weekly. The Lavender system ranked individuals based on data to assist in targeting decisions, significantly reducing the time previously needed for review. However, the use of AI raised concerns due to potential issues with faulty data and algorithms.