Professional Documents
Culture Documents
Indeed, altering the data available to enemy forces represents a key part of military cyberstrategies, a
development the Pentagon has laid out in its official doctrines. The Defense Departments Joint
Publication 3-13, on information warfare, explains that cybercapabilities can be used to deny or
manipulate enemy decision-making, including by altering the contents of messages. According
to a 2010 report by the Swedish Defense Research Agency, the manipulation of information and data
represents an offshoot of the Russian military doctrine of maskirovka or camouflage, concealment,
and deception.
Moscow has already demonstrated its willingness to use data manipulation in its military conflicts with
Ukraine and Georgia. Cyberattacks linked to Russia that targeted Ukraines 2014 election included the
publication of a hoax chart claiming a strong result for a far-right candidate, the Wall Street
Journal reported this month. Prior to the Russian invasion of Georgia in 2008, pro-Moscow hackers
defaced a website belonging to then-Georgian President Mikheil Saakashvili and posted images of
him with Hitler.
In the future, you are going to see nation-states try to pull off data manipulation attacks against one
another leading up to a conflict, said Martin Stytz, an associate research professor at Georgetown
University and a retired U.S. Air Force lieutenant colonel. Its just another tool in the toolbox. It gives
you just too much advantage.
Conceptually, computer security experts tend to describe their work in terms of ensuring the
availability, confidentiality, and integrity of data. Distributed denial-of-service attacks, such as those
U.S. officials say Iran launched on major American banks in 2013, affected the availability of
information by taking down online banking services. Breaking into a banks computer systems and
stealing customer information, such as the breach of JP Morgan Chase in 2014, affects the
confidentiality of information. Attacks on availability and confidentiality have gotten the lions share of
attention, Kanuck said, when integrity issues could pose just as great a problem.
Indeed, the effort by the United States and Israel to cripple Irans ability to enrich uranium with a
cyberweapon shows how data manipulation can serve as a complex attack on physical infrastructure.
The first version of that virus, known as Stuxnet, attempted to damage centrifuges enriching uranium
by slightly raising the pressure in the devices, causing them to break. It included an ingenious piece of
deception to ensure that the plant managers at Natanz wouldnt notice the rising pressure levels.
Stuxnet recorded a set of pressure data and then replayed it to the control room as it was carrying out
the sabotage just like a Hollywood thief records closed-circuit footage of an empty hallway leading
to a vault and then plays it back during the heist.
Countries with significant offensive cybercapabilities China, Iran, Russia, and North Korea, among
them have almost certainly analyzed the code and could pull off a copycat attack, according to
experts who have studied the malware.
Not that it would be easy to pull off, according to Ralph Langner, an industrial security expert whose
firm works to protect nuclear power plants, steel mills, and other complex plants from cyberattacks. He
authored the early, definitive analyses of Stuxnet, and his work illustrates how difficult it is to use
cyberweapons to destroy physical objects. Whoever provided the required intelligence may as well
know the favorite pizza toppings of the local head of engineering, his 2013 report on Stuxnet notes.
Any idiot can manipulate data in some way once they have the access, Langner told FP. To cause
physical destruction, however, the hacker must be able to engineer an attack, requiring a deep
understanding of how complex industrial systems function.
The future, Langner explained in his 2013 report, is burdened by an irony: Stuxnet started as nuclear
counter-proliferation and ended up [opening] the door to proliferation that is much more difficult to
control: The proliferation of cyber weapon technology. So as criminal groups increasingly operate in
cyberspace and cyberweaponry becomes increasingly available, sophisticated alteration attacks,
including those that target physical infrastructure, begin to seem less far-fetched.
Manipulation of data also has a far simpler, earlier analogue on the history of computer breaches.
Mikko Hypponen, the chief research officer at F-Secure, said Rogerss and Clappers statements
reminded him of so-called data-diddling attacks in the late 1990s and early 2000s. Those attacks
targeted Excel files and would randomly alter data entries, say, up or down five percent. If such a
document contained manufacturing tolerances for a plant, random alterations could have devastating
impacts.
Such a simple attack illustrates the virtues of a subtle, slow approach. When Iranian hackers targeted
Saudi Aramco, the oil company, in 2012 and wiped the hard drives of 30,000 computers, the results
were devastating and immediately apparent. Recovering from such an attack means merely
restoring back-ups, assuming such copies were made anyway.
According to FireEye, it typically takes around 200 days for a company to discover that its computers
have been breached, and, in that time, an attacker altering data can make changes that a company
may not be able to recover from. When was everything still OK? When was the data that we should
return to? Six months ago? How do we go back six months? said Jani Antikainen, summing up the
questions a company faced with such an attack will ask itself.
Antikainen believes Clapper and Rogers have identified a real threat moving forward and is the
founder of Sparta Consulting, a Finland-based company set up to take advantage of what he sees as
a market opportunity. His firm helps companies protect databases from manipulation. In an indication
that firms are perhaps reaching the same conclusions as American spies, Antikainen said he counts
the company that manages the Finish electrical grid as one of his clients.
Photo credit: JACQUES DEMARTHON/AFP/Getty Images
Posted by Thavam