Tikalon Blog is now in archive mode.
An easily printed and saved version of this article, and a link
to a directory of all articles, can be found below: |
This article |
Directory of all articles |
Cyber Warfare
November 10, 2011
Since the time that
Robert T. Morris launched the first
Internet-destroying worm in 1988, it's been apparent that patient
programmers will find ways to compromise nearly anything attached to the
Internet. The Morris Worm was a wakeup call to
DARPA, which immediately established the
Computer Emergency Response Team Coordination Center (CERT/CC) at
Carnegie Mellon University.
It's not just individual programmers who cause havoc. Nation states may be ramping up offensive capabilities in software attack. Just last year, the
Stuxnet computer worm that affects industrial control software apparently caused significant problems to
Iran's uranium enrichment facilities. There is speculation that Iran was the
specific target of the Stuxnet worm.[1]
Was Stuxnet the first strike in a new cyber war? Apparently, things like this have been going on for quite a while.
Thomas C. Reed, a former
Secretary of the US Air Force who was a member of
US President Ronald Reagan's National Security Council, revealed in his 2004 book,
At the Abyss: An Insider's History of the Cold War, that the US used a similar tactic against the
Soviet Union in 1982.[2]
In that case, software designed to run pumps, turbines and valves for a
natural gas pipeline was compromised to force operation outside design parameters. "The result," wrote Reed, "was the most monumental non-nuclear explosion and fire ever seen from space," although the truth of the matter is
not certain.
Bring out the big guns!
A cyber cannon.
(Base image via Wikimedia Commons))
Much computer development during
World War II was a direct consequence of one form of cyber warfare,
cryptanalysis. The
UK government's Bletchley Park operation is where
Alan Turing developed the
Bombe, an
electromechanical code-breaking computer. Such work trained the first generation of computing machine builders.
The US may have defeated the
Axis Powers in World War II, but the Soviet Union appeared as the next threat; and this new threat moved quickly. A Russian youth group presented an impressive wood carving of the US Seal, approximately two feet in diameter, to
U.S. Ambassador, Averell Harriman, on August 4, 1945. It was on the wall of the ambassador's
Moscow home office until 1952, at which time it was discovered to be
bugged; that is, it contained a listening device.[3]
Replica of the 'bugged' 1946 US Seal on display at the US National Cryptologic Museum
(Via US National Security Agency Web Site).[3])
The
Great Seal Bug is interesting from an
electrical engineering standpoint.
Battery power was not an option, of course, since the battery could not be replaced, so the bug was a passive device. The ingenious device, as designed by
Léon Theremin, was somewhat like today's
RFID devices. An
quarter-wavelength antenna would detect a
carrier wave from a remote
transmitter, and this wave was
phase modulated by a
condensor microphone for detection by a remote
receiver. The operating
frequency was about 330
MHz.
Forewarned by such electronic eavesdropping, the US government promulgated what's called the
TEMPEST standard in the late 1960s. The object of this standard was to
shield electronic devices so that information would not be leaked to the outside.
Radio frequency emissions were so large for early computing equipment that they interfered with radios and televisions.
As exposed in 1985 by
Dutch computer researcher, Wim van Eck, it's quite easy to eavesdrop on computers using
emissions from their display devices.
Other research has demonstrated that even
light-emitting diodes on computing equipment can leak information.
It's not surprising that governments are using sophisticated
signals intelligence (SIGINT) systems to monitor Internet,
cellphone and other information sources. The supposed code name for such eavesdropping by western nations is
Echelon. So much has been written about Echelon that it's hard to separate the wheat from the chaff. There have been
reports that it's been used for
industrial espionage.
The composite losses from cybercrime, industrial espionage and industrial sabotage, as estimated by computer security companies, reportedly stand at a trillion dollars.[4-5] In that case, this really is war, since this is more than the
financial cost for the US of the war in Iraq. What is known with more certainty is the amount of money spent on
cyber security, estimated to be about $100 billion per year.[4-5]
The US response to cyber threats against its national infrastructure is the
United States Cyber Command, as I reported in a
previous article (The US Cyber Command, July 14, 2010). The military is rightly concerned, since much of its purchases are COTS (
Commercial-Off-the-Shelf) products like those sold to consumers. Most of the electronic gadgets sold in the US are manufactured in other countries.
There's also the problem of increased software content in military products. It's reported that
Lockheed's F-35 stealth fighter, scheduled to be introduced in 2016, has systems that use 20 million lines of code.[4-5]
One defensive move for many would be to migrate to
Free and Open Source Software (FOSS), such as
Linux. You can only be certain what your executable code does if you have the
source code, and free distribution of the code puts it in front of many independent reviewers. As
Linus' Law states, "Given enough eyeballs, all bugs are shallow."
References:
- Valentina Pop, "There's a computer worm in your nuclear centrifuge," EU Observer, October 11, 2011.
- Matt Loney, "US software 'blew up Russian gas pipeline'," Builderau.au.com, March 2, 2004.
- National Cryptologic Museum - Virtual Tour
- Misha Glenny, "The cyber arms race is on, as nations large and small mobilize to protect themselves and their enemies if provoked," Pittsburgh Post Gazette, October 23, 2011.
- Misha Glenny, "The Cyber Arms Race Has Begun," The Nation, October 11, 2011.
Permanent Link to this article
Linked Keywords: Robert T. Morris; Morris worm; Internet-destroying worm in 1988; programmer; Internet; DARPA; CERT; Computer Emergency Response Team Coordination Center; Carnegie Mellon University; Stuxnet; Iran; uranium enrichment; Thomas C. Reed; Secretary of the US Air Force; US President Ronald Reagan; National Security Council; At the Abyss: An Insider's History of the Cold War; Soviet Union; natural gas pipeline; Wikimedia Commons; World War II; cryptanalysis; Government of the United Kingdom; Bletchley Park; Alan Turing; Bombe; electromechanical; Axis Powers; U.S. Ambassador, Averell Harriman; Moscow; Covert listening device; bug; National Cryptologic Museum; US National Security Agency; Great Seal Bug; electrical engineering; battery power; Leon Theremin; RFID device; quarter-wavelength antenna; carrier wave; transmitter; phase modulation; condensor microphone; radio receiver; frequency; MHz; TEMPEST; Faraday cage; shield; Radio frequency emission; Dutch; Van Eck phreaking; light-emitting diode; signals intelligence; cellphone; Echelon; industrial espionage; cyber security; United States Cyber Command; Commercial-Off-the-Shelf; COTS; Lockheed's F-35 stealth fighter; Free and Open Source Software; Linux; source code; Linus' Law.