Read Cybersecurity and Cyberwar Online

Authors: Peter W. Singer Allan Friedman,Allan Friedman

Cybersecurity and Cyberwar (46 page)

W
HODUNIT? THE
P
ROBLEM OF
A
TTRIBUTION

“Holy Grail of a botnet”
Mark Bowden,
Worm: The First Digital World War
(New York: Atlantic Monthly Press, 2011), p. 228.

whoever designed it was Ukrainian
For more on this, see Bowden,
Worm
.

over 12 million computers
Teresa Larraz, “Spanish ‘Botnet' Potent Enough to Attack Country: Police,” Reuters, March 3, 2010,
http://www.reuters.com/article/2010/03/03/us-crime-hackers-idUSTRE6214ST20100303
.

deniable, but directed, attack
Jeff Carr, “Russia/Georgia Cyber War—Findings and Analysis,” Project Grey Goose, October 17, 2008,
http://www.scribd.com/doc/6967393/Project-Grey-Goose-Phase-I-Report
.

“Attacks can be ‘crowd sourced'”
Bryan Krekel, “Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation,” Northrop Grumman Corporation, October 9, 2009.

2008 Olympics in Beijing
Brian Grow and Mark Hosenball, “Special Report: In Cyberspy vs. Cyberspy, China Has the Edge,” Reuters, April 14, 2011,
http://www.reuters.com/article/2011/04/14/us-china-usa-cyberespionage-idUSTRE73D24220110414
.

compelling proof
Commonwealth vs. Michael M. O'Laughlin
, 04-P-48 (A. C. MA 2005),
http://www.truthinjustice.org/o'laughlin.htm
.

“We could not poinpoint the attacks”
Ronald Deibert, “Tracking the Emerging Arms Race in Cyberspace,”
Bulletin of the Atomic Scientists
67, no. 1 (January–February 2011): pp. 1–8,
http://bos.sagepub.com/content/67/1/1.full
.

lacked “absolute certainty”
Office of the National Counterintelligence Executive, “Foreign Spies Stealing US Economic Secrets in Cyberspace,” October 2011,
http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf
, accessed August 11, 2013.

“Harry Pota”
“‘Harry Pota' and the Wizards of Unit 61398,”
Australian
, February 23, 2013, p. 1.

W
HAT
I
S
H
ACTIVISM?

“World Wide Web War I”
Craig S. Smith, “May 6–12; The First World Hacker War,”
New York Times
, May 13, 2001,
http://www.nytimes.com/2001/05/13/weekinreview/may-6-12-the-first-world-hacker-war.html
.

Ohio high schools
Jeffrey Carr,
Inside Cyber Warfare
(Sebastopol, CA: O'Reilly Media, 2009), p. 2.

“potentially harmful consequences”
Nancy R. Mead, Eric D. Hough, and Theodore R. Steney III, “Security Quality Requirements Engineering (SQUARE) Methodology CMU/SEI-2005-TR-009,” Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, November 2005,
http://www.cert.org/archive/pdf/05tr009.pdf, accessed August 11, 2013
.

Stop Huntingdon Animal Cruelty
Chris Maag, “America's #1 Threat,”
Mother Jones
, January–February 2006,
http://www.motherjones.com/politics/2006/01/americas-1-threat
.

caterers and cleaners
Kate Sheppard, “Are Animal Rights Activists Terrorists?”
Mother Jones
, December 21, 2011,
http://motherjones.com/environment/2011/12/are-animal-rights-activists-terrorists
.

“every critical relationship”
Christopher Schroeder, “The Unprecedented Economic Risks of Network Insecurity,” in
America's Cyber Future: Security and Prosperity in the Information Age
, vol. 2, edited by Kristin M. Lord and Travis Shard (Washington, DC: Center for a New American Security, June 2011), p. 172.

sprayed in the eyes
Senate Committee on Environment and Public Works, “Eco-terrorism Specifically Examining the Earth Liberation Front and the Animal Liberation Front,” testimony of John E. Lewis, Deputy Assistant Director, Federal Bureau of Investigation, May 18, 2005,
http://epw.senate.gov/hearing_statements.cfm?id=237817
.

F
OCUS:
W
HO
I
S
A
NONYMOUS?

“a world of hurt”
Spencer Ackerman, “‘Paranoia Meter' Is HBGary's Plot to Find the Pentagon's Next WikiLeaker,”
Danger Room
(blog),
Wired
, April 3, 2011,
http://www.wired.com/dangerroom/2011/04/paranoia-meter-hbgarys-plot-to-find-the-next-pentagon-wikileaker/
.

“don't mess with Anonymous”
Ibid.

“embarrassing laundry”
“Aaron Barr: Pervert or Vigilante?”
Crowdleaks
, last modified March 24, 2011,
http://crowdleaks.org/aaron-barr-pervert-or-vigilante/
.

“beatdown”
Quinn Norton, “How Anonymous Chooses Targets,”
Threat Level
(blog),
Wired
, July 3, 2012,
http://www.wired.com/threatlevel/2012/07/ff_anonymous/all/
.

“Anyone who wants to can be Anonymous”
Chris Landers, “Serious Business: Anonymous Takes On Scientology (and Doesn't [sic] Afraid of Anything),”
Baltimore City Paper
, April 2, 2008,
http://www.citypaper.com/columns/story.asp?id=15543
.

“ultra-coordinated motherfuckery”
Norton, “How Anonymous Chooses Targets.”

supposedly secretive group
Mike Isaac, “Facebook and Twitter Suspend Operation Payback Accounts,”
Forbes
, December 8, 2010,
http://blogs.forbes.com/mikeisaac/2010/12/08/facebook-and-twitter-suspend-operation-payback-accounts/
.

“Internet vigilante group”
Gus Kim, “Internet Justice?” Global News, CanWest Global Communications, December 8, 2007.

websites knocked offline
Matthew Lasar, “KISS Frontman on P2P: Sue Everybody. Take Their Homes, Their Cars,”
Ars Technica
, December 20, 2010,
http://arstechnica.com/tech-policy/news/2010/10/kiss-frontman-we-should-have-sued-them-all.ars
.

“Two clandestine non-state groups”
Paul Rexton Kan, “Cyberwar in the Underworld: Anonymous versus Los Zetas in Mexico,”
Yale Journal of International Affairs
, February 26, 2013,
http://yalejournal.org/2013/02/26/cyberwar-in-the-under-world-anonymous-versus-los-zetas-in-mexico/
.

“noisy political demonstration”
“WikiLeaks Cyber Backlash All Bark, No Bite: Experts,”
Vancouver Sun
, December 11, 2010.

“this is Lexington”
Steven Swinford, “WikiLeaks Hackers Threaten British Government,”
Daily Telegraph
, December 10, 2010,
http://www.telegraph.co.uk/news/worldnews/wikileaks/8193210/WikiLeaks-hackers-threaten-British-Government.html
.

T
HE
C
RIMES O
T
OMORROW,
T
ODAY:
W
HAT
I
S
C
YBERCRIME?

“crime which may exist in the future”
Neil Ardley,
School, Work and Play (World of Tomorrow)
(New York: Franklin Watts, 1981), pp. 26–27.

unique to electronic networks
European Commission, “Towards a General Policy on the Fight against Cyber Crime,” May 2007,
http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_organised_crime/l14560_en.htm
, accessed August 11, 2013.

clumsy fingers
Tyler Moore and Benjamin Edelman, “Measuring the Perpetrators and Funders of Typosquatting,” in
14th International Conference on Financial Cryptography and Data Security
, Tenerife, Spain, January 25–28, 2010,
http://link.springer.com/chapter/10.1007%2F978-3-642-14577-3_15?LI=true
.

$100 million business
Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, et al., “The Underground Economy of Fake Antivirus Software,” in
10th Workshop on the Economics of Information Security
, Fairfax, VA, June 14–15, 2011,
http://www.cs.ucsb.edu/~chris/research/doc/weis11_fakeav.pdf
.

opiate painkillers
Damon McCoy, Andreas Pitsillidis, Grant Jordan, et al., “Pharmaleaks: Understanding the Business of Online Pharmaceutical Affiliate Programs,” in
Proceedings of the 21st USENIX Conference on Security Symposium
, Bellevue, WA, August 8–10, 2012,
http://cseweb.ucsd.edu/~savage/papers/UsenixSec12.pdf
.

“wagers for the Super Bowl”
Gregory J. Rattray and Jason Healey, “Non-state Actors and Cyber Conflict,” in
America's Cyber Future: Security and Prosperity in the Information Age
, vol. 2, edited by Kristin M. Lord and Travis Shard (Washington, DC: Center for a New American Security, 2011), p. 71.

“online betting houses”
Brian Phillips, “Soccer's New Match-Fixing Scandal,”
Grantland
, February 7, 2013,
http://www.grantland.com/story/_/id/8924593/match-fixing-soccer
.

American free speech protections
European Commission, “Towards a General Policy on the Fight against Cyber Crime.”

“100 different sources of data”
Ross Anderson, Chris Barton, Rainer Bohme, et al., “Measuring the Cost of Cybercrime,” presented at the 11th Annual Workshop on the Economics of Information Security WEIS 2012, Berlin, June 25–26, 2012,
http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf
.

bank or paint maker
Dave Paresh, “Some Companies Looking at Retaliating against Cyber Attackers,”
LA Times
, May 31, 2013.

more useful endeavors
Ibid.

“Million-dollar crimes”
James Andrew Lewis, “The Threat,”
Government Executive
43, no. 10 (August 15, 2011): p. 19.

“credit card fraud scheme”
United States of America v. Rogelio Hackett Jr
., no. 1:11CR96 (E.D. Va.) April 21, 2011.

a mere $200
McAfee presentation to authors, 2011.

“Selection of countries is free”
Thomas Holt, “Exploring the Economics of Malicious Software Markets,” National Institutes of Health presentation, 2011.

“toleration if not support”
Ibid.

“clutching a computer cassette”
Ardley,
School, Work and Play
, pp. 26–27.

S
HADY
R
ATS AND
C
YBERSPIES:
W
HAT
I
S
C
YBER
E
SPIONAGE?

exfiltrating key data
Dmitri Alperovitch,
Revealed: Operation Shady RAT
(white paper, Santa Clara, CA: McAfee, 2011), p. 3.

2008 Beijing Olympics
Ibid., p. 6.

“high-speed connection”
Lewis, “The Threat,” p. 18.

digital espionage
Ibid.

Hainan Island in China
Krekel, “Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation.”

F-35 fighter jet's design
Lewis, “The Threat,” p. 18.

midst of a test flight
Siobhan Gorman, August Cole, and Yochi Dreazen, “Computer Spies Breach Fighter-Jet Project,”
Wall Street Journal
, April 21, 2009,
http://online.wsj.com/article/SB124027491029837401.html
.

“it will kill a lot of us”
Jason Healey, “The Cyber 9/12 Project: The Role of Media in a Cyber Crisis,” remarks at the Atlantic Council, Washington DC, June 1, 2012.

“indigenous industry”
Mark Clayton, “The New Cyber Arms Race,”
Christian Science Monitor
, March 7, 2011,
http://www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race
.

“Fortune Global 2000 firms”
Alperovitch,
Revealed
, p. 2.

$630 iPhone
Horace Dediu, “An iPhone Profit Paradox,”
Business Spectator
, February 29, 2012,
http://www.businessspectator.com.au/article/2012/2/28/technology/iphone-profit-paradox
.

“easiest way to innovate”
Grow and Hosenball, “Special Report.”

furniture in China
David Leonhardt, “The Real Problem with China,”
New York Times
, January 11, 2011.

direct and veiled accusations
“China Denies Pentagon Cyber-Raid,” BBC News, September 4, 2007,
http://news.bbc.co.uk/2/hi/6977533.stm
.

18 have direct ties
Personal data set from Economic Espionage Act prosecutions.

“96 percent”
Tony Romm, “Report Fuels China CyberSpying Concerns,”
Politico
, April 23, 2013,
http://www.politico.com/story/2013/04/china-industrial-cyberspy-cybersecurity-espionage-90464.html
.

“Cold War mentality”
Ibid.

“unprecedented transfer of wealth”
Alperovitch,
Revealed
, p. 3.

too small to be fatal
Lewis, “The Threat,” p. 18.

“death by a thousand cuts”
James Fallows, “Cyber Warriors,”
Atlantic
, March 2011.

CrowdStrike
Joseph Menn, “Security Firm CrowdStrike Hires U.S. Air Force Info-Warfare Expert,”
Chicago Tribune
, October 29, 2012,
http://articles.chicagotribune.com/2012-10-29/business/sns-rt-us-cybersecurity-offensivebre89s17g-20121029_1_crowdstrike-steven-chabinsky-alperovitch
.

H
OW
A
FRAID
S
HOULD
W
E
B
E OF
C
YBERTERRORISM?

“clandestine agents”
Margaret Rouse, “Cyberterrorism,”
Search Security
, May 2010,
http://searchsecurity.techtarget.com/definition/cyberterrorism
, accessed August 11, 2013.

Other books

The Wolf Sacrifice by Rosa Steel
A Girl's Best Friend by Jordan, Crystal
Luke by Jill Shalvis
Wings of Destruction by Victoria Zagar
Tempted by Rebecca Zanetti
Shake a Crooked Town by Dan J. Marlowe
Character Driven by Derek Fisher, Gary Brozek
Alien Storm by A. G. Taylor
Match Play by Merline Lovelace
Internal Affair by Marie Ferrarella


readsbookonline.com Copyright 2016 - 2024