SlideShare a Scribd company logo
1 of 14
Hacking The
Bomb
Dr. Andrew Futter, ajf57@le.ac.uk
Associate Professor of International Politics,
University of Leciester, UK.
@andrewfutter
Introduction: The Cyber-Nuclear Nexus
Questions abound:
– Could hackers break into systems and cause a nuclear
launch or prevent weapons being used?
– Could systems be spoofed electronically, and operators and
decision makers tricked into making wrong and potentially
fatal decisions?
– Could nuclear secrets be vulnerable to cyber-spies and
would-be proliferators?
– And in what ways might they do this?
– What exactly does the threat look like, and what is
vulnerable in what ways and to whom?
– How much of the hype should be believed?
– And what are the best ways to manage this challenge?
“Three decades after the sci-fi film was released, had
the War Games scenario finally become reality?”
1. Cyber is Contested; This Causes Problems
There is no one accepted definition of “cyber”, and analysts and
even states often talk past each other when using the term:
– For some, cyber is actions through the internet, for others it is
bound up with information warfare, while it could refer to the
current information age that we are living in.
– This makes understanding, let alone responding, very
difficult.
– It is also often leads to hype and worst-case scenario
thinking.
It is probably best to think of cyber as comprising a set of tools
or operations as well as a broader context.
– The question then is not so much which cyber technologies
can do what – although this is clearly important. But rather,
how the changed context alters the way that we understand
and interact with the world, and thus, how nuclear weapons
are thought about and managed.
Because of this it often makes more sense in practice to work
backwards from the phenomenon, threat or challenge being
analysed and use that as a basis for cyber analysis.
– There is even a case for getting rid of the term cyber all
together…
“As far as the cyber, … we
should be better than anybody
else, and perhaps we're not.”
“The security aspect of cyber is
very, very tough. And maybe
it's hardly do-able. But I will
say, we are not doing the job we
should be doing, but that's true
throughout our whole
governmental society. We have
so many things that we have to
do better, Lester and certainly
cyber is one of them.”
Donald Trump, 2016
2. Cyber and Nuclear are Different
It is common to compare cyber and nuclear and seek to draw
lessons from our nuclear past to inform our cyber future. But
the often-used analogy is flawed:
1. The major difference is the extent of the damage that either can
cause
2. Targets are likely to be different; with a few exceptions,
sophisticated cyber-attacks will have to be specialised and rely on
prior knowledge of the target.
3. There is no tradition of non-use, obvious means of verification or
MAD in cyberspace.
4. Part of the reason for this is the importance of transparency
5. The vast majority of cyber operations fall well below what we might
consider as military or warfare, and it is often more useful to view
cyber as a context rather than as a weapon or tool.
“The tendency to view the two as
equivalent leads to dangerous and
erroneous comparisons and
recommendations.”
Weapons of
Mass
Disruption
Weapons of
Mass
Destruction
Temporary:
Stuxnet
Huge casualties:
Hiroshima &
Nagasaki
Specialized Indiscriminate
Ongoing Nuclear taboo/
non-use
Secret Transparent
Crime &
Nuisance
Warfare &
Strategic
3. Some Cyber Challenges are Inherent
Although we tend to associate cyber threats with hacking and weapons, a
major component of the challenge is inherent
There are two reasons for this;
– The delicate balance of nuclear systems between always being ready to be
used but never by accident or without authorisation means they will never be as
secure as they might be, and;
– The more complex these systems become, the more likely they are to go wrong
– this can be thought of as “normal nuclear accidents”.
The challenges of the digital age are exacerbating rather than fundamentally
transforming issues of nuclear security and strategy.
– A good example of what might go wrong is the problems experienced at
NORAD in the 1980s where faulty computer chips and the accidental loading of
a training tape caused serious false alarms.
Keeping nuclear systems tightly coupled with warning sensors and ready to
fire at short notice is clearly a big risk in the cyber age.
– This is complicated by the fact that many of today’s nuclear systems are far
more complex and difficult to understand than those of the past.
Nuclear modernisation is a double-edged sword and should not be
pursued automatically or viewed apriori as a good thing.
“Unfortunately,
most warning
systems do not warn
us that they can no
longer warn us.”
Charles Perrow
4. Cyber Threats Are Diverse
Rather than a single cyber threat, we are better thinking of a threat spectrum: ranging from nuisance and
hacking, through crime, espionage, DDoS, up to physical attacks, seeking damage or destruction, and maybe
even warfare.
– Often these are lumped together, creating strawman arguments and a lack of understanding. It also complicates the
response to these challenges.
– The majority of activities in cyberspace occur at the lower end of this spectrum. Only a handful of cyber operations
could be thought of as strategic and causing damage. There has been no cyber warfare.
We can also think of attackers in the nuclear realm as seeking either to enable something – for example, either
directly or indirectly cause a nuclear launch; or seeking to disable systems (i.e. stop them from working through
sabotage or by denying key information).
– In most situations, states are likely to try to carry out disabling attacks, while non-state actors are likely to seek to carry
out enabling actions. These build on and take advantage of measures for positive and negative nuclear control noted
earlier.
States more capable of attacking systems directly, and developing malware, implant it and keep it concealed,
while non-state actors would probably seek to attack systems indirectly – such as by meddling in the information
space - this is because there are often far easier and cheaper methods for terrorist to achieve their aims.
5. Air Gapping is Not a Panacea
There is a common belief that by air gapping systems they will be safe
against cyber attackers. While air gapping makes things harder, these
systems are still vulnerable.
– Stuxnet entered an air-gapped system at Natanz.
Another example is the UK Trident submarines - officials have told me that
they can’t be hacked because once on patrol they are somewhere under
the sea disconnected from computer networks.
– But this overlooks the fact that these submarines have to be designed,
built, and rely on numerous different types of computer systems for
which software and coding has to be written.
– These subs also regularly come into port for upgrades and
maintenance, which offers another opportunity for attackers. While in
port, they are occasionally connected to networks at the base.
– Cyber-attacks need not cause the sub to launch a missile or for it for
explode, but might instead target the reactor, navigation systems, or
other computers essential for its normal functioning.
The increasing dependency on CoTs and software not built in house
presents a risk across the nuclear weapons infrastructure.
– My research suggests that some countries rely on software and
hardware built abroad in their most sensitive systems, including for
nuclear weapons.
6. Espionage and IP theft is the biggest risk
Espionage is by far the biggest cyber threat
• Although the challenge of protecting
operational and design secrets is not new
• A diversification of methods (Internet but also
USB drives etc…)
• “Hoovering" and new economies of scale
Challenge is for both hacking and information and
systems security more generally
• Again air gapping does not equal protection
• The human/ insider threat also remains
key
“Cyber-nuclear espionage” began in the 1980s
• “The Cuckoo’s Egg (1986)
• “Kindred Spirit/ Wen Ho Lee” –W88 (1998)
• Has expanded exponentially since
The implications are however mixed…
7. Deterrence Can Play a Role, But…
The majority of cyber threats are best dealt with through cyber hygiene and good practice,
defence and security, and where necessary law enforcement.
However, it is possible that some cyber operations cross the line and might be considered as
acts of war or as military operations. In these cases, deterrence by punishment could have a
role to play.
– The thing to remember with cyber deterrence is that it applies only in certain circumstances; also, it
is not simply an either-or but rather something that is graduated.
Attribution is often held as the major reason why deterrence can’t work in cyberspace, but
attribution is not zero-sum, and depends on a number of different variables, chief among them
time and forensic capacity.
Where deterrence can become complicated is when considering a proportional response:
– For example, it might be very difficult to respond “in kind” to a cyber-attack, and more likely a state
would simply respond with the most appropriate tools at its disposal.
– This then leads to questions of cross domain deterrence.
Thus, while the idea of threatening nuclear retaliation to a cyber-attack may seem overblown,
as a response to an existential attack or an attack that involves cyber – it is not impossible.
– US, Russian, Chinese and UK deterrence policy all remain underpinned by nuclear weapons. None
have specifically ruled it using nuclear to respond to cyber.
Deterrence by Punishment + Deterrence by Denial
8. Viewing Cyber as “Separate” is Unhelpful
We are unlikely to ever see a pure “cyber war” and we shouldn’t be
tempted to view strategic cyber threats in isolation or as a separate
“domain” of military operations.
– While cyber capabilities may be used on their own for low-level
operations; testing defences, espionage, nuisance etc.; at the
military or strategic level, cyber-attacks will almost certainly be
used in conjunction with other forms of military force, to augment
them, to “prepare the battlefield”, and as a force multiplier.
• This means that we must assume cyber operations will play a
part in all future conflict and crises, but alongside other forces.
At the strategic level, we should think of cyber as a component of a
new suite of advanced non-nuclear weaponry – all of which have
been facilitated by the latest information revolution.
– These systems include ballistic missile defences, various precision
strike weapons, new undersea and space weapons, AI, and more
exotic future capabilities.
– Taken together these advanced non-nuclear forces are creating
considerable pressures for nuclear relations and global nuclear
order.
“We are unlikely
to ever see a pure
cyberwar where
geek fights geek
on an electronic
battlefield.”
James Lewis
9. Cyber Threats are Most Dangerous in a Crisis
Most cyber operations, and even those conducted against nuclear systems,
are likely to be manageable or at least less risky in periods of calm; but will
be exacerbated considerably during a crisis, especially a nuclear one.
1. State actors would likely seek to disable an opponent’s key systems before
military operations – this might involve actions to “prepare the battlefield”
• This will create uncertainty and possibly pressures for pre-emptive
attacks, and potentially fears of “use it or lose it”.
• During conflict, states might also inadvertently attack dual use
systems, or cyber operations might be misinterpreted or spill over
2. Terrorists, other non-state actors or third parties, might seek to interfere in
various ways; spoofing systems; conducting false flag attacks, flooding
the battlefield with misinformation etc., intending to cause a crisis to
escalate.
3. The reliance of modern states and their militaries on computerised
communications systems will make signalling and controlling operations much
more difficult on a cyber-battlefield.
• This is likely to create further problems for crisis management and
possible unintended escalation.
This suggests that what we think we know about nuclear crisis
management needs to be reassessed in light of this new
context.
10. Humans Are a Key Part of the Challenge
Irrespective of the hi-tech nature of the challenges posed by cyber and the way that the threats
are often conceptualised, humans are an are absolutely fundamental part of the puzzle.
» Humans design and build computer systems, write coding and
create software, enter data, operate these machines, and make
decisions based on the information that they provide.
» Humans also unknowingly give away personal information, click on
infected emails, download malware, insert infected drives into
systems and are therefore a key way of “bridging the air gap”.
» Above all, humans are clearly an obvious, and often the easiest
target for would-be attackers. Much easier than seeking to bypass
firewalls, develop and exploit zero-day exploits, or utilise other exotic
ways of jumping the air gap.
» This might either be wittingly in the role of an insider threat or mole or
unwittingly, such as it likely to have been the case with Stuxnet.
» This might involve some sort of cyber social engineering too.
“Ultimately, computers don’t think – at least not yet – they do what they are
programmed to do.”
11. An Emerging Norm of “Hacking the Bomb”?
In the past few years there is has been an increasing recognition that
cyber operations might be used in the strategic and nuclear sphere.
– The discovery of the Stuxnet attack on the Iranian nuclear centrifuges at
Natanz in 2010 is clearly the best example of this, but it is also likely only to
be the tip of the iceberg, and probably only part of a broader cyber and
electronic campaign targeting the Iranian nuclear programme.
– It also seems very likely the similar operations have and are being
conducting against North Korea.
• Last year, suspicions arose that US-led cyber-attacks might be
responsible for a succession of failed North Korean missile launches.
This is part of a plan for US “full spectrum missile defence” where “left of
centre” cyber capabilities will augment traditional kinetic plans for
interception, and at the same time, another component of the US global
strike programme
– The US is ahead at the moment, but it is far from clear that it will remain so
in the longer term, and it is hard to see other leading cyber competitors,
including those potentially hostile to the US and UK won’t follow suit.
These actions risk setting a dangerous precedent and creating a far more
unstable global nuclear environment.
– We could be moving towards an era of mutually unassured destruction or
(MUD)…
“…[global strike] is
probably [the ability
to be] any place on the
face of the earth in an
hour” while the “high
end is any place on the
face of the earth in
about 300 mili-seconds
– that’s cyber.”
US Gen. James
Cartwright
Conclusion and Recommendations
The response to the cyber challenge in the nuclear realm is necessarily multifaceted:
1. There needs to be some sort of agreement on terms and the nature of the threat and perhaps
an accepted glossary.
2. A considerable amount of the challenge might be ameliorated through better cyber hygiene
and good practice – this might even be shared between actors. This also involves recognising
the central role played by humans.
3. The need for cyber and nuclear (and other defence) communities to speak with each other,
possibly across borders.
4. Train and deploy specialists at nuclear facilities, and conduct regular outside red teaming.
5. Establish a cyber global early warning centre to share data, intelligence and good practice
6. Consider the development of certain norms and moratoria – for example, an agreement not to
attack nuclear C2 with cyber – that benefit everyone.
7. Cyber and other emerging technologies with strategic potential should be included in arms
control discussions and taken account of in international agreements. That said the arms
control frameworks of the past may not be the most suitable for today.
In the emerging cyber-nuclear nexus, it makes sense to keep nuclear facilities
simple, separate and secure, and not follow the allure of technological determinism.
“It is suicidal to
create a society
dependent on
science and
technology in
which hardly
anybody knows
anything about
the science and
technology.”
Carl Sagan

More Related Content

What's hot

[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllJarno Limnéll
 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Seungjoo Kim
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?zapp0
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010graywilliams
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of viewS.E. CTS CERT-GOV-MD
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyie-Democracy Conference
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Lumension
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015Major Hayden
 
Nss repko
Nss repkoNss repko
Nss repkorrepko
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other thingsSara-Jayne Terp
 
Narus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperNarus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperTrobough
 
The mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorismThe mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorismNicholas Ayres
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 

What's hot (20)

[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéll
 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyi
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015
 
Nss repko
Nss repkoNss repko
Nss repko
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other things
 
Narus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperNarus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position Paper
 
The mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorismThe mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorism
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 

Similar to [CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter

USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinAFCEA International
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Cyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatCyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatMicrosoft
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
Module 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxModule 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxgilpinleeanna
 
IEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-MassacciIEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-MassacciFabio Massacci
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIOSR Journals
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismNihal Jani
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
 

Similar to [CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter (20)

USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
Case study 11
Case study 11Case study 11
Case study 11
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Cyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatCyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threat
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Module 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxModule 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docx
 
IEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-MassacciIEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-Massacci
 
0857290053.pdf
0857290053.pdf0857290053.pdf
0857290053.pdf
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo PupilloCODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 

Recently uploaded (20)

Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 

[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter

  • 1. Hacking The Bomb Dr. Andrew Futter, ajf57@le.ac.uk Associate Professor of International Politics, University of Leciester, UK. @andrewfutter
  • 2. Introduction: The Cyber-Nuclear Nexus Questions abound: – Could hackers break into systems and cause a nuclear launch or prevent weapons being used? – Could systems be spoofed electronically, and operators and decision makers tricked into making wrong and potentially fatal decisions? – Could nuclear secrets be vulnerable to cyber-spies and would-be proliferators? – And in what ways might they do this? – What exactly does the threat look like, and what is vulnerable in what ways and to whom? – How much of the hype should be believed? – And what are the best ways to manage this challenge? “Three decades after the sci-fi film was released, had the War Games scenario finally become reality?”
  • 3. 1. Cyber is Contested; This Causes Problems There is no one accepted definition of “cyber”, and analysts and even states often talk past each other when using the term: – For some, cyber is actions through the internet, for others it is bound up with information warfare, while it could refer to the current information age that we are living in. – This makes understanding, let alone responding, very difficult. – It is also often leads to hype and worst-case scenario thinking. It is probably best to think of cyber as comprising a set of tools or operations as well as a broader context. – The question then is not so much which cyber technologies can do what – although this is clearly important. But rather, how the changed context alters the way that we understand and interact with the world, and thus, how nuclear weapons are thought about and managed. Because of this it often makes more sense in practice to work backwards from the phenomenon, threat or challenge being analysed and use that as a basis for cyber analysis. – There is even a case for getting rid of the term cyber all together… “As far as the cyber, … we should be better than anybody else, and perhaps we're not.” “The security aspect of cyber is very, very tough. And maybe it's hardly do-able. But I will say, we are not doing the job we should be doing, but that's true throughout our whole governmental society. We have so many things that we have to do better, Lester and certainly cyber is one of them.” Donald Trump, 2016
  • 4. 2. Cyber and Nuclear are Different It is common to compare cyber and nuclear and seek to draw lessons from our nuclear past to inform our cyber future. But the often-used analogy is flawed: 1. The major difference is the extent of the damage that either can cause 2. Targets are likely to be different; with a few exceptions, sophisticated cyber-attacks will have to be specialised and rely on prior knowledge of the target. 3. There is no tradition of non-use, obvious means of verification or MAD in cyberspace. 4. Part of the reason for this is the importance of transparency 5. The vast majority of cyber operations fall well below what we might consider as military or warfare, and it is often more useful to view cyber as a context rather than as a weapon or tool. “The tendency to view the two as equivalent leads to dangerous and erroneous comparisons and recommendations.” Weapons of Mass Disruption Weapons of Mass Destruction Temporary: Stuxnet Huge casualties: Hiroshima & Nagasaki Specialized Indiscriminate Ongoing Nuclear taboo/ non-use Secret Transparent Crime & Nuisance Warfare & Strategic
  • 5. 3. Some Cyber Challenges are Inherent Although we tend to associate cyber threats with hacking and weapons, a major component of the challenge is inherent There are two reasons for this; – The delicate balance of nuclear systems between always being ready to be used but never by accident or without authorisation means they will never be as secure as they might be, and; – The more complex these systems become, the more likely they are to go wrong – this can be thought of as “normal nuclear accidents”. The challenges of the digital age are exacerbating rather than fundamentally transforming issues of nuclear security and strategy. – A good example of what might go wrong is the problems experienced at NORAD in the 1980s where faulty computer chips and the accidental loading of a training tape caused serious false alarms. Keeping nuclear systems tightly coupled with warning sensors and ready to fire at short notice is clearly a big risk in the cyber age. – This is complicated by the fact that many of today’s nuclear systems are far more complex and difficult to understand than those of the past. Nuclear modernisation is a double-edged sword and should not be pursued automatically or viewed apriori as a good thing. “Unfortunately, most warning systems do not warn us that they can no longer warn us.” Charles Perrow
  • 6. 4. Cyber Threats Are Diverse Rather than a single cyber threat, we are better thinking of a threat spectrum: ranging from nuisance and hacking, through crime, espionage, DDoS, up to physical attacks, seeking damage or destruction, and maybe even warfare. – Often these are lumped together, creating strawman arguments and a lack of understanding. It also complicates the response to these challenges. – The majority of activities in cyberspace occur at the lower end of this spectrum. Only a handful of cyber operations could be thought of as strategic and causing damage. There has been no cyber warfare. We can also think of attackers in the nuclear realm as seeking either to enable something – for example, either directly or indirectly cause a nuclear launch; or seeking to disable systems (i.e. stop them from working through sabotage or by denying key information). – In most situations, states are likely to try to carry out disabling attacks, while non-state actors are likely to seek to carry out enabling actions. These build on and take advantage of measures for positive and negative nuclear control noted earlier. States more capable of attacking systems directly, and developing malware, implant it and keep it concealed, while non-state actors would probably seek to attack systems indirectly – such as by meddling in the information space - this is because there are often far easier and cheaper methods for terrorist to achieve their aims.
  • 7. 5. Air Gapping is Not a Panacea There is a common belief that by air gapping systems they will be safe against cyber attackers. While air gapping makes things harder, these systems are still vulnerable. – Stuxnet entered an air-gapped system at Natanz. Another example is the UK Trident submarines - officials have told me that they can’t be hacked because once on patrol they are somewhere under the sea disconnected from computer networks. – But this overlooks the fact that these submarines have to be designed, built, and rely on numerous different types of computer systems for which software and coding has to be written. – These subs also regularly come into port for upgrades and maintenance, which offers another opportunity for attackers. While in port, they are occasionally connected to networks at the base. – Cyber-attacks need not cause the sub to launch a missile or for it for explode, but might instead target the reactor, navigation systems, or other computers essential for its normal functioning. The increasing dependency on CoTs and software not built in house presents a risk across the nuclear weapons infrastructure. – My research suggests that some countries rely on software and hardware built abroad in their most sensitive systems, including for nuclear weapons.
  • 8. 6. Espionage and IP theft is the biggest risk Espionage is by far the biggest cyber threat • Although the challenge of protecting operational and design secrets is not new • A diversification of methods (Internet but also USB drives etc…) • “Hoovering" and new economies of scale Challenge is for both hacking and information and systems security more generally • Again air gapping does not equal protection • The human/ insider threat also remains key “Cyber-nuclear espionage” began in the 1980s • “The Cuckoo’s Egg (1986) • “Kindred Spirit/ Wen Ho Lee” –W88 (1998) • Has expanded exponentially since The implications are however mixed…
  • 9. 7. Deterrence Can Play a Role, But… The majority of cyber threats are best dealt with through cyber hygiene and good practice, defence and security, and where necessary law enforcement. However, it is possible that some cyber operations cross the line and might be considered as acts of war or as military operations. In these cases, deterrence by punishment could have a role to play. – The thing to remember with cyber deterrence is that it applies only in certain circumstances; also, it is not simply an either-or but rather something that is graduated. Attribution is often held as the major reason why deterrence can’t work in cyberspace, but attribution is not zero-sum, and depends on a number of different variables, chief among them time and forensic capacity. Where deterrence can become complicated is when considering a proportional response: – For example, it might be very difficult to respond “in kind” to a cyber-attack, and more likely a state would simply respond with the most appropriate tools at its disposal. – This then leads to questions of cross domain deterrence. Thus, while the idea of threatening nuclear retaliation to a cyber-attack may seem overblown, as a response to an existential attack or an attack that involves cyber – it is not impossible. – US, Russian, Chinese and UK deterrence policy all remain underpinned by nuclear weapons. None have specifically ruled it using nuclear to respond to cyber. Deterrence by Punishment + Deterrence by Denial
  • 10. 8. Viewing Cyber as “Separate” is Unhelpful We are unlikely to ever see a pure “cyber war” and we shouldn’t be tempted to view strategic cyber threats in isolation or as a separate “domain” of military operations. – While cyber capabilities may be used on their own for low-level operations; testing defences, espionage, nuisance etc.; at the military or strategic level, cyber-attacks will almost certainly be used in conjunction with other forms of military force, to augment them, to “prepare the battlefield”, and as a force multiplier. • This means that we must assume cyber operations will play a part in all future conflict and crises, but alongside other forces. At the strategic level, we should think of cyber as a component of a new suite of advanced non-nuclear weaponry – all of which have been facilitated by the latest information revolution. – These systems include ballistic missile defences, various precision strike weapons, new undersea and space weapons, AI, and more exotic future capabilities. – Taken together these advanced non-nuclear forces are creating considerable pressures for nuclear relations and global nuclear order. “We are unlikely to ever see a pure cyberwar where geek fights geek on an electronic battlefield.” James Lewis
  • 11. 9. Cyber Threats are Most Dangerous in a Crisis Most cyber operations, and even those conducted against nuclear systems, are likely to be manageable or at least less risky in periods of calm; but will be exacerbated considerably during a crisis, especially a nuclear one. 1. State actors would likely seek to disable an opponent’s key systems before military operations – this might involve actions to “prepare the battlefield” • This will create uncertainty and possibly pressures for pre-emptive attacks, and potentially fears of “use it or lose it”. • During conflict, states might also inadvertently attack dual use systems, or cyber operations might be misinterpreted or spill over 2. Terrorists, other non-state actors or third parties, might seek to interfere in various ways; spoofing systems; conducting false flag attacks, flooding the battlefield with misinformation etc., intending to cause a crisis to escalate. 3. The reliance of modern states and their militaries on computerised communications systems will make signalling and controlling operations much more difficult on a cyber-battlefield. • This is likely to create further problems for crisis management and possible unintended escalation. This suggests that what we think we know about nuclear crisis management needs to be reassessed in light of this new context.
  • 12. 10. Humans Are a Key Part of the Challenge Irrespective of the hi-tech nature of the challenges posed by cyber and the way that the threats are often conceptualised, humans are an are absolutely fundamental part of the puzzle. » Humans design and build computer systems, write coding and create software, enter data, operate these machines, and make decisions based on the information that they provide. » Humans also unknowingly give away personal information, click on infected emails, download malware, insert infected drives into systems and are therefore a key way of “bridging the air gap”. » Above all, humans are clearly an obvious, and often the easiest target for would-be attackers. Much easier than seeking to bypass firewalls, develop and exploit zero-day exploits, or utilise other exotic ways of jumping the air gap. » This might either be wittingly in the role of an insider threat or mole or unwittingly, such as it likely to have been the case with Stuxnet. » This might involve some sort of cyber social engineering too. “Ultimately, computers don’t think – at least not yet – they do what they are programmed to do.”
  • 13. 11. An Emerging Norm of “Hacking the Bomb”? In the past few years there is has been an increasing recognition that cyber operations might be used in the strategic and nuclear sphere. – The discovery of the Stuxnet attack on the Iranian nuclear centrifuges at Natanz in 2010 is clearly the best example of this, but it is also likely only to be the tip of the iceberg, and probably only part of a broader cyber and electronic campaign targeting the Iranian nuclear programme. – It also seems very likely the similar operations have and are being conducting against North Korea. • Last year, suspicions arose that US-led cyber-attacks might be responsible for a succession of failed North Korean missile launches. This is part of a plan for US “full spectrum missile defence” where “left of centre” cyber capabilities will augment traditional kinetic plans for interception, and at the same time, another component of the US global strike programme – The US is ahead at the moment, but it is far from clear that it will remain so in the longer term, and it is hard to see other leading cyber competitors, including those potentially hostile to the US and UK won’t follow suit. These actions risk setting a dangerous precedent and creating a far more unstable global nuclear environment. – We could be moving towards an era of mutually unassured destruction or (MUD)… “…[global strike] is probably [the ability to be] any place on the face of the earth in an hour” while the “high end is any place on the face of the earth in about 300 mili-seconds – that’s cyber.” US Gen. James Cartwright
  • 14. Conclusion and Recommendations The response to the cyber challenge in the nuclear realm is necessarily multifaceted: 1. There needs to be some sort of agreement on terms and the nature of the threat and perhaps an accepted glossary. 2. A considerable amount of the challenge might be ameliorated through better cyber hygiene and good practice – this might even be shared between actors. This also involves recognising the central role played by humans. 3. The need for cyber and nuclear (and other defence) communities to speak with each other, possibly across borders. 4. Train and deploy specialists at nuclear facilities, and conduct regular outside red teaming. 5. Establish a cyber global early warning centre to share data, intelligence and good practice 6. Consider the development of certain norms and moratoria – for example, an agreement not to attack nuclear C2 with cyber – that benefit everyone. 7. Cyber and other emerging technologies with strategic potential should be included in arms control discussions and taken account of in international agreements. That said the arms control frameworks of the past may not be the most suitable for today. In the emerging cyber-nuclear nexus, it makes sense to keep nuclear facilities simple, separate and secure, and not follow the allure of technological determinism. “It is suicidal to create a society dependent on science and technology in which hardly anybody knows anything about the science and technology.” Carl Sagan