Cyber Operations -  Jerry M. Couretas

Cyber Operations (eBook)

A Case Study Approach
eBook Download: EPUB
2024 | 1. Auflage
320 Seiten
Wiley (Verlag)
978-1-119-71211-4 (ISBN)
Systemvoraussetzungen
111,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Cyber Operations

A rigorous new framework for understanding the world of the future

Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. Improving both user security and quality of life demands a rigorous, farsighted approach to cyber operations.

Cyber Operations offers a groundbreaking contribution to this effort, departing from earlier works to offer a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed.

Cyber Operations readers will also find:

  • Detailed discussions of case studies including the 2016 United States Presidential Election, the Dragonfly Campaign, and more
  • Coverage of cyber attack impacts ranging from the psychological to attacks on physical infrastructure
  • Insight from an author with top-level experience in cyber security

Cyber Operations is ideal for all technological professionals or policymakers looking to develop their understanding of cyber issues.

Jerry M. Couretas, PhD, is Lead Associate for Booz Allen Hamilton and manages the Cyber Mission Modeling project for the United States Office of the Secretary of Defense (OSD). He is also the Editor-in-Chief of the Journal of Defense Modeling and Simulation.


A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. Improving both user security and quality of life demands a rigorous, farsighted approach to cyber operations. Cyber Operations offers a groundbreaking contribution to this effort, departing from earlier works to offer a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed. Cyber Operations readers will also find: Detailed discussions of case studies including the 2016 United States Presidential Election, the Dragonfly Campaign, and more Coverage of cyber attack impacts ranging from the psychological to attacks on physical infrastructure Insight from an author with top-level experience in cyber security Cyber Operations is ideal for all technological professionals or policymakers looking to develop their understanding of cyber issues.

Section I
Cyber Operations Introduction


Cyber attacks can produce nightmare scenarios. For example, a 2015 Lloyd’s of London study, “Business Blackout,” showed a possible 93 million Americans, across 11 states and the District of Columbia, being without power due to a cyber attack, costing an estimated $243 Billion, $1 Trillion in the most stressing scenario (Trevor Maynard, 2015). This is a factor of 25 times more than the $10 billion NotPetya attack in 2017 that brought global trade to a standstill (Greenberg, 2017).

In addition to catastrophic scenarios, we now have ransomware gangs, criminals, attacking critical infrastructure targets, and holding them hostage. For example, Russian ransomware gangs became famous for attacking critical infrastructure in Brazil (JBS Foods), Costa Rica (Government IT), and the United States (Colonial Oil, NEW Cooperative) in 2021. These critical infrastructure targets are considered strategic due to the life sustaining necessity of keeping these services available.

In the following Section I chapters, we will cover cyber operations in terms of their phased development. This includes a brief history of ISIS operations, and then Russia, in an overview of the use of cyber operations for tactical and strategic effects (Chapter 1). Chapter 2 includes a look at ISIS using cyber as a maneuver space in transitioning through the phases of an insurgency, maturing to a Phase III insurgent with a firm base in Raqqa, Syria. And Chapter 3 includes a review of criminal cyber, including the development of ransomware.

Nation‐state operations are introduced in Chapter 4, including a description of the research, development, and clandestine operational resources applied to their cyber operations. This is followed by chapters on Russia, China, North Korea, and Iran in order to compare/contrast the different countries’ policy implementations of cyber operations. This Section’s examples span the current history and development of cyber operations. This progression spans from early hactivism to current political uses of social media platforms. Section I also includes examples from simple, experimental hacks, to nation‐state operators performing cyberspace espionage and information operations (IO) (Table I.1).

As shown in Table I.1, cyber operations have often included nation‐state interest, with “The Cuckoo’s Egg” (Stoll, 2005) documenting the Former Soviet Union (FSU) use of hackers to attempt to steal U.S. military secrets near the end of the Cold War (Chapter 4). The near success described in “The Cuckoo’s Egg,” in the late 1980s, likely inspired Russian operators to continue their cyber collection pursuits, eventually succeeding with Operation Moonlight Maze in the mid‐1990s.

Table I.1 Cyber Operations Development – 1980s to Present Day.

Time Period Stage Examples
1980s to late 1990s Hacking and Experimentation
  • 1988 Morris Worm
  • 1989 Cuckoo’s Egg – example of Russian KGB collecting on U.S. Star Wars program (Former Soviet Union)
  • 1998 Moonlight Maze (Russian Federation)
  • 1998 Honker Union Hackers (1998 Indonesia, 2001 U.S. White House web page) (China)
Early 2000s to mid‐2010s Development
  • 2002 Titan Rain (China)
  • 2007 Estonia Denial of Service (DoS) (Russia)
  • 2008 Georgia Multi‐Domain (Russia)
  • 2010 Stuxnet attack on Iran’s nuclear program
  • 2010 Wikileaks (State Department Cables)
  • 2011 DigiNotar (Iran)
  • 2011–2016 ISIS emergence from the Internet
  • 2014 Ukraine Denial of Service (DoS) (Russia)
≥mid‐2010s Implementation
  • 2014 – present Ukraine cyber kinetic attack (Russia)
  • 2014 Mosul Offensive broadcast live on Twitter (ISIS)
  • 2014–2018 “Big Data” exfiltrations (China)
  • 2016 U.S. Presidential election attack (Russia)
  • 2016 Bangladesh Bank (DPRK)
  • 2017 NotPetya (Russian Federation)
  • 2017 WannaCry (DPRK)
  • 2019 Great Cannon (China)
≥mid‐2020 Proliferation
  • 2021 Colonial Pipeline Attack, JBS Foods …
  • 2022 Counter Protest (Iran)

During this hacking and experimentation period of networked computers, we will also looked at potentially damaging hacks (Chapter 9). For example, the Jester Worm (1997), the Slammer Worm (2003), and the Sobig Worm (2003) were examples of critical infrastructure denial capabilities. These hacks produced effects that included shutting down telephony systems, nuclear reactors, trains, telephones, and air traffic control systems.

While hackers have provided worst‐case scenarios by literally shutting off critical parts of our infrastructure, nation‐states have also leveraged their hackers to develop cyber capabilities. For example, while Russia (Chapter 5) started with the use of cyber for espionage, China (Chapter 6) developed a little differently. Starting in the late 1990s, China’s hackers self‐organized to deface Indonesian Government web sites (in 1998) in order to protest attacks on ethnic Chinese (Nuttall, 1998). Similarly, in 1999, Chinese hackers attacked U.S. Government web sites in order to protest the bombing of the Chinese embassy in Serbia (Messmer, 1999). Chinese hackers also attacked U.S. Government web sites in 2001 to protest a PRC plane colliding with a U.S. spy plane (Tang, 2001). China then matured this capability for wide scale collection a few years later, in the form of Operation Titan Rain from 2003 to 2007.

And, while China was conducting its first widespread cyber collection campaign (i.e., Operation Titan Rain) Russia incorporated cyber into all‐domain operations, initially using Denial of Service (DoS) in Estonia (2007), and expanding the use of cyber to include information operations in Georgia (2008). Russia subsequently developed the Gerasimov doctrine (2013) and then integrated cyber kinetic operations in their 2014 annexation of Crimea (Greenberg, 2019).

As introduced in Chapter 4, and elaborated on in Chapters 5 through 8, there are approximately 50 nation‐state‐level advanced persistent threat (APT) teams that are currently accounted for (Mandiant). Within this number are crypto currency operators, ransomware group members, tool suppliers, and other support folks working for foreign intelligence services who are contributing to the cause. Independent cyber operators, discussed in Chapter 9, can also provide strategic effects. For example, we reviewed Wikileaks’ publishing classified U.S. military documents, State Department cables, Panamanian corporate charters, and Democratic National Committee e‐mails – each of which led to geopolitical change.

I.1 Phases of Cyber Operations


As discussed in the preceding chapters, cyber operations to date have transitioned in roughly three phases over the development from hackers to nation‐state and professional ransomware cyber operations. This includes Internet development (1980s–2002), operations experimentation (2003–2012), and professional cyber operations (2013 to present).

I.1.1 1980s–2002


Even before the roll out of personal computers, hacking was a game of wits between the hacker and machine. Early incarnations of the Internet (e.g., Arpanet) included thousands of networked computers. It was only a matter of time before a determined hacker would test the limits of this new, networked, cyber world. The popular movie “WarGames” (Badham, 1983) raised awareness about the dangers of computers and led to policy makers writing the Computer Fraud and Abuse Act (Congress, 1986). It was only a few years later, in 1988, that this law was used to prosecute Robert Tappan Morris for the damages that his “Morris Worm” perpetrated on the early Internet.

Due to the government’s use of the pre‐Internet to connect government and university computers, one of the first documented cyber operations included the KGB experimenting with the use of West German hackers to steal information on the U.S. Star Wars missile defense system in the 1980s.

In 1984, Judge Greene broke up the AT&T monopoly, decentralizing telecommunications initially into seven regional companies. This led to opportunities for developing operating system and routing companies to enter a new market space. A few years later Microsoft went public (1986). In addition, Cisco, one of the first big Internet routing companies, went public in 1990. These are the companies that provide the building blocks for the current Internet.

At the same time that telecommunications, personal computers, and networking were rapidly changing, the geopolitical order was also put in flux with the fall of the Soviet Union (1991). This included changes in the military/political landscape. While Russia started working its way toward a non‐Soviet system, client states (e.g., DPRK, Iraq) lost their super power sponsorship.

1991 was also the year that the United States, along with a coalition, expelled Saddam Hussein’s Iraq...

Erscheint lt. Verlag 8.4.2024
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
ISBN-10 1-119-71211-4 / 1119712114
ISBN-13 978-1-119-71211-4 / 9781119712114
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)
Größe: 4,4 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Discover tactics to decrease churn and expand revenue

von Peter Armaly; Jeff Mar

eBook Download (2024)
Packt Publishing Limited (Verlag)
25,19
A practical guide to probabilistic modeling

von Osvaldo Martin

eBook Download (2024)
Packt Publishing Limited (Verlag)
35,99
Unleash citizen-driven innovation with the power of hackathons

von Love Dager; Carolina Emanuelson; Ann Molin; Mustafa Sherif …

eBook Download (2024)
Packt Publishing Limited (Verlag)
35,99