The topic of cyber espionage is something I have spent a lot of time researching in my academic career. The role of cyber-espionage eroding US military and economic power is a issue affecting the entire field of cybersecurity. The most prominent example is the data breach caused by Chinese hackers that resulted in the plans for the F-35 being stolen [1]. This breach removed a strategic military advantage from the US. This document has a focus on the role of competitive advantages being manipulated by cyberspace. I believe the document articulates the role of cyber-espionage well, “Despite advances in cybersecurity, cyber espionage continues to offer threat actors a relatively low-cost, high-yield avenue of approach to a wide spectrum of intellectual property.” Just this week the US has indicted six Russian intelligence operatives (GRU employees) for their alleged role in multiple cyber campaigns [2]. Russia will continue their operations in cyberspace regardless of the attributions against them. China operates in a similar vein. The DOD has unmasked and filed multiple indictments against members of the People’s Liberation Army for cyber-crimes, but the actions continue. Cyber-espionage will continue to be a major issue facing US and Western power. The offensive operations countries like China and Russia are able to prey of the US advantages. Protection for the US will be extremely difficult when there are still private companies falling victim to MEOW attacks via unsecured databases of customer information [3]. The role and acceptance of cloud networks private companies handling US data has presented multiple different avenues of attack for US opponents. Two recent cases of cyber-attacks targeting US firms related to the government are the breaches impacting IPG Photonics, lead laser developer and US government software provider Tyler Technologies [4] [5]. I believe we will hear more about these breaches impacting US advantages in due time. An important quote from this document accurately details the threat environment the US faces in cyber from a political perspective, “We anticipate that China, Russia, and Iran will remain aggressive and capable collectors of sensitive U.S. economic information and technologies, particularly in cyberspace.” It is important to note that private cyber criminals also pose a threat to US advantages.
I have included sources below for additional reading.
1. F-35 Plans
2. US Indictment of six Russian Nationals of Cybercrime
I would be interested to hear your thoughts on the Clean Network Program proposed by Pompeo. Do you think this is an effective plan to protect our National Security against Chinese involvement in US telecommunications?
Diving into today’s reading it is clear that cyberspace is one area that should be protected because so much of our daily life revolves around technology. The Cyber realm is so vast and complex and ever-evolving that no matter where someone looks you can see the effects of cyberspace anywhere. You can see the effects of cyberspace extend from a military aspect to health care to mental health to even personal aspects of our daily life such as turning our heat on at home, talking to people at our front door, starting our car, or turning on lights. That being said, anything that is connected to the cyber realm is at risk of being hacked so security is of paramount concern. One issue I have been following is the healthcare concern for internal pacemakers. Pacemakers are not being able to be monitored via the internet by your doctor, what is to stop someone from hacking into the software and potentially hurting someone severely. This is just one of the many concerns or issues revolving around cyberspace, artificial intelligence, and other technologies of today’s world. The three main adversaries I expected to be mentioned in this document were mentioned. China is a hot topic currently in the cyber arena because of the current issue with China stealing user’s data from applications on their phones. Russia is also a known cyber player as well from the accusation of interference in U.S. elections. Lastly, Iran being a major player with oil, It would make sense that the threat of information regarding other ventures outside of the oil industry being targeted. Overall, this is a very fascinating topic to look into.
A case that I thought you would be interested in is the BlueLeaks hack. There was a primary one in 1996 but again this June exposing the personal data of 700,000 police officers. This was collected from over 250 law enforcement sites and shows cyber attacks as a threat not only to the federal government's information, but also to law enforcement officers down to the local level.
The example of pacemakers is a perfect example of the potential vulnerabilities of the internet of things. Going forward, we will definitely need to concern ourselves with potential attacks against people's homes, personal medical devices, and also potentially people's methods of transportation. All of these could seriously stunt the economic capacity of the United States.
The BlueLeaks Hack is a very interesting example of an attack on the US. It is also interesting that the June leak did not come from a foreign entity, but rather a non-state organization known as Anonymous. I would be interested to hear what @Roy Rashke and @Nathan Danko think about this attack. Specifically some of the ways it could have been prevented as well as the impacts that it could have moving forward.
@Madeline Smith Blueleaks is an interesting case study. Local police departments are commonly targeted with phishing attacks as they hold valuable PII on both the employees and the citizens they interact with from a legal perspective. I would not be surprised if forums and online sites designed for police officers were targeted at an increased rate during the summer protests. As for the recent attack, I am curious to see what Anonymous will do with the stolen data in the future. I am sure there are multiple entities with deep pockets interested in the data.
My main concern for cyber-attacks towards law enforcement is when threat actors begin attacking with the intent to gain access to police hardware. Law Enforcement agencies have been known to purchase expensive hardware with unique purposes such as Stringray designed to mimic a cellphone tower providing the agents with a way to collect phone-calls from the area of deployment. What damage could be done if threat actors gain access to the stingray itself or to the data storage of the calls. For the purpose of general education on Stingray Phone Trackers I have included the Wikipedia page below. The same could be said for shooter/gunfire detection systems or facial recognition systems.
Cyber espionage is a growing threat likely to aid in overtaking the conventional methods of war due to its low cost and high opportunity to cause damage. Some of the most malicious attacks that exemplify this shift in war strategy were the hack on the Office of Personnel Management in 2013 and 2014 by the Chinese, the BlackEnergy and NotPetya attacks by Sandworm in Russia on Ukraine in 2015-2017, and obviously Stuxnet in 2010 created by the US and Israel to target Iran. Protecting our nation's data is becoming more and more important although it is a seemingly harder and harder task. Russia leads the world in persistence and severity of attacks but China is a close second, innovating technology for data collection and corruption. This is only expected to be expedited with their growing military, political, and economic power and heightened animosity towards the US. Here I have linked a paper I posted on LinkedIn that discusses the future of the United States and China from a cybersecurity standpoint. The United States Government, specifically Secretary of State Pompeo, has been implementing a program called the Clean Network that disallows Chinese produced technology pieces, specifically by Huawei, to be used in the United States. This is said to protect national security and deter Chinese involvement in American telecommunication.
In another election year, it will also be interesting to monitor illegal Russian participation with reports that it has already interfered.
I agree that many countries are definitely beginning to shift away from traditional means of attacks towards cyber-attacks. I took a look at the Clean Network and it seems like a great initiative to control Chinese influence over 5G. I think supporting only trusted partners, such as AT&T, Taiwan Mobile, and SK Telecom, is the best way to assure that China does not gain a monopoly over emerging technologies and gain the ability to survey personal information and technological developments around the world. It is great to see foreign countries, such as Poland, Albania, and Japan joining this effort. Combatting Chinese influence in the technological sphere will require cooperation with our allies and with multi-national corporations alike.
@Jay Rosato Restrictions on Huawei and Chinese 5G are a big debate in among European countries right now. Each member state has the final say on whether or not the company will be involved in the development of its 5G networks, but the EU has encouraged the 27 to avoid what it refers to as "high-risk vendors."
Countries like Poland, The Czech Republic, and Slovakia have signed pacts with Washington to ban Huawei. Others like Sweden, Hungary, and Spain see no security issues with its use. The Danish and French governments have not enacted a ban, but discourage its proliferation.
With the world becoming more digitalized and relying more and more on cyberspace, cyberterrorism has become a real threat to security. A recent example of how large of an impact cyberthreats could play is the 2017 Equifax Data Breach, which affected more than 147 million people. Many government officials believe that this cyberattack was initiated by the Chinese government or People's Liberation Army but the Chinese Communist Party (CCP) denies these claims. This cyberattack exposed how vulnerable the American population is to an cyberattack and how dangerous it could be. If a cyberthreat hits major companies that the US population and government rely on, it could have catastrophic results on the economy, safety and privacy of US citizens.
The Equifax Data Breach really was terrible and shows the potential of a foreign government to wreak havoc on citizens of the US. There are numerous examples of the US getting caught flat-footed by foreign entities. In most of these instances, it is the US people who are most affected. The Equifax Data Breach also demonstrates the need for the government to cooperate with private institutions in order to fully combat cyberattacks. It is too easy to steal the information of thousands of people from the thousands of organizations people interact with. Even a department store like Target holds information of thousands of US consumers. A foreign entity could potentially damage the American economy and possibly even conduct espionage based on data that is loosely protected by private organizations.
I find the Internet of Things to be one of the most interesting concepts of the technological revolution. While it creates many conveniences, it also opens up the floodgates for potential threats. Now, a malicious entity can not only steal your identity, but also potentially lock you out of your house, turn on your lights, and potentially even take remote control over your car. It is good to see that this document mentions the Internet of Things as a prime security concern. Especially considering we may soon have entire cities reliant on the web. Attacks on these networks could cause substantial damage to the US economy.
The emergence of the Internet of Things requires not only preparation by the US government agencies but also preparation by private companies. Most of these smart technologies will be developed by companies like Google, Amazon, or Microsoft, not the government. If these companies do not cooperate with the federal government to assure the security of these networks, then our entire livelihoods will be vulnerable to hackers. For example, this past March, Microsoft confirmed that 1.2 million Microsoft accounts were compromised in January of 2020. These companies and the consumers who use these companies' platforms must engage in more rigorous security tactics to prevent utter disaster. The threat to the well-being of individual Americans posed by nation-states or rogue actors against poorly secured private networks remains very real. Any US cybersecurity plan must account for the security of private networks. Not doing so opens to door for any country or rogue actor to cause substantial damage to the economy.
I was also slightly disappointed to see North Korea largely omitted from this document. While China and Russia may pose larger potential threats, North Korea demonstrated when it hacked Sony in 2014 that it was willing and able to cause substantial damage to the economic well-being of the world. Unlike Russia, China, and Iran, North Korea has very little to lose and may act incredibly aggressively in the cyber field. When looking at foreign nations that pose a threat to US economic interests, North Korea must be treated as a legitimate threat.
The internet of things is definitely a very interesting aspect of cybersecurity because it affects people at a much more personal level. Attaching everyday applications to the internet opens them up the attacks and vulnerabilities that they would otherwise be guarded against. Systems like Google Home have gotten hacked which allows hackers to listen in to the conversations in your home and compromise security that way as well.
The topic of cyber espionage is something I have spent a lot of time researching in my academic career. The role of cyber-espionage eroding US military and economic power is a issue affecting the entire field of cybersecurity. The most prominent example is the data breach caused by Chinese hackers that resulted in the plans for the F-35 being stolen [1]. This breach removed a strategic military advantage from the US. This document has a focus on the role of competitive advantages being manipulated by cyberspace. I believe the document articulates the role of cyber-espionage well, “Despite advances in cybersecurity, cyber espionage continues to offer threat actors a relatively low-cost, high-yield avenue of approach to a wide spectrum of intellectual property.” Just this week the US has indicted six Russian intelligence operatives (GRU employees) for their alleged role in multiple cyber campaigns [2]. Russia will continue their operations in cyberspace regardless of the attributions against them. China operates in a similar vein. The DOD has unmasked and filed multiple indictments against members of the People’s Liberation Army for cyber-crimes, but the actions continue. Cyber-espionage will continue to be a major issue facing US and Western power. The offensive operations countries like China and Russia are able to prey of the US advantages. Protection for the US will be extremely difficult when there are still private companies falling victim to MEOW attacks via unsecured databases of customer information [3]. The role and acceptance of cloud networks private companies handling US data has presented multiple different avenues of attack for US opponents. Two recent cases of cyber-attacks targeting US firms related to the government are the breaches impacting IPG Photonics, lead laser developer and US government software provider Tyler Technologies [4] [5]. I believe we will hear more about these breaches impacting US advantages in due time. An important quote from this document accurately details the threat environment the US faces in cyber from a political perspective, “We anticipate that China, Russia, and Iran will remain aggressive and capable collectors of sensitive U.S. economic information and technologies, particularly in cyberspace.” It is important to note that private cyber criminals also pose a threat to US advantages.
I have included sources below for additional reading.
1. F-35 Plans
2. US Indictment of six Russian Nationals of Cybercrime
3. Meow Attack
4. IPG Photonics
https://www.databreaches.net/leading-u-s-laser-developer-ipg-photonics-hit-with-ransomware/
5. Tyler Technologies
https://krebsonsecurity.com/2020/09/govt-services-firm-tyler-technologies-hit-in-apparent-ransomware-attack/
Diving into today’s reading it is clear that cyberspace is one area that should be protected because so much of our daily life revolves around technology. The Cyber realm is so vast and complex and ever-evolving that no matter where someone looks you can see the effects of cyberspace anywhere. You can see the effects of cyberspace extend from a military aspect to health care to mental health to even personal aspects of our daily life such as turning our heat on at home, talking to people at our front door, starting our car, or turning on lights. That being said, anything that is connected to the cyber realm is at risk of being hacked so security is of paramount concern. One issue I have been following is the healthcare concern for internal pacemakers. Pacemakers are not being able to be monitored via the internet by your doctor, what is to stop someone from hacking into the software and potentially hurting someone severely. This is just one of the many concerns or issues revolving around cyberspace, artificial intelligence, and other technologies of today’s world. The three main adversaries I expected to be mentioned in this document were mentioned. China is a hot topic currently in the cyber arena because of the current issue with China stealing user’s data from applications on their phones. Russia is also a known cyber player as well from the accusation of interference in U.S. elections. Lastly, Iran being a major player with oil, It would make sense that the threat of information regarding other ventures outside of the oil industry being targeted. Overall, this is a very fascinating topic to look into.
Cyber espionage is a growing threat likely to aid in overtaking the conventional methods of war due to its low cost and high opportunity to cause damage. Some of the most malicious attacks that exemplify this shift in war strategy were the hack on the Office of Personnel Management in 2013 and 2014 by the Chinese, the BlackEnergy and NotPetya attacks by Sandworm in Russia on Ukraine in 2015-2017, and obviously Stuxnet in 2010 created by the US and Israel to target Iran. Protecting our nation's data is becoming more and more important although it is a seemingly harder and harder task. Russia leads the world in persistence and severity of attacks but China is a close second, innovating technology for data collection and corruption. This is only expected to be expedited with their growing military, political, and economic power and heightened animosity towards the US. Here I have linked a paper I posted on LinkedIn that discusses the future of the United States and China from a cybersecurity standpoint. The United States Government, specifically Secretary of State Pompeo, has been implementing a program called the Clean Network that disallows Chinese produced technology pieces, specifically by Huawei, to be used in the United States. This is said to protect national security and deter Chinese involvement in American telecommunication.
In another election year, it will also be interesting to monitor illegal Russian participation with reports that it has already interfered.
With the world becoming more digitalized and relying more and more on cyberspace, cyberterrorism has become a real threat to security. A recent example of how large of an impact cyberthreats could play is the 2017 Equifax Data Breach, which affected more than 147 million people. Many government officials believe that this cyberattack was initiated by the Chinese government or People's Liberation Army but the Chinese Communist Party (CCP) denies these claims. This cyberattack exposed how vulnerable the American population is to an cyberattack and how dangerous it could be. If a cyberthreat hits major companies that the US population and government rely on, it could have catastrophic results on the economy, safety and privacy of US citizens.
I find the Internet of Things to be one of the most interesting concepts of the technological revolution. While it creates many conveniences, it also opens up the floodgates for potential threats. Now, a malicious entity can not only steal your identity, but also potentially lock you out of your house, turn on your lights, and potentially even take remote control over your car. It is good to see that this document mentions the Internet of Things as a prime security concern. Especially considering we may soon have entire cities reliant on the web. Attacks on these networks could cause substantial damage to the US economy.
The emergence of the Internet of Things requires not only preparation by the US government agencies but also preparation by private companies. Most of these smart technologies will be developed by companies like Google, Amazon, or Microsoft, not the government. If these companies do not cooperate with the federal government to assure the security of these networks, then our entire livelihoods will be vulnerable to hackers. For example, this past March, Microsoft confirmed that 1.2 million Microsoft accounts were compromised in January of 2020. These companies and the consumers who use these companies' platforms must engage in more rigorous security tactics to prevent utter disaster. The threat to the well-being of individual Americans posed by nation-states or rogue actors against poorly secured private networks remains very real. Any US cybersecurity plan must account for the security of private networks. Not doing so opens to door for any country or rogue actor to cause substantial damage to the economy.
I was also slightly disappointed to see North Korea largely omitted from this document. While China and Russia may pose larger potential threats, North Korea demonstrated when it hacked Sony in 2014 that it was willing and able to cause substantial damage to the economic well-being of the world. Unlike Russia, China, and Iran, North Korea has very little to lose and may act incredibly aggressively in the cyber field. When looking at foreign nations that pose a threat to US economic interests, North Korea must be treated as a legitimate threat.