Cyber Warfare and Security

Lecture Introduction

Understanding Today's Propaganda

  • To understand the present, it's important to look at the past.

  • Propaganda is ever-present; however, its modern form is mainly virtual, enabled by easy mass production and accessible platforms like YouTube.

Historical Perspective: World War II

  • Adolf Hitler's oratorical skills and understanding of media were key to his influence.

  • He ensured the creation of cheap radios to distribute his message widely.

Modern Day: State-Based Actors

  • Cybersecurity dirty work often occurs between countries (nation-states).

  • Example: North Korea uses cyber hacking to steal money due to sanctions preventing traditional economic activities.

North Korea's Cyber Warfare
  • They have a dedicated cyber hacking team within their military.

  • Their activities include stealing money to offset economic sanctions.

  • Sanctions are in place because North Korea doesn't adhere to international rules (e.g., Geneva Convention) and pursues nuclear weapons.

  • The possession of nuclear weapons is viewed as a deterrent.

ISIS and Propaganda

  • ISIS used mediums like Call of Duty to recruit troops.

  • They targeted vulnerable individuals, particularly through online gaming platforms.

  • They used advertisements and screening questions to identify potential recruits.

Internet as a Propaganda Machine

  • Social media serves as a modern propaganda tool, with various sides disseminating information for their agendas.

Cyber Warfare Definition

  • Cyber warfare involves hostile actions by one state against another in cyberspace, causing harm comparable to a military attack.

  • Governments use cyber warfare as a cheaper alternative to traditional military actions.

Key Players in Cyber Warfare

  • US, China, North Korea, Russia, and Israel are significant players.

  • These countries have dedicated arms within their military focused on cyber activities.

  • They engage in both defensive and offensive missions.

  • Agencies like the NSA (US) play key roles in these missions.

  • China has a large number of non-government hackers it can utilize.

China's Approach to Cyber Warfare
  • China views cyber warfare broadly, including economic, diplomatic, and social development aspects.

  • PLA Unit 61398 is a well-known group involved in cyber warfare.

North Korea's Cyber Force
  • North Korea's cyber force dates back to the 1990s.

  • The Reconnaissance General Bureau has dedicated units, including Bureau 121, with 2,000 personnel.

  • Unit 91 focuses on acquiring technologies for nuclear development.

  • They steal information and hack financial institutions.

  • They are believed to be linked to the Lazarus Group, known for the Sony breach in 2014.

The Sony Hack of 2014

  • North Korea warned against the release of the movie "The Interview," a comedy about interviewing Kim Jong Un.

  • They launched a cyberattack on Sony in response to the film's release.

Russia's Cyber Warfare

  • Russia has been utilizing cyber warfare for a long time, including in the Ukrainian war.

  • They understand the importance of cyber warfare and invest in it.

Future of Warfare

  • Governments are considering the future of warfare, including the use of robot troops and drones.

  • They are targeting young students for military strategy roles.

Israel's Cyber Warfare

  • Israel faces numerous adversaries and has a strong focus on cyber defense.

  • Unit 8200 is the largest unit in the Israeli Defense Force, comparable to the NSA in the US.

Aspects of Cyber Warfare

  • Cyber warfare extends beyond military action to economic, financial, diplomatic, and political spheres.

  • Activities include cyber espionage, mass surveillance, disruption, destruction, and subversion.

Cyber Espionage and Mass Surveillance

  • Countries engage in mass surveillance.

  • Cyber espionage aims to steal state secrets and business intellectual property.

Advanced Persistent Threat (APT)

  • Unauthorized access often stems from advanced persistent threats.

Australian Power Network Hack (2019)

  • The Australian power network and servers were hacked in 2019.

  • The attack was sophisticated and likely state-sponsored.

  • Governments are cautious about attributing attacks to specific countries for diplomatic reasons.

COVID-19 Origins and Cyber Attacks

  • In 2020, Australia questioned the origins of the COVID-19 virus, leading to cyber attacks from the Chinese government.

Reminders and Demonstrations

  • State-based actors use cyber attacks to demonstrate their capabilities.

Nuclear Weapons

  • The threat of nuclear weapons is often more impactful than their use.

Subversion and Interference

  • Subversion involves weakening authority through subtle tactics like media commentary.

  • Social media is used to spread disinformation and influence public opinion.

  • Russia has been active in interfering in elections and political events.

Stuxnet

  • Stuxnet was the first virus worm to infiltrate a state (Iran).

  • It targeted Iran's nuclear enrichment plant.

Iran's Nuclear Program
  • Iran aimed to develop its nuclear program, raising concerns about weapon development.

  • They used gas centrifuges to separate uranium isotopes.

Stuxnet's Attack
  • Stuxnet targeted Siemens industrial controllers used in the centrifuges.

  • The virus was introduced through a USB drive, exploiting the air gap (physical isolation) of the system.

  • It manipulated pressure, causing damage to the centrifuges.

  • Thousands of centrifuges were rendered inoperative.

  • Stuxnet is believed to has been a collaborative effort by the US and Israel.

Pagers in Lebanon

  • Hezbollah used pagers for communication to avoid tracking.

  • The pagers were infiltrated with explosives, demonstrating sophisticated espionage techniques.

Organized Crime and Cyber Warfare

  • Organized crime groups have been slow to adopt the Internet for financial gains.

  • However, they now use it for money laundering and transfer.

Challenges for Criminals

  • Moving large amounts of cash is a major challenge for drug dealers.

  • They are now converting currency into crypto to facilitate transfers.

Cybercrime Activities

  • Ransomware, DDoS attacks, cryptojacking, and identity theft are common activities.

Ransomware
  • Ransomware is a lucrative business model. It is recommended that organisations conduct regular backups to prevent loss.

  • Some criminals even offer hotlines to assist victims with payment.

DDoS Attacks
  • DDoS attacks can cause significant financial losses for online businesses.

Cryptojacking
  • Cryptojacking involves using someone else's computer resources to mine cryptocurrency.

Hacking Government Agencies
  • Hacking government agencies and companies often targets personal identifiable information (PII).

Fraud

  • Fraud is a highly lucrative activity for organized crime.

  • Romance scams, shopping scams, tech support scams, investment scams, and refund scams are common.

Dodgy Call Centres
  • Some scammers operate highly organized call centers.

Business Email Compromise (BEC)
  • BEC scams target specific individuals and lead to large sums of money being transferred to criminal-controlled accounts.

Identity Theft: Phone Porting & SIM Swapping

  • Identity theft is a growing issue.

  • Focus on the speed of modern identity theft vs the theft speed in 2010/2015

  • Phone porting (SIM swapping) is a serious problem

The rest of Identity Theft lecture will be covered next week