<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[The Cyber Warfare Blog]]></title><description><![CDATA[Longform thoughts, on many things, from an Irishman who got a sweet domain name]]></description><link>https://blog.cyberwarfa.re/</link><image><url>https://blog.cyberwarfa.re/favicon.png</url><title>The Cyber Warfare Blog</title><link>https://blog.cyberwarfa.re/</link></image><generator>Ghost 4.4</generator><lastBuildDate>Wed, 25 Feb 2026 19:10:24 GMT</lastBuildDate><atom:link href="https://blog.cyberwarfa.re/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[The Pseudo Gang: Disinformation, Misinformation and The Troubles]]></title><description><![CDATA[<p><a href="https://blog.cyberwarfa.re/white-prop/">As I mentioned in my first post on the Cutting Room Floor</a>, I have been working piece on Propaganda. One of the sections was on Misinformation and Disinformation, but more importantly, I stumbled on an absolutely incredible story and it&apos;s worth sharing as it shows Disinformation being laundered</p>]]></description><link>https://blog.cyberwarfa.re/pseudo-gangs/</link><guid isPermaLink="false">63d2ab19f85c9ea22a7ba16b</guid><category><![CDATA[Cutting Room Floor]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Thu, 26 Jan 2023 20:29:44 GMT</pubDate><content:encoded><![CDATA[<p><a href="https://blog.cyberwarfa.re/white-prop/">As I mentioned in my first post on the Cutting Room Floor</a>, I have been working piece on Propaganda. One of the sections was on Misinformation and Disinformation, but more importantly, I stumbled on an absolutely incredible story and it&apos;s worth sharing as it shows Disinformation being laundered into Misinformation, before becoming a widely accepted fact, with decades of ramifications.</p><hr><!--kg-card-begin: markdown--><h1 id="misinformation-vs-disinformation">Misinformation Vs. Disinformation</h1>
<!--kg-card-end: markdown--><p>Before going forward, it&apos;s worth understanding that the propaganda I have mentioned is propaganda that is generally assumed to be truthful. Sure companies can lie about their products and what they are capable of, as can governments and various organisations for various reasons but there is a reason I chose to pick the examples I did, which is that while it is propaganda, all of it is backed by fact. We may not be able to see all of if any of the full context that was used to get to these truths, but they do not contain misinformation, to the best of anyone&apos;s knowledge. This is where Disinformation and Misinformation come into the equation as rather than truth, they are backed by Confirmation Bias, Motivated Reasoning, and/or Conspiracy and built with fabricated or little to no verifiable facts.</p><p>Disinformation is not a word native to the English language. It is borrowed from Russian where it is &#x434;&#x435;&#x437;&#x438;&#x43D;&#x444;&#x43E;&#x440;&#x43C;&#x430;&#x446;&#x438;&#x44F;, or dezinformatsiya and it is <a href="https://www.merriam-webster.com/dictionary/disinformation">information that is deliberately misleading and spread in a somewhat covert manner</a> such as via rumour, astroturfing or sock puppeting. Disinformation tends to rely on someone to be receptive to the information or to accept the credibility of the source as a false authority. Disinformation is what cults rely on as part of their indoctrination processes as they target people who are vulnerable for some reason to a given idea, and this new and important social group in their life is providing</p><p><a href="https://www.merriam-webster.com/dictionary/misinformation">Misinformation on the other hand is information that is misleading, though not deliberately so</a>. This can be complicated as technically, <a href="https://www.theonion.com/">The Onion</a> could write a joke about <a href="https://www.theonion.com/pragues-franz-kafka-international-named-worlds-most-ali-1819594798">Prague&apos;s Franz Kafka International Airport being named the world&apos;s most alienating airport</a>, while this is a deeply funny joke, in a very well thought out and executed video, it is not intended to deceive, the aim is satire, and thus it is misinformation. Similarly our equivalent in Ireland, <a href="https://waterfordwhispersnews.com">Waterford Whispers News</a> is the same. When they write a <a href="https://waterfordwhispersnews.com/2014/01/21/north-korea-lands-first-ever-man-on-the-sun-confirms-central-news-agency/">story claiming that North Korea has claimed that they have landed a man on the sun</a>, it is intended as a joke, but it is misleading. Stories such as these do get picked up as real news occasionally.</p><!--kg-card-begin: markdown--><h1 id="the-pseudo-gang">The Pseudo Gang</h1>
<!--kg-card-end: markdown--><p>During the Troubles, Frank Kitson was the Brigadier in charge of the 39th Airportable Brigade, prior to this he put down the Mau Mau Uprising in Kenya, the Malayan National Liberation Army insurgency, the Jebel Akhdar Rebellion in what at the time was known as the Sultanate of Muscat and Oman, then some time in Cyprus between 1967 and &apos;68 during inter-communal violence between the Greek and Turkish Cypriot&apos;s. He built a whole strategy on how to conduct Counter Insurgency Operations that he laid out in a 1969 book called <em><a href="https://libcom.org/library/low-intensity-operations-subversion-insurgency-peacekeeping">Low Intensity Operations</a></em> which formed the groundwork for a lot of the Intelligence Contest that took place during The Troubles.</p><p>A 1960 book he wrote called <em>Gangs and Counter-gangs</em> would be more influential though for the purposes of telling a wee story about Misinformation and Disinformation but before that, I want to lay out another idea from the book to come back to later, the Cultivation and Recruitment of Assets. Kitson looked to recruit assets inside the various groups involved in the Mau Mau Uprising so that he would have intelligence of the various operations going on, but to get this intelligence he needed assets inside the various groups of Mau Mau. </p><p>As the British Forces in Kenya regularly arrested and interrogated people, some of them would be sent to a facility Kitson and his team ran called &apos;<em>Special Methods Training Centre</em>&apos; where they could be interrogated, integrated and become trusted members of a &apos;<em>pseudo gang</em>&apos; or recruited as assets inside various Mau Mau groups. He would look for those disaffected with the group they were in or for those that had joined a group because their friends had, life was easier in the gang, or others who joined because there was a sense of adventure in joining one of the Mau Mau groups. These recruitment candidates were then put through &apos;<em>taming</em>&apos;;</p><!--kg-card-begin: markdown--><blockquote>
<p>Training&#x2014;or taming as we called it&#x2014;took place in three phases. When a new prisoner first arrived he would be treated harshly. We would chain him up, feed him on posho and little else and make him realize that he was not such a wonderful hero as he supposed. During this stage he would be primarily concerned in telling his story, and we would be involved in seeing whether he was worth trying in the job.<br>
During stage two the candidate would be gradually incorporated into the community as a friend but would not be told much about the business, nor would he be left by himself. To start with he would just be let off his chain and taken under guard to help wash the men&apos;s dishes or dig a slit trench. Gradually he would be allowed more freedom until he could walk around inside the perimeter as he pleased. Eventually if we were sure that he was going to be satisfactory he would start on stage three.<br>
From the beginning of stage three it was essential that the man should feel that he was trusted. Once he had joined us there were no reservations. He could sleep with the others, carry arms, do sentry duty or go out by himself. Frequently on one of his first patrols Eric or I would give him our pistol and carry only a simi to make him realize that he was absolutely one of the team.<br>
<a href="http://www.kalasnyikov.hu/dokumentumok/frank-kitson-gangs-countergangs.pdf">Frank Kitson; Gangs and Counter-gangs; pp 126-127</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>I mentioned &apos;<em>pseudo gang</em>&apos; so I should define that, they are a group of plainclothes military members who could be sent to infiltrate insurgent areas by looking and acting like locals including, if necessary, the requisite racism you would expect of a CIC of the British Army in Kenya;</p><!--kg-card-begin: markdown--><blockquote>
<p>&apos;After all, if they can take me for an Asian without my disguising myself at all, it should be easy enough to get them to accept me as an African if I black my face and wear the right clothes. And another thing, they must have been temporarily surprised at meeting an Asian Mau Mau, as no one has ever heard of such a thing before. As an African I should excite far less attention.&apos;<br>
<a href="http://www.kalasnyikov.hu/dokumentumok/frank-kitson-gangs-countergangs.pdf">Frank Kitson; Gangs and Counter-gangs; pp 84</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>During The Troubles, this tactic was implemented again when Kitson set up the MRF (Mobile Reconnaissance Force/Military Reconnaissance Force/Military Reaction Force. It&apos;s unclear to this day). The goal of these soldiers was to infiltrate West Belfast, an IRA stronghold, posing as road sweepers, bin men, tramps drinking methylated spirits, one woman was even a door-to-door salesperson selling cosmetic products. They would drive around conducting covert surveillance or entering burned out or abandoned shops and houses where they remove a single brick from a wall and use it as an observation post.</p><p>The MRF was more though. It was also a hit squad. Members of the MRF may disagree with this as they called their operations a &apos;<em><a href="https://thebrokenelbow.com/2013/02/23/british-war-diary-suggests-possible-mrf-role-in-effort-to-kill-brendan-hughes-while-london-buries-secret-militar-files-for-100-years/">Snatch Attempt</a></em>&apos;, but you could disagree with that given the fantastic and extensive reporting of Ed Moloney or Patrick Radden Keefe. To make sure this act was subversive and to ensure that only paramilitary groups could be blamed, the MRF used the same weapons as the paramilitaries like the L2 Sterling SMG or the ArmaLite AR-18.</p><!--kg-card-begin: markdown--><blockquote>
<p>&#x2018;We wanted to cause confusion,&#x2019; one MRF member recalled. If people believed the paramilitaries were responsible, it would erode their standing in the community and preserve the image of the army as a law-abiding neutral referee. This was particularly true in those instances where the MRF, seeking to assassinate a target, ended up inadvertently killing an unaffiliated civilian instead.<br>
<a href="https://www.williamcollinsbooks.co.uk/products/say-nothing-a-true-story-of-murder-and-memory-in-northern-ireland-patrick-radden-keefe-9780008159269/">Patrick Radden Keefe; Say Nothing: A True Story of Murder and Memory in Northern Ireland; pp 170</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>But what if the MRF assassinated the wrong person or accidentally killed a bystander? How do you remain the &apos;<em>neutral referee</em>&apos;? Well, this is where disinformation comes into the story. Police would announce that &#x2018;<em>no security forces were involved</em>&#x2019; but that there might be a connection to &#x2018;<em>political bodies</em>&#x2019;, read paramilitaries. After this, Kitson would have the local Guardian reporter summoned, Simon Winchester, for a briefing where he would lay out the incident and refer to the army&apos;s classified files on the subjects of the incident, stating that so and so was a gunman and that this is probably why they were shot.</p><p>Kitson passing this information on to Winchester is textbook disinformation. It is false information that is being spread with the intent to deceive. Winchester was also quite friendly with Kitson and his family, so he was a receptive source who did not believe that he was being influenced or that in Kitson allowing Winchester to get closer to his family, that this reeked of classic intelligence asset cultivation, something Kitson talked about extensively in his books. Winchester didn&apos;t need to be interrogated, but as Kitson said, this step could be eliminated and assets could be quickly incorporated and made to feel like they were one of the team, a trusted person to do their duty and not think all that hard about it. Winchester also believed that the army&apos;s classified documents, the source, were true and credible and that Kitson was sharing this information with him such that the correct information could be in the public domain to preserve peace. </p><p>What makes this story of particular interest in understanding the difference between Disinformation and Misinformation is that this is where the Disinformation part of the story ends. When Winchester went on to publish a story that contained the Disinformation, it was no longer Disinformation, it was Misinformation. This is the case because while the information continues to be false, it was not being passed on deliberately deceive, in fact, Winchester thought he was telling the truth, though he would later go on to realise that he was a &apos;<em>useful mouthpiece</em>&apos; for the Army;</p><!--kg-card-begin: markdown--><blockquote>
<p>I would ring up Frank Kitson and he would see me without demur and would tell me, give me chapter and verse about who the person was and the rank and position within in the IRA and the importance or otherwise of this person to the IRA, and therefore to the army, and I would then go on the &quot;World at One&quot; and seemingly blessed with profound knowledge about the inner workings of the IRA would parrot, it has to be said, parrot what Frank Kitson had told me. So I know in retrospect that I was a useful mouthpiece, which, as I say, surprised me somewhat because of my intimate, relatively intimate knowledge of the IRA from my contacts with them, but that remained true for most of my two and a half years in Northern Ireland.<br>
<a href="https://webarchive.nationalarchives.gov.uk/ukgwa/20101017060841/http://report.bloody-sunday-inquiry.org/transcripts/Archive/Ts116.htm">Simon Winchester&apos;s evidence to the Saville Inquiry on the events of Bloody Sunday; pp 108-109</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>This is a story I probably would have forgotten if not for rereading <em>Say Nothing</em> by Patrick Radden Keefe in preparation for his latest book, <em>Empire of Pain</em>. Chapter 7, The Littel Brigadier covers a number of things I have mentioned here. I dug into a rabbit hole confirming a lot of what he had said and reading some of the stuff Kitson read while trying to confirm a number of things I came across. I do recommend the audiobook read by Matt Blaney&#xFEFF; though since he&apos;s a Nordie with a nice thick head on him and it&apos;s great to hear him pronounce words like Stickies correctly as Stick-aay&apos;s.</p>]]></content:encoded></item><item><title><![CDATA[White Propaganda: The Official Line]]></title><description><![CDATA[<p>Propaganda is a fascinating topic but it&apos;s hard to find really good case studies of various elements that are going to be broadly agreeable to a broad swath of readers. I have been working on a post in its totality for many, many years now, like no joke,</p>]]></description><link>https://blog.cyberwarfa.re/white-prop/</link><guid isPermaLink="false">63d2d12df85c9ea22a7ba1ac</guid><category><![CDATA[Cutting Room Floor]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Thu, 26 Jan 2023 20:08:22 GMT</pubDate><content:encoded><![CDATA[<p>Propaganda is a fascinating topic but it&apos;s hard to find really good case studies of various elements that are going to be broadly agreeable to a broad swath of readers. I have been working on a post in its totality for many, many years now, like no joke, 5 years... I don&apos;t think it will ever be done in full and I want to pop a few things out to get this area started since I have several of these kinds of posts. So, with that in mind, what is Propaganda?</p><!--kg-card-begin: markdown--><blockquote>
<p>Propaganda is the more or less <strong>systematic effort to manipulate other people&#x2019;s beliefs, attitudes, or actions by means of symbols</strong> (words, gestures, banners, monuments, music, clothing, insignia, hairstyles, designs on coins and postage stamps, and so forth). Deliberateness and a relatively heavy emphasis on manipulation distinguish propaganda from casual conversation or the free and easy exchange of ideas. Propagandists have a specified goal or set of goals. To achieve these, they deliberately select facts, arguments, and displays of symbols and present them in ways they think will have the most effect. To maximize effect, they may omit or distort pertinent facts or simply lie, and they may try to divert the attention of the reactors (the people they are trying to sway) from everything but their own propaganda.<br>
<a href="https://www.britannica.com/topic/espionage">Bruce Lannes Smith; Propaganda; Encyclopedia Britannica</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Everything is propaganda and propaganda is everything. Advertising is designed to manipulate your attitude toward a product, by means of the symbol that is the brand logo, to influence you to buy it. Religion is designed to manipulate your beliefs and actions so that you live the chosen righteous life according to the beliefs of that religion via symbols such as how you pray, where you pray, who your chosen god or gods are etc. It is an everyday, normal thing that we experience. Sometimes we are skeptical, and it is only that which we see as concerning, wrong, different or manipulative that we take issues with as being propaganda.</p><p>Propaganda is vast, broad and misunderstood and I&apos;m just going to give a few fun little tidbits here rather than dive deep into the whole thing, in This post I&apos;m just going to look at White Propaganda, one of the three major areas. Just for context, Grey Propaganda is Propaganda that appears legitimate, doesn&apos;t appear to have an agenda and the evidence for it is in citations that cite other sources, that cite the original source to launder facts. An idea called the Woozle Effect, <a href="https://youtu.be/WWfsz5R6irs?t=725">something best described by LazerPig sums up neatly, discussing the bullshit that is the Fighter Mafia</a>.</p><p>There is also Black Propaganda, which is Propaganda that is disseminated purely for the purpose of subversion and from a source that obscures its origins. A prime example of this is the <a href="https://www.washingtonpost.com/news/worldviews/wp/2016/11/26/before-fake-news-there-was-soviet-disinformation/">Soviet Disinformation operation to influence people&apos;s opinion of the HIV/AIDS epidemic</a> in the 1980s by using an Indian newspaper called <em>Patriot. </em>Patriot was a KGB front set up expressly for disinformation, they spread the story by presenting themselves as journalists quoting scientists and studies. Unlike the Woozle Effect, where the citations are self-referential, here the journalists, scientists and studies don&apos;t exist because the goal was not to appear legitimate, appear to have no agenda or to launder facts, it was to foment anti-Americanism internationally, sow distrust in the US Government and potentially also to destabilize the US. Textbook effects of good Subversion.</p><hr><!--kg-card-begin: markdown--><h1 id="white-propaganda">White Propaganda</h1>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><blockquote>
<p><strong>White Propaganda</strong> &#x2014; Propaganda disseminated and acknowledged by the sponsor or by an accredited agency thereof<br>
<a href="https://www.bits.de/NRANEU/others/jp-doctrine/jp1_02(01).pdf">US Joint Chiefs of Staff; Department of Defense Dictionary of Military and Associated Terms, pp 462</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>White Propaganda is the official statement, from an official who is accredited to be a member of a given organisation. This could be the CEO of a corporation, the Pope or a Government Minister. You are aware of who these people are and what they are sping they are putting on the information. For example, when AMD releases a new product, you expect to see Dr Lisa Su get up on stage and announce at least in part, the product or build up to the product before handing it over to someone else to make the announcement, who is introduced as a member of the company working in a given division. </p><p>So in that context, if the pope were to browse Instagram and <a href="https://www.independent.co.uk/news/world/europe/vatican-pope-instagram-model-natalia-garibotto-b1754001.html">like the racy photos of a Brazilian model</a>, and <a href="https://www.independent.co.uk/news/world/europe/pope-francis-likes-bikini-model-instagram-b1778571.html">then do it a second time a month later</a>, one might question is viewing such racy imagery is now seen as a righteous thing by the Catholic Church? Furthermore, when you see that both models have OnlyFans accounts, a subscription service <a href="https://www.nytimes.com/2019/02/09/style/onlyfans-porn-stars.html">popular with sex workers</a>, but also others too, one might question is this a papal endorsement of pornography? Or is it an indication that Pope Francis feels that millennia of Christian Orthodoxy on the role of Mary Magdalene in the life of Jesus Christ are to be reexamined?</p><p>When the Budget is announced for Ireland, you expect to have an extensive statement, from the Minister of Finance and the Minister of Public Expenditure. Over the course of their extensive statements cover the state&apos;s economic situation, the budgets for different government departments, capital projects, supplementary spending for various things and change to taxation regimes if needed to pay for all of this or to tax the general public less.</p><p>None of these examples are sinister, suspect or wrong in any way, but this is the point of propaganda. In a way, it is the honest manipulation of you. So with that in mind, let&apos;s take a look at some specific examples;</p><!--kg-card-begin: markdown--><h3 id="white-propaganda-in-the-united-kingdom">White Propaganda in the United Kingdom</h3>
<!--kg-card-end: markdown--><p>My favourite example of White Propaganda is the Official History. While there are many, such as the <a href="https://fas.org/sgp/library/">Gulf War Air Power Survey</a> from the US Air Force to document their performance in the war, the best example you will find is that of intelligence services in the UK.</p><p>Over roughly the past decade, there have been extensive books written by professional historians, with access to a lot of classified and archived materials, covering operations at these intelligence services from their predecessors and beginnings up to a point. The first of these, <em><a href="https://www.penguinrandomhouse.com/books/3754/defend-the-realm-by-christopher-andrew/">The Defence of the Realm: The Authorized History of MI5</a></em> by Christopher Andrew and covers the history of MI5, now known as the Security Service, the domestic intelligence and counter-intelligence service, from 1909 to the near present ending after discussing operations post 9/11. The next is <em><a href="https://www.bloomsbury.com/uk/mi6-9781408810057/">MI6: The history of the Secret Intelligence Service</a></em> by Keith Jeffery which covers the history of MI6, or the Secret Intelligence Service, the foreign intelligence service, from 1909 to 1948. Finally, there is <em><a href="https://www.bloomsbury.com/uk/behind-the-enigma-9781526605467/">Behind the Enigma</a></em> by John Ferris, a history of GCHQ, the UK&apos;s Signals and Cyber intelligence agency, from 1844 to 1992, with some details up to 2020.</p><p>As I noted, it&apos;s not limited to the UK. The single greatest example of this may be the absolutely titanic effort over the last 30 years and probably longer, by the German Military History Research Office to write the 12,000 page, 13 volume work, on the official history of the Wehrmacht in World War 2 titled <a href="https://global.oup.com/academic/content/series/g/germany-and-the-second-world-war-gsww/?cc=ie&amp;lang=en&amp;"><em>Germany and the Second World War</em></a>. It begins by examining the Weimar Republic, Hitler&apos;s rise to power, economics, rearmament and Foreign Policy in the build-up to World War 2.</p><!--kg-card-begin: markdown--><h3 id="white-propaganda-in-the-republic-of-ireland">White Propaganda in the Republic of Ireland</h3>
<!--kg-card-end: markdown--><p>While generally when people hear about the concept of a Ministry of Propaganda, they think in terms of Joseph Goebbels and Nazi Germany or papers like <em>Pravda</em> or <em>Izvestia</em> run by people like Stalin or<em> </em>Bukharin, under the auspices of <em>Agitprop</em> in the Soviet Union, it&apos;s easy to forget that propaganda is not something confined to the evils of the Naiz&apos;s or the western views of the Soviet Union in the Cold War or before, but that a quick look for a <a href="https://en.wikipedia.org/wiki/Ministry_of_propaganda">list of Ministries of Propaganda</a> has some unexpected names on it, such as Ireland.</p><p>On the <a href="https://www.dail100.ie/en/long-reads/the-inaugural-public-meeting-of-dail-eireann/">21st of January 1919</a>, Sinn Fein formed a breakaway Government for Ireland and proclaimed independence from the British Empire. With Censorship still in effect from World War 1, republican ideas were censored in the press. In August 1919, the Censor was abolished, only for in <a href="https://www.dail100.ie/en/long-reads/the-underground-dail/">September 1919</a>, to have the D&#xE1;il outlawed. In response to this, in <a href="https://www.dail100.ie/en/long-reads/propaganda-and-publicity/">November of 1919</a>, the D&#xE1;il began to publish the <em><em>Irish Bulletin</em></em>, published by the Department of Propaganda, which was set up on the <a href="https://www.dail100.ie/en/debates/1919-04-02/1952">2nd of April 1919</a> under the leadership of an Irish poet, Desmond FitzGerald.</p><p>The Irish Bulletin was a daily publication on Republican successes and condemnation of the British and their actions. It quickly became essential reading for foreign correspondents who wanted a more full picture of goings on in the newly formed state and about what may really be happening in the guerrilla war, even if it had a particular spin on the information. It also became essential reading in Westminster, especially among members of the British Labour Party who had some sympathy with the cause of Irish Republicanism. At the end of the Irish War of Independence in July 1921, the Bulletin ceased publication.</p><p>After FitzGerald was arrested, <a href="https://www.oireachtas.ie/en/debates/debate/dail/1919-06-17/14/">Erskine Childers became the Director of Propaganda</a>. As for a former British soldier who fought in the Boer War and World War 1 before becoming a champion of Irish Home Rule. As a former imperialist, he was perfect to combat British Propaganda of the time that described republican guerrilla action as the work of a murder gang, including making sure that it was official policy that this was all part of actions as part of a state of war between the independent state of Ireland and the British Empire on the <a href="https://www.oireachtas.ie/en/debates/debate/dail/1921-03-11/32/">11th of March of 1921</a>.</p><p>FitzGerald was released from prison in August 1921 and took his role back, only change the Director of Propaganda became the Minister for Publicity in September of 1921. It is now a former ministry that was never revived and it appears that in September of 1922 the ministry was dissolved, but I cannot find good sources for this.</p><p>None of this information would have come to light for me, if not for an article by Ian Kenneally, a PhD student researching Irish history, who wrote about <a href="https://www.rte.ie/history/hunger-strikes/2020/0325/1126346-irish-media-during-the-war-of-independence/">censorship and propaganda in the Irish War of Independence for RTE</a>, which lead me to <a href="https://www.iankenneally.com/">more of his work</a>, and highlighted that I had read some of it previously unknowingly. If you&apos;re interested in seeing the calibre of his research, I highly recommend reading the <a href="https://www.revolutionpapers.com/">Revolution Papers</a>. As well as the <a href="https://www.dail100.ie/">official history of the period</a> as part of commemorations for the 100th Anniversary of an D&#xE1;il &#xC9;ireann.</p>]]></content:encoded></item><item><title><![CDATA[Rubber Meets the Information Warfare Road]]></title><description><![CDATA[<p>With the War In Ukraine, we have a unique opportunity to look at Information Warfare happening before our eyes and compare what we saw to some of our past assumptions on what was expected to be seen in such a conflict. As someone who has spoken a lot about this</p>]]></description><link>https://blog.cyberwarfa.re/cmg-csc-22/</link><guid isPermaLink="false">62420107f85c9ea22a7b71d7</guid><category><![CDATA[Cyber & Information Warfare Theory]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Fri, 15 Jul 2022 12:09:16 GMT</pubDate><content:encoded><![CDATA[<p>With the War In Ukraine, we have a unique opportunity to look at Information Warfare happening before our eyes and compare what we saw to some of our past assumptions on what was expected to be seen in such a conflict. As someone who has spoken a lot about this previously, <a href="https://www.cmgevents.ie/">CMG Events</a> asked me to come along and update Ireland on what we have seen and what we can learn from the conflict.</p><!--kg-card-begin: html--><h4>Video of the Talk</h4>
<video width="99%" controls>
  <source src="https://d2e2xs2a2y3u97.cloudfront.net/Rubber+Meets+the+Information+Warfare+Road/Paddy+Kerley.mp4" type="video/mp4">
Your browser does not support the video tag.
</video><!--kg-card-end: html--><p><a href="https://next.cyberwarfa.re/s/GwjFaimdk5kK54G">PDF of the Slides</a></p><p>The talk last year was on the <a href="https://blog.cyberwarfa.re/iw-ie/">Information Warfare threat to Ireland</a> and served as a primer on Information Warfare as well as outlining the limited number of attacks possible in Information terms, as well as what we can see happening here in Ireland. At <a href="https://blog.cyberwarfa.re/iw-bsides-dub-22/">BSides Dublin</a>, I gave a talk which was written in a very short amount of time on what we can see happening now and why it is more boring and mundane than most people had probably expected.</p><!--kg-card-begin: markdown--><h1 id="a-quick-primer">A Quick Primer</h1>
<!--kg-card-end: markdown--><p>Last year I introduced viewers, listeners and readers to <a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.)</a> model of Information Warfare, where using Claude Shannon&apos;s <em>Mathematical Theory of Information</em>, Borden broke down the various attacks using Information Warfare to lay out the four categories of attacks available in the Information dimension of warfare, Deny, Degade, Corrupt and Exploit. He also talked about how Information Warfare would be used in a Combined Arms fashion, where militaries use multiple dimensions of warfare, such as land air and cyber at the same time, to achieve goals. This is something we have already seen in Ukraine;</p><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/07/Picture1a.png" class="kg-image" alt loading="lazy" width="1280" height="720" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/07/Picture1a.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/07/Picture1a.png 1000w, https://blog.cyberwarfa.re/content/images/2022/07/Picture1a.png 1280w"><figcaption><a href="https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/">Microsoft MSTIC; Defending Ukraine: Early Lessons from the Cyber War; pp 8</a></figcaption></figure><p>In the past, I have given examples of the various kinds of attacks in each case but as this is a quick primer and I have little new on this front, rather than give the same verbose examples, I will rather give brief explanations and only highlight new and interesting examples with context. If you are interested though in some deeper examples, you can references previous posts and talks <a href="https://blog.cyberwarfa.re/iw-ie/">here</a>, and <a href="https://blog.cyberwarfa.re/iw-bsides-dub-22/">here</a>.</p><!--kg-card-begin: markdown--><h3 id="attacks-that-deny-degrade">Attacks that Deny &amp; Degrade</h3>
<!--kg-card-end: markdown--><p>Attacks that Deny are attacks on the information itself. These can be attacks such as Wipers that in some way destroy data, but they can also such as ones that cut off access to data or slow your access to information. This is best understood in the context of forcing adversaries to use slower connections, such as using satellite over fibre or cutting fibre cables such that you no longer have access to data.</p><p>Attacks that Deny can be broken down into two different categories. The first is attacks against data collection assets. In military terms, this could be radars or intelligence collection planes but cyber audiences would be more familiar with assets such as those that feed data towards SIEMs for analysts to tackle. The other form of Denial is where rather than go after collection, you go after the analysts or decision makers that utilize such data. While you might see this as your CEO or CISO etc, traditionally militaries have seen this as high ranking officers such as generals or the leaders of particular operations to upset the operations. </p><!--kg-card-begin: markdown--><h3 id="attacks-that-corrupt">Attacks that Corrupt</h3>
<!--kg-card-end: markdown--><p>Attacks that Corrupt are attacks that feed false data into an Information Environment and is best exemplified in the everyday world that we all live in as disinformation such as that rubbish spewed by the Anti Vaccine crowd, or as I see them, the Pro Disease crowd. After all, if you are against preventing diseases, you are for disease. It is the flip side of that coin. Russia has a long history of such Disinformation, sometimes spread by propaganda outlets such as RT but also <a href="https://www.irishtimes.com/news/world/how-clare-daly-and-mick-wallace-became-stars-of-authoritarian-state-media-1.4854028">useful idiots or fellow travellers of Russian ideology</a>. </p><p>In the past, I have shied away from having discussions or talking about Russia like this as for a lot of people it is too <em>political</em>. In the wake of Russia&apos;s escalation in the War in Ukraine though, I am taking my gloves off. I am not making political statements, but statements of fact and in you disagree with me on these particular issues, that&apos;s fine! But we aren&apos;t having a disagreement about politics but the nature of reality because Russian Propaganda and Disinformation are no basis to build your worldviews upon or worthy of engagement in good faith discussions.</p><p>A prime example of the impacts of this Russian Propaganda and Disinformation can be seen in Russia by looking at who is being targeted with such Propaganda and Disinformation, <a href="https://openfacto.fr/2022/01/27/the-grus-galaxy-of-russian-speaking-websites/">as we saw with a fun article from the OpenFacto Francophone OSINT collective who tracked down the massive extent of Russian Military Intelligence&apos;s control over Propaganda and Disinformation when they were linked to the InfoRos group of sites</a>. The GRU is using OpenFacto as a form of population control to limit and shape the opinions of ordinary Russians on a daily basis as InfoRos are some of the most popular sites in Russia.</p><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/07/OpenFacto.jpg" class="kg-image" alt loading="lazy" width="1280" height="739" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/07/OpenFacto.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/07/OpenFacto.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/07/OpenFacto.jpg 1280w"><figcaption><a href="https://openfacto.fr/2022/01/27/the-grus-galaxy-of-russian-speaking-websites/">OpenFacto; The GRU&#x2019;s galaxy of Russian-speaking websites; pp 8</a></figcaption></figure><p>But InfoRos is also cited as a source of news used by other sites that then are shared around the world, such as Infobrics and OneWorld Press, which spread anti-Western and Pro Russian Propaganda and Disinformation. <a href="https://apnews.com/article/virus-outbreak-ap-top-news-health-moscow-ap-fact-check-3acb089e6a333e051dbc4a465cb68ee1">It should also be noted that former directors include Denis Tyurin and Aleksandr Starunskiy have been directors of InfoRos</a>. Estonian intelligence have identified Starunskiy as commander of, and Tyurin as an officer in GRU unit 54777 (<a href="https://www.valisluureamet.ee/doc/raport/2021-en.pdf">pp 62</a>). This unit specializes in psychological warfare, informational confrontation, information-technical influencing of foreign countries and protecting Russia against foreign information operations. </p><p>One part of this unit&apos;s operations include exposing &quot;the civilian population&quot;, as targets of psychological warfare. So what impact does all of this have on ordinary Russians? Well a group of people put together a Google Map of local war dead from the War in Ukraine. The map has now been removed for a violation of the Terms of Service, but I took some screenshots of the map and you can see that there is a relationship between places where InfoRos operates and where Russia&apos;s war dead are from;</p><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/07/Picture1c.png" class="kg-image" alt loading="lazy" width="1280" height="590" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/07/Picture1c.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/07/Picture1c.png 1000w, https://blog.cyberwarfa.re/content/images/2022/07/Picture1c.png 1280w"><figcaption>Map of Russian war dead on Google Maps. Map now removed for violation of Terms of Service, but the link was available <a href="https://www.google.com/maps/d/u/0/viewer?mid=1TJ8zbdzBV-Q5_WYUEtV13QGOL9LF8nbQ&amp;shorturl=1&amp;ll=52.70054370322457%2C92.91683098543638&amp;z=4">here</a>. Sadly the map was not archived prior to removal by Google.</figcaption></figure><p>I do wish I could overlay the Open Facto map with the one from Google as they are different projections and while I have some photoshop skills, I don&apos;t have the ability to curve Mercator Projection over whatever Open Facto used. The good news though is that while I can&apos;t do this, <a href="https://www.bbc.com/russian/features-62087305">BBC Russia did their own dive into Russia&apos;s war dead and created their own maps</a>, though they did so via Oblasts rather than in the granular depth Open Faco used, so you can&apos;t see the impact of the Propaganda.</p><p>We can also see a great example of Russia&apos;s process in action where in November Tim Kirby, an American by birth but Kremlin sock puppet by profession, began to talk about US funded Biolabs in Ukraine on his English language radio show in Russia. Once this is out there prior to the war starts, it is prepositioned to be amplified by other sock puppet outlets when the time comes that it is needed. </p><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/07/Picture4a-1.png" class="kg-image" alt loading="lazy" width="1280" height="474" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/07/Picture4a-1.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/07/Picture4a-1.png 1000w, https://blog.cyberwarfa.re/content/images/2022/07/Picture4a-1.png 1280w"><figcaption><a href="https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/">Microsoft MISTIC; Defending Ukraine: Early Lessons from the Cyber War; pp 14</a></figcaption></figure><p>In some ways, this is a very spaghetti-at-the-wall approach, but all you need is to keep coming up with outlandish ideas and for one to take hold for it to become a whole thing. We see this regularly with conspiracy theories such as this. Once the war began, Russian sock puppet sites amplified the Disinformation, and it eventually took hold. You would expect that any credible journalist would do their due diligence but journalism is dead and clicks are king so it became a major news story built on nothing but Kremlin fueled hot air, sometimes with the Kremlin&apos;s own &quot;Journalists&quot;;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">RT journalist Bryan MacDonald: &#x2018;I called the war wrong. I clearly wasn&#x2019;t as much of an expert as I thought I was&#x2019;  <a href="https://t.co/pW0qTGs65h">https://t.co/pW0qTGs65h</a></p>&#x2014; Kevin Rothrock (@KevinRothrock) <a href="https://twitter.com/KevinRothrock/status/1504064797104615427?ref_src=twsrc%5Etfw">March 16, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>This is a regular problem when dealing with such Kremlin Propaganda and Disinformation. Experts turn out to be not experts at all and are pushing a particular angle that is curiously pro-Russian. And sometimes we disappointingly see that in causes that I for example believe in, such as this comment from the Peace and Neutrality Alliance (PANA);</p><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">Let&apos;s ignore the strategic narcissism for a second, I&apos;ll come back to that...<br><br>Ukraine was attacked by a superpower. Losing ONLY two cities is an achievement especially when you consider that the cities where lost and recovered <a href="https://t.co/bSehbefFDe">https://t.co/bSehbefFDe</a></p>&#x2014; &#x1F595;&#x41F;&#x443;&#x301;&#x442;&#x456;&#x43D; &#x445;&#x443;&#x439;&#x43B;&#x43E;&#x301; &#x1F499;&#x1F49B; &#x421;&#x43B;&#x430;&#x432;&#x430; &#x456; &#x43F;&#x43E;&#x431;&#x435;&#x434;&#x430; &#x423;&#x43A;&#x440;&#x430;&#x457;&#x43D;&#x456; &#x1F1FA;&#x1F1E6;&#x270A; (@LegendaryPatMan) <a href="https://twitter.com/LegendaryPatMan/status/1541914929418092548?ref_src=twsrc%5Etfw">June 28, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p>Now not everything PANA says is pro-Russian but it is worth noting that while they are anti-American, they are also curiously quiet on Russia&apos;s War in Ukraine and then say pro-Russian things on twitter. It makes you question how pro peace they are and what they really stand for, if they only want the US to be peaceful but are ok with other, more authoritarian regimes going to war, particularly the brutal war that Russia wages.</p><p>The most effective way to deal with Disinformation and Propaganda, as we have learned time and time again, <a href="https://comp.social.gatech.edu/papers/cscw18-chand-hate.pdf">is that the most effective way to deal with the problem is to Deplatform such sock puppets and those who spread hate such as Nazis and racists. Not only does it make the world a better place for everyone, but it also makes such people feel unwelcome in regular society, which they should be</a>. To an extent, <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_22_1490">we have done this in Europe and we are all the better for it</a>.</p><p>Now some people don&apos;t like this as they believe it infringes their Free Speech, but in an <a href="https://www.nytimes.com/2022/02/03/opinion/culture/joe-rogan-spotify-roxane-gay.html">essay in the New York Times</a>, Roxane Gay discusses the idea that this isn&apos;t censorship where there is an attached punishment, but it is curation where we choose to not discuss or engage in such hate or bigotry. In the Marketplace of Ideas that we have today, we nearly universally agree that there are some just bad ideas like Nazism or Neo-Nazism. By choosing to not engage in these ideas, we are expressing that these ideas are unacceptable. By deplatforming these ideas, we are saying that they are unacceptable in decent society and the frankly genocidal statements that are on &#x420;&#x43E;&#x441;&#x441;&#x438;&#x44F;-1 for example, are totally unacceptable.</p><!--kg-card-begin: markdown--><h3 id="the-other-corruption">The Other Corruption</h3>
<!--kg-card-end: markdown--><p>One of the things that I am becoming increasingly cognizant of is how algorithms tailor a picture of the world. This can be through search results, in which we are <em>Filter Bubbled</em> into being a particular person based on the data a search engine has about us. Or how twitter doesn&apos;t provide us with information as it comes in from those we follow, but what twitter thinks we should see based on what it thinks we want. This can be problematic given that sometimes when a company has a poor picture of who it thinks you are. So for example, if you ask twitter for all of your data, which you are entitled to do under GDPR, you can look at twitter&apos;s algorithms think you are, and because I gave literally zero data to twitter, they are aware that I am a male between 13 and 54 and I speak English. That is it;</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/07/Capture-1.PNG" class="kg-image" alt loading="lazy" width="595" height="418"><figcaption>My personal data from twitter</figcaption></figure><p>It should also be noted that this can be used for more nefarious purposes as we can see with the Great Firewall in China where data is only allowed in if it passes muster with the censors at the Publicity Department of the Chinese Communist Party. Some of these things sometimes bleed out into the rest of the world, such as we have seen with <a href="https://twitter.com/AirMovingDevice/status/1195575891146895360?s=20&amp;t=Oju5M2KdYL0fEk4l5o1d_w">TikTok</a> where keywords in posts trigger a review before the post is publically visible, or how <a href="https://twitter.com/Osinttechnical/status/1537842621430767617?t=epDXM7ghpRRgbLM4pibEVA&amp;s=19">TikTok</a> has data sent back to China even though they pinky promised not to send data to China, or <a href="https://twitter.com/fs0c131y/status/956628910308982785">OnePlus phones</a> sending back a file called <code>badtext.txt</code> to China for some reason. I could go on, I have piles of examples like this where a mix of Governments and just Surveillance Capitalism generally are being used to exploit or monitor people in extremely distasteful ways, <a href="https://www.nytimes.com/2022/06/30/business/dealbook/abortion-privacy-risks-data.html">something women, particularly in the US are coming to terms with very quickly</a>.</p><!--kg-card-begin: markdown--><h3 id="attacks-that-exploit">Attacks that Exploit</h3>
<!--kg-card-end: markdown--><p>Finally, there are attacks that Exploit. Exploitation is exploitation in intelligence terms rather than the cyber sense. Rather than infiltrating a system, you are collecting intelligence on adversary actions to build a picture of what is going on. This can be collecting and analysing fresh data as it comes in, or it could also be taking previously collected intelligence and reanalysing it in the current context to build a more accurate picture of the threat posed by a particular adversary, a process called Back Bearing. Last year I showcased how you can use Back Bearing to put Russian intelligence operations in Ireland into context and this year, I can do the same by looking at the diplomatic lists, that the <a href="https://www.dfa.ie/embassies/embassies-in-ireland/">Department of Foreign Affairs publishes every month</a>, and comparing February 2022 to March of 2022, when Ireland expelled 4 Russian diplomats for &quot;<a href="https://www.independent.ie/world-news/ireland-to-expel-four-russian-diplomats-for-security-reasons-in-what-embassy-calls-an-arbitrary-groundless-decision-41499741.html">security reasons</a>&quot; i.e. they were spies;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/07/Picture6a.jpg" class="kg-image" alt loading="lazy" width="572" height="824"><figcaption><a href="https://www.dfa.ie/embassies/embassies-in-ireland/Diplomatic-List-FEBRUARY-2022.pdf">Accredited Diplomats at the Russian Embassy in Dublin as of February</a> and the same list as of <a href="https://www.dfa.ie/embassies/embassies-in-ireland/Diplomatic-List-MARCH-2022.pdf">March</a></figcaption></figure><p>While I can&apos;t identify all four diplomats that we expelled, as one of them may have been some kind of lower functionary rather than a fully accredited diplomat, we can for example look at Igor Molyanov, who has a <a href="https://www.linkedin.com/in/igor-molyanov-2046b43a">LinkedIn page</a>. Now if you&apos;re expecting these identities to tie back to something major, you&apos;ll be disappointed. Vladimir Vasilchik, or in Russian &#x412;&#x43B;&#x430;&#x434;&#x438;&#x43C;&#x438;&#x440; &#x412;&#x430;&#x441;&#x438;&#x43B;&#x44C;&#x447;&#x438;&#x43A;, which you can use to find a completely empty <a href="https://www.facebook.com/vladimir.vasilchik/">facebook</a> (archived <a href="https://web.archive.org/web/20220706090958/https://www.facebook.com/vladimir.vasilchik/">here</a>) profile for example. </p><p>This is because these identities are what are known as Legends. These are credible identities, with backgrounds, that one can use get by as someone else, for example as a student, <a href="https://www.bellingcat.com/news/americas/2022/06/16/the-brazilian-candidate-the-studious-cover-identity-of-an-alleged-russian-spy/">as we saw with Victor Muller Ferreira a.k.a. Sergey Vladimirovich Cherkasov, a Russian spy who attended Trinity Colege Dublin between 2014 and 2018, as part of building his legend</a>.</p><!--kg-card-begin: markdown--><h1 id="what-we-can-learn">What We Can Learn</h1>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id="1-reassess-threat-risk-models-and-your-intelligence-cycle">1. Reassess Threat &amp; Risk Models and Your Intelligence Cycle</h2>
<!--kg-card-end: markdown--><p>In Intelligence, one of the most valuable things you can do is to look at your Intelligence Cycle and look for flaws in your processes. Generally, this is valuable as you want to always be producing your best intelligence but it&apos;s even more important when you are wrong about something. Some people find being wrong to be a bad thing, people perceive that it makes them a bad person or less worthy. I on the other hand, I LOVE being wrong! Being wrong is the single best way to learn something and to improve whatever you are wrong about. To quote one of my personal heroes, Gene Kranz;</p><!--kg-card-begin: markdown--><blockquote>
<p>Failure is an ingredient in life, it&apos;s an ingredient in growing. Probably the worst failure of my life, and our lives as mission contollers, is when we lost our crew. And we lived with that failure. And what we did about it though, became very important. We sat and established a set of values, a set of standards, that we would all live up to. They were expectations for ourselves and for others. Failure is an incredible, intense, learning process and if you use it as a learning process, it was worthwhile<br>
<a href="https://youtu.be/jwJfIh4Fwmk">Gene Kranz on Failure: My Path; Smithsonian National Air and Space Museum; @ 00:01:15</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>If we apply this to myself and my thinking on Russia, my biggest failing remains my horrendous Russian... Years of trying to learn it have not paid off all that well so I have limited access to some very valuable information. Google Translate can of course help, but if you want to go into a forum used by Russian soldiers posted in one part of Siberia to try and understand how they feel about various things, you are going to be gated off from a lot of the best information about how troops feel about various situations or how they see the world from inside Russia.</p><p>Of the data I do have access to, in English, the small amount of Russian that I can read, Russian via Google Translate or Russian I can have a friend translate, there are two other categories that my failings fall into. The first is my failure to connect the dots between disparate events, and the second is my failure to weigh data properly.</p><!--kg-card-begin: markdown--><h3 id="dots-i-didnt-connect">Dots I Didn&apos;t Connect</h3>
<!--kg-card-end: markdown--><ol><li>I was aware that Russian pilots had lower flight hours per year when compared to other militaries. The International Institute for Strategic Studies, in their 2014 edition of The Military Balance, estimated that Russian combat pilots had approximately 60 to 100 flight hours per year and transport pilots had 120 flight hours per year. For comparison, <a href="https://www.military.com/daily-news/2018/03/14/air-force-sets-goal-20-flight-hours-month-pilots.html">The US Air Force in 2018 had pilots flying 18 flight hours per month</a>, or 204 per year. While this is lower than what the USAF wants, it is between double and treble what Russian combat pilots get by comparison. Ultimately, flying a plane towards the ground so you can fire off some rockets, is an utterly terrifying experience that you can&apos;t just go out and do! You need to train to be able to do things like that. Sames goes for a lot of things and when you are training, you aren&apos;t under fire from a billion stinger missiles with your actual life at stake. So to be able to tune out the monkey brain and focus on the mission is hard and requires you to train for these things, repeatedly.</li><li>I was aware that Russia had particularly poor logistics when compared to a western military. Where we would use a Company, a unit with between 80 and 250 people, <a href="https://warontherocks.com/2021/11/feeding-the-bear-a-closer-look-at-russian-army-logistics/">Russia would use a Platoon</a>, a unit with 10 to 100 people. In military terms, this is an order of magnitude smaller of a unit. I knew that Russia was tied to railroads and that they just didn&apos;t have enough trucks to supply their troops in an engagement, <a href="https://twitter.com/TrentTelenko/status/1499164245250002944">let alone consider the state of the trucks</a>. What I wasn&apos;t aware of though was that <a href="https://podcasts.apple.com/us/podcast/what-wooden-pallets-have-to-do-with-russias-invasion/id1056200096?i=1000556331039">Russia&apos;s military hasn&apos;t adopted the concept of pallets</a>. When I first heard this, it broke my mind... For me, there are only two lessons worth learning from World War 2, and one of them that is that logistics win wars. You can see it in Normandy with the Red Ball Express, on small Pacific islands with the Tokyo Express, and you can see it on the Eastern Front where fighting happened basically along railroads or to cut rail links. You can even see it in US tank platoons where the US designed the Platoons around the GMC CCKW 2&#xBD;-ton truck. One truck could carry all the fuel, ammo, spares, food etc, that a platoon of 4 or 5 Sherman&apos;s would need to operate for a day. Not to mention the Sherman itself was designed to be highly reliable so that it would need less maintenance and be less of a logistical burden and how the existing burden lead directly to the design of Roll On/Roll Off ships, which are commonplace today in military and civilian logistics.</li><li>There is a lot that could be said on corruption in Russia&apos;s Armed Forces, <a href="https://rusi.org/explore-our-research/publications/commentary/corruption-russian-armed-forces">RUSI has a fantastic blog post</a> linking to just some of the issues that have come to light because of the War in Ukraine. In particular, though I want to focus on the radios that Russian Forces are using. They should be using the R-187 Azert SDR radio, <a href="https://roe.ru/eng/catalog/land-forces/military-communications-equipment-and-automated-control-systems/azart/">which on paper is a modern military tactical radio</a>, but we really see them using a bunch of civilian Baofeng UV-82 radios, which you used to be able to buy on Amazon for around 100 quid. <a href="https://www.kommersant.ru/doc/4712794">The Azert radio contract was to be 18.5 billion rubles but 6.7 billion was stolen as part of bribes and people skimming cash off the top for themselves</a>. In the end, the radios ended up being cheap-ish junk, mostly made in China using off the shelf parts. This is no way to make one of the most mission critical pieces of military hardware.</li><li>The Su-25SM3 upgrade program, which would bring the Su-25 up to the early to mid 2000s by western standards in Close Air Support aircraft, started in 2014. <a href="https://www.janes.com/defence-news/news-detail/russias-su-25sm3-deep-upgrade-programme-gains-pace-and-scope">By 2019, 25 upgraded aircraft had been delivered</a>, with <a href="https://armstrade.org/includes/periodics/news/2020/0218/142556761/detail.shtml">three more in 2020</a> and <a href="https://armstrade.org/includes/periodics/news/2021/0217/122061696/detail.shtml">what sounds like a single one in 2021</a>. We see similar things with the vaunted T-14 program where there were to be thousands of them built but to date but really we have only seen prototypes and <a href="https://tass.com/defense/1262637">the first deliveries were to arrive in 2022</a>, but I don&apos;t think that will happen for reasons I can&apos;t quite put my finger on... The delivery was also to be made in to the Taman Guards but <a href="https://twitter.com/mdmitri91/status/1539618506576207874?t=P1uMc5S5vnKytCuR9YjEcA&amp;s=19">to say they have been decimated in Ukraine would be a gross understatement</a>.</li><li>After reading Mark Galeotti&apos;s fantastic book, <em>The Vory</em>, on the history of the Russian Mafia and to an extent, Russian Organised Crime in general, I was well aware of the depths to which organised crime had permeated Russia, from culture to the government. Even when Putin went into Ukraine first in 2014, some of his vanguard were Russian gangsters along with local Ukrainian mobsters. I knew that &#x41A;&#x440;&#x44B;&#x448;&#x430; (Krysha) literally meaning roof, or in context, protection, but I didn&apos;t think that the military would need protection too. <a href="https://twitter.com/ChrisO_wiki/status/1539019236890263552">The story of Misha the Bear and how he extorted three brigades at a base that became known as The Damned Place is worth reading up on</a>.</li><li>Finally, I was aware of &#x434;&#x435;&#x434;&#x43E;&#x432;&#x449;&#x438;&#x43D;&#x430; (Dedovshchina) in the Russian Armed Forces. This is the culture of hazing as some people call it, but as I see it, it is the bullying of lower ranking soldiers by higher ranking ones. This over time has led to an internal culture of brutality in the Russian Armed Forces whereby the most brutal rise to the top. This is why so many Russian officers see no issues indirectly or indiscriminately bombing civilian targets or committing war crimes such as torture and murder in places like Bucha, Borodianka and Makariv. I can hardly imagine the effect that this culture has on a private who may never have seen any active combat at all and only gotten the most basic of training.</li></ol><p>I can&apos;t even begin to fathom of any of this would impact Russian soldier&apos;s ability to fight or the state of their morale and I haven&apos;t even mentioned <a href="https://twitter.com/christogrozev/status/1520016749944524800?s=20&amp;t=3MFcVtks3sKqABjyjWqV5A">how behind the times their medical equipment is in the field</a> or <a href="https://twitter.com/LegendaryPatMan/status/1495732065832255489?s=20&amp;t=xOX-zjD4z1uhaz3s_RukxA">how just prior to the war some soldiers went days without rations when I could buy them online</a> and <a href="https://twitter.com/InvestorHumbl/status/1498423097971646464?s=20&amp;t=xOX-zjD4z1uhaz3s_RukxA">in date when they were getting gone off ones</a>.</p><!--kg-card-begin: markdown--><h3 id="poor-data-weighing">Poor Data Weighing</h3>
<!--kg-card-end: markdown--><ol><li>Estonia&apos;s Foreign Intelligence Service publishes a yearly document, which they call <a href="https://www.valisluureamet.ee/assessment.html">International Security and Estonia</a>. I have been reading them for years at this stage because they are fascinating documents from one of the few countries in Europe willing to call things as they see them, in particular, they see Russia as their largest threat and generally, they have a LOT to say about Russian actions in Estonia and the greater Baltic region. in 2021, they specifically said that Russian Armed Forces in Ukraine &#xA0;&quot;<em>is a clear sign of Russia&#x2019;s unwillingness to renounce aggression.</em>&quot; (<a href="https://www.valisluureamet.ee/doc/raport/2021-en.pdf">pp 18</a>). In the 2022 report, which came out of the 31st of January 2022, the document literally said &quot;<em>In our assessment, the Russian Armed Forces are ready to embark on a full-scale military operation against Ukraine from the second half of February.</em>&quot; (<a href="https://www.valisluureamet.ee/doc/raport/2022-en.pdf">pp 10</a>). While this is all data I am aware of, and by the middle of January I had my mind made up that Russia was going to invade Ukraine, including picking dates, they were one of the few to make that call and prior to anyone taking notice, make it clear that actions such as we saw from March of 2021, when the military buildup on Ukraine&apos;s border started, that this was par for the course for Russia.</li><li>I fell for Disinformation. Lots of it. Even though I should have known better. In particular, I wasn&apos;t as skeptical as I should have been with news sources such as TASS or Pravda. When there was a missile test, <a href="https://twitter.com/Archer83Able/status/1516893273482272768?s=20&amp;t=MxbeQIZpW6RGL_ZItFSwKg">such as we saw with Sarmat</a>, I shouldn&apos;t have assumed that this was a <a href="https://tass.ru/armiya-i-opk/4118196">production specimen but a unique one off</a> to have the troubled program finally seem finished to the world. When I was looking at military exercises like ZAPAD or VOSTOK, I should have assumed that they were more choreographed than I had realized as I have been told now that in some cases, troops trained just for their one bit to seem powerful to Dear Leader Vladimir Vladimirovich. </li></ol><p>Now this is all stuff I should have known better. After all I do spend A LOT of time talking and thinking about Russian Information Operations. But it should also be a lesson in the power of Disinformation, particularly in an area that is known to be particularly hard to analyse as military power isn&apos;t as simple as comparing numbers and requires expertise well beyond a single area. It also requires that you dig really deep into some very weird details like the length of time that chromium-lined barrels for artillery canons can hold up to wear when you are firing hundreds of rounds per day and what you can do to mitigate the performance degradation that happens over time (<a href="https://www.sto.nato.int/publications/STO%20Meeting%20Proceedings/RTO-MP-AVT-109/MP-AVT-109-16.pdf">pdf download for reference</a>). Though, none of this stopped me from believing <strong>&#x421;&#x43B;&#x430;&#x432;&#x430; &#x43F;&#x43E;&#x431;&#x435;&#x434;&#x430; &#x423;&#x43A;&#x440;&#x430;&#xEF;&#x43D;i </strong>(Glory to Victory of Ukraine)</p><!--kg-card-begin: markdown--><h3 id="with-good-data-comes-good-analysis">With Good Data Comes Good Analysis</h3>
<!--kg-card-end: markdown--><p>In the run up to the War in Ukraine kicking off again, I was still subject to a lot of these flaws, but there was so much overwhelming data coming in on what was going on that it was very, very easy to discount the disinformation coming from Russia. </p><p>The other thing that is worth noting is that internally for Wonk&apos;s doing OSINT, I try and drive the <a href="https://smallwarsjournal.com/jrnl/art/f3ead-opsintel-fusion-%E2%80%9Cfeeds%E2%80%9D-the-sof-targeting-process">F3EAD Cycle</a>. One of the Wonks, who wants to remain anonymous, so let&apos;s call them Horacio, is incredible at using the F3EAD cycle! He uses a nearly entirely curiosity-driven approach to understanding what is going on in a given area and does so over time. They will fuse GIS, with imagery, AIS, ASD-B, and documentary evidence from the past and present, along with his thoughts and analysis as their work is ongoing. This continious process of recombination of data based on what is happening, and their open sharing for criticism and input from the Hivemind of Wonk&apos;s, allows them to continually refine their understanding of what they are looking at, build signatures and start to make intelligence driven predictions about what is going on over time.</p><p>That is real intelligence work! Which kinda leads me to my third failing. I do a lot of my thinking by taking notes and saving things, and I do so in a mostly siloed away. I rarely share it or work in a completely open fashion like Horacio, leaving me subject to my own biases. The few times I do come out of this silo are when there are major world events going on and the Hivemind dogpiles into a thread on Slack and brings the app to its knees. This is what happened in the lead up to the war and it brought around some interesting results.</p><p>The <em>Rasputitsa</em> to Russia&apos;s or <em>Bezdorizhzhya</em> to Ukrainians, or the Rainy Seasons, where the unpaved, and sometimes paved areas of Russia and Eastern Europe can become so impassible that even things like tanks, which should be able to cross all terrains at all times, <a href="https://twitter.com/i_army_org/status/1498210377036881923?s=20&amp;t=tEYVhr8-VbYIwRaFyIrIZA">get literally swallowed up by the mud</a>. Knowing this was coming and that the Winter Olympics were on in China, and that Xi Jinping really enjoys sportswashing things like China&apos;s genocide of the Uyghurs, Putin was unlikely to make enemies on all his flanks. We also knew that units were coming from the Eastern Military District and with estimates of travel time from East to West of Russia, time to unload, make it to jumping off points, receive plans or objectives and plan for them. </p><p>You could make a pretty good guess that with Putin&apos;s short war hypothesis, that the war would begin sometime after the 21st of February and before the Rasputitsa, which generally starts at the beginning of March, but the time the Rasputitsa hits vary. Regardless it gives a neat little window of two weeks to have a quick 20 minute adventure, in and out. It would also allow Putin two months to attempt to wrap up Partisan activities before May 9th, Victory Day.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">A week later in response to an emoji poll I laid out what I believed Russia would do based on their operational tactics. I believed that they would bring the God of War to bear on Ukraine followed by an offensive in the current war to take major economic centres off of Ukraine&#x2075; <a href="https://t.co/UtNInLopIB">pic.twitter.com/UtNInLopIB</a></p>&#x2014; &#x1F595;&#x41F;&#x443;&#x301;&#x442;&#x456;&#x43D; &#x445;&#x443;&#x439;&#x43B;&#x43E;&#x301; &#x1F499;&#x1F49B; &#x421;&#x43B;&#x430;&#x432;&#x430; &#x456; &#x43F;&#x43E;&#x431;&#x435;&#x434;&#x430; &#x423;&#x43A;&#x440;&#x430;&#x457;&#x43D;&#x456; &#x1F1FA;&#x1F1E6;&#x270A; (@LegendaryPatMan) <a href="https://twitter.com/LegendaryPatMan/status/1495843510603464705?ref_src=twsrc%5Etfw">February 21, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>Using data from studies about Russian combat power and their perceived ability to attack in a given direction, along with my knowledge of how Russia&apos;s Armed Forces are supposed to fight, I made some predictions about what their targets would be, and in particular, I laid out some major targets for Russia such as Kharkiv, Kherson, Kyiv, Mariupol, Odesa, Sumy, and Zaporizhzhia. This allowed me to draw a map of what I believed Russia&apos;s offensive would look like;</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/07/FMI63IMXsAQezL3.jpg" class="kg-image" alt loading="lazy" width="2000" height="1343" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/07/FMI63IMXsAQezL3.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/07/FMI63IMXsAQezL3.jpg 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/07/FMI63IMXsAQezL3.jpg 1600w, https://blog.cyberwarfa.re/content/images/size/w2400/2022/07/FMI63IMXsAQezL3.jpg 2400w" sizes="(min-width: 1200px) 1200px"><figcaption>The map comes from my tweet found <a href="https://twitter.com/LegendaryPatMan/status/1495843517557522436?s=20&amp;t=aJwu0skmfHxDdLmVEN-OYA">here</a>.</figcaption></figure><p>For the most part, this is what we saw. The Northern Axis, in red, culminated with the Western Flank stalling in a 40Km Convoy to nothing and the Eastern Flank stalling at the Siege of Chernihiv. The Northern Front of the Central Axis was stalled in the Battle of Sumy but did go try to go around Sumy and deeper into Ukraine, reaching as far as the area around Brovary on March 31st, while the Southern Front culminated in the Battle of Kharkiv. The Donbas Axis pushed out to control the entire Donbas and Luhansk Oblasts. Finally, the Southern Axis would, along with the Donbas Axis push for Mariupol, where we witnessed the Siege of Mariupol, along with a push for Kherson and Odesa, though Ukraine headed off this push at Mykolaiv.</p><p>Overall I had quite the high hit rate. I picked the areas Russia would attack, though not exactly the correct methods, I picked the dates that Russia would attack and was off by 24 hours and I did this over a month in advance. This is the power of intelligence when driven by good data that has been understood, rigorously analysed and critiqued rather than fitting assumptions and biases to the situation.</p><!--kg-card-begin: markdown--><h3 id="looking-forward">Looking Forward</h3>
<!--kg-card-end: markdown--><p>Back to cyber things. So if we look at Russian cyber activities in Ukraine, can we learn anything from what we see in the data?</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/07/Capture.PNG" class="kg-image" alt loading="lazy" width="2000" height="1125" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/07/Capture.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/07/Capture.PNG 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/07/Capture.PNG 1600w, https://blog.cyberwarfa.re/content/images/size/w2400/2022/07/Capture.PNG 2400w" sizes="(min-width: 1200px) 1200px"><figcaption><a href="https://github.com/curated-intel/Ukraine-Cyber-Operations">Cyber Attacks per week in Ukraine, since January 1st with a 4 week moving average, stopping at June 18th. Data from: Curated Intel&apos;s Ukraine Cyber Operations open source threat intelligence data</a></figcaption></figure><p>If we graph the number of cyber incidents we have seen in Russia over time and apply a 4-week-moving average to give roughly a monthly trend of attacks, we can also see Russia&apos;s preparation for the short sharp war that was anticipated. They had a large number of initial attacks that couldn&apos;t be sustained. The attacks didn&apos;t go away but they started to trend down and this trend has continued. Given Russia&apos;s tendency to pursue options outside of diplomacy, such as cyber, when coercion fails, it&apos;s fair to assume that we can see an uptick in Russian cyber operations coming at a point in the future. I&apos;m not alone in thinking this either, the US&apos; number two on Cyber agrees;</p><!--kg-card-begin: markdown--><blockquote>
<p>A slow military progress continues to thwart the Russians on the ground in Ukraine. They may increasingly consider cyber options to divide our allies and to dilute international resolve against its action,<br>
&#x2026;<br>
We have not seen that yet, but we&#x2019;re not out of the woods. We have to keep our shields up, we can&#x2019;t let our guard down.<br>
<a href="https://www.c4isrnet.com/cyber/2022/06/17/prolonged-war-may-make-russia-more-cyber-aggressive-us-official-says/">Neal Higgins, Deputy National Cyber Director, US Office of the National Cyber Director; Prolonged war may make Russia more cyber aggressive, US official says</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>The question is when. Ukraine&apos;s Major General Kyrylo Budanov has his own opinion, which he doesn&apos;t expand on, as being the second part of August;</p><!--kg-card-begin: markdown--><blockquote>
<p>The turning point will be in the second part of August<br>
<a href="https://youtu.be/MZbm5DvMw8w?t=10">Major General Kyrylo Budanov; Chief Directorate of Intelligence of the Ministry of Defence of Ukraine; EXCLUSIVE: Ukraine&apos;s Military Intelligence Chief &apos;optimistic&apos; of Russian defeat &apos;this year&apos;; 00:00:10</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>It is also worth noting that we may be seeing preparations for Ukranian action in that time period and Ukraine is using HIMARS to systematically target Russian ammo depots, both in occupied Ukraine and in Russia. <a href="https://www.thetimes.co.uk/article/ukraine-has-one-million-ready-for-fightback-to-recapture-south-3rhkrhstf">Ukraine also has amassed a million soldiers, with the aim of taking back the south of the country</a>. Given the time of year they would be jumping off in, their western equipment and what one would imagine is the influence of western training, it would appear that Ukraine is preparing to retake the south along a Mykolaiv Perekop axis and Zaporizhzhia Novooleksiivka via Melitopol axis. The question is what counts as the South as you could consider Mariupol as the South, even though it has been the Eastern Front of the conflict since 2014, but also Crimea is something Ukraine rightfully considers to be in the south of Ukraine. Mark Galeotti also thinks that this same time period will be on interest too, though for some radically different reasons;</p><!--kg-card-begin: markdown--><blockquote>
<p>For me, I think it&#x2019;s September, it&#x2019;s September when a whole collection of chickens come home to roost. And although I&#x2019;m not suggesting for a moment that September, things are going to suddenly going to sort of change, nonetheless I think it&#x2019;s in September that we might see the beginning of the potential for things in Russia to begin to change<br>
<a href="https://inmoscowsshadows.buzzsprout.com/1026985/10638355-in-moscow-s-shadows-67-why-september-is-the-month-to-watch-and-putin-ukraine-and-the-revenge-of-history">Mark Galeotti; In Moscow&apos;s Shadows 67: Why September is the Month to Watch, and &apos;Putin, Ukraine and the Revenge of History&apos;; @ 00:02:25</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Though given that Galeotti can talk more openly about his thinking, he does and he greatly expands on his neat little quote stating that September is important because;</p><ol><li><strong>September is the end of Dacha season.</strong> Dachas are the summer houses or retreat that some Russians, not only wealthy ones either have, where they have plot of land or collective allotment where they grow some vegetables or have a little land to farm. For example, a friend of mine has a Dacha where his whole extended family go and farms strawberries. With September Russians will be looking at a long and difficult winter.</li><li><strong>The trajectory of the war is trending downwards. </strong>And has been doing so for a long period of time and Russia lacks the capacity to continue large scale operations for extended periods of time. Primarily Russia will lack Manpower in the long run and the solution, of course, is mobilization, but this is politically risky for Putin but also the Russian military, due to its structure, would have difficulty training up people to go to war and not immediately die or desert. Not to mention that Russia may not have the functional equipment to equip such a force. Demoralization at home and on the front lines. Russians will see that they are stuck in a war that has no end, no improvement and only high costs.</li><li><strong>September is when Russia will have local and gubernatorial elections.</strong> There is talk that they may not happen due to the Special Military Operation. The value in the election is that it keeps Political Technologists, the people who choreograph Russian politics, in business but it also generates economic activity by having these people employed and have them around for the next round of Presidental elections in 2024. Though the Siloviki, or securocrats, wouldn&apos;t like the elections to happen because elections can be a proxy for how the general public feel about how things are including debate. This would be unwelcome news. There are also issues with the future of the Liberal Party and Communist Party to stay on message with what the Kremlin will allow.</li><li><strong>Economic Warfare takes time to bite and will be visible.</strong> Inflation is rampant, worse than what we are experiencing elsewhere in the world, and this is causing families to burn through their savings. Galeotti expects this to impact most families by then, though <a href="https://twitter.com/navalny/status/1537763580984033281?s=20&amp;t=5wS4fvDdc4HdTRNBTbY6pw">it should be noted that in a poll conducted between May 16th and 25th by Alexey Navalny, 49% of Russians are already there</a>. Companies will be in a similar position. The State&apos;s budget will be squeezed and while for the moment the Kremlin has cut down on exports to Europe, it is doing so at record prices and boosting the state&apos;s coffers at a time when other revenues have collapsed. As people and companies are squeezed, less money is spent, unemployment goes up, inflation continues, and Russia cannot spend its considerable currency reserves in the face of this Economic Warfare. All of this will lead to pressure on the Kremlin. </li></ol><p>All of this extra pressure will make the Kremlin less able to respond to various things as they arise, which I will come to in just a moment, but it should be noted from a recent report from Microsoft MISTIC that these attacks have already up, and as MISTIC note, they aren&apos;t on cloud servers but on-premises servers. While in the report they note they have less visibility into such attacks, they clearly have some signatures or other closed information that they can use to identify such attacks. I do wonder though, how much of this is Russia activating agents inside organisations, as last year I did note that this is a tactic Russian intelligence use and tracking down insider threats is an order of magnitude harder than remote attackers due to the nature of insider threats being trusted.</p><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/07/Picture1b.png" class="kg-image" alt loading="lazy" width="1280" height="652" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/07/Picture1b.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/07/Picture1b.png 1000w, https://blog.cyberwarfa.re/content/images/2022/07/Picture1b.png 1280w"><figcaption><a href="https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/">Microsoft MISTIC; Defending Ukraine: Early Lessons from the Cyber War; pp 11</a></figcaption></figure><!--kg-card-begin: markdown--><h2 id="2-the-importance-of-preparation">2. The Importance of Preparation</h2>
<!--kg-card-end: markdown--><p>One thing that is continually preached by all Cyber Security methodologies is the importance of preparation. Ukraine has dealt with a withering barrage of cyber operations since 2014 and has done an incredible job of either defeating the operations or having something go down and restoring service quite quickly. Russia has been the perpetrator of the vast majority of these attacks too. So you would imagine that both sides were equally prepared, particularly in the Cyber Dimension, when the war kicked off again right?</p><p>Well not really no. As we have seen, Russia prepared for a particular type of conflict where it would be short, sharp and over quickly, with no contingencies for what would happen if this did not work out for them. As we saw in my graph above, Russia had a sharp rise in Cyber Operations before a gradual decline, to a continuous level. Part of this is because new Cyber Operations take time to create and preposition, but also because it fitted Russia&apos;s plans very neatly. This was what they had prepared for. </p><p>Preparation is about more than having a plan for what should happen though. Preparation in depth includes having all of the right people, with all of the right training, with a reserve of trained people, who have all done tabletop exercises, wargames etc, ready for when, for example, a cyber incident occurs. This is the difference between having prepared to for management to tick a box and being prepared in depth. It means that your staff have the mental bandwidth to deal with the regular day to day operations you would regularly do and cope with incidents as they arise. </p><p>We can see Russia did the box ticking exercise as they lacked the mental bandwidth to quickly pivot to operations they would have in the past. We can see this at Eurovision where Ukraine was clearly going to win and Russia was excluded. Normally when Russia is excluded from such cultural or sporting events, where it can gain political victories along the lines of Russia Stronk, it will lash out with Cyber Operations. We can see this with the World Anti-Doping Agency hack in 2016. Russia&apos;s state sponsored doping program was exposed and in response, Russia decided to leak the details of tests and Therapeutic Use Exemptions to the public and allow them to draw their own conclusions about the other countries doping and make it seem as though Russia is doing what everyone else is doing. </p><p>They did this again with the OLYMPICDESTROYER malware after they were not allowed to attend the 2018 Winter Olympics in South Korea. The event was a nearly all digital affair where your tickets were on your phone, WiFi was provided via the Olympics app, the host broadcaster had their coverage disrupted and the press centre went offline due to the malware. The organisers of the Olympics did an incredible job of restoring service before it became a major problem that would jeopardize the event and the <a href="https://darknetdiaries.com/episode/77/">Darknet Diaries Podcast did an incredible episode talking about not just the recovery but the psychological operations in the malware</a> if you want to know more. </p><p>So knowing that Russia has a history of lashing out via cyber means when they are excluded, how come Eurovision didn&apos;t look like this;</p><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/07/image--9-.png" class="kg-image" alt loading="lazy" width="1920" height="1080" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/07/image--9-.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/07/image--9-.png 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/07/image--9-.png 1600w, https://blog.cyberwarfa.re/content/images/2022/07/image--9-.png 1920w"><figcaption>Image thanks to my friend John who made this from the official Eurovision image.</figcaption></figure><p>I mused on twitter that this would have been &quot;<a href="https://twitter.com/LegendaryPatMan/status/1526346221014720512?s=20&amp;t=78FJ8aAKI4glFYj8SgdsmA">chef kiss levels of information operations</a>&quot;. To me, this tells us a lot about the depth of capability of those behind Russian Information Operations. They are struggling to maintain operations at home, in Ukraine and against the West more generally, but are also incapable of pivoting to new situations as they arise, as we can see. This isn&apos;t to say that these hackers aren&apos;t capable, they clearly are, but that there maybe aren&apos;t nearly as many of them as we thought, or that they don&apos;t have the capability to plan these tasks as they arise or both.</p><p>Now, this isn&apos;t to say that we didn&apos;t see anything at all. A pro-Russian hacktivist group called <a href="https://www.bbc.com/news/entertainment-arts-61463364">Killnet, which very few people, if any, I know of had even heard of, took part in DDoS-ing network infrastructure for voting and attempted to disrupt performances</a>.</p><p>When you contrast this with Ukraine though, you see an entirely different picture. By the end of 2014, the armed forces, with the exception of a small number of special forces, had failed to do anything about Russia&apos;s annexation of Crimea, the uprising in the Donbas and Luhansk regions and the blatant manipulation of presidential elections in 2014. These failures and the successes of Euromaidan and the Revolution of Dignity showed that Ukraine needed to totally reorganize. I don&apos;t just mean militarily, but really as a country. Ukraine knew that this was just the beginning and with Russian not achieving its objectives in 2014, a conflict with Russia would come sooner or later.</p><p>The Armed Forces began to change how training was done, other states sent missions to train Ukrainian Armed Forces in various weapons and tactics to become incredibly proficient at combating Russian tactics. They developed a Doctrine or set of tactics and strategies, to combat Russian forces when they would eventually come. They began to gut the law enforcement and intelligence agencies of pro-Russian personnel so that the West would supply intelligence and training, without worrying that Russia would learn about the tradecraft used by various intelligence organisations.</p><p>They went much future than totally reorganising the county&apos;s security though. Ukraine knew that Russia would be likely to target Ukrainian communications infrastructure among other things. Russia would go on to try and knock out power, twice, in Kyiv via cyber means, so they knew they had to be prepared to fix broken infrastructure during a war. <a href="https://www.forbes.com/sites/thomasbrewster/2022/03/15/internet-technicians-are-the-hidden-heroes-of-the-russia-ukraine-war/">This is something they also prepared for, including having telecoms engineers, escorted by troops, and repairing fibre cables earlier this year</a>.</p><p>More than this though, regular Ukrainians had played a huge part in alerting regular people like me, in the West to what was going on in Ukraine during Euromaidan and the Revolution of Dignity (&#x2764;&#xFE0F;Seb). They knew this would be valuable going forward to they knew to have regular people find and amplify pro-Ukranian symbols from across the world, such as this badass babushka on the Moscow Metro, three days into the war, as protestors were being beaten by riot police;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Moscow underground. Sometimes the act of resistance doesn&#x2019;t have to be loud or bold, it just has to be. <a href="https://twitter.com/hashtag/Ukraine?src=hash&amp;ref_src=twsrc%5Etfw">#Ukraine</a> <a href="https://twitter.com/hashtag/SlavaUkraini?src=hash&amp;ref_src=twsrc%5Etfw">#SlavaUkraini</a> <a href="https://t.co/MvZc9wscUj">pic.twitter.com/MvZc9wscUj</a></p>&#x2014; Belarus Free Theatre (@BFreeTheatre) <a href="https://twitter.com/BFreeTheatre/status/1498029137189036032?ref_src=twsrc%5Etfw">February 27, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>But most of all Ukrainians themselves were individually prepared and were willing to resist. A prime example from the first hours of the war is this video, where a woman in the Kherson region, which had just been captured and may have been a victim of shelling already, confronted armed Russian soldiers. She gave the soldiers sunflower seeds and told the fascist invaders to put them in their pockets so that when they die here in Ukraine, something good will come of their death.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Ukrainian woman confronts Russian soldiers in Henychesk, Kherson region. Asks them why they came to our land and urges to put sunflower seeds in their pockets [so that flowers would grow when they die on the Ukrainian land] <a href="https://t.co/ztTx2qK7kB">pic.twitter.com/ztTx2qK7kB</a></p>&#x2014; UkraineWorld (@ukraine_world) <a href="https://twitter.com/ukraine_world/status/1496866811110834176?ref_src=twsrc%5Etfw">February 24, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>This goes so far as that the sentiment of friends I have here in Ireland who are Ukrainians, or half Irish/half Ukrainian, they have the ultimate belief in the victory of Ukraine. Even at Dublin Pride, where we had a Ukrainian Grand Marshal and a section with Ukrainian&apos;s front and foremost. As someone who has put the Pride show on for years, I am immensely proud to have helped give our brothers, our sisters and our they/them&apos;s from Ukraine, who fight and die for our freedoms, a platform to be recognized. Nothing says this better than the first tweet I saw when the war began. That Ukraine will win.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">This is it guys.<br>See you in victorious Ukraine.</p>&#x2014; Illia Ponomarenko &#x1F1FA;&#x1F1E6; (@IAPonomarenko) <a href="https://twitter.com/IAPonomarenko/status/1496679105907109894?ref_src=twsrc%5Etfw">February 24, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><!--kg-card-begin: markdown--><h2 id="3-cyber-is-a-management-problem">3. Cyber is a Management Problem</h2>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h4 id="organisational-and-governance-challenges">Organisational and Governance Challenges</h4>
<!--kg-card-end: markdown--><p>While in a lot of ways preparation is a management task, I wanted to make it, its own thing. To me, it really shows the importance of having all of the right people in the right place, who are ready to go, with a culture of being ready for incidents as they arise. And I don&apos;t want to say that Cyber isn&apos;t a technical problem. It is. But if we look at a lot of the issues that we have, they aren&apos;t going to be solved with technical fixes or some magic cyber dust.</p><p>Ukraine, between February 24rd and April 8th, was targeted with 237 cyber operations, utilizing 40 distinct pieces of malware according to Microsoft MISTIC (<a href="https://blogs.microsoft.com/on-the-issues/2022/04/27/hybrid-war-ukraine-russia-cyberattacks/">pp 04</a>) and they had an incredible success rate in defeating such operations. <a href="https://cyberpeaceinstitute.org/ukraine-timeline-of-cyberattacks">The Cyber Peace Institute has documented since 2014, 59 campaigns</a>, using malware, disinformation, dumping of personal information and election interference, that have caused societal harm. Something they view as attacks on infrastructure for civil society such as the water supply or hospitals etc. Ukraine has had a remarkably strong track record of stopping these attacks before they cause damage, mitigating them entirely or restoring services in record time.</p><p>Yet when Conti went after the HSE, we learned from the report that the ransomware was comprised 7 days before the malware was triggered, and detected 3 days later (<a href="https://www.hse.ie/eng/services/publications/conti-cyber-attack-on-the-hse-full-report.pdf">pp 3</a>). Active attempts were made to prevent the malware from spreading and the SecOps team was working on something, I don&apos;t know what. Ultimately, it&apos;s not the SecOps team&apos;s fault as they do incredible work in an organisation where the priority is your health rather than cyber. </p><p>For me though, what it highlights is how we treat these issues. In Ukraine, they follow the Estonia Model for Cyber Security. This isn&apos;t a formal model, more a way of thinking and addressing cyber. In Estonia, after the Bronze Night incident, Estonia reckoned with what had happened. They created one of the first Cyber Security Strategies, and they gave Cyber a cabinet level position where it was being accounted for at the highest levels of government. Being seen as weak on cyber is something that loses people seats in elections and cyber is a major part of daily reporting in regular news for normal people rather than just people like me. </p><p>They have bodies that coordinate policy between various stakeholders, monitor the success of previous plans, implement new ones and update plans as needed. In particular, the goal of the policy coordination is to ensure that Cyber Policy gets as much media attention and funding as is needed to meet its goals. They have an incident management unit, which is tasked with the security of the state&apos;s infrastructure and critical infrastructure. They have legislation to do everything from kicking in doors to ensure compliance to extra-judicial fines. There is a lot more to the model, such as how Esontia organized their military, intelligence and emergency management. <a href="https://ccdcoe.org/uploads/2018/10/CS_organisation_ESTONIA_032015_1.pdf">You can read more about the Estonia Model with this report from the NATO CCDCOE here</a>, but that&apos;s all I need to discuss to make my point.</p><p>If you contrast that with Ireland, Ireland doesn&apos;t have a cabinet level position for Cyber. We have a Minister, whose current title is the Minister for the Environment, Climate and Communications, and even within Communications, cyber is only a small part of this brief. Even if I go and take a peek at the DCCC&apos;s Gov.ie page, I can&apos;t find a reference to cyber anywhere on the main page and the only way I can even find a reference to cyber is by going into the profile of Ciar&#xE1;n &#xD3; h&#xD3;b&#xE1;in, <a href="https://www.gov.ie/en/role/70fa48-assistant-secretary-for-communications/">the Assistant Secretary for Communications and reading their brief</a>. And you know, this isn&apos;t me being a tad tired from writing 10k words. Nope, if you search google for <code><a href="https://www.google.com/search?hl=en&amp;q=%22cyber%22%20site%3Ahttps%3A%2F%2Fwww.gov.ie%2Fen%2Forganisation%2Fdepartment%2Dof%2Dthe%2Denvironment%2Dclimate%2Dand%2Dcommunications%2F">&quot;cyber&quot; site:https://www.gov.ie/en/organisation/department-of-the-environment-climate-and-communications/</a></code>, you get zero results. The body charged with cyber literally doesn&apos;t mention cyber. </p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Here&apos;s something fun! If you search for &quot;cyber&quot; on the website of the Department of the Environment, Climate and Communications, you get zero hits on DuckDuckGo or Google<br><br>The body tasked with Cyber literally doesn&apos;t mention the word Cyber on its site... <a href="https://t.co/zV9IbLOezc">pic.twitter.com/zV9IbLOezc</a></p>&#x2014; &#x1F595;&#x41F;&#x443;&#x301;&#x442;&#x456;&#x43D; &#x445;&#x443;&#x439;&#x43B;&#x43E;&#x301; &#x1F499;&#x1F49B; &#x421;&#x43B;&#x430;&#x432;&#x430; &#x456; &#x43F;&#x43E;&#x431;&#x435;&#x434;&#x430; &#x423;&#x43A;&#x440;&#x430;&#x457;&#x43D;&#x456; &#x1F1FA;&#x1F1E6;&#x270A; (@LegendaryPatMan) <a href="https://twitter.com/LegendaryPatMan/status/1546823820320903169?ref_src=twsrc%5Etfw">July 12, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>If you look at how cyber policy is created, effectively what happens is that an EU Directive comes out and we wait until the last minute to do anything about it. Outside of the Public Consultations and going to your TD&apos;s surgery, I don&apos;t know of any other way for stakeholders to have their views heard, let alone ensure that there is adequate funding and media attention. The same goes for Incident management. <a href="https://www.ncsc.gov.ie/incidentreporting/">I know how to report an incident to NCSC-IE</a> but I have no idea what happens or would happen if I reported an incident, yet in Estonia, <a href="https://www.ria.ee/en/cyber-security/cert-ee.html">I can see entirely what the process is via their website and gain access to all sorts of cool toys too</a>. Just like with the HSE&apos;s SecOps team, this isn&apos;t the fault of the NCSC, but it&apos;s again the same problem as we just aren&apos;t thinking about or investing in Cyber. You would think that the HSE hack would change this but... <a href="https://twitter.com/LegendaryPatMan/status/1448079287370883077?s=20&amp;t=J1fKT0IeiXksEljZP0dssA">I actually went through the 2022 budget documents in search of more cyber funding, I think it went from 4.5 million to maybe 6 million, which to use a legal term of art, is fuck all</a>.</p><!--kg-card-begin: markdown--><h4 id="poor-investment-choices">Poor Investment Choices</h4>
<!--kg-card-end: markdown--><p>This isn&apos;t just a problem at a state level though. <a href="https://twitter.com/LegendaryPatMan/status/1448079287370883077?s=20&amp;t=J1fKT0IeiXksEljZP0dssA">Cybereason released a survey where they asked IT professionals about what happened after being ransomed</a>. Globally 80% of those that paid the ransom were attacked again and of that 80%, 46% believe they were ransomed by the same gang again. Now, it&apos;s one thing to decide to pay criminals, but it&apos;s a whole other level of poor management to get ransomed, know there is a problem, do nothing about the problem and allow yourself to be put in a position where you may have to pay a ransom a second time.</p><p>This survey came out about a month after <a href="https://www.theregister.com/2022/05/13/organizations_pay_ransomware/">another one from Kaspersky</a>, which showed that 9 in 10 organisations who were hit with ransomware before, would just pay if they were hit again. Not just that, these same organisations would rather pay the ransom as early and quickly as possible. This is because the cost in revenue to systems being so high, that it is cheaper to pay the ransom that lose out on said revenue;</p><!--kg-card-begin: markdown--><blockquote>
<p>This willingness for companies to stump up the cash could be attributed to managers having little awareness of how to respond to such threats, according to Kaspersky. Management may also be unprepared for how long it may take to restore data, with some businesses losing more revenue while their data is being recovered than by just paying the ransom.<br>
<a href="https://www.theregister.com/2022/05/13/organizations_pay_ransomware/">Dan Robinson; Most organizations hit by ransomware would pay up if hit again; The Register</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Though another way to look at it is rather than sacrifice a tiny proportion of said revenue on an ongoing basis, management would rather ignore the threat until the threat comes for them, then pay off the threat to go away and hope they stay away for extended periods.</p><p>And this to me is wild to me because of <a href="https://venturebeat.com/2022/07/06/report-95-of-employees-say-it-issues-decrease-workplace-productivity-and-morale/">another recent survey that came out from 1E on how employees feel about all of these IT problems impacting them</a>. 95% of employees found there to be issues in their digital experience and this decreased their productivity and morale. Some of the problems identified as challenges to a better experience are Security and Regulatory policies, IT being overwhelmed, IT&apos;s lack of training, technology isn&apos;t in place, and there is no management buy-in. Again, the issues aren&apos;t all technical. Sure security policies are, but IT being overwhelmed or lacking training or no buy in are all management problems that are solved by... Investing in IT... And that isn&apos;t just catching up on your tech debt, it getting on top of it and continuing to invest. Managing your Cyber is better for your bottom line, better for your reputation, better for your employees, and no downtime, because you&apos;re on top of your tech, is better for your customers. </p><!--kg-card-begin: markdown--><h4 id="bridging-the-gaps-in-staffing">Bridging the Gaps in Staffing</h4>
<!--kg-card-end: markdown--><p>And you know, while I&apos;m talking about staff, a friend of mine, Philipa, wrote an amazing <a href="https://www.echolive.ie/corkviews/arid-40878623.html">article about how we need to break the stereotypes we have of what hackers <em>should</em> look like</a>. I am a very typical looking hacker. I&apos;m a white male with kinda scruffy hair, a budding bald spot, a kinda scraggly beard, I tend to wear printed tees with some sort of message on them, I wear shorts and sandals about 90% of the year, I have way too many hoodies. I dressed down for the day of this talk to make my point;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/07/unknown-1-.png" class="kg-image" alt loading="lazy" width="1531" height="1063" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/07/unknown-1-.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/07/unknown-1-.png 1000w, https://blog.cyberwarfa.re/content/images/2022/07/unknown-1-.png 1531w" sizes="(min-width: 720px) 720px"><figcaption>A clip of me from my talk</figcaption></figure><p>While Philipa, has a BS in Computer Science, she also majored in Psychology, and AI, but also a postgraduate LLB law degree in Intellectual Property Law, Technology Law, and Constitutional (fundamental) Rights Litigation and a separate Postgraduate Certificate in Education, which you need to be a teacher. She is incredibly accomplished, in multiple fields beyond technology, and she chooses to work in Cyber. </p><p>I have a very good friend who I won&apos;t name, but she is a director of cyber for a multinational here in Ireland and while she only transitioned into Cyber 7 or so years ago after 20 years in a different career, she is already incredibly accomplished, more than most men who fit the job description of hacker are or ever will be. Her degree wasn&apos;t in Cyber or Computer Science when she got it either. Yet she has told me about instances where she feels she is visibly treated differently to men in meetings, and not in a way that respects her status. </p><p>Even at this conference, just prior to my talk, <a href="https://www.linkedin.com/in/andreamanning1/">Andrea Manning</a> delivered a talk on understanding Cyber Crime. Andrea doesn&apos;t have a background in Cyber either. She originally studied Hotel Management and worked in a wide variety of industries before moving into data protection and cyber in 2015 when getting a degree in Business Information Systems. She now runs a company, <a href="https://www.cyber-pie.com/">CyberPie</a>, whose goal is the provide cheap and easy access to cyber for microbusinesses here in Ireland. She is also my go to for cyber crime things because I genuinely don&apos;t who else I could go to, to ask about the various cyber threats the cyber criminals pose to Irish businesses.</p><p>And these are just the women that I know personally that come to mind as I wrote the talk. Age is also a factor too, as is where we expect hackers to come from. I help put on <a href="https://twitter.com/ZeroDaysCTF">ZeroDays</a> every year and I have done Lockpicking with <a href="https://twitter.com/jayester">Jester</a> for the past 5 years now. This year we had the usual university and industry teams, but also we had school teams with age ranges from 7 and up. A girl from the Ballymun Coder Dojo team came up near the end of the day wanting to try the Lockpicking challenges. While she had never picked a lock before, there was a cryptex, biometric lock and a set of handcuffs. </p><p>This little kid obliterated the times of anyone also who even remotely tried these challenges. In the 6 minutes she had to do the challenges, she just asked me to open the biometric lock, she noticed I had a handcuff key on my wrist and asked me if she could use it, and while her mother struggled with the hint for how to open the cryptex, she got it in one. In 90 seconds, she had opened more locks than the vast majority of teams who took 5 mins to do the same, and some of whom I&apos;ve been teaching lockpicking and physical security bypasses to for years. She had an innate curiosity and drive to just play and understand challenges and this is something you can&apos;t teach for all the money in the world.</p><p>And I haven&apos;t even mentioned, for example, the LGBTQA+ community who at Dublin Pride, Indeed and Tenable had HUGE stands in the Pride Village in Merrion Square, or the countless technology companies that had floats and staff walking in solidarity in the parade. All of these are people who don&apos;t look like me, but are in a lot of ways as capable or more capable of cyber than I am, yet I am the go to for Cyber because I look the part.</p><p>Overlooking these people is a critical failing in HR and one we need to recognise. These people that I have mentioned prove that not only do we need think more broadly about what we need in cyber, but recognise that not everything we need is Computer Science graduates. Even when we look at larger companies, there are all sorts of basic organisational issues that not just aren&apos;t technical, but Computer Science graduates will suck at like governance roles and strategy. For roles where you do need some technical understanding, then it&apos;s time to train people to do those roles because very few of the people like me that I studied with for example, are any good at all teaching others and teaching people is essential to preparing your teams to deal with incidents. </p><p>Not just that, Cyber people tend to think about Cyber as just computers, to such an extent that if you go and read the National Cyber Security Strategy for Ireland, the word physical is mentioned 4 times and none of those times are in the context of computers existing as physical objects in the real world. We have to recognise that not just do they exist in the real world but that they can have real world examples as factories run on Operational Technology, which is a fancy way of saying computers to manipulate physical processes. What happens if you are able to manipulate a process to blow things up? And that isn&apos;t far fetched, we saw it with the <a href="https://cyberlaw.ccdcoe.org/wiki/Steel_mill_in_Germany_(2014)">German Steel Mill</a> incident in 2014, <a href="https://cyberlaw.ccdcoe.org/wiki/Triton_(2017)">TRITON/TRISYS</a> and this year with the attack on a <a href="https://twitter.com/JasonMBrodsky/status/1541365283557974016?s=20&amp;t=VJLKiB3RW1DImslxro8kPQ">Steel Mill in Iran</a>. That kind of outside perspective is something you won&apos;t get if you only have cyber people.</p><!--kg-card-begin: markdown--><h1 id="q-a">Q &amp; A</h1>
<!--kg-card-end: markdown--><p>One of the things I was asked after my talk as part of a Q and A was essential if the Defence Forces had a Cyber Unit, would it be a silver bullet for cyber in Ireland. I am sorry to say that it will not be a silver bullet. It is something we need but you can&apos;t just magic away problems in cyber. The guards will be part of the solution as they need to be tackling cybercrime. The National Security Analysis Centre will be important in ensuring we have good intelligence coming from partners and also ensuring that we aren&apos;t adopting vulnerable technology. </p><p>But really this is a small part of the overall problem which is cultural. <a href="https://twitter.com/vanillatary/status/1544690905805983744">I seen a tweet a while ago, that got some traction, which stated that Ireland wouldn&apos;t join NATO because the Irish people value Neutrality, because we won&apos;t spend the money on the military, because we have a low risk of invasion and because EU, UK and US would step in, if we were invaded</a>. I agree with all of this for the most part BUT for me it misses a key point. Conflict is not bilateral. Countries tend not to agree that they will have a battle at X place at Y time. Conflict can be unilateral and one country can just go to war with another.</p><p>Even outside of states, have you ever just been punched by some drunk eejit for no real reason at all? I have. I didn&apos;t want a fight, I wasn&apos;t trying to start one either. The arsehole just wanted a fight. And it happens today. This is effectively what Russia did in the invasion of Ukraine. Basically, no one wanted the war, not even ordinary, everyday Russians. And yet we got a war because Dear Leader Vladimir Vladimirovich wanted one because he wanted to go from Dear Leader to Vladimir The Great.</p><p>In geopolitical terms, this is called Strategic Narcissism, and Ireland has it in bucket fulls. Strategic Narcissism is where you can only view the intentions of others in your own terms. You lack the empathy to see the world through the eyes of another country. I have met people who say that they aren&apos;t bothered with cyber because it&apos;s expensive and &quot;sure who&apos;d hack me?&quot; Well if Cyber Criminals can figure out a way to monetize hacking you, they will just hack you on the off chance you&apos;re worth something valuable. </p><p>This kind of divine faith, for lack of a better term, is not sound ground to build any kind of investment strategy on, be it Ireland&apos;s military or your government&apos;s health service or your company&apos;s next big product.</p><!--kg-card-begin: markdown--><hr>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id="acknowledgements">Acknowledgements</h2>
<!--kg-card-end: markdown--><p>Cheers to members of the Irish Cyber Security and Privacy Discord, in particular Philipa, <a href="https://twitter.com/L2actual">Liam</a> and Owen, for helping me flesh out my thinking on a very small number of the management issues inside Cyber that I covered. And also to Schrodinger for challenging me and in doing so, helping me better display and explain my thinking on what we can learn form the threat intelligence I have available. I look forward to Schrodinger crucifying me after this post.</p><p>As usual, none of this would be possible without the wonks of the ACWP Slack! Cheers to Lima for venting with me on management issues, Bill for the continued AAR&apos;s which are essential, John for the photoshop of Eurovision, the elusive Horacio for their rad OSINT, and to Toby Tom and Ray for helping me better display the threat intel data because data is not my strong suit. </p>]]></content:encoded></item><item><title><![CDATA[Cyber War is Boring]]></title><description><![CDATA[Cyber still isn’t ✨ magic ✨, it is still limited, it still takes a lot of effort and investment and there are still other weapons available and these weapons can be MUCH more effective. But I left the politics out of my BSides talk. The other takeaway I want to take away is]]></description><link>https://blog.cyberwarfa.re/iw-bsides-dub-22/</link><guid isPermaLink="false">61b8981bf85c9ea22a7b6f64</guid><category><![CDATA[Cyber & Information Warfare Theory]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Sat, 30 Apr 2022 13:50:51 GMT</pubDate><content:encoded><![CDATA[<p>UPDATE 02/07/22: Video of the talk added</p><p>The guys from BSides Dublin asked me to talk about the Russian offensive in Ukraine. I use the term offensive because there has been a state of war between Russia and Ukraine since 2014 in my opinion. I had a radically different talk planned where I would talk about other things entirely, but I&apos;ll save them for another time since they are pretty rad and shouldn&apos;t be in the dark. </p><figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/nGDQ4CbaZ3g?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen title="Cyber War Is Boring by Paddy Kerley"></iframe></figure><p><a href="https://next.cyberwarfa.re/s/8jMiktetBLFcop7">PDF of slides and notes for BSides Dublin</a><br><a href="https://next.cyberwarfa.re/s/5GLztbXLQEjqN9Z">PDF of slides and notes for the ICSPC Discord</a></p><p>I would also note that while BSides asked me to talk about all of this, the initial inkling for me was planted several days into the war when a friend of mine asked;</p><!--kg-card-begin: markdown--><blockquote>
<p>So far, I&apos;m hearing lots of concern about the possibility of massive cyber attacks, but very little evidence of any such thing<br>
<a href="https://discord.com/channels/798533956466901012/935571191933075518/946460463502356530">Don Edwards; #world-events; Irish Cyber Security and Privacy Discord</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Finally, apologies for how long this took to write and post... Normally this is out within hours of me giving the talk, and written before the slides are, but I got COVID at BSides and oh boy... It put me down for the count and it took me a long time to get back on my feet... I&apos;m still not 100% over a month later... </p><!--kg-card-begin: markdown--><h1 id="war-is-boring">War Is Boring</h1>
<!--kg-card-end: markdown--><p>The easiest way for me to explain why Cyber War would be to look at why War is boring on its own, which David Axe, like him or not, describes as;</p><!--kg-card-begin: markdown--><blockquote>
<p>&#x2026; that much of warfare is about politics, paperwork and logistics more than it is about actual combat.<br>
<a href="https://smallwarsjournal.com/author/war-is-boring">David Axe; Author Bio; Small Wars Journal</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>The way we think about Cyber in a lot of ways is the same. Though rather than politics, paperwork and logistics, Cyber Warfare is more about Politics, Legalities and Perceptions, though logistics and paperwork still matter. You still ultimately need to get implants etc into place, which is a logistical problem and if you joined any military and expected not to be doing paperwork... I have some very bad news for your career prospects.</p><p>Now I do want to note, because I was very lucky to have someone in the audience who had studied under Dr Thomas Rid, is that Cyber War as a concept is dead and gone. War cannot and does not take place in a single domain without spillover to other domains. Cyber War isn&apos;t real, but Cyber Warfare is very real and it is what people are thinking about when they are thinking about operations against computers, networks or systems.</p><!--kg-card-begin: markdown--><h2 id="politics">Politics</h2>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><blockquote>
<p>Cyber war is an extension of policy by actions taken in cyber space by state or nonstate actors that either constitute a serious threat to a nation&#x2019;s security or are conducted in response to a perceived threat against a nation&#x2019;s security.<br>
<a href="https://smallwarsjournal.com/author/war-is-boring">Paulo Shakarian, Jana Shakarian and Andrew Ruef; Introduction to Cyber-Warfare - A Multidisciplinary Approach; pp 2</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Put simply, using cyber warfare to achieve one&apos;s goals is an option that exists because you can&apos;t get it through other policy actions such as active diplomacy, sanctions or other compelling behaviours. This is a very Clausewitzian view of the world where War itself is something that you do as a state when you run out of political runway, you turn to your next tool in the toolbox, which is war. The use of Information Warfare and Cyber Network Operations (CNO) opens up an area before war, where Grey Area Operations can take place.</p><!--kg-card-begin: markdown--><h4 id="the-bronze-night">The Bronze Night</h4>
<!--kg-card-end: markdown--><p>The Bronze Nights are a fascinating look at the politics that underly a lot of Information and Cyber Operations. The story starts in September 1944 when the Wehrmacht had retreated from Tallinn and the citizens of Estonia, knowing what Soviet Occupation was like, proclaimed their independence, only to have the Red Army come in and reoccupy Tallinn. At the site the Bronze Soldier of Tallinn would eventually stand, the Soviet Union buried two soldiers, and post-war burying more and renaming the area from T&#xF5;nism&#xE4;gi to Liberators&apos; Square.</p><p>To many Estonians, this was seen as a symbol of Soviet oppression and the statue that was there, was originally a smaller statue, but it was blown up by teenagers during the Estonian War of Independence. The Soviets rebuilt the square as a park and placed the Bronze Soldier of Tallinn there, where it remained until 2007 when a plan was unveiled to move the statue to the Defence Forces Cemetery of Tallinn, which was thought to be a less decisive place to have a memorial to the war dead.</p><p>Russians though, they saw it as a symbol of victory over the Nazis and more importantly, this was an idea that could be weaponized by the Kremlin, and it was. Russia feels it&apos;s important to protect Russian speakers outside of Russia and sees repression of them as a form of cultural genocide, something Putin has repeatedly stirred up over the years, from Ukraine now, to Estonia in 2007 to Chechnya in 1999.</p><p>When Estonia finally planned to move the statute, Russia began a coordinated campaign of DDoS incidents, website defacements spamming comments on news websites with what is most likely the first truly modern Fake News campaign. While the DDoS&apos; and defacements were not that successful beyond the initial shock of sites being down or defaced, the spamming was incredibly effective at mobilizing Russian speakers against the removal of the statue. Those that were mobilized, or better radicalized, then began to meet with <em>diplomats</em> about what to do about the removal of the statue, including cash payments to prevent the removal.</p><p>They began protesting the site, camping in cars etc until eventually, Estonia began to dismantle the statue in preparation to move it. This is when a Kremlin-backed stooge assaulted a police officer and the police responded as police do, with massive retaliation, resulting in two days of rioting. Russia was ready for exactly this, immediately deploying stories throughout Russian media, including Fake News with doctored images of what was going on, which mobilized more people to protest.</p><p>Eventually, the statue was moved to the Defence Forces Cemetery of Tallinn, where it stands today, <a href="https://news.err.ee/1608568171/photos-bronze-soldier-monument-in-tallinn-vandalized">vandalized again in the wake of the Russian offensive in Ukraine</a>. These events became the first real deployment of a set of tactics known as Hybrid Warfare. </p><p>Peeter Kaasik of the Estonian Ministry of Foreign Affairs, <a href="https://web.archive.org/web/20070614045450/http://www.valitsus.ee/brf/failid">compiled an amazing report on the background to the Bronze Soldier of Tallinn</a>, for the Estonian Foundation for the Investigation of Crimes Against Humanity, which is well worth a read if you are interested in it. And Ivo Juurvee and Anna-Mariita Mattiisen of The International Centre for Defence and Security <a href="https://icds.ee/en/the-bronze-soldier-crisis-of-2007/">wrote an amazing retrospective of the Bronze Nights titled The Bronze Soldier Crisis of 2007: Revisiting an Early Case of Hybrid Conflict</a>, which is essential reading to understand the events.</p><!--kg-card-begin: markdown--><h4 id="hybrid-warfare">Hybrid Warfare</h4>
<!--kg-card-end: markdown--><p>Hybrid Warfare is a difficult idea to grasp. The idea was coined by Frank G. Hoffman, a Research Fellow at the US Marine Corps Center for Emerging Threats and Opportunities, who defined Hybrid Warfare as;</p><!--kg-card-begin: markdown--><blockquote>
<p>Conflicts are increasingly characterized by a hybrid blend of traditional and irregular tactics, decentralized planning and execution and non-state actors, the strategy states using both simple and sophisticated technologies in innovative ways<br>
<a href="https://www.potomacinstitute.org/images/stories/publications/potomac_hybridwar_0108.pdf">Frank G. Hoffman; Conflict in the 21st Centaury: The Rise of Hybrid Wars; pp 7</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>The EU and NATO have a joint project, the Hybrid CoE, where they describe Hybrid Threats as;</p><!--kg-card-begin: markdown--><blockquote>
<p>Coordinated and synchronized action that deliberately targets democratic states&#x2019; and institutions&#x2019; systemic vulnerabilities through a wide range of means.<br>
Activities that exploit the thresholds of detection and attribution, as well as the different interfaces (war-peace, internal-external security, local-state, and national-international).<br>
Activities aimed at influencing different forms of decision-making at the local (regional), state, or institutional level, and designed to further and/or fulfil the agent&#x2019;s strategic goals while undermining and/or hurting the target.<br>
<a href="https://www.hybridcoe.fi/hybrid-threats-as-a-phenomenon/">Hybrid CoE; Hybrid threats as a concept</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Personally, both of these are terrible ways to define anything... So I think about Hybrid Warfare as strategically targeted Political Warfare against Democracies and Democratic Intuitions, that blends conventional and irregular warfare with cyber and influence operations.</p><p>So for example, you could look at the Conventional Warfare as the Russian backed uprisings in the Donbas and Luhansk in 2014. The Irregular Warfare of the &quot;Little Green Men&quot; in Crimea in 2014. Cyber Operations such as the DNC Hacks in 2015 and 2016, and then the dumping of select data from the DNC hack as part of Influence Operations in 2016.</p><p>These are all targeting Democracies, but Hybrid Warfare has been used against Democratic Intuitions, such as the World Anti Doping Agency (WADA) after Russia was banned from participating in the 2016 Olympics for their state-sponsored doping campaign, which led Russia to carry out a Cyber Operation on WADA and dump data that made multiple top athletes look like they were also doping, which is an Influence Operation. They did the same to the Organization for the Prohibition of Chemical Weapons (OPCW), where after the Skripal Poisoning, Russia used Influence Operations to say that the poisoners were just tourists, and attempted to hack into the OPCW to see what they had, an attempt that was foiled by Dutch intelligence.</p><p>The idea here is what is known as <a href="https://warontherocks.com/2015/05/fighting-and-winning-in-the-gray-zone/">Grey Area Operations</a>. They are operations that utilize all available techniques, up to the threshold of war, without crossing it. These are what are sometimes called Shadow Wars, where you may not even be able to respond in a conventional sense to the conflict, but you may need to respond to prevent destabilization. For example, Russia backs Syria in the Syrian Civil War, which will make the conflict go on for longer, the longer conflict means more refugees to Europe, which fuels far-right politics, which destabilizes Europe.</p><p>The longer war also means that there is a conflict between religious groups such as Iranian backed Hezbollah, a Shia group, which is pitted against Saudi backed groups such as Jaysh al-Islam, who are Sunni. Both Iran and Saudi Arabia are using the conflict as one of several proxy wars they are using to fight each other in this Grey Area. Sticking with Syria, even though we are in theory moving away from oil and gas globally, there are still significant hydrocarbon deposits in the Middle East and attempts to recover these deposits are hampered by the various conflicts in the region, driving up energy prices.</p><p>It should though be noted, that just because I have listed a whole pile of bad things that are contributing to a horrendous humanitarian situation in the Middle East and unnecessary wars, that is only one side of the coin, the threat. As the former C at SIS, Sir Alex Younger notes, there is both a threat and an opportunity and spies love the ambiguity that Grey Area Operations give them access to;</p><!--kg-card-begin: markdown--><blockquote>
<p>&quot;There was a difference, call it prosaic, between peace and war; there was a difference between domestic and international; there was a difference between cyber and real, largely because cyber didn&#x2019;t exist,&#x201D; he explains. &#x201C;That&#x2019;s all blurred now and we&#x2019;ve got hybrid and ambiguity and conflict across the spectrum.&#x201D; Ambiguity is a fascinating concept for a chief spy, he admits with an edgy laugh, because it is both a threat and an opportunity: &#x201C;We are charged with dispelling ambiguity, but we also use ambiguity.&#x201D;<br>
<a href="https://www.ft.com/content/c544d058-6dad-4549-8319-470975281d0a">Roula Khalaf and Sir Alex Younger; &#x2018;The Russians did not create the things that divide us &#x2014; we did that&#x2019;</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>And this opportunity is best exemplified by US Intelligence essentially being dumped, fully analyzed and ready for dissemination in the run up to H Hour in Ukraine. Just skimming my notes for the month of February, <a href="https://twitter.com/ralee85/status/1489767023060127744?s=21">the US began releasing troop estimates on the border with Ukraine</a>, dropping information about some of those units, <a href="https://twitter.com/michaeldweiss/status/1493278163455168512?t=FLChjv24TCfERyTUsPEwdQ&amp;s=19">such as the mercenary group known as Wagner was deploying to Ukraine</a>, finally dropping what we all knew to be true, <a href="https://news.yahoo.com/us-intelligence-report-details-indirect-russian-government-support-for-western-neo-fascist-groups-233831082.html">that Russia was funding Neo Nazi and &apos;<em>Neo Fascist</em>&apos; groups around the world</a>, and <a href="https://www.cbsnews.com/news/russia-ukraine-invasion-us-intelligence-orders/">that Russian commanders were given the order to invade Ukraine</a>. All of this was done with the aim of preventing or more likely, postponing the invasion, something that was likely effective, but we will have to wait a long time to learn this for sure.</p><!--kg-card-begin: markdown--><h2 id="legalities">Legalities</h2>
<!--kg-card-end: markdown--><p>I could spend forever on the legal issues around just the two words <em>&quot;Cyber Attack&quot;</em>, but I will spare you the details as that is my secret bore you death weapon. Ultimately, in legal terms, the relevant branch of law for all wars is International Law. In International Law, there is a branch of law that depending on your perspective, you know as the Rules of War or the Law of Armed Conflict (LOAC), and the other term is International Humanitarian Law (IHL).</p><p>Now a lot of people think that having Laws of War is dumb because we just shouldn&apos;t have war... And like... I would also like to live in the Land of Milk and Honey but... I know that realistically, war is something that will happen and like many things in life, you buy insurance against the great evils we have seen in the past. And if any recent war Russia has been involved in is anything to go by, if you don&apos;t think we should have IHL, what I am hearing is that you are ok with absolutely grotesque War Crimes such as we have seen in Aleppo and Mariupol. </p><p>To understand simply why CNO opens the door to Grey Area Operations, you need to understand what it means to cross the Threshold of Armed Conflict. There is a whole process in the UN Charter about how states can legally enter a state of war, as generally speaking there is a prohibition on the use of threats of war or <em>&quot;Uses of Force&quot;</em>;</p><!--kg-card-begin: markdown--><blockquote>
<p><strong>Article 2</strong><br>
4. All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purposes of the United Nations.<br>
<a href="https://www.un.org/en/sections/un-charter/chapter-i/index.html">The UN Charter; Chapter I: Purposes and Principals</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Now Uses of Force are a complicated and vigorously debated topic, so in short, Using Force is to use military power. Something that damages or destroys property or injures or kills people. I won&apos;t get into <em>Threats of Force</em> though. So to go to war, if there is a general prohibition on war, you have very limited options. Firstly your aim must be consistent with the principles of the UN, so when Putin says that he is going to kill Nazis in Ukraine, what he is saying is not just an inspiring message to the homefront, but also that Putin is telling the world, in carefully crafted legalese is that they are going in to prevent humanitarian tragedies and/or Human Rights Violations. Now, this is preposterous which is why Russia didn&apos;t take the first path to war;</p><!--kg-card-begin: markdown--><blockquote>
<p><strong>Article 41</strong><br>
The Security Council may decide what measures not involving the use of armed force are to be employed to give effect to its decisions, and it may call upon the Members of the United Nations to apply such measures. These may include complete or partial interruption of economic relations and of rail, sea, air, postal, telegraphic, radio, and other means of communication, and the severance of diplomatic relations.</p>
</blockquote>
<blockquote>
<p><strong>Article 42</strong><br>
Should the Security Council consider that measures provided for in Article 41 would be inadequate or have proved to be inadequate, it may take such action by air, sea, or land forces as may be necessary to maintain or restore international peace and security. Such action may include demonstrations, blockade, and other operations by air, sea, or land forces of Members of the United Nations.<br>
<a href="https://www.un.org/en/sections/un-charter/chapter-vii/index.html">The UN Charter; Chapter 7: Action with Respect to Threats to the Peace, Breaches of the Peace, And Acts of Aggression</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>The other option available is the Article 51 minefield;</p><!--kg-card-begin: markdown--><blockquote>
<p><strong>Article 51</strong><br>
Nothing in the present Charter shall impair the inherent right of individual or collective self-defence if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security. Measures taken by Members in the exercise of this right of self-defence shall be immediately reported to the Security Council and shall not in any way affect the authority and responsibility of the Security Council under the present Charter to take at any time such action as it deems necessary in order to maintain or restore international peace and security.<br>
<a href="https://www.un.org/en/sections/un-charter/chapter-vii/index.html">The UN Charter; Chapter 7: Action with Respect to Threats to the Peace, Breaches of the Peace, And Acts of Aggression</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Long story short, it states that you can go to war if you are attacked or that you can be called into war because you are part of a collective defence agreement, Article 5 of NATO is generally the go to for people but there is also the signatories of the Common Security and Defence Policy in the European Union. There is also Article 107 of the UN Charter, or as I like to think of it, the &apos;Fuck the Axis&apos; clause, but that&apos;s not really relevant unless you want to dig really deep into the weeds. And from this, you should also note that what Putin is doing is an Illegal War.</p><p>If we go back to Clausewitz again, we can see that he defined one of the preeminent legal criteria for war, which he called Violence;</p><!--kg-card-begin: markdown--><blockquote>
<p>&#x2026;there is no known cyber attack that unequivocally meets Clausewitz&#x2019;s first criterion: violence. No cyber offense has ever caused the loss of human life. No cyber offense has ever injured a person. No cyber attack has ever damaged a building.<br>
<a href="https://doi.org/10.1080%2F01402390.2011.608939">Thomas Rid; Cyber War Will Not Take Place</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>We can get into arguments about TRITON/TRISIS being used to kill people and that IF, and that is a BIG IF, it had worked it would have absolutely been a Violent act. Or you could look at Stuxnet where according to Kim Zetter, in her book Countdown to Zero Day, President Obama was shown pieces of a destroyed centrifuge, though while we know centrifuges were being replaced at Natanz thanks to the IAEA, we don&apos;t know if they were destroyed or damaged, or if removal was part of malware eradication. You could even look at the <a href="https://cyberlaw.ccdcoe.org/wiki/Steel_mill_in_Germany_(2014)">German Steel Mill incident in 2014</a> where apparently cyber warfare was used to destroy a Blast Furnace, but little is known about this incident in open sources. Ultimately, in open sources, we are unaware of cyber causing such effects. </p><p>This understanding of cyber having yet to have such an effect is so clear that even here in Ireland, where we are so far behind the times, Irish law even recognises that Violence isn&apos;t something cyber is being used for as in Irish law, Violence implies that an attack took place and caused some harm to someone or something. The Criminal Justice act covering computer things only mentions the word Attack a single time, wherein the preamble, it quotes the EU Directive that was the basis for the law;</p><!--kg-card-begin: markdown--><blockquote>
<p>An Act to give effect to certain provisions of Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013 on <strong>attacks</strong> against information systems and replacing Council Framework Decision 2005/222/JHA; for those and other purposes to amend the Criminal Damage Act 1991, the Bail Act 1997 and the Criminal Justice Act 2011; and to provide for related matters.<br>
<a href="https://www.irishstatutebook.ie/eli/2017/act/11/enacted/en/print.html">Tithe an Oireachtas; Criminal Justice (Offences Relating to Information Systems) Act 2017</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>If you take the time to read the law, you will also notice that all of the sections are related to how a hacker accessed data, such as access without authority, interception or using passwords or tools to access the data without lawful authority. These complexities, have led me to carry around a fun bit of text to deploy where needed, including sources;</p><!--kg-card-begin: markdown--><blockquote>
<p>Cyber Attacks are an internationally defined legal concept, whereby a Cyber Operation [1] is carried out by a Subject of International Law that is reasonably expected to cause injury or death to persons or damage or destruction to objects [2] [3].</p>
<p>A Cyber Operation is the use of cyber capabilities to totally or partially destroy, capture, or neutralize tangible objects such as computers, networks, and other infrastructure in cyberspace, which make an effective contribution to military action by their nature, location, purpose, or use [4]. This effort is made to link the attacks to existing Humanitarian Law, but also because existing law expects that the use of such a capability should have the same impacts and characteristics as a kinetic weapon [5]. This Cyber Operation must also be carried out by someone subject to international law as not everyone is, these people are called Subjects of International Law. Subjects are limited to States, Entities Legally Proximate to States, Entities Recognized as Belligerents, International Administration of Territories Prior to Independence, and International Organizations [4]. Beyond this, Individuals, Corporations, Non-Self-Governing Peoples, and Entities Sui Generis in specific situations, such as Human Rights, Trade Law, National Liberation Movements, and the Roman Catholic Church respectively [6].</p>
<p>The criteria one should be looking for to identify a cyber intrusion as a Cyber Attack is;</p>
<p>&#x2753; Was there a Cyber Operation?<br>
&#x2753; Was such an intrusion reasonably expected to cause injury or death to persons or damage or destruction to objects?<br>
&#x2753; Was the intrusion carried out by an actor Subject to International Law</p>
<ol>
<li>Schmitt, et al, 2018. Tallinn Manual 2.0. On the International Law Applicable to Cyber Operations. 1st ed. Cambridge: Cambridge University Press, pp.521.</li>
<li>Schmitt, M., 2013. Tallinn Manual on the International Law Applicable to Cyber Warfare. 1st ed. Cambridge: Cambridge University Press, pp.106-110.</li>
<li>Schmitt, et al, 2018. Tallinn Manual 2.0. On the International Law Applicable to Cyber Operations. 1st ed. Cambridge: Cambridge University Press, pp.415-420.</li>
<li>Schmitt, et al, 2018. Tallinn Manual 2.0. On the International Law Applicable to Cyber Operations. 1st ed. Cambridge: Cambridge University Press, pp.435-445.</li>
<li>Brown, G. and Metcalf, A., 2014. Easier Said Than Done: Legal Reviews of Cyber Weapons. Journal of National Security Law &amp; Policy, Vol 7(No 1).</li>
<li>Crawford, J. R., 2012. Brownlie&apos;s Principles of Public International Law. 8th ed. Oxford: Oxford University Press, pp.115-126.</li>
</ol>
</blockquote>
<!--kg-card-end: markdown--><p>Now we can quibble if taking an understanding of Cyber Law from the Tallinn Manual is an appropriate approach, but ultimately, under current legal understandings, Cyber, in the realm of military uses of Cyber, is a deeply legal topic. The ultimate impact of these legalities has even led Thomas Rid to proclaim that Cyber War has not happened, isn&apos;t happening now and won&apos;t happen in the future;</p><!--kg-card-begin: markdown--><blockquote>
<p>Cyber war has never happened in the past. Cyber war does not take place in the present. And it is highly unlikely that cyber war will occur in the future. Instead, all past and present political cyber attacks are merely sophisticated versions of three activities that are as old as warfare itself: subversion, espionage, and sabotage. That is improbable to change in the years ahead.<br>
<a href="https://doi.org/10.1080%2F01402390.2011.608939">Thomas Rid; Cyber War Will Not Take Place</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>What is also particularly prescient about this observation is that War is not a thing that takes place in a single domain of battle. Cyber is a form of warfare that can be utilized as seen fit by a military. In the Fifth Domain, the Information Domain, you can use Cyber to have impacts beyond the information Domain, in Land, Sea, Air and in Space, making it just one of a number of tools in a toolbox rather than the tool you use to fight a war.</p><!--kg-card-begin: markdown--><h4 id="the-subversive-trilemma">The Subversive Trilemma</h4>
<!--kg-card-end: markdown--><p>Rid talking about Cyber as a sophisticated version of Subversion is also something worth examining <a href="https://direct.mit.edu/isec/article/46/2/51/107693/The-Subversive-Trilemma-Why-Cyber-Operations-Fall">as a recent paper by Lennart Maschmeyer</a> makes clear where there are limiting factors that constrain not just the usefulness of Cyber, but also what Cyber is capable of. Maschmeyer Defines the three variables as;</p><p><strong>Speed </strong>- The time taken from the start of the operation to the intended effect. Effective and secret reconnaissance takes time, as does the development of exploits for use against system vulnerabilities, using exploits at scale can take time to avoid detection and learning the systems and networks post exploit takes time.</p><p><strong>Intensity </strong>- The severity of effects. Minimal system effects are relatively easy to attain, though they may not have the intended effect. Larger effects, such as we could have seen with TRITON/TRISYS, <a href="https://subscriber.politicopro.com/article/eenews/1060123327">which could have caused the release of hydrogen sulfide gas that could have caused death or injury to people or caused a failure of plant systems resulting in an explosion</a>.</p><p><strong>Control </strong>- The amount of control you have over a given system. Put simply, the more control you have over a system, the more commands you have run on a given system, which in turn generates noise that could be detected and alerts to analysts have a tendency to be acted upon.</p><p>These factors are negatively correlated so if you prioritize one, the other ones are sacrificed as can be seen from this diagram from Maschmeyer&apos;s paper;</p><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/04/isec_a_00418.figure.1.jpeg" class="kg-image" alt loading="lazy" width="1439" height="278" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/isec_a_00418.figure.1.jpeg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/isec_a_00418.figure.1.jpeg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/isec_a_00418.figure.1.jpeg 1439w"><figcaption><a href="https://direct.mit.edu/isec/article/46/2/51/107693/The-Subversive-Trilemma-Why-Cyber-Operations-Fall">NOTE: In each diagram, the dotted triangle shows how increasing one of these three variables tends to decrease the others compared with a given state in which all are balanced, which is represented by the solid triangle. Lennart Maschmeyer; The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations&#xA0;</a></figcaption></figure><p>If we were to compare, for example, the OLYMPIC GAMES program as a whole to recent events, we can learn a lot about how this pans out in practice. The OLYMPIC GAMES was a project spanning 5 years, maybe more, and costing approximately a billion US Dollars, and over that time produced two pieces of malware, possibly three. The third is Stuxnet for North Korea, which very little is known about. The two main pieces are Stuxnet 0.500 and Stuxnet 1.001 and the subsequent patches, 1.100 and 1.101.</p><p>Stuxnet 0.500 was developed using a replica of the Natanz Enrichment Facility at the Y-12 National Security Facility where the aim was to create malware that lived on the PLCs that controlled the centrifuge&apos;s feed and dump systems rather than the centrifuges. It would feed excess gas into the systems, which caused excess pressure and forced the system to dump the gas to be enriched into a waste tank leading to next to no enrichment taking place. Development started in 2005 and was deployed approximately in 2007, where it ran for a period of time, <a href="https://foreignpolicy.com/2013/11/19/stuxnets-secret-twin/">laying undiscovered until 2013</a>. It ran without any C2 whatsoever, which limited control and had the ultimate effect of just slowing the enrichment process. Stuxnet 0.500 had a slow operational speed with limited control, but massive effects.</p><p>Stuxnet 1.001 is the version of Stuxnet that everyone is familiar with. Development started in approximately 2007 with the aim of having more control over the virus so that the US could react to Iranian actions rather than deploying the malware and then not having malware present when systems were replaced. 1.001 was also intended to have larger effects, something the replica facility was used to test where Kim Zetter in her book Countdown to Zero Day mentions that President Obama was shown pieces of a destroyed centrifuge. </p><p>Initially, 1.001 was slower moving than expected and unhappy with the progress that was being made, the C2 that was in place was used to patch Stuxnet to the 1.100 variant, which is the variant most people are familiar with. This patch is the one that sent Stuxnet into overdrive and turned it into a massive news story that scared people. It was quickly patched to the 1.101 variant, which was more controlled and careful, but it was too late at that stage and the cat was out of the bag. In attempting to have more control and intense effects, for the same operational speed, Stuxnet became made too much noise and was detected. Most likely it was deemed to be an operational failure, though probably a strategic victory as it did lead Iran to come to the negotiating table to discuss what became the JCPOA.</p><p>If we look at Russia and their offensive in Ukraine, the offensive operation was approved on the 18th of January, to take place on the 20th of February. This was likely delayed several days to allow units to arrive from the Eastern Military District and also at the behest of China, to allow the Winter Olympics to finish and for China to have their propaganda victory. US influence operations dumping details of Russian plans, as covered previously, along with Ukrainian Intelligence publishing intercepts on YouTube, probably also delayed the operation until the 24th. Given the defensive efforts, which I will come back to later, this gave Russia a month to prepare not just operational plans for Land Sea and Air attacks, but also for Cyber Attacks too. This is likely why we see the use of low effort techniques such as website defacements, DDoS&apos; or Wipers in use. </p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Leaked document from Russian troops showing war against Ukraine was approved on 18th January, and initial plan to seize Ukraine starting 20th Feb to 06th March <a href="https://t.co/KG2j0Pwqat">https://t.co/KG2j0Pwqat</a>  <a href="https://twitter.com/hashtag/Ukraine?src=hash&amp;ref_src=twsrc%5Etfw">#Ukraine</a> <a href="https://t.co/NlhnyBTJCv">pic.twitter.com/NlhnyBTJCv</a></p>&#x2014; Liveuamap (@Liveuamap) <a href="https://twitter.com/Liveuamap/status/1499052878954172418?ref_src=twsrc%5Etfw">March 2, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><!--kg-card-begin: markdown--><h4 id="war-criming">War Criming</h4>
<!--kg-card-end: markdown--><p>Now, this is complicated, and I have tried to get in contact with Ms Oonah McCrann SC, who is the JAG for Ireland, and I have also tried to consult with James Creedon CJA, who is the Wonk&apos;s go to lawyer for Military Justice issues but sadly, I have not gotten a definitive answer. Yet!</p><p>When I was delivering my version of this talk to the ICSPD Community, I wanted to discuss the fun little element of the possibility of War Crimes being committed by hacktivists. As I mentioned previously, International Law is the relevant law in the conflict between states, not local criminal law, so the presence of an IT Army for Ukraine, in a Telegram group could be problematic.</p><p>Initially, I was under the impression that Article 43 of Protocol 1 of the Protocol Additional to the Geneva Conventions would matter a lot here as the IT Army could easily meet the criteria laid out in the law;</p><!--kg-card-begin: markdown--><blockquote>
<p>The armed forces of a Party to a conflict consist of all organized armed forces, groups and units which are under a command responsible to that Party for the conduct of its subordinates, even if that Party is represented by a government or an authority not recognized by an adverse Party. Such armed forces shall be subject to an internal disciplinary system which, &apos; inter alia &apos;, shall enforce compliance with the rules of international law applicable in armed conflict.<br>
<a href="https://ihl-databases.icrc.org/applic/ihl/ihl.nsf/Article.xsp?action=openDocument&amp;documentId=AF64638EB5530E58C12563CD0051DB93">ICRC; Treaties, States Parties and Commentaries; Armed Forces</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>My assumption was that while the IT Army is recruited via Twitter, and targeting data is given out via Telegram, I was under the impression that it would be considered an Organized Unit (The IT Army), that is Subordinate to a Command of a Party to the Conflict (Government of Ukraine via Telegram), and that there is a disciplinary system in place (The Judiciary of Ukraine). This would allow them Prisoner of War status in the conflict. Though a recent paper from the CCDCOE states otherwise;</p><!--kg-card-begin: markdown--><blockquote>
<p>... the IT Army will not be viewed as an organised armed group to determine combatant status, and so many of the questions relating to combat and the different forms of civilian participation matter greatly. For instance, although the privilege of being treated as a POW might not hold much significance for a cyber fighter, other aspects such as becoming a legitimate military target and having limited legal immunity from criminal prosecution 2 might become very important.<br>
<a href="https://ccdcoe.org/library/publications/cyber-vigilantism-in-support-of-ukraine-a-legal-analysis/">Ann V&#xE4;ljataga; Cyber vigilantism in support of Ukraine: a legal analysis; CCDCOE Law Library</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Now this throws my entire argument into jeopardy, but, I didn&apos;t want to talk about the IT Army, I think it&apos;s pretty boring and really just an outlet for the Script Kiddies out there and maybe a few solid hackers, <a href="https://twitter.com/KyivIndependent/status/1514710774710779914?s=20&amp;t=-2zII1fLnF02EX1V8eHzpg">but they can join the SBU in wartime</a>, so that is probably a better outlet as that&apos;s a place to accomplish real goals.</p><p>What I did want to talk about was Conti though! Conti made a really interesting post, which you can view here via <a href="https://continewsnv5otx5kaoje7krkto2qbu3gtqef22mnr7eaxw3y6ncz3ad.onion.ly/uImgrfqk_WARNING">onion.ly</a>. Essentially, Conti made a statement that they &quot;condemn the ongoing war&quot; but if they see the US participating in &quot;Cyber Warfare&quot; against Russian critical infrastructure, they will be unilaterally entering the war, they will &quot;deliver retaliatory measures&quot;. This would firmly place them outside Article 43 of Protocol 1 of the Protocol Additional to the Geneva Conventions, but since that isn&apos;t relevant anymore, it would fully render them an Unlawful Combatant, a nasty status to have bestowed upon one;</p><!--kg-card-begin: markdown--><blockquote>
<p>Unlawful combatants are subject to capture and detention, but in addition they can be tried and punished in a trial of the capturing parties choice, including Military Tribunal to render judgement on their belligerency<br>
<a href="https://www.uio.no/studier/emner/jus/humanrights/HUMR5503/h09/undervisningsmateriale/ingrid_detter.pdf">Ingrid Detter; The Law of War and Illegal Combatants; pp 1063</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>So... If Conti were to unilaterally enter the conflict, could they be treated as Unlawful Combatants, have a Military Tribunal in absentia, and have punishment rendered? Where the punishment could be a death penalty and have Conti be... Say... Drone strike-ed? I would love to know and if possible, have this taken care of quickly!</p><!--kg-card-begin: markdown--><h2 id="perceptions">Perceptions</h2>
<!--kg-card-end: markdown--><p>Once preparations for the offensive became crystal clear, we started to see the use of Cyber in Ukrainian Government websites being defaced and Belarusian Cyber Partisans ransoming ticket machines, Adam Boileau remarked on Risky Biz that;</p><!--kg-card-begin: markdown--><blockquote>
<p>&#x2026; it&#x2019;s not the cyber war we were promised.<br>
<a href="https://doi.org/10.1080%2F01402390.2011.608939">Patrick Grey and Adam Boileau; Risky Biz 652; 00:05:10</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>And I think this is where the real problem comes in for understanding the use of Cyber during wars. People have a certain picture of what the <em>Cyber Warrior</em> should look like and that they should run around firing cyber bullets, all pew pew pew! They imagine something like this;</p><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/04/1500x500-1-.jpg" class="kg-image" alt loading="lazy" width="1500" height="500" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/1500x500-1-.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/1500x500-1-.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/1500x500-1-.jpg 1500w"><figcaption><a href="https://twitter.com/780thC">Twitter background image for the US Army&apos;s 780th Military Intelligence Brigade</a></figcaption></figure><p>These are a pile of people in camo, they are resting trigger fingers on the finger guards of their rifles, I mean keyboards, they hold the keyboards like rifles, one dude even has the keyboard on a USB cable sling around his neck. The problem with this is that new forms of warfare just don&apos;t pop into existence, they tend to have long run lineages where you can look back at the history of a given form of warfare and learn a lot about today from how these forms of warfare evolved.</p><p>If we were to look at Naval Warfare, for example, most people have in their mind&apos;s eye something like an Iowa class Battleship firing shells that weigh as much as a Volkswagen Golf, 30 nautical miles with explosives that weigh as much as a grand piano. Or they imagine a more modern guided missile destroyer such as an Arleigh Burke class Destroyer firing piles of missiles off over the horizon to hit stuff they can only see on radar or know is there because they have other sensors informing them that there is stuff there to blow up.</p><figure class="kg-card kg-gallery-card kg-width-wide"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture1-2.jpg" width="2000" height="1573" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Picture1-2.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Picture1-2.jpg 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/04/Picture1-2.jpg 1600w, https://blog.cyberwarfa.re/content/images/2022/04/Picture1-2.jpg 2098w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture2-4.jpg" width="1081" height="721" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Picture2-4.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Picture2-4.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/Picture2-4.jpg 1081w" sizes="(min-width: 720px) 720px"></div></div></div></figure><p>But if you look back at the history of naval warfare, you don&apos;t really get this long range fire concept we have today. Naval Warfare originated in Ancient Egypt where 4000 years ago, someone had the bright idea that if you couldn&apos;t win on the land, you could cause havoc by going around your adversary and attacking or raiding their rear via building ships to carry troops down waterways. The result of this is what we know today as Galley&apos;s or more popularly the type of Gally known as a Trireme. These vessels were basically ships propelled by oars with a platform on top of them where you could have soldiers. In effect what was created was land, on a boat, so you could have a land battle at sea. You ram your adversary so that you can board their ship and have a battle for control of their ship.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture3.jpg" class="kg-image" alt loading="lazy" width="790" height="540" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Picture3.jpg 600w, https://blog.cyberwarfa.re/content/images/2022/04/Picture3.jpg 790w"></figure><p>We see a similar problem with how people think about modern Aerial Warfare where people think about big expensive projects like modern stealth aircraft such as this F-22 with an unusual camouflage scheme made of metallic plates or aircraft such as the unbelievably gorgeous F-117 Nighthawk.</p><figure class="kg-card kg-gallery-card kg-width-wide kg-card-hascaption"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture4-1.jpg" width="1280" height="720" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Picture4-1.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Picture4-1.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/Picture4-1.jpg 1280w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/f-117.jpg" width="1500" height="1000" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/f-117.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/f-117.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/f-117.jpg 1500w" sizes="(min-width: 720px) 720px"></div></div></div><figcaption>F-22 image from <a href="https://www.thedrive.com/the-war-zone/43228/f-22-raptor-covered-in-mirror-like-coating-photographed-flying-out-of-nellis-afb">here</a> and F-117 image from <a href="https://www.thedrive.com/the-war-zone/41642/f-117-aggressors-photographed-low-over-the-nevada-desert-during-red-flag-war-games">here</a></figcaption></figure><p>Airel Warfare experiments started before World War 1 to see what was and was not possible that ultimately resulted in a lot of ideas that have stuck around until today, the best example of which is bombing. Though unlike what people think of when they see World War 2 bombers carpet bombing cities, using the Norden Bombsights, you have some guy, in a flimsy cloth and balsa wood plane, aiming with the Mk 1 Human Eyeball and basically chucking modified hand grenades out of the plane, such as this example of a 20lbs Hales Bomb;</p><figure class="kg-card kg-image-card kg-width-wide"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture5.jpg" class="kg-image" alt loading="lazy" width="1082" height="720" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Picture5.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Picture5.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/Picture5.jpg 1082w"></figure><p>Even though Clausewitz was long dead by World War 1, this kind of creation and change in warfare throughout history is what lead him to claim that;</p><!--kg-card-begin: markdown--><blockquote>
<p>Every age has its own kind of war, its own limiting conditions, and its own peculiar preconceptions.<br>
<a href="https://doi.org/10.1080%2F01402390.2011.608939">Carl von Clausewitz; On War; pp 593</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>The finest modern example we have today is that of the French Cuirassier. These were a type of highly mobile light Cavalry unit that was intended to fight with sabre and firearm either on horseback or dismounted as needs be and were famous for having not just horsehair helmets but also breastplates like knights of old. At the start of World War 1, they rode into battle in not just their shiny armour, but their brightly coloured uniforms like a unit from a bygone era and in the face of machine gun fire, they didn&apos;t fare well.</p><figure class="kg-card kg-image-card kg-width-wide"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture8.jpg" class="kg-image" alt loading="lazy" width="1136" height="720" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Picture8.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Picture8.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/Picture8.jpg 1136w"></figure><p>But the idea of having a unit that can fight both mounted and dismounted with a range of weapons is not an idea that is dead and gone and not just that, the unit still exists today as the 12e R&#xE9;giment de Cuirassiers. They have been Peace Keeping and performing Counter Insurgency Operations in Mali as well as training with NATO allies in recent years, having exchanged their horses for Steel Beasts. The mode of warfare changed drastically, but the concept of Cuirassier, infantry that fights mounted and dismounted, has arguably become modern infantry tactics.</p><figure class="kg-card kg-gallery-card kg-width-wide"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture6.jpg" width="1080" height="720" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Picture6.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Picture6.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/Picture6.jpg 1080w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture7-1.jpg" width="1080" height="718" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Picture7-1.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Picture7-1.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/Picture7-1.jpg 1080w" sizes="(min-width: 720px) 720px"></div></div></div></figure><!--kg-card-begin: markdown--><h1 id="the-preconceptions-limitations-of-information-warfare">The Preconceptions &amp; Limitations of Information Warfare</h1>
<!--kg-card-end: markdown--><p>If we then want to think as militaries do about how they intend to use Cyber, what we need to do is look to the past and see what Information Warfare was before computers or Cyber and then see how these preconceptions limit what Information Warfare can be used to accomplish.</p><!--kg-card-begin: markdown--><h2 id="preconceptions">Preconceptions</h2>
<!--kg-card-end: markdown--><p>When most people think of Sun Tzu and his book The Art of War, they think that he was a strategic genius. Though to me, he is the first information warrior. His book is broken into 13 chapters, which are then subdivided into skills or <em>arts</em> one must learn to master that area of warfare. In a little bit, I will be discussing WayPoint 2028, which is how the US Army intends to fight wars from 2028 onwards. As part of this, one of the new units they will be deploying is the Theater Information Advantage Element, whose goal is to;</p><!--kg-card-begin: markdown--><blockquote>
<p>... provide enhanced non lethal capabilities, conduct information warfare protect friendly information and inform and influence activities ... though forward postured persistently engaged ...<br>
<a href="https://youtu.be/OUZp01CjdiI?t=315">Army University Press; WayPoint in 2028 &#x2013; Multidomain Operations</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>What the US is saying is that they will be protecting friendly information, or Operational Security (OPSEC), and they will be performing influence activities, which could be any number of things from Deception Operations to Psychological Operations (PSYOPS). And these are things Sun Tzu has ideas about, from 2500 years ago, that are still relevant today. For example on OPSEC;</p><!--kg-card-begin: markdown--><blockquote>
<p>Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.<br>
<a href="http://classics.mit.edu/Tzu/artwar.html">Sun Tzu; Art of War; Ch 1 Art 19</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>On Deception Operations;</p><!--kg-card-begin: markdown--><blockquote>
<p>Hold out baits to entice the enemy. Feign disorder, and crush him.<br>
<a href="http://classics.mit.edu/Tzu/artwar.html">Sun Tzu; Art of War; Ch 1 Art 20</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>On PSYOPS;</p><!--kg-card-begin: markdown--><blockquote>
<p>If your opponent is of choleric temper, seek to irritate him. Pretend to be weak, that he may grow arrogant.<br>
<a href="http://classics.mit.edu/Tzu/artwar.html">Sun Tzu; Art of War; Ch 1 Art 22</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>These are only from the first chapter of the Lionel Giles translation from 1910 and may be out of date, but what I want to get across is that for such generic examples, Sun Tzu, was thinking about major problems today, 2500 years ago. And I do mean generic, these could be applied prior to Information Warfare as we know it today, but Sun Tzu was just the seed that grew a tree.</p><p>Between Sun Tzu and our next character, the Islamic polymath, Abu Y&#x16B;suf Ya&#x2BB;q&#x16B;b ibn &#x2BC;Is&#x1E25;&#x101;q a&#x1E63;-&#x1E62;abb&#x101;&#x1E25; al-Kind&#x12B; or just Al-Kindi, there were all sorts of things tried that birthed Encryption. We saw the first substation cipher, the Atbash cipher, which replaced the first letter in the alphabet with the last, the second with the second last and so on, we saw the first transposition cipher where parchment was wrapped around the Scytale. When the parchment is read normally, it is a garbled mess, but when wrapped around a Scytale, a message can easily be read off of it. Al-Kindi&apos;s contemporary, Al-Khalil, who introduced Algebra to the world, created polyalphabetic ciphers.</p><p>Up to this point, the only way to break encryption was to get the plain text one way or another, such as understanding the keying used in the Atbash cipher, or the right Scytale was recovered to wrap parchment around. Al-Kindi was able to understand that some letters are used more than others and that this could be used to break ciphers by attempting to see if you could make a plain text by replacing a letter in the ciphertext, with the most common letter of the alphabet or most common words in a language, something that he was able to do thanks to Al-Khalil.</p><p>This was the creation of cryptanalysis and it wasn&apos;t just frequency analysis that Al-Kindi discovered. He came up with techniques to break some kinds of polyalphabetic ciphers and how to class ciphers, not to mention being a foundational scholar of Islamic Philosophy, being one of the first, if not the first person to understand light and optics, not to mention popularizing Indian Numerals like we use today</p><p> Between Al-Khalil and the next cast of characters at Room 40, lots of things happened of note such as cryptography making it to Japan in the 1500s, the French created le Grand Chiffre, a substitution cipher that relied on rather on substituting letters for other letters, it substituted French syllables for numbers, which could be referenced on a table. It was thought to be uncrackable after the tables were lost until &#xC9;tienne Bazeries in 1893. And now you know Mads Mikkelsen&apos;s rad character in Casino Royale, le Chiffre, means he was called the Cipher...</p><p>Anyway, Room 40 is an interesting bunch. <a href="https://youtu.be/z84AwLIfqAI">Naval historiographer Drachinifel described them as a headteacher, a book publisher, a translator of theological works, a naval instructor, a barrister and a scientist</a>. These people were so much more than that though! Room 40 isn&apos;t responsible for the birth of Signals Intelligence, after all the British had been using their near monopoly on cables and radio stations to transmit telegrams and diplomatic cables for decades at this point, but what they did that was important was they <em>fused</em> data. They brought together intercepted signals and cryptanalysis and this was the real magic.</p><p>Room 40 was set up just after the start of World War I with the specific intent of cracking German ciphers and by the end of 1914, they had all three of Germany&apos;s major codebooks, the SKM, the HVB and the VB codebooks. These codebooks were all used for naval communications and worked by having lists of possible orders or words that could be used to create a message to send. Each order or word would be given a numeric or alphanumeric code which would be what was transmitted via Morse Code.</p><p>These cracked codes allowed the British to achieve two major events in Information Warfare. The first was at the Battle of Jutland where the early warning of a massive German deployment of ships from Wilhelmshaven allowed the Royal Navy to position their ships in such a way that the Royal Navy could bring all their guns to bear on the German ships with withering fire and where the British had the setting sun behind them so they were black dots that were hard to see and gather gunnery data on. While this seems like a sure victory, the Battle of Jutland was ultimately inconclusive as the British had a fatal flaw in their ammunition handling procedures that lead to multiple ships completely exploding as well as having poor shell design that didn&apos;t penetrate targets but exploded on the armour belt.</p><p>The other major event was the Zimmerman Telegrams. Germany was sending some diplomatic traffic over US cables as their cables were cut on day one of the war. But the cable from Europe to the US went via the UK, at a site today known as GCHQ Bude, where the UK was able to intercept this traffic. The German State Secretary for Foreign Affairs, Arthur Zimmermann, sent a cable to Mexico, informing them of their intent to start <em>Unrestricted Submarine Warfare</em>. At the time it was a huge deal, less so today, but the US had drawn a hard red line under Unrestricted Submarine Warfare and would get involved on the side of the Entente in WWI if Germany chose to pursue this idea. To throw a spanner in the works, Zimmerman was inviting Mexico to join the war on the side of the Central Powers and was promised territory lost to the US in the preceding decades such as Texas, New Mexico and Arizona.</p><p>Mexico declined this offer as by the time they had the opportunity to reply, the British had publicized the story, though their store was that British agents in Mexico had stolen the telegram when they had cracked the diplomatic codes being used and decrypt the intercept, keeping Mexico out of the war, Germany isolated and the worlds largest economy on the side of the Entente. It should though be noted that it&apos;s not crazy to think that Mexico could have entered the war. After all just 3 years prior, the US had invaded Veracruz, the US was funding arms sales to anyone who rivalled Francisco &quot;Pancho&quot; Villa, and on the subject of Villa, the US had a decade long <em>Expedition</em> to capture Villa that included totally not invading Mexico and going at least 500 miles South of the US border.</p><p>This wasn&apos;t the only major breakthrough that Room 40 gave us. They also hit upon the idea of Radio Direction Finding, whereby turning the island of Great Britain into effectively a giant antenna, they were able to detect and locate transmissions made by German ships. You see long distance radio transmissions are a matter of power. The more power your transmitter uses, the further it can send signals. And the Germans only operated at full power. They could easily be heard from the UK. With the aid of spherical trigonometry, you can pretty accurately locate where a signal emanates from, using Spherical Cosine Law. Room 40 got so good at this that they stopped decrypting certain transmissions as they knew they were related to minefields and could precisely plot the locations of German minefields with great accuracy.</p><p>Room 40 ultimately became the Government Code and Cypher School or GC&amp;CS and was based at a little place you may have heard of called Bletchley Park, ultimately becoming an organisation you also may have heard of called GCHQ.</p><p>Post World War I while there was a nearly unbelievable run of inventions and discoveries that lead to mechanical encryption, mechanical cryptanalysis, the massive proliferation of signal generating equipment like telephones, all sorts of wireless communication for the everyday person in the street and the birth of digital computing to just skim how we got to today, there are really only two things the left on the list of preconceptions in Information Warfare. The work of Claude Shannon and the idea of communication as a mathematical concept, and how this allows not just the entire concept of Electronic Warfare (EW), but more importantly for how people think about Cyber Warfare, the birth of Electronic Attack.</p><p>While you could argue that the Royal Navy getting a warning that the German Navy had left port and you could attack them, this isn&apos;t really an attack as the platform, such as Admiral Jellico&apos;s flagship HMS Iron Duke at Jutland, isn&apos;t collecting data on the Electromagnetic (EM) Spectrum and then attacking based on that. In World War 2, the UK would widely deploy their ASDIC system, which today we know as sonar, in combination with the Radio Direction Finding that Room 40 developed to allow the Royal Navy to locate and home in on Nazi U-Boats and drop depth charges or early forms of acoustic homing torpedoes. This concept of allowing platforms to gather and deploy weapons against targets that are only detected in the EM Spectrum opens up a whole new world to fight in.</p><p>The UK was not the only side playing around in these early stages of Electronic Warfare, in fact, all the major powers in World War 2 were playing with EW. The one to watch though, that&apos;s gotta be Japan! During the Battle of Singapore, several ditched Hawker Hurricane fighters were ditched, but in good shape, and were later captured, <a href="https://j-aircraft.com/captured/capturedby/hurricane/captured_hurricane.htm">specifically that of Squadron Leader Richard &quot;Ricky&quot; Brooker, whose Hurricane, BE 208, was later restored and flown by Japan in 1943</a>. These Hurricane&apos;s had a feature called Identify Friend or Foe (IFF) which allowed radar operators to distinguish friendly aircraft from enemy aircraft. This system went on to be used on ships as well as on aircraft so that the allies could detect friendlies across the board.</p><p>Japan had an air search that on the ground was called a Type 12 and aboard ships was called a Type 21, and it operated in the range that the IFF system would respond to radar pulses with. This response to pinging, from enemy sources, would make this maybe the first case in history of <a href="https://cwe.mitre.org/data/definitions/284.html">CWE-284: Improper Access Control</a>. If you believe this as I do, it would also make this maybe the first instance of Cyber Warfare in history! And not just that, it would also be using what is undeniably modern attacker techniques.</p><p>Now the scuttlebutt here is a little speculative I don&apos;t have all the links in the chain but it&apos;s a great story if it&apos;s true! Japan also operated the Tachi 35 Height Finding Radar, and with a bearing and range from the Air Search Radar, Japan could figure out if something was a ship, or if it was a plane and by tracking movements and watching changes over time, you could build patterns and use those patterns to say, identify an Aircraft Carrier, in 3D space and <a href="https://maritime.org/doc/radar/part2.htm#pg9">do it to within as small a window as 1 mile</a>.</p><p>I say 1 mile because the ping you get back isn&apos;t a little tiny response, it&apos;s a large wideband signal you get back, and because this is the case, you potentially can hide in this band, which is how I believe that Japan targeted the USS Bunker Hill, by utilizing the US&apos; inability to see his plane in the natural camouflage of clouds and the concealment on the EM Spectrum provided by friendly US Aircraft;</p><!--kg-card-begin: markdown--><blockquote>
<p>Japanese Sub Lt. (j.g.) Yasunori Seiz&#x14D; piloted a Zero that went undetected by radar and emerged from the low broken clouds on Bunker Hill&#x2019;s starboard quarter.<br>
<a href="https://www.history.navy.mil/research/histories/ship-histories/danfs/b/bunker-hill-i.html">Naval Histroy and Heritage Command; Bunker Hill I (CV-17)</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Now, one kamikaze getting in would be a fluke, but 30 seconds later there was a second undetected kamikaze, and then a little later there was a third. In maybe as little as a minute, there were three kamikaze attacks on Bunker Hill. I am a firm believer that coincidences don&apos;t just happen and while this was on the 11th of May 1945, I can see this as being a test of Japan&apos;s ability to perform kamikaze attacks on US carriers.</p><p>This isn&apos;t the only thing Japan was working on along these lines, they were developing something called a <a href="https://apps.dtic.mil/sti/pdfs/AD0895893.pdf">HAMA 63 Foe Aircraft Locator which the US Army Air Force described as an Interception Computer (pdf page 90-92)</a> and was effectively a new type of entirely electronic and automated Ground-Controlled Interception (GCI) system, that was radically different from what the British for example operating. It is also possible that it was a very early form of Airborne Warning and Control System (AWACS) where an airborne radar plane could be used to identify Allied aircraft and have other aircraft in its formation target them.</p><p>Finally, if we look forward to the near future, I mentioned the <a href="https://youtu.be/OUZp01CjdiI?t=263">US Army&apos;s WayPoint 2028 doctrine</a>. This is generally interesting to me for a lot of reasons, but on the Information Warfare aspects of it, I want to point out a few things. First is that in the Perceptions section, I mentioned that you can use Cyber to have impacts beyond the information Domain, in Land, Sea, Air and in Space. This is how militaries think about weapons systems. You don&apos;t have a missile that you can only use to blow up a Frigate or a shell you can only use to blow up a tank. The missile is an Anti Ship Missile and can target all ships and maybe more. Tank shells can blow up helicopters and armoured personnel carriers as well as tanks.</p><p>This thinking has led the US Army to set up a what they call the TFC or Theater Fires Command, which will be used to provide fires to support missions and crucially, they show tube and rocket artillery in the video, but also some people with a pile of antennae all over the place. This is the big hint that they meshing the old school fires that one expects with new capabilities. The other interesting unit is the Cyber Warrior or the TIAE, Theater Information Advantage Element which will;</p><!--kg-card-begin: markdown--><blockquote>
<p>... provide enhanced non lethal capabilities, conduct information warfare protect friendly information and inform and influence activities ... though forward postured persistently engaged ...<br>
<a href="https://youtu.be/OUZp01CjdiI?t=315">Army University Press; WayPoint in 2028 &#x2013; Multidomain Operations</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Now that is pretty clear that these people should be Information Warriors rather than Cyber Warriors right? Well if you are familiar with the US Department of Defence&apos;s 2018 Cyber Strategy, you will be aware that <em>Persistent Engagement</em> and <em>Defend Forward</em> are what the DoD is calling Cyber. In effect, cyber is sexy with policymakers, but they don&apos;t understand it, so the DoD is telling policymakers that this is the cyber magic, but the boots on the ground, who know the details in and out of their roles and have spent years training, they know it as Information Warfare and that Cyber is just one of the tools available as they also have PSYOPS and OPSEC, which can easily be done without computers and are essential as we learned from Sun Tzu.</p><!--kg-card-begin: markdown--><h2 id="limitations">Limitations</h2>
<!--kg-card-end: markdown--><p>I did say I wanted to talk about the work of Claude Shannon and his groundbreaking work <a href="https://people.math.harvard.edu/~ctm/home/text/others/shannon/entropy/entropy.pdf"><em>A Mathematical Theory of Communication</em></a>, but there&apos;s a new heading? Well, Shannon&apos;s work is both a blessing and a curse. While it opens up an entirely new dimension for battle, it also imposes a single massive limitation on what is possible in this dimension. Shannon defines a generalized communications system that looks like this;</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://blog.cyberwarfa.re/content/images/2022/04/infomation-1.png" class="kg-image" alt loading="lazy" width="1643" height="542" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/infomation-1.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/infomation-1.png 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/04/infomation-1.png 1600w, https://blog.cyberwarfa.re/content/images/2022/04/infomation-1.png 1643w"></figure><p>Where the Information Source is the system that generates a message to be communicated and he defines the generation as functions. So when I speak, there is a function for speaking f and my speech happens over time, so the generation is f(t). Much like any function, you can add as many parameters as are needed by this function. The Transmitter takes the generated message and produces a signal for transmission. This isn&apos;t like the OSI 7 Layer model where a series of processes happen to send data, this is more like the Data Link Layer where data is put into Frames that can be transmitted.</p><p>Then there is the Medium as I call it, or as Shannon calls it, the Channel. This is simply the medium that the transmission can pass through such as air or a wire etc. The Reciever is the inverse of the transmitter, taking the signal and turning it back into a message. Finally, there is the Destination, which is the system that the message is intended for. For example, I gave the example of me speaking, you listening to me, makes you the intended person or system the message is for.</p><p>The curse is that if this entire dimension of warfare is defined by sources, transmitters, mediums, receivers and destinations, then you have a massively limited set of targets to attack. So when people are expecting a <em>Cyber War</em> and the massive power of cyber, they are aware that the potential of cyber is everywhere, but not necessarily that cyber can do what you imagine it can.</p><p>So when we see malware that targets Industrial Control Systems such as TRITON (aka TRISYS), people see that the malware targeted Safety Instrumentation Systems (SIS), and yes this is scary and dangerous and something that could legitimately kill people, but if you look at what SIS does, <a href="https://www.cyberark.com/resources/threat-research-blog/anatomy-of-the-triton-malware-attack">it is simply a sensor, a logic solver and a final control element</a>. The sensor monitors variables in an environment, then the logic solver determines if these variables are within safe parameters for a process and if they are outside the safe area, the final control element is an off switch that turns a given process off.</p><p>So while this seems simple in theory, it ignores the hoops you have to jump through to get to an SIS and how the Subversive Trilemma impacts your actions, but most of all, it limits how you can actually use Cyber capabilities against the SIS. Though it should be noted that hackers have an advantage that militaries to date haven&apos;t had. Systems such as SIS&apos; to Supervisory Control and Data Acquisition (SCADA), which allows humans to interact with the machinery of a process, are connected not just by cables, or wirelessly or some other medium, but they interact via protocols that abstract the physical operations taking place to something that not just computers can understand, but that hackers can natively interact with.</p><!--kg-card-begin: markdown--><h1 id="so-what-cyberz-pew-pew-do-we-see-in-ukraine">So What Cyberz Pew Pew do we See In Ukraine?</h1>
<!--kg-card-end: markdown--><p>When it comes to Information Warfare, there are two models that you can use to look at Information Warfare. The first is the <a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Borden Model</a>, which breaks Information Warfare into 4 categories;</p><ol><li>Degrade</li><li>Corrupt</li><li>Deny</li><li>Exploit</li></ol><p>And second is the <a href="https://users.monash.edu/~ckopp/InfoWar/Lectures/_JIW-2002-2-CK-BIM.pdf">Kopp model</a>, which breaks things down to;</p><ol><li>Denial of Information</li><li>Deception and Mimicry</li><li>Disruption and Destruction</li><li>SUBversion / Denial</li></ol><p>There is nothing wrong with the Koop Model, and it is still based off of the work of Claude Shannon, but I just have a preference for the Borden Model as for me, it is just easier to understand, so I will be looking at things through Borden&apos;s lens. And just for going forward from here, in the talk, to give background to the various categories of attacks, I give events from outside the current war, and then what we see currently so that you have the opportunity to fully understand the categories in the Borden Model.</p><!--kg-card-begin: markdown--><h2 id="attacks-that-degrade">Attacks that Degrade</h2>
<!--kg-card-end: markdown--><p>Shannon defined Information as the reduction of uncertainty, better known as noise, in data transmissions. So to attacks that Degrade information, you have attacks that do useful work on the information itself. Borden saw this as attacks that introduce malicious noise into a system, such that the level of uncertainty remains high, but beyond the examples he gives in his paper, it&apos;s not a useful way to look at the problem. I see attacks that degrade as ways of attacking the information itself rendering the data useless or creating a delay such that the information is useless by the time it is available to be processed.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://blog.cyberwarfa.re/content/images/2022/04/degrade-2.PNG" class="kg-image" alt loading="lazy" width="1557" height="513" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/degrade-2.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/degrade-2.PNG 1000w, https://blog.cyberwarfa.re/content/images/2022/04/degrade-2.PNG 1557w"></figure><!--kg-card-begin: markdown--><h3 id="wipers">Wipers</h3>
<!--kg-card-end: markdown--><p>Something that we have seen before and during the War in Ukraine is Wipers, some have even been directed at Ukraine previously like NotPetya, but there have been others such as Shamoon. There are more interesting attacks that degrade information in the War in Ukraine currently, so for background, I have discussions to follow on Shammon and NotPetya and I will skip over discussing the likes of WisperGate, HermeticWiper, CandyWiper etc and discuss what I see as more interesting forms of attacks that degrade information in the War in Ukraine.</p><!--kg-card-begin: markdown--><h4 id="shamoon">Shamoon</h4>
<!--kg-card-end: markdown--><p>Shamoon is a Logic Bomb, released by &quot;<em>The Cutting Sword of Justice</em>&quot;. This group is widely believed to be Iran but there is no substantive evidence in open sources to say that this is the case. The bomb was set to detonate on the 15th of August, 2012, in the middle of the Muslim holy month of Ramadan, across the whole company of Saudi Aramco, and potentially also RasGas, the Qatari national petrochemical company, though this has never been publicly confirmed. The choice of timing would ensure maximum damage with minimal chance to stop the bomb as the company would be operating on a skeleton staff of western, non-Muslim staff.</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture1.png" class="kg-image" alt loading="lazy" width="1229" height="720" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Picture1.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Picture1.png 1000w, https://blog.cyberwarfa.re/content/images/2022/04/Picture1.png 1229w" sizes="(min-width: 1200px) 1200px"><figcaption><a href="https://commons.wikimedia.org/wiki/File:Pastie_Cutting_Sword_of_Justice.png">A Paste of the <em>Cutting Sword of Justice&apos;s</em> message to the world</a></figcaption></figure><p>The Attack is believed to have begun in April or May of 2012 via a phishing attack, potentially taking advantage of a vulnerability in Word or Adobe Acrobat which gave the attackers a reverse shell into the network. This computer was potentially a <a href="https://web.archive.org/web/20120820024808/http://blog.seculert.com/2012/08/shamoon-two-stage-targeted-attack.html">proxy for the rest of the network to a C2 server</a>. Due to the flat nature of the IT Network, the attackers gained control of the Domain Administrator account and essentially had total control over the business functions of Aramco. They used this to deploy Shamoon on the network which used a dropper to drop 32 or 64-bit versions on devices and when the time came, along with a reporting component to communicate with the proxy or the C2 directly and a wiper called <a href="https://attack.mitre.org/software/S0364/">RawDisk, a commercial disk wiping program that can, in usermode, without using Windows API&apos;s, directly modify the disk, circumventing Windows security features.</a> In total, the bomb hit 35k systems, about 85% of IT infrastructure and took about 3.5 months to recover.</p><p>Aramco had a separate Operational Technology network that was made of ICS, SCADA and SIS systems that were able to keep functioning, though to prevent the risk of this becoming infected, Aramco chose to disconnect from the internet. Something they did a total of three times throughout the infection. Which for the world was a lucky thing. Aramco provides 25% of the world&apos;s energy needs. If RasGas was also hit, that&apos;s 14% of the world&apos;s energy needs. In total, nearly 40% of the world&apos;s production of energy could have vanished in minutes. Would that have been sufficient &quot;<em>scale and effects</em>&quot; to be considered an Armed Attack if it had happened? Hard to say, <a href="https://cyberlaw.ccdcoe.org/wiki/Shamoon_(2012)">NATO&apos;s CCDCOE has it as a real world example of a state or state sponsored hacking campaign, </a>on its short, <a href="https://cyberlaw.ccdcoe.org/wiki/List_of_articles#Real-world_examples">shortlist of 51 such articles</a>.</p><p>It&apos;s also worth noting that Shamoon may not be dead. It has made two comebacks, <a href="https://unit42.paloaltonetworks.com/unit42-shamoon-2-return-disttrack-wiper/">Shamoon 2</a> which had similar targeting to the Aramco attack and timing in accordance with a time when people would be out of the office, though this was a weekend rather than a holy holiday. And <a href="https://unit42.paloaltonetworks.com/shamoon-3-targets-oil-gas-organization/">Shamoon 3</a> which attacked an Italian petrochemical company, <a href="https://www.reuters.com/article/us-cyber-shamoon/saipem-says-shamoon-variant-crippled-hundreds-of-computers-idUSKBN1OB2FA">Saipem</a> but operated with a different modus operandi to previous versions and had some previous functionality removed.</p><p><a href="https://darknetdiaries.com/episode/30/">Jack Rhysider has an amazing episode of Darknet Diaries on Shamoon</a> and it&apos;s not just amazing because of the background it gives you into Shamoon, &#xA0;but also the recovery process for Saudi Aramco with the woman who lead the recovery.</p><!--kg-card-begin: markdown--><h4 id="notpetya">NotPetya</h4>
<!--kg-card-end: markdown--><p>NotPetya is a fascinating piece of malware. Essentially it is a data wiper, but not like any you have seen until recently with Russia&apos;s offensive in Ukraine. It masqueraded as ransomware, it even told you how you could pay to recover your system, but no key ever existed to decrypt your device, even if you paid. This may have been the first case of deliberately dysfunctional malware which had the absolutely intended consequence of destroying systems and making them unrecoverable. Not only did it have EternalBlue two months after it dropped, but it also had ways to get on to systems that were patched against this vulnerability.</p><p>The attack was simple. In Ukraine, basically anyone who files taxes or does business in the country uses a piece of software called <a href="https://medoc.ua/">M.E.Doc</a> to do and file those taxes. The update servers for M.E.Doc were hijacked by Sandworm which essentially gave them a backdoor into thousands of computers, and on thousands of LANs and with EnternalBlue, it gave them the potential to access millions of devices. To ensure it could spread with incredible speed, Mimikatz was also used to access users&apos; credentials and use them to access other machines on the network. The combination of both is brilliant as if there is a single unpatched device on the network, EternalBlue can get you in and Mimikatz can use credentials it finds to log into devices that are patched. </p><p>Once it was on a system it worked to encrypt the Master Boot Record, or MBR, which had two major impacts on a system. The first is that with the MBR encrypted, the system didn&apos;t know how to find the operating system. The second is that the Partition Table was encrypted so that the location of all your files is essentially lost forever&#x2020;. With the MBR encrypted, <a href="https://legendary.industries/p/c7b4f89a-cc26-40e0-8844-b097384f7dae/theregister.com/2017/06/28/petya_notpetya_ransomware/">the malware would set itself as bootable media in the MBR</a> and boot to the error message you see below.</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://www.bleepstatic.com/content/posts/2018/02/14/NotPetya.png" class="kg-image" alt="Catalin Cimpanu, UK Formally Accuses Russian Military of NotPetya Ransomware Outbreak" loading="lazy"><figcaption><a href="https://www.bleepstatic.com/content/posts/2018/02/14/NotPetya.png)](https://www.bleepingcomputer.com/news/security/uk-formally-accuses-russian-military-of-notpetya-ransomware-outbreak/">Catalin Cimpanu; UK Formally Accuses Russian Military of NotPetya Ransomware Outbreak</a></figcaption></figure><p><a href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/">Wired</a> has a breakdown of the cost of the damage caused by NotPetya that includes the $10 Billion in damages and the untold destruction of computers in what the Ukrainian Minister of Infrastructure summarised as &quot;<em>The government was dead</em>&quot; &#xA0;as an estimated 10% of all computers in the country were dead and all of this was done in about 45 seconds in what has been called &quot;<em>fastest-propagating piece of malware we&#x2019;ve ever seen</em>&quot;.</p><p>If you want to learn more, there are tons of great sources on this! Andy Greenberg&apos;s fantastic <a href="https://www.penguinrandomhouse.com/books/597684/sandworm-by-andy-greenberg/">book Sandworm</a>, where chapter 24 is dedicated just to NotPetya. There&apos;s <a href="https://darknetdiaries.com/episode/54/">a great episode of Darknet Diaries on it</a> and unusually, we have an inside account from the Identity &amp; Access Management Subject Matter Expert, and later IAM Service Owner at <a href="https://gvnshtn.com/maersk-me-notpetya/">Maersk who was on the front line of dealing with the impacts of NotPetya</a>.</p><!--kg-card-begin: markdown--><h3 id="http-418">HTTP 418</h3>
<!--kg-card-end: markdown--><p>This is hands down my favourite attack, it&apos;s simple, there&apos;s not much to say, but it&apos;s wonderful! Someone hacked the Russian Ministry of Defence&apos;s website to respond with the HTTP error 418, informing the world that it was no longer a webserver, but it was now a teapot when queried with the Hyper Text Coffee Pot Control Protocol. Effectively it&apos;s a very simple DDoS.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Russia&apos;s military website (<a href="https://t.co/FZOqrzvQ8R">https://t.co/FZOqrzvQ8R</a>) is currently down, returning HTTP 418 (I&apos;m a teapot) &#x1F480;&#x1F480;&#x1F480; <a href="https://t.co/s7QYbz0Y01">pic.twitter.com/s7QYbz0Y01</a></p>&#x2014; dangered wolf &#x1F499;&#x1F49B; (@dangeredwolf) <a href="https://twitter.com/dangeredwolf/status/1497053080755580928?ref_src=twsrc%5Etfw">February 25, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><!--kg-card-begin: markdown--><h3 id="painting-the-electromagnetic-spectrum">Painting the Electromagnetic Spectrum</h3>
<!--kg-card-end: markdown--><p>Today in Ukraine we see some different things going on that are interesting. Russia operates a Numbers Station known to the world as <a href="https://priyom.org/military-stations/russia/the-buzzer/">The Buzzer or UVB-76</a>. One of the things we have seen happen on the chunk of spectrum that UVB-76 usually operates on is where <em>pirates</em> have been drawing pictures in the waterfall of the spectrum by injecting bits of noise onto the spectrum. These bits of noise form a pixel on the waterfall. Of course, you can use pixels to make images and this is what the pirates have been doing. These pictures range from pictures such as <em>My Little Pony</em> characters, a cute little bee and various other objects.</p><figure class="kg-card kg-gallery-card kg-width-wide kg-card-hascaption"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture2.png" width="741" height="538" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Picture2.png 600w, https://blog.cyberwarfa.re/content/images/2022/04/Picture2.png 741w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture3.png" width="391" height="538" loading="lazy" alt></div></div></div><figcaption><a href="https://twitter.com/RedFox0x20/status/1485237440080191490?s=20&amp;t=gfwCSBCa2X8n364R_oN53A">Images from the Twitter thread that @RedFox0x20 on some of the painting of the EM Spectrum</a></figcaption></figure><!--kg-card-begin: markdown--><h3 id="jamming-gps-andor-glonass">Jamming GPS and/or GLONASS</h3>
<!--kg-card-end: markdown--><p>Ukraine being a post-Soviet state has access to all of the toys that we left behind and some of these systems were Electronic Warfare (EW) systems. One of the things you can EW systems is to jam a radio frequency. While the concept of jamming can get very complex, so complex that I need help from a friend to explain it to me like I was a 4 year old, in its simplest form, jamming is just increasing the signal to noise ratio that the device to be jammed.</p><p>When we look at GPS, for Civilian or Military use, the signal that arrives at your device arrives at a precise frequency with very precise timing data attached to it. If you were to increase the noise around a given location, you would end up in a situation where the timing signature could be slightly manipulated by making it so that part of the signal was unintelligible or error correction changed the timing signature to something else. </p><p>Since we are dealing with things moving at the speed of light, and light travels one foot in a nanosecond, if you were to even make slight changes to the timing data, you could massively impact the location of things compared to where they actually are in the real world. Realistically you can only offset things by tens of feet, but that is more than enough to defend locations and we have seen exactly this in Ukraine recently where Ukraine has protected at least some of its air defences with this technique and there is little Russia can do about it</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">This lost Russian UAV may be due to Ukrainian jamming of Global Navigation Satellite Systems (GNSS) around their SAM sites.<br><br>There has been some evidence of this going on circulating on various Discord server forums from the beginning of the war.<br><br>The Russians are aware by now<br>1/ <a href="https://t.co/1q9x10LTI2">https://t.co/1q9x10LTI2</a> <a href="https://t.co/aeheIiUqFj">pic.twitter.com/aeheIiUqFj</a></p>&#x2014; Trent Telenko (@TrentTelenko) <a href="https://twitter.com/TrentTelenko/status/1503452423557423110?ref_src=twsrc%5Etfw">March 14, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><!--kg-card-begin: markdown--><h3 id="the-ka-sat-kerfuffle">The KA SAT Kerfuffle</h3>
<!--kg-card-end: markdown--><p>I brought this up with the ICSPC Discord but I chose not to use at BSides as the information had yet to firm up and I didn&apos;t want to make unfounded statements based on what I had inferred rather than on what there was evidence for, to such a large and public audience. Since then Viasat has released a statement and more data has come to light, so I can talk about what I know, sans speculation.</p><p>To understand this whole thing, you need to understand that KA SAT is a satellite operated by Viasat and bandwidth on this network is resold to others, and what is relevant in this case is that it is resold to Skylogic, a subsidiary of Eutelsat, where the satellite internet service is called Tooway. Viasat has made a statement where they effectively threw Skylogic and Eutelsat under the bus;</p><!--kg-card-begin: markdown--><blockquote>
<p>This incident was localized to a single consumer-oriented partition of the KA-SAT network that is operated on Viasat&#x2019;s behalf by a Eutelsat subsidiary, Skylogic, under a transition agreement Viasat signed with Eutelsat following Viasat&#x2019;s purchase of Euro Broadband Infrastructure S&#xE0;rl (&quot;EBI&quot;), the wholesale broadband services business created as part of Viasat&apos;s former partnering arrangement with Eutelsat. The residential broadband modems affected use the &#x201C;Tooway&#x201D; service brand. This cyber-attack did not impact Viasat&#x2019;s directly managed mobility or government users on the KA-SAT satellite. Similarly, the cyber-attack did not affect users on other Viasat networks worldwide.<br>
<a href="https://www.viasat.com/about/newsroom/blog/ka-sat-network-cyber-attack-overview/">Viasat; KA-SAT Network cyber attack overview</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>In effect, Skylogic&apos;s Tooway network was compromised and as the attack went on, there was also a decline in the number of modems connected to the satellite. Ruben Santamarta, known for his Reversemode blog, released a post where he looked at the ASNs that Skylogic has and noticed that they use Fortigate appliances, which had some pretty major issues in 2021 with <a href="https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/">a leak of user passwords</a>, which lead to a spate of hacks on Fortinet big iron. Once inside the VPN network, they were able to access the management API, which Ruben also found and posted in his blog. Through this, he concludes that the TR069 protocol was being used to install an app on the modems, which the AcidRain wiper, taking them offline.</p><!--kg-card-begin: markdown--><h3 id="rubber-hose-cryptanalysis">Rubber-Hose Cryptanalysis</h3>
<!--kg-card-end: markdown--><p>Finally, we have the attack that I predict most often, the attack where a provider is taken offline. Normally this is something that I would expect to see via having a cable cut, particularly one on the seabed as the lead times to fix such an issue are in years rather than days, but in Ukraine, we have seen an example of a provider going down due to what I have seen described on the grapevine as <em>coercion</em>. </p><p>The employee who was <em>coerced </em>is now safe which is good news, but we know very little else beyond that this person was <em>coerced</em> into giving up credentials and these credentials were subsequently used to take down Ukrtelecom. I&apos;m sure you can imagine what I believe to be the series of events that took place given the heading I chose to use and Russia&apos;s history recent in places like Mariupol, Bucha or Borodianka.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">&#x1F4F0; Hackers took down <a href="https://twitter.com/hashtag/Ukraine?src=hash&amp;ref_src=twsrc%5Etfw">#Ukraine</a>&apos;s national internet provider Ukrtelecom by stealing credentials from an employee in a territory recently occupied by Russia, then compromising and gaining access to the ISP&apos;s network.<br><br>&#x1F58B; <a href="https://twitter.com/SebMoss?ref_src=twsrc%5Etfw">@SebMoss</a> writes for <a href="https://twitter.com/dcdnews?ref_src=twsrc%5Etfw">@dcdnews</a><a href="https://t.co/n2YV74v9ep">https://t.co/n2YV74v9ep</a></p>&#x2014; NetBlocks (@netblocks) <a href="https://twitter.com/netblocks/status/1511720444105310221?ref_src=twsrc%5Etfw">April 6, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><!--kg-card-begin: markdown--><h2 id="attacks-that-deny">Attacks that Deny</h2>
<!--kg-card-end: markdown--><p>Attacks that Deny are attacks that attempt to render the assets that collect and process data useless. Traditionally, this has been attacks on receivers that are collecting information.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://blog.cyberwarfa.re/content/images/2022/04/deny1.PNG" class="kg-image" alt loading="lazy" width="1555" height="512" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/deny1.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/deny1.PNG 1000w, https://blog.cyberwarfa.re/content/images/2022/04/deny1.PNG 1555w"></figure><!--kg-card-begin: markdown--><h3 id="suppression-of-enemy-air-defenses-sead">Suppression of Enemy Air Defenses (SEAD)</h3>
<!--kg-card-end: markdown--><p>On the 20th of June 2019, the IRGC shot down an American RQ-4 Global Hawk drone that Iran contends violated Iranian airspace in the Strait of Hormuz. Iran used &#x633;&#x648;&#x645; &#x62E;&#x631;&#x62F;&#x627;&#x62F; or a 3rd Khordad, sometimes called a Sevom Khordad, air defence missile system.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="fa" dir="rtl">&#xAB;<a href="https://twitter.com/hashtag/%D9%BE%D9%87%D9%BE%D8%A7%D8%AF_%D8%A2%D9%85%D8%B1%DB%8C%DA%A9%D8%A7%DB%8C%DB%8C?src=hash&amp;ref_src=twsrc%5Etfw">#&#x67E;&#x647;&#x67E;&#x627;&#x62F;_&#x622;&#x645;&#x631;&#x6CC;&#x6A9;&#x627;&#x6CC;&#x6CC;</a> &#x62F;&#x631; &#x62F;&#x627;&#x645; &#x633;&#x627;&#x645;&#x627;&#x646;&#x647; &#x67E;&#x62F;&#x627;&#x641;&#x646;&#x62F;&#x6CC; &#x627;&#x6CC;&#x631;&#x627;&#x646;&#x6CC;&#x61B; &#x627;&#x648;&#x644;&#x6CC;&#x646; &#x634;&#x6A9;&#x627;&#x631; &#x62F;&#x631; &#x6A9;&#x627;&#x631;&#x646;&#x627;&#x645;&#x647; &quot;&#x633;&#x648;&#x645; &#x62E;&#x631;&#x62F;&#x627;&#x62F;&quot;&#xBB;  <br><br>&#x67E;&#x647;&#x67E;&#x627;&#x62F; &#x622;&#x645;&#x631;&#x6CC;&#x6A9;&#x627;&#x6CC;&#x6CC;RQ-&#x6F4; &#x62A;&#x648;&#x633;&#x637; &#x633;&#x627;&#x645;&#x627;&#x646;&#x647; &#x67E;&#x62F;&#x627;&#x641;&#x646;&#x62F;&#x6CC; &#x633;&#x648;&#x645; &#x62E;&#x631;&#x62F;&#x627;&#x62F; &#x633;&#x627;&#x642;&#x637; &#x634;&#x62F;&#x647; &#x627;&#x633;&#x62A;&#x61B;&#x633;&#x627;&#x645;&#x627;&#x646;&#x647; &#x67E;&#x62F;&#x627;&#x641;&#x646;&#x62F;&#x6CC; &#x633;&#x648;&#x645; &#x62E;&#x631;&#x62F;&#x627;&#x62F; &#x6CC;&#x6A9; &#x633;&#x627;&#x645;&#x627;&#x646;&#x647; &#x67E;&#x62F;&#x627;&#x641;&#x646;&#x62F;&#x6CC; &#x6A9;&#x627;&#x645;&#x644;&#x627; &#x628;&#x648;&#x645;&#x6CC; &#x627;&#x633;&#x62A; &#x6A9;&#x647; &#x628;&#x647; &#x62F;&#x633;&#x62A; &#x645;&#x62A;&#x62E;&#x635;&#x635;&#x627;&#x646; &#x635;&#x646;&#x627;&#x6CC;&#x639; &#x62F;&#x641;&#x627;&#x639;&#x6CC; &#x6A9;&#x634;&#x648;&#x631; &#x637;&#x631;&#x627;&#x62D;&#x6CC; &#x634;&#x62F;&#x647; &#x627;&#x633;&#x62A; <a href="https://t.co/wOY25bsiPB">https://t.co/wOY25bsiPB</a> <a href="https://t.co/vMuSoR4U2z">pic.twitter.com/vMuSoR4U2z</a></p>&#x2014; &#x62E;&#x628;&#x631;&#x6AF;&#x632;&#x627;&#x631;&#x6CC; &#x62A;&#x633;&#x646;&#x6CC;&#x645; &#x1F1EE;&#x1F1F7; (@Tasnimnews_Fa) <a href="https://twitter.com/Tasnimnews_Fa/status/1141626897383743489?ref_src=twsrc%5Etfw">June 20, 2019</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>In response to this, POTUS ordered a mix of kinetic and non-kinetic fires against these systems, <a href="https://news.yahoo.com/us-launched-cyber-attacks-iran-drone-shootdown-reports-232123877.html">but called off the kinetic ones</a>, to keep things <a href="https://www.nytimes.com/2019/06/22/us/politics/us-iran-cyber-attacks.html">below the threshold of armed attack</a>. The <a href="https://www.nytimes.com/2019/06/22/us/politics/us-iran-cyber-attacks.html">New York Times reported</a> that multiple systems were targeted, they mention an additional attack;</p><!--kg-card-begin: markdown--><blockquote>
<p>An additional breach, according to one person briefed on the operations, targeted other computer systems that control Iranian missile launches.<br>
<a href="https://www.nytimes.com/2019/06/22/us/politics/us-iran-cyber-attacks.html">Julian E. Barnes and Thomas Gibbons-Neff; U.S. Carried Out Cyberattacks on Iran</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>It would appear that <a href="https://sg.news.yahoo.com/2019-06-22-us-cyberattack-reportedly-knocked-out-iran-missile-control-syste.html">US Cyber Command carried out this attack and it was their first since they became a full combat command</a>. Given that they were able to attack what appears to be the command and control computers of a battery, this is effectively the suppression of enemy air defences and done in a way that doesn&apos;t put Wild Weasel crews or aircraft at risk. It is unclear if the attack was against a single battery, multiple independent batteries or against a battalion of batteries though, which could have wide-ranging consequences if the battalion command and control vehicle&apos;s systems were targeted;</p><!--kg-card-begin: markdown--><blockquote>
<p>The C2 unit provides communication between Sevom Khordad batteries. Furthermore, the C2 unit can connect other air defense systems of the Raad family, including Raad and Tabas, into a single air defense network. This allows to cover large area and targets can be engaged with a wide range of missiles from the cheapest Taer-1 missiles to the most capable Taer-2s. This adds the capability of facing different types of threats with different types of interceptors. In case of heavy jamming when even the X-band engagement radar can&#x2019;t handle its duty, the C2 unit can provide an additional data link, connecting the system to electro-optical engagement systems of Raad batteries, in order to guide missiles toward targets.<br>
<a href="http://www.military-today.com/missiles/sevom_khordad.htm">Ehsan Ostadrahimi; Sevom Khordad - Medium-range air defense missile system</a></p>
</blockquote>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="sead-in-ukraine">SEAD in Ukraine</h3>
<!--kg-card-end: markdown--><p>By comparison, Russia has an option that the US didn&apos;t have when the US went after Iranian air defences. Russia can use things that go bang and boom. </p><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture14.jpg" class="kg-image" alt loading="lazy" width="1279" height="720" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Picture14.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Picture14.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/Picture14.jpg 1279w"><figcaption><a href="https://www.euronews.com/video/2022/02/24/russia-attack-aftermath-at-ukraine-military-site">Screen capture from a news bulletin on the destruction of Ukrainian air defences</a></figcaption></figure><p>If you compare these two events, you end up in a situation where when a commander is presented with options, to strike air defences, you have a Cyber team of at least 4, with a SIGDEV, SIGOPS, Signals Analyst, and Signals Exploitation to work on the project over months and they can&apos;t guarantee with certainty that their operation will go to plan. Or you can turn to the fighter jock who can basically guarantee that he will blow up the air defences with a 99% chance of success, within the next 24 hours.</p><!--kg-card-begin: markdown--><h2 id="the-other-form-of-denial">The Other Form of Denial</h2>
<!--kg-card-end: markdown--><p>As I mentioned previously, Information Warfare is a very old idea, but after Claude Shannon and before the invention of modern computing that gave us Cyber, the US was experimenting with traditional Information Warfare techniques such as Warfare like Electronic Warfare and Psychological Operations, but they didn&apos;t stop there, they were also trying to apply the same techniques in a more general sense.</p><p>One of the ideas they had was rather than go after the systems that gathered or processed data, they would go after the endpoints that analysed the data to form intelligence or to go after the endpoints that acted based on this intelligence such that there would be more opportunities to break the intelligence cycle, in the same way you can potentially stop cyber intrusions by breaking the Cyber Kill Chain. This idea was something the US called Command and Control Warfare or C2W.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://blog.cyberwarfa.re/content/images/2022/04/deny2.PNG" class="kg-image" alt loading="lazy" width="1550" height="508" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/deny2.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/deny2.PNG 1000w, https://blog.cyberwarfa.re/content/images/2022/04/deny2.PNG 1550w"></figure><!--kg-card-begin: markdown--><h3 id="command-and-control-warfare">Command and Control Warfare</h3>
<!--kg-card-end: markdown--><p>In the sense that most engineers and analysts in the Cyber Realm would be used to looking at the world, a perfect example of C2W would be where DNS requests are blackholed such that the C2 Server never gets to act upon infected machines or when a new piece of malware is analysed and Yara rules are distributed which can prevent a system from being compromised or detect an existing compromise.</p><p>While this is entirely possible in the military realm, there is more you can do. For example, if a state was to run a malware campaign, they could go after those that planned and ordered the campaign and the same goes for those that plan and order military operations. </p><p>During the Air Campaign of the First Gulf War, the Coalition Forces went after the C2 Systems of Iraq. This is something I previously wrote about in my first post on Information Warfare, but the cliff notes are that the Coalition Forces, particularly the US started with the KARI fibre optic network, and then the POTS network, leaving only the insecure microwave for Iraqi Armed Forces comms. While they could stop here, they also targeted the literal command and control systems of the Iraqi regime. They went after Saddam&apos;s generals. </p><figure class="kg-card kg-gallery-card kg-width-wide kg-card-hascaption"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture10.jpg" width="481" height="360" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture11.jpg" width="481" height="360" loading="lazy" alt></div></div></div><figcaption><a href="https://nsarchive2.gwu.edu/NSAEBB/NSAEBB88/">George Washington University&apos;s National Security Archive; Eyes on Saddam: U.S. Overhead Imagery of Iraq</a>. On the left is the pre-strike image of the site and on the right is the post-strike.</figcaption></figure><!--kg-card-begin: markdown--><h3 id="c2w-in-ukraine">C2W in Ukraine</h3>
<!--kg-card-end: markdown--><p>Today, Ukraine is doing the same thing. They are using drones. First, they are using modified commercial drones to find Russian positions and forward coordinates to artillery units so that fire can be directed, possibly using the indigenously designed <a href="https://ukroboronprom.com.ua/en/product/kvitnik">Kvitnyk</a> laser designated artillery shell, as can be seen here, directing fire at a Russian anti-air system;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Amazing footage! An <a href="https://twitter.com/hashtag/UkrainianArmy?src=hash&amp;ref_src=twsrc%5Etfw">#UkrainianArmy</a> drone detects a Buk M1-2 air defense system of <a href="https://twitter.com/hashtag/RussianArmy?src=hash&amp;ref_src=twsrc%5Etfw">#RussianArmy</a>, its crew report its position to an artillery unit and they target it immediately using precision-guided artillery shells! <a href="https://t.co/WRZLKmAtU9">pic.twitter.com/WRZLKmAtU9</a></p>&#x2014; Babak Taghvaee - &#x39C;&#x3C0;&#x3AC;&#x3C0;&#x3B1;&#x3BA; &#x3A4;&#x3B1;&#x3BA;&#x3B2;&#x3B1;&#x3AF;&#x3B5; - &#x628;&#x627;&#x628;&#x6A9; &#x62A;&#x642;&#x648;&#x627;&#x6CC;&#x6CC; (@BabakTaghvaee) <a href="https://twitter.com/BabakTaghvaee/status/1504189806011731969?ref_src=twsrc%5Etfw">March 16, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>They are using similar techniques to go after forward units rather than just sticking to more rear area units, as can be seen here being used as part of an attack on Russian formation; </p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">UAV footage showing Ukrainian attacks on a Russian armored column in Brovary, including that captured T-72A tank. According to the audio, the regimental commander was killed. It appears it was a mix of Ukrainian artillery and tank strikes on the column.<a href="https://t.co/LemIgjQiOZ">https://t.co/LemIgjQiOZ</a> <a href="https://t.co/x2tVSHPENa">pic.twitter.com/x2tVSHPENa</a></p>&#x2014; Rob Lee (@RALee85) <a href="https://twitter.com/RALee85/status/1501873146818969610?ref_src=twsrc%5Etfw">March 10, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>They are also not limited to commercial drones, they have been purchasers of the Turkish Bayraktar TB2 too, to great effect to fire and direct laser guided weapons. The TB2 has specifically been used to target the command posts of Russian troops, in classic C2W fashion;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Last couple TB2 vids have looked like Ukraine has started hunting down Russian army command post. Possibly where the last couple generals and high ranking officers were killed  <a href="https://t.co/m5vl9DXzG2">pic.twitter.com/m5vl9DXzG2</a></p>&#x2014; Lost Weapons (@LostWeapons) <a href="https://twitter.com/LostWeapons/status/1502414061010522112?ref_src=twsrc%5Etfw">March 11, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>Ukraine hasn&apos;t been solely relying on drones though, they have also had significant help from the <a href="https://twitter.com/CameraJones/status/961675818333327360?s=20&amp;t=H44zucKnoMno4CzigvUsxQ">US as part of the JMTGU and Canada as part of Operation Unifier</a> where among other items of training, they have been teaching Ukraine the finer art of Marksmanship. This isn&apos;t all the help they have been receiving on Marksmanship though as it appears that the CIA has opened <a href="https://news.yahoo.com/exclusive-secret-cia-training-program-in-ukraine-helped-kyiv-prepare-for-russian-invasion-090052743.html">the <a href="https://news.yahoo.com/exclusive-secret-cia-training-program-in-ukraine-helped-kyiv-prepare-for-russian-invasion-090052743.html">School of the Americas</a></a> to Ukraine rather than just fascist dictators in South America, though I am significantly less fond of this kind of support given the history of the School of the Americas... So what has the impact of all of this been?</p><!--kg-card-begin: markdown--><h4 id="generals">General&apos;s</h4>
<!--kg-card-end: markdown--><figure class="kg-card kg-gallery-card kg-width-wide"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture4.png" width="182" height="182" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture3-1.png" width="182" height="182" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture5.png" width="182" height="182" loading="lazy" alt></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Capture-1.png" width="662" height="662" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Capture-1.png 600w, https://blog.cyberwarfa.re/content/images/2022/04/Capture-1.png 662w"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture6.png" width="182" height="182" loading="lazy" alt></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/newFile.jpeg" width="683" height="683" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/newFile.jpeg 600w, https://blog.cyberwarfa.re/content/images/2022/04/newFile.jpeg 683w"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/765b6e960daf10ee6218766c9163168b23fe8b18c_2000_1331.jpg" width="350" height="350" loading="lazy" alt></div></div></div></figure><!--kg-card-begin: markdown--><p>Confirmed dead from top left to bottom right;</p>
<ol>
<li><a href="https://gur.gov.ua/content/pid-kharkovom-likvidovano-heneralmaiora-rosiiskoi-armii.html">Major General Vitaly Gerasimov - Chief of Staff and First Deputy Commander of the 41st Combined Arms Army</a></li>
<li><a href="https://twitter.com/RALee85/status/1500815613882683392?s=20&amp;t=qHL_5qPW27ePaFZUeQwblA">Major General Andrei Sukhovetsky - Deputy Commander of the 41st Combined Arms Army</a></li>
<li><a href="https://twitter.com/ArmedForcesUkr/status/1502294425992585225?s=20&amp;t=lY-hW8XXCqtriqwVE6ebXQ">Major General Andriy Kolesnikov - Commander of the Eastern Military District</a></li>
<li><a href="https://twitter.com/ArmedForcesUkr/status/1504001946323243008?s=20&amp;t=_xWC-lB_ybqNmon_fZbO5w">Major General Oleg Mityaev, Commander 150th Motor Rifle Division</a></li>
<li><a href="https://twitter.com/RALee85/status/1505094666684882944?s=20&amp;t=kVQ-EeSgexqfNsUrskR2-g">Lieutenant General Andrey Nikolaevich Mordvichev, Commander 8th Combined Arms Army</a></li>
<li><a href="https://twitter.com/MrKovalenko/status/1507193029064593409?t=_rzViXueolxCc1vNE2EUwA&amp;s=19">Lieutenant General Yakov Vladimirovich Rezantsev, Commander 49th Combined Arms Army</a></li>
<li><a href="https://www.wsj.com/livecoverage/russia-ukraine-latest-news-2022-04-15/card/russia-loses-another-major-general-in-ukraine-fighting-7bHXbR97hCy4IBVxJsjL">Major General Vladimir Petrovich Frolov, Commander 8th Guards Combined Arms Army</a></li>
</ol>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h4 id="colonels-and-equivalents">Colonel&apos;s and Equivalent&apos;s</h4>
<!--kg-card-end: markdown--><figure class="kg-card kg-gallery-card kg-width-wide"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture7-2.jpg" width="182" height="182" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture8.png" width="182" height="182" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture10.png" width="182" height="182" loading="lazy" alt></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Capture.png" width="1017" height="1017" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Capture.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Capture.png 1000w, https://blog.cyberwarfa.re/content/images/2022/04/Capture.png 1017w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Capture-1.PNG" width="960" height="960" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Capture-1.PNG 600w, https://blog.cyberwarfa.re/content/images/2022/04/Capture-1.PNG 960w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/FOhSU69XIAgDGTV.jpg" width="576" height="576" loading="lazy" alt></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/FOiHWfpWUAALTmM.jpg" width="514" height="514" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/download.jpg" width="279" height="279" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/FOTf7X3XEAIrb7b.png" width="450" height="450" loading="lazy" alt></div></div></div></figure><!--kg-card-begin: markdown--><p>Confirmed dead from top left to bottom right;</p>
<ol>
<li><a href="https://www.instagram.com/p/Cat6IYVqteF/">Colonel Konstantin Zizevsky, Commander 247th Guards Airborne Assault Regiment</a></li>
<li><a href="https://twitter.com/DI_Ukraine/status/1501849922206937090?s=20&amp;t=FL-Z3SX2QmYjaylf1pOL4w">Colonel Andrei Zakharov, Commander 6th Guards Tank Regiment of the 90th Guards Tank Division</a></li>
<li><a href="https://twitter.com/666_mancer/status/1503398662302584838">Colonel Sergei Ivanovich Porokhnya, Commander of the 12th engineering brigade</a></li>
<li><a href="https://twitter.com/IAPonomarenko/status/1504706312667643931?s=20&amp;t=WsL89-lUAr3zL9yFaZlL4Q">Colonel Sergey Sukharev, Commander 331st Airborne Regiment</a></li>
<li><a href="https://twitter.com/JackDetsch/status/1505587605500575744?s=20&amp;t=vo2lJa4FTvX59uvaDoUxnQ">Captain First Rank Andrey Nikolaevich Paliy, Deputy Commander Black Sea Fleet</a></li>
<li><a href="https://twitter.com/nexta_tv/status/1506544661304905739?t=2yYHf8ivnF4q1Z1R3qUAgA&amp;s=19">Colonel Alexei Sharov, commander of the 810th Marine Brigade</a></li>
<li><a href="https://www.gov.spb.ru/press/telegrams/233776/">Colonel Nikolai Ovcharenko, Western Military District&apos;s Deputy Commander of Engineer Troops</a></li>
<li><a href="https://twitter.com/EerikNKross/status/1508909973585149959?s=20&amp;t=GeFb8gu6jS7wOho8q9qyBg">Colonel Denis Kurilo, Commander 200th Separate Motor Rifle Brigade</a></li>
<li><a href="https://www.facebook.com/GeneralStaff.ua/posts/274663761513376">Colonel Igor Evgenievich Nikolaev, Commander 252nd Motor Rifle Regiment of the 3rd Motor Rifle Division</a></li>
</ol>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h5 id="lieutenant-colonels">Lieutenant Colonel&apos;s</h5>
<!--kg-card-end: markdown--><figure class="kg-card kg-gallery-card kg-width-wide"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture12.png" width="182" height="182" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Picture13.png" width="183" height="182" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/FOTGxGMX0AAO-pe.jpg" width="690" height="690" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/FOTGxGMX0AAO-pe.jpg 600w, https://blog.cyberwarfa.re/content/images/2022/04/FOTGxGMX0AAO-pe.jpg 690w"></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/FOOrYlfXEAYCDoK.jpg" width="420" height="420" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/SgtQNeGHdIo.jpg" width="854" height="854" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/SgtQNeGHdIo.jpg 600w, https://blog.cyberwarfa.re/content/images/2022/04/SgtQNeGHdIo.jpg 854w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/BiVnUjgt_v0.jpg" width="1063" height="1063" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/BiVnUjgt_v0.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/BiVnUjgt_v0.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/BiVnUjgt_v0.jpg 1063w" sizes="(min-width: 720px) 720px"></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/FNhiuQiX0AElC4Y.jpg" width="525" height="525" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/FOfd7ItXsAgbwn-.jpg" width="570" height="570" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/FPuqM6gakAEy_Ez.jpg" width="300" height="300" loading="lazy" alt></div></div></div></figure><!--kg-card-begin: markdown--><p>List</p>
<ol>
<li><a href="https://twitter.com/RALee85/status/1500797331255570438?s=20&amp;t=qHL_5qPW27ePaFZUeQwblA">Lieutenant Colonel Denis Glebov, Deputy Commander 11th Air Assault Brigade</a></li>
<li><a href="https://twitter.com/666_mancer/status/1501300152518074375?t=2uImga6IJYOmSHhonrXm9Q&amp;s=19">Lieutenant Colonel Yuriy Agarkov, Commander 33rd Motor Rifle Regiment of the 20th Guards Motor Rifle Division</a></li>
<li><a href="https://twitter.com/666_mancer/status/1505547850188472320?s=20&amp;t=n_fUDq0kDb6fXvmsfwv7Gg">Lieutenant Colonel Ilya Yuryevich Pyatkin, Special Rapid Response Unit</a></li>
<li><a href="https://twitter.com/666_mancer/status/1505236040428228622?s=20&amp;t=d9XaeGhIaUZNbijjcMAIVw">Lieutenant Colonel Sergey Savateev, Special Rapid Response Unit</a></li>
<li><a href="https://vk.com/rvvdku1918?w=wall-26673779_81795">Lieutenant Colonel Aleksey Sharshavov, Commander of 171st Independent Air Assault Battalion of the 7th Air Assault Division</a></li>
<li><a href="https://vk.com/rvvdku1918?w=wall-26673779_83307">Lieutenant Colonel Igor Zharov, Regimental commander of an unknown airborne unit</a></li>
<li><a href="https://twitter.com/MrKovalenko/status/1502059521774333954?s=20&amp;t=puAFDXHJMuPNfyypQi4Kxw">Lieutenant Colonel Alexey Narzullaevich Khasanov, Deputy Commander 31st Guards Fighter Aviation Regiment</a></li>
<li><a href="https://twitter.com/666_mancer/status/1507373191743815683">Lieutenant Colonel Viktor Kuzmin, Political Officer 234th Guards Air Assault Regiment</a></li>
<li><a href="https://eadaily.com/ru/news/2022/03/06/spartu-vozglavil-artem-zhoga-otec-ubitogo-nacistami-geroya-dnr">Warlord Vladimir Zhoga, Neo Nazi piece of shit, self professed War Criminal and Commander of the Sparta Battalion</a></li>
</ol>
<!--kg-card-end: markdown--><p>And this is only me skimming over the ones that I can find good pictures of. As of April 28th, I have possibly another General killed, 19 Colonels and 33 Lieutenant Colonels. Astonishing numbers for any war since 1900, before you even consider the 46 Majors, 87 Captains and 147 Lieutenants, before you even consider captured, wounded, missing or arrested officers. And I can&apos;t imagine how many Senior NCOs are dead when they are the backbone of militaries, or what the true scale of death is given that some of the best numbers we have come from leaks like this, from Meduza;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">In a now deleted VK post, the pro-Kremlin media outlet Readovka claims that Russia&#x2019;s Defense Ministry stated at a &#x201C;closed briefing&#x201D; that it&#x2019;s lost 13,414 soldiers in Ukraine *plus* another 7,000 who are missing. 116 sailors killed aboard the Moskva, with 100+ still missing. <a href="https://t.co/jHx7lZi9WA">pic.twitter.com/jHx7lZi9WA</a></p>&#x2014; Kevin Rothrock (@KevinRothrock) <a href="https://twitter.com/KevinRothrock/status/1517387374115926017?ref_src=twsrc%5Etfw">April 22, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>What is important that you take away from this is that Ukraine is systematically destroying Russia&apos;s capability to make and carry out strategic and operational plans. Ultimately we can&apos;t know the full impact of these deaths on Russia&apos;s fighting capabilities, probably until long after the war is over, but given how the war has progressed, it is clear that not just has the offensive not gone to plan, but that it has deteriorated as the war has dragged on, and not just because of the poor logistics.</p><!--kg-card-begin: markdown--><h2 id="attacks-that-corrupt">Attacks that Corrupt</h2>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card kg-width-full"><img src="https://blog.cyberwarfa.re/content/images/2022/04/corrupt.PNG" class="kg-image" alt loading="lazy" width="1555" height="514" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/corrupt.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/corrupt.PNG 1000w, https://blog.cyberwarfa.re/content/images/2022/04/corrupt.PNG 1555w"></figure><!--kg-card-begin: markdown--><h4 id="operation-outside-the-box">Operation Outside the Box</h4>
<!--kg-card-end: markdown--><p>Operation Outside the Box was a raid on an <a href="https://www.reuters.com/article/idUSTRE51I45R20090219">undocumented nuclear facility, possibly a covert graphite reactor</a>, in Syria by Israel in 2007. While the raid itself is interesting for multiple reasons such as the<a href="https://web.archive.org/web/20101105130625/http://www.haaretz.com/news/how-idf-troops-infiltrated-alleged-syria-nuke-site-1.272512"> Iranian financing of the reactor</a>, <a href="https://www.nytimes.com/2007/10/14/washington/14weapons.html?hp">the deaths of multiple North Korean nuclear technicians or scientists in the raid</a> or above all else <a href="https://web.archive.org/web/20071010175618/http://www.timesonline.co.uk/tol/news/world/middle_east/article2461421.ece">the nuclear materials for the reactor came from North Korea</a>, no, the most interesting part is how Israel used Electronic Warfare and possibly Cyber Warfare as part of the raid.</p><p>The raid required several Israeli aircraft to penetrate the airspace of Syria undetected to attack the facility. This happened in 2007 and the only nation in the world with stealth aircraft was the US with the F-117 and F-22 fighters and the B-2 Bomber. Israel used what they had, F-15s and F-16s for the raid along with electronic warfare aircraft. The attack took place in four major stages.</p><p>The first stage was to take off from Ramat David Airbase and fly up the Syrian coast until they reached the Turkish-Syrian border where they attacked a radar site at Tall al-Abuad in Syria. It was attacked with electronic warfare techniques, most likely jamming and then bombed with precision-guided bombs to take out the site. This created an entry point in Syrian air defence for the planes to penetrate the airspace. Once in the airspace, the really interesting part of the attack could begin.</p><blockquote>Almost immediately, the entire Syrian radar system went off the air for a period of time that included the raid, say U.S. intelligence analysts.<br><a href="https://aviationweek.com/israel-shows-electronic-prowess">David A. Fulghum, Robert Wall and Amy Butler; Israel Shows Electronic Prowess</a></blockquote><p>Through a combination of jamming the HF and VHF communication links that are used for the command and control of air defences, other unknown forms of electronic attack from the electronic warfare support aircraft and the &quot;<em>penetration through computer-to-computer links</em>&quot;, the aircraft were able to transit the airspace undetected and bomb the suspected nuclear reactor. It is unknown if the &quot;<em>penetration through computer-to-computer links</em>&quot; is a form of cyber warfare or if computers were linked via the HF/VHF network and were vulnerable to jamming or electronic attack.</p><p>It is believed that the electronic warfare support aircraft were able to create a spoofed image of the skies above Syria in what is called a &quot;<em>false sky picture</em>&quot; so that even though the Israeli aircraft were transiting the airspace, all the radar saw was the electronically manipulated image of the sky, that was what the Israelis broadcast and what they wanted the Syrian&apos;s to see.</p><blockquote>U.S. aerospace industry and retired military officials indicated today that a technology like the U.S. developed &quot;Suter&quot; airborne network attack system</blockquote><blockquote>...<br>The technology allows users to invade communications networks, see what enemy sensors see and even take over as systems administrator so sensors can be manipulated into positions so that approaching aircraft can&apos;t be seen, they say. The process involves locating enemy emitters with great precision and then directing data streams into them that can include false targets and misleading messages algorithms that allow a number of activities including control.<br><a href="http://www.aviationweek.com/Blogs.aspx?plckBlogId=Blog%3A27ec4a53-dcc8-42d0-bd3a-01329aef79a7&amp;plckPostId=Blog%3A27ec4a53-dcc8-42d0-bd3a-01329aef79a7Post%3A2710d024-5eda-416c-b117-ae6d649146cd">David A. Fulghum; Why Syria&apos;s Air Defenses Failed to Detect Israelis</a><br></blockquote><p>Essentially invisible to air defences, the Israeli aircraft proceeded to the target where commandos used laser designators to illuminate the target to be destroyed. With the facility bombed and destroyed, it was time for the aircraft to head home via the route they came, <a href="https://abcnews.go.com/Technology/story?id=3702807">still undetected</a>.</p><p>The vast majority of useful reporting on this comes from a fascinating article by <a href="https://aviationweek.com/israel-shows-electronic-prowess">David A. Fulghum, Robert Wall and Amy Butler called &quot;<em>Israel Shows Electronic Prowess</em>&quot; in Aviation Week</a> which gives an account of the attack through the lens of electronic warfare.</p><!--kg-card-begin: markdown--><h4 id="the-ghost-of-hostomel">The Ghost of Hostomel</h4>
<!--kg-card-end: markdown--><p>Normally when people think about the Ghost of Somewhere in Ukraine at the moment, they think of the <a href="https://www.thedrive.com/the-war-zone/44453/the-ghost-of-kyiv-is-the-mythical-hero-ukraine-needs-right-now">Ghost of Kyiv</a>, the badass but unfortunately fictional story of the first Fighter Ace of the 21st Century. For me though, Russia&apos;s destruction of the An-225 &#x41C;&#x440;&#x456;&#x44F;, one of the greatest pieces of humanitarian equipment on Earth was a real gut punch. The &#x41C;&#x440;&#x456;&#x44F; could be used to transport a lot of things, but when you needed oversize cargo delivered somewhere in the world, in an emergency, it was the only platform that could be relied on and sometimes it was the only platform you could use.</p><p>After its destruction was confirmed, there were some incredible and heartwarming memes about how much it meant, not just to international nerds like me who think planes are cool, but to regular Ukrainians who knew it as this one of a kind, gentle giant that helped the world painted in a beautiful paint job that screamed Ukraine. it has even become <a href="https://toys-kopitsa.com.ua/uk/vse-bude-ukrayina/mriya">a symbol you can buy a plushie of</a>. But for me, the best example I have seen of its value is when someone spoofed false data into flight tracking sites that said the &#x41C;&#x440;&#x456;&#x44F; was running racetracks around Kyiv with the callsign FCKPUTIN.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Just because it shows up on flight tracking sites, doesn&apos;t mean it&apos;s real: Destroyed An-225, formerly the world&apos;s largest cargo plane, is showing on <a href="https://twitter.com/flightradar24?ref_src=twsrc%5Etfw">@flightradar24</a>, callsign FCKPUTIN, circling Kyiv at 4,500ft.<a href="https://t.co/DGHdaexIZs">https://t.co/DGHdaexIZs</a> <a href="https://t.co/GZanwMnukm">pic.twitter.com/GZanwMnukm</a></p>&#x2014; Peter Aldhous (@paldhous) <a href="https://twitter.com/paldhous/status/1502211101802610689?ref_src=twsrc%5Etfw">March 11, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><!--kg-card-begin: markdown--><h4 id="the-scale-of-propaganda">The Scale of Propaganda</h4>
<!--kg-card-end: markdown--><p>Just under a month before the Russian Offensive started, OpenFacto, a French language collective of OSINT investigators published an absolutely incredible article, that is in English on their Twitter. OpenFacto started looking into a collective of sites called InfoRos. Now InfoRos is a major news portal and it wasn&apos;t until 2021.</p><p>2021 was a bad year for InfoRos. <a href="https://sgp.fas.org/crs/intel/R46616.pdf">The US Congress released a report on the unit behind InfoRos, GRU Unit 54777</a>, there was a flurry of reporting by major American news organisations, some of which included focusing on Alexander Starunsky, <a href="https://meduza.io/en/feature/2021/05/17/psy-ops-in-high-places">which Meduza covered in detail here</a>. But the really good stuff came from the Estonian Foreign Intelligence Service, where in their 2021 Public Security Environment Assessment, they dedicated nearly 5% of the report to the work of Unit 54777.</p><p>OpenFacto saw all of this and decided to poke around at InfoRos with some pointy sticks and see what fell out. Looking at the source of the pages, they were able to find a script, which had a dedicated nameserver that they could do a reverse lookup on. And wouldn&apos;t you know, they found not the 276 registered sites they claimed to be operating, but 1341;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">We identified a distinctive snippet of its source code and performed a reverse nameserver lookup via the InfoRos server that hosted the first discovered sites. We found a total of 1,341 InfoRos linked-websites. Most redirected to a Russian city news portal controlled by InfoRos.</p>&#x2014; OpenFacto (@openfacto) <a href="https://twitter.com/openfacto/status/1486829297889333260?ref_src=twsrc%5Etfw">January 27, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>When they started looking at the sites, they noticed that 75% of them didn&apos;t exist before 2019 or that it was a local site for a city or region that was <em>acquired </em>by InfoRos, effectively buying fronts to distribute Propaganda. &#xA0;It&apos;s also interesting that while there is a distribution across the whole of Russia, the vast majority of sites are in areas that are in Europe.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">We have identified a network of more than 1300 websites run by the GRU, targeting Russian speakers including domestic audiences. A thread &#x1F9F5;...<br><br>And read our full report here <a href="https://t.co/UArqBocSb3">https://t.co/UArqBocSb3</a> <a href="https://twitter.com/hashtag/Russia?src=hash&amp;ref_src=twsrc%5Etfw">#Russia</a> <a href="https://twitter.com/hashtag/Disinfo?src=hash&amp;ref_src=twsrc%5Etfw">#Disinfo</a>  <a href="https://twitter.com/hashtag/OSINT?src=hash&amp;ref_src=twsrc%5Etfw">#OSINT</a> <a href="https://t.co/u2LZJOMJmY">pic.twitter.com/u2LZJOMJmY</a></p>&#x2014; OpenFacto (@openfacto) <a href="https://twitter.com/openfacto/status/1486829290301931525?ref_src=twsrc%5Etfw">January 27, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>The other major distribution of InfoRos sites are places where Russia has what it considers to be problem areas such as Ciscaucasia, where Russia has internal republics such as Chechnya and Dagestan, or neighbouring states like Georgia where Russia has fought wars to ensure that Georgia is a divided state with autonomous regions like Abkhazia and Adjara or breakaway states from Georgia such as South Ossetia. Not to mention Armenia or Azerbaijan who fought a war last year over Nagorno-Karabakh, or Turkey a NATO state fighting the Kurds inside Turkey, but also beyond their borders in Northern Syria and Northern Iraq.</p><!--kg-card-begin: markdown--><h2 id="the-quiet-corruption">The Quiet Corruption</h2>
<!--kg-card-end: markdown--><p>While neither Borden nor Kopp discusses this form of Information Corruption, I believe that as professionals who work in Cyber should be aware that algorithms can be used to create a tailored view of what the world looks like. Now, this doesn&apos;t have to be malicious, Twitter for example changed up how they displayed tweets a while ago. Originally twitter would give users tweets as they came in, but over time they changed this so that twitter would show you popular tweets from your followers.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://blog.cyberwarfa.re/content/images/2022/04/corrupt2.PNG" class="kg-image" alt loading="lazy" width="1550" height="511" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/corrupt2.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/corrupt2.PNG 1000w, https://blog.cyberwarfa.re/content/images/2022/04/corrupt2.PNG 1550w"></figure><p>A less tasteful version of this tailored message would be the controlled implosion of the Evergrande company in China. While going through the controlled implosion, it was huge news here in the West with regular articles in various papers and segments on TV news shows. But inside China, it was a very different story inside the Great Firewall;</p><!--kg-card-begin: markdown--><blockquote>
<p>There are also kinda basic things, about you know, media, there was a New York Times piece, I think last week, about how Evergrande is everywhere in the foreign news and is nowhere in Chinese news and that means that, you know, Chinese people aren&apos;t maybe informed about what is happening. Obviously they know something about what is happening, but not to the extent, as they could if it was an open media.<br>
<a href="https://www.lawfareblog.com/lawfare-podcast-katrina-northrop-evergrande-debt-crisis">Jen Patja Howell, Jacob Schulz and Katrina Northrop; The Lawfare Podcast: Katrina Northrop on the Evergrande Debt Crisis; 00:13:45</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>You can argue the merits and failings of limiting the reach of the story inside China and the ultimate purposes of doing it, but the censors at the Publicity Department of the Chinese Communist Party, or should I say the Propaganda Department of the CCP are making the active choice to not allow the media to report on the issues around Evergrande. You could also look at how <a href="https://twitter.com/AirMovingDevice/status/1195575891146895360?s=20&amp;t=Oju5M2KdYL0fEk4l5o1d_w">Air-Moving Device has checked TikTok&apos;s API to see if certain phrases would trigger a manual review</a> of a user&apos;s posts if they contained certain words. <a href="https://twitter.com/AirMovingDevice/status/1196835009442615296?s=20&amp;t=Oju5M2KdYL0fEk4l5o1d_w">And how things are different when compared to Douyin</a>, which is TikTok in China. </p><p>It should though be noted that this isn&apos;t limited to just China. <a href="https://www.theguardian.com/world/2020/aug/16/facebook-algorithm-found-to-actively-promote-holocaust-denial">Facebook for example has been shown to actively promote Holocaust Denial</a>, and it is not alone with these problems. Reddit has repeatedly had similar issues, and more recently, Spotify has had this problem for throwing money at a moron who has had one too many head injuries and spends too much time JAQing off, writer Roxane Gay made a salient point;</p><!--kg-card-begin: markdown--><blockquote>
<p>I would never support censorship. And because I am a writer, I know that language matters. There&#x2019;s a difference between censorship and curation. When we are not free to express ourselves, when we can be thrown in jail or even lose our lives for speaking freely, that is censorship. When we say, as a society, that bigotry and misinformation are unacceptable, and that people who espouse those ideas don&#x2019;t deserve access to significant platforms, that&#x2019;s curation. We are expressing our taste and moral discernment, and saying what we find acceptable and what we do not.<br>
<a href="https://www.nytimes.com/2022/02/03/opinion/culture/joe-rogan-spotify-roxane-gay.html">Roxane Gay; Why I&#x2019;ve Decided to Take My Podcast Off Spotify</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>We can use algorithms for good and bad, it&apos;s just we have to make hard choices about what they should be used for as they can spread vile hatred, or be used to promote the good in the world.</p><!--kg-card-begin: markdown--><h2 id="attacks-that-exploit">Attacks that Exploit</h2>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card kg-width-full"><img src="https://blog.cyberwarfa.re/content/images/2022/04/exploit.PNG" class="kg-image" alt loading="lazy" width="1552" height="507" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/exploit.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/exploit.PNG 1000w, https://blog.cyberwarfa.re/content/images/2022/04/exploit.PNG 1552w"></figure><!--kg-card-begin: markdown--><h4 id="spot-the-army">Spot The Army</h4>
<!--kg-card-end: markdown--><p>During the talk, I needed a moment to grab a drink before my voice fell apart and rather than leave people to look at me take a swig of water, I&apos;ll give them something to do. I already wanted to talk about Electronic Exploitation and I had the perfect example because as a nerd who keeps an eye on the future of warfare, there are only two units worth watching, the <a href="https://www.inscom.army.mil/msc/780mib/index.html">US <a href="https://www.inscom.army.mil/msc/780mib/index.html">780th MIB</a></a> and the <a href="https://home.army.mil/irwin/index.php/units-tenants/11th-armored-cavalry-regiment">US 11th ACR</a>. </p><p>Colonel Scott Woodward, who used to Command the US 11th ACR is active on Twitter and posts some really cool things there, while also actively engaging with people. He was asked about the efficacy of modern visible camouflage methods and he showed an incredible picture where the 11th ACR, with up to 1000 troops taking part in a concealment exercise, and he provided this incredible image of that concealed battalion;</p><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/04/EXdJBOJU4AAOWBa.png" class="kg-image" alt loading="lazy" width="2000" height="1333" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/EXdJBOJU4AAOWBa.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/EXdJBOJU4AAOWBa.png 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/04/EXdJBOJU4AAOWBa.png 1600w, https://blog.cyberwarfa.re/content/images/size/w2400/2022/04/EXdJBOJU4AAOWBa.png 2400w"><figcaption><a href="https://twitter.com/theRealBH6/status/1258554927648931840?s=20&amp;t=p8yifeLs-hj0-tCDRsSbAA">The source tweet is here</a></figcaption></figure><p>This image is 2400x1600 so you can have fun downloading the png and going pixel peeping in your own time to find the whole battalion if you even can. But Colonel Woodward was using this to make a different point, that on a modern battlefield, it doesn&apos;t matter how good your concealment is, if all your fancy wireless electronics like the radio in the Humvee, or the smartphone on that guy over there, or this data linked computer in the tank etc are continually broadcasting data and making noise to be detected. Not to mention the growth of active radar emitters on the battlefield for active protection systems or for reconnaissance of your forward area, and it really stands out as a large Electronic Signature;</p><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">These were taken at the National Training Center, in California. Concealment will help you stay alive a little longer in the close fight. <br><br>What does your EW footprint look like is the larger question. If I can see you like this, it doesn&apos;t matter how much camo you have <a href="https://t.co/EihBe4nEG3">pic.twitter.com/EihBe4nEG3</a></p>&#x2014; LXVIII RCO (@theRealBH6) <a href="https://twitter.com/theRealBH6/status/1258556133037363200?ref_src=twsrc%5Etfw">May 8, 2020</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p>11th ACR thought they were safe because at 2300 it was dark, they were spread out over 6 sqkm, and took the opportunity to resupply with <em>trains</em> but even with the best concealment efforts, his battalion was detected by its Electronic Signature at 12km&apos;s distance;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">That&#x2019;s exactly what it is. BN with trains hiding behind MG at about 2300. Thought they were safe cause it was dark. Picked me up at about 12 K with EW</p>&#x2014; LXVIII RCO (@theRealBH6) <a href="https://twitter.com/theRealBH6/status/1258558040376094720?ref_src=twsrc%5Etfw">May 8, 2020</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><!--kg-card-begin: markdown--><h4 id="why-communication-networks-stayed-online">Why Communication Networks Stayed Online</h4>
<!--kg-card-end: markdown--><p>One thing that I and nearly everyone I know how looks like how Information Warfare impacts the Battlespace will tell you that the big lesson to have learned from First Gulf War is that if you want to decapitate a military&apos;s ability to fight, you have to crush their ability to command and communicate. Naturally, this would lead one to wonder why? And I think the best reason why is that they can exploit the intelligence, as seen in this video released by Ukrainian Intelligence;</p><!--kg-card-begin: html--><video width="99%" controls>
  <source src="https://d2e2xs2a2y3u97.cloudfront.net/Cyber%20War%20Is%20Boring/SBU-Intercept.mp4" type="video/mp4">
Your browser does not support the video tag.
</video>

<p>
    <a href="https://youtu.be/LYumd3pt9F8?start=166&amp;end=227">Ukrainian intelligence published phone conversations intercepted from LDR and DNR militants who were shelling citizens who recently shelled civilians in Eastern Ukraine; SBU</a>
</p><!--kg-card-end: html--><p>This is a minute long intercept, which is one of several in that video. And this isn&apos;t the only intercept, the SBU has been publishing more like this on their YouTube channel. And this isn&apos;t the only reason why networks remain up. Both sides are using them to monitor the activity of each other. Not to mention how both sides have limited methods for C2, so are reliant on telegram channels for example to conduct operations at the tactical level.</p><p>Ukraine is not alone in doing this. Russia appears to be using similar techniques to target foreign volunteers. The story goes that Russia is using some surveillance equipment to find +44 numbers, but while phone surveillance isn&apos;t my area of expertise, this also doesn&apos;t seem like the smartest approach to me as Electronic Warfare suites have included IMSI Catcher-like systems for a long time and it would be easier to <a href="https://imei.org/blog/imsi-number">interrogate a SIM card for it&apos;s IMSI, which was a three digit Mobile Country Code or MCC that identifies the home of that device </a></p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">And that is why these amateur fighters do not help anyone<br><br>British volunteer fighters may have triggered deadly strike on Ukrainian base after their phones were detected <a href="https://t.co/42afRMblxe">https://t.co/42afRMblxe</a></p>&#x2014; Carlo &quot;Realism, Gedankenfetzen, and Rants&quot; Masala (@CarloMasala1) <a href="https://twitter.com/CarloMasala1/status/1505252971185065991?ref_src=twsrc%5Etfw">March 19, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>Even if you change your SIM Card to a Ukrainian one upon entry to the country, you aren&apos;t safe as all devices have an IMEI which identifies the network and country a phone comes from and it is possible to get the IMEI number of a device and identify the country it comes from. In theory, it is also possible to get the IMEI from a device connected via WiFi too, though this is a more complex proposition with several nuances. Ultimately it&apos;s a failure in Operational Security that comes not from the stupidity of a soldier, but a lack of understanding of the underlying technology and how it works, and normally one that western soldiers need not worry about as they have secure radios rather than phones. Any combination of these was used to identify the Ukrainian Foreign Legion members at Yavoriv above or at Kharkiv below;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Kharkiv: Russian Iskander missile targeting a Ukr base which housed infantry according to the Russian MoD. <a href="https://t.co/UREpNUA1Dl">pic.twitter.com/UREpNUA1Dl</a></p>&#x2014; OsintTv&#x1F4FA; (@OsintTv) <a href="https://twitter.com/OsintTv/status/1510317499371372548?ref_src=twsrc%5Etfw">April 2, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>Russia was also caught in the act by Ukrainian Intelligence relaying voice and SMS messages to high ranking Russian officers and other individuals in Ukraine. It&apos;s quite the find as it shows that Russia is targeting Ukraine across its entire spectrum of communications infrastructure. </p><!--kg-card-begin: html--><blockquote class="twitter-tweet"><p lang="en" dir="ltr">1/5 Another significant capture in <a href="https://twitter.com/hashtag/Ukraine?src=hash&amp;ref_src=twsrc%5Etfw">#Ukraine</a>. Reported discovery today of a <a href="https://twitter.com/hashtag/SIMBox?src=hash&amp;ref_src=twsrc%5Etfw">#SIMBox</a> being used to relay Voice calls &amp; SMS and other info to Russian forces (including top leadership of Russian army) &amp; other individuals in <a href="https://twitter.com/hashtag/Ukraine?src=hash&amp;ref_src=twsrc%5Etfw">#Ukraine</a>. I will explain what this is and how it works. <a href="https://t.co/6MQAghOFqF">https://t.co/6MQAghOFqF</a></p>&#x2014; Cathal Mc Daid (@mcdaidc) <a href="https://twitter.com/mcdaidc/status/1503697414301044739?ref_src=twsrc%5Etfw">March 15, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p>Now, none of this is to say that networks haven&apos;t gone down. Networks have physical points of presence in the real world while sending data around the cyberz and while there is a degree self healing in BGP for fibre networks, on mobile networks, only 5G can self heal so if a GSM tower is hit or has a cable cut or antenna damaged, it is down and needs an engineer to go out and fix it. NetBlocks has done an amazing job of keeping track of these outages, in areas around the world, such as this drop in connectivity in Kharkiv on the first day of the war;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">&#x26A0;&#xFE0F; Update: <a href="https://twitter.com/hashtag/Ukraine?src=hash&amp;ref_src=twsrc%5Etfw">#Ukraine</a>&apos;s second-largest city <a href="https://twitter.com/hashtag/Kharkiv?src=hash&amp;ref_src=twsrc%5Etfw">#Kharkiv</a> continues to take the brunt of network and telecoms disruptions, leaving many users cut off amid scenes of destruction as Russia targets the region. Kyiv is currently less impacted by outages.<br><br>&#x1F4F0; Report: <a href="https://t.co/S0qJQ7CJD3">https://t.co/S0qJQ7CJD3</a> <a href="https://t.co/FxgN1bHV3m">pic.twitter.com/FxgN1bHV3m</a></p>&#x2014; NetBlocks (@netblocks) <a href="https://twitter.com/netblocks/status/1496832598764834824?ref_src=twsrc%5Etfw">February 24, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><!--kg-card-begin: markdown--><h4 id="the-other-reason-why-communication-networks-stayed-online">The Other Reason Why Communication Networks Stayed Online</h4>
<!--kg-card-end: markdown--><p><a href="https://www.forbes.com/sites/thomasbrewster/2022/03/15/internet-technicians-are-the-hidden-heroes-of-the-russia-ukraine-war/">There has been an absolutely gargantuan effort by engineers at telecom companies, including putting their own lives at risk to maintain network connectivity</a>. When Ukrainians say &#x413;&#x435;&#x440;&#x43E;&#x44F;&#x43C; &#x441;&#x43B;&#x430;&#x432;&#x430; or Glory to Heros, I know they mean the soldiers on the front line and the EOD techs who make places safe by removing unexploded ordinance, but I can&apos;t help but think about the Heros who keep the state&apos;s phone and broadband networks up. They allow us to document Russia&apos;s barbarism in Mariupol and their atrocities in Bucha, but also to see all that is good in the world like those rescuing people&apos;s pets from near the front lines or people being helped to safety and families being reunited. </p><!--kg-card-begin: markdown--><h4 id="radio-use-and-intercepts">Radio Use And Intercepts</h4>
<!--kg-card-end: markdown--><p>In western militaries, all communication is done via secure radio that handles voice, video, data, and satcoms. <a href="https://www.c4isrnet.com/cyber/2020/10/19/us-army-looks-to-use-soldiers-biometric-data-to-secure-wearable-tech/">These systems are also moving towards integrating AR/VR and biometric data which is just wild</a>. Generally, these are systems like the <a href="https://www.l3harris.com/all-capabilities/falcon-radio-product-line">L3 Harris Falcon family</a> of radios or something wild like a <a href="https://www.persistentsystems.com/mpu5/">Persistent Systems MPU5</a> which are do everything systems.</p><p>Russia was supposed to be moving in this direction with the <a href="https://roe.ru/eng/catalog/land-forces/military-communications-equipment-and-automated-control-systems/azart/">R-187 Azert SDR radio, which on paper looks pretty cool</a>! Though they have been <a href="https://www.kommersant.ru/doc/4712794"><a href="https://www.kommersant.ru/doc/4712794">mired in a long running corruption scandal</a> where 6.7 billion rubles were stolen</a>. The gist of the story is that the radios were to be manufactured in Russia, using Russian sourced components, which makes a lot of sense, but somewhere along the way, they were sold to the Russian military as overpriced junk, with 60 suppliers from European countries as well as China, Malaysia and Taiwan. Not to mention that the final assembly allegedly took place in China and the software comes from an unknown company, known just as <em>Elvis</em>.</p><p>It is at this point that my new favourite Twitter account, <a href="https://twitter.com/radio_research">The Radio Research Group</a>, comes into the story! These people have basically been looking at radios for the whole conflict and identifying them, such as some below;</p><figure class="kg-card kg-gallery-card kg-width-wide"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/1.png" width="762" height="650" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/1.png 600w, https://blog.cyberwarfa.re/content/images/2022/04/1.png 762w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/2.jpg" width="1528" height="1100" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/2.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/2.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/2.jpg 1528w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/3.jpg" width="966" height="818" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/3.jpg 600w, https://blog.cyberwarfa.re/content/images/2022/04/3.jpg 966w" sizes="(min-width: 720px) 720px"></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/4.jpg" width="2000" height="1142" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/4.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/4.jpg 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/04/4.jpg 1600w, https://blog.cyberwarfa.re/content/images/size/w2400/2022/04/4.jpg 2400w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/5.jpg" width="1170" height="1445" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/5.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/5.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/5.jpg 1170w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/6.jpg" width="1918" height="1152" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/6.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/6.jpg 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/04/6.jpg 1600w, https://blog.cyberwarfa.re/content/images/2022/04/6.jpg 1918w" sizes="(min-width: 720px) 720px"></div></div></div></figure><!--kg-card-begin: markdown--><p>Some examples of The Radio Research Group&apos;s work on Russian forces includes;</p>
<ol>
<li><a href="https://twitter.com/radio_research/status/1511792904355807233?s=20&amp;t=ZZJZsIMIXhxPXADXfBEoXA">Never before seen radios</a></li>
<li><a href="https://twitter.com/radio_research/status/1509626068696592385?s=20&amp;t=ZZJZsIMIXhxPXADXfBEoXA">The aforementioned R-187 Azart</a></li>
<li><a href="https://twitter.com/radio_research/status/1507853189818863625?s=20&amp;t=ZZJZsIMIXhxPXADXfBEoXA">Baofeng civilian radios which you can buy for 100 bucks on Amazon</a></li>
<li><a href="https://twitter.com/radio_research/status/1502846649189642245?s=20&amp;t=ZZJZsIMIXhxPXADXfBEoXA">SATCOM devices among others</a></li>
<li><a href="https://twitter.com/radio_research/status/1500847259948236802?s=20&amp;t=ZZJZsIMIXhxPXADXfBEoXA">A Chechen soldier with a pile of radios</a></li>
<li><a href="https://twitter.com/radio_research/status/1500969197316153345?s=20&amp;t=ZZJZsIMIXhxPXADXfBEoXA">And they identify all of them</a></li>
</ol>
<!--kg-card-end: markdown--><p>They also have identified Ukrainian radio systems, though to a lesser extent as one would imagine they care a hell of a lot more about Ukrainian operational security than Russian operational security.</p><figure class="kg-card kg-gallery-card kg-width-wide"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/1.jpg" width="1170" height="848" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/1.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/1.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/1.jpg 1170w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/2-1.jpg" width="1170" height="935" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/2-1.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/2-1.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/2-1.jpg 1170w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/3-1.jpg" width="1987" height="1095" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/3-1.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/3-1.jpg 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/04/3-1.jpg 1600w, https://blog.cyberwarfa.re/content/images/2022/04/3-1.jpg 1987w" sizes="(min-width: 720px) 720px"></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/4-1.jpg" width="2000" height="1259" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/4-1.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/4-1.jpg 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/04/4-1.jpg 1600w, https://blog.cyberwarfa.re/content/images/2022/04/4-1.jpg 2142w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/5-1.jpg" width="1170" height="1562" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/5-1.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/5-1.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/5-1.jpg 1170w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/6-1.jpg" width="1170" height="1158" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/6-1.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/6-1.jpg 1000w, https://blog.cyberwarfa.re/content/images/2022/04/6-1.jpg 1170w" sizes="(min-width: 720px) 720px"></div></div></div></figure><!--kg-card-begin: markdown--><p>Some examples of The Radio Research Group&apos;s work on Ukrainian radios include;</p>
<ol>
<li><a href="https://twitter.com/radio_research/status/1496281995160309767">Some US made Hytera radios</a></li>
<li><a href="https://twitter.com/radio_research/status/1492530406381350916">Motorola XPR radio with an interesting antenna</a></li>
<li><a href="https://twitter.com/radio_research/status/1507865184047611911">Motorola FRS walkie talkie</a></li>
<li><a href="https://twitter.com/radio_research/status/1496961272562458625">Ukrainian&apos;s also using Baofeng radios</a></li>
<li><a href="https://twitter.com/radio_research/status/1500153429271797762">Capturing Russian Azart radios</a></li>
<li><a href="https://twitter.com/radio_research/status/1497224543529619458">And my personal favourite, using Anti Drone Weapons, which are basically fancy handheld radios</a></li>
</ol>
<!--kg-card-end: markdown--><p>The big thing I love though that The Radio Research Group did is identify all of the unencrypted comms that Ukraine and Russia were using. This gave David, my Signals Officer an idea! So he went looking for, and found Russian tactical communications and recorded them, which my Cryptographic Linguist Victor translated, and I can now present to you;</p><!--kg-card-begin: html--><h4>Intercept 1</h4>
<video width="99%" controls>
  <source src="https://d2e2xs2a2y3u97.cloudfront.net/Cyber%20War%20Is%20Boring/Intercept1.mp4" type="video/mp4">
Your browser does not support the video tag.
</video><!--kg-card-end: html--><!--kg-card-begin: markdown--><p>Translation:<br>
A: Yes, I can ??? you, ???<br>
B: Ryazan I&#x2019;m ??? (portrait?), over<br>
A: ??? (Portrait?), I&#x2019;m Ryazan, over<br>
B: Ryazan, [we are] working on the 16th ???<br>
A: Continue to work on this route, everyone stay alert [via radio], I&#x2019;m Ryazan<br>
B: Roger that, over</p>
<!--kg-card-end: markdown--><!--kg-card-begin: html--><h4>Intercept 2</h4>
<video width="99%" controls>
  <source src="https://d2e2xs2a2y3u97.cloudfront.net/Cyber%20War%20Is%20Boring/Intercept2.mp4" type="video/mp4">
Your browser does not support the video tag.
</video><!--kg-card-end: html--><!--kg-card-begin: markdown--><p>Translation:<br>
A: I&#x2019;m Ryazan, over<br>
B: I&#x2019;m Uragan, over<br>
A: Uragan, I&#x2019;m Ryazan, over<br>
B: How&#x2026; can we&#x2026; transmit data, or receive it? over<br>
(bleeping)<br>
C: Ryazan, I&#x2019;m Geyzer, ???<br>
A: Geyzer, Geyzer, I&#x2019;m Ryazan, over<br>
C: I&#x2019;m Geyzer, will clarify how Uragan can pass data and receive it, over</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h1 id="battlefield-shaping">Battlefield Shaping</h1>
<!--kg-card-end: markdown--><p>Battlefield Shaping is the process of preparing the terrain for war. When people generally think about that, they think about the Gulf War in 1991 when Coalition Forces destroyed important targets in Iraq and ensured they owned the skies before commencing ground offensives. When we look at Information Warfare, and in particular Cyber Warfare, we see a similar thing. We can exploit intelligence gathered and launch attacks so that advances can be made but people tend to forget about the other aspect, the aspect of defence. </p><figure class="kg-card kg-image-card kg-width-full"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Capture-2.jpg" class="kg-image" alt loading="lazy" width="1684" height="817" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Capture-2.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Capture-2.jpg 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/04/Capture-2.jpg 1600w, https://blog.cyberwarfa.re/content/images/2022/04/Capture-2.jpg 1684w"></figure><p>In the run up to the Russian offensive in Ukraine, there is an incredible untold story, that we have only gotten little glimmers of, of the defensive efforts to protect Ukraine&apos;s cyber infrastructure from Russia. <a href="https://www.ft.com/content/1fb2f592-4806-42fd-a6d5-735578651471">It started as best I can tell in November of 2021 when US Cyber Command deployed Cyber Mission Teams (CMT) to Ukraine</a>. CMTs are combinations of troops and specialist contractors who can go forward into the field and perform operations from those forward locations. </p><p>These CMTs systematically performed a statewide Threat Hunt, going through the cyber infrastructure of Ukraine and removing malware left, right and centre from various state bodies such as Ukrainian Railways and the Border Police. These CMTs also worked on a small budget of just 60 million dollars. This effort in destroying the prepositioning Russia had spent so long building up, as part of the Subversive Trilemma, that Russia&apos;s capacity was reduced. This could be one reason why we have seen so many DDoS attacks and Wipers, though that could also be because they are effective, particularly Wipers.</p><p>The linked article also mentions that Ukraine&apos;s police was the victim of a DDoS and one of the CMT partner companies, Fortinet, was able to have the US Department of Commerce cleared the funding of a &quot;virtual machine&quot; that is used to counter DDoS&apos;. </p><p>Next in January, <a href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/2910409/nsa-issues-recommendations-to-protect-vsat-communications/">we saw a little advisory from the NSA titled NSA Issues Recommendations to Protect VSAT Communications</a>. VSATs or Very Small Aperture Terminals are small satellite dishes, such as those that give you satellite TV or satellite broadband. The NSA advisory doesn&apos;t say much about what exactly the threat is, just that if you use one, you need to up your security game as there are threats to the terminals. In retrospect, it is clear that the NSA was aware that something like the Viasat Kerfuffle could happen or that they knew directly that it would happen, but were unwilling to divulge this information lest it burn Sources and Methods. </p><p>Also in January, <a href="https://www.dragos.com/blog/new-knowledge-pack-released-kp-2022-002-j/">Dragos&apos; dropped a regular Knowledge Pack, which included a detection/detections of INDUSTROYER/CRASHOVERRIDE malware</a>, which was used <a href="https://cyberlaw.ccdcoe.org/wiki/Industroyer_%E2%80%93_Crash_Override_(2016)">to take down one fifth of the power grid in Kyiv for a period of an hour in 2016</a>. As well as this, the <a href="https://www.dragos.com/blog/new-knowledge-pack-released-kp-2022-003-a/">March Knowlege Pack included detections in February for INDUSTROYER/CRASHOVERRIDE and BlackEnergy</a>, which was used <a href="https://cyberlaw.ccdcoe.org/wiki/Power_grid_cyberattack_in_Ukraine_(2015)">to take down parts of the power grid in western Ukraine in 2015</a>, effecting 225,000 customers for a period of 3 to 6 hours.</p><p>This variant of INDUSTROYER/CRASHOVERRIDE is being dubbed by <a href="https://cert.gov.ua/article/39518">CERT-UA as INDUSTROYER2</a>. It&apos;s unknown how different it is from the original, for example, I have heard from some sources that they are radically different and should be called different names entirely and from another set of sources that there are a lot of similarities. I do know for sure that the wiper is different in operation and thus has been dubbed CADDYWIPER and that the payloads that execute on ICS systems were compiled on the 23rd of February 2022, hours before Russia began offensive operations in the early morning of the 24th of February. Though note that information on the campaign is still limited. The CERT-UA alert discusses that 9 substations did go down and that there is a set of Linux components which have not been recovered.</p><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">Here is the alert, authored by Ukraine&apos;s Computer Emergency Response Team, that had previously been shared with international partners about Russians &quot;successfully&quot; hacking Ukraine&apos;s power grid. <a href="https://t.co/8CNfwFhD9z">https://t.co/8CNfwFhD9z</a> <a href="https://t.co/32ISNqqc3n">pic.twitter.com/32ISNqqc3n</a></p>&#x2014; Patrick Howell O&apos;Neill (@HowellONeill) <a href="https://twitter.com/HowellONeill/status/1513912065236377602?ref_src=twsrc%5Etfw">April 12, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p>In April, Mandiant, <a href="https://media.defense.gov/2022/Apr/20/2002980529/-1/-1/0/JOINT_CSA_RUSSIAN_STATE-SPONSORED_AND_CRIMINAL_CYBER_THREATS_TO_CRITICAL_INFRASTRUCTURE_20220420.PDF">along with FVEY making a rare joint statement</a>, publicised the discovery of INCONTROLLER, malware that targets Industrial Control Systems (ICS). While attribution isn&apos;t specifically given, the targeting profile of the malware in North America, Europe and particularly Ukraine as well as the malware taking pointers from previous experiments like TRITON/TRISYS, and Russia&apos;s history with ICS malware with HAVEX, BlackEnergy3, INDUSTROYER and VPNFILTER, it&apos;s reasonable to assume that the malware came from Russia, something that Mandiant highlight with their graph of the <em>nexus</em> of Russian malware targeting ICS systems. </p><p>INCONTROLLER is comprised of 3 parts, TAGRUN, CODECALL and OMSHELL. TAGRUN scans for OPC Servers, enumerates them, brute forces credentials and allows the malware to read and write OPC Tag Values. <a href="https://www.automation.com/en-us/articles/2010-1/what-is-opc-it-is-all-about-the-tag">OPC Tags are stores of data values like Data Access, which provide real time data on a sensor, such as the specific rate at which a motor is turning or Alarms and Conditions, such as a boolean value to check if a condition has been reached. There is also an extension for it called Historical Data Access, which as you can imagine provides historical, rather than real time data</a>. While the majority of what TAGRUN does suggests recognisance, it should be noted that manipulation of OPC Tags could mask changes made by other pieces of the malware.</p><p>CODECALL is a framework that operates over the Modbus protocol to directly communicate with the Programmable Logic Controllers (PLCs) and contains modules that can identify Schneider Electric systems, connect to them, load and execute files and execute commands that can for example crash systems. OMSHELL is a modular framework used to identify and connect to Omron PLCs that allows it to enable telnet and use this access to execute arbitrary files or commands and to connect to a backdoor to execute arbitrary files or commands.</p><p>Mandiant list three attack scenarios. Scenario 1 uses OMSHELL and/or CODECALL can be used to crash PLCs to shut down operations. Scenario 2 uses all of the modules to reprogram controllers to sabotage a process. And scenario 3 has the capability to disable PLCs, such as the Omron NX-SL3300 Safety Instrumentation System (SIS), as TRITON/TRISYS did for the Schneider Electric Triconex, to cause physical destruction of industrial machinery.</p><p>And then we really started to see the Wipers... Ohh god did we see the wipers... <a href="https://blogs.microsoft.com/on-the-issues/2022/04/27/hybrid-war-ukraine-russia-cyberattacks/">Microsoft released a report on the number of engagements they had taken part in, from February 23rd until the 8th of April, they had 237 separate cyber operations against organisations in Ukraine, only two of which were INDUSTROYER2 with CADDYWIPER</a>...</p><p>In January <a href="https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/">Microsoft MSTIC discovered WisperGate/WhisperKill</a> which was a wiper that overwrote the Master Boot Record (MBR) leaving a message to pay the <em>ransom</em>. </p><p><a href="https://www.welivesecurity.com/2022/03/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/">Then ESET found HermeticWiper/FoxBlade and IsaacWiper/Lasainraw in February</a>. HermeticWiper does the same overwriting of the MBR but it also has a worm component to spread across the networks it is on and also has a ransom component to <em>hide</em> its activities, though <a href="https://www.sentinelone.com/labs/hermetic-wiper-ukraine-under-attack/">SentinalOne notes that the malware is poorly written and not just loudly generates events in the Windows Log, but also probably slows down the wiper component</a>. </p><p>IsaacWiper is significantly less sophisticated and just overwrites the first 0x10000 bytes of a disk and then attempts to wipe all files on a given disk by writing random bytes over them, but does this in a single program thread so it would take basically until the sun engulfed the earth to erase a disk. I know that&apos;s a little over exaggerated, but it&apos;s really poor form from the Russians. </p><p>This is just scratching the surface of the offensive operations and defensive efforts that are ongoing as I haven&apos;t for example talked even talked about all of the wipers, such as SonicVote/HermeticRansom, DesertBlade, FiberLake/DoubleZero or all of the other operations such as <a href="https://cert.gov.ua/article/37626">MicroBackdoor</a> or Armageddon, <a href="https://cert.gov.ua/search/Armageddon">which is responsible for 4 separate campaigns in 2022 alone</a>. But at some point, I have to stop collecting information and call a post done.</p><p>The other thing to note beyond how small of an effect that offensive operations have had, is something I want to dig into a lot more. Why did the defensive efforts work so well? Yes Ukraine has a well resourced and trained pool of defenders at the SBU, CERT-UA and the State Service of Special Communication and Information Protection of Ukraine (SSSCIP), but lots of states have similar things but that doesn&apos;t stop for example <a href="https://twitter.com/KyivPost/status/1518966901065539584?t=mc-CGagF5TmeloEAJ4gvKg&amp;s=19">the UK getting Army recruits</a>. Maybe the existential threat that Russia poses to Ukraine is one hell of a motivator when it comes to winning the war in the 5th Domain?</p><p>I do though wonder, what if Ukraine did what Estonia did? After the Bronze Night, Estonia really reckoned with what did happen and what could have happened if things had gone worse. The Ministry of Defence drafted one of the first National Cyber Security Strategies, anywhere in the world, in 2008. In 2011 this was handed over to the Ministry of Economic Affairs and Communications, making it a Cabinet Level responsibility with major top level buy in from the Government. Estonia also has the Cyber Security Council of the Security Committee of the Government, which is a separate body spread across the Government and government organisations, whose sole task is to implement the strategy and gauge its successes and failures. </p><p>Successive governments have also made sure that Cyber Policy gets all of the attention and funding that is needed, which has resulted in the creation of bodies like the Estonian Information Systems Authority to <a href="https://www.ria.ee/en/cyber-security/supervision.html"><em>supervise</em></a><em> </em>compliance with cyber security standards, including if necessary, using door kickers to gain entry to facilities to ensure that critical infrastructure is defended correctly. It also houses bodies like CERT-EE, which along with CERT services, also provides some rad tools like <a href="https://www.ria.ee/en/cyber-security/it-baseline-security-system-iske.html">baseline security profiles for information systems</a>, <a href="https://x-road.global/">X-Road</a> and easily found <a href="https://www.eesti.ee/en/security-and-defense/safety-and-security/computer-security">education on Cyber Security for citizens</a>. And this is just the civilian cyber defence too. I haven&apos;t talked about the role the military plays nor the work of Estonian Intelligence who are some of the best in the world, not to mention the <a href="https://www.valisluureamet.ee/assessment.html">Estonian Foreign Intelligence Service provides yearly Security Situation Reports that are packed with things happening in Cyber Space and essential reading in my humble opinion</a>. NATO&apos;s CCDCOE <a href="https://ccdcoe.org/library/publications/national-cyber-security-organisation-estonia/">has a fun write up on the detail if you&apos;re interested in it</a>.</p><p>Ukraine has followed this with the SSSCIP reporting directly to the President. SSSCIP has CERT-UA there which does incredible work protecting the information infrastructure of Ukraine. Ukraine and policymakers are also acutely aware of the dangers posed by Cyber as they have been a bit of a Cyber Testing Range for Russia over the last decade, not to mention 8 years of war, and as this is the case, Ukraine provides all of the publicity needed to keep mind share with the general public, as well as mountains of funding. All this stands in stark contrast with Ireland where... Well, let&apos;s say I follow this kinda stuff closely and I have no fucking idea what&apos;s going on...</p><!--kg-card-begin: markdown--><h1 id="where-is-the-cyber-pew-pew">Where Is The Cyber Pew Pew!?</h1>
<!--kg-card-end: markdown--><p>As a wrap up slide, I had a conclusion thing at the end with what I wanted people to take away, and nothing really has changed since then;</p><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/04/spongebob-cyber-rainbow-1.gif" class="kg-image" alt loading="lazy" width="480" height="354"><figcaption>Cyber still isn&#x2019;t &#x2728; magic &#x2728;</figcaption></figure><p>Cyber is still limited, it still takes a lot of effort and investment and there are still other weapons available and these weapons can be MUCH more effective. But I left the politics out of my BSides talk. The other takeaway I want to take away is; </p><ul><li>&#x41F;&#x443;&#x442;&#x438;&#x43D; &#x2014; &#x445;&#x443;&#x439;&#x43B;&#x43E; (Putin huul-yo) Putin is a dickhead &#x1F595; and; </li><li>&#x41F;&#x435;&#x440;&#x435;&#x43C;&#x43E;&#x433;&#x430; &#x423;&#x43A;&#x440;&#x430;&#x457;&#x43D;&#x456; (Per-em-ohh-a uu-cry-een-a) Victory to Ukraine &#x270A;</li></ul><!--kg-card-begin: markdown--><hr>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id="acknowledgements">Acknowledgements</h2>
<!--kg-card-end: markdown--><p>Cheers to members of the Irish Cyber Security and Privacy Discord for giving me the chance to do a trial run of the talk before BSides, in particular, <a href="https://linkedin.com/in/dmedwards">Don</a> for the idea, <a href="https://twitter.com/ardamgrey">Michael</a> and Philipa for organising the talk and <a href="https://twitter.com/L2actual">Liam</a> for helping me get the flow of the talk just right with amazing feedback! To <a href="https://www.linkedin.com/in/ronan-donohue-76a31a146">Ronan</a> for being a sounding board to bounce ideas off of over the last year plus, to Owen for the seed of the idea on Ukraine following Estonia on strategy and finally to Schrodinger for keeping me up to date with the latest threat intel on the situation in Ukraine.</p><p>To the Wonks in the ACWP Slack generally, because they are rad and savage craic, but particularly <a href="https://twitter.com/tinfoil_globe">Tinfoil</a> for helping me test the video streaming and remembering stuff I had forgotten, <a href="https://www.middlebury.edu/office/cookie-monster">aminal</a> for patiently explaining EW like I&apos;m a 4 year old because it&apos;s witchcraft, Jack for help with stuff that didn&apos;t end up in this post but was invaluable to my thinking, Microbiote for some graphics, David for his signals intercepts, Sinan for helping with Turkish linguistics and details on the TB2 system as well as video of it in action from Ukraine, and <a href="https://youtu.be/dQw4w9WgXcQ">Bill</a> for being a treasure throughout by organising the invaluable debriefs we&apos;re having to hone our skills. Finally to dman for being an invaluable stream of OSINT that keeps me in the loop</p><p>Finally, thanks to <a href="https://wftc.xyz/">Victor</a> for translating some Russian for me as my Cryptologic Linguist. To the guys from BSides, particularly <a href="https://twitter.com/Securityblog">Antonio</a> for saying I should do a talk on this kinda stuff when we met at IRISSCON21 and <a href="https://twitter.com/theOtherGirl_75">Anne-Marie</a> and Kim for pushing me to talk to Antonio! And <a href="https://twitter.com/0xAC1D1C">Paul</a> because while my initial talk didn&apos;t make it past the CFP, Paul wanted me to talk about the Cyber War, I wrote a whole new talk in a few weeks, based on the ideas Don gave me fueled by the opportunity Paul gave me.</p>]]></content:encoded></item><item><title><![CDATA[I was in the journal.ie talking about OSINT things in Ukraine and elsewhere]]></title><description><![CDATA[<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">I had a really fun chat with <a href="https://twitter.com/parkinsbrea?ref_src=twsrc%5Etfw">@parkinsbrea</a> over an hour last week on doing OSINT on data coming in from a warzone as well as my own personal war stories in the trenches of OSINT and only a few slivers made it into a nice piece just published <a href="https://t.co/ZW3sKdEsNa">https:</a></p></blockquote></figure>]]></description><link>https://blog.cyberwarfa.re/i-was-in-the-journal-ie-talking-about-osint-things-in-ukraine/</link><guid isPermaLink="false">626aeafff85c9ea22a7b87e7</guid><category><![CDATA[Updates from the Author]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Thu, 28 Apr 2022 19:30:06 GMT</pubDate><content:encoded><![CDATA[<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">I had a really fun chat with <a href="https://twitter.com/parkinsbrea?ref_src=twsrc%5Etfw">@parkinsbrea</a> over an hour last week on doing OSINT on data coming in from a warzone as well as my own personal war stories in the trenches of OSINT and only a few slivers made it into a nice piece just published <a href="https://t.co/ZW3sKdEsNa">https://t.co/ZW3sKdEsNa</a></p>&#x2014; &#x1F595;&#x41F;&#x443;&#x301;&#x442;&#x456;&#x43D; &#x445;&#x443;&#x439;&#x43B;&#x43E;&#x301; &#x1F499;&#x1F49B; &#x421;&#x43B;&#x430;&#x432;&#x430; &#x456; &#x43F;&#x43E;&#x431;&#x435;&#x434;&#x430; &#x423;&#x43A;&#x440;&#x430;&#x457;&#x43D;&#x456; &#x1F1FA;&#x1F1E6;&#x270A; (@LegendaryPatMan) <a href="https://twitter.com/LegendaryPatMan/status/1519758679519772672?ref_src=twsrc%5Etfw">April 28, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure>]]></content:encoded></item><item><title><![CDATA[So How Bad Is It For The Russian Soldiers Who Went To Chernobyl?]]></title><description><![CDATA[<p>At the start of Russia&apos;s offensive in Ukraine, they drove through Chernobyl and set up defensive positions within the Exclusion Zone. <a href="https://www.reuters.com/world/europe/unprotected-russian-soldiers-disturbed-radioactive-dust-chernobyls-red-forest-2022-03-28/">Then we got reports from Reuters that the soldiers in the Exclusion Zone had disturbed some of the radioactive dust there</a>. At the time, myself and the</p>]]></description><link>https://blog.cyberwarfa.re/russia-in-chernobyl-22/</link><guid isPermaLink="false">62543bbaf85c9ea22a7b7d36</guid><category><![CDATA[OSINT]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Tue, 12 Apr 2022 10:04:16 GMT</pubDate><content:encoded><![CDATA[<p>At the start of Russia&apos;s offensive in Ukraine, they drove through Chernobyl and set up defensive positions within the Exclusion Zone. <a href="https://www.reuters.com/world/europe/unprotected-russian-soldiers-disturbed-radioactive-dust-chernobyls-red-forest-2022-03-28/">Then we got reports from Reuters that the soldiers in the Exclusion Zone had disturbed some of the radioactive dust there</a>. At the time, myself and the Wonk&apos;s had a bit of a discussion about this where we were all unable to make heads or tails of the news stories.</p><p>Like Russia is hardly stupid enough to send soldiers into the Exclusion Zone without any intelligence of what they were doing. And even if they did the soldiers would hardly be stupid enough to dig up radioactive dirt in the Red Forest of all places! And yet as it turns out... This is exactly what they did... We first got news that there were possible ARS cases among the Russian soldiers.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">7 busses with Russian soldiers suffering from Acute Radiation Syndrome have arrived to a hospital in Belarus from the Chernobyl Exclusion Zone in Ukraine.<br><br>They allegedly dug trenches in the highly radioactive Red Forest - UNIAN News Agency <a href="https://t.co/3ZcqoF6c9I">pic.twitter.com/3ZcqoF6c9I</a></p>&#x2014; Visegr&#xE1;d 24 (@visegrad24) <a href="https://twitter.com/visegrad24/status/1509287796065845250?ref_src=twsrc%5Etfw">March 30, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>Again, this remained unfathomable... <a href="https://twitter.com/CherylRofer/status/1509328182331248649?s=20&amp;t=9_nH6zUjy4ENzrg43BDoJQ">Experts like Cheryl Rofer said that it was extremely doubtful of this story</a>, and he was not alone, I know a ton of people who know a lot more than I do about this, who work day to day in nuclear physics, nuclear medicine and dosimetry who found this unfathomable! But then once the Russians had left, we started to get imagery from on the ground and it didn&apos;t look good; </p><figure class="kg-card kg-gallery-card kg-width-wide kg-card-hascaption"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/C.jpeg" width="1000" height="750" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/C.jpeg 600w, https://blog.cyberwarfa.re/content/images/2022/04/C.jpeg 1000w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/B.jpeg" width="1000" height="1333" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/B.jpeg 600w, https://blog.cyberwarfa.re/content/images/2022/04/B.jpeg 1000w" sizes="(min-width: 720px) 720px"></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/A.jpeg" width="1000" height="750" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/A.jpeg 600w, https://blog.cyberwarfa.re/content/images/2022/04/A.jpeg 1000w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://blog.cyberwarfa.re/content/images/2022/04/D-1.jpeg" width="1000" height="750" loading="lazy" alt srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/D-1.jpeg 600w, https://blog.cyberwarfa.re/content/images/2022/04/D-1.jpeg 1000w" sizes="(min-width: 720px) 720px"></div></div></div><figcaption><a href="https://contamination.zone/2022/04/06/photos-of-russian-trenches-in-red-forest-and-further-destruction/">Images thanks to Contimaination Zone</a></figcaption></figure><p>The nearest site to this location with a permanent Disimeter is Yanov Station, which went down on March 1st 2022, <a href="https://www.saveecobot.com/en/radiation-maps#16/51.3970/30.0552/gamma/">but its last recorded measurement was 618 nSv/h</a>. To put that into context, per year, the <a href="https://www.nrc.gov/about-nrc/radiation/around-us/doses-daily-lives.html">US Nuclear Regulatory Commission, the average American receives 620 millirem per year</a>, or in metric, 6200 &#x3BC;Sv. So at 618 nSv/h, if you hung around for a month, you would absorb 445 &#x3BC;Sv. It&apos;s not nothing, but it&apos;s an order of magnitude off of the threshold to cause cancer for example. It&apos;s less a month of extra radiation per year. But then we started to get dosimetric data...</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">We went to the edge of the Red Forest and found a Russian military food ration laying on the side of the road. This is right at the edge of that zone. The radiation levels at the packaging massively shot up. 6/8 <a href="https://t.co/6TLjDrHs3v">pic.twitter.com/6TLjDrHs3v</a></p>&#x2014; Frederik Pleitgen (@fpleitgenCNN) <a href="https://twitter.com/fpleitgenCNN/status/1512328089480667136?ref_src=twsrc%5Etfw">April 8, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>That 618 nSv/h is equivilent to 0.618 &#x3BC;Sv/h, so that counter at 11.32 &#x3BC;Sv/h is measuring 18 times more radiation there than at Yanov Station, and that sensor in Yanov station is approximatly 1200m from where the Russian soldiers dug their trenches. Since those soldiers were there for 30 days or 720 hours, their total dose was 8150 &#x3BC;Sv, or 1.37 times the yearly average dose, in a single month. It gets worse though... OSINT Technical upped the contrast in a video to see that some areas had an even higher rate;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Someone cranked up the contrast to read the meter about 30 seconds in, when it is at the outside of the camp. 71 &#x3BC;Sv/h. About 3-4 chest x-rays an hour. <a href="https://t.co/LE70kjtTAt">https://t.co/LE70kjtTAt</a> <a href="https://t.co/dLehktfy1p">pic.twitter.com/dLehktfy1p</a></p>&#x2014; OSINTtechnical (@Osinttechnical) <a href="https://twitter.com/Osinttechnical/status/1512230103278837763?ref_src=twsrc%5Etfw">April 8, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>At 71 &#x3BC;Sv/h, for 720 hours, that is 51,120 &#x3BC;Sv. To put that into perspective, the maximum dose permitted in the US, for people who work with radioactive materials in the US such as plant workers at nuclear power plants or doctors and radiologists who do things like Radiation Therapy to kill cancer cells, is 50,000 &#x3BC;Sv. Now this might seem like a lot, but there is no connection between radiation exposure and cancer less than a total dose of 100,000 &#xB5;Sv. Not to mention that you wouldn&apos;t start to consider Acute Radiation Syndrome until the dose had surpassed at least 1 Gray, and this is only 0.05 Gray.</p><!--kg-card-begin: markdown--><h1 id="is-there-a-way-this-could-be-true">Is There A Way This Could Be True?</h1>
<!--kg-card-end: markdown--><p>Sadly yes... </p><!--kg-card-begin: markdown--><blockquote>
<p>In a particularly ill-advised action, a Russian soldier from a chemical, biological and nuclear protection unit picked up a source of cobalt-60 at one waste storage site with his bare hands, exposing himself to so much radiation in a few seconds that it went off the scales of a Geiger counter, Mr. Simyonov said. It was not clear what happened to the man, he said.<br>
<a href="https://www.nytimes.com/2022/04/08/world/europe/ukraine-chernobyl.html">Andrew E. Kramer and Ivor Prickett; Russian Blunders in Chernobyl: &#x2018;They Came and Did Whatever They Wanted.&#x2019;; The New York Times</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Cobalt-60 is an immensely valuable isotope in the modern world. It is used to ensure that medical equipment is perfectly sterile, blood irradiation is used to ensure that blood is safe for transfusion and long term storage and a lot of radiotherapies use Cobalt-60 as a source for radiation to treat cancer.</p><p>The thing is though... While Cobalt-60 is immensely valuable for these use cases when it is used it is stored in safe containers where it is intentionally hard to get the material out of the case such as in this international standard case;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2022/04/Teletherapy_Capsule-1-.jpg" class="kg-image" alt loading="lazy" width="2000" height="1945" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2022/04/Teletherapy_Capsule-1-.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2022/04/Teletherapy_Capsule-1-.jpg 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2022/04/Teletherapy_Capsule-1-.jpg 1600w, https://blog.cyberwarfa.re/content/images/size/w2400/2022/04/Teletherapy_Capsule-1-.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption>A diagram of a typical teletherapy radiation capsule comprised of the following: A.) an international standard source holder (usually lead), B.) a retaining ring, and C.) a teletherapy &quot;source&quot; composed of D.) two nested stainless steel canisters welded to two E.) stainless steel lids surrounding an F.) internal shield (usually uranium metal or a tungsten alloy) that protects a G.) cylinder of radioactive source material, often but not always cobalt-60. The diameter of the &quot;source&quot; is 30mm. <a href="https://commons.wikimedia.org/wiki/File:Teletherapy_Capsule.jpg">Source KDS444; File;Teletherapy Capsule.jpg; Wikimedia Commons</a></figcaption></figure><p>Depending on the size of the container and the amount of Cobalt-60 inside, handling of the Cobalt-60 can be fatal. Plainly Difficult has made some videos on Cobalt-60 exposure, based on the IAEA reports, where operator error, safety violations, the dismantling of medical equipment at scrap yards, and Orphan Sources have led to fatalities;<br><a href="https://youtu.be/vDGN_Q_0jWI">The San Salvador Radiation Event</a><br><a href="https://youtu.be/jzdOujFCB7g">The Soreq Radiation Accident</a><br><a href="https://youtu.be/hxktLtVEH7U">The Samut Prakan Radiation Accident</a><br><a href="https://youtu.be/ODuNiA3TC1s">The Mayapuri Radiological Incident</a></p><p>All that said... Unit we get a report from the IAEA or the State Nuclear Regulatory Inspectorate of Ukraine, that there is indeed an Orphan Source, that was stolen by Russian soldiers, and that the Orphan Source is large enough, or was handled for long enough to cause Acute Radiation Sickness, I will remain immensely skeptical that there are any cases of Acute Radiation Sickness.</p>]]></content:encoded></item><item><title><![CDATA[ZeroDays 2022]]></title><description><![CDATA[<p>I&apos;m no longer competing at ZeroDays, but I&apos;m helping the Mark&apos;s run it and organise challenges, as well as expanding the challenges we have for ZD. We had 4 Lockpicking Challs this year, which I put together with Martin. We had a lock to</p>]]></description><link>https://blog.cyberwarfa.re/zd-22/</link><guid isPermaLink="false">62542f84f85c9ea22a7b7d01</guid><category><![CDATA[Updates from the Author]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Mon, 11 Apr 2022 14:26:58 GMT</pubDate><content:encoded><![CDATA[<p>I&apos;m no longer competing at ZeroDays, but I&apos;m helping the Mark&apos;s run it and organise challenges, as well as expanding the challenges we have for ZD. We had 4 Lockpicking Challs this year, which I put together with Martin. We had a lock to pick, handcuffs to open, a biometric lock to bypass and finally, a Cryptex to unlock! We&apos;re also working with @Brains933, who had a rad RF Village at BSides Dublin to start making some hardware challenges, so we&apos;ll be able to further extend the range of challs we have available and to who the CTF might be appealing to.</p><p>The highlight though was by far and away when two people I thought Lockpicking to at the old ITB Cyber Summer Camps in 2018 and 2019 told me that they were now in college, I don&apos;t recall where, but it was absolutely incredible to see a little game I play, have such a large influence on people that it changed the course of their lives</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">A few years ago at <a href="https://twitter.com/CyberDublin?ref_src=twsrc%5Etfw">@CyberDublin</a>, we put on a Cyber Summer Camp and I thought lock picking at it. Today at <a href="https://twitter.com/ZeroDaysCTF?ref_src=twsrc%5Etfw">@ZeroDaysCTF</a> two people who I thought came up to me to say thanks for getting them into cyber and they are doing it in Uni<br><br>This is by far my greatest achievement in life</p>&#x2014; &#x1F595;&#x41F;&#x443;&#x301;&#x442;&#x456;&#x43D; &#x445;&#x443;&#x439;&#x43B;&#x43E;&#x301; &#x1F499;&#x1F49B; &#x421;&#x43B;&#x430;&#x432;&#x430; &#x456; &#x43F;&#x43E;&#x431;&#x435;&#x434;&#x430; &#x423;&#x43A;&#x440;&#x430;&#x457;&#x43D;&#x456; &#x1F1FA;&#x1F1E6;&#x270A; (@LegendaryPatMan) <a href="https://twitter.com/LegendaryPatMan/status/1512909924053012509?ref_src=twsrc%5Etfw">April 9, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure>]]></content:encoded></item><item><title><![CDATA[BSides Dublin 2022]]></title><description><![CDATA[<p>I gave a talk called <em>Cyber War is Boring</em> at BSides Dublin 2022 on some of my weird research into Information Warfare. I&apos;m working on a blog for related to the talk and it will be out shortly, as will the video of the talk</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Cheers for coming</p></blockquote></figure>]]></description><link>https://blog.cyberwarfa.re/bsides-dublin-2022/</link><guid isPermaLink="false">62542ec0f85c9ea22a7b7cec</guid><category><![CDATA[Updates from the Author]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Sun, 20 Mar 2022 13:37:00 GMT</pubDate><content:encoded><![CDATA[<p>I gave a talk called <em>Cyber War is Boring</em> at BSides Dublin 2022 on some of my weird research into Information Warfare. I&apos;m working on a blog for related to the talk and it will be out shortly, as will the video of the talk</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Cheers for coming to my <a href="https://twitter.com/hashtag/BSidesDublin2022?src=hash&amp;ref_src=twsrc%5Etfw">#BSidesDublin2022</a> talk! I&apos;m glad y&apos;all enjoyed it + expressed that in such kind terms<br><br>I always publish the slides of my talks + I also have a doc with my notes  <a href="https://t.co/MWa75nMGLw">https://t.co/MWa75nMGLw</a><br><br>And there will be a blog to follow soon here <a href="https://t.co/G9EF2OPnsr">https://t.co/G9EF2OPnsr</a></p>&#x2014; &#x1F595;&#x41F;&#x443;&#x301;&#x442;&#x456;&#x43D; &#x445;&#x443;&#x439;&#x43B;&#x43E;&#x301; &#x1F499;&#x1F49B; &#x421;&#x43B;&#x430;&#x432;&#x430; &#x456; &#x43F;&#x43E;&#x431;&#x435;&#x434;&#x430; &#x423;&#x43A;&#x440;&#x430;&#x457;&#x43D;&#x456; &#x1F1FA;&#x1F1E6;&#x270A; (@LegendaryPatMan) <a href="https://twitter.com/LegendaryPatMan/status/1505255531639889922?ref_src=twsrc%5Etfw">March 19, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>And I also did the usual thing of teaching Lockpicking, though I kinda left Martin high and dry as after the talk... Everyone kinda wanted to talk to me</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr"><a href="https://twitter.com/LegendaryPatMan?ref_src=twsrc%5Etfw">@LegendaryPatMan</a> the lock picking table getting the attention it needs <a href="https://twitter.com/hashtag/unlocked?src=hash&amp;ref_src=twsrc%5Etfw">#unlocked</a> <a href="https://twitter.com/hashtag/bsides2022?src=hash&amp;ref_src=twsrc%5Etfw">#bsides2022</a> <a href="https://twitter.com/hashtag/lockpicking?src=hash&amp;ref_src=twsrc%5Etfw">#lockpicking</a> <a href="https://t.co/4qrTFlAnoL">pic.twitter.com/4qrTFlAnoL</a></p>&#x2014; Security BSides Dublin (@BSidesDublin) <a href="https://twitter.com/BSidesDublin/status/1505148567006109696?ref_src=twsrc%5Etfw">March 19, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure>]]></content:encoded></item><item><title><![CDATA[The Information Threat To Ireland]]></title><description><![CDATA[<p>Update 02/07/22: Video source updated</p><p>The post I published on <a href="https://blog.cyberwarfa.re/iw/">Information Warfare</a> is going to be the subject of a talk at Ireland&apos;s National Cyber Security Conference on October 7th, 2021. As this is the case, I would like to tailor a little of that talk</p>]]></description><link>https://blog.cyberwarfa.re/iw-ie/</link><guid isPermaLink="false">60d5dccef85c9ea22a7b5639</guid><category><![CDATA[Cyber & Information Warfare Theory]]></category><category><![CDATA[Ireland]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Fri, 08 Oct 2021 16:18:13 GMT</pubDate><content:encoded><![CDATA[<p>Update 02/07/22: Video source updated</p><p>The post I published on <a href="https://blog.cyberwarfa.re/iw/">Information Warfare</a> is going to be the subject of a talk at Ireland&apos;s National Cyber Security Conference on October 7th, 2021. As this is the case, I would like to tailor a little of that talk to some of the threats and risks to Ireland and our information environment. It&apos;s a shame that I only had 30 mins to lay out the issues as this post will probably end up taking longer to read than to watch the video because of the scale of the topic, but this is the nature of conference talks.</p><!--kg-card-begin: html--><h4>Video of the Talk</h4>
<video width="99%" controls>
  <source src="https://d2e2xs2a2y3u97.cloudfront.net/IW-IE/Paddy+Kerley+version+2.mp4" type="video/mp4">
Your browser does not support the video tag.
</video><!--kg-card-end: html--><p><a href="https://next.cyberwarfa.re/s/qLBnQe8qG9HQZo7">Video of the talk</a></p><p><a href="https://next.cyberwarfa.re/s/Hicp3SBeJzLXiHe">PDF of the slides</a></p><p>Some of the aspects that I discuss in the talk are slightly different as talks come across better with pictures so I may in future talk about The Gulf War War in more picturesque terms as I found a bunch of cool information in both text and picture form that wasn&apos;t included in the previous post as it does a really good job of getting the picture across of how some aspects of the attacks worked.</p><p>Finally, I used <a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.)</a> Degrade, Deny, Corrupt and Exploit framework to look at threats and risks to Ireland, so instead of giving the background to this framework, I will just jump in, assuming that you have seen the talk or read the previous post and discuss. But first, I want to mention one of the major points I try to make. The Cyber-Physical Impact.</p><!--kg-card-begin: markdown--><h1 id="the-cyber-physical-impact">The Cyber-Physical Impact</h1>
<!--kg-card-end: markdown--><p>The thing to understand about Information Warfare is that an idea like hacking or the concept of Cyber where you limit one&apos;s thinking to digital systems, rather than the broader spectrum of systems that computers interact with such as Operational Technology or the RF Spectrum. Computers control and interact with systems that do much more than the computer itself. As Bruce Schneier once pointed out;</p><!--kg-card-begin: markdown--><blockquote>
<p>As the chairman pointed out, there are now computers in everything. But I want to suggest another way of thinking about it in that everything is now a computer: This is not a phone. It&#x2019;s a computer that makes phone calls. A refrigerator is a computer that keeps things cold. ATM machine is a computer with money inside. Your car is not a mechanical device with a computer. It&#x2019;s a computer with four wheels and an engine&#x2026;<br>
<a href="https://docs.house.gov/meetings/IF/IF17/20161116/105418/HHRG-114-IF17-Transcript-20161116.pdf">Part of Bruce Schneier&apos;s tetimony to the House of Representatives, Subcommittee on Communications and Technology, Joint with Subcommittee on Commerce, Manufacturing, and Trade, Committee on Energy and Commerce; Understanding the Role of Connected Devices in Recent Cyber Attacks, pp 27</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>In every aspect that I can conceive, or that has occurred previously, an Information Warfare technique has involved the meshing of some form of manipulating the inputs and outputs of a computer to achieve an objective. This could be the returns of a radar, the varying levels of Chlorine used to make clean drinking water or listening to RF outputs of systems to locate them in a physical place. This is where, at least in part, the future of combat lies, because when everything became computers, so computers became everything.</p><p>The merging of the physical and digital realms opened up several threats that we have not fully comprehended the damage that could be done at this crossroads. In medical devices alone, in 2019, there were two advisories from CISA, in the US, whereby the sniffing of, and sending of data over RF, would allow attackers to send commands to the medical devices. <a href="https://www.fda.gov/medical-devices/safety-communications/certain-medtronic-minimed-insulin-pumps-have-potential-cybersecurity-risks-fda-safety-communication">One was in insulin pumps</a> and <a href="https://us-cert.cisa.gov/ics/advisories/ICSMA-19-080-01">the other was in pacemakers</a> and while these would require an attacker to be roughly within Bluetooth range of a given medical device, if this unlikely scenario were to unfold, an attack could put either system into a state such that its use could be life-threatening.</p><p>Fundamentally, the concept of networking is about connecting two different systems in different geographic locations. This could be as simple two computers right next to each other all the way up to how Ireland has various networks, linked together that are connected to various countries all over the world creating a network of networks. These disparate systems all require physical infrastructure to link them together. Even wireless technologies have associated microwave towers. Even space-based systems require physical, on the ground to function, be they ground stations or launch pads to get into space in the first place. </p><p>I worry that this fundamental fact is something that has not entirely sunk into the minds of professionals and policymakers, for example, if you were to read the National Cyber Security Strategy, there are exactly four mentions of the word physical;</p><!--kg-card-begin: markdown--><blockquote>
<p>... These compromises can take the form of theft or destruction of data or money and the <strong>physical</strong> disruption or destruction of services or infrastructure. ... (pp 3)<br>
... Recent years have seen the development and regular use of very advanced tools for cyber enabled attacks and espionage, and, likely for the first time, the <strong>physical</strong> destruction of Critical National Infrastructure by cyber enabled means. ... (pp 13)<br>
... Lastly, at the top of this pyramid, are those State sponsored entities, usually military or security organisations, seeking to use network and information systems to conduct operations ranging from the exfiltration of data to the destruction of <strong>physical</strong> infrastructure. ... (pp 16)<br>
... They could make laws to prohibit parties using their territories for illicit purposes or activities, and they could use <strong>physical</strong> borders as a means of defending against external threats. ... (pp 16)<br>
<a href="https://www.ncsc.gov.ie/pdfs/National_Cyber_Security_Strategy.pdf">National Cyber Security Strategy 2019-2024</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>While in this limited context, these seem like reasonable statements to make, and the fourth is a simple statement of fact, in that the internet has no borders. In the full context of the quotes, things are a little less reasonable. The first is a statement from the Executive Summary. The Second is the context for the first and while it is in a section about the Strategic Risks that Ireland faces, it calls the internet &apos;<em>a-spatial</em>&apos; which is a patently false statement and goes on further to mention that there is an &apos;<em>arms race</em>&apos; between Great Powers and that they have destroyed physical infrastructure, as best seen by <a href="https://cyberlaw.ccdcoe.org/wiki/Stuxnet_(2010)">Stuxnet</a> and the <a href="https://cyberlaw.ccdcoe.org/wiki/Steel_mill_in_Germany_(2014)">German Steel Mill</a> attacks. The second point is a contradiction in terms. </p><p>The third point is about risks to Critical National Infrastructure, is about the skilled and resourceful nature of APT&apos;s to physical and references the previous work of APT groups, hardly an in depth understanding of the two realms, and to be honest, this makes a lot of sense, security is an intangible idea after all, and arguably one that the public has a certain apathy for.</p><!--kg-card-begin: markdown--><h1 id="degrade">Degrade</h1>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><blockquote>
<p>Data can be degraded either by delaying it until its usefulness is reduced or by destroying it in full or part. For example, the use of concealment is an Attack measure (degradation) against the collection task. The use of jamming to reduce the Capacity of a communications channel (thereby delaying transmission) is another example.<br>
<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.); What is Information Warfare?</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>It should though be noted that according to Claude Shannon&apos;s <em><a href="https://web.archive.org/web/19980715013250/http://cm.bell-labs.com/cm/ms/what/shannonday/shannon1948.pdf">Mathematical Theory of Communication</a></em>, Information is not collected, stored, moved or used to reduce uncertainty, Information is generated in the course of reducing uncertainty and this reduction in uncertainty is measured in bits. As this is the case, information cannot be destroyed, as the transmission of information is in bits per second, noise can be introduced to degrade the rate of bits per second in which a transmission is received. Claude also developed a diagram that can be used to visualise this process;</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Capture-4.PNG" class="kg-image" alt loading="lazy" width="1099" height="486" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/10/Capture-4.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/10/Capture-4.PNG 1000w, https://blog.cyberwarfa.re/content/images/2021/10/Capture-4.PNG 1099w"><figcaption><a href="https://web.archive.org/web/19980715013250/http://cm.bell-labs.com/cm/ms/what/shannonday/shannon1948.pdf">Claude Shannon; A Mathematical Theory of Communication</a></figcaption></figure><p>Something that I discovered along the way is that two professors wrote a paper on the nature of Information Warfare in evolutionary terms and came up with a set of diagrams to visualise Information Attacks, which I will include</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Capture-5.PNG" class="kg-image" alt loading="lazy" width="1367" height="657" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/10/Capture-5.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/10/Capture-5.PNG 1000w, https://blog.cyberwarfa.re/content/images/2021/10/Capture-5.PNG 1367w" sizes="(min-width: 1200px) 1200px"><figcaption><a href="https://users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-2-CK-BIM.pdf">Dr Carlo Kopp &amp; Dr Bruce Mills; Information Warfare and Evolution</a></figcaption></figure><!--kg-card-begin: markdown--><h3 id="sea-lines-of-communication-sloc%E2%80%99s">Sea Lines of Communication (SLOC&#x2019;s)</h3>
<!--kg-card-end: markdown--><p>SLOC&apos;s are the primary maritime based economic routes between ports, they are the highways of the sea basically. Throughout time they have been essential in both peacetime as part of commerce, for example, the vast majority of products coming from China to Ireland come via container ship that makes multiple stops along the way, dropping off and taking on cargo before heading to the next port, finally arriving at Dublin Port with products to be sold here in Ireland.</p><p>In times of war they have been particularly important too, in the post-classical era, we have seen privateers attempt to capture prize ships or loot them of their goods so that the economies of your adversary would hurt. In World War I, the UK used the Grand Fleet based at Scapa Flow to Blockade the German state and attempt to starve it, leading to things like the Turnip Winter. By the time of World War II, Germany had learned from this and took its Unrestricted Submarine Warfare concept from WWI to the next level by beginning the Battle of the Atlantic to starve the British, which turned into a decisive battle for the Allies to secure their SLOC&apos;s in the North Atlantic and the North Sea.</p><p>By the time of the Cold War, NATO forces expected to be pushed back from the Fulda Gap towards the Franco-German border, something that the Warsaw Pact forces expected to take approximately 7 days.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/09/1437px-Probable_Axes_of_Attack.svg-1-.png" class="kg-image" alt loading="lazy" width="1437" height="2047" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/09/1437px-Probable_Axes_of_Attack.svg-1-.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/09/1437px-Probable_Axes_of_Attack.svg-1-.png 1000w, https://blog.cyberwarfa.re/content/images/2021/09/1437px-Probable_Axes_of_Attack.svg-1-.png 1437w" sizes="(min-width: 720px) 720px"><figcaption><a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/1978_Vol29_No1-6/1978_Vol30_No1.pdf">Col Robert D. Rasmussen; The A-10 in Central Europe: A Concept of Deployment-Employment; pp 26-44</a></figcaption></figure><p>In this timeframe, NATO forces would be expected to hold out for as long as possible for the US to mobilize and to arrive in Europe via massive sealift and airlift operations. The Warsaw Pact naval forces, particular that of the Soviet Navy and its massive submarine arm would spend most of the first 7 days of this conflict attempting to disrupt the sealift operation and to an extent airlift operation. One of the main plot points in Tom Clancy&apos;s Red Storm Rising beyond <a href="https://youtu.be/MhQ5678cJU8">AMERICA, FUCK YEAH!</a> is about US and Soviet operations in the North Atlantic to resupply and disrupt, respectfully, operations there.</p><p>The thing I want to get across though is that in 1992 when the VADM John McConnel became the Director of the NSA, he was shown a map of SLOC&apos;s and a map of Submarine Fibre Optic Cables. Over the course of his tenure between 1992 and 96, he effectively revolutionized the NSA, taking it from an organisation working on intercepting, decrypting and analysing microwave signals to one moving towards an organisation working on not just Submarine Fibre Optic Cables or even fibre optic cables in general, but to one working more generally in the space of Information Warfare, particularly via Cyber means.</p><!--kg-card-begin: markdown--><h4 id="looking-at-ireland">Looking at Ireland</h4>
<!--kg-card-end: markdown--><p>Ireland is a uniquely interesting case to look at, not just because I am Irish and that I live in Ireland, but because Geography is Destiny, we are at the crossroads between the US and Europe and the UK and because of it, a lot of subsea maritime infrastructure exists here, <a href="https://ieeexplore.ieee.org/document/6775351">a recognised fact going back to 1858 when the first transatlantic cable was laid from Kerry to Newfoundland</a>. And because of our past, we are a state that speaks English, but also now the only one in the European Union. At Slandail 2020, I took note of what the then CEO, and now Chairman of IBM UK and Ireland said that Ireland&apos;s economic success is built on; Ireland being a &apos;<em>stable, democratic, safe and secure, rules based society</em>&apos;.</p><p>We have leveraged our geography and our past to create a so-called Knowledge Economy that is an appealing investment proposition for foreign direct investment. The Government&apos;s strategy across my entire life and for more time before that, going back as far as that of T. K. Whitaker, is to use this platform to attract multinational technology, pharmaceutical and financial companies to come to Ireland, to invest in Ireland, backed up by our dubious corporate taxation policy. </p><p>The subsea maritime infrastructure I mentioned, today are Transatlantic Submarine Fibre Optic Cables. There are 18 total Transatlantic Submarine Fibre Optic Cables that cross the North Atlantic. Five of them make landings in Ireland but more importantly, 17 of them transit our Exclusive Economic Zone or EEZ. Exclusive Economic Zone&apos;s are defined by the United Nations Convention on the Law of the Sea, where they are defined as;</p><!--kg-card-begin: markdown--><blockquote>
<p><em>Article 55</em><br>
<em>Specific legal regime of the exclusive economic zone</em><br>
The exclusive economic zone is an area beyond and adjacent to the territorial sea, subject to the specific legal regime established in this Part, under which the rights and jurisdiction of the coastal State and the rights and freedoms of other States are governed by the relevant provisions of this Convention.</p>
</blockquote>
<blockquote>
<p><em>Article 57</em><br>
<em>Breadth of the exclusive economic zone</em><br>
The exclusive economic zone shall not extend beyond 200 nautical miles from the baselines from which the breadth of the territorial sea is measured.<br>
<a href="https://www.un.org/Depts/los/convention_agreements/texts/unclos/unclos_e.pdf">Article 55 &amp; 57; United Nations Convention on the Law of the Sea</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Essentially it creates an area, beyond our 12 nautical mile territorial waters, out to 200 nautical miles where Ireland has a sovereign right to, for example, all economic activities in the area or conservation of marine wildlife in the area. This means that we have privileges as a state to conduct activity in that area that no other state has without our permission. So what does this picture of EEZ covered in Submarine Fibre Optic Cables look like? Well, I created a composite image of our EEZ from the Irish Government and Submarine Fibre Optic Cable data from TeleGeography;</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/09/image--1-.png" class="kg-image" alt loading="lazy" width="2000" height="1552" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/09/image--1-.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/09/image--1-.png 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2021/09/image--1-.png 1600w, https://blog.cyberwarfa.re/content/images/size/w2400/2021/09/image--1-.png 2400w" sizes="(min-width: 1200px) 1200px"><figcaption>Composite image I created with data from <a href="https://www.infomar.ie/index.php/about-us">Infomar</a> and <a href="https://www.submarinecablemap.com/#/country/ireland">Submarine Cable Map</a></figcaption></figure><p>Normally, this is the part where I would state that we have some duties, as we do with our Neutral Status where we have to enforce our Neutrality, and we do have duties, but those duties are not to protect these cables from physical attack or deter cables from being tapped by various means on land at landing points and this is where the major risk opens up for us.</p><p>If we think in the traditional threat modelling methodology used in Cyber Security of identifying assets, identifying vulnerability in the assets, the threats to this asset and the risk being the non zero chance that something bad will happen and the threat will succeed in attacks, and mitigations that can be applied to these assets, how do we look at these SLOC&apos;s?</p><p>Lt. Shane Mulcahy, a Staff Officer of the Naval Operations Command Centre, wrote maybe the most important paper in the history of the Defence Forces Review. In his paper, he gives a brief history of the importance of Submarine Fibre Optic Cable, as well as some of the issues and risks associated with them before going on to forge a strategy based on political efforts in updating the United Nations Convention on the Law of the Sea to more reflect the importance of these cables and to ingrain protections for them in International Law, but also in two paragraphs, lays out the major risk that Ireland faces as a state;</p><!--kg-card-begin: markdown--><blockquote>
<p>Some will argue that given the international effort required to secure the vast North Atlantic maritime domain in which we reside, our part as a small, &#x2018;neutral&#x2019; nation, should neither be significant nor central. It is worth remembering however that as an Island that has successfully grown a digital economy on a fragile maritime infrastructure, Ireland may have the most to lose.</p>
<p>Considering western preoccupation with weapons of mass destruction in previous decades, it seems almost comical to find that a ship&#x2019;s anchor could now be described as an &#x2018;existential threat&#x2019; to national security and prosperity. With no alternative to using these undersea cables, Ireland must become proactive towards securing the maritime domain on which our contemporary, digital society depends.<br>
<a href="https://www.military.ie/en/public-information/publications/defence-forces-review/df-review-2019.pdf">Lt. Shane Mulcahy; Patrolling Below the Horizon: Addressing Ireland&#x2019;s Awareness of our Maritime Geospatial Domain; Defence Forces Review 2019</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Not just is Lt. Mulcahy succinct, but he also lays out the key importance of Submarine Fibre Optic Cables to the state in that we have grown a &apos;<em>digital economy</em>&apos; off of them and that our &apos;<em>digital society depends</em>&apos; on them. I am not doing Lt. Mulcahy&apos;s article justice though as he talks about other issues beyond human damage such as earthquakes, subsurface landslides and &apos;<em>curious sea-life</em>&apos;. It&apos;s worth reading in full.</p><p>This sentiment is also something that Dr. Cathal Berry, a TD for Kildare North and former Army Ranger Wing intelligence officer and 2IC is acutely aware of, but lays out in much better terms;</p><!--kg-card-begin: markdown--><blockquote>
<p>Tens of thousands of financial transactions are sent on these cables every hour along with communications. People think &#x2018;the cloud&#x2019; is in the sky but it&#x2019;s really in the bottom of the sea,<br>
<a href="https://www.thetimes.co.uk/article/navy-called-in-as-russians-suspected-of-targeting-undersea-internet-cable-jztg8t6lx">Jophn Mooney quoting Dr. Cathal Berry (TD); Navy called in as Russians suspected of targeting undersea internet cable</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Before looking at mitigations, we understand the asset, the breadth of the risks from small to existential, accidental to deliberate, what is the threat here?</p><p>The first is relatively simple, espionage. The tapping of the cables is not covered by the United Nations Convention on the Law of the Sea, &#xA0;but it is something that occurs and just as I was working on this talk, GUGI Yantar showed up off of the Irish coast. Yantar is a vessel of the Russian Navy&apos;s Main Directorate of Underwater Research where it is titled as an &apos;<em>oceanic research vessel</em>&apos;, a naval euphemism for spy ships. </p><p>Traditionally these ships are effectively the mothership of a submersible or a number of submersibles that they provide a lifeline to as missions are conducted on the deep sea. This is the same idea as RV Knorr deploying DSV Argo to discover RMS Titanic in 1985. It should be noted that the Mothership does not have to be a vessel like Yantar or Knorr, as you can deploy submersibles from submarines too, as best seen in Tom Clancy&apos;s <em>The Hunt for Red October</em> where USS Dallas deploys the DSRV or the <a href="http://www.hisutton.com/Spy%20Sub%20-%20Project%2010831%20Losharik.html">Losharik</a> that that is deployed from the <a href="http://www.hisutton.com/BS-64_Podmoskovye.html">Delta Stretch</a>. These submersibles can be used to put things on, or retrieve things from the seabed. These things are equipment such as fibre optic cable taps, or passive sonar arrays such as the SOSUS network, but can do as much as is needed as long as work on the seabed is needed as this artwork from H I Sutton shows;</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/09/Yantar_4000-1-.jpg" class="kg-image" alt loading="lazy" width="2000" height="1695" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/09/Yantar_4000-1-.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/09/Yantar_4000-1-.jpg 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2021/09/Yantar_4000-1-.jpg 1600w, https://blog.cyberwarfa.re/content/images/size/w2400/2021/09/Yantar_4000-1-.jpg 2400w" sizes="(min-width: 1200px) 1200px"><figcaption>Image is 4000x3391 so don&apos;t be afraid to open it in full. <a href="http://www.hisutton.com/Yantar.html">H I Sutton; Yantar</a></figcaption></figure><p>In the talk, I referenced a tweet from <a href="https://twitter.com/The_Lookout_N/status/1428108664943136775?s=20">@The_Lookout_N</a>, but I want to highlight the work of a fellow Wonk, <a href="https://twitter.com/dbmee/status/1428174937303523332?s=20">@dbmee</a> who was tracking Yantar well in advance of most others in the OSINT community. He created a gif that he tweeted that included both the track the ship had taken before The_Lookout_N&apos;s tweet and with knowledge of where she weighed anchor and did <em>stuff</em>, he looked at it in relation to the nearby Submarine communication cables that leave from somewhere near Ballina in Co. Mayo;</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/09/ezgif.com-gif-maker--1-.gif" class="kg-image" alt loading="lazy" width="600" height="538"><figcaption><a href="https://twitter.com/dbmee/status/1428174937303523332?s=20">@dbmee&apos;s animation</a></figcaption></figure><p>These types of activities can pose an unusual problem as espionage generally under International Law is a bit of a grey area that remains mostly unregulated and the practices of espionage, most of the time anyway, are dealt with by the principle of Consent by Silence. Under the United Nations Convention on the Law of the Sea, as long as they are in compliance with Articles 88 through to 115 and remain outside of Irish Territorial Waters, they have total freedom of action and navigation within the law, as long as there is no evidence of illegal activates. And since espionage is not economic activity, the Russian Government does not have the notify the Irish Government of the ship&apos;s arrival or activities in the area.</p><p>Yantar and other oceanic research vessels such as the French ship <em>Dupuy de L&#xF4;me</em>, or my personal favourite, the USNS Waters (T-AGS-45) which does &apos;<em>ocean engineering</em>&apos;, is rumoured to be used for work such as that undertaken by the <a href="https://www.cia.gov/legacy/museum/exhibit/project-azorian/">Hughes Glomar Explorer of Project Azorian fame</a>. These types of ships are not the only threat though, submarines are a larger issue.</p><p>Between 2016 and early 2020, there were persistent rumours that Russian submarines were operating off of the coast of Ireland, sometimes the rumour was that of an Akula class nuclear powered attack submarine, and other times it was that of a Kil0 class diesel eclectic attack submarine, was doing <em>stuff</em> off of the coast of Ireland. This <em>stuff</em> was always in relation to Submarine Fibre Optic Cables with the narrative of either working on taps of these cables or worse, severing these cables in the event of war. Beyond rumours, in open sources, there was very little concrete to be said until one day, Russia made a regular penetration of Irish Air Space but left its transponders on, and we got a track of their activity;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Now according to <a href="https://twitter.com/MIL_Radar?ref_src=twsrc%5Etfw">@MIL_Radar</a>, the TU-142MR broke away from the patrol at the West coast of Ireland, the TU-142MK continued on towards to the South West of Ireland. Loitering just above where transatlantic subsea fiber optic cables route to and past Ireland. <a href="https://t.co/he9kATf2yr">pic.twitter.com/he9kATf2yr</a></p>&#x2014; Robert Gilbey (@RobGilbey) <a href="https://twitter.com/RobGilbey/status/1237144211062956038?ref_src=twsrc%5Etfw">March 9, 2020</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>In the tweet, you can see the map shows that the aircraft took an unusual circular flight path while it was off the coast and as Rob notes, it is associated with its Trailing Wire Antenna used for VLF, but also ELF, communications with submarines below the surface, and this was one in one of the most densely populated regions of the world with Submarine Fibre Optic Cables.</p><p>Mitigating this could be difficult for a number of reasons for us. First of all the tactics traditionally used to deter these kinds of activities could be unpalatable to the Irish public, for reasons that will become clear, but also because a lot of these tactics would be extremely difficult or in one case impossible for us to accomplish.</p><p>Starting with the impossible, the most common technique is Herding. Herding is where you have advance intelligence that such an operation is going ahead by an adversary submarine. Knowing that this is the case, you send out your own submarine to patrol the area and attempt to locate the adversary submarine. When you have it located, tailed and identified as an adversary submarine, you place a call to a nearby Anti Submarine Warfare ship to close the range and have that ship begin to hound the adversary with sonar and perhaps weapons. Once a submarine knows they are found they will get out of there quickly. <a href="https://www.youtube.com/watch?v=4hw8dLsFtxI">You can see this process done quite well, in an overdramatized fashion in this YouTube video</a>. </p><p>This is clearly impossible because we don&apos;t have a submarine to herd with but also for a second reason which is that only one ship in the entire fleet of the Naval Service is equipped with a sonar system to detect anything below the surface of the sea, the flagship L&#xC9; Eithne. <a href="https://www.navalanalyses.com/2017/06/the-irish-naval-service-fleet-today.html">She is equipped with the Plessey PMS-26 sonar system</a> which was <a href="https://www.liquisearch.com/thales_underwater_systems/tus_ltd/templecombe">designed by a company that hasn&apos;t existed since 1989</a>. Beyond L&#xC9; Eithne, the most recent records of this system use, that can find records for, are of its use in a <a href="https://en.wikipedia.org/wiki/Niels_Juel-class_corvette">Danish Corvette class built between 1978 and 1980</a> and a <a href="https://en.wikipedia.org/wiki/Vosper_Thornycroft_MK9">Nigerian Corvette built between 1977 and 1980</a>, both of which have been out of service for nearly 20 years. In 1984 when L&#xC9; Eithne went into service it wasn&apos;t that out of date. It would be the only ship currently in the world operating such a system, <a href="https://forum.irishmilitaryonline.com/forum/defence-forces/navy-naval-reserve/11406-irish-naval-asw-capability?p=254982#post254982">if it was fitted of course</a>.</p><p>Given that we lack sonar systems generally in the Naval Service, you can imagine that another option would be to install sonar systems on existing and future ships, and you would be right, though a number of issues present themselves, primarily the chronic underfunding of the Defence Forces in general. Given that none of our modern ships have sonar, it clearly isn&apos;t a priority for the Dept of Defence and even if it was, and we could get the sonar systems, <a href="https://www.rte.ie/news/2021/0716/1235611-coveney-defence-forces/">we can&apos;t put ships to see because we lack the personnel to do so</a>, which is part of a larger issue around pay and retention generally in the DF, but acutely in the Naval Service where <a href="https://www.irishexaminer.com/news/arid-40713842.html">the Government can&apos;t even be bothered to pay bonus&apos; for ships going to sea short staffed</a>.</p><p>To better detect and surveil surface vessels such as Yantar would require more patrols from the Naval Service, which runs into the same issues as before but the gap could be partly filled by the Air Corps running patrols in the CN-235 or the C295&apos;s which will replace them, but the fleet is stretched with two CN-235&apos;s so running regular patrols with just two C295&apos;s would also be a stretch. There are also staffing issues in the Air Corps so running these plans in high tempo operations with multiple crews may also lead to issues.</p><!--kg-card-begin: markdown--><h1 id="deny">Deny</h1>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><blockquote>
<p>To Deny means to deny completely by a direct attack on the means of accomplishment. The use of a High Energy Laser to blind or destroy an electro-optic sensor is an example of denial by direct attack. Another example is a virus that destroys operating systems in a computer used to do Situation Assessment.<br>
<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.); What is Information Warfare?</a></p>
</blockquote>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Capture-6.PNG" class="kg-image" alt loading="lazy" width="1027" height="999" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/10/Capture-6.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/10/Capture-6.PNG 1000w, https://blog.cyberwarfa.re/content/images/2021/10/Capture-6.PNG 1027w"><figcaption><a href="https://users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-2-CK-BIM.pdf">Dr Carlo Kopp &amp; Dr Bruce Mills; Information Warfare and Evolution</a></figcaption></figure><!--kg-card-begin: markdown--><h3 id="air-control">Air Control</h3>
<!--kg-card-end: markdown--><p>Normally when someone considers the concept of Information Denial, we look at how an adversary denies you access to your Information Environment, but Ireland has placed itself in an interesting position and somewhat curious position of denying itself information. </p><p>Ireland has a HUGE area of airspace to monitor. If you look at the below image of Shannon Flight information region or Shannon FIR for short, you will see most of the area of responsibility of Irish Air Traffic Control where you will be in direct contact with the Traffic Controllers and you will be vectored on the waypoint or route you need to take towards your destination.</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Picture1-1.png" class="kg-image" alt loading="lazy" width="1391" height="1055" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/10/Picture1-1.png 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/10/Picture1-1.png 1000w, https://blog.cyberwarfa.re/content/images/2021/10/Picture1-1.png 1391w" sizes="(min-width: 1200px) 1200px"><figcaption><a href="https://skyvector.com/?ll=53.26521293375089,-9.198303228733073&amp;chart=302&amp;zoom=6">Area of a Shannon FIR&#xA0;</a></figcaption></figure><p>While this is a rather large area, it does not tell the whole story. Ireland and the UK also operate a second region called Shanwick Oceanic Control Region or Shanwick OCR for short, which is a gigantic tract of the airspace that covers 2.3 million square kilometres that goes from the north of Spain, out to the Molson-Guinness line which it follows north to south of Iceland, back towards just west of the Faroe Islands, down towards and around Shannon FIR and back to its starting point. </p><p>Somewhere between 1000 and 1500 flights per day use this air space, primarily a set of routes called the North Atlantic Organised Track System. There are four westbound routes, Alpha to Delta, and five eastbound routes, Uniform to Zulu, which you can see in the below image as green and blue respectively. </p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Picture2-1.png" class="kg-image" alt loading="lazy" width="559" height="610"><figcaption><a href="https://skyvector.com/?ll=54.099348641558976,-15.387451177735146&amp;chart=302&amp;zoom=10">Shanwick OCR with the transatlantic routes&#xA0;</a></figcaption></figure><p>So one would imagine that an area of this size, with this many flights traversing though it would be very heavily surveilled and to an extent, you would be right. See the thing is that there are two different types of aircraft surveillance. The first is what you find at apps like Flightradar24 or FlightAware, or websites like ADS-B Exchange, where the aircraft broadcasts data or Air Traffic Control interrogates the transponder for data. When the aircraft is broadcasting data, it is doing so using a technology called ADS-B, which can be detected using ground-based sensors, or if the aircraft is equipped with satellite communications, using space-based sensors. </p><p>When Air Traffic Control interrogates the Transponder for data, the transponder will broadcast certain data depending on its operating mode. Mode A transmits its IACO code, such as <a href="https://twitter.com/search?q=%22AE01D8%22&amp;src=typed_query&amp;f=live">AE01D8 for Cobra Ball 1</a>, Mode C which transmits the IACO code and the altitude of the aircraft back, and finally, Mode S which transmits the IACO code, altitude and can allow for data exchange between Air Traffic Control. Mode S also has an &apos;<em>Enhanced Surveillance</em>&apos; variant which allows for the track of the flight, ground speed, indicated airspeed and vertical rate etc, for more accurate tracking. This is what you see in things like Flightradar24.</p><p>And if you look at Shanwick OCR coverage from Eurocontrol, you&apos;ll see this amazing map of the area where there is huge coverage by both ground and space-based sensors;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Picture4.png" class="kg-image" alt loading="lazy" width="472" height="606"><figcaption><a href="https://www.eurocontrol.int/service/automatic-dependent-surveillance-broadcast">Shanwick OCR ground (dark green) and space-based (light green) ADS-B coverage. Yellow is for proposed coverage areas</a></figcaption></figure><p>The problem with the ADS-B is that for many reasons <a href="https://aviation.stackexchange.com/questions/2266/why-do-pilots-have-the-ability-to-turn-off-the-transponder-in-flight">pilots can turn it off as they choose</a> and because it is dependant on the internal navigational systems of the aircraft, if it goes off, Air Traffic Control loses all positional information about that aircraft. This is why you might sometimes see it called Secondary Surveillance Radar. The secondary part is because Air Traffic Control is unable to interrogate the aircraft when the transponder is turned off. They can of course use Primary Radar, or what people think of with radar, the spinning thing on top of structures, rather than the homemade antenna, that I made out of plumbers pipe I have hanging off of my dads shed.</p><p>As well as their being legitimate reasons for you to need to turn off the transponder, there are also illegitimate reasons such as we saw during 9/11 where hijackers turned off the transponders as part of their hijackings. As well as this a large chunk of military aircraft, for obvious reasons, don&apos;t come with transponders or by default have them off. This means that Air Traffic Control is dependant on being able to interrogate these aircraft by Primary Radar to gather track, altitude and identification data. Ireland has a minor issue though, while we do have Primary Radars but we only have terminal radars which are used on approach to airports. Also we only have them at three airports; Dublin, Shannon and Cork, even though we have 10 airports across the country, and these Primary Radars don&apos;t even cover the entire island and airports such as Donegal Airport aren&apos;t covered either.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Picture5.png" class="kg-image" alt loading="lazy" width="494" height="606"><figcaption><a href="http://iaip.iaa.ie/iaip/Published%20Files/AIP%20Files/ENR/EI_ENR_1_6_EN.pdf">The irish Aviation Authority&apos;s primary radar coverage#</a></figcaption></figure><p><a href="https://www.thetimes.co.uk/article/euro10m-radar-goes-to-the-front-line-of-military-shopping-list-xfbvzt7bv0b">We have for years talked about rectifying this situation by getting a long-range radar</a> to better cover Shannon FIR and parts of Shanwick OCR, as well as to interrogate military aircraft, particularly Russian aircraft, as they make regular penetrations into Irish airspace, but as of yet, we still do not have this radar. If you want to see how regularly Russian aircraft make such penetrations, <a href="https://www.independent.ie/irish-news/secret-defence-pact-allowing-raf-jets-inirish-airspace-undermines-our-neutrality-says-td-berry-40526069.html">fear not, we have a not so secret defence pact with the British to defend our airspace</a>, and if you want to see how regularly they occur, a wonderful OSINT nerd has a <a href="http://www.egxwinfogroup.co.uk/?page_id=4424">webpage to keep track of RAF QRA&apos;s</a> or Quick Reaction Alert&apos;s so you can track these things after the fact, or <a href="http://www.egxwinfogroup.co.uk/?page_id=2261">follow his twitter accounts</a> and get the news as it comes in. </p><p>When these QRA&apos;s are launched, generally you will find that the RAF will send out two Typhoon&apos;s and also launch a Voyager A330 MRTT Tanker for support, and occasionally an E-3 Sentry AEW.1, though they are going out of service fast and old since they are based on the Boeing 707 and are soon to be replaced with the and <a href="https://www.raf.mod.uk/news/articles/wedgetail-to-be-rafs-new-early-warning-radar-aircraft/">E-7 Wedgetail</a> based on the 737NG. The Tanker and AWACS aircraft will sit in what are called Orbits, pre-mapped circles on a flight chart, where they can sit and wait for the Typhoons to refuel or where the AWACS can scan a large area of the sky with its massive radar, so much so, that if you look at the area around Ireland, there are so many orbits that it accounts for 22% all of these orbits in the UK.</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Capture-1.PNG" class="kg-image" alt loading="lazy" width="1469" height="1089" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/10/Capture-1.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/10/Capture-1.PNG 1000w, https://blog.cyberwarfa.re/content/images/2021/10/Capture-1.PNG 1469w" sizes="(min-width: 1200px) 1200px"><figcaption><a href="https://skyvector.com/?ll=58.446583007655036,-10.721557614906171&amp;chart=304&amp;zoom=6&amp;fpl=4500N00800W%204500N03000W%206100N03000W%20DOGAL%20DINIM%20LESLU%204500N00800W">UK AWACS and Tanker Orbits north of Ireland, covering the approaches to Shanwick OCR</a></figcaption></figure><p><a href="https://www.independent.ie/irish-news/secret-defence-pact-allowing-raf-jets-inirish-airspace-undermines-our-neutrality-says-td-berry-40526069.html">Effectively, we are compromising our neutrality and offloading this burden to the UK</a>, so that we don&apos;t have to think about or do anything about this issue. It doesn&apos;t have to be this way though, we could build and operate the long-range radar system and when I was a teenager there was news about the US offering Ireland some F-15&apos;s on the cheap to protect our airspace from what the US probably feared was our own 9/11 happening here. Though bear in mind while I vividly remember this story, and so does my dad, I haven&apos;t actually tracked down the source of this news or rumour.</p><p>It doesn&apos;t have to be F-15&apos;s or even NATO aircraft though. Sweden&apos;s Saab makes the JAS 39 Gripen C/D and E/F which would do a fantastic job with a <a href="https://nationalinterest.org/blog/reboot/dont-overlook-saab-gripen-serious-export-fighter-193298">low flyaway cost</a> and <a href="https://stratpost.com/gripen-operational-cost-lowest-of-all-western-fighters-janes/">the lowest operational costs by some margin to boot</a>, but it also raises other issues such as retention crisis in the Air Corps too. Of course, there are other issues in that there have been comments made about there not being parking spots for aircraft, so infrastructure would have to be expanded and we could need extra expertise to deal with the engines in the Gripen, so things would not be as simple as just purchasing the Gripen.</p><p>Overall this has put Ireland in the somewhat precarious position of not knowing what is under the sea, because our ships lack sonar, not knowing what is on the sea because we can&apos;t put our ships to sea and we don&apos;t know what&apos;s in the skies because we can&apos;t see what is our skies if someone chooses not to be seen. Our overreliance on the RAF and the Royal Navy to protect our territory is, and should be seen as a national disgrace. As Dr. Cathal Berry said</p><!--kg-card-begin: markdown--><blockquote>
<p>&quot;It completely undermines our status as a militarily neutral state that we have to rely on the RAF,&quot;<br>
<a href="https://www.independent.ie/irish-news/secret-defence-pact-allowing-raf-jets-inirish-airspace-undermines-our-neutrality-says-td-berry-40526069.html">Paul Williams quoting Dr Cathal Berry TF; Secret defence pact allowing RAF jets in Irish airspace &#x2018;undermines our neutrality&#x2019;, says TD Berry</a></p>
</blockquote>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h1 id="corrupt">Corrupt</h1>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><blockquote>
<p>To Corrupt is to insert false data. For example, the use of dummies on the battlefield is an Attack Measure against the Collection function. Intrusion into a communications channel and spoofing is another example. Psychological Operations (Psyops) is an example of Corrupting information being Stored in the protein processor (the human mind).<br>
<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.); What is Information Warfare?</a></p>
</blockquote>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Capture-7.PNG" class="kg-image" alt loading="lazy" width="1027" height="499" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/10/Capture-7.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/10/Capture-7.PNG 1000w, https://blog.cyberwarfa.re/content/images/2021/10/Capture-7.PNG 1027w"><figcaption><a href="https://users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-2-CK-BIM.pdf">Dr Carlo Kopp &amp; Dr Bruce Mills; Information Warfare and Evolution</a></figcaption></figure><p>Information corruption is a broad topic that I have a lot to say on, so much so that I have several addendum posts in the works on various topics inside this such as a breakdown of what propaganda is, the various types of it as well as examples from history. The piece will also mention ideas that have come into vogue such as Fake News and Misinformation and the actions of states, companies and individuals and cover some tactics and techniques used as part of propaganda such as the Official History, Astroturfing and Political Warfare.</p><p>That is for another time though when I have significantly more research done on the topic and when I am prepared to treat the complex and charged topic that it is with the appropriate level of nuance required to approach to the subject.</p><p>It&apos;s wider than this though, you could look towards <a href="https://edition.cnn.com/2018/05/23/europe/ireland-abortion-referendum-american-campaigners-intl/index.html">the illegal entry to Ireland of US during the Abortion Referendum where they tried to illegally influence the choices of Irish voters</a>, or you could look towards the <a href="https://securingdemocracy.gmfus.org/hamilton-dashboard/">Hamilton68 dashboard by the Alliance for Securing Democracy which can be used to track the outputs of state backed news sources in Russia, China and Iran on various platforms</a>, or to look towards <a href="https://twitter.com/AirMovingDevice/status/1195575891146895360?s=20">Air-Moving Device who among other things occasionally talks about platforms like TikTok being used to expand and normalize the Great Firewall beyond the borders of China</a>.</p><!--kg-card-begin: markdown--><h3 id="%D0%B4%D0%B5%D0%B7%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D1%8F">&#x434;&#x435;&#x437;&#x438;&#x43D;&#x444;&#x43E;&#x440;&#x43C;&#x430;&#x446;&#x438;&#x44F;</h3>
<!--kg-card-end: markdown--><p>Or more simply Dezinformatsiya, <a href="https://www.merriam-webster.com/dictionary/disinformation">a Russian word that until 1939 didn&apos;t exist in English</a>, is the covert spreading of deliberately false information for the purpose of influencing public opinion or obscuring the truth. This is something we have come to live with on a day to day basis, whether we realise it or not. A prime example of the corrupted information environment we live in is the modern Vaccine Denial or Pro Disease movement. I know in my talk I called them the Anti Vaccine movement, but they aren&apos;t against vaccines, they are in denial about the facts of vaccines because of the disinformation charlatans have peddled for so long.</p><p>Robert Evans on his incredible <a href="https://www.iheart.com/podcast/105-behind-the-bastards-29236323/">Behind the Bastards</a> podcast did a <a href="https://www.iheart.com/podcast/105-behind-the-bastards-29236323/episode/part-one-the-birth-of-the-30580537/">two-part episode on the history of the movement</a> and begins by talking about early attempts at having a vaccine for Smallpox, an unimaginably bad disease to contract. The process was based on a 10th centaury Chinese technique where what one would assume is a doctor would take the scabs off of a calf with Cowpox, grind the scabs up into power or a liquid infusion and place into cuts that the doctor would make in the skin of someone to be inoculated in the hopes of getting a mild infection and surviving it. </p><p>This wasn&apos;t as stupid an idea as it sounded, it&apos;s the basis for which a lot of vaccines are developed today! We use live, weakened or dead vaccine particles to develop vaccines, even some of the SARS-Cov-2 vaccines people are receiving around the world today are based on this method. This method worked, the downside is that this Cowpox based vaccine was what we call a first-generation vaccine, where one could get really ill and sometimes die from the vaccination process. While today this sounds horrific, Smallpox was an infection that killed more people than were killed in all the wars between 1900 and 1999, combined when we had a vaccine to boot, shows that the occasional death from the vaccine far outweighed the public benefit of the vaccine.</p><p>Then the second generation of vaccines came around with the most important man you have never heard of, <a href="https://www.wnycstudios.org/podcasts/radiolab/articles/great_vaccinator">Maurice Hilleman, The Great Vaccinator</a>, who Radiolab did an incredible episode on of his work, where in 40 years he developed over 40 vaccines, including 8 of the 14 that are regularly given to children and in some estimates is believed to have saved <a href="https://www.nature.com/articles/nm1223">8 million lives a year</a>. These types of vaccines were developed to reduce the risks associated with earlier vaccines because let&apos;s face it, getting vaccinated, unless you hate the needle should be a pleasant-<em>ish</em> process rather than a scary one. Finally today we have vaccines for things like SARS-Cov-2 based on mRNA which are incredible and leading to huge breakthroughs in vaccines.</p><p>Now, your mom or whoever sharing this vaccine denial rubbish on Facebook isn&apos;t partaking in the act of Disinformation. They are doing Misinformation, they are sharing what they believe to be true because they have fallen for Disinformation. The real people at issue are people like who the Center for Countering Digital Hate called <a href="https://www.counterhate.com/pandemicprofiteers">The Disinformation Dozen</a>.</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Capture-2.PNG" class="kg-image" alt loading="lazy" width="1155" height="1224" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/10/Capture-2.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/10/Capture-2.PNG 1000w, https://blog.cyberwarfa.re/content/images/2021/10/Capture-2.PNG 1155w"><figcaption><a href="https://www.counterhate.com/pandemicprofiteers">The cover page of the report from the Center for Countering Digital Hate</a></figcaption></figure><p>`<em>The Disinformation Dozen</em>` tells the story of the business model of the Vaccine Denial, Pro Disease movement. It tells the stories of the income received by these individuals through their organisations, including links to read their tax returns, loans they received to protect employee&apos;s paychecks and salaries that they earned from being on the boards of organisations as well as data about the wages of the 266 employees they have at various organisations, working on this disinformation and income they have from being speakers and promoters at each other&apos;s events, totalling a combined $36 million, which the CCDH break down by each disinformer.</p><p>The report also performed an analysis of the spread of this disinformation, tagging 483 pieces of content between February and March of 2021, in 10 private and 20 public Facebook groups that then went on to be posted or shared 484,876 times, out of a total of 689,404 pieces of Vaccine Denial content across the platform, accounting for 70.3% of the sample of content. They were also able to show that just three of the disinformer are responsible for over half of all the disinformation.</p><p>The report also highlights that there is a clear link between the disinformers and the social media platforms they use, and the income all parties earn as the report examines a number of legal filings made by the disinformers or their organisations about how the removal of content or fact checking of their content severely impacts the income of the disinformers, yet at the same time it allows facebook to earn up to $1.1 billion, for the 37.8 million followers the Vaccine Denial Audience has on facebook and Instagram, at an Average Revenue Per Person $29.23. </p><p>YouTube earned $707,222 in ad revenue, which it splits 45:55 with the content creator, YouTube earned $318,250 and the content creator earned $388,972. While advertising on YouTube is more complex as you may not be eligible for ads or you may have ads turned off on your channel, YouTube may have earned more from this content being viewed as ads could have been placed on other pieces of content outside of sample in the study. Finally, the report took a look at the followers of various accounts on Twitter, estimating that 392,575 followers are monetizable by having ads served, estimating that $7.6 million was earned.</p><p>If you have ever wondered how these people make their money and continue to contribute verbal, textual and audiovisual diarrhoea to discussions of public health, now you know.</p><p>Realistically speaking, this isn&apos;t a particularly big issue in Ireland as <a href="https://covid19ireland-geohive.hub.arcgis.com/pages/vaccinations">87.42% of the eligible population is fully vaccinated, as of the 4th of October 2021</a>, it is worth looking at the below graph of Government data which clearly shows multiple plateau&apos;s, in multiple age groups showing that some people are not and have not been getting vaccinated, while the have the opportunity to do so, it shows that there is hesitancy out there to vaccinate. </p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Capture-3.PNG" class="kg-image" alt loading="lazy" width="1770" height="1241" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/10/Capture-3.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/10/Capture-3.PNG 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2021/10/Capture-3.PNG 1600w, https://blog.cyberwarfa.re/content/images/2021/10/Capture-3.PNG 1770w" sizes="(min-width: 1200px) 1200px"><figcaption><a href="https://covid19ireland-geohive.hub.arcgis.com/pages/vaccinations">Data from the Irish Government on SARS-Cov-2 vaccination percentages per age group as of October 4th 2021</a></figcaption></figure><p>I cannot link these two things together and say that there is a causal relationship between the Vaccine Denial Disinformation and people choosing to not get vaccinated. I know from personal experience that some people cannot get vaccinated, so 100% is not possible, but the plateau&apos;s from people between 20 and 40 is unrelated to those that cannot get vaccinated as that is generally only a single-digit population, so there is <em>hesitancy</em> for reasons I can only speculate on. The 10 to 19 age group shouldn&apos;t be considered yet, as they have only recently been approved in part for vaccination, first for over 16&apos;s and recently from 12 and up, and the nightmarish process of going back to school would clearly impact this.</p><!--kg-card-begin: markdown--><h1 id="exploit">Exploit</h1>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><blockquote>
<p>To Exploit is to Collect against the adversary&#x2019;s Movement of Data. This increases the data available for friendly Situation Assessment and makes the generation of friendly Information more efficient.<br>
<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.); What is Information Warfare?</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>While Col. Borden has a definition of Exploitation in the context of Information Warfare and it makes sense to me, it may not be clear what exactly is intended by this. For me, the diagrams of Kopp and Mills do a much better job of describing what Exploitation looks like;</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Capture-8.PNG" class="kg-image" alt loading="lazy" width="963" height="465" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/10/Capture-8.PNG 600w, https://blog.cyberwarfa.re/content/images/2021/10/Capture-8.PNG 963w"><figcaption><a href="https://users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-2-CK-BIM.pdf">Dr Carlo Kopp &amp; Dr Bruce Mills; Information Warfare and Evolution</a></figcaption></figure><p>This idea can best be summed up as Exploitation being about collecting data on what the adversary is doing so that you have a better picture of their activities. This is best seen through the classic counterintelligence technique of Backbearing.</p><!--kg-card-begin: markdown--><h3 id="backbearing">Backbearing</h3>
<!--kg-card-end: markdown--><p>While I did just say that Backbearing is the classic counterintelligence technique, its use goes back a lot further than that. In Land Navigation or Orienteering, it is a set of bearings that you can use to work backwards along a path you have travelled so that even if you get lost trying to get from A to Z, you can safely work back from P to A and get un-lost. <a href="https://youtu.be/ht1zeh0E77Y">A great demonstration of the idea is seen in this tutorial for those interested</a>.</p><p>In the world of intelligence, it has a similar meaning, though you don&apos;t know where A is, you just eventually realise based on the information you have, that you are at P and that you need to work backwards using the snippets of data or indirect data that you have to form a larger picture of what is going. You can form the larger picture by looking for things your adversary doesn&apos;t know and is attempting to find out about or figure out. If there is somewhere in particular that they are interested in and what you can infer from this. And if there is a new or unusual action that the adversary is doing that hints towards things.</p><p>A brilliant literary example is John le Carr&#xE9;&apos;s brilliant <em>The Honourable Schoolboy</em>, the second book in the <em>Karla Trilogy</em>. While not all of the book is about Backbearing, a significant part of the story in the beginning third of the book is about telling the story of the impact of <em>The Fall</em>, or the story of <em>Tinker, Tailor, Soldier, Spy</em>. In it, Smiley, Guillam, Sachs, and di Salis spend time in between the archives and meeting room working on figuring out the damage that Bill Hayden did and to see if he, during his time as a sleeper, though his recruitment and promotion of officers, cultivated a second-generation agent to take his place and ensure a continued flow of intelligence in the event of anything happening to Hayden.</p><p>While doing Backbearing on issues like this through open sources is quite difficult as these are intelligence matters discussed in the shadows or behind closed doors, but news does occasionally make its way to various journalists that have their ear to the ground on such matters. Since 1974, the Government has had the National Security Committee or the NSC, to brief an Taoiseach and the Government of Ireland on matters of National Security. More recently in 2017 Cabinet Committee F was established, apparently based on the British Government&apos;s COBR (sometimes seen as COBRA and pronounced this way), <a href="https://www.merrionstreet.ie/en/news-room/releases/taoiseach_convenes_first_meeting_of_government_security_committee.html">to bring together more cabinet ministers and have An Garda S&#xED;och&#xE1;na and the Defence Forces brief them on matters of state security.</a></p><p>In 2011, before Cabinet Committee F was formed, <a href="https://www.justice.gov/opa/pr/ten-alleged-secret-agents-arrested-united-states">the FBI</a> tipped off An Garda S&#xED;och&#xE1;na to the fact that six stolen identities were being used by <em>illegals</em> in the US. <a href="https://www.irishtimes.com/news/russian-diplomat-expelled-over-forged-irish-passports-1.560546">A Garda enquiry came to the conclusion that Russian intelligence had stolen six Irish identities and used them to produce fake Irish passports for cover. This lead to the Department of Foreign Affairs expelling a Russian Diplomat</a>. Illegals are agents operating without the immunity provided by diplomatic cover and as such are taking a huge risk. Diplomatic cover would mean that in the event that your cover is blown, the worst that can happen is that you have to go back home. For illegals though, you are open to serious criminal charges.</p><p>In recent years though Russia has been quite active in Ireland. In 2015, the FSB, Russia&apos;s domestic intelligence agency, think MI5, <a href="https://www.thetimes.co.uk/article/russian-spies-targeting-irish-tech-companies-l2dvpwrjw">a<a href="https://www.thetimes.co.uk/article/russian-spies-targeting-irish-tech-companies-l2dvpwrjw">pplied to have an officer placed in the embassy in Dublin which the Department of Foreign Affairs declined</a></a>, though Russia probably sent this officer under Diplomatic Cover regardless.</p><p><a href="https://www.independent.ie/irish-news/state-sponsored-hackers-targeted-eirgrid-electricity-network-in-devious-attack-36005921.html">In 2017, Russian State-Sponsored actors were inside EirGrid</a>, and while details of the attack are limited to knowing that a router used by EirGrid was compromised and that data transmitted through a GRE tunnel was visible, unencrypted, via a Man-in-the-Middle, nothing else is known. Though it is believed that due to previous attacks, such as the <a href="https://cyberlaw.ccdcoe.org/wiki/Power_grid_cyberattack_in_Ukraine_(2015)">2015</a> and <a href="https://cyberlaw.ccdcoe.org/wiki/Industroyer_%E2%80%93_Crash_Override_(2016)">2016</a> attacks on power grids in Ukraine which resulted in power being lost for some time, <a href="https://www.independent.ie/irish-news/news/exclusive-eirgrid-targeted-by-state-sponsored-hackers-leaving-networks-exposed-to-devious-attack-36003502.html">it&apos;s possible that the intrusion was a similar attempt to turn off the power on the island</a>. </p><p>2018 stands out as a particular year to look at because a fantastic series of articles broke from <a href="https://twitter.com/JohnMooneyIRL">John Mooney</a> in the Sunday Times. <a href="https://www.thetimes.co.uk/article/russian-spies-targeting-irish-tech-companies-l2dvpwrjw">The first</a>, the title of which is a contender for understatement of the year, 2018, implies one thing going on in that Russia is spying on tech companies here in Ireland, the article has a lot more to say beyond that, starting with the fact that it&apos;s not just the tech sector but also engineering and science sectors too as well as keeping tabs on Irish companies, Critical National Infrastructure projects and research at the European Space Agency Space Solutions in Cork, and I suspect those are not the full set of targets given the amount of R&amp;D going on here in Ireland.</p><p>The article goes on further to state that Illegals have also possibly been operating here as in the same article it is made clear that Garda&#xED; approached a Russian couple who <em>befriended</em>&apos; a man working in the tech sector, whom Garda&#xED; believe was the target of an espionage operation. This could be as part of the cultivation of an agent, or an attempt to get access to technology. This couple subsequently were withdrawn when their legend fell apart. Along with this, Garda&#xED; believe that the SVR, Russia&apos;s foreign intelligence agency, think SIS/MI6, are recruiting sources in political, technology and business circles as well as aiding in the spreading of propaganda.</p><p>That article isn&apos;t done yet though. It further goes on to state that Garda&#xED; and Defence Forces staff believe that Russia is operating a number of Signals Officers, who specialise in intercepting and transmitting information, and Cipher Clerks, who specialise in encrypting and decrypting information, out of the embassy in Dublin. This is believed because they only ever leave the embassy in the company of others believed to be intelligence officers operating under diplomatic cover. The threat is real enough that the Defence Forces are believed to have conducted sweeps of the area to identify unusual signals.</p><p><a href="https://www.thetimes.co.uk/article/behind-the-iron-curtain-of-the-russian-embassy-in-dublin-f999sjfcr">The second article in the series also discusses a lot</a>, ranging from denials from the Kremlin to further details on Russian operations in Ireland such as Ireland being used for backdoor entry into the UK but the two major bits in the story is the not exactly a surprise piece of news that Russia is using Ireland&apos;s financial system to launder the proceeds of corrupti0n. The other major bit of news is the bombshell that Russia attempted to use cutouts here in Ireland to purchase &apos;<em>controlled technologies</em>&apos; and that the Garda&#xED; thwarted this attempt. Now controlled technologies, to me at least, are sanctioned technologies that any company selling such technology should have checkout out the selling as not being a sanctioned entity, and the other is for Dual Use Technologies that can be used for both peaceful and military uses such as missile and nuclear technologies.</p><p><a href="https://www.thetimes.co.uk/article/russia-uses-firm-with-spy-links-for-dublin-embassy-job-nvg5qqvxf">The third article in the series deals with the expansion of the embassy in Dublin</a>. The project was overseen by Zarubegproekt, the prime contractor for the FSB and SVR in Russia, who made the application for Planning Permission via a now defunct but unnamed Dublin architectural firm. This could be an attempt to imply that make it known that it was done in a possibly illegal manner, but without evidence to back up such a claim, it&apos;s just hinted at as the Sword of Damocles that is Irish libel law hangs over such statements in the press.</p><p>The proposed development would expand the embassy from a <a href="https://www.thetimes.co.uk/article/russian-spies-targeting-irish-tech-companies-l2dvpwrjw">2000 sq ft facility into a 10,000 sq ft facility</a>, a fivefold expansion of the embassy. More importantly though, the expansion would also include a number of underground rooms to house &apos;<em>ventilation, storage and heating equipment</em>&apos; to which undescribed experts say are located in unusual locations for such facilities, which raises the spectre that the embassy is being used as a base of espionage and military operations in Ireland.</p><p>Further to this, Zarubegproekt insisted that the construction of the facilities was to be carried out by builders flown in from Russia, which given the skill and expertise of builders and developers available in Ireland, it is a highly unusual request that could be read as there being classified technology being installed that no foreign nationals, such as Irish should see, and if they did see certain elements of the architectural diagrams, materials on-site or installation of equipment may raise eyebrows and hint towards the true use of this expansion. <a href="https://www.thetimes.co.uk/article/taoiseach-leo-varadkar-told-to-halt-russian-embassy-expansion-jk8mf5q00">Eventually though, legislation was drawn up to halt the expansion of the Russian embassy</a>.</p><p><a href="https://www.thetimes.co.uk/article/russia-smuggling-in-spy-cars-to-ireland-under-diplomatic-cover-zhqt9rv37">Finally, the fourth major article of 2018</a> was about Russia smuggling in so-called &apos;<em>Spy Cars</em>&apos; into Ireland, under diplomatic plates, which would mean that security services could not inspect the vehicles as the cars are inviolable under the Vienna Convention on Consular Relations;</p><!--kg-card-begin: markdown--><blockquote>
<p><strong>Article 31</strong><br>
4. The consular premises, their furnishings, the property of the consular post and its means of transport shall be immune from any form of requisition for purposes of national defence or public utility. ...<br>
<a href="https://legal.un.org/ilc/texts/instruments/english/conventions/9_2_1963.pdf">Article 31.4 of the Vienna Convention on Consular Relations</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>This is a very smart approach as these &apos;<em>Spy Cars</em>&apos; are suspected of housing communications and signals equipment in the tyre wells and boots of these cars, and possibly other places too. This allows the occupant, a Signal Officer, near-complete freedom to travel around Ireland and at a previously arranged time and place, drive past, or stop at a location while receiving or transmitting information to and from agents in the field or to and from sources they have cultivated. This can then be given to a Cipher Clerk for retransmission to Moscow for analysis or further instruction etc.</p><p>While we don&apos;t know exactly what is inside one of these &apos;<em>Spy Cars</em>&apos;, we got a pretty good glimpse at what the innards might look like <a href="https://english.defensie.nl/latest/news/2018/10/04/netherlands-defence-intelligence-and-security-service-disrupts-russian-cyber-operation-targeting-opcw">when the Netherlands Defence Intelligence and Security Service disrupted an active attempt to hack into the Organisation for the Prohibition of Chemical Weapons (OPCW) in Den Haag in 2018</a>, in the wake of the attempted assassination of Sergei and Yulia Skripal in Salisbury, UK, <a href="https://www.theguardian.com/uk-news/2018/sep/13/russian-television-channel-rt-says-it-is-to-air-interview-with-skripal-salisbury-attack-suspects">home of a famous 123-metre spire and clock</a>.</p><p>The GRU agents got a rental car at Schipol Airport, kitted it out with what they needed and went to their hotel at the Marriott in Den Haag. This is a curious choice of hotel for four GRU agents to be in as it is right next door to the headquarters of the OPCW. The location the car was found in is also directly next to the fence that separates the properties. The equipment in the car was being used to hack into the OPCW&apos;s WiFi for the purposes of further intrusions into the network. </p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2021/10/Capture-9.PNG" class="kg-image" alt loading="lazy" width="1648" height="1231" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/10/Capture-9.PNG 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/10/Capture-9.PNG 1000w, https://blog.cyberwarfa.re/content/images/size/w1600/2021/10/Capture-9.PNG 1600w, https://blog.cyberwarfa.re/content/images/2021/10/Capture-9.PNG 1648w" sizes="(min-width: 1200px) 1200px"><figcaption><a href="https://english.defensie.nl/latest/news/2018/10/04/netherlands-defence-intelligence-and-security-service-disrupts-russian-cyber-operation-targeting-opcw">An image from a slide made by the Dutch Ministry of Defence showing the contents of a Russian Spy Car made in a rental vehicle to hack into the offices of the OPCW</a></figcaption></figure><p>The ultimate aim of this operation is unknown, but since the weapon used in the attempted assassination, Novichok, is a fourth-generation chemical weapon that was developed in complete secrecy in the USSR and not that well known outside some very, very, very small and niche circles, Russia was probably very interested in where the OPCW got samples for comparison and how many they had, as well maybe making an attempt to sabotage the investigation.</p><p>I could go on talking about these issues but there is a story on this kind of thing every other month or so, and what I want to get across is the mountains of evidence that show that Russia is targeting Ireland across the spectrum, under the sea, on the sea, in the air and on land and doing so with a mix of civil, military, diplomatic and whatever other methods they can muster to conduct operations on Irish territory and that they are doing so for a wide variety of reasons. <a href="https://www.thetimes.co.uk/article/russian-agents-plunge-to-new-ocean-depths-in-ireland-to-crack-transatlantic-cables-fnqsmgncz">but there is one last story I want to highlight from 2020</a>.</p><p>The smaller part of the story was the Russian agents were monitored while mapping Dublin port, something that would be quite handy if you know your Red Storm Rising. The major story though was related to the Submarine Fibre Optic Cables I mention earlier in this piece as Russia was attempting to map the precise locations of landing points of these cables by looking for weak points in the physical infrastructure on land and included a quote that I fully believe to be the case;</p><!--kg-card-begin: markdown--><blockquote>
<p>... the Russian service most likely had two intentions: spying, and cutting communications in time of conflict.<br>
<a href="https://www.thetimes.co.uk/article/russian-agents-plunge-to-new-ocean-depths-in-ireland-to-crack-transatlantic-cables-fnqsmgncz">John Mooney quoting John Sipher, former Moscow based CIA offier; Russian agents plunge to new ocean depths in Ireland to crack transatlantic cables</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>This was also a very timely story to come out as it was out only a month before the inaugural Sl&#xE1;nd&#xE1;il, the National Security Summit and it formed the backbone of a question, along with the paper from Lt. Shane Mulcahy, that I asked the authors of the National Cyber Security Strategy on why the Physical aspect of Cyber was so overlooked in the strategy.</p><!--kg-card-begin: markdown--><h1 id="doing-our-own-backbearing">Doing Our Own Backbearing</h1>
<!--kg-card-end: markdown--><p>Rather than a conclusion as such, I would rather do some backbearing of my own and look at why I have talked so extensively about Russia and why. There are three main reasons, <a href="https://www.patreon.com/posts/enemy-of-state-46258121">the first is that Russia sees us as an EU aligned state</a>. Generally when the EU does something, Ireland follows, <a href="https://www.patreon.com/posts/enemy-of-state-46258121">but also because we are a Western aligned state</a>. This isn&apos;t to say that we are a puppet of the US or anything, but when Russia does something that is seen as unacceptable, such as attempting assassinations with chemical weapons, we like most western states expelled diplomats, actually on Austria was the only state who didn&apos;t expel anyone.</p><p>The second is because we a neutral state, not in the technical sense as defined by Hague Convention (V) from the Second Hague Convention, but because we believe we are one, it is seen by Russia weakness that can be exploited. As I have mentioned Ireland is used as a backdoor into other states such as the UK, but also because Neutrality tends to lead states to believe they are immune or to warp the perception of what things mean on the world stage. Sweden and Austria have been on the wrong side of this in the past where <a href="https://en.wikipedia.org/wiki/Swedish_submarine_incidents">Sweden has a history of dropping depth charges on Soviet and Russian submarines</a> entering its territory, <a href="https://en.wikipedia.org/wiki/H%C3%A5rsfj%C3%A4rden_incident">setting traps for Soviet submarines</a> and <a href="https://www.svd.se/skadad-rysk-ubat-soks-i-skargarden">as recently as 2014 there was an incident where a Russian Lada class submarine made an emergency call from inside Swedish waters</a>. </p><p>Austria though has had a much more troubled recent history where <a href="https://www.politico.eu/article/austrian-colonel-spied-for-moscow-for-decades-says-vienna/">in 2018 an Austrian Colonel was a spy for Russia giving away details on the Austrian Air Force and Army artillery systems as well as information on the immigration situation in Austria</a> and they were doing this for 30 years, and in 2020, <a href="https://www.aljazeera.com/news/2020/8/24/austria-expels-russian-diplomat-moscow-hits-back-in-kind">there was another spy scandal where a diplomat was engaged in Industrial Espionage</a> much like we see here. Vienna, but partially also cities Stockholm and Dublin to an extent, as capital cities in neutral states, as well as elsewhere like Geneva, are hubs for diplomatic activity and thus are homes for spies. </p><p>While he is best known for his past at 73 Easting and more recently being a bit of a clown, <a href="https://www.harpercollins.com/products/battlegrounds-h-r-mcmaster?variant=33082432159778">Gen. H. R. McMaster wrote a book recently</a> on some of the things he tried to accomplish when he was Donald Trump&apos;s National Security Advisor and one of them was the concept of &apos;<em>Strategic Narcissism</em>&apos; and he gave a lot of time on the Lawfare Podcast a while ago to discuss the concept;</p><!--kg-card-begin: markdown--><blockquote>
<p>Jordan, I think this has been a loadstone around our neck, is this tendancy to define the world only in relation to us and then to assume therefore that what we deciede to do or deciede not to do, will be decesive in achieving a favourable outcome. This is problematic because it is self referential and it doesn&apos;t ackwnolege the degree to which the other, esspescially adversary&apos;s, enemies, rivals, competitors, have over the future course of events.<br>
<a href="https://www.lawfareblog.com/lawfare-podcast-h-r-mcmaster-china">H. R. McMaster discussing Strategic Narcissism on Lawfare&apos;s ChinaTalk Podcast @ 00:02:40</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>This for me at least sums up the last two points neatly. We don&apos;t, at a government level, view Russia as an enemy, but we aren&apos;t friends either, yet we try to get along nicely. The &apos;<em>Strategic Narcissism</em>&apos; is that we ignore how Russia feels about us in that to an extent, we are a threat to them, but that they don&apos;t want to make us an enemy because we are a useful place to be acquainted with and if conflict were to break out, Ireland would be a useful place for Russia to operating in and around that presents them with a number of advantages. If you don&apos;t like the idea of &apos;<em>Strategic Narcissism</em>&apos;, Gen McMaster also has another them which is to say that we lack &apos;<em>Strategic Empathy</em>&apos;.</p><p>The third issue is that we lack capability on a number of fronts in both military and intelligence matters, even in basic and simple terms. I mentioned the lack of sonar in the Naval Service, the lack of ability to view the airspace and for the Air Corps to control this airspace, but the problem to an extent is more fundamental than that. Logistics is the backbone of a military. Napoleon is said to have said that &apos;<em>An army marches on its stomach</em>&apos; and this is a reference to the importance of logistics, <a href="https://www.rte.ie/news/2021/1002/1250201-military-plane/">something we are having a discussion about right now, and for the most part we are not talking about the logistics</a>. As well as this, as Mark Galeotti points out, we don&apos;t even have the basics of counterintelligence;</p><!--kg-card-begin: markdown--><blockquote>
<p>Ireland doesn&#x2019;t have a counter-intelligence capability. It&#x2019;s a relatively soft target. Ireland is a major node for the global internet. It has a large concentration of tech companies. This is the new battle space of the future.<br>
<a href="https://www.thetimes.co.uk/article/russian-agents-plunge-to-new-ocean-depths-in-ireland-to-crack-transatlantic-cables-fnqsmgncz">Mark Galeotti; Russian agents plunge to new ocean depths in Ireland to crack transatlantic cables</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Security is an intangible idea that Ireland has a certain apathy for. There are a lot of people who do care about securing the state and I don&apos;t mean to disparage them and say that they have zero interest but that they are occupied with other things like their kids get a good education or that they can get a doctor when they need it or whatever is on their mind at work. This is a generalisation of affairs in Ireland, we tend not to have major discussions on matters of national security or defence strategy. We tend to assume that sure no one would attack us, that it will <em>be grand</em> so to speak, and this impacts our strategic vision for what the current threats are in the world to a great extent, imagining that we are living in a time just after then end of the Cold War, at the End of History and in how we choose to invest to deal with such threats. As such we don&apos;t have a National Security Strategy, <a href="https://www.gov.ie/en/consultation/8b3a62-public-consultation-on-the-development-of-a-national-security-strate/">there are ongoing consultations for it</a>, but we should be clear that without a strategy and an honest look at the threats we face, because as I previously quoted the CEO of IBM UK &amp; Ireland, security is key to our prosperity, and Gen McMaster agrees;</p><!--kg-card-begin: markdown--><blockquote>
<p>So I think that, espescially with involving these important issues, that involve security, that involve our prosperity, that involve building a better future for generations to come, we must be clear eyed about the nature of that challange and we have to establish objectives ...<br>
<a href="https://www.lawfareblog.com/lawfare-podcast-h-r-mcmaster-china">H. R. McMaster on Lawfare&apos;s ChinaTalk Podcast @ 00:10:30</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Really what we need is to come together, admit that while all of these are intangible idea&apos;s, that there are threats out there and that we need to protect ourselves from these threats, understand them and built a strategy around them. One that will include not just solving funding issues at the HSE, the unhoused crisis, the cost of buying homes etc, but also on wider topics like protecting our waters and our airspace from intrusions such that if a conflict were to begin that we would be prepared to deal with it.</p><!--kg-card-begin: markdown--><blockquote>
<p>I think that the approach is really important. The approach of first understanding problems on our own terms, then inventorying our vital interests, viewing whatever the challange is that you&apos;re facing though the lens of your vital interest and crafting and over arching goal with spesific objectives.<br>
<a href="https://www.lawfareblog.com/lawfare-podcast-h-r-mcmaster-china">H. R. McMaster discussing shifting the overal stratigic policy of a nation on Lawfare&apos;s ChinaTalk Podcast @ 00:10:00</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Finally, I want to mention Blowback. This is the intelligence concept of the impact of the unintended consequences of intelligence operations. If one of the above scenario&apos;s were to occur, such as damage done to Submarine Fibre Optic Cables, what would that do to a state like Ireland?</p><!--kg-card-begin: markdown--><blockquote>
<p>... the technological base of the Irish economy has developed significantly in recent years; the State is now home to a large proportion of Europe&#x2019;s data (upwards of 30% according to some industry assessments) and the European headquarters of a number of the world&#x2019;s largest technology firms. Critically also, the conceptual evolution of cloud computing has had profound implications for Ireland. In many cases, rather than being passive repositories of data, these centres are now home to live operational software environments; an outage or incident affecting one of those facilities could therefore have immediate disruptive effects on infrastructure or business across the EU or globally.<br>
<a href="https://www.ncsc.gov.ie/pdfs/National_Cyber_Security_Strategy.pdf">National Cyber Security Strategy 2019-2024; pp 13</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>What is the reputational damage to a state when we have great difficulties in communicating with the outside world and companies need their data that is stored in Ireland? Or all of a sudden a huge chunk of the world&apos;s compute power dropped off? Or if huge toolchains in the cloud that companies rely on vanished? What if financial transactions couldn&apos;t be sent? Taxes collected? The list goes on and on.</p><!--kg-card-begin: markdown--><blockquote>
<p>Tens of thousands of financial transactions are sent on these cables every hour along with communications. People think &#x2018;the cloud&#x2019; is in the sky but it&#x2019;s really in the bottom of the sea,<br>
<a href="https://www.thetimes.co.uk/article/navy-called-in-as-russians-suspected-of-targeting-undersea-internet-cable-jztg8t6lx">Jophn Mooney quoting Dr. Cathal Berry (TD); Navy called in as Russians suspected of targeting undersea internet cable</a></p>
</blockquote>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h1 id="what-was-left-out">What Was Left Out?</h1>
<!--kg-card-end: markdown--><p>Probably a lot, probably more than I am capable of knowing without being in a room of experts from every department in the government, but I do want to highlight two areas and explain why they were left out.</p><!--kg-card-begin: markdown--><h3 id="the-ransomware-compromise-of-the-hse">The Ransomware Compromise of the HSE</h3>
<!--kg-card-end: markdown--><p>The ransomware compromise of the HSE is in a lot of ways a coming of age story for Ireland as it exposed a fundamental flaw in the security culture of the state. A prime example of this was when Paul Reid, Director General of the HSE, said that <a href="https://www.irishtimes.com/news/health/hse-cyberattack-has-led-to-trail-of-devastation-says-reid-1.4584228">some services had been set back some 30 to 40 years</a>. If malicious software is setting back something 30 to 40 years, it is indicative of out of date systems that are running software older than I am and maybe hardware that is just as old. The last time I was in A&amp;E, earlier this year, there were computers running Windows 7 that were clearly networked systems. This massive tech debt is a problem.</p><p>We assume that investing once or in several smaller investments over a period of time are all that is needed to provide a service but we do not think about the recurring costs of things like IT or Information Security. As well as this, the HSE is complex beast where healthcare comes rightfully first. If healthcare is to come first, sacrifices come from elsewhere and while I can imagine there are a number of area&apos;s, in a number of state bodies where this is the case, there appears to be a fundamental mismatch between priorities and needs at a high level in the Government;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Honestly, I&apos;m quite happy to blame the government over the HSE cyber attack. If your balance sheet looks like this, it&apos;s likely you&apos;re not prioritising the right things... <a href="https://t.co/4vaIkSgNtE">pic.twitter.com/4vaIkSgNtE</a></p>&#x2014; Gareth Go Tobann (@Gwareth) <a href="https://twitter.com/Gwareth/status/1394227965278490625?ref_src=twsrc%5Etfw">May 17, 2021</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>The other thing about the compromise is that the gang behind it are known as <a href="https://attack.mitre.org/groups/G0102/">Wizard Spider</a> and they are a financially motivated cyber crime gang. While you could look at their actions as degrading the ability of the HSE to deliver healthcare, something I found when I had an ultrasound on the day of the attack and had to give the radiologist all of the information about where she needed to scan and what for, and luckily I knew exactly what I was there for, not everyone would be as lucky. Or the compromise could be looked at thought the lens of Denying healthcare to some, the motivation was not one of an Information Attack, but was a financially motivated crime.</p><p>And just for reference, I call it a compromise and not an attack because attacks indicate that violence was used in the commission of an offence and this clearly is not the case. It&apos;s something I want to discuss more, but that will take some time as books like the Tallinn Manual&apos;s are hefty and dense volumes.</p><!--kg-card-begin: markdown--><h3 id="the-electrical-grid">The Electrical Grid</h3>
<!--kg-card-end: markdown--><p>I briefly mentioned that there was a man in the middle attack on a compromised router operated by Vodafone for Eirgrid, why not have that as a major talking point since it could be seen as Denial given that denying access to the electrical grid in this day and age? Or what about if the attack on Eirgrid succeeded and some generation capacity was Degraded?</p><p>Well, I did initially look into Degrade and Deny scenario&apos;s given that I have been working on a <em>Malware Zoo</em> of various pieces of malware which could be seen as something you could classify as a <em>Cyber Weapon</em> so I am acutely aware of malware that has not just attacked Industrial Control Systems, but also attacks on electrical grids such as those seen in Ukraine in <a href="https://cyberlaw.ccdcoe.org/wiki/Power_grid_cyberattack_in_Ukraine_(2015)">2015</a> and <a href="https://cyberlaw.ccdcoe.org/wiki/Industroyer_%E2%80%93_Crash_Override_(2016)">2016</a>. Or research that was conducted such as the <a href="https://www.youtube.com/watch?v=LM8kLaJ2NDU">Aurora Test</a> that the US Department of Energy and Department of Homeland Security, <a href="https://www.muckrock.com/news/archives/2016/nov/14/aurora-generator-test-homeland-security/">where they used software to physically destroy power generating infrastructure via frequency excursion</a>. </p><p>I also wanted to look at <a href="https://unresolved.me/metcalf">The Metcalf Sniper Attack</a> which is a fascinating attempt to take down grid infrastructure by cutting control cables to prevent warnings that there was issues with the infrastructure. Then over the course of 19 minutes, shot over 120 rounds of ammunition from what appears to be several guns at a series of transformers, but not at the transforming circuitry, but at the cooling fins on the transformers. This caused roughly 240,000 litres of cooling oil to lead from them and allow temperatures to rise. As heat is impacts the performance of electronics, overheating leads to systems shutting down and this is what happened, but it wasn&apos;t clear that this had happened as the communications links had been cut.</p><p>Ultimately though, I chose to not concentrate on the gird, not because the link to Russia may be seen as more tenuous by some, but because anyone who has kept an eye on the grid for any amount of time knows that <a href="https://www.businesspost.ie/energy/eirgrid-and-cru-warn-of-rolling-blackouts-if-action-is-not-taken-on-data-centre-growth-7f484021">the current issues in the news about Data Centers are not news and this has been warned about for years</a>. The narrow generation margins that have been run on the grid for the longest time have left us vulnerable to unreliable power delivery if we were to have an incident occur or have a compromise of the grid infrastructure were to occur as we saw here in 2018 or in Ukraine and an unreliable grid would make Ireland seem unreliable and could damage the reputation of the state in the eyes of foreign direct investors.</p><p>Plus events that could cause the kinds of damage seen in the Aurora Test, frequency excursion&apos;s, though not nearly as extreme, happen on a fairly regular basis and engineers at Eirgid make sure the grid is safe, online and functional so that you never notice. You can see some events from the past 3 years below;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Woops, someone&apos;s just had a clanger! <a href="https://t.co/45IxynE5qP">pic.twitter.com/45IxynE5qP</a></p>&#x2014; Mark Coleman (@Spark_ie) <a href="https://twitter.com/Spark_ie/status/1181123381174910977?ref_src=twsrc%5Etfw">October 7, 2019</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Oops!    Someone dropped a spanner into the drive train somewhere &#x1F62C;<br><br>Two frequency events within 20 mins, very unusual, but no bothers to <a href="https://twitter.com/EirGrid?ref_src=twsrc%5Etfw">@EirGrid</a> <a href="https://t.co/1vpdZ4mAvm">pic.twitter.com/1vpdZ4mAvm</a></p>&#x2014; Mark Coleman (@Spark_ie) <a href="https://twitter.com/Spark_ie/status/1278337347923382279?ref_src=twsrc%5Etfw">July 1, 2020</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">There&apos;s just been an absolute whopper of a grid event on the Irish electricity system.  Grid frequency floated around 49.75Hz for ~15 minutes! Back @ 50Hz now..<br><br>(I now see Coolkeeragh CCGT 425MW was the cause)<br><br>Never seen this (the duration of dip) in my 11yrs of working on grid <a href="https://t.co/NjwVse1la1">pic.twitter.com/NjwVse1la1</a></p>&#x2014; Mark Coleman (@Spark_ie) <a href="https://twitter.com/Spark_ie/status/1389663283544838149?ref_src=twsrc%5Etfw">May 4, 2021</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>And for context of what those frequencies mean, you can see the below tweet. For reference, the context of the tweet is after the 2021 event directly above where the Coolkeeragh gas power plant went offline suddenly and 425MW of generating capacity vanished from the network.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Well, as per Grid Code, the system can (and did) operate fine at that frequency.<br><br>BUT, the risk is if another large unit was to trip while being at 49.75Hz that&apos;s absolutely [certainly] blackout territory. <a href="https://t.co/qswK62xiDp">pic.twitter.com/qswK62xiDp</a></p>&#x2014; Mark Coleman (@Spark_ie) <a href="https://twitter.com/Spark_ie/status/1389680408149823490?ref_src=twsrc%5Etfw">May 4, 2021</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>If such an event were to happen again as we saw happen at Coolkeeragh again, or if malware was nicely placed to wait for such an event, we would be on the brink of blackouts. If things got really bad and grid infrastructure started to need to be disconnected or turned off, starting again from scratch is called a <a href="https://www.drax.com/power-generation/black-start-important-back-plan-youve-never-heard/">Black Start</a> and it is complex and risky.</p><!--kg-card-begin: markdown--><hr>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="acknowledgments">Acknowledgments</h3>
<!--kg-card-end: markdown--><p>Cheers to <a href="https://twitter.com/madwonk">Ben</a>, the editor &#x1F633;<strong>. </strong>I can&apos;t thank enough <a href="https://twitter.com/dbmee">David</a> for his amazing ability to watch and dig up things related to the mostly unseen and uncared for elements of National Security in Ireland like the power grid, and the naval and air space around Ireland. Journalist <a href="https://twitter.com/JohnMooneyIRL">John Mooney</a>, for his articles and <a href="https://www.patreon.com/TheDarkState/posts">podcast</a>, his generous time, huge patience and tips on various goings on. And finally, a thanks to the many, many more <a href="https://twitter.com/ACWPodcast">Wonks</a> for the discussions on the various cyber and information warfare aspects.</p>]]></content:encoded></item><item><title><![CDATA[I was in the Economist Magazine talking about OSINT]]></title><description><![CDATA[<p>I contributed to an essay on OSINT, mostly as background, by Shashank Joshi, which is the Cover Story of the August 7th 2021 edition of the Economist. It&apos;s a fun and engaging read about the weird and important things people like me are doing either professionally or in</p>]]></description><link>https://blog.cyberwarfa.re/i-was-in-the-economist-magazine-talking-about-osint/</link><guid isPermaLink="false">610c074ef85c9ea22a7b5c06</guid><category><![CDATA[Updates from the Author]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Thu, 05 Aug 2021 17:15:02 GMT</pubDate><content:encoded><![CDATA[<p>I contributed to an essay on OSINT, mostly as background, by Shashank Joshi, which is the Cover Story of the August 7th 2021 edition of the Economist. It&apos;s a fun and engaging read about the weird and important things people like me are doing either professionally or in my case, in my spare time, with OSINT to break the state monopoly on intelligence.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">So uhh... I&apos;m quoted in the Economist this week... Mostly from talking on background about OSINT, the <a href="https://twitter.com/ACWPodcast?ref_src=twsrc%5Etfw">@ACWPodcast</a>, the <a href="https://twitter.com/hashtag/PS752?src=hash&amp;ref_src=twsrc%5Etfw">#PS752</a> shootdown and how <a href="https://twitter.com/Ascii211?ref_src=twsrc%5Etfw">@Ascii211</a> plays with Sidewinders <a href="https://t.co/iajCQHeDTV">https://t.co/iajCQHeDTV</a> <a href="https://t.co/SuelcbRwYH">pic.twitter.com/SuelcbRwYH</a></p>&#x2014; Paddy Kerley (@LegendaryPatMan) <a href="https://twitter.com/LegendaryPatMan/status/1423282542724087812?ref_src=twsrc%5Etfw">August 5, 2021</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>If you know me well enough, you&apos;ll see the throughline of how overhead imagery analysis got started by the allies being confused by reconnaissance imagery of Auschwitz, thinking it to be an industrial complex and concentration camp rather than all of the above and an extermination camp and how I think this kind of faulty intelligence exists, in an era where we can, and should do better. Also that I don&apos;t like to not know what something is and that I have a drive to know and understand things.</p>]]></content:encoded></item><item><title><![CDATA[Information Warfare]]></title><description><![CDATA[<p>A number of years ago at TU Dublin I overheard several students discussing a map they were looking at that visualized DDoS attacks <a href="https://www.digitalattackmap.com/">such as Digital Attack Map</a> and commenting about how it visualised Cyber War before their very eyes. This didn&apos;t exactly seem right to me, but</p>]]></description><link>https://blog.cyberwarfa.re/iw/</link><guid isPermaLink="false">60834946a1ddcd53430870d4</guid><category><![CDATA[Cyber & Information Warfare Theory]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Fri, 25 Jun 2021 14:07:36 GMT</pubDate><content:encoded><![CDATA[<p>A number of years ago at TU Dublin I overheard several students discussing a map they were looking at that visualized DDoS attacks <a href="https://www.digitalattackmap.com/">such as Digital Attack Map</a> and commenting about how it visualised Cyber War before their very eyes. This didn&apos;t exactly seem right to me, but I couldn&apos;t exactly put my finger on why it wasn&apos;t right. It did start me on a journey though, and this post is the first in what will probably be many, many more from that journey.</p><p>War is a legal concept from the field of International Law and while I feel like it is important to understanding this topic, there has been some much change over the last year or so, that I haven&apos;t been able to keep up with it all and I need to re analyse my thinking on several aspects. Tallinn 1.0 and 2.0 are still great, but this change has <a href="https://ccdcoe.org/news/2021/the-ccdcoe-invites-experts-to-contribute-to-the-tallinn-manual-3-0/">prompted Tallinn 3.0 to be written</a>, to look at the issues in 1.0 and 2.0 though the recent statements of various states. I have heard rumor of another such book coming out from the <a href="https://ccdcoe.org/">NATO CCDOE</a> which is an Operator&apos;s Manual, which I think may be similar to the <a href="https://www.loc.gov/rr/frd/Military_Law/pdf/LOAC-Deskbook-2015.pdf">US DoD&apos;s Law of Armed Conflict Deskbook</a>. So looking at the legal aspects of such a conflict in cyberspace may have to wait for me to reanalyse my thinking or for a more complete expert opinion to come out in the field.</p><p>The next best thing to talk about, if you can&apos;t talk about if something is or is not <em>&apos;Cyber War&apos;,</em> would be to assume that such state exist and to look at what such a conflict may look like. I was thinking about saving for a talk at something like <a href="https://www.bsidesdub.ie/">BSides Dublin</a> or <a href="https://bsidesbelfast.org/">BSides Belfast</a> or maybe something more towards this niche like <a href="https://www.nssi.ie/">Sl&#xE1;nd&#xE1;il</a> but the Human Malware situation has gotten in the way of this so... A blog post it is!</p><!--kg-card-begin: markdown--><h1 id="understandingmodernwarfare">Understanding Modern Warfare</h1>
<!--kg-card-end: markdown--><p>To understand how Cyber fits into modern warfare first, you must understand what warfare is, how it can be viewed, a little on the history of how we got to where we are in warfare and where wars are fought. First warfare is;</p><!--kg-card-begin: markdown--><blockquote>
<p>the activity of fighting a war or strongly competing, esp. with reference to the type of weapons used or to the way the fighting is done:<br>
<a href="https://dictionary.cambridge.org/us/dictionary/english/warfare">Definition of warfare from the Cambridge Academic Content Dictionary &#xA9; Cambridge University Press</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>As I see things, warfare is best described though by looking at things as you would a tree. Each branch off the trunk is a Domain or Dimension of warfare and each branch off of a Domain is a Subdomain that encompasses a way of using a given type of warfare. There are generally said to be five Domains. Land, Sea, Air, Space, and finally, Information. It should though be noted that things are not limited to just those 5 domains. War can be fought Asymmetrically, can also involve the use of Chemical and Nuclear weapons, and can be about how much of your state&apos;s economy and populace you use to fight a war, so considering those areas is also important. This is a simple breakdown of the various domains of warfare;</p><!--kg-card-begin: markdown--><ul>
<li><strong>Land Warfare</strong>
<ul>
<li>Maneuver Warfare</li>
<li>Mountain Warfare</li>
</ul>
</li>
<li><strong>Sea or Naval Warfare</strong>
<ul>
<li>Commerce Raiding</li>
<li>Mine warfare</li>
</ul>
</li>
<li><strong>Ariel Warfare</strong>
<ul>
<li>Air Superiority</li>
<li>Aerial Bombing</li>
</ul>
</li>
<li><strong>Space Warfare</strong>
<ul>
<li>Anti-Satellite Weaponry</li>
<li>Kinetic Bombardment</li>
</ul>
</li>
<li><strong>Information Warfare</strong>
<ul>
<li>Computer Network Attack</li>
<li>Electronic Attack</li>
</ul>
</li>
<li><strong>Asymmetric Warfare</strong>
<ul>
<li>Hybrid Warfare</li>
<li>Guerrilla Warfare</li>
</ul>
</li>
<li><strong>CBRNe Warfare</strong>
<ul>
<li>Chemical Warfare</li>
<li>Nuclear Warfare</li>
</ul>
</li>
<li><strong>Level of Integration In War</strong>
<ul>
<li>Limited War</li>
<li>Total War</li>
</ul>
</li>
</ul>
<!--kg-card-end: markdown--><p>Finally, a very, very brief history of warfare. Since essentially the stone age, when people figured out that a force could have a unit with pointy sticks and primitive shields to defend another unit with stones to sling, we have lived in an era of Combined Arms Warfare. Combined Arms Warfare has come in many forms through many generations. In the Bronze Age, Chariot was king of the killing zone, expensive to field and run but potentially lethal when used correctly in conjunction with a well-arranged array of units with spearmen. In the Middle Ages, we all know stories of a few Knights on horseback who would fight alongside Archers and Foot Soldiers, and in the Renaissance Era Artillery, Cavalry, and Soldiers armed with muskets would make up armies.</p><p>Granted this is a very western perspective, but Persian armies against Alexander the Great were composed of Infantry, Archers, Cavalry, Chariots, and War Elephants. The Mongolian forces in the era of Genghis Khan, while mostly cavalry to prioritize mobility, broke their cavalry into light cavalry who were horse archers and heavy cavalry who were lancers as well as using Foot Soldiers as needed. Aztec forces against Spanish Invaders were comprised of multiple kinds of ranged and close-quarters combat designed for use in jungles blowguns and small daggers as well as more conventional equipment such as bows, spears, and clubs. When Japan invaded Korea in 1592, they arrived with a force, of Samurai, Arquebusiers, Archers, and Spearmen. The Ashanti Empire, where Ghana is today, was mostly infantry and archers and in later years were infantry with firearms and artillery.</p><p>In the 16th century, things changed somewhat. The colonization of various parts of the world to draw the wealth of those regions meant that in times of war, you could destabilize your opponent by interfering with their ability to pay for troops or mercenaries. This spawned a growth in the use of Privateer&apos;s and to combat Privateer&apos;s, most navies began to greatly expand in size and capability. This brought on the era of Multi-Domain Battle. Understanding that war can be waged not just on Land, but at Sea, in the Air, Space, or Cyberspace is crucial to understand how it will be used going forward.</p><p>The era we currently live in is that of Joint Operations or Joint All Domain Operations. The idea is that sure there are different military branches, with different specialties and goals in combat, but the overall military strategy relies on a single, unified combat command based on a geographic area or a specific function that a command has. For example, the US military has a geographic command with USAFRICOM, or Africa Command which is in charge of operations on most of the continent of Africa except Egypt. An example of a Functional Command is that of USTRANSCOM Transport Command which unifies the various resources of the Army, the Air Force, and the Navy to provide to supply and transport needed materials.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">The DoD Data strategy has been released: <a href="https://t.co/OVDkZ2rada">https://t.co/OVDkZ2rada</a> <a href="https://t.co/ttbnpEwleZ">pic.twitter.com/ttbnpEwleZ</a></p>&#x2014; Maaike Verbruggen (@M__Verbruggen) <a href="https://twitter.com/M__Verbruggen/status/1314458124452016128?ref_src=twsrc%5Etfw">October 9, 2020</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>Cyber is a Unified Functional Command in the US and the US DoD is quite clear about how they intend to use Cyber, as part of Joint All Domain Operations. It does not matter to the US DoD if you are in the Army, the Air Force, the Navy, or the Marines, the service you are in will be working as a team on operations to achieve its goals.</p><p>Finally, we must understand where battles are fought. In the past we had Battlefields and this is a simple idea. You have a place where both forces meet for an encounter or where one force uses its speed to dictate to an opposing force where a battle should happen and how it should happen. In the 20th century, though with the rise of aircraft, battles were no longer two-dimensional areas where you fought, they were three-dimensional spaces. This was still a battlefield though and even the arrival of space-based assets didn&apos;t change that.</p><p>The arrival of the 5th Domain though, Cyber or sometimes Information changed how militaries see the battlefield. It is now more than just a three or four-dimensional environment, it now includes an information component and awareness of the electromagnetic spectrum that cyber or other means could be used to exploit or apply a form of warfare. This thinking combined with Joint All Domain Operations turned combat domains from a place where specific forms of warfare only applied and turned these domains into communication mediums for forms of warfare</p><!--kg-card-begin: markdown--><h2 id="networkcentricwarfare">Network Centric Warfare</h2>
<!--kg-card-end: markdown--><p>To understand Information Warfare, you need to put aside the idea of Cyber as its own Domain of Warfare and see <a href="https://web.archive.org/web/20210214141915/http://www.iwar.org.uk/iwar/resources/5th-dimension/iw.htm">Information</a> as the real 5th Domain. You need to do this for the same reason that Cyber isn&apos;t the best term for all the things that someone in Cyber Security may be charged with protecting. Ultimately what they are doing is Information Security as it encompasses a broader set of issues beyond that of just digital systems, but includes physical devices, processes, and a general broader outlook towards securing systems and data. With that in mind, what is Information Warfare;</p><!--kg-card-begin: markdown--><blockquote>
<p>&quot;... is any action to Deny, Exploit, Corrupt or Destroy the enemy&#x2019;s information and its functions; protecting ourselves against those actions and exploiting our own military information functions&quot;.<br>
<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.), quoting Vice Admiral Arthur Karl Cebrowski; What is Information Warfare?</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>This definition is quite clear, but that my not directly related to how Cyber is involved. Information Warfare once had a different name, Command and Control Warfare where the goal was the use whatever means to Deny, Exploit, Corrupt or Destroy an opponent&apos;s methods for commanding their units by denying them the ability to get orders out or understand the situation their units were in. With the advent of Cyber Operations, the name changed again from Information Warfare to Network Centric Warfare, as networks became a lot more important in every life as well as military life. As a general term, Network Centric Warfare and Information Warfare are interchangeable but the use of Command and Control Warfare has diminished somewhat.</p><p>Since Information Warfare is not limited to just cyber, it has a wide range of attack modes that a commander can utilize which was laid out in 1999 before Cyber had become a major focus for military operations;</p><!--kg-card-begin: markdown--><blockquote>
<p>Operations Security (OPSEC)<br>
Concealment, Cover and Deception (CCD)<br>
Psychological Operations (PSYOPS)<br>
Destruction (Hard Kill)<br>
Electronic Warfare (EW)<br>
<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.); What is Information Warfare?</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Information Warfare is the jamming of, intrusion into, spoofing of, or exploitation of an opponent&apos;s communications channels. Not just that, if your opponent is using some of these attack modes for their advantage, you can implement better OPSEC, CCD, or reduce your electronic signature. All this is done to improve your decision-making while degrading your opponents.</p><p>While there is no particular issue with this approach, Col. Borden notes that information is generated in bits per second which is not something you can destroy, just degrade so he updates VADM Cebrowski definition to be;</p><!--kg-card-begin: markdown--><blockquote>
<p>Degrade<br>
Corrupt<br>
Deny<br>
Exploit<br>
<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.); What is Information Warfare?</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Network Centric Warfare aims to create an Information Advantage, a scenario where networks are embedded in your weapons systems are such that you generate and process information more quickly and resiliently than your adversary, while degrading their information generation and processing capabilities, to create a state such that;</p><!--kg-card-begin: markdown--><blockquote>
<p>... a commander can sense, understand, decide and act faster and more effectively than an adversary,<br>
<a href="https://www.c4isrnet.com/information-warfare/2020/09/29/out-information-warfare-in-information-advantage/">Lt. Gen. Stephen Fogarty, Commander of U.S. Army Cyber Command; seapking at CEMAlite Conference 2020</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>To understand how this looks in action, it&apos;s best to look at a case study. One of the best examples of how Information Warfare is used is to look at the Air Campaign as part of the First Gulf War, where the US utilized many aspects of Information Warfare.</p><!--kg-card-begin: markdown--><h4 id="firstgulfwaraircampaign">First Gulf War Air Campaign</h4>
<!--kg-card-end: markdown--><p>In 70&apos;s the Iraqis hired a French company, Thompson CSF, to build a fiber optic network to link its various command and control systems which was complete in 1986. Along with building a series of hardened bunkers deep underground, the overall command and control system would be quite difficult to eliminate with conventional means. The bunkers could communicate using a fiber optic network called KARI with redundant microwave radio links as well as landline links if there were existing telecoms trunks.</p><p>For Coalition Forces to achieve Air Supremacy for Operation Desert Storm, they needed to attack KARI to disrupt centralized anti-air command and control and interceptor command and control and to suppress enemy air defences. Within two days KARI had been so effectively suppressed by the use of precision-guided weapons, that they had switched to dumb bombs and gun strafing runs. Knowing knocking out KARI was priority number one, the NSA had positioned a Rhyolite/Aquacade Signals Intelligence satellite over Iraq so that when the Iraqis moved from KARI network to microwave links, the NSA was able to listen in on the communications and exploit this as they knew exactly what the Iraqis we&apos;re going to do as soon as they did and allow Collation Forces to counter these moves.</p><p>An exploit such as this, used so abundantly couldn&apos;t last forever and eventually, Iraqi intelligence figured out what was going on but by now they were reduced to motorbike couriers. While effective they are a slow method of transport in a vast country with a fast-moving battlespace. Effectively this degraded the Iraqi&apos;s Command and Control of their air defences by destroying their best communication links and forcing them to use less operationally secure communication links as well as slower methods to communicate as well as allowing their communications to be exploited and provide that vital Information Advantage.</p><p>While this eliminates the Command and Control network, individual missile batteries could still fire at aircraft. To deal with this, suppression of enemy air defences, or SEAD, was employed. Collation Forces flew sorties of Wild Weasels to attack batteries that dared to turn on their radars as well as flying Electronic Warfare aircraft to jam as well as the use of drones to emit signatures that matched other aircraft. This part of the mission corrupted the Information that battery commanders had with Electronic Warfare and the worry of the Wild Weasel aircraft around, real or spoofed is Psychological Warfare as you never know if your will be killed by attempting to acquire a target with your radar.</p><p>If you want to know more about the operation, Chapter 3 of Part 2 of the Gulf War Air Power Survey, published by the <a href="https://apps.dtic.mil/dtic/tr/fulltext/u2/a279742.pdf">US DoD covers the topic nicely, with the good stuff starting on page 130 of Part 2. Information on spoofing is found on page 91 of Part 2</a>. And Fred Kaplan discusses the impact of downgrading from fibre optic communication to microwave communication in Chapter 2 of his book <a href="http://www.fredkaplan.info/dark-territory.htm">Dark Territory</a>.</p><!--kg-card-begin: markdown--><h2 id="thegodofwar">The God of War</h2>
<!--kg-card-end: markdown--><p>While the Air Campaign of the First Gulf War shows how Information Warfare can be used, it doesn&apos;t show its full utility. It just shows how for a particular adversary, how the way that information flows in that adversaries&apos; networks can be exploited to achieve the given set of objectives for a given operation. It does not show the broad scale of things that Information Warfare is capable of achieving. To understand what it is capable of, it&apos;s worth noting two more things, the first is Fire and Fire Superiority, and the second is Soviet Artillery Doctrine.</p><p>Fires are;</p><!--kg-card-begin: markdown--><blockquote>
<p>The use of weapon systems or other actions to create specific lethal or nonlethal effects on a target.<br>
<a href="https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf">US Joint Chiefs of Staff; DOD Dictionary of Military and Associated Terms, pp 82</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Fire Superiority is;</p><!--kg-card-begin: markdown--><blockquote>
<p>Infantry units must mass the effects of fires to achieve decisive results. Leaders achieve fire superiority by concentrating all available fires. Massing involves focusing fires at critical points, distributing the effects, and shifting to new critical points as they appear<br>
<a href="https://www.marines.mil/Portals/1/Publications/FM%203-21.8%20%20The%20Infantry%20Rifle%20Platoon%20and%20Squad_2.pdf">US Marine Corps; FM 3-21.8, pp 2-2</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>The ultimate aim of Fire Superiority is to create a Force Multiplier. Force Multiplication is;</p><!--kg-card-begin: markdown--><blockquote>
<p>A capability that, when added to and employed by a combat force, significantly increases the combat potential of that force and thus enhances the probability of successful mission accomplishment.<br>
<a href="https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf">US Joint Chiefs of Staff; Joint Special Operations Task Force Operations, pp GL-11</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>The idea is that the more weapons systems you mass on a target or sector, the greater chance you have of accomplishing your mission. And this is one of the things that Information Warfare can and will do in the modern battlespace. From a wonderful book of Soviet tactics;</p><!--kg-card-begin: markdown--><blockquote>
<p>In modern offensive engagements, mutual fire support between the subunits on the offensive and fire resources increases in importance because of the drastic increase in the resources making fire strikes, the increased scope of offensive engagements, and their dynamism and maneuverability. In order to defeat the enemy, it is necessary to precisely coordinate the fire of the attacking subunits and attached and supporting resources in terms of target, place, and time.<br>
V.G. Reznichenko in <a href="https://books.google.ie/books?id=X8l7RhJmPvsC&amp;dq">&#x422;&#x430;&#x43A;&#x442;&#x438;&#x43A;&#x430;</a>, pp 96</p>
</blockquote>
<!--kg-card-end: markdown--><p>Since I am going to discuss Soviet doctrine, it would be a shame if I didn&apos;t use sources of Russian origin. Now I can&apos;t read Russian, but that does not mean I can&apos;t access literature that covers Soviet doctrine. There exists a wonderful book written by the Soviet&apos;s and published in English &apos;<em>under the auspices of the U.S. Air Force</em>&apos; called &#x422;&#x430;&#x43A;&#x442;&#x438;&#x43A;&#x430; or Tactics that covers Soviet military doctrine. It&apos;s a fascinating read and most importantly, there are translated quotes in there from Mikhail Vasilyevich Frunze, who is by far and away, the most influential military thinker of the Soviet Union and arguably also for the Russian Federation. As for as Frunze was concerned, the application of Fires was what won battles;</p><!--kg-card-begin: markdown--><blockquote>
<p>Fire constitutes the decisive factor and main force in modern combat. Superiority over the enemy may be achieved only by fire.<br>
<a href="https://books.google.ie/books?id=X8l7RhJmPvsC&amp;dq">V.G. Reznichenko quoting M. V. Frunze; &#x422;&#x430;&#x43A;&#x442;&#x438;&#x43A;&#x430; pp 88</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>In western military cultures, maneuver elements such as Main Battle Tanks are the hammer and artillery is the anvil, used in support of maneuver elements actions. You can see an example of this in action during <a href="https://youtu.be/RSqKx3FG0Lw?t=496">G-Day in Operation Desert</a> Storm whereas the XVIII Airborne Corps moved forward, the Iraqis fired artillery at them and coalition forces returned massive firepower that allowed maneuver elements to engage ground element who immediately surrendered.</p><p>The Soviets had a different outlook on things though. As far as they were concerned, maneuver elements supported the artillery and the artillery is the hammer. So much so that in the Soviet military culture, and even today in Russian military culture, artillery is still referred to as <a href="https://info.publicintelligence.net/AWG-RussianNewWarfareHandbook.pdf">The God of War</a>. They did so because they saw artillery as the in a specific way;</p><!--kg-card-begin: markdown--><blockquote>
<p>Artillery continues to be an important asset for delivering fire strikes on the enemy, having, as it does, great firepower and accuracy, a great capacity for quick preparation for action, and a capability for wide maneuver and rapid concentration of fire on the most important targets.<br>
<a href="https://books.google.ie/books?id=X8l7RhJmPvsC&amp;dq">V.G. Reznichenko; &#x422;&#x430;&#x43A;&#x442;&#x438;&#x43A;&#x430; pp 19</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>So why did they do this? They envisioned a battlespace where they use artillery to gain Fire Superiority, which allows maneuver elements to move without taking as many casualties as they maneuver because the opposing force is suppressed or unable to fire back because they have to deal with a force that is firing at them. They also place great emphasis on speed in battle as speed allows you to dictate the course of a battle. This allows you to prevent an enemy from running away or getting to an organized defensive position and allows you to engage them as you please.</p><!--kg-card-begin: markdown--><blockquote>
<p>Modern combined arms combat is characterized by resoluteness, great maneuverability, intensity and fast evolution, rapid and drastic changes in situation and a diversity of methods by which it can be conducted, and the development of high-momentum combat actions on the ground and in the air, on a broad front and in great depth.<br>
<a href="https://books.google.ie/books?id=X8l7RhJmPvsC&amp;dq">V.G. Reznichenko; &#x422;&#x430;&#x43A;&#x442;&#x438;&#x43A;&#x430; pp 36</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>We should break down some of those terms. Speed is pretty obvious, moving fast, as is intensity, and fast evolution is explained in the quote. By recognition of the <em>diversity of methods by which it can be conducted</em>, they are also planning a battle similar to a Battlespace where combat spans domains and forms of warfare. Maneuverability though, isn&apos;t explained and in Soviet artillery terms, it has a specific meaning;</p><!--kg-card-begin: markdown--><blockquote>
<p>Maneuver by fire is a Russian concept whereby fire is shifted from one target, line or sector without moving the firing positions of the artillery pieces. It is used in battle to cause mass destruction of important targets in a short period of time. All of the fires can be conducted against one target simultaneously or conducted against that target and then other targets one after another.<br>
<a href="https://community.apan.org/wg/tradoc-g2/fmso/m/fmso-books/199251">Dr. Lester W. Grau and Charles K. Bartles; The Russian Way of War, pp 234-235 </a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Now that was quite a lot of discussion on the nature of Soviet Artillery. Where am I going with this? Well General Mike Hayden had a very interesting quote that he once gave;</p><!--kg-card-begin: markdown--><blockquote>
<p>&quot;[Cyber] &#x201C;It&#x2019;s inherently global, inherently strategic, inherently characterized by great speed, inherently characterized by great maneuverability and hard to defend,&#x201D; &#x201C;Automatically, you know all the advantage goes to the offense.&#x201D;<br>
<a href="https://www.westmont.edu/consequences-disruption-current-threats-us-security">General Michael Hayden, former DICA and DNSA; Speaking at Westmont College</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Bear in mind, when he was Director of the NSA in 1999, the doctrine of Information Warfare was being defined by the various bodies of the DoD, he was leading one of the major arms of any Information Warfare effort. He has a unique view of how Information Warfare would be used and what its capabilities are. Allow me to explain.</p><p>Seeing the Cyber component of Information Warfare as global is easy, the internet is borderless and it allows you massive reach. It&apos;s strategic in terms that Information Warfare is by nature, the denial, exploitation, corruption, or destruction of information effects how an opponent thinks and makes decisions. Any impact to that has strategic impacts. And it&apos;s got a massive advantage for those on the offensive as attacks are carried out in milliseconds and the lag between attack and detection can range from days to months where you can effectively exploit the information gathered.</p><p>But where the comparison to Soviet Artillery comes into its own is when he mentions the speed, maneuverability, and how difficult it is to defend from. Cyber essentially moves at light speed. Cyber would hardly be used to attack a single target, and by its automated nature, you could easily set up a strike package for several targets <em>n</em>, and when ready, fire at the first target and move through all targets on the list until you hit <em>n, </em>or if you so choose to fire simultaneously, without ever having to move.</p><p>But not just that, Soviet and modern Russian artillery has a number of uses;</p><!--kg-card-begin: markdown--><blockquote>
<p>They are designed to perform the following main tasks:</p>
<ul>
<li><strong>achieve and maintain fire superiority</strong></li>
<li>defeat of the enemy&#x2019;s means of nuclear attack, manpower, weapons, military and special equipment</li>
<li><strong>disrupt</strong> troops and <strong>command and control</strong>, reconnaissance, and <strong>EW systems</strong></li>
<li>destroy permanent defense installations and other infrastructure</li>
<li>disrupt the enemy&#x2019;s operational and tactical logistics</li>
<li>weaken and isolate the enemy&#x2019;s second echelons and reserve</li>
<li>destroy  enemy tanks and other armored vehicles that breach the defense</li>
<li>cover open flanks and junctions</li>
<li>participate in the destruction of enemy aircraft and the amphibious assault forces</li>
<li>conduct remote mining operations</li>
<li>provide illumination to troops maneuvering at night</li>
<li>provide smoke screens and blind enemy targets</li>
<li><strong>distribute propaganda materials</strong><br>
<a href="https://community.apan.org/wg/tradoc-g2/fmso/m/fmso-books/199251">Dr. Lester W. Grau and Charles K. Bartles; The Russian Way of War, pp 232 </a></li>
</ul>
</blockquote>
<!--kg-card-end: markdown--><p>Now isn&apos;t that curious? Artillery is a form of fire that while it has multiple uses, can be used to gain and maintain fire superiority, disrupt command and control as well as electronic warfare, and corrupt the information space with propaganda. Not just is Cyber in some ways directly comparable to artillery in how it could be employed, but their objectives also share some overlap.</p><p>The use of Information Warfare is essentially a form of fire, though not in a traditional sense though. Because it is a fire, it is a force multiplier, where an Information Advantage can be leveraged, with or without more traditional forms of Information Warfare to gain an advantage over an opponent with the idea that this will achieve the US goal of Full Spectrum Dominance over every Domain of the Battlespace.</p><!--kg-card-begin: markdown--><h1 id="weaponsemployment">Weapons Employment</h1>
<!--kg-card-end: markdown--><p>Now after some background, I suppose I get on with what people are probably here for, some examples of <a href="https://tenor.com/view/simpsons-zzzzzzzap-zap-gif-5143141">Cyber Bullets going Zzzzzzzap</a> or <a href="https://tenor.com/view/pew-futurama-phillip-jfry-pew-pew-pew-billy-west-gif-5364124">pew pew</a> or whatever sound is made, can be used as a Force Multiplier in combat, just be aware that the terminology you may familiar with, may differ from what you expect as things tend to have a different meaning in a military context as militaries have its own lexicon.</p><!--kg-card-begin: markdown--><h2 id="degrade">Degrade</h2>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><blockquote>
<p>Data can be degraded either by delaying it until its usefulness is reduced or by destroying it in full or part. For example, the use of concealment is an Attack measure (degradation) against the collection task. The use of jamming to reduce the Capacity of a communications channel (thereby delaying transmission) is another example.<br>
<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.); What is Information Warfare?</a></p>
</blockquote>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="sealinesofcommunicationsloc">Sea Lines of Communication (SLOC)</h3>
<!--kg-card-end: markdown--><p>If you have ever read <a href="https://tomclancy.com/product/red-storm-rising"><em>Tom Clancy&apos;s Red Storm Rising</em></a>, you will be acutely familiar with the importance of Sea Lines of Communication. One of the major plotlines in the book concerns Soviet plans to disrupt NATO&apos;s ability to resupply their forces in the European theatre of battle. To do this they attempt to close the Sea Lines of Communication between North America and Europe. This will continue to be a strategy in the future, though the ultimate aims of such a strategy and thoughts of what Sea Lines of Communication are may change from sea-based trade and logistics to data transmission across the seas.</p><p>For an example of this, Fred Kaplan in his wonderful book Dark Territory has an interesting snippet from the time the NSA was lead by VADM McConnell. He was presented with a map of Sea Lines of Communication and also with another of undersea fiber-optic cables and was able to grasp the similarity between the conventional thinking on Sea Lines of Communication and where this idea might go in the future;</p><!--kg-card-begin: markdown--><blockquote>
<p>Around the same time, one of McConnell&#x2019;s aides came into his office with two maps. The first was a standard map of the world, with arrows marking the routes that the major shipping powers navigated across the oceans&#x2014;the &#x201C;sea lines of communication,&#x201D; or SLOCs, as a Navy man like McConnell would have called them. The second map showed the lines and densities of fiber-optic cable around the world.</p>
</blockquote>
<blockquote>
<p>This is the map that you should study, the aide said, pointing to the second one. Fiber-optic lines were the new SLOCs, but they were to SLOCs what wormholes were to the galaxies: they whooshed you from one point to any other point instantaneously.</p>
</blockquote>
<blockquote>
<p>McConnell got the parallel, and the hint of transformation, but he didn&#x2019;t quite grasp its implications for his agency&#x2019;s future.<br>
<a href="http://www.fredkaplan.info/dark-territory.htm">Fred Kaplan; Dark Territory, pp 30</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>During Operation Desert Storm, VADM McConnell ran the Joint Intelligence Center, the heart of the US military&apos;s information warfare operations, including working on the targeting of the KARI network as I mentioned previously. He knew how important information warfare was going to be and in his time leading the NSA he revolutionized the agency, taking it from an organization that was struggling to gather SIGINT from older sources such as microwave links, as they disappeared, only to be replaced with fiber-optic cables, to one that was capable of quickly pivoting to what others were doing, continuing to gather SIGINT and embracing information warfare;</p><!--kg-card-begin: markdown--><blockquote>
<p>McConnell had a lot on his plate: the budget cuts, the accelerating shift from analog circuits to digital packets, the drastic decline in radio signals, and the resulting need to find new ways to intercept communications. (Not long after McConnell became director, he found himself having to shut down one of the NSA antennas in Asia; it was picking up no radio signals; all the traffic that it had once monitored, in massive volume at its peak, had moved to underground cables or cyberspace.)<br>
<a href="http://www.fredkaplan.info/dark-territory.htm">Fred Kaplan; Dark Territory, pp 35</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>In a time of war, the cutting of fiber optic cables would not destroy an adversary&apos;s ability to command its forces, but as I mentioned, the goal is to degrade this capability rather than to destroy it. <a href="https://www.newsweek.com/undersea-cables-transport-99-percent-international-communications-319072">As 99% of transoceanic data is transmitted over sub-sea fiber optic cable</a>, any degradation of service will ultimately degrade the number of bits per second transmitted across oceans, which is the ultimate goal of Information Warfare.</p><p>Further to this end, <a href="https://www.navyhistory.org.au/category/article-topics/naval-history/naval-technology/">an occasional paper in the Naval Historical Society of Australia</a> mentions that the Australian government considers its sub-sea fiber optic links to be vital to the national economy, and has made the protection of such sub-sea cables a major issue as it presents major strategic consequences in times of war. By cutting such cables, not only do you degrade a state&apos;s ability to gather and use information, thereby degrading their informational awareness, you can also have secondary impacts such as disrupting the functioning of the national economy.</p><!--kg-card-begin: markdown--><h3 id="domaindenial">Domain Denial</h3>
<!--kg-card-end: markdown--><p>While it is arguable that the tenuous relationship between data transmission and naval logistics is a real issue and based on the quote from Fred Kaplan it could be interpreted in various ways, Domain Denial does not have such an issue and is a common form of warfare as can been seen by the use of surface to air missile systems to assist in air control.</p><p>Unlike the land, sea, and air, space has become immensely important to civilians and militaries alike over the last 30 to 40 years. More capabilities have moved to space because they allow for a given function to be done more precisely, with greater coverage and expanded capabilities.</p><p>GPS for example, while it has become a staple of everyday civilian life, it has transformed how militaries perform targeting by allowing weapons to be guided on to a target, even if the target is on the move, you can update and relay the new position and use a constantly computed impact point to ensure your hit the target. If you don&apos;t have a precise place for a guided munition to hit, you can also use space-based assets like satellite imagery to figure out where a target is and then get a GPS location for it. And over time this has only grown in importance;</p><!--kg-card-begin: markdown--><blockquote>
<p>Almost all modern military engagements rely on space-based assets. During the US-led invasion of Iraq in 2003, 68 per cent of US munitions were guided utilizing space-based means (including laser-, infrared- and satellite-guided munitions); up sharply from 10 per cent in 1990&#x2013;91, during the first Gulf war. In 2001, 60 per cent of the weapons used by the US in Afghanistan were precision-guided munitions, many of which had the capability to use information provided by space-based assets to correct their own positioning to hit a target<br>
<a href="https://www.chathamhouse.org/sites/default/files/2019-06-27-Space-Cybersecurity-2.pdf">Beyza Unal; Cybersecurity of NATO&#x2019;s Space-based Strategic Assets, pp 2</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>While GPS, also known as Position, Navigation and Timing, and imagery intelligence is a part of the larger mission of Intelligence, Surveillance, and Reconnaissance, is a subset of what can be accomplished with space-based assets, it is capable of so much more than just that, as well as a subset of missions in each category for which I have only scratched the surface;</p><!--kg-card-begin: markdown--><blockquote>
<p>NATO currently uses six space-dependent capabilities for its alliance operations and missions:</p>
<ul>
<li>Position, navigation and timing (PNT)</li>
<li>Intelligence, surveillance and reconnaissance (ISR)</li>
<li>Missile defence</li>
<li>Communications</li>
<li>Space situational awareness (SSA)</li>
<li>Environmental monitoring (weather forecasting)<br>
<a href="https://www.chathamhouse.org/sites/default/files/2019-06-27-Space-Cybersecurity-2.pdf">Beyza Unal; Cybersecurity of NATO&#x2019;s Space-based Strategic Assets, pp 10</a></li>
</ul>
</blockquote>
<!--kg-card-end: markdown--><p>So how would one degrade space assets to such an extent that the domain was partially or entirely denied to an adversary? The European Space Agency has done multiple studies looking into the cybersecurity of space-based systems and found that conventional civilian systems are vulnerable to &quot;<em>jamming, spoofing and hacking attacks</em>&quot;, as well as providing some examples of previous attempts at using these tactics;</p><!--kg-card-begin: markdown--><blockquote>
<h4 id="examplesofhackingspoofingspyinginspace">Examples of hacking, spoofing, spying in space</h4>
<p>Some unclassified examples from open literature include:</p>
<ul>
<li>In 1998, German-US ROSAT space telescope inexplicably turned<br>
towards the sun, irreversibly damaging a critical optical sensor<br>
following a cyber-intrusion at the Goddard Space Flight Center.</li>
<li>On October 20, 2007, Landsat 7 experienced 12 or more minutes<br>
of interference. Again, on July 23, 2008, it experienced other 12<br>
minutes of interference. The responsible party did not achieve all<br>
steps required to command the satellite, but the service was<br>
disturbed.</li>
<li>2008, NASA EOS AM&#x2013;1 satellite experienced two events of<br>
disrupted control: in both cases, the attacker achieved all steps<br>
required to command the satellite, but did not issue commands.<br>
<a href="https://eisc-europa.eu/images/stories/2018/Workshop/Final_upload/EISC_Presentations/Cybersecurity_-_Jean_Muylaert_and_Luca_del_Monte.pdf">Jean Muylaert and Luca Del Monte; Cybersecurity of Space Missions, slide 3</a></li>
</ul>
</blockquote>
<!--kg-card-end: markdown--><p>It has gotten serious enough that the US Air Force Research Lab teamed up with the organizers of DEFCON to host the Hack-A-Sat CTF at DEFCON 28, where the second-place team, Poland Can Into Space, was able to gain control of an actual satellite, in orbit and turn it to take a photo of the moon, in a literal moonshot;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Cyber moonshot accomplished at our <a href="https://twitter.com/hack_a_sat?ref_src=twsrc%5Etfw">@hack_a_sat</a> <a href="https://twitter.com/defcon?ref_src=twsrc%5Etfw">@defcon</a> event! After solving hard hacking challenges, one team sent code to a live satellite, snagging this literal moonshot pic from 385000 km away. Congrats to all winners and thanks to <a href="https://twitter.com/usairforce?ref_src=twsrc%5Etfw">@usairforce</a>, <a href="https://twitter.com/DoDSpaceForce?ref_src=twsrc%5Etfw">@DoDSpaceForce</a>, <a href="https://twitter.com/DefenseDigital?ref_src=twsrc%5Etfw">@DefenseDigital</a>! <a href="https://t.co/1FF7voDU5h">pic.twitter.com/1FF7voDU5h</a></p>&#x2014; Will Roper (@WILLROP3R) <a href="https://twitter.com/WILLROP3R/status/1292553597222191105?ref_src=twsrc%5Etfw">August 9, 2020</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>I won&apos;t quote all of what Beyza Unal identified as possible impacts of a loss of access to space assets, you can peruse them in the linked paper at your discretion, but I will discuss a few that are interesting to me and expand on them if possible.</p><!--kg-card-begin: markdown--><blockquote>
<h4 id="positionnavigationandtimingpnt">Position, navigation and timing (PNT)</h4>
<p>Losing connection with ships, aircraft, carriers etc. in conflict due to interference to their navigation systems.<br>
<a href="https://www.chathamhouse.org/sites/default/files/2019-06-27-Space-Cybersecurity-2.pdf">Beyza Unal; Cybersecurity of NATO&#x2019;s Space-based Strategic Assets, pp 17</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Any service interruptions to position, navigation, and timing systems directly impact the ability for multiple systems to operate correctly. As the quote states, loss of communication or interruption of service with PNT systems can directly impact your ability to command and control your forces. This can be taken a step further by entering the communications channel and feeding false data to warships. Denying or degrading access to such systems is a core goal of information warfare and possibly using such methods to pivot into feeding false data and luring a force into a trap is core to the corruption of information in information warfare.</p><p>This threat is being taken so seriously by the US military that the US Navy has brought back the use of the <a href="https://www.militarytimes.com/news/your-military/2015/11/01/naval-academy-reinstates-celestial-navigation/">Sextant for Celestial Navigation, directly citing the risks of cyber attacks, as well as things like lightning strikes</a>. The US Air Force has several Inertial Navigation Systems and Astro-Inertial Navigation Systems, in a range of aircraft including the <a href="https://www.thedrive.com/the-war-zone/17207/sr-71s-r2-d2-could-be-the-key-to-winning-future-fights-in-gps-denied-environments">B-1, B-2, RC-135, and F-35 as well as possibly the RQ-180 drone and it is believed that the upcoming B-21 will also have such a system</a>. To ensure that in the event of nuclear war that ICBMs and SLBMs can navigate, the US land-based Minuteman-III has an <a href="https://minutemanmissile.com/missileguidancesystem.html">Inertial Navigation System</a> and the Trident D5 SLBM has an <a href="https://arc.aiaa.org/doi/abs/10.2514/6.1991-2761">Astro-Inertial Navigation System</a>.</p><!--kg-card-begin: markdown--><blockquote>
<h4 id="intelligencesurveillanceandreconnaissanceisr">Intelligence, surveillance and reconnaissance (ISR)</h4>
<p>Loss of situational awareness in peacetime and at times of conflict, resulting in faulty decision-making.<br>
<a href="https://www.chathamhouse.org/sites/default/files/2019-06-27-Space-Cybersecurity-2.pdf">Beyza Unal; Cybersecurity of NATO&#x2019;s Space-based Strategic Assets, pp 18</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Having an Information Advantage relies on your ability to collect intelligence for processing, exploitation, and analysis. If you can degrade or deny a nation&apos;s ability for getting the data or corrupt the data they get, you will impact their ability to command and control troops, make good decisions, and also shrink the information environment they have. This in essence is the goal of Information Warfare.</p><!--kg-card-begin: markdown--><blockquote>
<h4 id="missiledefence">Missile defence</h4>
<p>Cyberattacks on missile defence could occur in the form of spoofing, thus deceiving the ballistic missile command system<br>
<a href="https://www.chathamhouse.org/sites/default/files/2019-06-27-Space-Cybersecurity-2.pdf">Beyza Unal; Cybersecurity of NATO&#x2019;s Space-based Strategic Assets, pp 18</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>The US operates a satellite constellation called Space-Based Infrared System or SIRBS which has the main goal of using infrared sensors to detect the launch of all kinds of missiles from tactical systems such as an SS-1 Scud missile all the way up to the biggest ICBMs like the SS-18 Satan or the SS-X-30 Satan II.</p><p>If an adversary were to take control of the constellation it would deny the US access to missiles being fired at them on any scale on conflict and if there is no warning to run for a bunker or away from an area it could result in massive casualties. Even if only a few are taken control of and the US is either denied access to these satellites, or the data is corrupted by displaying a &apos;<em>false sky picture</em>&apos; of the battlespace, it would reduce the time to act in the event of a tactical or nuclear first strike.</p><!--kg-card-begin: markdown--><blockquote>
<h4 id="communications">Communications</h4>
<p>Losing communication systems or receiving spoofed data, thus compromising the integrity of information received.<br>
<a href="https://www.chathamhouse.org/sites/default/files/2019-06-27-Space-Cybersecurity-2.pdf">Beyza Unal; Cybersecurity of NATO&#x2019;s Space-based Strategic Assets, pp 18</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>The US operates a communication network for battalions in the field called the <a href="https://www.slideserve.com/skyler-barnett/what-does-the-jnn-network-provide">Joint Network Node or JNN</a>. The system provides a connection over satellite communications to achieve their networking beyond the local area they are in. The 11th slide gives a breakdown of the full networking capabilities of the system, which includes access to secret data networks such as <a href="https://storefront.disa.mil/kinetic/disa/service-catalog#/forms/secret-internet-protocol-data">SIPRnet</a> and <a href="https://storefront.disa.mil/kinetic/disa/service-catalog#/forms/sensitive-but-unclassified-internet-protocol-data">NIPRNet</a> as well as other systems like video conferencing and VOIP connections. Any impact on the space-based assets that allow communication would directly impact the information environment that on-the-ground battlefield commanders have.</p><!--kg-card-begin: markdown--><blockquote>
<h4 id="spacesituationalawareness">Space situational awareness</h4>
<p>Loss of control or destruction of satellite control systems through the targeting of those systems or of mission packages by cyberattacks<br>
<a href="https://www.chathamhouse.org/sites/default/files/2019-06-27-Space-Cybersecurity-2.pdf">Beyza Unal; Cybersecurity of NATO&#x2019;s Space-based Strategic Assets, pp 18</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>As I mentioned several times, and have shown evidence, there is a significant risk that control could be lost of various space-based assets. The European Space Agency showed that sensors can be destroyed, permanently degrading the capability of the sensor. If the satellite is in Low Earth Orbit, with full control of the satellite, one could deorbit it either into the atmosphere or ruin its orbit entirely, rendering it useless.</p><p>Though if you have control of the satellite, you could also corrupt data on the system to make GPS targets change since they rely on very precise timing and make guided munitions land off-target. Or simply, you could attempt to lock a nation out of its system and deny its use entirely.</p><!--kg-card-begin: markdown--><blockquote>
<h4 id="environmentalmonitoring">Environmental monitoring</h4>
<p>Weather information is fundamental for land, air, and maritime domains. Cyberattacks on weather forecasting systems could impact on operational capacity.<br>
<a href="https://www.chathamhouse.org/sites/default/files/2019-06-27-Space-Cybersecurity-2.pdf">Beyza Unal; Cybersecurity of NATO&#x2019;s Space-based Strategic Assets, pp 18</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Weather data has played an important part in military operations since the dawn of time with some notable examples being the Battle of Agincourt, where recent heavy rain, on ploughed fields made the French attack on English forces an extremely arduous and tiring task to traverse such terrain in full plate armor. And Operation Overlord in WW2 where the Normandy Landings were delayed by a day due to bad weather from June 4th to 6th. While the 6th didn&apos;t have the greatest weather, it was decided to take the chance and it proved to be the right call.</p><p>Since the weather has historically played a massive role in all domains of combat, being able to manipulate the weather data of an opponent would allow you to directly impact the decision making of the opponent and could be used for your attack or to stall an attack for some time to allow you to get a better defence setup. While the impact of this would not be as large as previously since we live in an era where infantry is mechanized, planes can fly in all weather and ships don&apos;t have the same issues that navies used to have with big gun combat, bad weather and the impacts it has on terrain can slow operations considerably as well as stopping some, such as amphibious and airborne landings.</p><!--kg-card-begin: markdown--><h2 id="corrupt">Corrupt</h2>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><blockquote>
<p>To Corrupt is to insert false data. For example, the use of dummies on the battlefield is an Attack Measure against the Collection function. Intrusion into a communications channel and spoofing is another example. Psychological Operations (Psyops) is an example of Corrupting information being Stored in the protein processor (the human mind).<br>
<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.); What is Information Warfare?</a></p>
</blockquote>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="spoofing">Spoofing</h3>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h4 id="operationoutsidethebox">Operation Outside the Box</h4>
<!--kg-card-end: markdown--><p>Operation Outside the Box was a raid on an <a href="https://www.reuters.com/article/idUSTRE51I45R20090219">undocumented nuclear facility, possibly a covert graphite reactor</a>, in Syria by Israel in 2007. While the raid itself is interesting for multiple reasons such as the<a href="https://web.archive.org/web/20101105130625/http://www.haaretz.com/news/how-idf-troops-infiltrated-alleged-syria-nuke-site-1.272512"> Iranian financing of the reactor</a>, <a href="https://www.nytimes.com/2007/10/14/washington/14weapons.html?hp">the deaths of multiple North Korean nuclear technicians or scientists in the raid</a> or above all else <a href="https://web.archive.org/web/20071010175618/http://www.timesonline.co.uk/tol/news/world/middle_east/article2461421.ece">the nuclear materials for the reactor came from North Korea</a>, no, the most interesting part is how Israel used Electronic Warfare and possibly Cyber Warfare as part of the raid.</p><p>The raid required several Israeli aircraft to penetrate the airspace of Syria undetected to attack the facility. This happened in 2007 and the only nation in the world with stealth aircraft was the US with the F-117 and F-22 fighters and the B-2 Bomber. Israel used what they had, F-15&apos;s and F-16&apos;s for the raid along with electronic warfare aircraft. The attack took place in four major stages.</p><p>The first stage was to take off from Ramat David Airbase and fly up the Syrian coast until they reached the Turkish-Syrian border where they attacked a radar site at Tall al-Abuad in Syria. It was attacked with electronic warfare techniques, most likely jamming and then bombed with precision-guided bombs to take out the site. This created an entry point in Syrian air defence for the planes to penetrate the airspace. Once in the airspace, the really interesting part of the attack could begin.</p><!--kg-card-begin: markdown--><blockquote>
<p>Almost immediately, the entire Syrian radar system went off the air for a period of time that included the raid, say U.S. intelligence analysts.<br>
<a href="https://aviationweek.com/israel-shows-electronic-prowess">David A. Fulghum, Robert Wall and Amy Butler; Israel Shows Electronic Prowess</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Through a combination of jamming the HF and VHF communication links that are used for the command and control of air defences, other unknown forms of electronic attack from the electronic warfare support aircraft and the &quot;<em>penetration through computer-to-computer links</em>&quot;, the aircraft were able to transit the airspace undetected and bomb the suspected nuclear reactor. It is unknown if the &quot;<em>penetration through computer-to-computer links</em>&quot; is a form of cyber warfare or if computers were linked via the HF/VHF network and were vulnerable to jamming or electronic attack.</p><p>It is believed that the electronic warfare support aircraft were able to create a spoofed image of the skies above Syria in what is called a &quot;<em>false sky picture</em>&quot; so that even though the Israeli aircraft were transiting the airspace, all the radar saw was the electronically manipulated image of the sky, that was what the Israelis broadcast and what they wanted the Syrian&apos;s to see.</p><!--kg-card-begin: markdown--><blockquote>
<p>U.S. aerospace industry and retired military officials indicated today that a technology like the U.S. developed &quot;Suter&quot; airborne network attack system</p>
</blockquote>
<blockquote>
<p>...<br>
The technology allows users to invade communications networks, see what enemy sensors see and even take over as systems administrator so sensors can be manipulated into positions so that approaching aircraft can&apos;t be seen, they say. The process involves locating enemy emitters with great precision and then directing data streams into them that can include false targets and misleading messages algorithms that allow a number of activities including control.<br>
<a href="http://www.aviationweek.com/Blogs.aspx?plckBlogId=Blog%3A27ec4a53-dcc8-42d0-bd3a-01329aef79a7&amp;plckPostId=Blog%3A27ec4a53-dcc8-42d0-bd3a-01329aef79a7Post%3A2710d024-5eda-416c-b117-ae6d649146cd">David A. Fulghum; Why Syria&apos;s Air Defenses Failed to Detect Israelis<br>
</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>Essentially invisible to air defences, the Israeli aircraft proceeded to the target where commandos used laser designators to illuminate the target to be destroyed. With the facility bombed and destroyed, it was time for the aircraft to head home via the route they came, <a href="https://abcnews.go.com/Technology/story?id=3702807">still undetected</a>.</p><p>The vast majority of the useful reporting on this comes from a fascinating article by <a href="https://aviationweek.com/israel-shows-electronic-prowess">David A. Fulghum, Robert Wall and Amy Butler called &quot;<em>Israel Shows Electronic Prowess</em>&quot; in Aviation Week</a> which gives an account of the attack through the lens of electronic warfare.</p><!--kg-card-begin: markdown--><h3 id="deception">Deception</h3>
<!--kg-card-end: markdown--><p>Russian Military culture has other loves that artillery and one of those things is &#x43C;&#x430;&#x441;&#x43A;&#x438;&#x440;&#x43E;&#x432;&#x43A;&#x430; or maskirovka, literally disguise. It is their doctrine of deception and camouflage to deceive or deny information to an enemy and while there are many great conventional battles one can look at, even up to today, they have carried this thinking into the fifth domain and used it with great effect. I want to take a look at two examples;</p><!--kg-card-begin: markdown--><h4 id="infrastructuretakeover">Infrastructure Takeover</h4>
<!--kg-card-end: markdown--><p>In 2019, it appears that a group known as Turla, believed to be <a href="https://attack.mitre.org/groups/G0010/">Russian</a>, appeared to <a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/waterbug-espionage-governments">hijack the infrastructure of APT34</a>, an <a href="https://attack.mitre.org/groups/G0049/">Iranian group</a>, and then used it to deliver further malware to systems that APT34 had compromised. This may have gone unnoticed and Turla could have gotten free intelligence if it wasn&apos;t for their use of their tooling such as their custom version of Mimikatz, their packer and their custom windows service called Neuron. If this were to happen on a larger scale, repurposing existing tooling but sending the data to different command and control servers, you could muddy the waters of who is and who isn&apos;t hacking into your systems. Something the Symantec researchers who discovered this are well aware of;</p><!--kg-card-begin: markdown--><blockquote>
<p><strong>Opportunistic sowing of confusion</strong>: If a false flag operation wasn&#x2019;t planned from the start, it is possible that Waterbug discovered the Crambus intrusion while preparing its attack and opportunistically used it in the hopes of sowing some confusion in the mind of the victim or investigators. Based on recent leaks of Crambus internal documents, its Poison Frog control panel is known to be vulnerable to compromise, meaning it may have been a relatively trivial diversion on the part of Waterbug to hijack Crambus&#x2019;s infrastructure. A compromise conducted by one threat actor group through another&apos;s infrastructure, or fourth party collections, has been previously discussed in a 2017 white paper by Kaspersky researchers.<br>
<a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/waterbug-espionage-governments">Symantec DeepSight Adversary Intelligence Team; Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments</a></p>
</blockquote>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h4 id="olympicdestroyer">OlympicDestroyer</h4>
<!--kg-card-end: markdown--><p>OlympicDestroyer while not a particularly interesting piece of malware in many senses as it was just a tool used to gains access to networks via phishing and wipes the Domain Controllers within Windows environments. The two things that stood out about it were that it was a petty attack by <a href="https://www.justice.gov/opa/pr/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-and">Russia&apos;s GRU Unit 74455</a> or Sandworm, in retaliation for the slight of being banned from competition for systematic, state-sponsored doping at the 2014 Winter Olympics. And the second is the malware had a never before seen level of deception, that went so far that it was described by one person who worked on it that it was psychological warfare;</p><!--kg-card-begin: markdown--><blockquote>
<p>In fact, all those contradictory clues seemed designed not to lead analysts toward any single false answer but to a collection of them, undermining any particular conclusion. The mystery became an epistemological crisis that left researchers doubting themselves. &#x201C;It was psychological warfare on reverse-engineers,&#x201D; says Silas Cutler, a security researcher who worked for CrowdStrike at the time. &#x201C;It hooked into all those things you do as a backup check, that make you think &#x2018;I know what this is.&#x2019; And it poisoned them.&#x201D;<br>
<a href="https://www.wired.com/story/untold-story-2018-olympics-destroyer-cyberattack/">Andy Greenberg; The Untold Story of the 2018 Olympics Cyberattack, the Most Deceptive Hack in History</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>At first, a lot of eyes were on North Korea since there&apos;s some history between North and South Korea. But others look at Russia since they did have that doping ban... But then eyes turned to China as there was code used only by Chinese hackers. You couldn&apos;t be quite sure who was doing it. Russia was next to have the finger pointed at them when <a href="https://blog.talosintelligence.com/2018/02/olympic-destroyer.html">Cisco&apos;s Talos Group found a password-stealing tool</a> that looked like NotPetya and Bad Rabbit, but it wasn&apos;t the same as those tools, more a rewritten version of the code.</p><p>The wiper component of the malware had some of the same code that <a href="https://www.virusbulletin.com/virusbulletin/2018/10/vb2018-paper-who-wasnt-responsible-olympic-destroyer/">BAE Systems had found the Lazarus Group</a>, out of North Korea, had used for their wiper and it had the same method of wiping which is extremely distinct by deleting the first ox1000kb, or 4096kb of a file. Next <a href="https://web.archive.org/web/20180214084615/http://www.intezer.com/2018-winter-cyber-olympics-code-similarities-cyber-attacks-pyeongchang/">Intezer found</a> that part of the password-stealing code came from the Chinese group known as APT3 and Crowdsitrke connected parts of the code to XData malware used by Russian carding gangs.</p><p>Running out of idea&apos;s a Kaspersky researcher <a href="https://securelist.com/the-devils-in-the-rich-header/84348/">tried to look at the rich header</a> of the malware to see if any details on the authors could be grasped at and he found that it had the same header as Lazarus Group, but on further analysis, he also pointed out that this couldn&apos;t possibly be the case and that the header was forged to match Lazarus Group.</p><p>Next up, <a href="https://www.wired.com/story/untold-story-2018-olympics-destroyer-cyberattack/">a researcher at FireEye</a> had the novel idea that instead of looking at the malware itself, why not look at the delivery method for clues as to who the attacker was. In essence what he did was take the infected attachment, look at the characteristics it has and try and match it to other malicious documents FireEye had and noticed that the same method was used to attack multiple Ukrainian targets over the previous few months. But the real break was when he looked at the IP address that served up the malware and the domain name that hosted it, account-loginserve.com.</p><p>This domain was responsible for Russian hacking of the State Board&apos;s of Election in the 2016 US Presidential Election. But not only that, the US DoJ, in their indictment of <a href="https://www.justice.gov/opa/pr/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-and">GRU Unit 74455</a>, created a link between the operations of Russian Intelligence and the work of Sandworm.</p><p>In an interview on Darknet Diaries, <a href="https://darknetdiaries.com/episode/77/">Jack Rhysider and Andy Greenberg do a fantastic job of breaking down the whole hack</a> and it&apos;s a wild ride! And Andy&apos;s <a href="https://www.wired.com/story/untold-story-2018-olympics-destroyer-cyberattack/">reporting</a> and <a href="https://www.penguinrandomhouse.com/books/597684/sandworm-by-andy-greenberg/">book</a> is an invaluable source of information on anything related to Sandworm.</p><!--kg-card-begin: markdown--><h2 id="exploit">Exploit</h2>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><blockquote>
<p>To Exploit is to Collect against the adversary&#x2019;s Movement of Data. This increases the data available for friendly Situation Assessment and makes the generation of friendly Information more efficient.<br>
<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.); What is Information Warfare?</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>This definition troubles me. I am used to exploitation in cyber terms, but Information Warfare did not spawn from cyber, it came before cyber and comes from the murky world of intelligence. I have struggled to get my mind used to this concept as in some ways it makes absolute sense, but in others, the language used around it is so specific to militaries that it is nearly a different dialect. The first useful pseudo definition I found comes from a paper I found on the US military&apos;s Defence Technical Information Center;</p><!--kg-card-begin: markdown--><blockquote>
<p>Information technology is already tightly woven with our military operations, providing heretofore unimaginable amounts of information. Exploiting this information has provided us striking capabilities; relying on it inevitably creates potentially crippling vulnerabilities. This, coupled with advances in the ability -to both locate and destroy command and control (C2) nodes makes C2, more than ever, a lucrative target set. History has shown successful militaries can achieve striking success through paralyzing the enemy&apos;s ability to exercise command and control.<br>
<a href="https://apps.dtic.mil/sti/pdfs/ADA307436.pdf">Unknown US Air Force Author; Cornerstones of Information Warfare, pp 10</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>And the second I found comes from a supplemental document to <a href="https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_13.pdf">JP-3-13</a> from the US Air Force on Information Operations;</p><!--kg-card-begin: markdown--><blockquote>
<h4 id="predictivebattlespaceawareness">Predictive Battlespace Awareness</h4>
<p>Effective IO depends upon a successful PBA. As a maturing concept, PBA is &#x201C;knowledge of the operational environment that allows the commander and staff to correctly anticipate future conditions, assess changing conditions, establish priorities, and exploit emerging opportunities while mitigating the impact of unexpected adversary actions&quot; (Air Force Pamphlet 14-118).<br>
<a href="http://www.iwar.org.uk/iwar/resources/usaf/afdd2-5-2005.pdf">Unknown US Air Force Author; Information operations, pp 41</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>From this, I gather that &quot;<em>Exploitation</em>&quot; in Information Warfare terms, that in the intelligence decision loop of <a href="http://www.iwar.org.uk/iwar/resources/jiopc/io-textbook.pdf">Planning and Directing, Collection, Processing and Exploitation, Analysis and Production, Dissemination and Integration, and Evaluation and Feedback (pp 31-33)</a>, Exploitation is the processing of gathered data on an adversary to allow for analysis to find a weakness. In the conventional world of cyber, a decision loop such as the <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">Cyber Kill Chain</a>, Exploitation is the running of weaponised code on a victims device. While they use the same terminology, they have different meanings.</p><p>From the perspective of conventional cyber thinking, it is better to look at exploitation as a step in the Reconnaissance phase of the Cyber Kill Chain where it is more related to the research, identification and selection of targets from the processed return of data. If you think about it in terms of <code>nmap</code> returns, from the intelligence perspective, Processing and Exploitation is automated away in the background as data is collected and you are then presented with data that can immediately be analysed rather than looking at the raw returns of the scan.</p><!--kg-card-begin: markdown--><h4 id="largeelectronicsignatures">Large Electronic Signatures</h4>
<!--kg-card-end: markdown--><p>A great example of how data could be exploited in the field is to take advantage of the large electronic emissions of modern battle formations. The use of radio&apos;, GPS and other space and the growth of active and passive protection system on land vehicles use a range of infrared and radar emitters to detect and defeat incoming projectiles, all give off signatures that can be detected and used against you. While these systems have an effective range, the electronic emissions can travel much further beyond their usable or effective range.</p><p>A great example of this happened in 2020 when the commander of the US 11th Armored Cavalry Regiment, Colonel Scott Woodward, chimed in on a discussion on Twitter about the efficacy of modern visible camouflage methods. While he did have ideas about how to use such systems effectively, he shared a much more interesting piece of information about the electronic signature of forces during a training exercise;</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">These were taken at the National Training Center, in California.  Concealment will help you stay alive a little longer in the close fight.  <br><br>What does your EW footprint look like is the larger question.  If I can see you like this, it doesn&apos;t matter how much camo you have <a href="https://t.co/EihBe4nEG3">pic.twitter.com/EihBe4nEG3</a></p>&#x2014; LXVIII RCO (@theRealBH6) <a href="https://twitter.com/theRealBH6/status/1258556133037363200?ref_src=twsrc%5Etfw">May 8, 2020</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>The systems that did the Processing and Exploitation of data were able to create the above image which could be used by an analyst to determine the structure and size of a force and the best way to attack such a force. This the <em>information advantage</em> I mentioned previously that the US is looking for in its doctrine. You may not be able to see the forces with the good aul Mk. 1 Eyeball or night vision goggles, but you don&apos;t need to when you can see them in other ways. This could be through the use of infrared emissions or in this case the electronic signature of the forces.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">That&#x2019;s exactly what it is. BN with trains hiding behind MG at about 2300. Thought they were safe cause it was dark. Picked me up at about 12 K with EW</p>&#x2014; LXVIII RCO (@theRealBH6) <a href="https://twitter.com/theRealBH6/status/1258558040376094720?ref_src=twsrc%5Etfw">May 8, 2020</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>As Col Woodward went on to mention, this was a battalion strength force, of between 300 and 1000 troops spread over an area that is roughly 6 km2, judging from comparison with satellite imagery, and included the units support units which he referred to as &quot;<em>trains</em>&quot;. The opposing force he was fighting against was able to detect him at up to 12 km away from the electronic signatures his battalion emitted alone.</p><p>To give an example of the use of such information in combat, Russia for example has multiple systems currently in use that are capable of radio direction finding which can give a commander a bearing to a target or a range within which the target is based. If they have enough MASINT about the emitting source an analyst may also be able to gauge a distance to the target based on the signal strength. If an area can be narrowed down from doing this analysis on exploited information, a commander may be able to draw up a fire plan to be able to deal with their enemy without their enemy knowing they are seen and in danger until the first shots are fired or the first bombs drop.</p><!--kg-card-begin: markdown--><h2 id="deny">Deny</h2>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><blockquote>
<p>To Deny means to deny completely by a direct attack on the means of accomplishment. The use of a High Energy Laser to blind or destroy an electro-optic sensor is an example of denial by direct attack. Another example is a virus that destroys operating systems in a computer used to do Situation Assessment.<br>
<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf">Col. Andrew Borden, USAF (Ret.); What is Information Warfare?</a></p>
</blockquote>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h4 id="suppressionofenemyairdefensessead">Suppression of Enemy Air Defenses (SEAD)</h4>
<!--kg-card-end: markdown--><p>On the 20th of June 2019, the IRGC shot down an American RQ-4 Global Hawk drone that Iran contends violated Iranian airspace in the Strait of Hormuz. Iran used &#x633;&#x648;&#x645; &#x62E;&#x631;&#x62F;&#x627;&#x62F; or a 3rd Khordad, sometimes called a Sevom Khordad, air defence missile system.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="fa" dir="rtl">&#xAB;<a href="https://twitter.com/hashtag/%D9%BE%D9%87%D9%BE%D8%A7%D8%AF_%D8%A2%D9%85%D8%B1%DB%8C%DA%A9%D8%A7%DB%8C%DB%8C?src=hash&amp;ref_src=twsrc%5Etfw">#&#x67E;&#x647;&#x67E;&#x627;&#x62F;_&#x622;&#x645;&#x631;&#x6CC;&#x6A9;&#x627;&#x6CC;&#x6CC;</a> &#x62F;&#x631; &#x62F;&#x627;&#x645; &#x633;&#x627;&#x645;&#x627;&#x646;&#x647; &#x67E;&#x62F;&#x627;&#x641;&#x646;&#x62F;&#x6CC; &#x627;&#x6CC;&#x631;&#x627;&#x646;&#x6CC;&#x61B; &#x627;&#x648;&#x644;&#x6CC;&#x646; &#x634;&#x6A9;&#x627;&#x631; &#x62F;&#x631; &#x6A9;&#x627;&#x631;&#x646;&#x627;&#x645;&#x647; &quot;&#x633;&#x648;&#x645; &#x62E;&#x631;&#x62F;&#x627;&#x62F;&quot;&#xBB;  <br><br>&#x67E;&#x647;&#x67E;&#x627;&#x62F; &#x622;&#x645;&#x631;&#x6CC;&#x6A9;&#x627;&#x6CC;&#x6CC;RQ-&#x6F4; &#x62A;&#x648;&#x633;&#x637; &#x633;&#x627;&#x645;&#x627;&#x646;&#x647; &#x67E;&#x62F;&#x627;&#x641;&#x646;&#x62F;&#x6CC; &#x633;&#x648;&#x645; &#x62E;&#x631;&#x62F;&#x627;&#x62F; &#x633;&#x627;&#x642;&#x637; &#x634;&#x62F;&#x647; &#x627;&#x633;&#x62A;&#x61B;&#x633;&#x627;&#x645;&#x627;&#x646;&#x647; &#x67E;&#x62F;&#x627;&#x641;&#x646;&#x62F;&#x6CC; &#x633;&#x648;&#x645; &#x62E;&#x631;&#x62F;&#x627;&#x62F; &#x6CC;&#x6A9; &#x633;&#x627;&#x645;&#x627;&#x646;&#x647; &#x67E;&#x62F;&#x627;&#x641;&#x646;&#x62F;&#x6CC; &#x6A9;&#x627;&#x645;&#x644;&#x627; &#x628;&#x648;&#x645;&#x6CC; &#x627;&#x633;&#x62A; &#x6A9;&#x647; &#x628;&#x647; &#x62F;&#x633;&#x62A; &#x645;&#x62A;&#x62E;&#x635;&#x635;&#x627;&#x646; &#x635;&#x646;&#x627;&#x6CC;&#x639; &#x62F;&#x641;&#x627;&#x639;&#x6CC; &#x6A9;&#x634;&#x648;&#x631; &#x637;&#x631;&#x627;&#x62D;&#x6CC; &#x634;&#x62F;&#x647; &#x627;&#x633;&#x62A; <a href="https://t.co/wOY25bsiPB">https://t.co/wOY25bsiPB</a> <a href="https://t.co/vMuSoR4U2z">pic.twitter.com/vMuSoR4U2z</a></p>&#x2014; &#x62E;&#x628;&#x631;&#x6AF;&#x632;&#x627;&#x631;&#x6CC; &#x62A;&#x633;&#x646;&#x6CC;&#x645; &#x1F1EE;&#x1F1F7; (@Tasnimnews_Fa) <a href="https://twitter.com/Tasnimnews_Fa/status/1141626897383743489?ref_src=twsrc%5Etfw">June 20, 2019</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>In response to this, POTUS ordered a mix of kinetic and non-kinetic fires against these systems, <a href="https://news.yahoo.com/us-launched-cyber-attacks-iran-drone-shootdown-reports-232123877.html">but called off the kinetic ones</a>, to keep things <a href="https://www.nytimes.com/2019/06/22/us/politics/us-iran-cyber-attacks.html">below the threshold of armed attack</a>. The <a href="https://www.nytimes.com/2019/06/22/us/politics/us-iran-cyber-attacks.html">New York Times reported</a> that multiple systems were targeted, they mention an additional attack;</p><!--kg-card-begin: markdown--><blockquote>
<p>An additional breach, according to one person briefed on the operations, targeted other computer systems that control Iranian missile launches.<br>
<a href="https://www.nytimes.com/2019/06/22/us/politics/us-iran-cyber-attacks.html">Julian E. Barnes and Thomas Gibbons-Neff; U.S. Carried Out Cyberattacks on Iran</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>It would appear that <a href="https://sg.news.yahoo.com/2019-06-22-us-cyberattack-reportedly-knocked-out-iran-missile-control-syste.html">US Cyber Command carried out this attack and it was their first since they became a full combat command</a>. Given that they were able to attack what appears to be the command and control computers of a battery, this is effectively the suppression of enemy air defences and done in a way that doesn&apos;t put Wild Weasel crews or aircraft at risk. It is unclear if the attack was against a single battery, multiple independent batteries or against a battalion of batteries though, which could have wide-ranging consequences if the battalion command and control vehicle&apos;s systems were targeted;</p><!--kg-card-begin: markdown--><blockquote>
<p>The C2 unit provides communication between Sevom Khordad batteries. Furthermore, the C2 unit can connect other air defense systems of the Raad family, including Raad and Tabas, into a single air defense network. This allows to cover large area and targets can be engaged with a wide range of missiles from the cheapest Taer-1 missiles to the most capable Taer-2s. This adds the capability of facing different types of threats with different types of interceptors. In case of heavy jamming when even the X-band engagement radar can&#x2019;t handle its duty, the C2 unit can provide an additional data link, connecting the system to electro-optical engagement systems of Raad batteries, in order to guide missiles toward targets.<br>
<a href="http://www.military-today.com/missiles/sevom_khordad.htm">Ehsan Ostadrahimi; Sevom Khordad - Medium-range air defense missile system</a></p>
</blockquote>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h4 id="nitrozeus">NITROZEUS</h4>
<!--kg-card-end: markdown--><p>NITROZEUS is a strategic cyber attack planned by the US in the event that Stuxnet failed, or that the <a href="https://www.armscontrol.org/factsheets/JCPOA-at-a-glance">Joint Comprehensive Plan of Action</a> failed to be agreed and Israel decided that they were going to war with Iran. It was uncovered by documentarian Alex Gibney as part of the research for his documentary film about Stuxnet, <em>Zero Days</em> with subsequent reporting coming in not long after from <a href="http://uk.businessinsider.com/nitro-zeus-iran-infrastructure-2016-7">Business Insider</a> and the <a href="https://www.nytimes.com/2016/02/17/world/middleeast/us-had-cyberattack-planned-if-iran-nuclear-negotiations-failed.html">New York Times</a>. Little is known about NITROZEUS beyond what these sources have reported.</p><p>What is known is that the program did exist, it existed to give the POTUS options short of war, that it was designed to use Information Warfare techniques to target the air defences, as was demonstrated by Sevom Khordad attack above, possibly to give the US and Israel air control over Iran, but also to go a step further and target many civilian systems most of which could be considered legitimate targets in the event of war;</p><!--kg-card-begin: markdown--><blockquote>
<p>I mean you&apos;ve been focusing on Stuxnet. That was only a smaller part of a much larger Iranian mission. NITROZEUS. NZ. We spent hundreds of millions, maybe billions on it. In the event that the Israeli&apos;s did attack Iran, we assumed we would be drawn into the conflict.<br>
We built in attacks on Iran&apos;s command and control system so that the Iranian&apos;s couldn&apos;t tralk to each other in a fight. We infiltrated their IADS (Integrated Air Defense System), military air defence systems, so they couldn&apos;t shoot down our planes if we flew over.<br>
We also went after their civilian support systems. Power grids, transportation, communications, financial systems. We were inside, waiting, watching, ready to disrupt, degrade and destroy those systems with cyber attacks. In comparision, Stuxnet was a back alley operation. NZ was the plan for a full scale Cyber War, with no attribution.<br>
<a href="http://www.zerodaysfilm.com/">Testimony of several NSA and CIA members who worked on NITROZEUS; Zero Days documentary @ 01:45:20</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>While in any event this would have been an amazing success, strictly in military terms, and mimicked many of the idea&apos;s in Operation Desert Storms&apos; air campaign, it would have been a modernised version of it, updated for the 21st century, using only cyber rather than stealth aircraft and electronic warfare. Though the impacts of these actions were not lost on the people who developed NITROZEUS and some of them were not happy about the possible humanitarian impacts of the use of Information Warfare on such a huge scale;</p><!--kg-card-begin: markdown--><blockquote>
<p>Everyone I know is basically thrilled with the Iran deal. Sanctions and diplomacy worked. But behind that deal is a lot of confidence in our cyber capability. We were everywhere inside Iran, still are. I&apos;m not going to tell you the operational details of what we can do going forward or where. But the science fiction cyber war scenario is here. That&apos;s NITROZEUS.<br>
But my concern, and the reason that I&apos;m talking, is that when you shut down a contries power grid, it doesn&apos;t just pop back up, it&apos;s more like humpty dumpty. If all the kings men can&apos;t turn the lights back on, or filter the water for weeks, then lots of people die. And something we can do to other, they can do to us too.<br>
Is that something we should keep quiet? Or should we talk about it?<br>
<a href="http://www.zerodaysfilm.com/">Testimony of several NSA and CIA members who worked on NITROZEUS; Zero Days documentary @ 01:49:50</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>This is probably the scenario most people think about when they think about &quot;<em>Cyber War</em>&quot; and it maybe best describes why Information Warfare and Cyber Warfare should be better-discussed topics in the light of day, rather than the shadows they reside in now. It presents strategic and possibly existential threats to states. Though I think this is better left to a case study I have an idea for later.</p><!--kg-card-begin: markdown--><h1 id="thecyberphysicalimpact">The Cyber-Physical Impact</h1>
<!--kg-card-end: markdown--><p>The thing to understand about Information Warfare is that an idea like hacking or the concept of Cyber where you limit one&apos;s thinking to digital systems, rather than the broader spectrum of systems that computers interact with such as Operational Technology systems like valves, motors, solenoids etc, or the RF Spectrum. Computers control and interact with systems that do much more than the computer itself as Bruce Schneier once pointed out;</p><!--kg-card-begin: markdown--><blockquote>
<p>As the chairman pointed out, there are now computers in everything. But I want to suggest another way of thinking about it in that everything is now a computer: This is not a phone. It&#x2019;s a computer that makes phone calls. A refrigerator is a computer that keeps things cold. ATM machine is a computer with money inside. Your car is not a mechanical device with a computer. It&#x2019;s a computer with four wheels and an engine&#x2026;<br>
<a href="https://docs.house.gov/meetings/IF/IF17/20161116/105418/HHRG-114-IF17-Transcript-20161116.pdf">Part of Bruce Schneier&apos;s tetimony to the House of Representatives, Subcommittee on Communications and Technology, Joint with Subcommittee on Commerce, Manufacturing, and Trade, Committee on Energy and Commerce; Understanding the Role of Connected Devices in Recent Cyber Attacks, pp 27</a></p>
</blockquote>
<!--kg-card-end: markdown--><p>In every aspect that I can conceive, or that has occurred previously, an Information Warfare technique has involved the meshing of some form of manipulating the inputs and outputs of a computer to achieve an objective. This could be the returns of a radar, the varying levels of Chlorine used to make clean drinking water or listening to RF outputs of systems to locate them in a physical place. This is where, at least in part, the future of combat lies, because when everything became computers, so computers became everything.</p><p>From the military perspective, this means that Information Warfare is a series of tactics, techniques and procedures that a commander can utilise in combat as either a form of fire to gain fire superiority, or as a toolkit for intelligence collection and processing to gain an Information Advantage over an adversary and use this advantage to make quicker and better decisions. Regardless of the way it is used, its targets will be information systems attacked so they can be used as force multipliers to accomplish missions. </p><p>The missions can vary from attacks on information systems like that of Stuxnet, malware that just attacked information systems to damage or destroy centrifuges at the <a href="https://www.nti.org/learn/facilities/170/">Natanz Enrichment Complex</a> in Iran, or it can be as I discussed earlier in this piece, attacks using planes doing bombing runs and strafing on fiber optic cable installations to prevent coordinated air defences over a country. </p><!--kg-card-begin: markdown--><hr>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="acknowledgments">Acknowledgments</h3>
<!--kg-card-end: markdown--><p>Cheers to <a href="https://twitter.com/madwonk">Ben</a>, the editor <strong>&#x1F602;</strong>, Jack, Sam and Tangui for their help on understanding Soviet artillery doctrine better, Jack again for his just generally amazing knowledge of military operations, <a href="https://twitter.com/tylerni7">Tyler</a>, Dakota and Toby for helping me better understand the intelligence cycle and <a href="https://twitter.com/zachaysan">Zach</a> for providing some sources I couldn&apos;t find elsewhere and finally to Zach again and <a href="https://twitter.com/tinfoil_globe">Tinfoil</a> for being great people to bounce ideas off of and help me better develop some of these ideas. A special thanks to Andrew, Toby and Issi for help in seeing though the fog of Dyslexia. And finally, a thanks to the many, many more <a href="https://twitter.com/ACWPodcast">Wonks</a> for the discussions on the various cyber and information warfare aspects.</p>]]></content:encoded></item><item><title><![CDATA[Getting Around Ubiquiti's Desire for you to use a Ubiquiti Account]]></title><description><![CDATA[<p>A while ago, the Raspberry Pi 2B that I have at my dad&apos;s to keep the WiFi up and running died and this went unnoticed until the power went off one day and when the power came back up, the internet was patchy, the speed could be all</p>]]></description><link>https://blog.cyberwarfa.re/ui-bypass/</link><guid isPermaLink="false">60845ca5a1ddcd534308723c</guid><category><![CDATA[Information Security]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Sat, 24 Apr 2021 21:03:46 GMT</pubDate><content:encoded><![CDATA[<p>A while ago, the Raspberry Pi 2B that I have at my dad&apos;s to keep the WiFi up and running died and this went unnoticed until the power went off one day and when the power came back up, the internet was patchy, the speed could be all over the place and moving between the two access points sometimes didn&apos;t work... My dad asked me to come and have a look at things and I noticed that the Pi was off, not turning on...</p><p>Now, as you can probably guess from the title, I&apos;m using Ubiquiti gear... Specifically two <a href="https://www.ui.com/unifi/unifi-ap-ac-lite/">UniFi AP AC Lite&apos;s</a>. I have also been following Brian Kreb&apos;s reporting on them asking you <a href="https://krebsonsecurity.com/2021/01/ubiquiti-change-your-password-enable-2fa/">to update your password and enable 2FA</a>, then that <a href="https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/">a whistleblower was saying the breach was MUCH worse than Ubiquiti wanted people to know</a>, and finally <a href="https://krebsonsecurity.com/2021/04/ubiquiti-all-but-confirms-breach-response-iniquity/">their confirmation that this was the case</a>... A quick google will show you guides like <a href="https://pimylifeup.com/rasberry-pi-unifi/">this</a>, that will tell you how to install the Network Controller software on an RPi BUT they get you to sign in with your Ui Account... Something I&apos;m less than jazzed at with the current situation... </p><!--kg-card-begin: markdown--><h3 id="prepping-the-pi-installing-the-network-controller-software">Prepping the Pi &amp; Installing the Network Controller Software</h3>
<!--kg-card-end: markdown--><p>Get your Pi, install the OS you want on the MicroSD card, drop a file into <code>/Volumes/boot</code> called <code>ssh</code>, nothing more, not even a file extension, do your first boot, get the IP Address of the Pi and SSH into the device. </p><p>If you want to know why the following steps are essential, <a href="https://pimylifeup.com/rasberry-pi-unifi/">you can read the guide that Pi My Life Up did on this</a>. This process is mostly similar to theirs with less explanation. </p><!--kg-card-begin: markdown--><pre><code class="language-console"># install the prerequisites
pi@ubnt:~$ sudo apt update &amp;&amp; sudo apt upgrade -y
pi@ubnt:~$ sudo apt install openjdk-8-jre-headless rng-tools
pi@ubnt:~$ sudo echo &quot;HRNGDEVICE=/dev/hwrng&quot; &gt;&gt; /etc/default/rng-tools
pi@ubnt:~$ sudo systemctl restart rng-tools

# add and install the unifi software
pi@ubnt:~$ echo &apos;deb https://www.ui.com/downloads/unifi/debian stable ubiquiti&apos; | sudo tee /etc/apt/sources.list.d/100-ubnt-unifi.list
pi@ubnt:~$ sudo wget -O /etc/apt/trusted.gpg.d/unifi-repo.gpg https://dl.ui.com/unifi/unifi-repo.gpg
pi@ubnt:~$ sudo apt update
pi@ubnt:~$ sudo apt install unifi
</code></pre>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="configure-the-network-controller-software">Configure the Network Controller Software</h3>
<!--kg-card-end: markdown--><p>With your browser, go to <code>https://[IP]:8443</code> and name the Controller and agree to the terms and conditions. When you hit Next, you&apos;ll be taken to the screen that asks you to login to your UI account, but you&apos;ll notice that there is a link to &quot;Switch to Advanced Setup&quot;</p><figure class="kg-card kg-image-card"><img src="https://blog.cyberwarfa.re/content/images/2021/04/ubnt1.jpg" class="kg-image" alt loading="lazy" width="1278" height="659" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/04/ubnt1.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/04/ubnt1.jpg 1000w, https://blog.cyberwarfa.re/content/images/2021/04/ubnt1.jpg 1278w" sizes="(min-width: 720px) 720px"></figure><p>When you click this, it will take you to a menu where you can choose to not remotely manage your devices and to turn off using the Ui account</p><figure class="kg-card kg-image-card"><img src="https://blog.cyberwarfa.re/content/images/2021/04/ubnt2.jpg" class="kg-image" alt loading="lazy" width="1279" height="655" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/04/ubnt2.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/04/ubnt2.jpg 1000w, https://blog.cyberwarfa.re/content/images/2021/04/ubnt2.jpg 1279w" sizes="(min-width: 720px) 720px"></figure><p>Once you say that yes you want to use a local account and that yes things will be fine and that no the world won&apos;t explode, you can create a local account</p><figure class="kg-card kg-image-card"><img src="https://blog.cyberwarfa.re/content/images/2021/04/ubnt3.jpg" class="kg-image" alt loading="lazy" width="1276" height="660" srcset="https://blog.cyberwarfa.re/content/images/size/w600/2021/04/ubnt3.jpg 600w, https://blog.cyberwarfa.re/content/images/size/w1000/2021/04/ubnt3.jpg 1000w, https://blog.cyberwarfa.re/content/images/2021/04/ubnt3.jpg 1276w" sizes="(min-width: 720px) 720px"></figure><p>Proceed with the installation until finally you&apos;re at the dashboard and ready to reset AP&apos;s to factory default or install new AP&apos;s so that you can pair them with the controller and configure the AP&apos;s as you choose to do.</p><!--kg-card-begin: markdown--><h4 id="just-for-ubiquiti">Just for Ubiquiti</h4>
<!--kg-card-end: markdown--><p>If by chance Ubiquiti people do manage to stumble upon this, please don&apos;t remove this feature from the Linux controller software! You make incredible gear and now that I know I can continue to run your incredible hardware on my own terms, I want to buy even more of it! I have my eyes on a Dream Machine Pro, a 24 port POE switch, &#xA0;a redundant power supply for both of them and some WiFi6 AP&apos;s. Being able to have control over these sorts of things without anyone from the outside makes me love and treasure IoT things, so much so that the doorbell and camera&apos;s look like a sound investment to someone who thinks that <a href="https://twitter.com/internetofshit">Internet of Shit</a> &#xA0;is one of the best accounts on twitter! I do not need a landline but I legit kinda want a phone too! Please leave this stuff in for those of us that choose to use it and not be beholden to need an account for this amazing gear to be functional. </p>]]></content:encoded></item><item><title><![CDATA[Punggye-ri Yield Calculator]]></title><description><![CDATA[<p>When North Korea next tests the Disco Ball of Death or the Peanut, you can use the <a href="https://earthquake.usgs.gov/earthquakes/map">USGS Earthquake Map</a>, or other data source to get a rough estimate on how large a yield North Korea got from the test.</p><!--kg-card-begin: markdown--><h3 id="the-zhang-and-wen-calibrated-method"><a href="https://agupubs.onlinelibrary.wiley.com/doi/full/10.1002/grl.50607">The Zhang and Wen Calibrated Method</a></h3>
<!--kg-card-end: markdown--><p>m is the Lg</p>]]></description><link>https://blog.cyberwarfa.re/punggye-ri-yield-calc/</link><guid isPermaLink="false">62542cf2f85c9ea22a7b7cdb</guid><category><![CDATA[OSINT]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Sat, 13 Feb 2021 13:30:00 GMT</pubDate><content:encoded><![CDATA[<p>When North Korea next tests the Disco Ball of Death or the Peanut, you can use the <a href="https://earthquake.usgs.gov/earthquakes/map">USGS Earthquake Map</a>, or other data source to get a rough estimate on how large a yield North Korea got from the test.</p><!--kg-card-begin: markdown--><h3 id="the-zhang-and-wen-calibrated-method"><a href="https://agupubs.onlinelibrary.wiley.com/doi/full/10.1002/grl.50607">The Zhang and Wen Calibrated Method</a></h3>
<!--kg-card-end: markdown--><p>m is the Lg wave magnitude of the seismic event<br>h is the depth of burial at which the test occurred<br>Y is the yield in kilotons </p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://www.wolframalpha.com/input?i=solve+m%2B%280.7875+log_10%28h%29%29-5.887+%3D+%281.0125+log_10%28Y%29%29+where+m+%3D+6.1+and+h+%3D+430"><div class="kg-bookmark-content"><div class="kg-bookmark-title">solve m+(0.7875 log_10(h))-5.887 = (1.0125 log_10(Y)) where m = 6.1 and h = 430 - Wolfram|Alpha</div><div class="kg-bookmark-description">Wolfram|Alpha brings expert-level knowledge and capabilities to the broadest possible range of people&#x2014;spanning all professions and education levels.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://www.wolframalpha.com/_next/static/images/favicon_1zbE9hjk.ico"><span class="kg-bookmark-author">Wolfram|Alpha</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://www.wolframalpha.com/_next/static/images/share_3eSzXbxb.png"></div></a></figure><p>Be aware that while Wolfram Alpha will give you a precise answer, the answer is pseudo precise. In actuality, it has a &#xB1; 30% error bar, so a 100 kiloton yield could be as low as 70 kt or as high as 130 kt or somewhere in between. To date, I have been unable to get the <a href="https://reference.wolfram.com/language/ref/PlusMinus.html">PlusMinus</a> operator to work with a percentage. I think this is because Wolfram Alpha interprets the input as an integer or float etc and percentages are operators, so when the calc is done, WA does its best to interpret what it was given.</p><!--kg-card-begin: markdown--><h2 id="other-methods">Other Methods</h2>
<!--kg-card-end: markdown--><p>I would also note that there are other methods, for example, <a href="https://www.linkedin.com/pulse/credibility-h-bomb-claim-can-assessed-using-simple-james-kiessling/">f<a href="https://www.linkedin.com/pulse/credibility-h-bomb-claim-can-assessed-using-simple-james-kiessling/">ellow Wonk Jim Kiessling has his own scaling method on his LinkedIn</a></a> and it&apos;s about as accurate as Zhang and Wen&apos;s, without the need for a PhD in geology. And <a href="http://calc.wonkpedia.org/yield/">Ben Muller at CNS is working on an amazing calculator</a> that is much more applicable to nuclear tests from a much wider selection of sites in a number of other countries such as Russia and India</p><p><strong>Update 12/04/22</strong><br>Thanks to Aminal for adding variables to the calculation and Nathan for helping me update the description of what the calc does</p>]]></content:encoded></item><item><title><![CDATA[Let's Talk About Irelands Cyber Security Strategy]]></title><description><![CDATA[<p>Over Christmas, <a href="https://www.dccae.gov.ie/documents/National_Cyber_Security_Strategy.pdf">Ireland released it&apos;s National Cyber Security Strategy for implementation between 2019-2024</a>. Considering that this was released, I believe on the 27th of December 2019, we&apos;re already a year behind which is a fantastic start... But let&apos;s dig into the detail of it</p>]]></description><link>https://blog.cyberwarfa.re/irish-cyber-strategy/</link><guid isPermaLink="false">60834946a1ddcd53430870c9</guid><category><![CDATA[Ireland]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Mon, 03 Feb 2020 21:35:55 GMT</pubDate><content:encoded><![CDATA[<p>Over Christmas, <a href="https://www.dccae.gov.ie/documents/National_Cyber_Security_Strategy.pdf">Ireland released it&apos;s National Cyber Security Strategy for implementation between 2019-2024</a>. Considering that this was released, I believe on the 27th of December 2019, we&apos;re already a year behind which is a fantastic start... But let&apos;s dig into the detail of it and see where we stand going forward on the issue.</p><p>And I can&apos;t stress this enough. I do not want this to be seen as a hit piece against anyone at the NCSC, NSAC, An Garda S&#xED;och&#xE1;na, the Irish Defence Forces or anyone else in the national security apparatus of Ireland. I have met several of them over the past few years and while they are passionate and deeply care about the mission of protecting Ireland from cyber threats it is not their fault that they collectively work hard on information security issues and are plagued by issues like being under paid compared to others in the private sector and international colleagues and under resourced and having to deal with successive governments who have had no vision or care for information security and it&apos;s importance in the modern era.</p><p>This is a long post, so if you want the gist of my thoughts and you want to skip the detail, the final section has a summation of my thoughts and some form of a conclusion.</p><!--kg-card-begin: markdown--><h1 id="2vision">2: Vision</h1>
<!--kg-card-end: markdown--><p>The vision of the document is pretty standard. It is based around <em>Protect, Develop and Engage</em> which you will see in other cyber security strategy documents. The protection aspect is based around protecting the State, the people of Ireland and the critical infrastructure of the State. It&apos;s pretty standard aspirational language to say this is where we would love to be in 2024 in an aspirational document. Not much more to add.</p><p>Personally I would love to see how we plan to find a balance of risks and costs because historically, the Irish Government has chosen to choose the cheap option that does not account for risks.</p><p>I would also love to know more details about developing the capacity of the state in the 5th Domain because everyone that I have talked to about this, be they cyber security students, lecturers, industry professionals or friends elsewhere think working for for the government on information security matters is insanity when I could be working elsewhere doing my best work and getting better paid for my work too. How do you plan to develop the capacity when only those who see the mission of protecting the state as more important than pay when people who would look at the world that way are few and far between?</p><p>Finally to engage others nationally and internationally on a free and open cyberspace. This is a goal I&apos;m 100% behind because alone, we will not be able to solve all the issues we face. Working internationally will also allow us to develop key skills and finally, another goal is to integrate cyber into our diplomacy where we have secure missions to other nations that have the capacity to help other nations develop some of the capabilities that we have.</p><!--kg-card-begin: markdown--><h1 id="3objectives">3: Objectives</h1>
<ul>
<li>
<p>To continue to improve the ability of the State to respond to and manage cyber<br>
security incidents, including those with a national security component</p>
</li>
<li>
<p>To identify and protect critical national infrastructure by increasing its resilience to cyber attack and by ensuring that operators of essential services have appropriate incident response plans in place to reduce and manage any disruption to services</p>
</li>
<li>
<p>To improve the resilience and security of public sector IT systems to better protect data and the services that our people rely upon</p>
</li>
<li>
<p>To invest in educational initiatives to prepare the workforce for advanced IT and cybersecurity careers</p>
</li>
<li>
<p>To raise awareness of the responsibilities of businesses around securing their<br>
networks, devices and information and to drive research and development in cyber<br>
security in Ireland, including by facilitating investment in new technology</p>
</li>
<li>
<p>To continue to engage with international partners and international organisations to ensure that cyber space remains open, secure, unitary, free and able to facilitate economic and social development</p>
</li>
<li>
<p>To increase the general level of skills and awareness among private individuals<br>
around basic cyber hygiene practices and to support them in this by means of<br>
information and training</p>
</li>
</ul>
<!--kg-card-end: markdown--><p>As goals in an aspirational document, these are fine. Personally, the key to this is the educational component. The pipeline of students doing cyber security is incredibly narrow, in part because of a small number of lecturers to teach the courses and in part because until very recently, ITB, now TU Dublin was the only place to get a solid education cyber. You could have a single module on it from various different colleges and universities, but you skimmed a huge area in a semester or went places like Trinity and Letterkenny which have societies to fill the gap that they both see in their education. And when <a href="https://zerodays.ie/">Zero Days CTF</a> comes around every year, the vast vast, vast majority of people taking part in the competition are current and former students from TU Dublin @ Blanchardstown, Trinity College Dublin and Letterkenny IT which is no coincidence.</p><p>Staying on education, educating all sectors of the economy of issues that they face will also be key. I don&apos;t know how best to accomplish this, but we have an economy where the vast number of people employed are employed in small and medium enterprise and these companies in the modern era are built on data. If anything were to happen to the database that stored this business critical information like a ransomware attack, it could shut down companies and that&apos;s no hyperbole. <a href="https://www.zdnet.com/article/company-shuts-down-because-of-ransomware-leaves-300-without-jobs-just-before-holidays/">It&apos;s already happened</a>. And not just that, if you follow ransomware, it&apos;s happening, all day, every day, everywhere and we&apos;re potentially one catastrophic zeroday away from having sectors or industries come to a halt. And there are very few companies that can handle something like, I believe historically it&apos;s been <a href="https://darknetdiaries.com/episode/30/">Saudi Aramco</a>, <a href="https://www.cyberscoop.com/notpetya-ransomware-cost-merck-310-million/">Merck</a>, <a href="https://www.forbes.com/sites/leemathews/2017/08/16/notpetya-ransomware-attack-cost-shipping-giant-maersk-over-200-million/">Maersk Line</a> and the <a href="https://www.telegraph.co.uk/technology/2018/10/11/wannacry-cyber-attack-cost-nhs-92m-19000-appointments-cancelled/">NHS</a> that have weather such a storm and done so not only because they had the know how to deal with such an issue and were somewhat prepared, but also because they had the cash reserves on hand required to deal with such attacks.</p><p>Education will also be key to dealing with the issues the general public faces from general cyber crime threats as in my personal experience, across nearly all age ranges there is very little conception of the threats they face, and arguably worse, what to do about such threats. And as someone who has tried to educate those who are not familiar with cyber security, the biggest problem I have personally found and I think it will be a major headache is going to be giving actionable information to people so that they can proactively raise their defence posture. &#xA0;It&apos;s all well and good telling a 60 year old to use a password manager, but it&apos;s one thing to tell someone to use it and to explain why they need to use it and how they should use it as simply as possible. </p><p>And this actionable information, what ever it is, is going to create narrow, technical, sniping arguments in the community because this is how we have operated as a discipline for the longest time which means that even if it works for the threat model, people may ignore the advice as noise rather than signal. But as professionals, we also need to be aware of the threat model that others are using and not apply it to ourselves and we need to stay abreast of the latest information and how that applies to threat models as advice like not writing down passwords is garbage advice in the modern era. </p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2020/02/slide_sample.PNG" class="kg-image" alt loading="lazy"><figcaption>Google&apos;s account security czar on writing down your passwords form a slide I have on the basics Privacy and Security.&#xA0;</figcaption></figure><p>Finally on education, we also need to start adequately funding third level. It&apos;s good that we are putting computer science into second level, but there is a shortfall in spending on third level that some say <a href="https://www.independent.ie/business/budget/budget-2019-10-things-to-know-about-education-measures-amid-warning-of-growing-third-level-crisis-37400570.html">is approaching crisis levels</a> and since our economy is built on knowledge, this in general is not something that we can allow to happen.</p><p>With a start on the education, and a wider pipeline of people coming into the industry, then we can start to look at other goals we have in mind. The major issue is that there will be a lag time that we cannot afford between now and education coming online. The only solution to this is to attract the talent needed from the private sector and the bottom line, like it or not, is that there is a huge pay gap between what the private sector can afford and what the government will pay you. When I graduate at the end of this semester, my starting wage as a graduate in cyber security roles exceeds what a public sector wage would be by a significant margin. While it is a pay cut I would be willing to make in the national interest, I am in a very small minority.</p><!--kg-card-begin: markdown--><h1 id="41strategicrisks">4.1: Strategic Risks</h1>
<!--kg-card-end: markdown--><p>While I have been quite critical up to now, this is where for a brief moment things look up. There is actually an element of strategy here. The government is aware that Great Power Politics is back in vogue again and that this creates certain threats and risks at a global geopolitical level and it has an impact on international relations and international security. Specifically the threats to Ireland are on trade and the impact of influence over technology vendors which for Ireland, which has a small, open vulnerable with a lot of multinational technology vendors, we are vulnerable to a change in trade or technology winds. </p><p>All of these technology vendors in Ireland host a large proportion of European Citizens data and the infrastructure required to host all of this data. This data we host means that we will have to secure some of the most important critical infrastructure in Europe and be aware that are critical to the functioning of our economy.</p><p>Ireland is also aware and makes it extremely clear that;</p><blockquote>Recent years have seen the development and regular use of very <strong>advanced tools for cyber enabled attacks</strong> and espionage, and, <strong>likely for the first time, the physical destruction of Critical National Infrastructure by cyber enabled means</strong>. As such, the field of cyber security is <strong>characterised by an ongoing and high stakes technological arms race</strong>, ...</blockquote><p>We are aware that other nations are flexing their cyber muscles with cyber tools like the Great Cannon, Stuxnet, Flame, BlackEnergy and Triton and that this is part of an ongoing arms race between the actors that are leading the charge of great power politics and also that these tools generally go after critical infrastructure. Though curiously, while we call it an arms race, and we mention no tools, we do not call them arms or weapons when reasonably under some definitions, you could. </p><p>What is unfortunate is that while we are aware of the great power politics and the ongoing arms race;</p><blockquote>... that any single State can only exercise a degree of control over the operation of the network in its territory</blockquote><p>While this is indeed true, this misses a critical point in that while in an open, liberal nation like Ireland, it is difficult to dictate how private industry should do procurement of their infrastructure, but this does not mean that the role the government can play in advising the the private sector in what infrastructure they buy or even use the sovereign powers of a government to prevent the purchase of infrastructure or level the market playfield if it is uneven or if it does endanger national security;</p><!--kg-card-begin: html--><blockquote class="twitter-tweet"><p lang="en" dir="ltr">&#x201C;We&apos;re committed to Huawei, they have been a good supplier&#x201D;<br><br>Yes, because the Chinese government are subsidizing your cheap business model via them and the trade off is you let their shitty product spy on your customers. <a href="https://t.co/DD6QtuyAyw">https://t.co/DD6QtuyAyw</a></p>&#x2014; Defence Ireland (@DefenceIreland) <a href="https://twitter.com/DefenceIreland/status/1223145302242340865?ref_src=twsrc%5Etfw">January 31, 2020</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">So the Chinese government subsidize them, and they subsidize <a href="https://twitter.com/eir?ref_src=twsrc%5Etfw">@eir</a> who then put their shitty product in their network so they can compromise their customers. Customers like the Guards. <a href="https://t.co/W1sMmQszEj">pic.twitter.com/W1sMmQszEj</a></p>&#x2014; Defence Ireland (@DefenceIreland) <a href="https://twitter.com/DefenceIreland/status/1223147747009843200?ref_src=twsrc%5Etfw">January 31, 2020</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">What&#x2019;s worse is that the <a href="https://twitter.com/eir?ref_src=twsrc%5Etfw">@eir</a> CEO <a href="https://twitter.com/carolan_lennon?ref_src=twsrc%5Etfw">@carolan_lennon</a> is going around citing that they have the Garda mobile contract when asked about Huawei security concerns by <a href="https://twitter.com/adrianweckler?ref_src=twsrc%5Etfw">@adrianweckler</a> as if its an endorsement. How long have they got the contract and was it before Huawei concerns arose?</p>&#x2014; Defence Ireland (@DefenceIreland) <a href="https://twitter.com/DefenceIreland/status/1223148807573078021?ref_src=twsrc%5Etfw">January 31, 2020</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p></p><p>It does not mean the government has a fig leaf for allowing the stupidity that is the body charged with protecting the national security of Ireland, from using subsidized, cheap Chinese network equipment on the Eir network. An issue so grave in the UK that <a href="https://www.gov.uk/government/news/new-plans-to-safeguard-countrys-telecoms-network-and-pave-way-for-fast-reliable-and-secure-connectivity">Huawei&apos;s equipment placement in the network is extremely restricted</a> and <a href="https://www.whitehouse.gov/presidential-actions/executive-order-securing-information-communications-technology-services-supply-chain/">are effectively banned on networks in the United States</a>, both for national security concerns related to what they know about Huawei. While you can argue about how much risk the UK is taking onboard vs the US approach, at least the UK had a discussion on the pros and cons on settled on an approach for good or ill. We didn&apos;t and we just let it happen and that has really mortgaged our future national security for a cheaper present installation of infrastructure, didn&apos;t discuss the risks and adopted it, no questions asked into the body charged with protecting our national security. That is a travesty that we cannot let continue if we are to take our national security seriously. </p><p>In some cliff notes, the government is aware of the issues that IoT devices could cause to security on a broad scale. That the government is not willing to pursue <em>an intrusive system of monitoring</em>, that there is a general issue around the openness of publicizing cyber attacks, even to the government and finally, the Government has set up the National Security Analysis Centre (NSAC) to assess technology in national security area&apos;so that the government can receive good advice on the strategic threats we face as a nation.</p><!--kg-card-begin: markdown--><h1 id="42hybridthreats">4.2: Hybrid Threats</h1>
<!--kg-card-end: markdown--><p>Hybrid Threats are; </p><blockquote>... multidimensional, combining coercive and subversive measures, using both conventional and unconventional tools and tactics (diplomatic, military, economic, and technological) to destabilise the adversary.</blockquote><p>In simpler terms, they are disinformation campaigns aimed at destabilizing and in general are difficult to counter by their nature. While they can use various techniques, the most common is the hack and dump method that Russia used extensively during the US Presidential Election of 2016. &#xA0;The EU is much closer to Russia than the US and <a href="https://www.nytimes.com/2007/05/29/technology/29estonia.html">countries like Estonia have been dealing with such <em>hybrid war</em> going back as far as 2007</a>.</p><p>While I am by no means an expert on electoral security or hybrid warfare, I do see this as a massive threat. Ireland has, even throughout the Great Recession, had a mostly stable, open, liberal democracy and that could be a major factor in continuing to attract companies to come to Ireland in the wake of Brexit and if there is to be a more unified tax policy in Europe. It is good to know that at least we have a working group thinking about these issues and that we are contributing to European efforts to fight off disinformation and hybrid warfare and I hope that we are doing more than thinking and issuing a report with some thoughts in it and that if there are recommendations, they are followed as this is crucial to the future of our small nation.</p><p>Though someone on twitter who does know a great deal more about this is far from impressed;</p><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">The nod towards hybrid threats is frankly either pretty lazy or pretty incompetent. Nothing in here suggests the <a href="https://twitter.com/hashtag/Irish?src=hash&amp;ref_src=twsrc%5Etfw">#Irish</a> state is prepared to put in place the structures necessary to build intelligence on, analyse and counter false narratives and disinformation etc. <a href="https://t.co/E07iVQDvxg">pic.twitter.com/E07iVQDvxg</a></p>&#x2014; Rory Byrne (@roryireland) <a href="https://twitter.com/roryireland/status/1210591825037320193?ref_src=twsrc%5Etfw">December 27, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p></p><!--kg-card-begin: markdown--><h1 id="43criticalnationalinfrastructureandpublicsectorsystemsanddata">4.3: Critical National Infrastructure and Public Sector Systems and Data</h1>
<!--kg-card-end: markdown--><p>The Governments strategy until now has been that of risk reduction in the area&apos;s of</p><blockquote><em>energy, transport, banking, financial market, health, drinking water supply and distribution and digital infrastructure</em></blockquote><p>Which are defined in <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1505297631636&amp;uri=COM:2017:476:FIN">Annex II of EU&apos;s Directive on security of network and information systems (NIS Directive)</a>. And also online services, listed below, which are defined in Annex III of the same document</p><blockquote>online marketplace, online search engine and cloud computing service</blockquote><p>While the Irish Government&apos;s document does not make clear what they mean by reduction of risk, it isn&apos;t an information security term, the NIS Directive makes clear that it is the common risk mitigation strategy. It is also clear that while the NIS Directive covers certain sectors of importance, there is awareness that mitigating risks does not eliminate risk nor does it account for unknown unknowns. And that while the NIS directive does cover these sectors, it appears that an inventory of infrastructure has been done so that they are aware that the NIS directive does not cover all the infrastructure deemed critical and that some critical infrastructure is interdependent on other critical infrastructure such as the energy sector powering most of the other NIS sectors. </p><p>It&apos;s disappointing that the only real paragraph they have on securing public sector systems says that some departments and agencies are ISO 27001 compliant while others aren&apos;t and there&apos;s no mention of doing anything about the other departments and agencies. There are governance issues around classified information, be it Irish, shared with Ireland or stored in Ireland for whatever reason and that plans are underway to deal with this issue.</p><p>And finally;</p><blockquote>The nature of these networks and technology is relevant also; being software defined and virtualised means that new types of security measures will likely be required in this sector to ensure the security of both the 5G network and of the services dependent on it.</blockquote><p>At least the government appears aware that traditional threat models and defensive mechanisms will not work for 5G.</p><!--kg-card-begin: markdown--><h1 id="appendix1actions">Appendix 1: Actions</h1>
<!--kg-card-end: markdown--><p>This has been an extraordinarily long post by my standards so I&apos;m not going to go point by point across all actions proposed, only the ones that I think are worth mentioning, but you can read them if you so desire in the document. Though I may not discuss the timeframes as I know that they have slipped already given the release date of the document.</p><blockquote><strong>Measure 1: The National Cyber Security Centre will be further developed, particularly with regard to expand its ability to monitor and respond to cyber security incidents and developing threats in the State.</strong></blockquote><p>Great idea and I really hope that it gets up and running sooner rather than later. Monitoring attacks in the state and gaining visibility into the threats that the state faces, as well as being able to fuse our data with that of international partners is key to protecting even the most basic of services provided by the government and is essential in staying abreast of emerging threats internationally. I worry though what 24/7/365 staffing of such an organization would look like and how it is intended to be staffed.</p><blockquote><strong>Measure 2: Threat intelligence and analysis prepared by the National Cyber Security Centre will be integrated into the work of the National Security Analysis Centre.</strong></blockquote><p>This is a common sense measure, but an important one and one that should have been done when both bodies were set up. If we have a bodying working analysing threats to national security, you need to feed them adequate intelligence so that they can accomplish their mission. This is also probably benefits from Measure 6 which will further develop threat intelligence efforts at the NCSC.</p><blockquote><strong>Measure 4: The NCSC, with the assistance of the Defence Forces and An Garda S&#xED;och&#xE1;na, will perform an updated detailed risk assessment of the current vulnerability of all Critical National Infrastructure and services to cyber attack.</strong></blockquote><p>This is basically a plan to deepen the vulnerability assessment of critical infrastructure which is well warranted as living in a post-Triton world as we have had the threat landscape expanded to include devices that were previously considered systems that would not be attacked.</p><blockquote><strong>Measure 5: The existing Critical National Infrastructure protection system will be expanded and deepened over the life of the Strategy to cover a broader range of Critical National Infrastructure, including aspects of the electoral system.</strong></blockquote><p>Measure 3 is not worth mentioning as it&apos;s basically just complying with an EU Directive but it feeds into this measure which is to say that while the NIS misses some aspects in infrastructure which we deem critical, we should assess the risks to all of our critical infrastructure.</p><blockquote><strong>Measure 7: Government will introduce a further set of compliance standards to support the cyber security of telecommunications infrastructure in the State.</strong></blockquote><p>Well, that vague... It&apos;s based on <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32018L1972">Directive 2018/1972</a> from the EU and the key thing that needs to be done at a high level is the following from paragraph (94);</p><blockquote>Security measures should take into account, as a minimum, all the relevant aspects of the following elements: as regards security of networks and facilities: physical and environmental security, security of supply, access control to networks and integrity of networks; as regards handling of security incidents: handling procedures, security incident detection capability, security incident reporting and communication; as regards business continuity management: service continuity strategy and contingency plans, disaster recovery capabilities; as regards monitoring, auditing and testing: monitoring and logging policies, exercise contingency plans, network and service testing, security assessments and compliance monitoring; and compliance with international standards.</blockquote><p>That may come from EU law but my god, there&apos;s more strategy in what the major issues are in that paragraph than nearly the entire document released by the Irish Government and that directive covers more of the wide spectrum of threats we face.</p><p>And a little late if you&apos;re worried about Huawei 5G equipment, it&apos;s a shame that the Irish Government is adopting regulations designed to deal with <em>security of supply, access control to networks and integrity of networks</em> and <em>security incident detection capability, security incident reporting and communication</em> AFTER such equipment has been adopted and when it is unknown if such equipment has a secure supply chain, can maintain network integrity or has adequate logging because the UK, even though they have allowed Huawei to operate at a restricted capacity in the 5G network, <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/727415/20180717_HCSEC_Oversight_Board_Report_2018_-_FINAL.pdf">the UK NCSC are by no means impressed with Huawei gear</a>.</p><blockquote><strong>Measure 8: The NCSC will develop a baseline security standard to be applied by all Government Departments and key agencies.</strong></blockquote><p>Is this a case of <a href="https://xkcd.com/927/">XKCD 927</a> or is this adopting ISO 27001 across the board? Measure 10 also covers this where the heads of IT in each dept will work with the NCSC to deploy this security baseline, whatever it is.</p><blockquote><strong>Measure 9: The existing &#x2018;Sensor&#x2019; Programme will be expanded to all Government Departments, and an assessment will be conducted by the same date as to the feasibility of expanding Sensor to cover all of Government networks.</strong></blockquote><p>This genuinely scares me. When I was doing CCNA Cybersecurity Operations, sensors are defined in 5.2.1.8 as;</p><!--kg-card-begin: markdown--><blockquote>
<p>IDS and IPS technologies share several characteristics, as shown in the figure. IDS and IPS technologies are both deployed as sensors. An IDS or IPS sensor can be in the form of several different devices:</p>
<ul>
<li>A router configured with Cisco IOS IPS software</li>
<li>A device specifically designed to provide dedicated IDS or IPS services</li>
<li>A network module installed in an adaptive security appliance (ASA), switch, or router</li>
</ul>
</blockquote>
<!--kg-card-end: markdown--><p>I have also though seen sensors as honeypots or canary tokens but I really hope it&apos;s not the traditional definition I know as a sensor because the thought that in 2020, we have government networks that have no IDS or IPS whatsoever is a scary thought... Does that extend as far as firewalls also?! I can&apos;t imagine that&apos;s the case but I would consider the deployment of both mandatory in this day and age.</p><blockquote><strong>Measure 11: The NCSC will be tasked by Government to issue Recommendations with regard to the use of specific software and hardware on Government IT and telecommunications infrastructure.</strong></blockquote><p>100% on board with this! But as I said before, maybe we should have thought about this just a little earlier when it came to telecommunications and this might be a great opportunity to look into FOSS and what it could offer as well as what other vendors have to offer.</p><blockquote><strong>Measure 12: Government will continue to ensure that second and third level training in computer science and cyber security is developed and deployed, including by supporting the work of Skillnets Ireland in developing training programmes for all educational levels and supporting SOLAS initiatives for ICT apprenticeship programmes in cyber security.</strong></blockquote><p>There&apos;s not much more to say here. Integrating cyber across all second level and above education, in as broad a spectrum as possible is a commendable initiative! I just wish we had more in the way of detail.</p><blockquote><strong>Measure 13: Science Foundation Ireland (SFI) will promote cyber security as a career option in schools and colleges by means of their Smart Futures Programme.</strong></blockquote><p>The fact that we aren&apos;t speaks volumes.</p><blockquote><strong>Measure 14: Science Foundation Ireland along with DBEI and DCCAE, will explore the feasibility through the SFI Research Centre Programme, the Research Centre Spoke programme or other enterprise partnership programmes to fund a significant initiative in Cyber Security Research.</strong></blockquote><p>This shouldn&apos;t be to <em>explore the feasibility</em> of a Cyber Security Research Centre. This should just simply be to set up a Cyber Security Research Centre. End of. It shouldn&apos;t be a question because we want to promote a cyber as public sector, private sector or academic career path, you can&apos;t think about it in terms of maybe. It has to be in terms of doing. A combination of this with Measure 15 and Measure 16 could be beneficial as links between the public and private sectors with academia to design and built the technology and do research into what is needed going forward is an important step.</p><blockquote><strong>Measure 17: We will reinforce Ireland&#x2019;s diplomatic commitment to cyber security, including by stationing cyber attach&#xE9;s in key diplomatic missions and by engaging in sustainable capacity building in third countries.</strong></blockquote><p>I genuinely think this is fantastic! Hire people to work in a diplomatic capacity to share out skills with the rest of the world! I would drop my life to work on something like this I believe in it so much. It&apos;s the cyber equivalent of Peace Keeping and it&apos;s a genuinely commendable initiative. I just hope that we can have enough staff so that we can staff all the posts we will need to in Ireland and working on diplomacy globally.</p><blockquote><strong>Measure 18: We will create an interdepartmental group (IDG) on internet governance and international cyber policy to coordinate national positions across Departments.</strong></blockquote><p>Can we lead a global Arms Control initiative for cyber like we did for <a href="https://www.ireland.ie/global-diaspora/stories/ireland-and-nuclear-disarmament.php">nuclear weapons</a>? There&apos;s already the start of a framework for this in Microsoft&apos;s <a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW67QH">Digital Geneva Convention</a> and I will totally go and get a <a href="https://www.nonproliferation.org/education/">Master of Arts in Nonproliferation and Terrorism Studies</a>! I&apos;ve kinda already been accepted into the course I want to do;</p><!--kg-card-begin: html--><blockquote class="twitter-tweet"><p lang="und" dir="ltr">YES!</p>&#x2014; Jeffrey Lewis (@ArmsControlWonk) <a href="https://twitter.com/ArmsControlWonk/status/1217621640135077888?ref_src=twsrc%5Etfw">January 16, 2020</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p></p><blockquote><strong>Measure 19: We will deepen our existing engagement in international organisations, including by joining the Cyber Security Centre of Excellence (CCD-COE) in Tallinn, Estonia.</strong></blockquote><p>I think Rory says all that&apos;s need to be said here and I hope we do get a volunteer corps of some kind, though I do think this is a welcome development and something we should do more of. Working alone on the same issues as everyone else</p><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">Joining CCD-COE is a welcome development. Sending one person is hardly that revolutionary. An opportunity for the state to doing something really farsighted and leap ahead by embracing the Estonian Cyber Volunteer concept was missed. <a href="https://t.co/KPjp5M9g6h">https://t.co/KPjp5M9g6h</a> <a href="https://t.co/POhWzgGSHn">pic.twitter.com/POhWzgGSHn</a></p>&#x2014; Rory Byrne (@roryireland) <a href="https://twitter.com/roryireland/status/1210594399262007296?ref_src=twsrc%5Etfw">December 27, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p></p><!--kg-card-begin: markdown--><h1 id="whatsmissing">What&apos;s Missing?</h1>
<!--kg-card-end: markdown--><p>You could say a lot is missing but really... The only thing missing the human factor. There&apos;s ideas and technologies that could be implemented, but to run the JSOC, you need people to sit in chairs and analyse events as they arise and you need them there all of the time. There needs to be a rapid scale up in the numbers of people working at the different bodies across the nation on cyber security and national security issues and the only way you&apos;re going to get that is by getting the people to work the problem.</p><p>And I&apos;m not alone though, I&apos;ve used <a href="https://twitter.com/roryireland/status/1210591796084068353">Rory Byrne&apos;s thread on twitter</a> already in this but the whole thread is worth the read rather than the select few tweets I have shown but I do want to show some more from him as well as others on more stuff that&apos;s missing;</p><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">There is no mention of recreating the very successful model of the UK NCSC Cyber Security Information Sharing Partnership (CiSP). So a key way to broaden and engage stakeholders from the wider business, NGO etc community on day to day threat sharing is lost.</p>&#x2014; Rory Byrne (@roryireland) <a href="https://twitter.com/roryireland/status/1210591827230908416?ref_src=twsrc%5Etfw">December 27, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">There is no mention of reconfiguring and enhancing state structures such as the Garda and Defence Forces to be able to increase their large gaps in recruitment, training and retention of staff.</p>&#x2014; Rory Byrne (@roryireland) <a href="https://twitter.com/roryireland/status/1210591828522754051?ref_src=twsrc%5Etfw">December 27, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">Regarding education and building the cyber experts of the future. The strategy is lazy and fails to even bother looking at some of the oustanding initiatives across the water. We are patting ourselves on the back for some pretty mediocre resources compared to UK Cyberfirst etc. <a href="https://t.co/dkxJISeQo6">pic.twitter.com/dkxJISeQo6</a></p>&#x2014; Rory Byrne (@roryireland) <a href="https://twitter.com/roryireland/status/1210593197220646912?ref_src=twsrc%5Etfw">December 27, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p></p><!--kg-card-begin: markdown--><h1 id="wrappingthisup">Wrapping This Up</h1>
<!--kg-card-end: markdown--><p>What I find really frustrating about this strategy is that it appears that behind the scenes that a lot of work has been done by the right people to identify the problems and lay them out in a coherent fashion including an annex of actions, you could almost say I had a glowing review of most elements with all but a few items, like the Guards contract with Eir, where I was at least constructive in my criticism.</p><p>But the wheels come off the strategy bus is when you look at the ambition the plan shows in the annex of actions. Some of them come down to just following the law, basically defeatedly saying that we have to because we don&apos;t have a choice. Or that we recognize that X is an issue and this will be solved with public information campaigns or with more third level graduates but does not account for the lag time between those graduates coming online and now and how that gap is to be plugged or the recognition that educating the general public on general cyber security matters is a difficult challenge that even experienced professionals fail at a large majority of the time.</p><p>And on the education front, maybe we need to look at what other nations are doing like the <a href="https://www.acq.osd.mil/cmmc/docs/cmmc-overview-brief-30aug19.pdf">Cybersecurity Maturity Model Certification (CMMC) in the US</a>. It&apos;s a way in which you can begin the process of building a cyber capability within an organization through bootstrapping and adding capabilities over time and requires formal certification to make sure you meet the requirements of each level of the certification. This kind of approach will gradually raise the bar security across the whole sector of defence contractors over time in the US.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.cyberwarfa.re/content/images/2020/02/slide_sample-1.PNG" class="kg-image" alt loading="lazy"><figcaption>The levels of security in the Cybersecurity Maturity Model Certification</figcaption></figure><p>There&apos;s no mention of how we could even consider the cost of this or where the money should be raise for it. Or if it&apos;s worth using something like the <a href="https://isif.ie/" rel="noopener">Ireland Strategic Investment Fund</a> to provide funding some of the grand scale, long term projects listed in this. The strategy isn&apos;t aware that this might need a strategic funding source that isn&apos;t from the daily budgets of the Department of Defence of or the Department of Department of Communications, Climate Action and Environment or the Department of Justice and Equality. </p><p>It is a strategy, but it lacks ambition and arguably a grounding in realities of how dynamic information security is and how statically we seem to see the problems at a national level. We realize they are there but we think that they can be solved with little change when historically the implementation of deep and far reaching operational security measures have required organizational sea changes. Or how we plan to integrate cyber into more of what we do since that&apos;s what we really need to do, to effectively tackle this issue head on and to be able to think about these issues in the modern, broad sense since it is an issue that effects everyone.</p><p>Maybe it&apos;s too short term to accomplish wider goals? Maybe I expect too much of what&apos;s politically possible in Ireland? Or maybe I see issues like the fact that these missions are spread out across multiple bodies being the issue but the civil service does not? Maybe we should look at utilizing the Department of Defence more fully and make it a full cabinet position again with it&apos;s remit being that of National Security and move bodies like the NCSC, NSAC, the Defence Forces and the national security elements of An Garda S&#xED;och&#xE1;na all in under one roof? I don&apos;t know what all the answers are, but what I do know is that we need to start looking for better answers.</p><!--kg-card-begin: markdown--><hr>
<!--kg-card-end: markdown--><p>And just to show that I&apos;m not some arsehole on the internet throwing stones at glasses houses, this is an issue I really worry about and I think we are not doing enough on, nor are we really prepared for at a national level and for the betterment of the nation, I will happily give 5 to 10 years and maybe even more, to the NCSC, the NSAC, the Defence Forces, An Garda S&#xED;och&#xE1;na, being a CCD-COE representative or working as one of the cyber attach&#xE9;s mentioned in Measure 17, working on these issues in Ireland or with international partners at home or in far flung postings and accept whatever pay cut I have take compared to my fellow graduates when I graduate from college at the end of the current semester because this is the hill I intend to die on.</p><p>I have said something to that effect every time I have made this commitment to the above agencies, every time I have met them throughout my time in college and have always been referred to Public Jobs where they never seem to hire anyone. So I will look forward to <a href="https://www.nssi.ie/">Sl&#xE1;nd&#xE1;il 2020</a> where I will continue to meet people in these bodies and continue to attempt to join their efforts.</p>]]></content:encoded></item><item><title><![CDATA[I Was On the Arms Control Wonk Podcast Talking About Investigating The PS752 Shootdown With OSINT]]></title><description><![CDATA[<p>As I&apos;ve mentioned in previous posts, I&apos;ve used the Arms Control Wonk Podcast Slack as the basis for starting several of my own investigations into various different things and recently myself and some of the guys on Slack investigated the shootdown of PS752 over Iran by</p>]]></description><link>https://blog.cyberwarfa.re/acwp-ps752/</link><guid isPermaLink="false">60834946a1ddcd53430870c6</guid><category><![CDATA[Updates from the Author]]></category><category><![CDATA[OSINT]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Sat, 25 Jan 2020 22:12:44 GMT</pubDate><content:encoded><![CDATA[<p>As I&apos;ve mentioned in previous posts, I&apos;ve used the Arms Control Wonk Podcast Slack as the basis for starting several of my own investigations into various different things and recently myself and some of the guys on Slack investigated the shootdown of PS752 over Iran by the IRGC.</p><p>While the regular hosts of the pod were aware that we were investigating, they were no aware of the extent of the investigation we had done and when I opened my big fat mouth on twitter and documented the scale of what we had done in the thread below, well... They asked me to go on and talk about some of things we got up to in our investigation</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr"><a href="https://twitter.com/ACWPodcast?ref_src=twsrc%5Etfw">@ACWPodcast</a> <a href="https://twitter.com/ArmsControlWonk?ref_src=twsrc%5Etfw">@ArmsControlWonk</a> <a href="https://twitter.com/aaronstein1?ref_src=twsrc%5Etfw">@aaronstein1</a> <a href="https://twitter.com/annemp13?ref_src=twsrc%5Etfw">@annemp13</a> <a href="https://twitter.com/wslafoy?ref_src=twsrc%5Etfw">@wslafoy</a> I have one minor issue with the most recent pod. I know you don&apos;t check slack often and I&apos;m not saying you have to, but Slack did a lot of good work on the downing of PS725 and I kinda have to point it out with links</p>&#x2014; Paddy Kerley (@LegendaryPatMan) <a href="https://twitter.com/LegendaryPatMan/status/1217613398269186049?ref_src=twsrc%5Etfw">January 16, 2020</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>If you&apos;re interested in hearing me talk about the investigation and what other things we get up to on Slack, you can grab the pod in the tweet below and listen</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">New Arms Control Wonk podcast! <a href="https://twitter.com/LegendaryPatMan?ref_src=twsrc%5Etfw">@LegendaryPatMan</a> joins <a href="https://twitter.com/ArmsControlWonk?ref_src=twsrc%5Etfw">@ArmsControlWonk</a> to talk about collaborative open-source intelligence and the ACWPodcast community&apos;s rapid OSINT response to the downing of PS752<a href="https://t.co/PZOrvNxxbo">https://t.co/PZOrvNxxbo</a> <a href="https://t.co/fBST65IZlJ">pic.twitter.com/fBST65IZlJ</a></p>&#x2014; ArmsControlWonkPod (@ACWPodcast) <a href="https://twitter.com/ACWPodcast/status/1220031042305904645?ref_src=twsrc%5Etfw">January 22, 2020</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure>]]></content:encoded></item></channel></rss>