Cyber Capacity and Counterproliferation: Determining a Cyber ...

Report 3 Downloads 65 Views
Cyber Capacity and Counterproliferation: Determining a Cyber Command & Control Structure for U.S. Covert Counterproliferation Action

Christopher L. Conklin PROJECT ON NUCLEAR ISSUES 2012 SUMMER CONFERENCE LOS ALAMOS NATIONAL LABORATORY

Cyber Warfare or Covert Action: Decision Calculus Presidential Directive Military Operation

US Code (USC)

Covert Action (CA)

Title 10

Dept. of Defense/NSA

Title 50

Timeframe

Act of War

CIA: EO 12333

Congressiona l Authorization

Timeframe

Finding

Congressiona l Notification

Cyber ‘Activity’ = ? Espionage: “IC shall collect information concerning, and conduct activities to protect against…proliferation of WMD.” Executive Order 12333

Act of War: Covert Action: “An activity of the USG to influence political, economic, or military conditions abroad.” 50 USC §413b(e)

“Any act occurring in the course of…armed conflict between military forces of any origin.” 18 USC § 2331 4(c)

Title 10 vs. Title 50 Title 10 – Dept. of Defense  Warfare

Armed Attack (?)  Physical Damage Immediate destruction of property = an ‘Act of War?’  Congressional

Authorization* Conflict lasts > 60 days 50 USC 1541-1548

NSA/CIA: All of the Above?

Title 50 – Intel. Community

 Espionage Intelligence Collection 

Flame, Duqu

 Sabotage &

Disruption

Ex. - Employing cyber CA as method of damaging centrifuges

Cyber Covert Action: Title 50 Why Title 50?

Examples Covert Action:

Espionage:

Stuxnet

Flame, Duqu

Sabotage ≠ ‘Act of War’

Intel. Collection*

 EO 12333, 1.7a(4) – “No agency except the CIA may

conduct any covert action…” 

“Unless the President determines that another agency is more likely to achieve a particular objective.”

 Physical damage =/≠ ‘Use of Force? “W.32.Flamer: Enormous Data Collection,” Symantec Official Blog, 4 June 2012: W32.Duqu: “The Precursor to the Next Stuxnet,” Symantec Security Report, 24 October 2011

‘Use of Force’ Continuum Psychological Operations

Nuclear Weapon Bin Laden Raid

Drone Strike

Kinetic Damage

Cyber Attacks

Cyber Capabilities • Targeted Killings – No* • Destroying Infrastructure - Yes

Defining Cyber ‘Use of Force’  Key Issues Non-lethal* Physical damage without kinetic strike  Sabotage Wiping a hard drive 

No physical damage

Centrifuges 

Kinetic destruction

 Are they the same? Gray area

Photo Credit: Press TV

Cyber Covert Action & Drone Strikes: Title 10/50 Gray Area  Similar Issue Both Presidential directives New forms of weaponry Interplay 

Department/Agency Cooperation

 Primary Differences Targets Use of Force scale

 Questions With Both Operational Control 

Crux of the issue

Oversight

Photo Credit: Charles McCain, MQ9 Reaper Drone in Afghanistan 2007: Flickr

Cyber: Unique Title 10/50 Problems  Dual-Use Intel. extraction Sabotage  Timeframe Oversight Difficult to guarantee

Dual-Use

Offensive Duration

Operational Uncertainty

 Uncertainties Spread of weapon across air gaps Efficacy of sabotage may be unknowable* 

IAEA Safeguards

* Source: William A. Owens, Kenneth W. Dam, and Herbert S. Lin, “Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities,” National Resource Council: Committee on Offensive Information Warfare, 2009

Issues to Consider: Cyber Covert Action  Is cyber counterproliferation limited in scope to

sabotage?

2008 vs. Today Today vs. 2016

 Operational Chain of Command Cyber weaponry can be infinitely faster than kinetic weaponry* Operators must be given freedom to maneuver in such an environment 

Generals & Sergeants

 Attribution Huge problem, perfect for covert counterproliferation action Plausible deniability Billy K Rios, “Sun Tzu was a Hacker: An Examination of the Tactics and Operations from a Real World Cyber Attack,” Grey Logic, accessed 17 June 2012

Conclusions: A New Breed of Weaponry  Cyber CA – Title 50 Does it matter?  Cyber Capabilities Covert Action ≠ Warfare ≠ Espionage Stuxnet ≠ Flame/Duqu  What constitutes ‘force?’ Determining a threshold 

When does a cyber covert action become an act of cyberwar?

 More questions than answers Suspected Nuclear Site: Qom, Iran, Podknox, Flickr