World Cyberwar I
Power’s out. You flick the switch repetitively, still nothing. Your little clock radio is blank; you glance at your cell phone to check the time as you go to the closet. Hopefully you won’t be late for work … “No Signal.” You grab your robe and head down the hall, walking a little quicker now. Daylight is breaking, but the house is dark, the appliances dead.
The muffled sound of your neighbor’s backup generator makes its way into the foyer, so you walk over to see what the news is. Eight network channels, all static—except for two that appear to be airing reruns. Your neighbor looks worried.
You remember your car’s on empty. Ten minutes later, you’re in a gridlock parking lot in the middle of the street—still a block and a half from the pumps. It turns out you aren’t the only one who’s worried about gasoline. You flick on the radio, now anxious to know what’s going on. More static. Finally:
Parts of the Eastern Interconnection power grid are failing this morning …. Servers for several news organizations appear to have been abruptly knocked offline …. Rail, port and air traffic control network computer systems are experiencing glitches …. Numerous banks have temporarily suspended their electronic operations …. Reports are coming in that the Pentagon may have suffered a large cyberattack; some systems have been compromised, others are shut down to contain security breaches ….
How the rest of this day ends is up to your imagination.
/Virtual/equals:TheNewReality/
If you’ve been awake for the past decade, you’ve noticed the Internet becoming an indispensable part of everyday life. Millions of Americans and other Westerners in households, businesses and government agencies use the Web to communicate, do business, transact, invest, administrate day-to-day operations, control infrastructure, keep track of the news, research, learn, navigate, shop and socialize, often burning the bridges of doing it the old way behind them. At the same time, more and more businesses and more and more infrastructure and government functions, including the United States military, are integrally supported by e-mail and other constantly advancing network connectivity. That’s the good news. And the bad news.
The birthplace of the Internet, the United States, is one of the world’s most well-connected nations. But beneath the everyday world of businessmen, students, bankers, typists, graphic designers, web programmers, network administrators and other Internet dependents that you can see lies a digital underground that you can’t. Below the global online community’s slick and shiny interface is a world of code you never see—the gears inside the clock. To you, it may look like gibberish, but programmers can read and write it. So can hackers.
Case study: What happens when you combine a well-connected, Internet-dependent nation, a hostile enemy, hacker mercenaries and an unpopular political decision? You get Estonia. Surprisingly well-connected, Estonians use the Web heavily in everyday life: for their banking transactions (almost all of them), communications, news, shopping, reservations, theater tickets and more. There, Internet access is legally considered a human right, and even parliamentary votes are conducted online.
In April 2007, the government relocated a Soviet-era statue, infuriating ethnic Russians inside and outside of Estonia, as well as the Kremlin.
Within 24 hours, hackers began probing Estonia’s online defenses to test their limits. Then, they blasted key computer targets with information overloads. Parliament’s e-mail crashed, websites for major political parties were hijacked, and a counterfeit letter appeared from the prime minister apologizing for removing the statue. Then, hackers began overloading routers and switches across the country. Two major banks had to shut down operations, losing millions, and half of the nation’s news outlets were knocked out. Most servers had to be disconnected, and the rest were so busy trying to protect themselves that Estonia’s Internet in essence stopped functioning.
After more than a week of crippling cyberattacks, the assault subsided and Estonian online security officials along with foreign experts were able to restore service. They also traced some of the machines used in the attack back to Russian government offices. Moscow denied involvement, and the machines could have been “bots” ultimately controlled by hackers elsewhere, but the lesson remains: Do not underestimate the real-world power of hackers in large numbers.
/Target/equals:America’sAchillesHeel/
The potential effects of cyberwarfare are catastrophic. This Internet underworld is the 21st century’s newest battleground. China, Russia, even Islamist terrorists are beginning to wage a new kind of war here, in an environment where a desktop computer can put your agenda on a level playing field with the world’s only superpower. It’s a cheap, powerful equalizer. And when it comes to the havoc a cyber assault could bring, especially when coupled with a real-world attack, there’s nothing virtual about it.
Every day, the Pentagon’s electronic defenses take hits from hundreds of cyberattacks, some of which have been successful. Since 2006, the virulence and volume of attacks has surged dramatically. Electronic attacks on the Department of Homeland Security have tripled over the last two years, and those on military networks have increased 55 percent. One former high-ranking national security official called it “espionage on a massive scale.” Just last June, an assault forced the Department of Defense to take as many as 1,500 computers offline, downing the Pentagon’s unclassified e-mail system. In other cases, top-flight military units have been hacked, and the Pentagon’s network vulnerabilities, detailed maps of Department of Defense facilities, and U.S. military war plans have been posted on the Web for the world to see. In 2007, a breach at the State Department put cia agents around the world at risk.
Perhaps the most worrying trend is that numerous attacks appear to be coming from foreign nations that are enemies of the United States: particularly China and Russia, as well as locations in Europe. BusinessWeek reports that from 1998 to 1999, hackers stole large amounts of unclassified information from the Defense Department, nasa, the Energy Department and numerous weapons labs (ibid.). The destination for some of the data was inside Russia. In 2004, hackers thought to be in China stole classified data from defense contractor Lockheed Martin, Sandia National Labs and nasa. Last year, China struck again, as reported by BusinessWeek:
2007. A new form of attack, using sophisticated technology, deluges outfits from the State Dept. to Boeing. Military cyber security specialists find the “resources of a nation-state behind it” and call the type of attack an “advanced persistent threat.” The breaches are detailed in a classified document known as an Intelligence Community Assessment. The source of many of the attacks, allege U.S. officials, is China. China denies the charge.
Those who are trying to protect the nation’s security online face a mountainous task. There are a multitude of government and military agencies trying to fight cyberwarfare that must coordinate with each other as well as with the private sector, all the while tiptoeing through a maze of legal and bureaucratic red tape that restricts military and cyber security enforcement but which hackers don’t think twice about. In comprehensive cyberattack simulations such as Cyber Storm i and ii, the results are typically failures.
Then there’s the sheer volume of information the U.S. has to protect. The Pentagon alone uses millions of computers on tens of thousands of networks at hundreds of sites in dozens of countries. In addition to this, U.S. defenses are tied to hundreds of private sector defense contractors. Beyond the defense establishment, hackers can and have also targeted other essential national infrastructure: electrical grids, banks, transportation systems, news networks, government agencies and important businesses.
These contractors have weapons systems and other critical secret data stored on their networks that must also be secured. Inevitably, some systems are older and more vulnerable to sophisticated new viruses, while others are improperly administered. Even up-to-date systems totally miss cleverly disguised viruses, allowing attackers to track key strokes, take screen shots and suck out loads of information. Hackers say there’s always at least one machine that is unprotected. And it only takes one.
Add all this to the fact that cyberwarfare favors the attacker. The defender must always react to the assailant, who chooses the time, place and method of the attack, which is always cloaked with anonymity, yields a potential yield of virtually unlimited damage, and can be waged by as few as one person located anywhere in the world at any time. All for less than the price of one m-16.
For the sprawling, mighty United States and its military, it is a starkly naked Achilles heel. This is the one thing that could easily and rapidly bring the nation to a standstill. The more well-connected and technologically capable we get, the more vulnerable we are. And the West is constantly getting better-connected.
In doing so, the military necessarily must tie its systems to civilian systems, where infections are even easier to start and spread. Budget-minded planners have also opted for off-the-shelf network security products and even security software developed in foreign nations. The Army’s advanced Future Combat Systems project makes soldiers even more dependent on the network.
/Answer/equals:USBP/
If independent, oftentimes teenage attackers motivated by ideologies as simple as voyeurism and resentment for authority have caused and can cause so much trouble, what happens when unified, ideologically motivated terrorists and enemies with the resources of a nation-state really begin pouring it on? Estonia would be merely a trial run.
A targeted and sustained assault on just a few of the nation’s key infrastructures—some of our already-faltering financial institutions, for example—could disrupt our economy, explode investor confidence and kill the dollar. Cyber assaults on oil and energy information systems could spike fuel prices. Attacks on transportation infrastructure could delay, diffuse and disrupt the nation’s economic bloodstream. Resultant fuel, food and energy shortages could spark widespread crises and even riots that would cost billions of dollars and possibly hundreds or thousands of lives.
But outright attacks on our military’s networks, especially coupled with infrastructure damage and resulting civil upheaval or a military strike, could be catastrophic. The most advanced military in the world relies on the most complex information systems to sustain an unprecedented and ultra-complex organization of logistics. Should those systems malfunction before or during a time of national crisis, the ammunition could arrive late, units could be assigned incorrectly, helicopters might never deploy—and, worst-case scenario, some of our own weapons could conceivably be retargeted.
Trumpet editor in chief Gerald Flurry has monitored this vulnerability since January 1995:
America is the greatest superpower this world has ever known. But we have a very vulnerable point in our military—our own Achilles heel. … Exploiting this vulnerable point may trigger the greatest shock in the history of warfare! … Computer dependence is the Western world’s Achilles heel, and within a few years this weakness could be tested to the full.
As the basis of his analysis, Mr. Flurry pointed to a key Bible prophecy that might be fulfilled in part by cyberwarfare: “Moreover the word of the Lord came unto me, saying, also, thou son of man, thus saith the Lord God unto the land of Israel; An end, the end is come upon the four corners of the land. … They have blown the trumpet, even to make all ready; but none goeth to the battle: for my wrath is upon all the multitude thereof” (Ezekiel 7:1-2, 14). Even though the modern nations of Israel, including the U.S., Britain and the Jewish nation, sound an alarm of impending attack and expect their mighty armed forces to respond, “none goes to battle.” There are a variety of ways the immediate future could play out, but one thing is certain to happen: Ezekiel 7.
God has revealed these future events—as well as ultimately good news for our nations. To learn more about America’s vulnerabilities and its immediate future, request, download or read online Herbert W. Armstrong’s book that contains the answers to these problems as well as the awe-inspiring hope for our future: The United States and Britain in Prophecy.