[Dutch] Spionage is van alle tijden, maar…

UPDATE 2014-01-22: Richard Falkvinge explains Why Today’s Wiretapping Is Entirely Unlike Yesterday’s

Na berichtgeving met claims over spionage door Amerika van EU-ambassades en -kantoren heeft John Kerry, de Amerikaanse minister van Buitenlandse Zaken, gesteld dat spionage ‘niet ongebruikelijk’ is in internationale betrekkingen. Die opmerking zal hij niet hebben gemaakt ter legitimering: immers zijn allerlei vormen van misdaad ‘niet ongebruikelijk’ maar daarmee nog niet gerechtvaardigd. Wel is Kerry’s opmerking relevant voor het kader waarin we de dingen moeten zien.

Een bron met ervaring rond de inlichtingenwereld stelt het volgende:

“Ruim 7 jaar geleden sprak ik met een CIA-operative die me vertelde hoe men zich binnen die dienst altijd heeft verbaasd over het feit dat Nederland (toen) als enige land ter wereld openlijk aangaf (voornamelijk gedurende de Koude Oorlog, en daarna i.v.m. het internationale strafhof) dat iedereen die hier een ambassade wilde er rekening mee moest houden dat wij mee zouden kijken en luisteren. Met andere woorden: ‘wij dulden geen gesodemieter hier…’.

Die Koude Oorlog is binnen de inlichtingenwereld nooit gestopt. Laat dat duidelijk zijn. Er lopen nu meer Russen rond in de westerse landen dan gedurende de Koude Oorlog en er is een veelvoud van agenten actief uit een veelvoud aan landen.

Binnen inlichtingendiensten heb je vrienden en (gezamenlijke) vijanden. Maar ook die vrienden bespioneren jou, en jij hen.

Binnen een bepaalde organisatie werd bekend dat één van onze ministeries al haar e-mailverkeer via een Engelse server had lopen doordat een Engelse partij een aanbesteding had gewonnen. Zoals de waard is vertrouwd hij z’n gasten: dat was meteen ‘problematisch’, en waarom? Omdat men hier, als al het e-mailverkeer van zo’n ministerie door Nederland zou lopen, uit inlichtingenoogpunt daarop mee zou willen kijken.

Als wij het zelf al zouden doen (indien de mogelijkheid zich voordoet of wordt ‘gecreëerd’), hoe kunnen we dan verontwaardigd of verbaasd zijn als een ander het doet (en dat ook eigenlijk middels wetgeving altijd kenbaar heeft gemaakt…).”

Ook dit is relevant voor het kader waarin we de dingen zien: spionage is van alle tijden en vindt in allerlei richtingen plaats (hoewel de VS en GB een no-spy agreement zouden hebben). Onthulling van spionage is vrijwel per definitie mediageniek en koren op bepaalde politieke molens: uitingen van verontwaardiging en verbazing moeten dus ook tegen dat licht worden gehouden.

Dat spionage van alle tijden is, is echter niet een geruststellend eind aan de discussie. Er is immers nog geen tijd geweest waarin technologie zoveel mogelijkheden voor spionage heeft geboden als nu. Ashkan Soltani schrijft in MIT Technology Review dat in Amerika niet wetgeving, maar alleen technologie en financiën drempels zijn tegen massasurveillance. Soltani stelt dan ook:

“The extent to which technology has reduced the time and cost necessary to conduct surveillance should play an important role in our national discussion of this issue.”

Hoewel de VS niet vergelijkbaar zijn met Europa en Nederland — juridisch, ethisch, politiek, economisch, militair — lijkt me duidelijk dat Soltani’s stelling ook relevant is voor het publieke debat binnen Nederland en Europa. Een EU-US expertgroep gaat de proportionaliteit van het Amerikaanse handelen onderzoeken. Ik kijk met belangstelling uit naar hun bevindingen, die in oktober 2013 worden gerapporteerd.

Overigens een mooi voorbeeld van betekenisvol toeval: in juni is besloten de stemming door het Europese Parlement over wijziging van de Europese privacyregels opnieuw uit te stellen, deze keer naar september/oktober 2013. Ik hoop van harte dat alle Europarlementariërs zich de negatieve niet-economische externaliteiten (lees: ongewenste gevolgen) van ongebrijdelde verwerking van persoonsgegevens beginnen te realiseren.

Verder leesvoer:

[Dutch] Reactie op Wetsvoorstel computercriminaliteit III

UPDATE 2013-07-17: Op Webwereld: Rechters: decryptieplicht in strijd met mensenrecht.

Het Wetsvoorstel computercriminaliteit III (.pdf) en het bijhorende Memorandum van Toelichting (.pdf) liggen tot 1 juli 2013 ter feedback op https://www.internetconsultatie.nl/computercriminaliteit/. Daar staat het volgende over het wetsvoorstel:

“Het wetsvoorstel regelt vier onderwerpen:

  1. Onderzoek in een geautomatiseerd werk ingeval van verdenking van een ernstig strafbaar feit, ten behoeve van bepaalde doelen op het gebied van de opsporing. 
  2. Herziening van de bestaande regeling van artikel 54a Sr over het ontoegankelijk maken van gegevens. 
  3. Het decryptiebevel aan de verdachte ingeval van verdenking van bepaalde zeer ernstige strafbare feiten.
  4. Strafbaarstelling van het wederrechtelijk overnemen en ‘helen’ van gegevens”.

Ik heb het wetsvoorstel en het Memorandum van Toelichting gelezen in voorbereiding op een workshop over dit wetsvoorstel (die helaas werd afgelast), en heb vandaag de onderstaande reactie ingestuurd op de consultatie. Zie voor deze en andere argumenten rondom dit wetsvoorstel vooral ook het blog van Bits of Freedom waar 10 kritieken worden gepost in 10 dagen.

De hackbevoegdheid is een ingrijpend, zwaar opsporingsmiddel. Bij onze open democratie hoort terughoudendheid bij het toekennen van nieuwe opsporingsbevoegdheden. In de mij bekende informatie, waaronder de MvT, mis ik de onderbouwing voor het toelaten van een nieuwe opsporingsbevoegdheid voor verdenkingen op het brede Artikel 67 Sv [0]. In 2008 was er een zaak waarin verspreiding van illegale navigatiesoftware als “ernstige inbreuk op de rechtsorde” werd gezien en waarbij daardoor telefoontaps waren toegestaan. Mij lijkt evident dat verspreiding van illegale software geen grond kan zijn voor inzet van hackbevoegdheid. Het huidige wetsvoorstel staat dat wél toe. Deskundigen waaronder Ronald Prins en prof. Bart Jacobs stellen dat de hackbevoegdheid vooral wenselijk is voor bestrijding van botnets en aanvallen op vitale infrastructuur. Daar sluit ik me bij aan.

Bij de hackbevoegdheid heb ik nog een reeks andere bedenkingen:

  • Hoe wordt het planten van vals bewijs voorkomen? Bij de tapbevoegdheid zijn immers gevallen bekend dat er tapverslagen zijn vervalst/gemanipuleerd;
  • Gaat het buitenland straks ook inbreken in Nederlandse computers en policeware achterlaten? Is dat dan ook alleen voor verdenking zware terrorisme/kinderpornodelicten of ook voor copyrightschending, libel en godslastering? 
  • Hoe herkent Nederland policeware van buitenlandse opsporingsdiensten als zodanig, en wordt voorkomen dat wij interfereren met een lopend onderzoek van een buitenlandse rechtsmacht? Hoe herkennen buitenlandse opsporingsdiensten Nederlandse policeware als zodanig? 
  • Wordt de policeware ingekocht (FinFisher?) en zo ja, hoe weet je dan dat die geen achterdeurtjes bevat en bij elke update nog steeds integer is? 
  • Wie is verantwoordelijk voor schade/gevolgen als het Trojaanse politiepaard problemen veroorzaakt in een ziekenhuis, elektriciteitscentrale of een spionagegevoelig bedrijf?
  • Antivirusbedrijven claimen niet mee te zullen werken. Gaat de Nederlandse overheid dus de race aan met antivirusbedrijven? (toegegeven: momenteel makkelijk te winnen) 
  • En, last but not least, zoals Bits of Freedom zich afvraagt: “Als overheden op de hoogte zijn van het bestaan van kwetsbaarheden in computers, zijn er dan situaties denkbaar waarin zij die kennis geheim moeten houden omwille van de opsporing? Hoe verhoudt dat zich tot de ambitie van de regering  om de Nederlandse informatiesamenleving via overheidsorganisaties zoals het Nationaal Cyber Security Centrum (NCSC) te beschermen?”

Dan het decryptiebevel voor verdachten. Uit het TILT-rapport “Het decryptiebevel en het nemo-teneturbeginsel” (.pdf) begrijp ik dat nemo tenetur geen absoluut principe is. Wel vraag ik mij af of het nu toelaten van de inbreuk er toe zal leiden dat de wetgevende en rechtsprekende macht meer geneigd zullen zijn die inbreuk uit te breiden naar lichtere verdenkingen dan terrorisme en gewoonte/beroep kinderporno. Dus: kan hier sprake zijn van een glijdende-schaal-effect? En ook: gaat het decryptiebevel, net als de hackbevoegdheid, langs de Centrale Toetsingscommissie (CTC)?

Over de wijziging t.a.v. Notice & Takedown (NTD): als een “tussenpersoon die communicatiedienst verleent in de doorgifte/opslag van gegevens van anderen” niet voldoet aan een NTD-bevel dan blijft deze strafbaar. Mijn indruk is dat deze wijziging een drempel opwerpt tegen klokkenluiden: niet iedere klokkenluider is immers voldoende technisch/juridisch onderlegd om dit te omzeilen, en een ISP die zeker wil zijn dat ie niet vervolgd wordt, zal gelekte informatie offline halen. Is deze wijziging er vooral om ISP’s bang te maken of is het ook echt aannemelijk dat deze daadwerkelijk worden vervolgd?

Mij is duidelijk dat het wetsvoorstel in huidige vorm zonder aanvullende onderbouwing niet acceptabel is.

[0] Artikel 67 Sv omvat (.ppt):
lid 1) Misdrijf van max. straf 4 jaar of meer
lid 2) Met name genoemde misdrijven uit Sr (bedreiging, belaging, verduistering, witwassen, schuldheling, structurele discriminatie, mishandeling, vernieling, computermisdrijven, kraken, huisverbod, bepaalde zedenmisdrijven, enz. )
lid 3) Verkeersongeval met art. 6 WVW letsel na:
– roekeloosheid
– alcohol / rijvaardigheid verminderende stof (8 lid 1, 2, 3 of 4)
– weigering adem, bloed of urineonderzoek
– ernstige overschrijding max. snelheid
– kleven / geen voorrang verlenen / gevaarlijk inhalen
lid 4) Enige bijzondere wetten (bijv. telen, verwerken, verkopen, afleveren, verstrekken, vervoeren, aanwezig hebben of vervaardigen > 30 gram softdrugs + overtreding huisverbod)

[Dutch] EU Data Protection Directive: een bericht aan onze Europarlementariërs

UPDATE 2013-06-24: Corien Prins schrijft over PRISM/NSA en verwoordt nader waar ik in de afsluiting van onderstaand bericht met de woorden “sociale verhoudingen” mee naar bedoel te verwijzen: “(…) De paradox van de wens de burgers veiligheid te garanderen is dat zij de veiligheid van hun persoonlijke gegevens volledig kwijt zijn. Het is deze situatie en de veranderende machtsrelatie tussen individuen en instituties die daarmee samenhangt, waar het debat over dient te gaan. (…)“.

Bits of Freedom roept ons in het kader van de vernieuwing van de EU Data Protection Directive op contact op te nemen met onze Europarlementariërs. Hieronder volgt het bericht dat ik aan Nederlandse afgezanten heb gestuurd. Bits of Freedom zoekt trouwens nog een directeur (reageren vóór 6 mei 2013).

Beste heer Mulder, mevrouw In ‘t Veld, heer Van de Camp, mevrouw Sargentini, heer Zijlstra, heer De Jong en mevrouw Bozkurt,

De voorgestelde vernieuwing van de Europese privacyregels noopt mij ertoe dit bericht te schrijven. Dat bescherming van de persoonlijke levenssfeer een belangrijk maatschappelijk thema is, blijkt in Nederland steeds vaker in de Tweede Kamer: vaak leidt een “privacylek” dat individuele burgers raakt tot kamervragen. Voor het individu kunnen de negatieve gevolgen van onjuiste, bovenmatige, uitgelekte en/of te breed gedeelde informatie groot zijn. Juist in het licht van nieuwe technologische mogelijkheden, die overheid en bedrijfsleven in staat stellen meer en preciezer te meten aan personen en hun gedrag, is terughoudendheid geboden.

Big Data is Big Business, en dat is goed. Maar verwerking van data die betrekking heeft op personen, eist kaders. Eén van die kaders moet zijn dat “anonieme” gegevens niet automatisch worden vrijgesteld van de eis van adequate beveiliging. Dat is in de huidige Wet bescherming persoonsgegevens wél het geval, omdat het begrip “herleidbaar tot individuele personen” onvoldoende is uitgewerkt.

Zoals (opnieuw) aangetoond in mijn proefschrift (UvA, 2012), zijn geanonimiseerde gegevens vaak tóch te herleiden tot individuele personen [Koot2012]. In de computerwetenschappen wordt hier al 30 jaar over gesproken. Senior researcher / assistant professor Jaap-Henk Hoepman (Radboud Universiteit en TNO) betoogt dit al voor “pseudonieme” gegevens [Hoepman2013]. Een andere belangrijke expert op dit gebied is prof. Ross Anderson (Cambridge), die vorig jaar kritiek uitte op het plan van de Britse National Health Service om patiëntgegevens “geanonimiseerd” ter hergebruiken zonder toestemming te vragen aan patiënten [Anderson2012]. De eis van toestemming moet niet zomaar, zonder een vervangende bescherming van het individu, overboord worden gegooid met het argument dat die eis kostbaar of moeilijk uitvoerbaar is.

Op het snijvlak tussen privacy en veiligheid is het tijd voor een nieuw sociaal contract, op basis van wederkerigheid: zie bijgevoegd het betoog van prof. Beatrice de Graaf (Leiden) in De Groene Amsterdammer van 11 april 2013.

Op het snijvlak tussen privacy en internetvrijheid sluit ik me aan bij de volgende oproep van Bits of Freedom [BoF2013]:

1. Bescherm alle gegevens die betrekking hebben op internetters;
2. Eis voldoende afgebakende redenen voor de verwerking van die gegevens – zodanig dat oneigenlijk hergebruik wordt voorkomen;
3. Echte toestemming mag niet verstopt zitten in paginalange algemene voorwaarden;
4. No stalking: tracken van internetters mag alleen onder strenge voorwaarden (dit betreft bijvoorbeeld ‘device fingerprinting’ en de in Nederland reeds bekende ‘tracking cookies’);
5. Geef internetters meer controle over hun eigen gegevens.

Ik roep u op persoonlijke vrijheid zeer serieus te nemen, in het belang van de Europese samenlevingen. Omwille van veiligheid, internetvrijheid en sociale verhoudingen.

Vriendelijke groet,
dr. ing. Matthijs Koot

[Koot2012] http://www.nu.nl/binnenland/2841003/anonieme-gegevens-minder-anoniem-dan-gedacht.html
[Anderson2012] http://www.guardian.co.uk/commentisfree/2012/aug/28/code-practice-medical-data-vulnerable
[Hoepman2013] http://blog.xot.nl/2013/04/03/pseudonymous-data-should-not-be-exempted-from-data-protection/
[BoF2013] https://www.bof.nl/europa-protect-my-data/

EOF

Archive of Information Operations (IO) Newsletters

Last updated: 2013-12-19

The US Army Space and Missile Defense Command / Army Forces Strategic Command (SMDC-ARSTRAT) / G39, Information Operations Division publishes the Information Operations (IO) Newsletter. Jeff Harley is the principal force behind the IO Newsletter. In the spirit of LOCKSS, I copy these (unclassified) documents from PhiBetaIota.net (which is run by Robert David Steele / @PhiBetaIota) or from http://usacac.army.mil/cac2/IPO/ and maintain this single-post archive.

As new issues of the IO Newsletter appear, I’ll add them here. Another post I keep updated on this blog is Selected Readings in Cyberwar.

2013

October – December 2013

FILE    = ARSTRAT_IO_Newsletter_v14_no_01.pdf

VOLUME  = 14
NUMBER  = 01
DATE    = October-December 2013

1. How to Fight Cyber War? Estonia Shows The Way
2. Utilizing Social Media during Major Events
3. Google Launches Project Shield Cybersecurity Initiative for ‘Free Expression’
4. U.S.-Style Personal Data Gathering Is Spreading Worldwide
5. How They Think: PME in the Modern PLA
6. CNO Says Navy Needs Ground Forces’ Help On Cyber, Electronic Warfare
7. The Nairobi Attack and Al-Shabab’s Media Strategy
8. South Korea Says North Korea Developing Electromagnetic Pulse Weapons
9. Saudi Experts Boost Their Skills in Electronic Warfare
10. Fighting On the Cyber Battlefield: Weak States and Nonstate Actors Pose Threats
11. US Governmental Information Operations and Strategic Communications: A Discredited Tool or User Failure? Implications for Future Conflict
12. US Senators Warn On Huawei Deal with South Korea
13. Cyberspace Warriors Graduate With Army’s Newest Military Occupational Specialty
14. China Spins New Lesson from Soviet Union’s Fall
15. Drawing Lessons from Zimbabwe’s War of Liberation: Efficacious Use of Propaganda and Violence
16. Cyber Power in the Gulf
17. Inside the Ring: China targets Global Hawk drone
18. Army Reserve Units Earn Top Places
19. SOCOM Web Initiative on Senate Chopping Block

September 2013

FILE    = ARSTRAT_IO_Newsletter_v13_no_10.pdf

VOLUME  = 13
NUMBER  = 10
DATE    = September 2013

1. The Fanciful World of Cyber Warfare
2. Electronic Warfare: The Cat-And-Mouse Game Continues
3. Mysterious Actions of Chinese Satellites Have Experts Guessing
4. Want to See China’s Latest Top-Secret Military Site? Just Google It
5. Redhack Announces Election Software as Its Next Target
6. Can the U.S. and China Get Along in Outer Space?
7. Meet Hidden Lynx: The Most Elite Hacker Crew You’ve Never Heard Of
8. Hacking U.S. Secrets, China Pushes for Drones
9. Metadata May Not Catch Many Terrorists, but It’s Great at Busting Journalists’ Sources
10. Fooled by Certainty
11. One of the Few: The Cultural Support Team
12. Voice of Russia Is a Great Contributor to Freedom Of Expression – British MP
13. US and Turkey to Create Fund to Stem Extremism

July/Augustus 2013

FILE    = ARSTRAT_IO_Newsletter_v13_no_09.pdf

VOLUME  = 13
NUMBER  = 09
DATE    = July/August 2013
TABLE OF CONTENTS

1. British Cops Admit They Monitor Facebook, Twitter
2. Hacking for Change – Could Revealing Cyber Capabilities Prevent Cyber War?
3. Anonymous vs. Los Zetas: The Revenge of the Hacktivists
4. Taiwan a ‘Testing Ground’ for Chinese Cyber Army
5. U.S. Repeals Propaganda Ban, Spreads Government-Made News to Americans
6. House Fails To Kill Pentagon’s Foreign Websites
7. Out of Sight
8. Scenario Puts Energy, Politics in Hackers’ Cross Hairs
9. Private Cyber Retaliation Undermines Federal Authority
10. US Spends $24 Million on ‘Propaganda Plane’ Few Can See or Hear
11. Cyber-Sabotage Is Easy
12. China Launches New Online Portal for Petitioners
13. How the Nature of Warfare is Changing in the Information Age
14. Tweet Offensive: Social Media Is Israeli Military’s Newest Weapon
15. Cyber Attacks in Space
16. Moscow Subway to Use Devices to Read Data on Phones
17. Online Jihad
18. If The Chinese Army Is Trying To Hack A Missouri Water Plant, What Else Is It Infiltrating?
19. NSA Leaks Make Plan for Cyberdefense Unlikely
20. Winning without Fighting: The Chinese Psychological Warfare Challenge
21. China Prepares for Psychological Warfare
22. China Launches Three ASAT Satellites
23. Electronic Warfare Development Targets Fully Adaptive Threat Response Technology
24. Military Education Falls Short on Cybersecurity Training
25. Why It’s Important to Herd the Social Media Sheep
26. Syrian Rebels Also Fighting Al Qaeda, Other Hard-Liners for Villagers’ Hearts and Minds
27. Applications of the Memetic Perspective in Inform and Influence Operations
28. Here’s How One Hacker Is Waging War on the Syrian Government

June 2013

FILE    = ARSTRAT_IO_Newsletter_v13_no_08.pdf

VOLUME  = 13
NUMBER  = 08
DATE    = June 2013
TABLE OF CONTENTS

1. Clearing the Air on Cyber, Electronic Warfare
2. American Gets Targeted by Digital Spy Tool Sold to Foreign Governments
3. US Army Maps Future of the Electronic Battlefield
4. Silent War
5. US Disrupts Al-Qaeda’s Online Magazine
6. Marines Focused At the Tactical Edge of Cyber, Says Commander
7. With Troops and Techies, US Prepares For Cyber Warfare
8. Inside the NSA’s Ultra-Secret China Hacking Group
9. Internet Gurus Fear Iranian Assassins
10. NSA’s Keith Alexander Seeks Cyber Shield For Companies
11. Killing with Kindness: How Foreign Aid Backfires
12. Cyber Careers New Center, School to Bring Signals, Cyber, EW Together
13. “Electronic Warfare is Becoming More Important and More Complex”
14. Tweeting for the Caliphate: Twitter as the New Frontier for Jihadist Propaganda
15. Facebook Being Used To Recruit Indonesians For Terrorist Attacks
16. With Social Media, Middle Classes in Brazil, Turkey Grow Stronger, Angrier
17. Big Pic: How Turkish Protesters Use Google Maps To Track Police

May 2013

FILE    = ARSTRAT_IO_Newsletter_v13_no_07.pdf

VOLUME  = 13
NUMBER  = 07
DATE    = April 2013
TABLE OF CONTENTS

1. Social Banditry and the Public Persona of Joaquín “El Chapo” Guzmán
2. India Sets Up Social Media Monitoring Lab
3. Hacking the News: Information Warfare in the Age of Twitter
4. Information Operations Is Just another Media Format Vying For the Eyes of the Audience
5. China’s Cyberspies Outwit Model for Bond’s Q
6. Getting Inside the Head of Italian PSYOPS: Interview with Colonel Marco Stoccuto
7. Understanding Groupthink
8. Are Military Hackers Targeting Tibetan Activists?
9. DOD Forming Information Operations Executive Steering Group
10. Pentagon: China Views Information Warfare as Key to Countering U.S. Pacific Forces
11. US Directly Blames China’s Military for Cyberattacks
12. Pentagon Warns North Korea Could Become a Hacker Haven
13. Loose Lips: Candid Camera Club Alerts N. Korea of USS Nimitz’s Arrival
14. Why Two Domains Are Better Than One
15. The Problem with Crowdsourcing Intelligence in Syria
16. US Government Becomes ‘Biggest Buyer’ Of Malware
17. How Twitter Is Messing With Al-Qaeda’s Careful PR Machine
18. Chinese University Lab Linked To PLA Cyber Attacks
19. China Conducts Test of New Anti-Satellite Missile
20. New Payload Brings Jamming Capability To An Army UAS For The First Time
21. Communication Systems Subject To Monitoring, OPSEC Reminders
22. US Could Use Cyberattack on Syrian Air Defenses
23. GAO: Military Propaganda Efforts Flawed
24. ¡Dios Mío! Pentagon’s Latest Weapon in Colombian Drug War? Soap Operas
25. Tracking Cyberterrorists
26. US Ill -Prepared For EMP Attack
27. Waging the Cyber War in Syria
28. Globalization Creates a New Worry: Enemy Convergence

April 2013

FILE    = ARSTRAT_IO_Newsletter_v13_no_06.pdf

VOLUME  = 13
NUMBER  = 06
DATE    = April 2013
TABLE OF CONTENTS

1. A Cyber-Survivable Military
2. Redefining Information Operations
3. Command and Control Vulnerabilities to Communications Jamming
4. China’s Internet: A Giant Cage
5. Cat and Mouse: How China Makes Sure Its Internet Abides By the Rules
6. Assessing The Effects – A Curse Disguised As A Blessing?
7. Shutting Down the Internet – Thou Shalt Not Kill
8. Internet Controls in Other Countries
9. Masters of the Cyber-Universe
10. The Great Firewall: The Art of Concealment
11. Electronic Warfare: The Ethereal Future of Battle
12. Why China Is Reading Your Email
13. Making Strategic Sense of Cyber Power: Why the Sky Is Not Falling
14. Six U.S. Air Force Cyber Tools Designated As ‘Weapons’
15. Mexican Social Network Manager Quits Post amid Threats from Drug Traffickers
16. U.S. Military Working to Integrate Cyber Weapons into Commanders’ Arsenals
17. The Explosive Effects of Rumors in Syria and Insurgencies around the World
18. North Korea’s Threats, Campy Videos Drawing Internet Attention
19. Socialism and the Global Information War
20. Training the CAPOC Soldier
21. Combat on the Online Battlefield
22. New Cyber Rules Put Combat Decisions in Soldiers’ Hands
23. Cyber Warriors Association Points to Evolving Battlefield
24. Is Cyber War the New Cold War?
25. Air Force and Army Disclose Budget for Hacking Operations
26. Military Photographers Ready to Deploy Around the Globe
27. Air Force Academy Wins NSA Cyber Defense Title
28. How People in the Middle East Actually Use Social Media
29. New Electronic Warfare Tool Offers Innovative Approach
30. Jihadi Twitter activism – Introduction
31. SPAWAR Leadership on Information Warfare and the Growing Cyber Threat
32. Pentagon Paying China — Yes, China —To Carry Data

February/March 2013

FILE    = ARSTRAT_IO_Newsletter_v13_no_05.pdf

VOLUME  = 13
NUMBER  = 05
DATE    = February/March 2013
TABLE OF CONTENTS

1. 10th Annual Army Global Information Operations Conference
2. North Korea propaganda taken off YouTube after Activision complaint
3. US Said To Be Target of Massive Cyber-Espionage Campaign
4. Electronic Warfare Will Be a Game-Changer in Modern Battle Zone
5. Army Is Gearing Up To Fight the PR War
6. Can Social Media Disarm Syria’s Chemical Arsenal?
7. Propaganda Programs Hard To Justify, Panetta Says
8. Software That Tracks People On Social Media Created By Defence Firm
9. Chinese Army Unit Is Seen As Tied To Hacking Against U.S.
10. Report Ties Cyberattacks on U.S. Computers to Chinese Military
11. Hackers Attack European Governments Using ‘Miniduke’ Malware
12. Top US General in Afghanistan: Taliban Succeeding With Its Messaging
13. The Great Cyberscare
14. Wanted: Ph.D.s Who Can Win a Bar Fight
15. Talking Past Each Other? How Views of U.S. Power Vary between U.S. and International Military Personnel
16. Army Electronic Warfare Evolutionary Path Presented At EW Summit
17. Nazi and Soviet Propaganda’s Shared Aesthetic
18. NATO: U.S.-Israeli Cyberattack On Iran Was ‘Act Of Force’
19. PACOM Promotes Regional Cyber Capabilities, Defenses
20. Information Warfare on the Korean Peninsula
21. How Space and Cyberspace are Merging to Become the Primary Battlefield of the 21st Century
22. AQAP Releases 10th Copy Of Inspire; Features Adam Gadahn
23. Assessing Inspire Magazine’s 10th Edition

January

VOLUME  = 13
NUMBER  = 04
DATE    = January 2013
TABLE OF CONTENTS
1. 10th Annual Army Global Information Operations Conference
2. China’s Space Activities Raising U.S. Satellite Security Concerns
3. ‘Red October’ Cyber-Attack Found By Russian Researchers
4. Influence Operations and the Internet: A 21st Century Issue
5. When the Network Dies
6. Cyber Operations: Bridging from Concept to Cyber Superiority
7. Army Electronic Warfare Goes On The Offensive: New Tech Awaits Approval
8. Army Manual Highlights Role of “Inform and Influence Activities”
9. DoD Looking to ‘Jump the Gap’ Into Adversaries’ Closed Networks
10. President Putin orders FSB to protect media sites from cyber attack

2012

December

VOLUME  = 13
NUMBER  = 03
DATE    = December 2012
TABLE OF CONTENTS
1. Why Your Intuition about Cyber Warfare is Probably Wrong
2. Pentagon Drops ‘Strategic Communication’
3. European Renewable Power Grid Rocked By Cyber-Attack
4. China’s Growing Military Might Obscures the Real Threat of Cyberwar
5. US Official: North Korea Likely Deceived US, Allies Before Launching Rocket
6. Cyber’s Next Chapter: Penetrating Sealed Networks
7. North Korea Steps Up Jamming
8. Information Warfare: Cyber War Tools for the Infantry
9. Unwitting Sensors: How DOD is Exploiting Social Media
10. The Effectiveness of US Military Information Operations In Afghanistan 2001-2010: Why RAND Missed The Point
11. Hacking the Human Brain: The Next Domain of Warfare
12. Cyber Security Hunter Teams Are the Next Advancement in Network Defense
13. Hype and Fear
14. ARCYBER on the Attack on Paper, In Training
15. Electronic Warfare Graduates First To Receive Crested Collar Insignia
16. How to Equip the U.S. Military for Future Electronic Warfare
17. Al-Qaida Hit by Cyber Attack
18. Chinese Hackers Suspected in Cyber Attack on Council on Foreign Relations
19. You Can’t Handle the Truth
20. 10th Annual Army Global Information Operations Conference

November

VOLUME  = 13
NUMBER  = 02
DATE    = November 2012
TABLE OF CONTENTS
1. Israel is Losing the PR War
2. Indonesia’s Cyber Defense Strategy and Its Challenges
3. NATO War Games Set To Begin on November 16, 2012
4. Army Leaders Emphasize Importance of Cyberspace Capabilities
5. US Handoff in Afghanistan Includes Radio Training
6. China Most Threatening Cyberspace Force, U.S. Panel Says
7. Data Triage and the Cyber Age
8. Beyond Battleships and Bayonets
9. Cyber Response’s Fatal Flaw: Mistrust
10. ‘Dagger’ Brigade Electronic Warfare Office Named Best In Army
11. IPO, KC Chiefs Enter Training Partnership
12. Satellite Jammers Turned On
13. Another Tool in the Influencer’s Toolbox: A Case Study
14. US Military behind Africa News Websites
15. Pentagon Propaganda Plan Is Source of Controversy
16. Panetta’s Wrong About a Cyber ‘Pearl Harbor’
17. Why Is Israel Tweeting Airstrikes
18. Psychological Warfare on the Digital Battlefield
19. Testing Novel Effects of Ad Redesign on Customer Willingness to Pay
20. Taipei’s Cyberwarfare Gambit

September/October

VOLUME  = 13
NUMBER  = 01
DATE    = September – October 2012
TABLE OF CONTENTS
1.      Taliban Using Facebook to Lure Aussie Soldier
2.      Army and Marines Creating Systems for Cyber Fire Support
3.      There Goes the Siren of Psy-War
4.      Get Ready For Next Stage of Electronic Warfare: Expert
5.      Coming Soon On Demand: Cyber Weapons
6.      Iran Blocks Access to Gmail
7.      Keeping Nukes Safe from Cyber Attack
8.      Cultural Battlegrounds: Why Culture Matters In Global War on Terror
9.      Cyberwarfare and Combined Arms
10.     U.S. Military Overestimates Value of Offensive Cyberweapons, Expert Says
11.     U.S. Sets Sights on Iran for Its First Official Cyberwar Campaign
12.     The Cyber Debate Goes Public
13.     Growing Chinese Telecoms Threaten US Security
14.     Taliban Demands Unbiased Coverage of Its Attempted Murder of a 14-Year-Old Girl
15.     Boeing Successfully Tests Microwave Missile That Takes Out Electronic Targets
16.     Iran’s Global Cyber War-Room Is Secretly Hosted by Hizballah in Beirut
17.     After Snagging $4.6B Contract, Lockheed Plans ‘Cyber Kill Chain’ For Global Information Grid
18.     The Army Is Building Cyber into Its Combat Exercises
19.     Accolade for Troops’ Community Radio
20.     The Army Wants To Develop a New Generation of Cyber Weapons
21.     Social Engineering & Cyber Security: What Military Leaders Should Take from Kevin Mitnick’s Presentation
22.     Rogers Was Right, DOD-DHS Cyber Info Sharing Program Has Shrunk
23.     Iranians Build up Afghan Clout
24.     The Next Weapon of Mass Destruction Will Probably Be a Thumbdrive
25.     “Game Over” Text to Syrian Rebels – What’s the Message behind the Message?

August

VOLUME  = 12
NUMBER  = 10
DATE    = August 2012
TABLE OF CONTENTS
1.      Disinformation Flies in Syria’s Growing Cyber War
2.      The Nature of China’s Information Operations Strategy
3.      Executives advocate a military approach to cybersecurity
4.      Dysinformatsia redux
5.      Hezbollah Under Attack
6.      For Army’s Electronic Warriors, Greater Foes than Afghanistan’s Await
7.      Pursuing Soft Power, China Puts Stamp on Africa’s News
8.      Pakistan’s Army Steps Up Radio Wars
9.      Pakistani Bloggers Accused of Hate Videos
10.     The Return of Dr. Strangelove
11.     Tagging and Tracking Espionage Botnets
12.     China’s ‘Model Workers’ Head to Cyberspace
13.     Symposium on Ancient Chinese Psychological Warfare held in Beijing
14.     Internet Analysts Question India’s Efforts to Stem Panic
15.     Information Wars: Assessing the Social Media Battlefield in Syria
16.     In Twist, Chinese Company Keeps Syria on Internet
17.     Inside the Ring: Taliban Infiltrate Social Media
18.     North Korean Jamming of GPS Shows System’s Weakness
19.     Army Increases Leader Training on Cyber Threats
20.     ANSF Takes the Lead in Information Fight
21.     US General: We Hacked the Enemy in Afghanistan
22.     Facespook: Russian Spies Order $1mln Software to Influence Social Networks
23.     Software Company Denies Spy Agency Collaboration
24.     Pentagon Fighting Taliban on Social Media Front

June

VOLUME  = 12
NUMBER  = 08
DATE    = June 2012
TABLE OF CONTENTS
1.      Stuxnet: US Can Launch Cyberattacks But Not Defend Against Them, Experts Say
2.      Offensive Information Warfare and Red Teams
3.      Cyber Warfare…Brought To You by J.C. Wylie
4.      Intel Community’s Sharing of Cyber Tools Raises Legal Questions
5.      Netline Launches New, Extremely Small and Accurate, Portable Jamming System to Counter IEDs
6.      Hackers, Bloggers ‘Bunged Cash to Spin For Iran 2.0’
7.      Raytheon to Extend BMS with Social Media Capability
8.      Social Media and Unconventional Warfare
9.      Former Pentagon Analyst Says China Can Shut Down All The Telecom Gear It Sold To The US
10.     When GPS Goes Down, Pentagon Still Wants a Way to Fight
11.     China Tech Company Brags: We Hacked U.S. Telecoms
12.     Transmedia, Emerging Threats, and a Blended Strategy for Training
13.     InfoOps: Measuring Effectiveness
14.     Army’s Top Signal Officer: Everything Is Network Dependent
15.     Lift the Ban on the Domestic Dissemination of U.S. Propaganda
16.     Public Diplomacy as an Instrument of Counterterrorism: A Progress Report
17.     Chip Reports Prompt Congressional Review
18.     Texas Students Hijack a U.S. Government Drone in Midair

May

VOLUME  = 12
NUMBER  = 07
DATE    = May 2012
TABLE OF CONTENTS
1.      Army Cyber Pros Pitch In With Network Evaluation
2.      Platforms and Upgrades Will Change Electronic Warfare
3.      GPS Vulnerable To Hacks, Jamming
4.      Beijing’s Battle Plan
5.      U.S. Seen As Iran ‘Cyberarmy’ Target
6.      File On Hitler’s Mental State Turns Up In Cambridge Home
7.      Profile of Adolf Hitler from 1942 uncovered
8.      Major Cyber Attack Aimed At Natural Gas Pipeline Companies
9.      Afghan National Security Forces Develop Information Operations
10.     Omaha Cast Net That Caught Cyberthieves
11.     Army Wants To Monitor Your Computer Activity
12.     A Clunky Cyberstrategy
13.     Us Army Cyber Command Has Never Seen A Cyber Attack
14.     Video: Chinese Information Warfare seminar
15.     Adm. McRaven Defends U.S. Information Operations Overseas
16.     China ‘Pursuing Steady Military Build-Up’
17.     Winning Without Fighting: Chinese Legal Warfare
18.     Read No Evil – Senior Censor Defends Work, Denies Playing Big Brother
19.     NORAD, NORTHCOM Launch Joint Cyber Division
20.     Army Cyber Talks Strategic Vision, Operations with Swedish Delegation
21.     Hillary Clinton Confirms US Al-Qa’ida Cyber Attack
22.     Meet ‘Flame’, The Massive Spy Malware Infiltrating Iranian Computers
23.     21st Century Chinese Cyber Warfare
24.     A Quiet Opening: North Koreans in a Changing Media Environment
25.     The ‘Art of Clandestine Courier Delivery’ Helped Bin Laden Stay Hidden for So Long
26.     Iran Deploys the Photoshop Weapon

April

VOLUME  = 12
NUMBER  = 06
DATE    = April 2012
TABLE OF CONTENTS
1.      Al-Qaeda’s Online Forums Go Dark for Extended Period
2.      Debate Rages over Hacking Jihadist Websites
3.      Electric Dragons – Airborne Electronic Warfare Capabilities in China
4.      ‘Azerbaijan Actively Joined Information Warfare’
5.      Cyber War Will Not Take Place
6.      Designer Satellite Collisions from Covert Cyber War
7.      Al Hurra: An Eye on Democracy
8.      U.S. Navy Focus Shifts To Asia-Pacific
9.      What does #NTVlies Really Mean?
10.     Global Briefing: Russian Politics Moves Online
11.     Zombie Followers and Fake Re-Tweets
12.     The Anatomy of a Coup Rumour
13.     The Inconvenient Astrologer of MI5
14.     We Can Hear You Thugs
15.     US And China Engage In Cyber War Games

March

VOLUME  = 12
NUMBER  = 05
DATE    = March 2012
TABLE OF CONTENTS
1.      U.S. ‘Info Ops’ Programs Dubious, Costly
2.      Conference Expects Slow Transition to Laser Weapons
3.      US Army Warns About The Risks Of Geotagging
4.      The 2006 “Divorce” of US Army Reserve and Active Component Psychological Operations Units – A Re-Examination
5.      Cyber Snoopers Target NATO Commander in Facebook Attack
6.      China, U.S. Chase Air-to-Air Cyberweapon
7.      BBC Persian Service Suffers Sophisticated Cyber Attack
8.      More Satellites Means More SATCOM Gridlock
9.      Historic Cyber Unit Begins Daily Action
10.     Syria E-Mail Hack Points to New Level Of “Information War”
11.     Three Little Pigs As Exposed by News and Social Media
12.     Tweeting the Taliban: Social Media’s Role in 21st Century Propaganda
13.     Fort Campbell’s 101st Combat Aviation Brigade uses Electronic Warfare to help Soldiers on the Ground
14.     Russia Considering Cyber-Security Command
15.     Cybersecurity, Marine Corps Style
16.     The Coming Cyberwar with Iran?
17.     China’s Twitter War
18.     Cyber and Drone Attacks May Change Warfare More Than the Machine Gun
19.     Giant Telco Banned Due To Cyber Attack Concerns
20.     SecAF: Cyberspace is an Air Force priority
21.     Taliban Offers Online Questions and Answers
22.     Should US Worry About North Korea’s Cyber Attack Capability?
23.     ‘Every Major Company in The U.S. Has Been Hacked By China’: Cyber-Espionage Warning From U.S Security Chief Who Warned Of 9/11

February

VOLUME  = 12
NUMBER  = 04
DATE    = February 2012
TABLE OF CONTENTS
1.      9th Annual Army Global Information Operations Conference
2.      China Seeks to Vigorously Develop Battlefield Network Warfare Capacity
3.      The Future of Influence in Warfare
4.      Cloud computing to integrate with current Army system
5.      Report: Army network tests failed to adequately assess mobile operations
6.      Plant DNA Helps the Pentagon Identify Fake Electronic Components
7.      Chinese Communists Influence U.S. Policy Through Ex-Military Officials
8.      Malaysia’s Islamic Party Hails Iran’s Progress in Electronic Warfare
9.      Is China a Paper Tiger in Cyberspace?
10.     U.S. Could Maintain Virtual Presence in Syria
11.     Battle for Syria Rages across the Internet
12.     Iran – Death for Blogging
13.     A Fatal Tweet
14.     A Primer of Copyright Rules, Regulations, and Risks in Writing for Information Operations Publications
15.     The 50 Ruble Army
16.     Jihadi Information Warfare: The Next Wave
17.     DIA Director Reveals China’s Villainous Capabilities In Space
18.     In Attack on Vatican Web Site, a Glimpse of Hackers’ Tactics
19.     Anonymous, It Could Become a Cyber Weapon
20.     Report: Internet Radicalizes U.S. Muslims Quickly
21.     When Is A Cyberattack A Matter Of Defense?
22.     Quran Burning a PSYOP Failure in Afghanistan
23.     Psychological Warfare Must Precede Strike on Iran
24.     U.S. Should Not Follow China’s Example in Merging Cyber and Electronic Warfare Efforts

December 2011/January 2012

VOLUME  = 12
NUMBER  = 03
DATE    = December 2011/January 2012
TABLE OF CONTENTS
1.      9th Annual Army Global Information Operations Conference
2.      A Speed Bump for Pentagon’s Information Ops
3.      Special Forces Get Social in New Psychological Operation Plan
4.      Hazards of Perception Management
5.      Does Social Media Help or Hurt Terrorism?
6.      All Quiet on the Western Front
7.      Who sent a false text message saying cash benefits will no longer be paid to Iranians?
8.      Cyberspat Erupts As Baku-Tehran Relations Become Increasingly Strained
9.      SPAWAR Recognizes Space Cadre at Information Dominance Warfare Officer Pinning Ceremony
10.     In the Middle East, Cyberattacks Are Flavored with Political Rhetoric
11.     SCADA Systems in Railways Vulnerable to Attack
12.     Twitter Able To Censor Tweets in Individual Countries
13.     Taliban Folklore in Pakistani Media
14.     Iran Mounts New Web Crackdown
15.     Call For Cyberwar ‘Peacekeepers’
16.     The Strategic Communication of Unmanned Warfare
17.     57% Believe a Cyber Arms Race is Currently Taking Place, Reveals McAfee-Sponsored Cyber Defense Report
18.     In Battle for Hearts And Minds, Taliban Turn To CDs
19.     Can U.S. Deter Cyber War?
20.     Supremacy in cyberspace: Obama’s ‘Star Wars’?
21.     Chinese Tech Giant Aids Iran
22.     China Likely to Go Asymmetric if Conflict Breaks out with United States

2011

November

FILE    = ARSTRAT-IO-Newsletter-v12-no-02.docx

VOLUME  = 12
NUMBER  = 02
DATE    = November 2011
TABLE OF CONTENTS
1.      The First Rule of Twitter Fight Club: Everyone Re-tweets Twitter Fight Club
2.      Stuxnet Raises ‘Blowback’ Risk in Cyberwar
3.      Assassination Backlash
4.      China’s Cyber-Warfare Capabilities Are ‘Fairly Rudimentary’
5.      No Other Nation Has Anything Like It
6.      Feds Cite Chinese Cyber Army Capability
7.      China scorns U.S. cyber espionage charges
8.      Fighting in the Fifth Dimension
9.      NATO Turns To Radio to Try and Get Its Own Message to Afghan People
10.     DRDO Developing a Futuristic E-Bomb
11.     CIA following Twitter, Facebook
12.     Speculation Continues Over Hezbollah’s Ability To Disable Israeli Drones
13.     Beijing’s electronic Pearl Harbor
14.     Cyberwar Most Likely to Take Place Among Smaller Powers, Experts Say
15.     Canada puts up $477 million to foil cyber attacks
16.     Turkey Centralizes Efforts for National Cyber Security
17.     Cyber Terror
18.     First Look: Electronic Warfare Missile
19.     U.S. Works to Counter Electronic Spy Risks

October

VOLUME  = 12
ISSUE   = 01
DATE    = October 2011
TABLE OF CONTENTS
1.      Electronic Warfare Is More than Jamming IEDs
2.      Crowdsourcing Democracy through Social Media
3.      Coast Guard Cyberdefense Office: Small but Mighty
4.      U.S. cyberweapons had been considered to disrupt Gaddafi’s air defenses
5.      US Air Force Wins U.S. National Cybersecurity Innovation Award
6.      The Next Generation Jammer Will Not Be Used For Cyber Warfare
7.      US General: Communications with Pakistan on cross-border operations inconsistent but improving
8.      Chinese Military Suspected in Hacker Attacks on U.S. Satellites
9.      Twitter war with the Taliban
10.     Internet Censorship Growth Hampers News, Study Says
11.     Creech Drone Virus Infection Accidental, STRATCOM Commander Says
12.     Suspected US satellite hacking attacks: Reaction
13.     How Electronic Warfare Is Redefining the Battlefield
14.     China Denies It Is Behind Hacking Of U.S. Satellites
15.     Hacks make large-scale sabotage possible
16.     Army Sees Cyber Threats As Imminent
17.     Geospatial Information Authority targeted in cyber attack: Maeda
18.     Third Army conducts public affairs, military information support operations seminar for LAF

January

VOLUME  = 11
ISSUE   = 01
DATE    = January 2011
TABLE OF CONTENTS
1.      Eighth Annual US Army Global Information Operations Conference
2.      Navy Intel Chief: Information Dominance Must Balance Firepower
3.      Cyberwar Case Study: Georgia 2008
4.      China and its Double-edged Cyber-sword
5.      India Self-Sufficient In Electronic Warfare: DRDO Chief
6.      Hacker Attack Greets Kim Jong Un on His Birthday
7.      PLA’s Psywar Against US
8.      Running For Linux
9.      Armenia Concerned over Expansion of Azerbaijan’s Information Coverage Abroad
10.     Viewpoint: A New Sino-US High-Tech Arms Race?
11.     Gates: Chinese Taking Strategic Dialogue Proposal Seriously
12.     Geotags Can Compromise Operations Security, Officials Say
13.     Senators Say Military Cyber Ops Not Disclosed
14.     A New Role for Jihadi Media
15.     Electronic Warfare Course Ramps Up At CGSC
16.     New HASC Chair Plans To Reorganize Committee
17.     The Limits of Stuxnet
18.     Show of Strength Urged For Cyberwar
19.     Dominance in Cyberspace Could Be a Losing Battle
20.     FBI Executes Search Warrants in Probe of Pro-Wikileaks Cyber Attacks
21.     Officials: US Better At Finding Cyber Attackers
22.     From Bullets to Megabytes
23.     Obama Needs To Address Our Cyber-Warfare Gap with China
24.     Beware the Cyber War Boomerang?
25.     This Week at War: Lessons from Cyberwar I

2010

January

VOLUME  = 10
ISSUE   = 06
DATE    = 5 – 25 January 2010
TABLE OF CONTENTS
1.      Service Members Bring Electronic Warfare to the Ground in Iraq
2.      The Truth Is Out There: Responding To Insurgent Disinformation and Deception Operations
3.      ‘Voice of the Pech’ connects Manogai residents
4.      Spymaster sees Israel as world cyberwar leader
5.      PSYOP Food For Thought from the US Civil War
6.      BLOG: Many Flavors of Jam
7.      Chinese Perspectives on Google-China Standoff
8.      Australia Responds To Threats of Internet War
9.      Senior General Says US Needs to Move Faster on Cyber Defense
10.     DoD “Clarifies” Doctrine on Psychological Operations
11.     New Threats Compel DOD to Rethink Cyber Strategy
12.     IDF Sets Up ‘Facebook’ Unit to Plug Media Leaks
13.     Lynn Lists Aerospace, Cyber-Age Challenges
14.     spies@work
15.     Clinton: Internet ‘Information Curtain’ Is Dropping
16.     China Tried To Hack India’s Computers: Narayanan
17.     Beijing Accuses U.S. Of Cyberwarfare
18.     In Digital Combat, U.S. Finds No Easy Deterrent
19.     Chinese Media hit At ‘White House’s Google’
20.     Taliban Overhaul Image to Win Allies
21.     Air Force Cyber Numbered Air Force Achieves Initial Operational Capability
22.     “Internet Freedom” And “Smart Power” Diplomacy
23.     Winning the Ground Battles but Losing the Information War
24.     Winning the Battle – Losing The War

January

VOLUME  = 10
ISSUE   = 05
DATE    = 17 December 2009 – 4 January 2010
TABLE OF CONTENTS
1.      Air Force Cyber-security Unit Prepares Operations
2.      It’s Like Slate for Terrorists
3.      Anatomy of a Cyber-Espionage Attack, likely by the Chinese Military
4.      Military leaders accelerate C4ISR integration
5.      Cold war enemies Russia and China launch a cyber attack every day
6.      New report says ‘cyber warfare’ has become a reality
7.      Cyberwar: Can the Government Adapt?
8.      Debate Continues Over Cyber Protection, NSA Role
9.      An introduction to the FBI’s anti-cyber crime network
10.     NSA Official Addresses AFCEA Solutions Conference
11.     NSA To Build $1.5 Billion Cybersecurity Data Center
12.     NSA’s Public Relations Spinmeisters
13.     Pentagon Computer-Network Defense Command Delayed By Congressional Concerns
14.     Preparing For A Cyber Attack
15.     Prioritizing U.S. Cybersecurity
16.     U.S. Cyber Command-Too Little, but Not Too Late
17.     Why the U.S. Won’t Pull a Brazil—Yet
18.     New IDF unit to fight enemies on Facebook, Twitter
19.     Information Operations Primer (AY10 Edition, Nov 09)
20.     Should the U.S. Destroy Jihadist Websites?
21.     Insurgents Hack U.S. Drones

EOF

Ten Rules for Cyber Security (Eneken Tikk, 2011)

Eneken Tikk is currently associated with the International Institute for Strategic Studies (IISS), and was project coordinator for the Tallinn Manual on the International Law Applicable to Cyber Warfare. In Ten Rules for Cyber Security (.pdf), an article published in Survival vol. 53, no. 3, 2011, Tikk identifies ten rules focused on issues and working solutions in cyber conflict. Although Tikk’s understanding has undoubtedly advanced since 2011, those rules remain relevant and useful as input for thought/debate. Partially as a reminder to myself, I hereby list Tikk’s ten rules:

  1. The Territoriality Rule: Information infrastructure located within a state’s territory is subject to that state’s territorial sovereignty.
  2. The Responsibility Rule: The fact that a cyber attack has been launched from an information system located in a state’s territory is evidence that the act is attributable to that state.
  3. The Cooperation Rule: The fact that a cyber attack has been conducted via information systems located in a state’s territory creates a duty to cooperate with the victim state.
  4. The Self-Defence Rule: Everyone has the right to self-defence.
  5. The Data Protection Rule: Information infrastructure monitoring data are perceived as personal unless provided for otherwise (the prevalent interpretation in the EU).
  6. The Duty of Care Rule: Everyone has the responsibility to implement a reasonable level of security in their information infrastructure.
  7. The Early Warning Rule: There is an obligation to notify potential victims about known, upcoming cyber attacks.
  8. The Access to Information Rule: The public has a right to be informed about threats to their life, security and well-being.
  9. The Criminality Rule: Every nation has the responsibility to include the most common cyber offences in its substantive criminal law.
  10. The Mandate Rule: An organisation’s capacity to act (and regulate) derives from its mandates.

Feel free to comment. (Please read Eneken’s article before commenting.)

Reading Notes: “The Flaw of Averages” (Savage, 2009)

I just finished reading The Flaw of Averages – Why We Underestimate Risk in the Face of Uncertainty (2009) by Sam Savage, a professor at Stanford. The author states on his website that “[s]imply stated, the Flaw of Averages implies that”:

Plans based on average conditions are wrong on average.

The book deals with uncertain numbers (e.g. how many sales will product X have per month in the next year?), and more specifically, the erroneous forecasting of uncertain numbers due to incorrect use of averages. Savage distinguishes two forms of the Flaw of Averages:

  • Weak Form of the Flaw of Averages: using a single number (or regression line) in forecasting future values of an uncertain number, instead of taking into account the distribution of possible outcomes;
  • Strong Form of the Flaw of Averages: also screwing up the average itself. From page 83: “Consider a drunk staggering down the middle of a busy highway and assume that his average position is the centerline. Then the state of the drunk at his average position is alive, but on average he’s dead.”

Pages 130–132 list the Seven Deadly Sins of Averaging, which were first published in the article Probability Management in ORMS Today in 2006. In fact, the list has grown beyond seven since then. But Savage states on page 130:

I plan to go on calling them the Seven Deadly Sins regardless of how long the list becomes. Be sure to check in at FlawOfAverages.com to see where it stands today.

Both the 2009 edition of his book and today’s version of the website list twelve sins. Both lists reference scenarios explained elsewhere in the book. Therefore, I will quote sins 1 to 7 from the self-contained ORMS Today article; I will quote sins 8 to 12 from the book, and/or refer within []’s to online resources of my choice.

  • The Family with 1 1/2 Children: Often the “average” scenario, like the “average” family with 1 1/2 children, is non-existent. For example, a bank may have two main groups of young customers — students with an average income of $10,000 and young professionals with an average income of $70,000. Would it make sense for the bank to design products or services for customers with the average income of $40,000?
  • Why Everything is Behind Schedule: Imagine a software project that requires 10 separate subroutines to be developed in parallel. The time to complete each subroutine is uncertain and independent, but known to average three months, with a 50 percent chance of being over or under. It is tempting to estimate the average completion time of the entire project as three months. But for the project to come at three months or less, each of the 10 subroutines must be completed at or below its average duration. The chance of this is the same as flipping 10 sequential heads with a fair coin, or less than one in a thousand!
  • The Egg Basket: Consider putting 10 eggs all in the same basket, versus one by one in separate baskets. If there is a 10-percent chance of dropping any particular basket, then either strategy results in an average of nine unbroken eggs. However, the first strategy has a 10-percent chance of losing all the eggs, while with the second, there is only one chance in 10 billion of losing all the eggs.
  • The Risk of Ranking: It is common when choosing a portfolio of capital investment projects to rank them from best to worst, then start at the top of the list and go down until the budget has been exhausted. This flies in the face of modern portfolio theory, which is based on the interdependence of investments. According to the ranking rule, fire insurance is a ridiculous investment because on average it loses money. But insurance doesn’t look so bad if you have a house in your portfolio to go along with it.
  • Ignoring Restrictions: Consider a capital investment in infrastructure sufficient to provide capacity equal to the “average” of uncertain future demand. It is common to assume that the profit associated with average demand is the average profit. This is generally false. If actual demand is less than average, clearly profit will drop. But if demand is greater than average, the sales are restricted by capacity. Thus, there is a downside without an associated upside, and the average profit is less than the profit associated with the average demand.
  • Ignoring Optionality: Consider a petroleum property with known marginal production costs and an uncertain future oil price. It is common to value such a property based on the “average” oil price. If oil price is above average, the property is worth a good deal more. But if the price drops below the marginal cost of production, the owners have the option to halt production. Thus, there is an upside without an associated downside, and the average value is greater than the value associated with the average oil price. (…)
  • The Double Whammy: Consider a perishable inventory of goods with uncertain demand, in which the quantity stocked is the “average” demand. If demand exactly equals its average, then there are no costs associated with managing the inventory. However, if demand is less than average then there will be spoilage costs, and if demand is greater than average there will be lost sales costs. So the cost associate with average demand is zero, but average cost is positive.
  • The Flaw of Extremes: In bottom-up budgeting, reporting the 90th percentile of cash needs leads to ever thicker layers of unnecessary cash as the figures are rolled up to higher levels. Even more harmful things result from focusing on above- or below-average results, such as test scores or health-related statistics. (…) [From p138: T]he flaw of extremes results from focusing on abnormal outcomes such as 90th percentiles, worse than average cancer rates, or above average test scores. Combining or comparing such extreme outcomes can yield misleading results. (…) The smaller the sample size, the greater the variability of the average of that sample.
  • Simpson’s Paradox: [see Simpson’s Paradox (Wikipedia) and Chapter 18 online supplement]
  • The Scholtes Revenue Fallacy: [From p146: T]he Scholtes Revenue Fallacy occurs when revenue is the result of multiplying two uncertain numbers, such as (…) price and quantity. If the two uncertain numbers are inversely (negatively) interrelated, the average revenue is less than the revenue associated with the average uncertainties. If the two uncertain numbers are directly (positively) interrelated, the average revenue is greater than the revenue associated with the average uncertainties.
  • Taking credit for chance occurrences: We all like to take credit for our hard work, but some successes may be due to dumb luck. (…) [This is about null hypothesis (statistical) testing. See  Statistical hypothesis testing (Wikipedia) and Chapter 20 online supplement]
  • Believing there are only eleven deadly sins: The twelfth of the Seven Deadly Sins is being lulled into a sense of complacency, thinking you now know all of the insidious effects of averages.

Sam Savage did a great job: The Flaw of Averages is written in an amusing and down-to-earth style, and is a worthy read. If you don’t like mathematics, rest assured: no mathematical background or skill are required to enjoy it.

Further reading on statistics:

EOF

 

The Affirmation of Humanism: A Statement of Principles (Paul Kurtz)

UPDATE 2014-12-09: some readers may also want to check out the Reality of Morality project by The Brights Network (@TheBrightsNet), that provides an overview of scientific perspectives on human morality. And the accompanying list of 97 scientific studies that substantiate claims of morality’s natural origins.

In salute to skepticism and secular humanism — while respecting others worldviews —, I care to share The Affirmation of Humanism: A Statement of Principles, as published in 1997 by Paul Kurtz (1925-2012). Kurtz was a philosophy professor, a prominent American skeptic and secular humanist, and one of the greatest voices of reason in the last four decades. We owe the existence of the Council for Secular Humanism (known of the Free Inquiry magazine) and the Committee for Skeptical Inquiry (known of Skeptical Inquirer magazine) to many great minds, and Kurtz was one of the most prevalent among them. If you enjoy science & reason, consider subscribing to Free Inquiry and/or Skeptical Inquirer.

  • We are committed to the application of reason and science to the understanding of the universe and to the solving of human problems.
  • We deplore efforts to denigrate human intelligence, to seek to explain the world in supernatural terms, and to look outside nature for salvation.
  • We believe that scientific discovery and technology can attribute to the betterment of human life.
  • We believe in an open and pluralistic society and that democracy is the best guarantee of protecting human rights from authoritarian elites and repressive majorities.
  • We are committed to the principle of the separation of church and state.
  • We cultivate the arts of negotiation and compromise as a means of resolving differences and achieve mutual understanding.
  • We are concerned with securing justice and fairness in society and with eliminating discrimination and intolerance.
  • We believe in supporting the disadvantaged and the handicapped so that they will be able to help themselves. We attempt to transcend divisive parochial loyalties based on race, religion, gender, nationality, creed, class, sexual orientation , or ethnicity, and strive to work together for the common good of humanity.
  • We want to protect and enhance the earth to preserve it for future generations, and to avoid inflicting needless suffering on other species.
  • We believe in enjoying life here and now and in developing our creative talents to their fullest.
  • We believe in the cultivation of moral excellence.
  • We respect the right to privacy. Mature adults should be allowed to fulfill their aspiration, to express their sexual preferences, to exercise reproductive freedom, to have access to comprehensive and informed health-care, and to die with dignity.
  • We believe in the common moral decencies: altruism, integrity, honesty, truthfulness, responsibility. Humanist ethics is amenable to critical, rational guidance. There are normative standards that we discover together. Moral principals are tested by their consequences.
  • We are deeply concerned with the moral education of our children. We want to nourish reason and compassion. We are engaged by the arts no less than by sciences.
  • We are citizens of the universe and are excited by discoveries still to be made in the cosmos.
  • We are skeptical of untested claims to knowledge, and are open to novel ideas and seek new departures in our thinking.
  • We affirm humanism as a realistic alternative to theologies of despair and ideologies of violence and a source of rich personal significance and genuine satisfaction in the service to others.
  • We believe in optimism rather than pessimism, hope rather than despair, learning in the place of dogma, truth instead of ignorance, joy rather than guilt or sin, tolerance in the place of fear, love instead of hatred, compassion over selfishness, beauty instead of ugliness, and reason rather than blind faith or irrationality.
  • We believe in the fullest realization of the best and noblest that we are capable of as human beings.

EOF

The Curious Case of 42.0.20.80

UPDATE 2013-09-xx: slides (.pdf, Sep 2013) made and presented by @Yafsec at BruCON 2013.

UPDATE 2013-03-10: everything is caused by this bug in dproxy, a caching DNS proxy that runs on the Conceptronic C54APRB2+ router. Tip of the hat to the anonymous commenter who suggested this!

UPDATE 2012-12-27: here is small Python script written by @Yafsec that, given a hostname, shows how gethostbyname() would misinterpret resolved IPv6 addresses as IPv4 addresses. 

A friend told me that his computer was periodically unable to connect to Google while still being able to connect to other websites. I recently was at his place when the problem occurred again and I decided to take a look. I started tcpdump, directed Firefox to www.google.com and observed his system sending SYN-packets to tcp/80 and tcp/443 at IPv4 address 42.0.20.80. Indeed, on my friend’s system, host resolved www.google.com to that address:

$ host -t a www.google.com
www.google.com has address 42.0.20.80

A whois query revealed that 42.0.20.80 is not part of Google’s address space, but of address space allocated to China Telecom:

inetnum:        42.0.16.0 – 42.0.23.255
netname:        CHINANET-GD
descr:          CHINANET Guangdong province network
descr:          Data Communication Division
descr:          China Telecom
country:        CN
admin-c:        CH93-AP
tech-c:         IC83-AP
status:         ALLOCATED PORTABLE
notify:         […redacted…]
remarks:        service provider
changed:        […redacted…] 20110412
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-GD
mnt-irt:        IRT-CHINANET-CN
source:         APNIC

[…]

A search engine query for 42.0.20.80 revealed a few online messages posted in 2009, 2010, 2011 and 2012 that mention 42.0.20.80 in varying contexts involving connectivity problems. It is associated with (at least) the following hostnames, and observed on various OS’s:

  • talk.google.comhere
  • www.google.comhere
  • dl-ssl.google.comhere
  • v8.lscache4.c.youtube.comhere
  • www.picasaweb.google.comhere

Next, I asked on Twitter:

What’s up with @Google domains incidentally resolving to 42.0.20.80, owned by China Telecom (Guangdong)? Is that bonafide?

@Yafsec (Edwin van Andel) replied:

@mrkoot If the resolver uses gethostbyname, it expects ipv4. When on ipv6 it apparently uses the first 4 bytes of the ipv6 address as ipv4.

Indeed, an AAAA record exists for www.google.com, as it does for many other Google domains:

$ host -t aaaa www.google.com
www.google.com has IPv6 address 2a00:1450:4013:c00::63

….but I only now noticed that the first four bytes of that address, 2a00:1450, hexadecimally represent 42.0.20.80!

After further testing, my suspicion shifted to the router: a Conceptronic C54APRB2+ that runs firmware dating back to 2008 (no firmware update is available). Eventually I learned that the problem can be reproduced with the help of ipv6.l.google.com.  The first step is to run a lookup for A records for that label (which do not exist):

$ host -t a ipv6.l.google.com
ipv6.l.google.com has no A record

15:41:11.460855 IP (tos 0x0, ttl 64, id 50854, offset 0, flags [none], proto UDP (17), length 63)
192.168.1.2.51965 > mygateway1.ar7.domain: [udp sum ok] 50896+ A? ipv6.l.google.com. (35)
0x0000:  4500 003f c6a6 0000 4011 30b4 c0a8 0102  E..?….@.0…..
0x0010:  c0a8 0101 cafd 0035 002b 1a4c c6d0 0100  …….5.+.L….
0x0020:  0001 0000 0000 0000 0469 7076 3601 6c06  ………ipv6.l.
0x0030:  676f 6f67 6c65 0363 6f6d 0000 0100 01    google.com…..
15:41:11.484512 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 113)
mygateway1.ar7.domain > 192.168.1.2.51965: [udp sum ok] 50896 q: A? ipv6.l.google.com. 0/1/0 ns: l.google.com. [1m] SOA ns1.google.com. dns-admin.google.com. 1507162 900 900 1800 60 (85)
0x0000:  4500 0071 0000 4000 4011 b728 c0a8 0101  E..q..@.@..(….
0x0010:  c0a8 0102 0035 cafd 005d 862e c6d0 8180  …..5…]……
0x0020:  0001 0000 0001 0000 0469 7076 3601 6c06  ………ipv6.l.
0x0030:  676f 6f67 6c65 0363 6f6d 0000 0100 01c0  google.com……
0x0040:  1100 0600 0100 0000 3c00 2603 6e73 31c0  ……..<.&.ns1.
0x0050:  1309 646e 732d 6164 6d69 6ec0 1300 16ff  ..dns-admin…..
0x0060:  5a00 0003 8400 0003 8400 0007 0800 0000  Z……………
0x0070:  3c                                       <

The second step is to run a lookup for AAAA records for that label, which yields an IPv6 address (the highlighted bytes are the last 16 bytes of the DNS ‘answer section’ that correspond to the IPv6 address 2a00:1450:400c:c05::68):

$ host -t aaaa ipv6.l.google.com
ipv6.l.google.com has IPv6 address 2a00:1450:400c:c05::68

15:41:11.504818 IP (tos 0x0, ttl 64, id 24467, offset 0, flags [none], proto UDP (17), length 63)
192.168.1.2.62353 > mygateway1.ar7.domain: [udp sum ok] 9696+ AAAA? ipv6.l.google.com. (35)
0x0000:  4500 003f 5f93 0000 4011 97c7 c0a8 0102  E..?_…@…….
0x0010:  c0a8 0101 f391 0035 002b 77a8 25e0 0100  …….5.+w.%…
0x0020:  0001 0000 0000 0000 0469 7076 3601 6c06  ………ipv6.l.
0x0030:  676f 6f67 6c65 0363 6f6d 0000 1c00 01    google.com…..
15:41:11.528881 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 91)
mygateway1.ar7.domain > 192.168.1.2.62353: [udp sum ok] 9696 q: AAAA? ipv6.l.google.com. 1/0/0 ipv6.l.google.com. [5m] AAAA 2a00:1450:400c:c00::68 (63)
0x0000:  4500 005b 0000 4000 4011 b73e c0a8 0101  E..[..@.@..>….
0x0010:  c0a8 0102 0035 f391 0047 cca2 25e0 8180  …..5…G..%…
0x0020:  0001 0001 0000 0000 0469 7076 3601 6c06  ………ipv6.l.
0x0030:  676f 6f67 6c65 0363 6f6d 0000 1c00 01c0  google.com……
0x0040:  0c00 1c00 0100 0001 2c00 102a 0014 5040  ……..,..*..P@
0x0050:  0c0c 0000 0000 0000 0000 68              ……….h

The third and last step is to repeat the first lookup, and establish that it now “succeeds”, in that an A-record (that does not actually exist) is returned with IPv4 address 42.0.20.80:

$ host -t a ipv6.l.google.com
ipv6.l.google.com has address 42.0.20.80

 15:41:11.550621 IP (tos 0x0, ttl 64, id 15024, offset 0, flags [none], proto UDP (17), length 63)
192.168.1.2.50255 > mygateway1.ar7.domain: [udp sum ok] 45480+ A? ipv6.l.google.com. (35)
0x0000:  4500 003f 3ab0 0000 4011 bcaa c0a8 0102  E..?:…@…….
0x0010:  c0a8 0101 c44f 0035 002b 3622 b1a8 0100  …..O.5.+6″….
0x0020:  0001 0000 0000 0000 0469 7076 3601 6c06  ………ipv6.l.
0x0030:  676f 6f67 6c65 0363 6f6d 0000 0100 01    google.com…..
15:41:11.555103 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 79)
mygateway1.ar7.domain > 192.168.1.2.50255: [udp sum ok] 45480- q: A? ipv6.l.google.com. 1/0/0 ipv6.l.google.com. [2h46m40s] A 42.0.20.80 (51)
0x0000:  4500 004f 0000 4000 4011 b74a c0a8 0101  E..O..@.@..J….
0x0010:  c0a8 0102 0035 c44f 003b 42db b1a8 8100  …..5.O.;B…..
0x0020:  0001 0001 0000 0000 0469 7076 3601 6c06  ………ipv6.l.
0x0030:  676f 6f67 6c65 0363 6f6d 0000 0100 01c0  google.com……
0x0040:  0c00 0100 0100 0027 1000 042a 0014 50    …….’…*..P

So, it appears that the router stored the first four bytes of the just-received IPv6 address and now answers the A lookup from its cache.

A second observation is that after the initial AAAA lookup, repeat AAAA lookups break, in that the response does not contain a DNS ‘answer section’ at all (=malformed):

$ host -t aaaa ipv6.l.google.com
;; Warning: Message parser reports malformed message packet.
ipv6.l.google.com has no AAAA record
 

15:41:54.578422 IP (tos 0x0, ttl 64, id 60328, offset 0, flags [none], proto UDP (17), length 63)
192.168.1.2.53570 > mygateway1.ar7.domain: [udp sum ok] 64254+ AAAA? ipv6.l.google.com. (35)
0x0000:  4500 003f eba8 0000 4011 0bb2 c0a8 0102  E..?….@…….
0x0010:  c0a8 0101 d142 0035 002b c4d8 fafe 0100  …..B.5.+……
0x0020:  0001 0000 0000 0000 0469 7076 3601 6c06  ………ipv6.l.
0x0030:  676f 6f67 6c65 0363 6f6d 0000 1c00 01    google.com…..
15:41:54.583505 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 63)
mygateway1.ar7.domain > 192.168.1.2.53570: [udp sum ok] 64254- q: AAAA? ipv6.l.google.com. 1/0/0 [|domain]
0x0000:  4500 003f 0000 4000 4011 b75a c0a8 0101  E..?..@.@..Z….
0x0010:  c0a8 0102 0035 d142 002b 44d7 fafe 8100  …..5.B.+D…..
0x0020:  0001 0001 0000 0000 0469 7076 3601 6c06  ………ipv6.l.
0x0030:  676f 6f67 6c65 0363 6f6d 0000 1c00 01    google.com…..

Looking further into this issue, I found the following posts:

As @Yafsec told me, it is suggested that gethostbyname() should not be used anymore, and that getaddrinfo() or getipnodebyname() should be used instead. My best guess from all this is that my friend’s router uses the gethostname()— and that he should buy a new router.

The curious case of 42.0.20.80 is now solved, but questions come to mind:

  • How many routers currently in operation have this bug?
  • How often does misinterpretation of IPv6[0-3] as IPv4 take place?
  • Could this bug be abused?
    • Improbably, to collect credentials/cookies for Google services, 42.0.20.80 could host spoofed versions of Google/Youtube/etc. To avoid detection, it would answer on port 80/443 only during a short time window and/or only to specific IP ranges. (Password re-use, misuse value of private e-mail communications, yada yada yada.)
  • What other services (besides Google) run IPv6 and could have users experiencing this?

EOF

AOC Professional Reading List 2012

The Association of Old Crows (AOC) surveyed Crows on their favorite books to form an “AOC Professional Reading List”. The results are in. Here are the Top 5 EW Books, Top 3 IO Books and Top 2 Great Reads:

  1. EW 101, EW 102, and EW 103 – Dave Adamy
  2. Introduction to Radar Systems – Merrill Skolnik
  3. Introduction to Airborne Radar – George W. Stimson
  4. Electronic Warfare in the Information Age – D. Curtis Schleher
  5. Electronic Intelligence: The Analysis of Radar Signals – Richard G. Wiley
  6. Information Warfare: Principles and Operations – Edward Waltz
  7. Information Operations – Doctrine and Practice: A Reference Handbook (Contemporary Military, Strategic, & Security Issues) – Christopher Paul
  8. Information Operations: The Hard Reality of Soft Power – Edwin L. Armistead
  9. Most Secret War – Reginald V. Jones
  10. Deep Black – William Burrows

I shamelessly ripped the above list from eCrow and added hyperlinks myself. I’m aware not everyone is a fan of Amazon but it has one of the lowest probabilities of removing or changing URLs. After all: cool URIs don’t change!

Dutch Govt Expresses Intent To Draft New Cybercrime Legislation

UPDATE 2015-12-22: and here they are: the new cybercrime bill and MoU (in Dutch) as submitted by the cabinet to the House. Notably, the cabinet cancelled compelled decryption because of the right not to self-incriminate (nemo tenetur principle). Thus, the final bill, that will be discussed in the House, does not contain a power for LE to compel suspects of certain “very serious criminal offenses” to decrypt their data under penalty three years imprisonment or a fine of up to ~20k euro.

UPDATE 2015-06-11: it is reported that the cabinet will submit the proposal after the parliamentary summer break of 2015, which ends on August 31st 2015.

UPDATE 2012-10-18: legal expert Jan-Jaap Oerlemans blogged about the cross-border remote search that is proposed in this letter. Recommended read!

On October 15th 2012, the Dutch Minister of Security & Justice (Ivo Opstelten) sent this letter (.pdf in Dutch) to the Dutch parliament expressing intentions to draft new cybercrime legislation in the Netherlands.

Below is my Dutch-to-English translation of the entire letter. Hyperlinks and parts between [] are mine (note: the parts between () are from the original letter). I translated as neutral/objective as I could. I welcome your corrections/improvements at koot at cyberwar dot nl.

WARNING: this is an unofficial translation.

Date: October 15th 2012
Subject: Cybercrime legislation

By submitting this letter I fulfill my promise to send a message to you, the Parliament, concerning the inventory I made of necessary, new criminal investigative powers on the internet.

Summary

This letter proposes, within the framework of the rule of law, proportionality, subsidiarity and respect for the privacy of citizens, legislative elaborations of a number of issues to strengthen the powers in the investigation and prosecution of cybercrime. The aim of this new legislation is to tune the legal framework to the needs brought forward by the services that are responsible for the investigation and prosecution of cybercrime. Based on practical experiences and wishes, such as appeared in the recent Cyber Security Assessments Netherlands [aka Cyber Security Report] of 2011 [.pdf, English] and 2012 [.pdf, English] and my letter of December 23rd 2011 to you, the Parliament, about the legal framework for cybersecurity, this concerns the following topics:

  • Remote entry of automated works (=computers) and the placement of technical means (such as software) for the purpose of investigation of severe forms of cybercrime;
  • Remote search of data that is accessible from an automated work (=computer), regardless of the location of the automated work on which the data is stored and taking into consideration agreements and rules of international legal assistance;
  • Remotely making data inaccessible that is accessible from an automated work (=computer), regardless of the [geographical] location of the automated work on which the data is stored and taking into consideration agreements and rules of international legal assistance;
  • Criminalization of the trade in stolen (digital) data.

The structure of this letter is as follows: first, several introductory remarks are made (paragraph 1), then, the above topics are elaborated (paragraph 2). Next, conditions for the exercise of these investigative powers are discussed (paragraph 3) and international developments are outlined (paragraph 4). Finally, I indicate what next steps are being discussed (paragraph 5).

1. Introductory remarks

IT applications play an increasingly important role in daily life. The current situation is that the number of cybercrimes is increasing and the capacity, knowledge and experience within the criminal justice system does not keep pace. Our national and international possibilities to act against it are further decreasing as result of the cross-border nature and the emergence of so-called cloud computing. It also appears that the industrial self-regulation malfunctions and that offenses that could be prevented through better and earlier technical measures often still occur. A burning issue is that it has become very complicated to trace criminal activity on the Internet because it is relatively easy for criminals to prevent their digital tracks from being monitored, for example by the use of software to encrypt data and delete the communication paths. The investigations of the High Tech Crime Team [THTC] of the National Police Services Agency [KLPD] confirm this. In the investigation of child pornography on the Tor network, the team found that through the use of this network it is possible to view, download or upload child pornography images on to servers, without the identity of the suspect being visible. Furthermore, in several places, including the servers that were found, encryption was used. In another investigation of a large botnet that was being used to commit many crimes, the THTC found that the owner of the botnet could move his data around the world easily and very fast using a few keystrokes on his computer, which severely hindered or rendered impossible figuring out where the data was located on servers. I believe that this kind of countermeasures of suspects against investigation ought not to be successful. Crimes that are committed must be detected and perpetrators must be prosecuted. Society expects this from the government.

Data of which it cannot be established where they are geographically located
The police and Public Prosecution Service expressed their practical need for broadening of legal possibilities to act,  so that the desired and agreed-upon investigative and prosecution performance can be delivered. The police currently attempts to compensate the narrow legal possibilities to investigate on the internet. For example, the police has copied the content of the servers on the aforementioned Tor network containing images of severe sexual abuse of children and then destroyed it or rendered it inaccessible. At that time, the exact location of the servers could not be determined with certainty because the communication path had been obscured. The result of this approach in this case is that the copied data can now be used for (internationally) investigation and that access to those images is no longer possible via these servers. In this specific example, the Public Prosecution Service and the police made a decision in favor of acting against child pornography on the internet. A similar decision will need to be made in the future in acting against, for example, botnets. I believe that updating of legislation that provides the police and Public Prosecution Service a solid base to perform their necessary work in investigation and prosecution on the internet is necessary.

Mobile internet use

The current investigative powers for acting against cybercrime largely assume that computers have a fixed location and that digital data is stored on a single, individual computer. Meanwhile, the digital world has significantly changed. Because of that, these powers are no longer sufficient. In this context, the possibilities of modern mobile computers, such as smartphones and increasingly tablets, and the ways in which they are used, can be pointed out. These new forms of mobile computers can be continuously connected to the internet and be used for many forms of cybercrime. In addition, they are frequently used by criminals for their collaborative communication. Obfuscation of this communication is increasingly seen. In part due to the use of cloud computing, it will be increasingly difficult for investigators to figure out where the data of a certain smartphone or tablet is located at a certain time, while remaining uncertain about how long the data will remain stored there and thereby traceable. I believe that the investigative powers for acting against cybercrime ought to be designed so that these are practical and effective in the current digital world of mobile equipment and cloud computing. For the possibilities of digital investigation, it should not matter where an automated work is located at the time of carrying out the desirable investigative actions. According to international law, (digital) investigative actions on foreign terrain can onlytake place via international legal assistance. But as shown by the above examples, it will not always be possible to determine where data is located. If that is the case, the police and Public Prosecution Service must be able to continue their investigation under the conditions outlined below.

2. Elaboration of the aforementioned proposed legislation

Below, the proposed legislation that I announced above will be explained further.

2.1.  Remote entry of automated works (=computers) and the placement of technical means (such as software) for the purpose of investigation of severe forms of cybercrime.
Paragraph 1 described the development toward more mobile Internet usage. It also raised the increasing use of encryption on computers. Police and the Public Prosecution Service indicate that various forms of crime exist that are hidden from their sight because they do not have the power to invade a computer. Article 125i of the Dutch Code of Criminal Procedure offer a framework for the power to search a place to record data that are stored or recorded at that place on a data carrier. From parliamentary history it can be inferred that it is not permitted that an automated work is penetrated remotely for the purpose of investigation of serious forms of cybercrime. This concerns both remote entering for the purpose of wiretapping confidential communication and remote entering for the purpose of searching an automated work. In order to get access to this data for the purpose of investigation of serious forms of cybercrime, it is necessary that software can be secretly installed that allows the encryption of the data to be undone or circumvented.
Partly in the light of technological developments, a statutory power should be established for remotely penetrating an automated work, concerning the above purposes. The changed circumstances warrant the inclusion in the Dutch Code of Criminal Procedure of a specific power to remote intrusion of an automated work for the investigation of serious forms of cybercrime.

2.2. Remote search of data that is accessible from an automated work (=computer), regardless of the location of the automated work on which the data is stored and taking into consideration agreements and rules of international legal assistance.
In paragraph 1 I provided the example of a botnet where the criminal was able to move his data around the world very fast. This is increasingly common. Criminals know that police is attempting to access their networks and data and take measures against that. Usually, the data are moved around the internet (globally) very fast or the paths to the data are changed. Criminal groups also often take measure to detect whether third-parties, including the police, are attempting to access their files. When they detect such signals or suspect this they move their files as fast as possible and don’t hesitate to act against intruders using digital means. These technological development make it difficult to determine the location of the stored data and that the location changes often. Where data used to be stored on one’s own computer or on a separate data carrier, data is now stored via the internet on a foreign server or in the cloud. Starting point is that power for criminal investigation can only be exercised on one’s own territory. To carry out investigative actions on the territory of another state, international legal assistance is required. The reverse also applies: if a foreign state wants to carry out investigative actions on Dutch territory, they also require official legal assistance (article 552h in the Dutch Code of Criminal Procedure). However, the time delay incurred by this often works against the investigation an limits the effectiveness of official legal assistance.
The Cybercrime Convention of the Council of Europe has a provision on remote access to computer data regardless of the location of that data (article 32). This access is limited to publicly accessible data and other data on the condition of consent of the rightful claimant. The Cybercrime Convention does not have provisions on the gathering of data that are not publicly accessible without consent of the rightful claimant, meaning the official legal assistance is required. But, as argued above, in the remote search of computers it is in practice not always possible to determine the location of the data. A request for official legal assistance is impossible in that case. From the perspective of effective investigations it is of vital importance that data can be retrieved regardless of the location where they are stored. Therefore, the police and the Public Prosecution Service insisted on relevant legislation. In the legislation that I have in mind, I use the following principles. If knowledge is available about the location of the data, and the data are located on a foreign server, a request for legal assistance is designated. If there is no knowledge about the location of stored data, they should for the purpose of obtaining evidence be able to be searched and taken over.

The Belgian Code of Criminal Procedure also stipulates that during the search of an automated work, data can be taken over. When it turns out that the data are not loacted on Belgian territory, the data are only copied and the foreign state is notified.

2.3. Remotely making data inaccessible that is accessible from an automated work (=computer), regardless of the [geographical] location of the automated work on which the data is stored and taking into consideration agreements and rules of international legal assistance.
A special aspect is the possibility of rendering data that is found during remote search of an automated work inaccessible. In the Netherlands, the possibility currently exists that, when a place is entered to record data that is stored on data carrier at that place, and when the data is or is used for committing a crime (such as child porn), the data are rendered inaccessible to end the crime (article 125o of the Dutch Code of Criminal Procedure). Following that, it is desirable that during introduction of the power to remotely intrude an automated work, also a power is created to render such data inaccessible. After all, it is possible that during a remote search, child porn is found. This was the case during the aforementioned investigation that the THTC carried out on child pornographic images on servers in the Tor-network, where the police found very harmful pornographic material that was stored in encrypted form on a server. In absence of knowledge about the location of the storage of data, it is impossible to search for legal assistance. Nobody can be addressed in that case, while the crime continuous. The severity of the crimes can require that the data are immediately rendered inaccessible. This can entail that the data is erased. I therefore believe it is desirable to establish a legal power to render inaccessible or erase data that are found during remote searches of an automated work, modelled such as the provisions of article 125o of the Dutch Code of Criminal Procedure. Here, again, it applies that if knowledge is available about the location of the data, a request for legal assistance must be addressed to the authorities of the foreign state.

2.4. Criminalization of the trade in stolen (digital) data.

Offenses are committed on the internet where data is gathered, via hacking or other means, that are of interest to third-parties for the use in crime. Examples of this are personal data in databases that have been compromised and that can then be used to, for example, buy goods on the internet. Also, creditcard data that are gathered via phishing is offered and sold on the internet. Although, in the latter example, the use of this data to make creditcards is already punishable by law, the holding, transferring and buying this data is not punishable. This complicates investigations. The requirement to wait until the data is actually used to commit crimes, implies that it is not possible to act to prevent crimes. That is certainly not reassuring to citizens and in fact a bad signal because this form of trade in stolen items would be permissible in digital form. The trade or selling of such data has developed into a separate form of crime on its own.
That trade of stolen data is currently not punishable, is related to the fact that computer data, based on jurisprudence, can only be considered in specific circumstances to be goods in the meaning of articles 310 and 416 of the Dutch Criminal Code. This is relevant when data is outside the disposal of the holder and represent economical trade value. From this it follows that copying the holder’s data is not punishable because the holder retains disposal of the data. I believe that it is unacceptable for the involved victims that the current legislation results in unwanted gaps in cyberspace and thinkit is desirable to make these offenses punishable.

3. Conditions for exercise of investigative powers

The investigative powers described in paragraphs 2.1 to 2.3 must be surrounded with strict safeguards. The power to search a place to record data that is stored or recorded on storage media, based on article 125i of the Dutch Code of Criminal Procedure, is assigned to both the examining judge, the prosecutor, the assistant public prosecutor and the investigating officer. In various other powers it is specifically provided that the examining judge and the public prosecutor are authorized (for example articles 125la, 125n third paragraph and 125o first paragraph of the Dutch Code of Criminal Procedure). However, given the degree of intrusiveness of the legal powers to remote intrusion of automated work and the installation of technical devices for the detection of serious forms of cybercrime, especially considering the infringement on the right to respect for the privacy of persons, authorization of the examining judge must at all times be obtained prior to the use of the power. Also, the power can only be exercised in cases of suspected offenses of a certain gravity, for example offenses for which custody is provided or that carry a maximum imprisonment of four years or more.
Furthermore, of course, the general requirement applies that report must be made when this power is exercised. In addition, all transactions occurring during the exercise of these powers are automatically logged and stored and thus always accessible and verifiable afterwards.

4. International developments

I have already informed you that the Netherlands firmly contributes at the international level to the further development of the international framework, especially within the context of the Council of Europe. The Netherlands is both a member of the Convention Committee (of which all Treaty Parties are member) and the Agency (an elected body within the Convention Committee) associated with the Cybercrime Convention of the Council of Europe. In that context, we contribute to the active recruitment of new members of this Convention. Meanwhile, 33 countries acceded to the Convention (of which 17 have ratified), including 2 non-European countries (the United States and Japan). Partly at the instigation of the Netherlands, a debate started in 2010 on the scope of article 32 of the Convention that was mentioned above. I think it is of great importance that any cross-border investigative powers are secured internationally. This is a process that will take many years. The Netherlands will continue to monitor this. I choose to set the improvements to combat cybercrime already in motion in the Netherlands.

5. Next steps

The coming months will be used together with the police, prosecutors and other relevant stakeholders to elaborate further and prepare a draft bill. I am convinced that this catching-up is necessary to strenghten the investigation and prosecution of cybercrime.

The Minister of Security and Justice,

I.W. Opstelten

EOF