Page 153 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 153

ANDREJ ILIEV, FERDINAND ODZAKOV:  HISTORICAL AND LEGAL ASPECTS OF CYBER ATTACKS ON CRITICAL INFRASTRUCTURE

            With a final goal of reprogramming industrial control systems, Stuxnet was a large, complex
            piece of malware with many different components and functionalities, a threat that was primarily
            written to target an industrial control system or set of similar systems. Industrial control systems
            are used in gas pipelines and power plants. In order to achieve this goal the creators amassed a
            vast array of components to increase their chances of success. Stuxnet was a threat targeting a
            specific industrial control system like that of Iran, its ultimate goal was to sabotage a facility by
            reprogramming programmable logic controllers (PLCs) to operate as the attackers intend them
            to, most likely out of their specified boundaries (Falliere, et al., 2010: pp. 1-3).

            In general, cyber-attacks can be separated into three major categories: (I) “automated malicious
            software” delivered over the internet, (II) “denial-of-service attacks” and (III) “unauthorized
            remote intrusions into computer systems”. (Sklerov, 2009).



            2  Historical Evolution of Cyber-Attacks on Critical
                 Infrastructure

            Critical  infrastructure  is  vulnerable  to  all  type  of  attacks,  and  increasingly  to  attacks
            committed through the internet. Cyber threats to critical infrastructure (CI) are an evolving
            security challenge that can impact global security, public safety and the economy in general.
            As the private sector owns and operates most of the (CI) assets networks, and governments are
            responsible for national security, securing (CI) against cyber threats is a shared responsibility
            of both the public and private sectors (H2020 700416, project, “Securing Critical Energy
            Infrastructures,” http://www.successenergy.eu/).

            The first period of the historical development of cyberattacks encompasses the technological
            development of information technology from the early 1980s to the end of the Cold War in
            the early 1990s. Here we will try to highlight the most important examples of cyber attacks
            and cyber operations during this decade. During 1982, then US President Ronald Reagan
            approved a “state secret” plan for the use of specific software capable of controlling gas
            supply pumps and their turbines in industrial gas production and distribution facilities in the
            former Soviet Union. Fortunately or unfortunately, this software was stolen by secret Russian
            agents during their stay in Canada. The software was able to change the flow rate of the gas
            pumps and thereby succeeded in causing them to malfunction. Former US Air Force Secretary
            and former Director of the National Reconnaissance Office, Thomas C. Reed, in his book
            “At the Abyss: An Insider’s History of the Cold War,” said that the psychological effect  of
            this software and the effect on the Soviet Union’s economic capacities, significantly speed up
            the process of ending the Cold War.  US used cyber warfare during Iraq’s invasion in 1991
            (Hoffman, 2004). During Operation Desert Storm, a strategic air campaign was launched
            against Iraq’s air defences, so that the command and control telecommunications information
            system was attacked by advanced computer software, causing electrical disruptions in Iraq’s
            telecommunications information system (Operation Desert Storm,1997, Appendix V).

            The second period of the development of cyber attacks is the next decade, from 1990 to the
            9/11 terrorist attacks on the US in 2001. A virtual online war broke out between Chechens
            and pro-Russian forces in 1994. This virtual war on the internet simulated military operations
            which one or other party wanted to carry out in the field in a real sense. This sophisticated
            widespread action of internet psychological propaganda is known as psychological surgery.


                                                                                    153
   148   149   150   151   152   153   154   155   156   157   158