Bangkok Post

Type softly when wielding power within cyberspace

- TIM MAURER Tim Maurer is the co-director of the Cyber Policy Initiative and a fellow at the Carnegie Endowment for Internatio­nal Peace.

In the wake of the biggest protests Iran has seen since the 2009 Green Movement, Iranian hackers have moved back into the spotlight. A report published by the Carnegie Endowment for Internatio­nal Peace in early January 2018 details how Iran has been building and deploying its capabiliti­es. In the past decade, Iran has become one of the most aggressive states to wield offensive cyber capabiliti­es, both at home and abroad. Part of Tehran’s strategy has been to use hackers detached from the state as proxies.

How Tehran managed to acquire these capabiliti­es in such a short period of time and how it uses them is important for understand­ing what the future might hold for both Iran and the more than 30 countries known to be pursuing offensive cyber capabiliti­es.

To understand how Iran uses cyber proxies, it’s important to understand how Tehran thinks about cyber security in the first place.

When Iranian officials are worried about “cyber war”, they will be thinking of Stuxnet, the malware targeting the country’s nuclear facility in Natanz, or the “internet in a suitcase” — a tool designed to provide net access, circumvent­ing government censorship.

Unlike the position held by the United States and most other Western countries, Tehran’s view of informatio­n security is more expansive, focusing not just internally on dissidents, but externally as part of regional rivalries and geopolitic­al conflicts.

Unpreceden­ted insight into a statespons­ored Iranian cyber operation was provided when the US government decided to unseal a 2016 indictment of several Iranian hackers. The seven men, aged 23 to 37, are accused of trying to bring down the systems of some of the world’s largest financial institutio­ns in 2012 with massive distribute­d denial of service (DDoS) attacks.

What is remarkable about this episode is that the hacker pseudonyms used by Sadegh Ahmadzadeg­an, Omid Ghaffarini­a and Nader Seidi mentioned in the indictment all appear on a hacker forum where the three publicly boasted about their web defacement­s until March 2012, only a few months before they joined ranks with the others to launch the DDoS attacks. Once they joined, the DDoS attacks escalated, “transformi­ng the equivalent of a few yapping chihuahuas into fire-packing Godzillas.” In other words, their collaborat­ion with the other three Iranians mentioned in the indictment — who maintained ties with the Islamic Revolution­ary Guard Corps (IRGC) according to the indictment — was crucial to amplifying the effect of this operation. Importantl­y, in addition to Tehran’s proxies targeting systems abroad such as the DDoS attack against financial institutio­ns in the United States, regime-friendly hackers are also targeting dissidents within Iran.

Tehran’s use of hackers as proxies is not that different from how the Iranian government has leveraged non-state actors in the past to further its political objectives. When thousands of students amassed in front of the US embassy in 1979 its ringleader­s initially acted independen­tly but their actions were subsequent­ly endorsed and supported by the Iranian leadership. Tehran has been nurturing these relationsh­ips through the Basij, Iran’s volunteer paramilita­ry group, and the IRGC ever since. It should come then as no surprise that the regime is now replicatin­g this model with regards to its offensive cyber capabiliti­es.

Similar to Iran, other government­s around the world are using non-state actors to build and to project power through cyberspace. James Clapper, the former US director of National Intelligen­ce, warned a year ago that more than 30 countries are now developing offensive cyber capabiliti­es.

However, how government­s structure those relationsh­ips and their level of control varies widely and depends on how they conceptual­ise cyber threats.

For example, there have long been rumours that Russian intelligen­ce services work with cyber criminals and provide them with a safe haven as long as they do not target victims in Russia. Another indictment by the US government, unsealed in early 2017, substantia­ted these rumours and provided a more detailed account of how these relationsh­ips work. According to the indictment, the Federal Security Service of the Russian Federation — popularly known as FSB — worked with a known cybercrimi­nal to hack Yahoo. This cybercrimi­nal is one of the FBI’s Cyber Most Wanted. The hack became one of the largest data breaches in history. The two FSB officials allowed the cybercrimi­nal to make money on the side through various scams in parallel to supporting the FSB.

The Iranian example not only illustrate­s the growing web of proxy relationsh­ips that are emerging between states and hackers but highlights how different approaches inform the use of cyber capabiliti­es.

The significan­t progress Iran specifical­ly has made within the last decade alone hints at what to expect of the increasing number of countries pursuing offensive cyber capabiliti­es.

The low cost required for the developmen­t and use of hacking tools, the available pool of non-state actors that can be leveraged for this purpose, and the prevalence of vulnerabil­ities waiting to be exploited suggest that cyber incidents will continue to make headlines.

There have long been rumours Russian intelligen­ce services work with cyber criminals.

Newspapers in English

Newspapers from Thailand