Law of Armed Conflict: Implications for Navy Cyber Strategy

CARNEGIE MELLON UNIVERSITY
Law of Armed Conflict:
Implications for Navy Cyber Strategy
Masters of Information Technology Strategy
Practicum - 2012
CDR James Adkisson, Mr. Tokunbo Davies, LT Brian Evans,
Mr. Rick Lanchantin, Ms. Patty Walters
Information Networking Institute
8/3/2012
CARNEGIE MELLON UNIVERSITY
ABSTRACT
The pervasiveness of computing and network technologies has led to the emergence of
cyberspace as a warfare domain. As with any traditional warfare domain, military actions in
cyberspace are subject to a set of international laws and norms known as the Law of Armed
Conflict (LOAC). While the United States (U.S.) Navy is working to develop capabilities within
the cyberspace domain, the level of knowledge and understanding within the Navy regarding the
application and implications of LOAC to cyber is unclear. This report examines LOAC, U.S.
cyber operations policy, and U.S. Navy cyber readiness, using the information to develop a cyber
operations case study scenario. The scenario presents an evolving cyber event involving the
Islamic Republic of Iran and a U.S. Carrier Strike Group (CSG). The scenario was used to
conduct original research evaluating cyber operators’ and commanders’ knowledge and
understanding about the implications of LOAC on cyber operation and strategy. Case study
findings as well as background research are utilized to provide recommendations aimed at
assisting the Navy in fulfilling its mission within the cyberspace domain.
ii
EXECUTIVE SUMMARY
“Modern armed forces cannot conduct high-tempo, effective operations without reliable
information and communication networks and assured access to space and cyberspace.”
- Secretary of Defense Leon E. Panetta, January 2012
The ongoing technological revolution has redefined the way the United States (U.S.)
military conducts operations. The advance of technology has allowed the U.S. Department of
Defense (DoD) to migrate the exchange of information, intelligence and command and control
signals to cyberspace. As a result, all other warfare domains have become reliant on operations
within cyberspace. Given this dependence, U.S. adversaries have clearly identified cyberspace
as a potential center of gravity. The pervasiveness of technology has created a low threshold of
entry for any adversaries desiring cyberspace capability. Unable to compete with the U.S. in
terms of conventional military capability, these nations seek to use cyberspace as an asymmetric
advantage. The threat to the U.S. presented by these capabilities has led to the recognition of
cyberspace as an independent war fighting domain.
While recognizing and working to adapt to the emergence of cyberspace as a warfare
domain, it is unclear whether the Navy is prepared for the full range of actions in this dynamic
environment. One area of uncertainty that has received little attention is the sufficiency of
understanding within the Navy regarding the application and implication of Law of Armed
Conflict (LOAC) on cyberspace operations. Of particular concern is the impact of LOAC on
cyberspace operations conducted by maritime combatants. The Navy’s emphasis on forward
deployment for force projection places commanders of maritime combatants in areas with higher
likelihoods for cyber conflict. This increased likelihood, coupled with the characteristics of high
geographic dispersion and low rates of connectivity that have historically characterized U.S.
naval operations, creates a rich threat environment. Additionally, the traditional independence
iii
given commanders of maritime combatants creates the opportunity for them to exercise a larger
degree of discretion regarding the use of force. As a result, the 2012 Master of Information
Technology Strategy Practicum Report, Law of Armed Conflict: Implications for Navy Cyber
Strategy, examines the LOAC, U.S. cyber operations policy, and U.S. Navy cyber readiness with
a focus on maritime combatants.
The Law of Armed Conflict: Implications for Navy Cyber Strategy report begins with a
review of international law, focusing in on the elements of LOAC. The review identifies areas of
uncertainty in international law concerning how ‘use of force’ and ‘armed attack’ are defined in
the context of cyber operations. Within international law there are also conflicting legal
arguments regarding whether the use of cyber attacks violates LOAC. The arguments concern
the potential for widespread effects, both intentional and unintentional, or whether cyber attacks
are more humane due to their non-lethal nature, assuming they are engineered correctly.
In terms of policy, the Law of Armed Conflict: Implications for Navy Cyber Strategy
report reveals that U.S. cyber operations policies, including priorities stated by the White House,
have been primarily focused on defense. In contrast, policy for offensive cyber operations
(OCO) is non-existent. The report attributes this to retention of authorities at the national
strategic level due to intelligence gain verses loss concerns. While intelligence gathering
activities conducted via Exploitation Cyber Operations (ECO) continue to be governed by U.S.
Title 50, these mandates only apply to activities conducted by the Intelligence Community (IC)
and provide no authorizations for military combatants engaged in normal operations. The report
asserts that as a result of the lack of both OCO and ECO authorities, current policies restrain the
tactical and operational commanders’ ability to forcefully respond to cyber attacks as permitted
by LOAC.
iv
Law of Armed Conflict: Implications for Navy Cyber Strategy also provides a review of
U.S. Navy cyber readiness with a focus on maritime combatants. The review broadly identifies
the key elements of the Navy’s cyber readiness: technology, personnel and policy. With regard
to technology, the report identified significant progress in cyber defense based on standardization
and defense-in-depth; however, these approaches have largely focused on meeting commercial
threats with minimal incorporation of analysis examining threats specific to Navy systems.
Additionally, maritime combatants lack of capability for organic cyber forensics analysis. In
contrast to the large investment by Navy in defensive technology, there are currently no major
efforts at obtaining or developing afloat cyber technologies for OCO or ECO. In the area of
personnel, the Navy currently lacks sufficient expertise across the spectrum of cyber operations,
including sufficiently trained commanders. Similar to the other areas, Navy policy has largely
focused on cyber defense. The report identifies a lack of effective information sharing between
cyber operations and Navy intelligence elements as well as a lack of policy mandating red
teaming for vulnerability discovery or readiness evaluation, as avenues for continued
improvement. Additionally, the report highlights that the absence of OCO policy from higher
authorities has led the Navy to forgo policy development in this area.
These three topics above come together in Law of Armed Conflict: Implications for Navy
Cyber Strategy and are combined with an analysis of Iranian cyber readiness to generate a case
study involving cyber events that affect a U.S. Carrier Strike Group (CSG). The case study
revealed a range of interpretations regarding the application and implications of LOAC for Navy
cyber operations. Additionally, the study exposed the absence of consensus regarding the
thresholds for what are considered ‘cyber attacks’, ‘armed attacks’ in cyberspace, and when
‘inherent right to self-defense’ is warranted. The study also made clear that if a CSG did desire
v
to respond to an ‘armed attack’ within cyberspace in accordance with its inherent right to selfdefense, tactical commanders have neither the authorities nor tools necessary. Finally, the case
study and research results point to the absence of a central repository or publication to bring
together the scope of information and references concerning the application and implication of
LOAC on Navy cyber operations.
Law of Armed Conflict: Implications for Navy Cyber Strategy, leveraging the results of
the reviews and case study, proposes a number of recommendations to help the Navy fulfill its
mission and Joint responsibilities within the cyberspace domain. These recommendations
include:






Creation of a reference repository or publication containing information required
to understand the implications to Navy cyberspace operations
Ensure delivery of adequate instruction for commanders and Judge Advocate
General (JAG) lawyers on cyber operations (threats, policies, implications of
LOAC) commensurate with its critical role in modern naval combat
Implement policies strengthening ties between cyberspace operators and
intelligence elements
Improve means for translating adversary cyberspace capabilities into actionable
threat evaluations centered on risks
Develop and deploy organic forensics analysis capability onboard maritime
combatants
Implement policies mandating red teaming for vulnerability discovery and
readiness evaluation
While each of the above recommendations represents an avenue for potential Navy
action, Law of Armed Conflict: Implications for Navy Cyber Strategy suggest additional studies
of each to identify and analyze the most impactful, cost effective, and expeditious means of
implementation.
vi
ACKNOWLEDGEMENTS
The information and findings in this report would not have been possible without the gracious
assistance of many individuals, both active duty military and civilian. In each instance, these
individuals were extremely generous in giving of their time and extensive expertise.
We would like to extend our extreme gratitude to the following individuals:
CAPT Terry Roberts (USN Ret), former Deputy Director of Naval Intelligence,
for her mentorship as we developed and refined the concept for this practicum,
especially regarding the identification of potential adversaries for our case study.
RADM Sam Cox (USN), Director of Intelligence at U.S. Cyber Command for his
uninterrupted time and unique insight into the cyber challenges facing the nation
and the U.S. Navy. Additionally, we sincerely appreciate his counsel in shaping
the scope of this practicum to enhance its utility in meeting the needs of the Navy.
Mr. Jack Summe (SES), Mr. Josh Alexander, and Mr. Michael McNerney from
the Office of the Secretary of Defense (Cyber Policy & Law) for their time,
expertise, and generous donation of Pentagon facilities.
CAPT William Diehl (USN), CAPT Eric Exner (USN), CAPT James Mills
(USN), CAPT Brian Broene (USN Ret), CDR Dan Kenda (USN), LtCol Troy
Mattahorn (USMC), CDR Dan Sander (USN), and MAJ Geoffrey DeWeese
(USA) for their participation in our case study analysis. Also, Mr. Jim Hansis,
Mr. Fred Tafoya, Mr. Mike Weaver, and Mr. Keith Gologorsky. We would also
like to extend special thanks to CDR Mick Brons (USN) and the Fleet
Information Operations Center (FIOC) Defense Cyber Operations (DCO) at
Naval Information Operations Center (NIOC) Maryland who fully embraced the
spirit of the case study and utilized the scenario as a real-time training exercise,
providing excellent feedback for our analysis.
LCDR Matthew Cegelske (USN), Cyber Federal Executive Fellow, for his
assistance in providing research material and advice on avenues of academic
exploration.
Our Carnegie Mellon University Faculty Advisors, CDR Dave ‘Rooter’ Root
(USN Ret) for his academic guidance and mentorship throughout this process as
we negotiated the development, research and production of this practicum. Dr.
Harry M. Bovik, Carnegie Mellon University, for his continual encouragement
and for inspiration that will last a lifetime.
A special thanks is also extended to CAPT Mills and CDR Kenda who took time to assist us with
this practicum despite being currently deployed to the Commander Fifth Fleet area of operations.
vii
TABLE OF CONTENTS
I. INTRODUCTION
A. Purpose
B. Scope
C. Report Progression
1
1
2
3
II. REVIEW OF THE LAW OF ARMED CONFLICT
A. Background
B. Jus in bello
C. Jus ad bellum
D. Inherent Right to Self-Defense
E. Force in Cyberspace
F. Summary
4
4
4
6
8
9
9
III. REVIEW OF U.S. CYBER OPERATIONS POLICY
A. Introduction
B. Defining Policy
C. Existing National Cyber Policy
D. Summary
12
12
12
13
21
IV. U.S. NAVY CYBER READINESS
A. Introduction
B. Technology
C. Personnel
D. Policy
E. Summary
23
23
23
31
33
39
V. CASE STUDY: IRANIAN CYBER CONFLICT
A. Introduction
B. Iranian Cyber Readiness
1. Background
2. Investment in Cyber Capabilities
3. Offensive Cyber Capabilities
4. Defensive Cyber Capabilities
5. Impact to U.S. Navy Operations
C. Case Study Methodology
1. Background
2. Scenario Generation
3. Question Generation
4. Sample Selection
5. Sources of Bias
43
43
43
43
44
45
48
49
50
50
50
51
51
52
viii
D. Case Study Results
1. Question Set 1
2. Question Set 2
3. Question Set 3
4. Question Set 4
5. Question Set 5
E. Case Study Findings
1. Nomenclature
2. Functions and Resources
3. Cyber Procedures
52
53
54
56
58
59
60
60
61
61
VI. RECOMMENDATIONS
A. Introduction
B. Deficiencies
C. Recommendations
64
64
64
65
REFERENCES
67
APPENDIX A –ACRONYMS AND ABBREVIATIONS
A-1
APPENDIX B – CASE STUDY SUPPORTING MATERIALS
A. List of Participants
B. Case Study Scenario as Presented
C. Case Study Responses
B-1
B-1
B-2
B-9
ix
I. INTRODUCTION
“Modern armed forces cannot conduct high-tempo, effective operations without
reliable information and communication networks and assured access to space and
cyberspace.”
- Secretary of Defense Leon E. Panetta, January 2012
A. Purpose
The ongoing technological revolution has redefined the way the United States (U.S.)
military conducts operations. At the heart of every successful operation is an effective exchange
of information, intelligence and command and control (C2) signals. The advance of technology
has allowed the U.S. Department of Defense (DoD) to migrate this exchange to cyberspace.a
This migration enables enhanced coordination of forces, precision weapons delivery, increased
access to information, and a more rapid decision cycle. As a result, the four other warfare
domains have become reliant on operations within the cyberspace domain. Within the range of
U.S. military operations, assured access to cyberspace and the ability for C2 to deliver decisive
effects in cyberspace are a prerequisite for achieving maximum effectiveness and advantage for
Navy and Joint commanders.
Given the U.S. military’s dependence on cyberspace, adversaries have clearly identified it
as a center of gravity. The pervasiveness of technology has created a low threshold of entry for
any adversaries desiring cyberspace capability. Unable to compete with the U.S. in terms of
conventional military capability, these nations seek to use cyberspace as an asymmetric
advantage. The threat to the U.S. presented by these capabilities, has led to the recognition of
cyberspace as an independent warfighting domain.
a
DoD Joint Publication 1-02 defines cyberspace as: A global domain within the information environment consisting
of the interdependent network of information technology infrastructure, including the Internet, telecommunications
networks, computer systems, and embedded processors and controllers.
1
Although cyberspace is a relatively new warfare domain, the international laws and
norms that govern armed conflict between nation states are not. These international laws and
norms are collectively known as the Law of Armed Conflict (LOAC) and are as equally
applicable in cyberspace as they are in any other warfare domain. While the applicability of
LOAC is not in question, the unique characteristics of cyberspace create challenges in
interpreting appropriate limits on military operations.
The U.S. Navy has recognized cyberspace as a warfare domain and is working to adapt to
it; however, it is unclear whether the Navy is prepared for the full range of actions in this
dynamic environment. One area of uncertainty that has received little attention is the sufficiency
of understanding within the Navy regarding the application and implication of LOAC on
cyberspace operations. As a result, this report will examine the current level of knowledge and
understanding within the Navy regarding the application and implications of LOAC within
cyberspace. These findings will inform recommendations aimed at assisting the Navy in
fulfilling its mission within the cyberspace domain.
B. Scope
While this report examines the Navy’s current understanding of LOAC as it applies to
cyberspace operations, the examination is specifically focused on cyberspace operations
conducted by maritime combatants. This focus was selected for three reasons. First, the Navy’s
emphasis on forward deployment for force projection places commanders of maritime
combatants in areas with higher likelihoods for cyber conflict. Second, the traditional
independence given commanders of maritime combatants creates the opportunity for them to
exercise a larger degree of discretion regarding the use of force. Finally, U.S. naval operations
2
are historically characterized by high geographic dispersion of combatants with low rates of
connectivity, increasing the risks associated with disruption in access to cyberspace.
C. Report Progression
The remaining body of this report is divided into six sections. The next section discusses
LOAC in the context of jus in bello, establishing norms for conduct of belligerents after the
commencement of hostilities, and jus ad bellum, establishing when a nation is permitted to
engage in armed conflict. Particular attention is provided to aspects of LOAC that create
challenges for the conduct of cyberspace operations. The section following provides an
overview of policy governing U.S. military cyber operations and strategy. In this section
policies are examined to determine what guidance is provided to cyber operators that supports
and constrains actions within the bounds of LOAC. The report then proceeds with a section
examining current U.S. Navy cyber readiness, with a focus on the Navy’s technologies,
personnel and policies that support operations within cyberspace. The report transitions into a
case study, beginning with a review of the Islamic Republic of Iran’s cyber capability. The
information from this review is combined with that of three previous sections to develop a case
study scenario and accompanying questions. The scenario presents the reader with an evolving
fictional cyber event involving Iran and affecting a U.S. Carrier Strike Group (CSG). The case
study scenario and questions were distributed to a sample of individuals, many who are currently
forward deployed. Participant responses to the questions form the basis for an evaluation of the
baseline level of knowledge and understanding regarding the application and implication of
LOAC to cyberspace operations. The final section uses the case study findings and research
results from all previous sections to provide summarizing remarks and recommendations aimed
at assisting the Navy in fulfilling its mission within the cyberspace domain.
3
II. REVIEW OF THE LAW OF ARMED CONFLICT
A. Background
Cicero’s classic maxim states that “Laws are silent amidst the clash of arms,” but the
modern world has adamantly rejected this premise.1 As a result, international consensus and
agreements have been developed that constrain the extremes of war. These constraints are
embodied in LOAC, the International Humanitarian Laws (IHL) and the Geneva Conventions.
These laws seek to limit the effects of armed conflict on persons who are not actively
participating in hostilities. When LOAC was written, the primary concern was the potential
impact of conventional arms on non-combatants; however, the emergence of cyber weapons has
created questions about the application of LOAC. If sequenced correctly and delivered
accurately; cyber weapons can be as devastating as conventional munitions; and bring with them
collateral damage; including civilian casualties. When considering LOAC and IHL, it is
beneficial to consider the concepts of jus in bello, the principles designed to limit unnecessary
suffering and destruction during armed conflict, and jus ad bellum, the criteria for determining
when a state may legitimately use force. The following discussions of LOAC are similarly
organized based upon these two philosophical classifications.
B. Jus in bello
Every member of the armed forces, regardless of rank or pay grade, is responsible for
their conduct and compliance with LOAC, as well as ensuring compliance by subordinates.
Violations can and have resulted in prosecutions in not only U.S. courts, but also foreign jurists,
courts, and tribunals. Under LOAC, commanders have a broad and unique responsibility to: 2
4





Ensure that personnel under their command are trained regarding LOAC
Give lawful and unambiguous orders
Take responsibility for difficult decisions
Ensure that orders are lawfully carried out by their subordinates
Report violations by members of enemy or allied forces, including their own, to a
higher military authority
The Geneva Conventions (1949) make up the primary basis for the LOAC and IHL.3
They consist of four conventions, as well as three additional protocols, and were primarily
crafted in the aftermath of the Second World War (WWII). The first two protocols were adopted
in 1977 and extended the terms of the 1949 Conventions with additional protections. A third
protocol was added in 2005.
The first convention deals with the “Amelioration of the Condition of the Wounded and
Sick in Armed Forces in the Field.” The second convention provides for “Amelioration of the
Condition of Wounded, Sick and Shipwrecked Members of Armed Forces at Sea.” The third
convention covers topics related to the “Treatment of Prisoners of War.” The fourth and final
convention dictates the “Protection of Civilian Persons in Time of War.”4
In 1977, two protocols were added to the terms of the conventions. The first was an
addition to the Geneva Conventions of 12 August 1949, and relates to the Protection of Victims
of International Armed Conflicts. The second protocol added addresses the Protection of
Victims of Non-International Armed Conflicts.5 The most recent protocol concerning the
Adoption of an Additional Distinctive Emblem was added to the Geneva Conventions in 2005.6
A central concept within LOAC and IHL for restraining the devastation of armed conflict
is the Principle of Proportionality. Following a decision to employ force, a state must consider
the extensiveness of the target set and the required degree of force. According to Gary Sharp,
“proportionality is a limitation on the use of force against a military objective only to the extent
that such a use of force may cause unnecessary collateral destruction of civilian property or
5
unnecessary human suffering of civilians.”7 Adhering to the principle of proportionality requires
commanders to balance the desire to avoid collateral damage and the successful pursuit of the
military objective.
In addition to proportionality, constraining the extremes of armed conflict requires a clear
distinction between individuals engaged in armed conflict (combatants) and those who are not
engaged in armed conflict (non-combatants). LOAC provisions allow the use of force against
combatants in specific circumstances, but in all cases seek to minimize the suffering of noncombatants. Combatants that become hors de combat, combatants outside the fight, are those
who have lost or given up the ability or intent to participate in hostilities. Non-combatants are
protected from attack but lose that protection if they take direct part in hostilities for the duration
of their participation.
C. Jus ad bellum
The conclusion of WWII brought with it a consensus in the international community that
the use of force to settle international disputes is flawed. The United Nations (U.N.) sought to
provide an alternative framework for resolving disputes, including a prohibition against the use
of force as a means of conducting international relations. Article 2(4) of the U.N. Charter
requires member states to refrain from both the use and the threat of the use of force.8 Language
in Article 51 articulates the recognized and customary right to self-defense stating, “Nothing in
the present Charter shall impair the inherent right of individual or collective self-defense if an
armed attack occurs against a member of the United Nations.”9
The U.N. Charter uses the terms ‘aggression’, ‘armed attack’ and ‘use of force’ in a
number of provisions without clear definitions. This omission has resulted in a 50 year debate
over intended meanings. The U.N. General Assembly Resolution 3314, passed in 1974,
6
corrected this omission with Article 1 of the Resolution defining aggression as “the use of armed
force by a State against the sovereignty, territorial integrity or political independence of another
State, or in any other manner inconsistent with the charter of the U.N., as set out in this
Definition.”10 Article 3 goes on to specify:11
“Any of the following acts, regardless of a declaration of war, shall, subject to and in
accordance with the provisions of article 2, qualify as an act of aggression:
(a) The invasion or attack by the armed forces of a State of the territory of another
State, or any military occupation, however temporary, resulting from such
invasion or attack, or any annexation by the use of force of the territory of another
State or part thereof;
(b) Bombardment by the armed forces of a State against the territory of another State
or the use of any weapons by a State against the territory of another State;
(c) The blockade of the ports or coasts of a State by the armed forces of another
State;
(d) An attack by the armed forces of a State on the land, sea or air forces, or marine
and air fleets of another State;
(e) The use of armed forces of one State which are within the territory of another
State with the agreement of the receiving State, in contravention of the conditions
provided for in the agreement or any extension of their presence in such territory
beyond the termination of the agreement;
(f) The action of a State in allowing its territory, which it has placed at the disposal
of another State, to be used by that other State for perpetrating an act of
aggression against a third State;
(g) The sending by or on behalf of a State of armed bands, groups, irregulars or
mercenaries, which carry out acts of armed force against another State of such
gravity as to amount to the acts listed above, or its substantial involvement
therein.”
Although the U.N. Charter encompasses the use of military force, Article 41 sets out
measures “not involving the use of armed force” which the Security Council may employ to
enforce its decisions. As a result, Article 41 implies that “complete or partial interruption of
economic relations and of rail, sea, air, postal, telegraphic, radio and other means of
7
communication” are not uses of armed force.12 This limited definition of the ‘use of force’ is of
particular interest when considering cyber operations and the capability to cause economic
consequence and political instability without physical intrusion into a nation state.
D. Inherent Right to Self-Defense
The language of Article 51 and its discussion of the ‘inherent right of self-defense’
provide significant room for debate about the extent of this right.13 Extending this discussion to
cyber operations, the question becomes what constitutes an attack on an information system
sufficient to justify self-defense. Currently there is no consensus on a threshold of action that
would permit self-defense to ensure continued operation of a nation’s critical infrastructure.a
Any act of self-defense is expected to be conducted within a reasonable time period following
the offending action. Additionally, without continued aggression by the offending nation, a
delay in response may become unlawful and considered an act of retaliation instead of selfdefense.14 This may create challenges in responding to a cyber attack where attribution takes an
extended period of time.
Disagreement exists amongst international legal scholars whether the right of anticipatory
self-defense exists under international law. Despite this debate, a significant number of military
and political leaders accept its legitimacy. U.S. doctrine relies heavily on the validity of
anticipatory actions. This is illustrated in the current National Security Strategy: 15
We will disrupt, dismantle, and defeat al-Qa’ida and its affiliates through a
comprehensive strategy that denies them safe haven, strengthens front-line
partners, secures our homeland, pursues justice through durable legal approaches,
and counters a bankrupt agenda of extremism and murder with an agenda of hope
and opportunity. The frontline of this fight is Afghanistan and Pakistan, where we
are applying relentless pressure on al-Qa’ida, breaking the Taliban’s momentum,
a
Section 1016(e) of the USA PATRIOT Act of 2001 (42 U.S.C. 5195c(e)) defines critical infrastructure as:
Systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of
such systems and assets would have a debilitating impact on security, national economic security, national public
health or safety, or any combination of those matters.
8
and strengthening the security and capacity of our partners. In this effort, our
troops are again demonstrating their extraordinary service, making great sacrifices
in a time of danger, and they have our full support.
- President of the United States, 2010
E. Force in Cyberspace
International law clearly supports the use of force as a response to an armed attack or in
self-defense. The question regarding cyber operations is what should be considered an ‘armed
attack’ in cyber space? W. Gary Sharp suggests that an armed cyber attack should be evaluated
using a sliding scale that is adjusted based on the specifics of the situation. He asserts that
“What constitutes a prohibited ‘threat or use of force,’ in cyberspace and elsewhere, is a question
of fact that must be subjectively analyzed in each and every case in the context of all relevant
law and circumstances.”16 Ultimately, it is the victim state that determines whether such act was
‘use of force’ and what response it will take; however, these decisions are always subject to
judgment by the international community.
F. Summary
The uncertain definition of the ‘use of force’ is increasingly problematic when analyzing
cyber attacks. Although cyber attacks do not utilize lethal effects, cyber attacks present a clear
danger due to their ability to inflict both intended and unintended damage to critical
infrastructure, financial markets, banks and the overall welfare of a nation. Such attacks could
lead to the paralysis of a nation due to an inability to support its population, resulting in
significant suffering and/or death of non-combatants. As a result, there is a strong argument that
the threat of cyber attack is itself a violation of the U.N. Charter and LOAC. In contrast, there is
also an argument that cyber should be used in preference to conventional weapons in order to
comply with LOAC. This argument is based on the assertion that cyber attacks are more
humanitarian because they have less potential to create collateral damage than conventional
9
weapons. These are the issues that commanders and military planners must balance when
conducting operations in cyberspace.
10
Notes:
1
Cicero, Marcus Tullius., “Speech in Defense of Titus Annius Milo”, 52 BC.
International Comittee of the Red Cross (ICRC). "Law of Armed Conflict, Basic Knowledge."
Training. International Red Cross, June 2002.
3
Final Record of the Diplomatic Conference of Geneva. "Final Record of the Diplomatic
Conference of Geneva of 1949." Bern: Federal Political Department, 1949.
4
Ibid.
5
International Committee of the Red Cross. "Protocols additional to the Geneva Conventions of
12 August 1949." Protocols additional to the Geneva Conventions. Geneva: International
Committee of the Red Cross, 1977. 89-101.
6
Notification of the Federal Department of Foreign Affairs of Switzerland. "Protocol additional
to the Geneva Conventions of 12 August 1949." Geneova Conventions, Protocol III.
Bern: International Committee of the Red Cross, 2005.
7
Sharp, Walter Gary. Cyberspace and the use of force. Falls Church, VA: Aegis Research
Corporation, 1999. p. 40.
8
United Nations. (1945). Charter of the United Nations and Statute of the International Court of
Justice. San Francisco: United Nations., Article 2(4).
9
United Nations. (1945). Charter of the United Nations and Statute of the International Court of
Justice. San Francisco: United Nations., Article 51.
10
United Nations. (1974). U.N. General Assembly Resolution 3314. New York: United Nations.
11
Ibid., Article 3.
12
United Nations. (1945). Charter of the United Nations and Statute of the International Court
of Justice. San Francisco: United Nations., Article 41.
13
United Nations. (1945). Charter of the United Nations and Statute of the International Court
of Justice. San Francisco: United Nations., Article 51.
14
Ibid.
15
President of the United States. "National Security Strategy." Whitehouse.gov. May 2010.
http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf
(accessed July 12, 2012).
16
Sharp, Walter Gary. Cyberspace and the use of force. Falls Church, VA: Aegis Research
Corporation, 1999.
2
11
III. REVIEW OF U.S. CYBER OPERATIONS POLICY
A. Introduction
In a February 2012 testimony to Congress, the Director of National Intelligence (DNI),
Director of the Central Intelligence Agency (CIA), and Director of the Federal Bureau of
Investigations (FBI) stated that cyber security ranks among the top national security concerns.
They also indicated that current policy requires revision to address how the use of force in
cyberspace conforms to national and international law, including LOAC.1 The previous section
reviewed the applicability of LOAC to cyber operations. This section builds on that
understanding and reviews national policy that impact DoD operations in cyberspace.
B. Defining Policy
The DoD does not expressly define the term ‘policy’. A standard dictionary definition
implies that policy provides guidance for solving problems without explicitly defining the
solution.2 Accordingly, policy for cyber operations should offer a means to arrive at solutions
for achieving the established operational objectives within cyberspace.
While DoD policy is designed to guide the decision-making process, the policies must
conform to LOAC. Accordingly, the DoD has stated that current policy and legal regimes that
govern actions in traditional warfare domains also apply to cyberspace operations.3 The U.S.
Navy has in turn stated that Navy cyberspace operations will conform to DoD and national
efforts.4 Despite these efforts, cyber policy across the U.S. Government remains severely
underdeveloped. Many of the policy documents from the Executive Branch, DoD, individual
military services, and Department of Homeland Security (DHS) were written more than ten years
ago. Despite their age, these documents continue to influence decisions about cyber operations
that result in “legally acceptable plans and orders that support national security objectives.”5
12
C. Existing National Cyber Policy
While there is significant debate regarding cyber operations amongst the international
community, the U.S. Government (USG) is moving forward to try and establish domestic
strategies and policies. These policies can generally be examined from the perspectives of
offense and defense. Due to lack of international consensus regarding the characteristics of an
‘armed attack’ in cyberspace, there is minimal policy regarding Offensive Cyber Operations
(OCO) or Exploitation Cyber Operations (ECO). Policy concerning OCO continues to suffer
from a lack of authorities concerning its use. ECO is conducted under U.S. Title 50 authorities
that govern the operations of the Intelligence Community (IC).6 The international community
does agree that if a cyber attack were to meet the threshold of an ‘armed attack’, then the
provision of LOAC and IHL are applicable.
In contrast to offensive policies, policies guiding Defensive Cyber Operations (DCO) are
largely derived from domestic law. National policies concerning DCO primarily address
methods to establish and maintain confidentiality, integrity, and availability of U.S. networks
through defense-in-depth by preventing, detecting, containing threats, and establishing methods
of recovery. The White House 2009 Cyberspace Policy Review discusses the component
elements of cyber security policy as:
“Cyber security policy includes strategy, policy, and standards regarding the security of
and operations in cyberspace, and encompasses the full range of threat reduction,
vulnerability reduction, deterrence, international engagement, incident response,
resiliency, and recovery policies and activities, including computer network operations,
information assurance, law enforcement, diplomacy, military, and intelligence missions
as they relate to the security and stability of the global information and communications
infrastructure.”7
U.S. cyber security policy assigns management and responsibility for ‘.mil’ internet domain to
the DoD and ‘.gov’ domain to the DHS. While the U.S. does solicit participation from private
13
industry, which designs, builds, owns, and operates most of the network infrastructure that
supports the government, current law does not permit the use of tools employed to protect
government assets to be used to protect commercial assets. 8 This policy directly conflicts with
other policies designed to leverage experience from military operations to assist in protecting the
U.S. civilian critical infrastructure.
Additional guidance is provided by the White House which established cyberspace policy
for the DoD that loosely mirrors the Political, Military, Economic, Social, Intelligence, and
Information structure that is used for the military’s Theater Security Cooperation (TSC)
planning.9 While this construct addresses numerous cyber security issues, it does not address
OCO. A summary review of the White House priority policies from the “International Strategy
for Cyberspace” is shown in Table 1 below:
14
Priority: High
Economy
Networks
Protection
Sustain a free-trade
environment that
encourages technological
innovation on accessible,
globally linked networks
Promote cyberspace
cooperation, particularly on
norms of behavior for states
& cyber security, bilaterally,
& in a range of multilateral
organizations &
multinational partnerships
Law Enforcement
Participate fully in
international cybercrime
policy development
Military
Recognize and adapt to the
military’s increasing need
for reliable and secure
networks
Internet
Governance
International
Development
Internet Freedom
Prioritize openness and
innovation on the Internet
Low
Protect intellectual
property, including
commercial trade
secrets, from theft
Ensure the primacy of
interoperable and
secure technical
standards, determined
by technical experts
Reduce intrusions
into and disruptions
of U.S. networks
Ensure robust incident
management,
resiliency, and
recovery capabilities
for information
infrastructure
Improve the security
of the high-tech
supply chain, in
consultation with
industry
Focus cybercrime
laws on combating
illegal activities, not
restricting access to
the Internet
Deny terrorists and
other criminals the
ability to exploit the
Internet for
operational planning,
financing, or attacks
Harmonize
cybercrime laws
internationally by
expanding accession
to the Budapest
Convention
Build and enhance
existing military
alliances to confront
potential threats in
cyberspace
Preserve global
network security and
stability, including the
domain name system
(DNS)
Expand cyberspace
cooperation with
allies and partners to
increase collective
security
Promote and enhance
multi-stakeholder
venues for the
discussion of Internet
governance issues
Provide the necessary
knowledge, training, and
other resources to countries
seeking to build technical
and cyber security capacity
Continually develop
and regularly share
international cyber
security best practices
Enhance states’
ability to fight
cybercrime including
training for law
enforcement, forensic
specialists, jurists, and
legislators
Support civil society actors
in achieving reliable, secure,
and safe platforms for
freedoms of expression and
association
Collaborate with civil
society & nongovernmental
organizations to
establish safeguards
protecting their
Internet activity from
unlawful digital
intrusions
Encourage
international
cooperation for
effective commercial
data privacy
protections
Develop
relationships with
policy-makers to
enhance technical
capacity building,
providing regular &
ongoing contact with
experts and their
USG counterparts
Ensure the end-toend interoperability
of an Internet
accessible to all
Table 1: Prioritized Policy for International Strategy for Cyberspace 10
The Senator Ike Skelton National Defense Authorization Act (NDAA), Fiscal Year 2011,
also explicitly addressed cyber policy. The NDAA directive instructed the DoD to develop a cyber
strategy to integrate cyber as a warfare domain consistent with policies to protect U.S. cyber and
critical infrastructures. In response, the DoD published the “Department of Defense Strategy for
Operating in Cyberspace”.
15
The cyber strategy document focused on five strategic initiatives:11





Treat cyberspace as an operational domain to organize, train, and equip so that
DoD can take full advantage of cyberspace’s potential in its military, intelligence,
and business operations
Employ new defense operating concepts, including active cyber defense, to
protect DoD networks and systems
Partner closely with other U.S. Government departments and agencies and the
private sector to enable a whole-of-government strategy and a nationally
integrated approach to cyber security
Build robust relationships with U.S. Allies and international partners to enable
information sharing and strengthen collective cyber security
Leverage the Nation’s ingenuity by recruiting and retaining an exceptional cyber
workforce and enabling rapid technological innovation
The strategic initiatives leverage existing policies and authorities; and address the complex
challenges and opportunities of cyberspace in an integrated manner. The initiatives also
provided the basis for addressing specific concerns laid out in the NDAA regarding the DoD’s
policies for cyberspace.12 Although the DoD has not modified the National Military Strategy to
reflect these initiatives, responses to the NDAA concerns were published in the November 2011
DoD Cyberspace Policy Report. The contents of this report are very detailed, but the Secretary
of Defense’s (SECDEF) summary of the DoD’s cyber policy is consistent with The White House
cyber policy goals and leverages existing domestic and international law, including LOAC.
The SECDEF’s summary outlines clear objectives and policies for DoD to explore
cyberspace’s full potential, while recognizing the risk involved with cyber threats and
vulnerabilities. Since the DoD is as reliant on cyberspace as the civilian community, efforts to
improve cyber security for the American people, the U.S. critical infrastructure, and the USG
will be accomplished in close coordination with commercial industry. A brief review of the
NDAA cyber policy concerns and DoD responses provides insight into the current states of
policy within the Department:
16
Development of a Declaratory Deterrence Posture for Cyberspace: This concern also
encompasses the relationship between military operations in cyberspace and lethal operations.13
DoD has stated that it intends to discourage adversaries from attacking or exploiting U.S.
networks by continuing to use tactics, techniques and procedures to deny or minimize rewards
for conducting malicious activity in cyberspace. Consistent with the TSC approach presented in
White House policy, DoD will enhance defenses, increase resiliency, and conduct military-tomilitary bilateral and multilateral discussions to ensure international cooperation. DoD will
exercise a whole-of-government approach to protect the Nation.a The Department is working
closely with its interagency partners, including the DHS, to increase the cyber security of critical
infrastructure and with the Department of State (DoS) to strengthen ties with U.S. allies and
international partners to enhance mutual security.
Preserving the President’s Freedom of Action: In a situation where the President’s
freedom of action in cyberspace is restrained by a nation’s sophisticated cyber capabilities, such
as a crippling cyber attack against U.S. economy, government or military interests, the DoD will
exercise response options as directed by the President. These options may include the use of
cyber and/or lethal capabilities to counter the threat. As discussed in the previous section, such
response options would be constrained by LOAC, which recognizes international consensus that
“any cyber operation resulting in injury to or death of individuals or damage to or destruction of
objects would permit such response options, but there is also agreement that cyber activities that
merely cause inconvenience or irritation do not qualify.”14
Attribution Limitations: The DoD will address attribution limitations by employing three
key strategies to enable deterrence or effective retaliation when required. First, the DoD will
a
A whole-of-government approach refers to coordination by numerous USG departments and agencies to achieve a
common objective.
17
support innovative research and development in both DoD and the private sector. Second, the
DoD will continue investment in cyber forensics capabilities, which have shown significant
progress in attribution over the past several years. Third, in partnership with the DHS and DoS,
DoD is expanding its international partnerships to increase shared situational awareness,
indications and warning capabilities, and forensics efforts. These initiatives closely mirror the
White House policy directive and can be easily exercised through TSC events.
Transparency in Cyber Operations: This NDAA concern primarily seeks responsible
declassification of information about U.S. cyber capabilities and plans. The DoD reported that
the dynamic and sensitive nature of cyberspace operations makes it difficult to declassify
specific capabilities. However, cyberspace operations are conducted in a manner consistent with
the policy principles and legal regimes that the Department follows for lethal capabilities,
including the LOAC. If directed by the President, the DoD will declassify material and
procedures in accordance with established policy. This concern chiefly revolves around privacy
of U.S. citizens during ECO and OCO. For such operations, the USG is subject to domestic law,
including the Protect America Act and 18 U.S. Code 1030.
Escalation Management in Cyber Warfare: DoD’s cyberspace operations are subject to
careful coordination and review, including the use of ECO for intelligence gathering and
preparation of the cyber battle environment. International cyberspace norms will improve
stability and predictability of states’ conduct in cyberspace. Transparency is increased by
working with international partners to develop confidence building and risk reduction measures
to decrease the chance of miscommunication and escalation in cyberspace.
Rules of Engagement: The DoD has implemented rules of engagement for the operation
and defense of its networks for peacetime operation and during conflict. DoD’s cyber
18
capabilities are integrated into planning and operations under existing policy and legal regimes.
In the case of domestic threats, policy and legal authorities governing DoD’s domestic activities,
such as Defense Support to Civil Authorities, extend to cyber operations, as they would in any
other domain.
Misinterpretation of Intelligence Collection in Cyberspace: Intelligence collection and
procedures are clarified in a classified annex to the Cyberspace Policy Report. Intelligence
operations are not conducted unilaterally and are governed by long-standing and well-established
considerations, to include the possibility that a target nation may interpret intelligence collection
as hostile act. As a result, the DoD’s intelligence collection via cyberspace is conducted in
compliance with applicable laws, policies, and procedures.
Oversight: DoD will keep the Congress informed of cyber-based initiatives by providing
quarterly briefings to appropriate Members of Congress. These briefings will include
information about significant cyber operations designed to prepare the environment for military
action, including sensitive operations not conforming to the quarterly briefing cycle.
Cooperation with Allies: DoD leverages the White House policy for achieving
international cooperation. Furthermore, the DoD Strategy for Operating in Cyberspace
emphasizes the importance of building robust relationships with U.S. Allies and partners to
strengthen the deterrence of malicious cyberspace activity and to build collective cyber defenses.
This initiative allows the DoD , U.S. Allies, and international partners to maximize the use of
information sharing treaties for leveraging cyber capabilities, mitigating risk, and deterring
malicious activities in cyberspace.
Attacks Against Mission Critical Cyber Infrastructure: This NDAA concern deals with
the situation where supporting cyber infrastructure is attacked in third party countries with U.S.
19
bases or if the host country is attacked putting DoD assets at risk. As part of information sharing
initiatives and mutual cooperation, DoD adheres to well-established processes for determining
whether a third-party country is aware of malicious cyber activity originating from within its
borders. If such activity presents a threat, then the DoD will exercise authorities consistent with
host nation agreements and LOAC.
Cyber Weapons Delivery: In this case the NDAA is concerned about the legality of
delivering cyber “weapons” across the Internet through the cyber infrastructure owned and/or
located in neutral third-party countries without obtaining the equivalent of “overflight rights.”
International authorities have not agreed on what constitutes a cyber weapon, largely due to the
dual use nature of cyberspace. However, LOAC and customary international law provide a
strong basis to apply norms to cyberspace to govern state behavior. “As the President recognized
in the International Strategy for Cyberspace, the development of norms for state conduct does
not require a reinvention of customary international law nor render existing norms obsolete.
Rather, the principled application of existing norms must be developed with our partners and
Allies.”15
Acts of War in Cyberspace and Application of LOAC: This is probably the most heavily
debated question in international politics. As previously discussed, the DoD considers
international legal norms, such as those found in the UN Charter and LOAC that apply to the
physical warfare domains, to also apply to the cyberspace domain. Activities conducted in
cyberspace that cause death or extreme destruction have already been discussed as activities that
may allow a nation to exercise its inherent right to self-defense. In this context, determining
defensive response rests with the President.
20
Use of Force in Cyberspace: The requirements of the War Powers Resolution apply to
U.S. military involvement in hostile action or imminent danger in which the use of force is
clearly indicated.b Cyber operations may not require a physical presence in the area of
hostilities, but may instead be a supporting component of larger operations that could trigger
notification and reporting in accordance with the War Powers Resolution. DoD evaluates all
cyberspace actions to determine when the War Powers Resolution may apply.
D. Summary
U.S. policy regarding cyber operations has been primarily focused on defense. U.S.
Government policy clearly establishes the DoD as responsible for the ‘.mil’ Internet domain.
Additionally, the White House policy priorities are clearly vectored towards improving the
nation’s and DoD’s cyber security posture. The 2011 NDAA builds upon these policies,
requiring the DoD to address a number of concerns regarding responses to potential cyber threats
and the conduct of cyber operations. In contrast, policy for OCO is non-existent. The absence of
such policy is likely because the associated authorities are currently maintained at the national
strategic level, due largely to intelligence gain verses loss concerns.16 In the area of cyber
exploitation, operations continue to be governed by U.S. Title 50 mandates related to intelligence
gathering. These mandates, however, only apply to activities conducted by the IC and provide
no authorizations for military combatants engaged in normal operations. Given the status of
policies for both offensive and defense cyber operations, the DoD has clear direction regarding
cyber security. This direction does not extend to policies for OCO. As a result, current policies
restrain the tactical and operational commanders’ ability to forcefully respond to a cyber attack.c
b
The War Powers Resolution is a federal law intended to constrain the President’s ability to commit the U.S. to an
armed conflict without the consent of Congress.
c
DoD Joint Publication 1-02 defines Levels of War –Operational: Major operations are planned and conducted to
achieve strategic objectives. Tactical: Engagements are planned and executed to achieve military objective.
21
Notes:
1
Hoover, Nicholas. "Cyber Attacks Becoming Top Terror Threat, FBI Says." Information Week.
February 1, 2012. http://www.informationweek.com/news/government/security/
232600046 (accessed July 6, 2012).
2
Encyclopedia Britanica. Merriam Webster.com. July 1, 2011. http://www.merriamwebster.com/ (accessed Jul 8, 2012).
3
Department of Defense. Department of Defense Cyber Policy Report. A Report to Congress
Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934,
Washington DC: U.S. Government, 2011.
4
Secretary of The Navy. Cyberspace Policy and Administration within the Department of the
Navy. Instruction 3052.2, Washington DC: U.S. Navy, 2009.
5
Department of Defense. Legal Support to Military Operations. Joint Publication 1-04,
Washington DC: U.S. Government, 2011.
6
United States Congress. Title 50: War and National Defence, § 36 (United States Code).
7
The White House. Cyberspace Policy Review: Assuring a Trusted and Resilient Information
and Communication Infrastructure. Policy Review, Washington DC: U.S. Government,
2009.
8
Ibid.
9
The White House. International Strategy for Cyberspace. Washington DC: U.S. Government,
2011.
10
Ibid.
11
Department of Defense. DoD Strategy for Operating in Cyberspace. Washington DC: U.S.
Government, 2011.
12
Department of Defense. Department of Defense Cyber Policy Report. A Report to Congress
Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934,
Washington DC: U.S. Government, 2011.
13
United States Congress. (2010). National Defense Authorization Act for Fiscal Year 2011.
Washington D.C.: U.S. Government.
14
Naval War College. (2011). Non-International Armed Conflict in the Twenty-first Century.
Newport: U.S. Government.
15
Department of Defense. DoD Strategy for Operating in Cyberspace. Washington DC: U.S.
Government, 2011.
16
Cox, RADM Samuel J. Personal interview. United States Cyber Command. 4 June 2012.
22
IV. U.S. NAVY CYBER READINESS
A. Introduction
The previous section highlighted key aspects of current U.S. policy and law with regard
to military operations in cyberspace. The section also discussed how these policies and laws
relate and interact with the LOAC. These relationships and interactions form the framework
within which the various military services must operate. Focusing in on the U.S. Navy, the
naturally resulting question is what particular roles should the U.S. Navy fulfill within this
framework?
The desire of the U.S. military is to treat cyber operations similarly to operations in other
warfare domains. Therefore, the traditional paradigm of service and Joint responsibility and
control must be applied. As a result, the Navy as a service is responsible for manning, training
and equipping naval cyber forces for employment by the applicable Joint commander.1
Given the role of manning, training and equipping naval cyber forces; to understand the
status of U.S. Navy cyber readiness it is necessary to examine how effective the Navy has been
in fulfilling these roles. An effective assessment of readiness requires examining the Navy’s
cyber capability in three distinct areas. The following three subsections are dedicated to
individual examinations of technology, personnel and policy related to Navy cyber capability.
B. Technology
The Navy fulfills its responsibility to equip naval forces for the conduct of cyber
operations through the deployment of technological systems. The importance of information
dominance to the operational methods of the U.S. Navy has resulted in cyber systems becoming
critical to combatants’ war fighting capability. Since this paper seeks to concentrate on Navy
23
cyber operations and LOAC, the following technological analysis will focus on cyber
technologies deployed on operational maritime combatants.
The Information Technology for the 21st Century (IT-21) program provides the backbone
of technology for networks deployed on maritime combatants. The IT-21 program aims to
provide maritime combatants with a network environment that supports reliable Non-secure
Internet Protocol Router Network (NIPRNet), classified Secure Internet Protocol Router
Network (SIPRNet), and Sensitive Compartmentalized Information (SCI) network
communications; as well as a diverse array of applications supporting both tactical and nontactical functions. Additionally, the IT-21 network environment should be able to support
necessary operations in low-bandwidth and limited data reach-back conditions. Examining these
systems for insight into the U.S. Navy’s cyber technological readiness is best achieved by
analyzing two categories of cyber capabilities, defensive and offensive. To date, the Navy’s
investments in cyber technology have almost exclusively focused on defensive capabilities.
These investments have primarily focused on two areas, architectural standardization and
defense-in-depth.
The Navy has expended significant resources on standardization with the goal of
reducing potential vulnerabilities and minimizing complexity. Reducing vulnerabilities limits
the attack vectors available to potential adversaries. Minimizing complexity simplifies the
security management tasks, improving the ability to detect and respond to potential attacks.
The Navy’s current efforts have focused on standardization of hosts and network topology. Host
standardization in the IT-21 environment is challenging due to the wide array of configurations
and applications required for mission success. The diversity of IT-21 hosts has led the Navy to
24
focus on two standardization efforts, one focused on operating environments and the other on
security.
An examination of IT-21 hosts reveals a set of nearly universal core services. These core
services consist of elements such as directory services, email, office applications, collaboration
tools, anti-virus software, as well as other common applications. To standardize this core of
services, the Navy introduced the Common PC Operating System Environment (COMPOSE)
suite. The COMPOSE suite combines a number of commercial and government software
products, including the Microsoft System Center Configuration Manager (SCCM) for remote
management and software updates.2 This facilitates simple yet universal implementation of
security policies and security updates. The standardization provided through the COMPOSE
suite also allows the Navy to test new software products in a lab environment prior to
deployment to maritime platforms. The testing capability enabled by the COMPOSE suite is
critical to ensuring that the integration of new software products does not create new security
vulnerabilities within the currently deployed suite.
The Navy’s second IT-21 cyber defense standardization effort is deployment of the HostBased Security System (HBSS).3 HBSS was originally developed by the Defense Information
Systems Agency (DISA) and its use on all DoD host and servers is currently mandated by
Department policy. The system consists of a suite of commercial software products from
McAfee with patches and updates provided to DoD components by DISA. While the HBSS
includes a number of components, the specific components that support standardization are: 4


ePolicy Orchestrator (ePO) Management Suite – provides functionality for remote
configuration of HBSS hosts, management and distribution of HBSS software
updates, and includes McAfee Agent to facilitate communications with the remote
host for anomaly reporting
Policy Auditor (PA) – ensures host compliance with defined security policies
such as the Federal Information Security Act (FISA)
25

Asset Configuration Compliance Module (ACCM) – ensures host compliance
with configuration specification, as well as required system and application
updates
In addition to standardization of host security, the Navy is also working to create a
common network core for IT-21 systems across the different maritime platform classes. Since
the radio-frequency (RF) equipment deployed on each maritime platform differs, the topology of
the common network core must account for these differences. Additionally, hardware and
software within network enclaves may vary based upon the specifics of the platform and
assigned missions. These RF equipment and enclave requirements have led to the development
of a common network core, shown in Figure 1, that encompasses the network topology between
the enclave Cisco routers and the Automated Digital Network System (ADNS) router, providing
a common interface to the platform’s specific RF equipment suite.
CENTRIXS/
COALITION
SIPRNet
LANs
NIPRNet
LANs
SCI
LANs
Figure 1 – Nominal common core of Navy IT-21 networks5
While standardization remains an essential element to simplifying cyber defense, through
reduction of the size of the attack plane, the Navy is also pursuing enhanced security through
defense-in-depth. The Department of the Navy’s (DoN) Chief Information Officer’s (CIO)
26
vision for cyber defense-in-depth is shown in Figure 2. While Figure 2 shows what appears to be
a comprehensive set of defense mechanisms at each level, actual implementation may not
necessarily conform to this vision. The Navy’s defense-in-depth approach for its IT-21 networks
is primarily based on two elements, HBSS and the Regional Network Operations and Security
Centers (RNOSC).
Figure 2a – Navy’s vision of cyber defense-in-depth6
As previously discussed, the DoD has mandated deployment of HBSS on all hosts and servers.
In addition to the components that support standardization, HBSS also provides a number of
components aimed at providing host level defense:
a
Figure 2 shows the distinct layers of the Navy’s defense-in-depth approach; however, the individual elements
within the layers are not explicitly discussed in this report. For a more detailed discussion of these elements please
see the DoN CIO Computer Network Defense Roadmap (Endnote 6).
27




Host Intrusion Prevention System (HIPS) – enforces security policies distributed
by ePO Management Suite and provides firewall services at network protocol
level and above
Device Control Module (DCM) – prevents unauthorized use of USB and flash
devices
Rouge System Detection (RSD) – provides real-time monitoring of network
traffic to detect connection of an unknown system to the network and alerts ePO
Management Suite
Audit Extraction Module (AEM) – monitors hosts for suspicious user behavior
and alerts ePO Management Suite in the event an anomaly is detected
In addition to HBSS, the second element of the Navy’s defense-in-depth approach is the network
security services provide by the RNOSCs. The RNOSCs provide connectivity to network
security services via an ADNS router that directs traffic to/from the correct RNOSC security
enclave based on the destination/source enclave onboard the maritime platform.
GIG
Figure 3 – RNOSCs (four shown) network security services architecture 7
As Figure 3 shows, any traffic within a RNOSC enclave coming from or destine for the
associated Global Information Grid (GIG) is filtered by a network security suite. This suite is
28
composed of a GIG Premise router, an Outer Security Screening Router (OSSR), a Suite of
firewall Suite, Inner Security Screening Router (ISSR), a virus scanning Suite (VSCAN Suite),
and an Intrusion Detection System (IDS) Suite. The network security suite also includes a
Virtual Private Network (VPN) Suite to allow necessary traffic to bypass the firewall server
suite. While not specifically part of the network security suite, the Fleet Router that connects the
individual enclave to the RNOSC ADNS router also performs network address translation.
The Navy has unquestionably increased its cyber readiness by focusing its technological
cyber defense efforts in two areas, architectural standardization and defense-in-depth. The
Navy’s architectural standardization programs have reduced the potential attack vectors and
simplified the delivery of security services. Despite this simplification, the reactive nature of the
Navy’s current cyber defense efforts, focused on leveraging commercial best practices, leaves
the Navy susceptible to publicly known vulnerabilities. While the current approach is cost
effective, it does not focus on the threats of most concern to the Navy. As a result, the Navy will
remain unnecessarily vulnerable until a capability is developed to identify, prioritize, and
technologically respond to threats of concern in a timely manner.
The second area of technological focus for Navy’s cyber defensive efforts has been
defense-in-depth. The Navy has sought to achieve defense-in-depth through deployment of
HBSS and network security services provided by the RNOSCs. While these efforts have
improved the Navy’s cyber defense posture, absent from this approach have been enclave level
security measures and resiliency. HBSS does provide host level security for enclave servers;
however, there are no mechanisms in place to defend the enclave perimeter or network devices,
such as routers. This presents a potential vulnerability since secure hosts within an enclave are
practically useless if an attack on the associated enclave network devices prevents
29
communications. The Navy’s reluctance to implement security measures at the enclave level is
likely attributable to a risk analysis that indicates that the potential threat does not justify the
increased monetary or personnel costs. As was the case with standardization, this risk analysis is
most likely based on commercial threats and is therefore flawed. In addition to enclave level
security, the Navy’s defense-in-depth approach also fails to address resiliency. In deploying
technologies, the Navy must field not only secure but also resilient systems.8 In the face of a
successful and escalating attack, resiliency serves as the final element of a defense-in-depth
approach, ensuring a degree of continued operation with prioritized delivery of critical services.
While Navy has expended the majority of its technological efforts on passive defensive
capability, cyber situational awareness and forensics capabilities are also critical. There are two
elements required for cyber situational awareness, an understanding of the status of one’s own
cyber capabilities and knowledge of other cyber actors’ capabilities. Presently, the Navy is
focused on the first area due to its inability to capture and understand in real-time the status of its
own networks.9 Despite the enormity of this challenge, the Navy Cyber Defense Operations
Command (NCDOC) has made progress with the development of its Prometheus system.10 The
Prometheus system automates security monitoring by aggregating system, application, firewall,
and router logs, as well as input from other network sensors.11 The forensics tools are essential
to security event analysis because they help identify the characteristics of an attack and aid in
potentially attributing the attack to a source. As a result, this attribution capability is essential if
the Navy desires to meet cyber threats with any approach other than passive defense. While the
Prometheus system does not provide real-time insight, it does represent an improvement in Navy
cyber situational awareness and forensics capabilities. Despite these improvements, the
Prometheus system was not developed for deployment on maritime platforms. As a result, CSGs
30
are not equipped with the technology to independently perform network forensics or attribution
analysis.
While the Navy is pursuing new defensive cyber technologies to enhance its security
posture, there are currently no major efforts for obtaining or developing offensive cyber
technologies afloat. Offensive cyber technologies include those aimed at facilitating exploitation
(i.e. system penetration and data extraction) or attack operations within cyberspace. Authorities
to conduct OCO are currently retained at the national strategic level. As a result, the Navy has
not widely invested in developing and deploying offensive cyber technologies, especially at the
tactical level.
C. Personnel
Analyzing personnel readiness with regard to cyber provides insight into how the Navy
has fulfilled its responsibility for manning and equipping its forces. Personnel cyber readiness
impacts not only the ability to execute cyber operations but also influences the Navy’s decisions
regarding technology and policy. Within the Navy, two groups of personnel are critical to cyber
readiness, those with technical expertise and those assigned command.
Gaining maximum insight into the cyber readiness of Navy personnel is best
accomplished by examining the readiness of each group individually. Prior to these individual
examinations, it is important to note that the DoD mandates that every user of a DoD information
technology system complete Information Assurance (IA) training annually. The user community
within the DoD includes government civilians, contract personnel, reservists, and active duty
members. As a result of this IA training mandate, all personnel within the Navy receive at least a
minimal introduction to cyber defense.
31
In many ways, the personnel readiness of the technical experts tasked with conducting
cyber operations has been the most influential factor affecting overall Navy cyber readiness.
While the Navy has implemented a number of personnel qualification and certification programs,
the current condition of the Navy’s technical cyber community can best be described as
maturing. There are locations within the Navy, such as NCDOC, that possess an extremely high
degree of cyber expertise. This is demonstrated by NCDOC’s development of the Prometheus
system. While the Navy desires and is working diligently to grow its core of cyber professionals,
the number of educated and trained individuals is insufficient to ensure each combatant can
individually manage its cyber defense.12 This reality has resulted in the current defense-in-depth
approach that utilizes HBSS, largely leveraging DISA expertise and RNOSC network security
services. The limited number of RNOSCs means that the Navy can concentrate expertise at
these critical nodes. As a result, the Navy has chosen not to deploy enclave level defense
mechanisms due in part to the absence of sufficient expertise. The concern is that without
resident expertise, a combatant may misconfigure or mismanage its enclave level security
mechanisms to the point where enclave connectivity is completely lost.
In the area of offensive cyber expertise, the Navy has an extremely limited number of
capable cyber professionals.13 Additionally, those individuals who do possess offensive cyber
expertise have most often obtained their skills when assigned to a Joint command or National
Agency. The Navy currently has a single course in place for training Navy personnel on the
entire spectrum of offensive cyber operations. In contrast, there are multiple service specific and
commercial training courses used by the Navy for developing expertise in cyber defense. The
reason Navy is reluctant to invest in developing offensive cyber expertise is because there is
32
currently no offensive cyber authorities delegated to the Navy nor is there a mature servicespecific mission requirement.
Successful execution of cyber operations requires not only technical expertise but also
command expertise. The majority of commanding officers, at all levels of the Navy, lack an
understanding of the complexity and challenges associated with cyber operations. In most cases
the only training in cyber warfare they receive is the previously discussed annual IA training,
which covers little more than a basic identification of potential security threats. The resulting
lack of knowledge manifests itself in a general unfamiliarity with IA and cyber policies.
Additionally, while most commanders receive training regarding the array of threats they should
expect to encounter, cyber threats receive little or no attention. Despite the general knowledge
deficiency, commanders quite often have technical experts to help them work through the
majority of policy and threat issues. The area where technical experts cannot assist the
commander is in understanding and applying LOAC. An understanding of how LOAC applies
to all potential threats is critical for any commander. Assisting the commander in interpreting
LOAC is the responsibility of the Judge Advocate General (JAG) Corps. However, there is
currently no formalized training for JAG Corps personnel or any commander in the Navy about
the application of LOAC to cyber operations.
D. Policy
Policy forms the third area of analysis required to gain an understanding of the Navy’s
overall cyber operational readiness. Policy is influential to how the Navy satisfies its role to
man, train, and equip its forces for cyber operations. Similar to the areas of technology and
personnel, the Navy has focused its policy on cyber defense, passive defense in particular. As a
33
result, it is beneficial to examine the Navy’s policy from first a defensive and then an offensive
perspective.
The Navy’s defensive cyber policies are focused in two primary areas, certification and
security alerts/reporting. The Navy’s certification policies can further be divided into personnel
and combatant certifications. In the area of personnel certification, the Navy has implemented
the DoD’s mandated IA Workforce Program. The IA Workforce Program requires commercial
certifications for technical, management, and training personnel.14
As Figure 4 shows, the precise certification varies depending upon the specific
responsibilities of the position. Navy policy also directs commanders to appoint appropriately
certified IA Workforce members to fill key information assurance positions.15
Figure 4 – DoD IA Workforce Program certification levels16
In addition to personnel certification, Navy has implemented the Cyber Security
Inspection and Certification Program (CSICP). The Commander Fleet Cyber Command
(COMFLTCYBERCOM) message directing implementation of CSICP states that networks on
maritime platforms are considered weapons systems and must adhere to the same inspection and
certification requirements.17 At the core of CSICP are the DoD IA Certification and
34
Accreditation Process (DIACAP) standards; however, additional requirements have been added
to ensure systems also meet the Navy’s unique requirements.18 DIACAP and CSICP focus
heavily on cyber security documentation. The Navy’s CSICP implementation envisions a three
step process as shown in Figure 5.
Figure 5 – CSICP cycle19
It is important to note that CSICP is strongly supported among senior Navy leaders, as
demonstrated by the elevation of CSICP certification as a prerequisite for authorization to deploy
in a combat ready status. While CSICP certification as an element of pre-deployment
preparation constitutes positive progress, to date the Navy has completed only a handful of
CSICP certifications for deploying combatants. Of these certifications, none have been
unsuccessful or led to a delay in a combatant’s deployment timeline.
In addition to certification, security alerts/reporting represent the second area where Navy
has focused its defensive cyber policies. Policies in these areas can be broken down along very
straightforward lines, cyber security alerts and reporting of cyber events. For alerting
combatants of cyber security issues the Navy utilizes two primary methods. The first is via naval
message and the second is via IA Vulnerability Alerts (IAVA). Naval messages are usually used
to alert the entire Navy to a general class of cyber security threat. Historical examples include
notifications regarding security vulnerabilities involving USB devices, email, and social
engineering.
35
The second means of distributing security alerts is via the IA Vulnerability Management
(IAVM) program. Implementation of an IAVM program is mandated by DoD directive and is
designed as a means for identifying, alerting, and verifying the status of IA vulnerabilities.20
DISA operates the DoD-wide IAVM program and notifies the Navy IAVM program via IAVA
of vulnerabilities affecting DoD systems. The Navy IAVM program then releases the IAVA
with an identified corrective actions and a compliance due date. The IAVA then trickles down
the echelon hierarchy of Navy organizations. Once individual combatants have completed the
corrective actions, completion (or a reason for inability to comply) is reported back up the
hierarchy, with each command reporting compliance for its subordinate combatants.21 In
addition to DoD-wide IAVAs, the Navy IAVM program can release IAVAs for Navy specific
systems. Unfortunately, both the DoD and Navy IAVM programs focus exclusively on
commercial software and depend primarily upon commercial identification, notification and
correction of vulnerabilities. As a result, the IAVM program may not identify significant threats
of concern to the Navy.
In addition to the absence of robust threat analysis, cyber security vulnerabilities are also
created by the IAVA timeline. The administrative processing involved in the trickle down from
DISA or the Navy IAVM creates a period between when the commercial security community
publishes the discovery of a particular vulnerability and the implementation of the corrective
action. This period represents an opportunity for an attacker to engineer an exploit around the
published vulnerability. Despite the shortcomings of the IAVM program, the alternative is far
riskier as it would require each CSG, or worse detached combatant, to monitor the commercial
world for software vulnerabilities and implement corrective actions independently. This sort of
ad hoc approach is undesirable due to a lack of required expertise at the combatant level and the
36
absence of an opportunity for testing corrective actions prior to implementation. An ad hoc
approach could result in adverse effects to information systems, combatants implementing
different corrective actions, and an absence of vulnerability notification and correction
verification.
In addition to certification, the element that accompanies vulnerability alerts as the
second focus of Navy cyber policy is reporting of cyber events. The Navy considers reporting of
cyber incidents, events that have adverse implications for network operations, as an element of
its defense-in-depth approach. The specific actions and reporting requirements for cyber
incidents are contained in the DoN Computer Network Incident Response and Reporting
Requirements.22 The response actions outlined in the instruction are designed to facilitate rapid
reporting while also preserving the maximum amount of data for forensic analysis. All Naval
organizations report incidents and forward required data to NCDOC, the DoD designated
Computer Network Defense (CND) service provider for the Navy.
As in other areas of cyber readiness, the Navy’s policy approach has been to implement
commercial best practices to address cyber defense. As previously stated with regards to
technological and personnel readiness, the exclusive focus on commercial practice is not a sound
approach. Neither is this approach sound for cyber operations policy. The Navy currently lacks
the relationships and mechanisms for effective information sharing between elements of Navy
intelligence and those tasked with cyber operations. Additionally, there are currently no policies
mandating red teaming as a mechanism for vulnerability discovery or readiness evaluation.b
Absent from Navy policy is any discussion of the authorities associated with cyber
operations. The Commander’s Handbook on the Law of Naval Operations discusses how to
b
Red teaming is a term used to define the use of friendly forces who act as adversaries to assess friendly force
capabilities, vulnerabilities, and readiness.
37
evaluate the use of Computer Network Attack (CNA), referred in this report as OCO, with
respect to LOAC and other international agreements; however, it does not specify who is
allowed to make these evaluations, even in the context of self-defense.23 The lack of policy
regarding OCO implies that, unless specifically granted, no elements of the Navy or Joint force
possess the authority to conduct offensive operations in cyberspace, including active defense.
There are several potential reasons that authorities for OCO have been withheld. One reason
may be the difficulty involved in engineering exploits for targets of value. These targets are
often military or government systems that are highly secure or air-gapped from the Internet. As
a result, exploits represent highly valuable weapons that should be expended sparingly and in
pursuit of strategic objects for maximum effect. A second potential reason is that a system
valuable to an adversary, when exploited, often represents a significant source of intelligence. In
most cases, a subsequent attack against such a system destroys the intelligence resource in the
process. As a result, a thorough examination of intelligence gain and loss must be performed.
The significance of the intelligence from these sources means that national leaders are often the
only individuals with a complete understanding of the value of the assets. As a result, national
leaders may be reluctant to delegate offensive authorities to subordinates who are unaware of the
intelligence gain and loss tradeoffs. The final reason for withholding offensive cyber authorities
is the risk of collateral damage. Exploits have the potential, if engineered incorrectly, to cause
numerous and widespread unintended effects. This is especially true if the exploits or attacks
utilize the Internet, where they can spread rapidly and extensively. These potential adverse
consequences have led to reluctance on the part of national leaders in employing offensive cyber
capabilities. This reluctance also means that national leaders have been unwilling to delegate
authorities to conduct OCO or DCO-Response Actions (DCO-RA).
38
E. Summary
It is unlikely that the Navy’s responsibility to the Joint force in cyber operations will
change. As a result, the Navy will continue to be tasked with manning, training and equipping
its forces for operations in a dynamic cyber environment. A review of Navy readiness in each of
these areas revealed progress but also significant room for continued improvement.
In the area of technological readiness, the Navy has focused almost exclusively on
passive defense. These efforts have primarily targeted standardization and defense-in-depth.
While standardization has helped simplify cyber defense, the focus on commercial best practice
ignores those threats of most concern to the Navy. Similarly, the Navy’s defense-in-depth
approach is focused on meeting commercial threats, with minimal incorporation of analysis
examining threats specific to Navy systems. The defense-in-depth approach for IT-21 systems
also seems to ignore enclave level network device security. While the Prometheus system
represents a significant step forward, maritime combatants still lack an organic forensics analysis
capability. Finally, CSG commanders do not have authorities to conduct OCO.
The Navy is currently lacking sufficient cyber expertise and the expertise that currently
exists is highly concentrated. The Navy has also primarily focused its personnel readiness on
commercial certification. As a result, there is nearly no expertise in OCO within the Navy.
Current commanders are also ill prepared to conduct cyber operations due to inadequate training.
As a result, at the maritime combatant level, the Navy’s cyber readiness is lacking.
As in other readiness areas, Navy policy has focused on defensive cyber operation as
demonstrated by implementation of the commercially oriented IA Workforce program and the
documentation driven CSICP process. While the IAVM program establishes the correct
mechanisms, the absence of a streamlined method of execution creates additional vulnerability.
39
The absence of Navy policy concerning OCO is based on the decisions of higher authorities.
Overall, the Navy has made respectable progress in improving its defensive cyber
posture; however, if tasked the Navy would be ill prepared to conduct any form of cyber
offensive operation.
40
Notes:
1
Cox, RADM Samuel J. Personal interview. United States Cyber Command. 4 June 2012.
Department of the Navy, Chief Information Officer. "CHIPS Articles: The Common PC
Operating System Environment Program - COMPOSE"
http://www.doncio.navy.mil/chips/ArticleDetails.aspx?ID=3044. Accessed 20 June 2012.
3
Joint Task Force – Global Network Operations. “Computer Tasking Order (CTO) 07-12”. 9
October 2007.
4
Defense Information Systems Agency. "Host Based Security System (HBSS): Components"
http://www.disa.mil/Services/Information-Assurance/HBS/HBSS/Components. Accessed
19 June 2012.
5
Center for Information Dominance. “A-202-0006 / A-3B-0027 Trainee Guide” Revision 01-10.
Pensacola, Florida. p 9-4.
6
Department of the Navy, Chief Information Officer. “Computer Network Defense Roadmap”.
www.doncio.navy.mil/Download.aspx?AttachID=971. Accessed 21 June 2012.
7
Center for Information Dominance. “A-202-0006 / A-3B-0027 Trainee Guide” Revision 01-10.
Pensacola, Florida.
8
National Research Council, Committee on Information Assurance for Network-Centric Naval
Forces. “Information Assurance for Network-Centric Naval Forces”. 2010.
http://www.nap.edu/catalog.php?record_id=12609. Accessed 19 June 2012. p. 105.
9
Cox, RADM Samuel J. Personal interview. United States Cyber Command. 4 June 2012.
10
Ibid.
11
Novell. “U.S. Navy Cyber Defense Operations Command”. 2009.
http://www.infosecurityproductsguide.com/casestudies/2009/Novell_U_S_Navy_Cyber_
Defense_Operations_Command_Case_Study.pdf. Accessed 20 June 2012. p. 1.
12
Cox, RADM Samuel J. Personal interview. United States Cyber Command. 4 June 2012.
13
Ibid.
14
Department of Defense. Instruction 8570.1-M, “Information Assurance Workforce
Improvement Program”. 24 January 2012. p. 17.
15
Chief of Naval Operations. Instruction 5239.1C, “Navy Information Assurance Program”. 20
August 2008. p. 17.
16
Ibid, p. 19.
17
Commander Fleet Cyber Command. “General Admin Message 282138Z JAN 11”. 28 January
2011.
18
Department of Defense. Instruction 8510.01, “DoD Information Assurance Certification and
Accreditation Process”. 28 November 2007.
19
Deets, RADM Ned. “Integrated Air and Missile Defense Symposium”. 14 July 2011.
http://www.dtic.mil/ndia/2011IAMD/RADMDeets.pdf. Accessed 22 June 2012. p. 21.
20
Department of Defense. Directive O-8530.1, “Computer Network Defense”. 8 January 2001.
p. 2.
21
Department of Defense. Instruction O-8530.2, “Support to Computer Network Defense”. 9
March 2001. pp 37-38.
22
Department of the Navy. Instruction 5239.19, “Department of the Navy Computer Network
Incident Response and Reporting Requirements”. 24 January 2012.
2
41
23
Department of the Navy. The Commander’s Handbook on The Law of Naval Operations. NWP
1-14M. Washington DC: U.S. Government, 2007.
42
V. CASE STUDY: IRANIAN CYBER CONFLICT
A. Introduction
This section presents a scenario-based case study as a means to examine the current
baseline level of knowledge and understanding of U.S. Navy personnel regarding the application
and implication of LOAC to cyberspace operations. The case study begins with a
comprehensive review of the Islamic Republic of Iran’s cyber capabilities. This review,
combined with information from the previous section on U.S. Navy’s cyber readiness, was
utilized to develop a fictional cyber scenario that adversely affects a U.S. CSG. The information
presented in the sections reviewing LOAC and current U.S. cyber policies were then used to
develop a set of questions applicable to each element of the scenario. The combined scenario
and questions were then distributed and are discussed in the case study methodology subsection.
The final portion of this section provides case study findings derived from the aggregated
responses received from study participants.
B. Iranian Cyber Readiness
“Over the past three years, the Iranian regime has invested heavily in both
defensive and offensive capabilities in cyberspace…Its leaders now increasingly
appear to view cyber warfare as a potential avenue of action against the United
States.”
- Ilan Berman, Vice President, American Foreign Policy Council,
Testimony to the U.S. House of Representatives 26 April 2012
1. Background
Iran may already perceive itself to be at war with the U.S. This perception is based on
the belief that the U.S. was involved in the Stuxnet cyber attack, which in late 2010 caused 10%
of the centrifuges in Iran’s uranium enrichment facility at Natanz to shut down. This weapon
was able to surgically inflict physical damage on many of the centrifuges in the Natanz facility.
43
Since then, according to General James Clapper, Director of National Intelligence, there has been
a “seismic shift in Iranian Strategy…Iran officials - probably including Supreme Leader Ali
Khamenei - have changed their calculus and are now willing to conduct an attack in the United
States.”1 It is questionable whether Iran possesses the cyber weapons, cyber expertise,
intelligence gathering experience, organizational capability, and financial resources required to
conduct a sustained attack against military Command, Control, Communications, Computers,
Combat Systems, Intelligence, Surveillance, and Reconnaissance (C5ISR) systems. There is
consensus, however, that Iran is quickly advancing their cyber warfare capabilities.
2. Investment in Cyber Capabilities
Iran is currently estimated to be fifth in cyber capability world-wide. It lags closely
behind China, U.S., Russia, and India in overall capability, according to a study coordinated by
independent think-tank Technolytics.2 Iran has rapidly been gaining ground over the past three
years, with heavy investments in both offensive and defensive capabilities. A breakdown of
Iran’s cyber capabilities and resources is given below:
Budget: Approximately $1 billion U.S. Dollars (USD)3 - Iranian intent is to use the
money toward efforts that will leap-frog their progress closer to parity with China and Russia.
They intend on increasing investment in Commercial-Off-The-Shelf (COTS) technologies,
forming strategic alliances to aid progress, and ramping up strategic technology acquisitions.
Iran’s targeted investments include:




Acquisition of new technologies
Investments in cyber defense
Creation of a new cadre of cyber experts
Activation of an independent “Cyber Army” of activists
Cyber Forces: Approximately 2,400 personnel4 - This number does not include any
personnel support Iran may be getting from China, Russia, Venezuela, or North Korea. These
44
countries are thought to have either sold cyber technology to Iran to further its strategic cyber
goals (China and Russia)5, assisted Iran in developing its capabilities (North Korea and Russia)6,
or discussed coordination of cyber attacks on the Pentagon, CIA, and FBI (Venezuela).7 The
number of personnel in the Iranian cyber forces does not include help from non-state actors. The
composition of Iran’s cyber force includes:




Reserves and militia: 1,200
Broadband Connections: <100,000
Hacker Community: Size unknown. Very active in Iran. Known to routinely
execute successful attacks on Israeli web sites
Iranian Cyber Army: Could be a subset of Iran’s Hacker Community. Exact
composition is unknown
Potential Future Investments: Although currently lagging behind leading nations, Iran is
positioning its software sector to become internationally competitive. To more rapidly advance
its software sector and enhance its cyber warfare capability, it is possible that Iran could look to
China for assistance, as it has in the past for Weapons of Mass Destruction (WMD)8 and missile
technologies.9 It is also possible that Iran could take advantage of a robust Internet black market
to obtain malicious software and zero-day exploits at low cost.
3. Offensive Cyber Capabilities
A breakdown of Iran’s offensive cyber capabilities is presented below:
Cyber Arsenal: Iran is known to be in possession of the following:10




Compromised counterfeit computer software
Computer viruses and worms
Cyber data collection exploits
Computer and network reconnaissance tools
Iran is likely attempting to enlarge their arsenal of advanced cyber weapons, along with the
expertise to deploy such weapons. The extent of Iran’s advanced cyber arsenal remains unclear,
45
including the cyber and intelligence expertise required to successfully deploy the weapons
currently in their possession. Some advanced cyber weapons that Iran may possess include:





Exploitation of unreported software vulnerabilities (zero-day exploits)
Self-encrypting/decrypting of malicious code
External disruption of wireless networks
Electronic circuit destruction
Self-morphing malicious code applications
Iranian Cyber Army (ICA): The ICA surfaced in late 2009, soon after the discovery of
Stuxnet. The Armed Forces of the Islamic Republic and The Islamic Revolutionary Guard Corps
(IRGC) have not claimed affiliation with the ICA. The ICA is assumed to be an Iranian statesponsored hacker group specifically tasked to launch offensive cyber attacks on behalf of the
country. A favored tactic appears to be the use of social engineering to exploit the Internet and
cause disruptions.11
Reliable information regarding the composition of the ICA, as well as its intended targets
and goals, is not available. The Center for Strategic and International Studies claims that the
ICA possesses qualities and characteristics that parallel how the Iranian military has been
operating in recent years.12 These characteristics include suppression of the pro-democratic
‘Green Movement’, political retribution against the U.S. in reaction criticisms, and suppression
of freedom of expression via cyberspace.
ICA’s primary methods and tactics suggest that the group is undeveloped, inexperienced,
lacks coordination, and is unsophisticated in its approach. The sophistication of attacks and
targets selected indicate that the ICA is not yet capable of threatening critical military or civilian
infrastructure with any sustained or significant impact. So far, ICA’s primary targets have been
non-critical government and private sector websites such as Twitter, Baidu, and Voice of
America. The attacks themselves tend to involve the compromise of an outside server via DNS
46
cache poisoning in order to gain control of that server.a This type of attack causes minor
disruptions that can be recovered from easily. To date, ICA attacks have never resulted in
permanent damage or loss of sensitive data.
The composition of the ICA remains unclear. The Green Voice of Freedom claims that
professional hackers are blackmailed into participating and threatened with imprisonment if they
do not participate.13 It is also claimed that some hackers are tasked but are unaware that what
they are doing is in support of the ICA. One hacker group in Iran, the Ashiyaneh, is purported to
be a willing participant.14 It is possible that Iran has also recruited from terrorist groups with
known cyber capabilities. The most likely terrorist source would be the radical Iranian-backed
Lebanese Islamic Shiite group, Hezbollah. Hezbollah is considered by some to be the premier
terrorist organization for cyber capability, even though compared to the capabilities of the
leading countries (U.S., China, and Russia) it has a much lower overall capability rating of 3.3.15
Hezbollah is estimated to have several thousand members who support cyber efforts and annual
funding of $60 – 70 million USD.16 It is very unlikely that Hezbollah is capable of
independently executing successful attacks on the U.S. civilian or military critical infrastructure.
Iran appears to be recruiting personnel who have demonstrated hacking prowess to
augment the ICA. It remains unclear if Iran is recruiting a permanent cadre for development of
advanced offensive cyber capabilities, or if the augmented personnel are being used to train its
regular army in hacking skills.
International Comparison: Military cyber capability rating of 3.3 (1-5 scale)17 - The
latest 2012 threat analysis data from Technolytics, shown in Table 1 below, places Iran behind
a
To perform a cache poising attack, the attacker exploits a flaw in the DNS software to insert an imposter DNS
entry. This allows the attacker to redirect users to locations of the attacker’s choosing.
47
the leaders of cyber offensive capabilities (China, Russia, and the U.S.) who each have overall
ratings of 4.0, 3.9 and 3.9 respectively.
North
Russia
Korea
Offensive Intent
3.4
4.2
4.2
4.3
Offensive Capabilitiesb
3.4
3.5
3.4
3.5
Cyber Intelligence
3.0
4.2
3.3
3.8
Overall Rating
3.3
4.0
3.6
3.9
Table 1 – Technolytics Military Cyber Capability Ratings18
Capability
Iran
China
U.S.
Venezuela
4.2
3.6
3.8
3.9
2.1
2.0
1.5
1.9
Iran’s ability to adapt their intelligence collection capability to the cyber domain and their
military offensive cyber attack experience lags much further behind the U.S. or Russia.
4. Defensive Cyber Capabilities
Iran is aggressively responding to the increased threat of offensive cyber by developing
more robust indigenous cyber capabilities. Included in these efforts, the Iranian government has
invested heavily in methods for controlling Internet-based international communications.19
These methods include:








b
Construction of a halal Internet internal to the country of Iran and inaccessible by
the World-Wide Web. It was originally conceived to be on-line by late summer
2012, but this is thought to be an overly optimistic deadline.20
Requiring all Internet Service Providers (ISPs) are required to present halal
versions by August 2012
Installation of a Chinese-origin surveillance system for monitoring phone, mobile,
and Internet communications
Formation of a Supreme Council of Cyberspace manned by government officials
and appointees for monitoring and censorship of the halal Internet
Requiring all ISPs to be approved by the Telecommunication Company of Iran
and the Ministry of Culture and Islamic Guidance
Requiring ISPs to comply with a government filter list (unconfirmed claims
estimate that over 5 million Internet sites are already blocked)
Requiring Iranian people to register to use IranMail if they wish to communicate
over the Internet
Requiring bloggers and websites to be nationally registered
Offensive cyber capability includes force structure, technical superiority, readiness, and sustainability.
48
5. Impact to U.S. Navy Operations
Iran’s naval strategy has historically sought to avoid a direct force-on-force confrontation
with the U.S. due to the superiority of American coordinated air-sea offensive capability. Iran’s
military doctrine is primarily defensive and asymmetric in nature.21 The Iranian military’s
ability and expertise at coordinating combined air-naval defensive strike capability is far inferior
to that of the U.S. and poses no eminent threat to U.S. operations in the Arabian Gulf. Iran’s
ability to project power and launch a sustained offensive is very limited. Any attempts to do so
would quickly be suppressed by combined U.S. naval capabilities.
While the Iranian military could not prevail in a conventional engagement, there is a
potential that it perceives the U.S. military, and by extension the U.S. Navy, as vulnerable to
cyber attacks. While Iran probably does not have the capability to launch a cyber offensive that
significantly degrades U.S. C5ISR systems, it has been forming alliances with other countries
that do possess the capability.22 Additionally, U.S. Navy systems are highly dependent on COTS
components, which may allow Iran to utilize readily available exploits to adversely impact naval
operations.
Iran’s style of warfare is unconventional and asymmetric. It has been described as a
“hybrid mosaic” using a decentralized Command, Control, and Communications (C3)
architecture, making it more resilient to OCO and DCO-RA.23 In addition, Iran’s C3 architecture
continues to improve. The military branches are better coordinated, improving reaction time,
rapid maneuverability, and joint operations capabilities. Their C3 capabilities remain limited,
but communications density has improved despite a continued reliance on Very High-Frequency
(VHF) radio with low data rates and poor security.24 Over the past few years, Iran has begun to
49
acquire Chinese and western encryption systems and digital voice capabilities.25 Overall, their
C3 capability remains far behind that of the U.S., particularly regarding joint operations.
C. Case Study Methodology
1. Background
The remainder of this section examines the case study that was conducted to determine
the baseline level of knowledge and understanding within the Navy regarding the application and
implications of LOAC to cyber operations. The desire is that the case study findings will inform
recommendations to help the Navy fulfill its mission within the cyberspace domain.
Development of this case study proceeded in three phases: scenario generation, question
generation, and sample selection. Each of these phases is individually discussed below.
Appendix B is supplied to provide the full set of case study documentation. The appendix
contains a listing of the respondents, a copy of the scenario as distributed, and a compilation of
responses.
2. Scenario Generation
The scenario for the case study was developed using material from the Iranian and Navy
cyber readiness reviews. The design of the scenario centered on an evolving timeline affecting a
deployed CSG. This timeline encompassed five distinct situations with each situation building
on the events contained in all preceding situations. The objective of this evolving timeline was
to gradually escalate the severity of the effects on the CSG, using questions at each juncture to
help identify various thresholds for what constitutes ‘cyber attacks’, ‘armed attacks’ and allows
the exercise of ‘inherent right to self-defense’.
50
3. Question Generation
The questions for the case study were developed using material from the reviews of
LOAC and U.S. cyber operations policy. The questions were designed to gain insight regarding
understanding and knowledge of LOAC, cyberspace situational awareness, guidance on
cyberspace operations, and understanding authorities for operating in cyberspace. Additionally,
the study sought information concerning the state of response methods for complex cyberspace
incidents.
4. Sample Selection
The selection of the sample population for the case study was based on association with
the Navy, assignment, degree of cyber expertise, availability and amenability. These criteria
specifically targeted a population of personnel with cyber responsibilities. The goal was to first
attempt to understand the level of knowledge among Navy experts.
Within this target sample population, 27 individuals were solicited to participate.
Solicitation was conducted via email, with the case study form attached and a request for a
response by the specified date. Participants’ responses were collected over a period of 11 days.
Of those individuals solicited, 17 responded and 11 were selected based on the above criteria.
The positions of the 11 selected respondents are listed below:









A former Deputy Director of Naval Intelligence
A Network Operations Director
A CSG Assistant Chief of Staff for Intelligence
A consolidated input from personnel of the Fleet Information Operations Center
(FIOC) at Navy Information Operation Command (NIOC) Maryland
A CSG Assistant Chief of Staff for Information Operations
A former CSG Staff Communications Officer
A Deputy National Security Agency (NSA)/Central Security Service (CSS)
Representative for Defense
An Assistant Chief of Staff at the Navy Marine Intelligence Training Center
An Echelon III Commanding Officer responsible to Office of Naval Intelligence
(ONI)
51


The Deputy Chief of Staff for Communications and Networks for a Numbered Fleet
Commander
An Assistant Chief of Staff at U.S. Cyber Command (USCYBERCOM)
This report has intentionally avoided attribution of case study responses to specific individuals to
avoid associating the response of individuals with the official position of their parent
organizations.
5. Sources of Bias
The scenario responses provide some expert commentary on issues of Navy cyber
operations and LOAC. There are some potential sources of bias in the responses that should be
considered. The sources of bias are presented here are intended to permit a more comprehensive
evaluation of the case study results found below. The potential sources of bias include:



This case study intentionally sought expert responses, and was not conducted with
traditional experimental methodology. The participants were solicited based on their
expertise within the cyber arena. It is possible that the absence of variance in some
responses is a direct result of limited diversity in backgrounds.
In an attempt to provide the participants sufficient clarity without making the scenario
overwhelming in length, the scenario emphasizes the central role of the malicious
emails in the background statement. With this early presentation, some participants
may overemphasize its role in the early stages of discovery and analysis. It is
possible that in a similar realistic circumstance they may not have correlated the
malicious emails with other anomalies as quickly.
Only eight participants answered all five sections of the case study completely.
Ideally, the sample size would have been larger to provide a more representative
population.
D. Case Study Results
This section provides a summary of the case study results organized by question set in
accordance with the format presented to participants. Each subsection includes a brief synopsis
of the applicable scenario situation, associated questions, and summary of responses.
52
1. Question Set 1
Scenario Situation:






The USS Forestall CSG (FORSTRKGRU) deploys for the U.S. Central Command
(USCENTCOM) area of responsibility
A week into the deployment, the crew receives emails from WeSupportU.com
containing advertisements and coupons for local venders within USCENTCOM
On Day 76, the CSG pulls into port and discovers that the coupons were not valid.
One week into the deployment CSG network traffic increases by 60% and email
server CPU utilization increases significantly
No viruses appear on the server virus scans
The CSG Deputy Chief of Staff for Computer and Networks (N6) concludes that
increased network traffic and email CPU server utilization and is normal as crew
adjusts to underway life
Questions:
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Summary of Results:
Of the ten participants in this experiment, five concurred with the N6. Each stated that
the N6 made the best assessment based on the network data provided. Despite agreeing with the
initial assessment, all five stated that they would report the incident to the entities capable of
performing a more thorough analysis of the situation. There was little agreement among these
participants regarding which external entities to notify. Three mentioned that they would inform
the NCDOC and three others mentioned Fleet Cyber Command (FCC). Organizations mentioned
less than three times include Naval Criminal Investigative Service (NCIS), National CounterTerrorism Center (NCTC), and the Navy Computer and Telecommunications Area Master
Station (NCTAMS).
53
Two of the five also recommended that the strike group closely monitor its network
traffic to verify the increase in network activity is due to normal network use.
Five participants disagreed with the conclusion of the N6. Two participants stated that
the involvement of a bad actor or a commercial email distribution to the entire CSG were
sufficient to question whether increased network activity was from non-routine causes. A third
participant questioned the validity of the virus scan, inferring that a possible zero-day attack
should be considered. The other two participants that did not concur with the N6 assessment
doubted the accuracy of the network data and argued that more information is necessary to prove
the baseline numbers.
With regard to recommendations, one of these five recommended that the Cryptological
Technician (Network) (CTN) attached to the CSG conduct advanced analysis of servers, packet
shapers and switches. The CSG should then request that NCDOC perform a study of emails to
identify if outgoing messages contain a beacon. He also recommended setting ‘River City’.c
Another recommended using an Internet Security Accelerator (ISA) server to block the
website. He would filter emails at the exchange server and notify NCDOC of the incident. He
would also have the CND deployer scan the network with a NIOC CND toolset for malware.
2. Question Set 2
Scenario Situation:




c
A significant number of service member and associated family member names
appeared on an Iranian website
The site is operated by an Iranian cleric with strong anti-U.S. views
The site prominently displays a fatwa issued by the site’s operator declaring any
individual listed as an infidel and calling for jihad against them and their families
Many of the service members continue to correspond with family and friends on the
website used to facilitate delivery of purchased goods to their homes in the U.S.
River City is condition under which NIPRNet transmissions are restricted to a select group of individuals.
54
Questions:
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please
discuss your reasoning.
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
‘cyber attack’ on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Q 2-3: The Admiral requests of USCENTCOM, in conjunction with USCYBERCOM, a
determination on whether the events constitute a cyber-attack. She plans to brief Commander 5th
Fleet on the issue and wants to provide a COAs if the events are determined to constitute a
‘cyber attack’. How would you advise the Admiral? Please also explain why preparing COAs
for the cyber attack contingency are appropriate for the situation.
Summary of Results:
Nine of ten participants judged that the compromise of Personally Identifiable
Information was the most significant issue in this portion of the case study. Eight judged this to
be the direct result of poor Operational Security (OPSEC). Eight of the participants
recommended setting ‘River City’. The participants went on to suggest that the CSG personnel
should review OPSEC principles.
One of the participants believed that the discovery of personal information on a malicious
website justifies increase network monitoring and preparation for a lethal response. Another
participant suggested developing COAs for a set of pre-planned and response options.
One participant provided a detailed COA that follows:







Forward information on crew and merchants to NCIS and Defense Intelligence
Agency (DIA) for updated threat assessments
Advise exposed members of crew and their family of the increased threat and
personal exposure
Hold emergency OPSEC training
Secure/Block all social media access or set ‘River City’
Increase network traffic analysis of all units affected by the jihad threat
Increase Force Protection Condition (FPCON) for future port visits
Cancel further non-U.S. port calls
55
This input included elements all nine other COAs, which may indicate that the other
COAs were either incomplete or participants tried to achieve brevity in their responses. This
assumes that the detailed COA was entirely accurate.
Only one participant believed that the discovery of personal information on the website
constituted a ‘cyber attack’. This participant argued that a cyber operation resulting in death or
serious property damage constitute a ‘cyber attack’. If an information system is considered
property, then its compromise (i.e. unauthorized change of state) could be considered damage,
resulting in a ‘cyber attack’.
3. Question Set 3
Scenario Situation:




A contractor ashore performs network traffic analysis for 21 days
Analysis identifies a large number of encrypted 50 Kilobyte emails from users in the
CSG to a single shore-based email address
CSG virus and malware scans continue to indicate no anomalous activity
A situational awareness message is sent to all principal Navy stakeholders
Questions:
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Summary of Results:
All of the participants concluded that the 50 Kilobyte emails were the result of a virus.
Based on this conclusion, all participants also recommended actions to either reduce CSG
vulnerability to or provide greater insight into the nature of the virus. Most participants, nine of
eleven, proposed the continuation of their previously recommended defensive measures as well
as the solicitation of forensic and all-source analysis services from external entities.
56
One participant recommended that the external entities investigate the source of
encryption and try to discover any plain text versions of the transmissions. Another participant
recommended the CSG increase the Information Condition (INFOCON) level. He also
suggested continual reporting of malicious results to command and support entities, and
suggested that higher headquarters could provide any necessary technical assistance. Four
participants proposed that the CSG initiate forensic analysis of the network. Six participants
explicitly recommended that the CSG implement measures to sever contact with the malicious
server. Two individuals suggested that the CSG initiate network sanitization procedures.
Another participant recommended that the CSG Admiral request a coordinated monitoring and
data seeding campaign to assess the scope of response. He also suggested that the CSG
commander consider additional DCO-RA measures.
All participants agreed that forces afloat are not equipped with either the tools or trained
personnel to perform the type of forensic network analysis needed. One participant indicated
that there is usually only one CTN assigned to a CSG. The CTN is responsible for monitoring
network activity and performing the full spectrum of authorized DCO activities. As a result, a
single CTN is not sufficient to provide a robust DCO capability at the tactical level.
There was disagreement among participants about what capabilities exist afloat. Two
participants stated that there was no cyber defense capability afloat, including HBSS. One
participant stated that ships did maintain an HBSS capability, but they do not have the expertise
onboard to take full advantage of that capability. Another stated that there was no expertise or
equipment, but the authorities and policies to do so were in place. Yet another asserted that it is
not the responsibility of the CSG to perform forensic network analysis.
57
4. Question Set 4
Scenario Situation:



A zero-day exploit is discovered embedded in the Hard Rock Café coupons
Navy is now able to decrypt and read the 50 Kilobyte emails
Destination address for the emails is a webmail server in Estonia with an autoforward feature. It has been accessed by an Iranian IP address of interest.
Questions:
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
available to the FORSTRKGRU? What response should the CSG Commander recommend to
USCENTCOM and national leaders? What would constitute a proportional response in this
situation?
Summary of Results:
At this point, the participants were split, seven to three, in favor of whether the attack
should now be considered a ‘cyber attack’. Four of the participants believed that the ‘cyber
attack’ should be considered an ‘armed attack’. The other six participants did not agree with this
assessment. Those that considered the action a ‘cyber attack’ also considered the virus a ‘cyber
weapon’.
The group was divided regarding whether policy guidance exists to enable the CSG to
invoke its right of self-defense. Six believed that there is policy in place; three did not. Four
believed that the right to defend the network was inherent and provided under LOAC. Two
participants of the seven stated that despite their personal opinions, they would defer to the CSG
JAG lawyer as the authority on this set of questions.
58
Only seven of the participants answered the question regarding appropriate counter attack
mechanisms. Three stated that it was okay to implement cyber defense mechanisms, like
network sanitization and disabling communication with the malicious email server. Three
believed that offensive responses were an option, although they all expressed concern about the
proportionality of such responses. One of the three suggested the use of a demarche, comparable
exploit, or some other mechanism that would provide appropriate admonishment, yet still show
the adversary that acts like this will not go unpunished. Two suggested that the CSG use this
opportunity to launch a misinformation campaign against Iran. Two acknowledged that any
decision to affect another nation’s network is made at the national level, and there is no decision
authority at the CSG level. However, these two participants did not rule out justification for
counter attack.
5. Question Set 5
Scenario Situation:



CSG discovers an inaccurate order for 72 pallets of bottled water and the unexplained
cancellation of a shipment of small arms ammunition
A secondary virus that interfaces with the previously identified email virus was
discovered on supply system servers
The virus affecting supply system servers appear to be sending email to the Iranian
Embassy in the United Kingdom
Questions:
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
59
Summary of Results:
Only eight participants responded to this set of questions. Of the eight, five asserted that
the recently discovered actions constituted a ‘cyber attack’. One of the five deferred to the JAG
on this set of questions. A sixth participant stated that the intrusion is only a ‘cyber attack’ if it is
verified and attributed. One participant stated that the actions against the supply system do not
constitute a ‘cyber attack’. This individual stated that since a virus was used to penetrate the
network, there was no active disruption and thus no ‘cyber attack’.
Five of the eight participants did not believe that this was an ‘armed attack’ since there
were no lethal consequences from the network intrusion. The three individuals that believed an
‘armed attack’ occurred also considered the use of a ‘cyber weapon’ equivalent to a use of a
traditional weapon.
All eight individuals believed that the CSG could exercise its right of self-defense. Seven
participants assessed that the CSG had the option of implementing defensive measures at the
CSG level. Three of the seven believed that only defensive measures should be considered. Two
participants suggested that proportional offensive responses were a national-level decision and
should be exercised with discretion.
E. Case Study Findings
1. Nomenclature
The case study demonstrates that although there are authoritative documents that define
‘cyber attack’. Cyberspace practitioners tend to use their own understanding of not only the
term, but also what (according to LOAC) constitutes ‘armed attack’, ‘use of force’ and
‘proportionality’ in cyberspace.
60
Additionally, many respondents used the term ‘offensive response’ to refer to retaliatory
measures in response to a cyber attack perceived as hostile and attributable. It was unclear
whether respondents understood the difference between OCO and DCO-RA when referring to
proportional response. While there is some international agreement that a cyber attack may
constitute a hostile act, the USG has not defined procedures that can be used for a proportional
response via DCO-RA. Currently, offensive actions in cyberspace must be conducted using
procedures for OCO.
2. Functions and Resources
At various points in the case study, several of the participants expressed the desire to
report incidents to external entities for situational awareness or to request assistance. Despite
these desires, there was little consensus regarding who required notification. A sampling of the
organizations mentioned by participants includes NCDOC, NIOCs, NCIS, NCTC, and
NCTAMS. It is beyond the scope of this study to determine when each of these organizations
should be leveraged; however, Navy personnel require a more complete and uniform
understanding of each organization’s capabilities and responsibilities.
3. Cyber Procedures
In Question Set 3, after the virus was discovered, six of ten participants agreed on a
recommended COA. Intuitively there should be more consensus on the appropriate COA.
Without judging the responses for correctness, more training and expertise is needed to ensure
that all those responsible are aware of what prioritized actions must be taken.
61
Notes:
1
Berman, Ilan. "The Iranian Cyber Threat to the U.S. Homeland." Statement before the U.S.
House of Representatives Committee on Homeland Security Subcommittee on
Cybersecurity, Infrastructure Protection, and Security Technologies and Subcommittee
on Counterterrorism and Intelligence, April 26, 2012.
2
The Technolytics Institute. The Cyber Commander's eHandbook: The Weaponry & Strategies
of Digital Conflict. McMurray, PA, 2012.
3
Berman, Ilan. "The Iranian Cyber Threat to the U.S. Homeland." Statement before the U.S.
House of Representatives Committee on Homeland Security Subcommittee on
Cybersecurity, Infrastructure Protection, and Security Technologies and Subcommittee
on Counterterrorism and Intelligence, April 26, 2012.
4
Coleman, Kevin. "Iranian Cyber Warfare Threat Assessment." Defensetech. September 23,
2008. http://defensetech.org/2008/09/23/iranian-cyber-warfare-threat-assessment/
(accessed June 1, 2012).
5
Berman, Ilan. "The Iranian Cyber Threat to the U.S. Homeland." Statement before the U.S.
House of Representatives Committee on Homeland Security Subcommittee on
Cybersecurity, Infrastructure Protection, and Security Technologies and Subcommittee
on Counterterrorism and Intelligence, April 26, 2012.
6
The Technolytics Institute. The Cyber Commander's eHandbook: The Weaponry & Strategies
of Digital Conflict. McMurray, PA, 2012.
7
Payton, Theresa. "Technology: Iran's Comprehensive Cyber Strategy and Implications to the
U.S." The Blaze. May 4, 2012. http://www.theblaze.com/contributions/
iran%e2%80%99s-comprehensive-cyber-strategy-and-implications-to-the-u-s/ (accessed
June 1, 2012).
8
Deutch, John M. "Foreign Information Warfare Programs and Capabilities, Congressional
Testimony." Central Intelligence Agency. June 25, 1996. https://www.cia.gov/newsinformation/speeches-testimony/1996/dci_testimony_062596.html.
9
Spector, Leonard. "Chinese Assistance to Iran's Weapons of Mass Destruction and Missile
Programs, Testimony before the House International Relations Committee." Carnegie
Endowment for International Peace. September 12, 1996.
http://www.carnegieendowment.org/1996/09/12/chinese-assistance-to-iran-s-weapons-ofmass-destruction-and-missile-programs/cli.
10
Coleman, Kevin. "Iranian Cyber Warfare Threat Assessment." Defensetech. September 23,
2008. http://defensetech.org/2008/09/23/iranian-cyber-warfare-threat-assessment/
(accessed June 1, 2012).
11
Payton, Theresa. "Technology: Iran's Comprehensive Cyber Strategy and Implications to the
U.S." The Blaze. May 4, 2012. http://www.theblaze.com/contributions/
iran%e2%80%99s-comprehensive-cyber-strategy-and-implications-to-the-u-s/ (accessed
June 1, 2012).
12
Lukich, Alex. The Iranian Cyber Army. July 12, 2011. http://csis.org/blog/iranian-cyber-army
(accessed June 23, 2012).
13
"Who are the Iranian Cyber Army?" The Green Voice of Freedom. February 19, 2010.
http://en.irangreenvoice.com/article/2010/feb/19/1236 (accessed June 30, 2012).
62
14
Carr, Jeffrey. "Iran's Paramilitary Militia is Recruiting Hackers." Forbes. January 12, 2011.
http://www.forbes.com/sites/jeffreycarr/2011/01/12/irans-paramilitary-militia-isrecruiting-hackers/.
15
The Technolytics Institute. The Cyber Commander's eHandbook: The Weaponry & Strategies
of Digital Conflict. McMurray, PA, 2012.
16
Ibid.
17
Ibid.
18
Ibid.
19
Berman, Ilan. "The Iranian Cyber Threat to the U.S. Homeland." Statement before the U.S.
House of Representatives Committee on Homeland Security Subcommittee on
Cybersecurity, Infrastructure Protection, and Security Technologies and Subcommittee
on Counterterrorism and Intelligence, April 26, 2012.
20
Payton, Theresa. "Technology: Iran's Comprehensive Cyber Strategy and Implications to the
U.S." The Blaze. May 4, 2012. http://www.theblaze.com/contributions/
iran%e2%80%99s-comprehensive-cyber-strategy-and-implications-to-the-u-s/ (accessed
June 1, 2012).
21
Wright, Robin. The Iran Primer: Power, Politics, and U.S. Policy. Washington, D.C.: The
United States Institute of Peace Press in collaboration with the Woodrow Wilson
International Center for Scholars, 2010.
22
Payton, Theresa. "Technology: Iran's Comprehensive Cyber Strategy and Implications to the
U.S." The Blaze. May 4, 2012. http://www.theblaze.com/contributions/
iran%e2%80%99s-comprehensive-cyber-strategy-and-implications-to-the-u-s/ (accessed
June 1, 2012).
23
Freier, Nathan. "The Emerging Anti-Access/Area-Denial Challenge." Center for Strategic and
International Studies. May 17, 2012. http://csis.org/publication/emerging-antiaccessarea-denial-challenge.
24
Cordesman, Anthony H. and Adam C. Seitz. Iran Status Report: Iran and the Challenges to
Middle East Security. study, Washington, D.C.: Center for Strategic and International
Studies, 2009.
25
Ibid.
63
VI. RECOMMENDATIONS
A. Introduction
Cyberspace has emerged as a distinct warfare domain, fundamentally altering the way the
USG, and by extension the U.S. Navy, conducts operations. U.S. forces require assured access
to cyberspace as a prerequisite for successful operations in all warfare domains. U.S. adversaries
have identified cyberspace as a center of gravity and are exercising and improving operational
capability to exploit this domain.
The U.S. DoD must be poised to counter cyber threats. As a result, the Navy must fulfill
its obligation to give Navy and Joint commanders the unique advantages that cyberspace can
offer. To do this the Navy must man, train and equip forces that are capable of planning strategy
and executing the full range of cyberspace operations. The case study findings contained in this
report demonstrate that the Navy is not fully prepared, particularly with regard to understanding
the application and implications of LOAC to cyberspace operations.
B. Deficiencies
Although cyberspace is a relatively new warfare domain, LOAC is as equally applicable
in cyberspace as in any other warfare domain. While there is broad international consensus that
LOAC applies in cyberspace, the unique characteristics of cyberspace makes interpretation
challenging. Among these challenges is defining ‘armed attack’ and ‘use of force’, as well as
extending the ‘principle of proportionality’ and ‘inherent right to self-defense’. The case study
reveals a range of interpretations regarding the application and implications of LOAC for Navy
cyber operations. The case study also demonstrates the absence of a consensus on the thresholds
for ‘cyber attacks’, ‘armed attacks’ in cyberspace, and when ‘inherent right to self-defense’ is
warranted. The respondents did generally agree that even if there was a desire to react to an
64
‘armed attack’ within cyberspace, tactical commanders have neither the authorities nor tools
required. The case study also revealed general confusion regarding the organizational structures
and responsibilities for cyber within the Navy and lack of documented procedural methodologies
for addressing complex incidents in cyberspace. The sources within this report demonstrate that
no central Naval repository or publication exists which consolidates the scope of information and
references required to fully understand the application and implication of LOAC on cyberspace
operations.
Policy is essential for guiding commanders’ decisions in situations concerning LOAC.
Currently, DoD and Navy cyber defense policy is sufficient to allow commanders to reach
acceptable solutions to cyber security issues. In contrast, offensive cyber policy is
underdeveloped leaving the commander with no means for considering the implications of
LOAC. As a result, the absence of well-defined and robust cyber policy effectively restrains the
tactical and operational commanders’ ability to use force in response to a cyber attack as
permitted by LOAC.
While this report was primarily concerned with Navy cyber operations in the context of
LOAC, during the course of the report a number of other cyber operations issues came to light:




The Navy has much work to do to perfect a means for translating adversary
capabilities into an actionable threat evaluations centered on risks.
Maritime combatants lack an organic forensics analysis capability.
There are currently no policies mandating red teaming as a mechanism for
vulnerability discovery or readiness evaluation.
Offensive cyber capabilities are absent from the Navy’s cyberspace technological
arsenal.
C. Recommendations
As the case study indicates, the Navy’s level of understanding and knowledge regarding
the application and implications of LOAC is inconsistent at best. This is in part due to
65
unresolved questions regarding what constitutes ‘armed attack’, ‘use of force’ and ‘proportional
response’ in cyberspace. Currently, the authorities responsible to decide these issues reside at
the national strategic level, not within the U.S. DoD or with the Navy. Until these issues are
resolved, new policy to guide cyber operations is unlikely. As a result, in order to address the
Navy’s deficiency in understanding LOAC as it applies to cyberspace operations the Navy
should pursue the following two course of action:


Provide a repository of references which consolidates publications covering the
scope of information required to fully understand the current state of LOAC’s
application and implication to Navy cyberspace operations.
Ensure combatant commanders and JAGs are provided adequate instruction on
cyber operations commensurate with its critical role in modern naval combat,
including material on cyber threats, cyber policies, and the current state of
LOAC’s application and implication to cyberspace operations.
Regarding the Navy’s cyber operations deficiencies not specifically related to LOAC, the
following courses of action are recommended:





Implement policies strengthening ties between cyberspace operators and
intelligence elements.
Improve means for translating adversary capabilities into actionable threat
evaluations centered on risks.
Develop and deploy organic forensics analysis capability onboard maritime
combatants.
Implement policies mandating red teaming for vulnerability discovery and
readiness evaluation.
Invest in offensive and exploitation technologies to ensure the Navy can fulfill its
responsibility to the Joint force.
While each of the above recommendations represents an avenue for potential Navy
action, these areas also deserve additional study to identify and analyze appropriate most
impactful, cost effective, and expeditious means of implementation.
66
REFERENCES
Berman, Ilan. "The Iranian Cyber Threat to the U.S. Homeland." Statement before the U.S.
House of Representatives Committee on Homeland Security Subcommittee on
Cybersecurity, Infrastructure Protection, and Security Technologies and Subcommittee
on Counterterrorism and Intelligence, April 26, 2012.
Carr, Jeffrey. "Iran's Paramilitary Militia is Recruiting Hackers." Forbes. January 12, 2011.
http://www.forbes.com/sites/jeffreycarr/2011/01/12/irans-paramilitary-militia-isrecruiting-hackers/.
Center for Information Dominance. “A-202-0006 / A-3B-0027 Trainee Guide” Revision 01-10.
Pensacola, Florida. p 9-4.
Chief of Naval Operations. Instruction 5239.1C, “Navy Information Assurance Program”. 20
August 2008. p. 17.
Cicero, Marcus Tullius., “Speech in Defense of Titus Annius Milo”, 52 BC.
Coleman, Kevin. "Iranian Cyber Warfare Threat Assessment." Defensetech. September 23, 2008.
http://defensetech.org/2008/09/23/iranian-cyber-warfare-threat-assessment/ (accessed
June 1, 2012).
Commander Fleet Cyber Command. “General Admin Message 282138Z JAN 11”. 28 January
2011.
Cordesman, Anthony H. and Adam C. Seitz. Iran Status Report: Iran and the Challenges to
Middle East Security. study, Washington, D.C.: Center for Strategic and International
Studies, 2009.
Cox, RADM Samuel J. Personal interview. United States Cyber Command. 4 June 2012.
Deets, RADM Ned. “Integrated Air and Missile Defense Symposium”. 14 July 2011.
http://www.dtic.mil/ndia/2011IAMD/RADMDeets.pdf. Accessed 22 June 2012. p. 21.
Defense Information Systems Agency. "Host Based Security System (HBSS): Components"
http://www.disa.mil/Services/Information-Assurance/HBS/HBSS/Components. Accessed
19 June 2012.
Department of Defense. Department of Defense Cyber Policy Report. A Report to Congress
Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934,
Washington DC: U.S. Government, 2011.
67
Department of Defense. Directive O-8530.1, “Computer Network Defense”. 8 January 2001. p.
2.
Department of Defense. DoD Strategy for Operating in Cyberspace. Washington DC: U.S.
Government, 2011.
Department of Defense. Instruction 8510.01, “DoD Information Assurance Certification and
Accreditation Process”. 28 November 2007.
Department of Defense. Instruction 8570.1-M, “Information Assurance Workforce Improvement
Program”. 24 January 2012. p. 17.
Department of Defense. Instruction O-8530.2, “Support to Computer Network Defense”. 9
March 2001. pp 37-38.
Department of Defense. Legal Support to Military Operations. Joint Publication 1-04,
Washington DC: U.S. Government, 2011.
Department of the Navy. Instruction 5239.19, “Department of the Navy Computer Network
Incident Response and Reporting Requirements.”. 24 January 2012.
Department of the Navy, Chief Information Officer. "CHIPS Articles: The Common PC
Operating System Environment Program - COMPOSE"
http://www.doncio.navy.mil/chips/ArticleDetails.aspx?ID=3044. Accessed 20 June 2012.
Department of the Navy, Chief Information Officer. “Computer Network Defense Roadmap”.
www.doncio.navy.mil/Download.aspx?AttachID=971. Accessed 21 June 2012.
Deutch, John M. "Foreign Information Warfare Programs and Capabilities, Congressional
Testimony." Central Intelligence Agency. June 25, 1996. https://www.cia.gov/newsinformation/speeches-testimony/1996/dci_testimony_062596.html.
Encyclopedia Britanica. Merriam Webster.com. July 1, 2011. http://www.merriam-webster.com/
(accessed Jul 8, 2012).
Final Record of the Diplomatic Conference of Geneva. "Final Record of the Diplomatic
Conference of Geneva of 1949." Bern: Federal Political Department, 1949.
Hoover, Nicholas. "Cyber Attacks Becoming Top Terror Threat, FBI Says." Information Week.
February 1, 2012. http://www.informationweek.com/news/government/security/
232600046 (accessed July 6, 2012).
International Comittee of the Red Cross (ICRC). "Law of Armed Conflict, Basic Knowledge."
Training. International Red Cross, June 2002.
68
International Committee of the Red Cross. "Protocols additional to the Geneva Conventions of
12 August 1949." Protocols additional to the Geneva Conventions. Geneva: International
Committee of the Red Cross, 1977. 89-101.
Joint Task Force – Global Network Operations. “Computer Tasking Order (CTO) 07-12”. 9
October 2007.
Lukich, Alex. The Iranian Cyber Army. July 12, 2011. http://csis.org/blog/iranian-cyber-army
(accessed June 23, 2012).
National Research Council, Committee on Information Assurance for Network-Centric Naval
Forces. “Information Assurance for Network-Centric Naval Forces”. 2010.
http://www.nap.edu/catalog.php?record_id=12609. Accessed 19 June 2012. p. 105.
Naval War College. (2011). Non-International Armed Conflict in the Twenty-first Century.
Newport: U.S. Government.
Notification of the Federal Department of Foreign Affairs of Switzerland. "Protocol additional to
the Geneva Conventions of 12 August 1949." Genova Conventions, Protocol III. Bern:
International Committee of the Red Cross, 2005.
Novell. “U.S. Navy Cyber Defense Operations Command”. 2009.
http://www.infosecurityproductsguide.com/casestudies/2009/Novell_U_S_Navy_Cyber_
Defense_Operations_Command_Case_Study.pdf. Accessed 20 June 2012. p. 1.
Payton, Theresa. "Technology: Iran's Comprehensive Cyber Strategy and Implications to the
U.S." The Blaze. May 4, 2012. http://www.theblaze.com/contributions/
iran%e2%80%99s-comprehensive-cyber-strategy-and-implications-to-the-u-s/ (accessed
June 1, 2012).
President of the United States. "National Security Strategy." Whitehouse.gov. May 2010.
http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf
(accessed July 12, 2012).
Secretary of The Navy. Cyberspace Policy and Administration within the Department of the
Navy. Instruction 3052.2, Washington DC: U.S. Navy, 2009.
Sharp, Walter Gary. Cyberspace and the use of force. Falls Church, VA: Aegis Research
Corporation, 1999. p. 40.
Spector, Leonard. "Chinese Assistance to Iran's Weapons of Mass Destruction and Missile
Programs, Testimony before the House International Relations Committee." Carnegie
Endowment for International Peace. September 12, 1996.
69
http://www.carnegieendowment.org/1996/09/12/chinese-assistance-to-iran-s-weapons-ofmass-destruction-and-missile-programs/cli.
The Technolytics Institute. The Cyber Commander's eHandbook: The Weaponry & Strategies of
Digital Conflict. McMurray, PA, 2012.
The White House. Cyberspace Policy Review: Assuring a Trusted and Resilient Information and
Communication Infrastructure. Policy Review, Washington DC: U.S. Government, 2009.
The White House. International Strategy for Cyberspace. Washington DC: U.S. Government,
2011.
United Nations. (1945). Charter of the United Nations and Statute of the International Court of
Justice. San Francisco: United Nations.
United Nations. (1974). U.N. General Aassembly Resolution 3314. New York: United Nations.
United States Congress. (2010). National Defense Authorization Act for Fiscal Year 2011.
Washington D.C.: U.S. Government.
United States Congress. Title 50: War and National Defense, § 36 (United States Code).
"Who are the Iranian Cyber Army?" The Green Voice of Freedom. February 19, 2010.
http://en.irangreenvoice.com/article/2010/feb/19/1236 (accessed June 30, 2012).
Wright, Robin. The Iran Primer: Power, Politics, and U.S. Policy. Washington, D.C.: The
United States Institute of Peace Press in collaboration with the Woodrow Wilson
International Center for Scholars, 2010.
70
APPENDIX A ACRONYMNS AND ABBREVIATIONS
ACCM
Asset Configuration Compliance Module
ADMAT
Administration Documentation Management and Training
ADNS
Automated Digital Network System
AEM
Audit Extraction Manager
C2
Command and Control
C3
Command, Control, and Communications
C5ISR
Command, Control, Communications, Computers, Combat
Systems, Intelligence, Surveillance, and Reconnaissance
CENTRIXS
Combined Enterprise Regional Information Exchange System
CIA
Central Intelligence Agency
CIO
Chief Information Officer
CNA
Computer Network Attack
CND
Computer Network Defense
COA
Course Of Action
COMFLTCYBERCOM
Commander Fleet Cyber Command
COMPOSE
Common PC Operating System Environment
COTS
Commercial-Off-The-Shelf
CPU
Central Processing Unit
CSG
Carrier Strike Group
CSICP
Cyber Security Inspection and Certification Program
CSS
Central Security Service
CSU
Channel Service Unit
A-1
CTN
Cryptologic Technician (Network)
CWSP
Commercial Wideband Satellite Program
DAA
Designated Accrediting Authority
DCM
Device Control Module
DCO
Defensive Cyber Operations
DCO-RA
DCO-Response Actions
DHS
Department of Homeland Security
DIA
Defense Intelligence Agency
DIACAP
DoD IA Certification and Accreditation Process
DISA
Defense Information Systems Agency
DNI
Director of National Intelligence
DNS
Domain Name Server
DoD
Department of Defense
DoN
Department of the Navy
DoS
Department of State
DSCS
Defense Satellite Communication System
DSU
Data Service Unit
ECH I/II/III
Echelon I/II/III (Echelon I is the most senior)
ECO
Exploitation Cyber Operations
EHF
Extremely High Frequency
ePO
ePolicy Orechestrator
FBI
Federal Bureau of Investigations
FCC
Fleet Cyber Command
A-2
FIOC
Fleet Information Operations Center
FISA
Federal Information Security Act
FORSTRKGRU
USS Forestall Strike Group
FPCON
Force Protection Condition
GENSER
General Service
GIG
Global Information Grid
HBSS
Host-Based Security System
HIPS
Host Intrusion Prevention System
IA
Information Assurance
IAM
IA Manager
IAT
IA Technician
IAVA
IA Vulnerability Alert
IAVM
IA Vulnerability Management
IC
Intelligence Community
ICA
Iranian Cyber Army
IDS
Intrusion Detection System
IHL
International Humanitarian Laws
INE
Inline Network Encryption
INFOCON
Information Control
IRGC
Islamic Revolutionary Guard Crops
ISA
Internet Security Accelerator
ISIC
Immediate Superior In Chain
ISP
Internet Service Provider
A-3
ISSR
Inner Security Screening Router
IT-21
Information Technology for the 21st Century
JAG
Judge Advocate General
KG
Key Generator
LAN
Local Area Network
LOAC
Law of Armed Conflict
MDR
Medium Data Rate
NCDOC
Navy Cyber Defense Operations Command
NCIS
Navy Criminal Investigative Service
NCTAMS
Navy Computer Telecommunications Area Master Station
NCTC
National Counter Terrorism Center
NDAA
National Defense Authorization Act
NIOC
Navy Information Operations Command
NIPRNet
Non-secure Internet Protocol Router Network
NNWC
Naval Network Warfare Command
NSA
National Security Agency
MDR
Medium Data Rate
OCO
Offensive Cyber Operations
OPSEC
Operational Security
OSSR
Outer Security Screening Router
PA
Policy Auditor
PC
Personnel Computer
RF
Radio-frequency
A-4
RNOSC
Regional Network Operations and Security Center
RSD
Rouge System Detection
SCCM
System Center Configuration Manager
SCI
Sensitive Compartmented Information
SECDEF
Secretary of Defense
SIPRNet
Secret Internet Protocol Router Network
TIMEPLEX
Time Division Multiplexer
TSC
Theater Security Cooperation
TYCOM
Type Commander
U.N.
United Nations
UNCLAS
UNCLASSIFIED
U.S.
United States
USB
Universal Serial Bus
USCENTCOM
US Central Command
USCYBERCOM
US Cyber Command
USD
U.S. Dollars
USG
U.S. Government
USS
US Ship
VHF
Very-High Frequency
VPN
Virtual Private Network
VSCAN
Virus Scanning
WAN
Wide Area Network
WMD
Weapons of Mass Destruction
A-5
WWII
World War II
A-6
APPENDIX B CASE STUDY SUPPORTING MATERIALS
This Appendix presents supporting material for the Iranian cyber conflict case study
discussed in the main body of the report. This Appendix is divided into three sections. The first
section lists the individuals who participated in the study. The second section includes the study
form, scenario, questions, and the distribution email soliciting responses. The final section
provides the participant responses; however, identifying information has been removed to protect
individual privacy.
A. List of Participants
Captain Terry Roberts (USN, Ret), Former Deputy Director of Naval Intelligence. Director
Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania.
Captain Brian Broene (USN, Ret), Director of Network Operations, Naval Network Warfare
Command, Virginia Beach, Virginia.
Captain William Diehl (USN), Deputy National Capital Region, National Security Agency,
Central Security Service, Fort George Meade, Maryland.
Captain Eric Exner (USN), Deputy Chief of Staff for Education and Training (N7), Navy
Marine Intelligence Training Center, Virginia Beach, Virginia.
Captain James Mills (USN), Deputy Chief of Staff for Communications and Networks (N6),
Commander Fifth Fleet (C5F), Manamah, Bahrain.
Captain Christopher Page (USN), Commanding Officer, Hopper Information Support Center,
Suitland, Maryland.
Commander Daniel Kenda (USN), Deputy Chief of Staff for Intelligence (N2), Carrier Strike
Group 12, USS Enterprise, C5F Area of Operations, Arabian Gulf.
Lieutenant Colonel Troy Matterhorn (USMC),
Commander Dan Sander (USN), Deputy Chief of Staff for Information Operations (N39),
Carrier Strike Group 3, USS John C. Stennis, Bremerton, Washington.
Commander Mick Brons (USN), Operations Officer, Naval Information Operations Center
(NIOC) and the FIOC DCO Team, Fort George Meade, Maryland.
NIOC Maryland Watch Section
B-1
B. Case Study Scenario as Presented
A Microsoft Word file was used to email the study form to a group of participants. The text
of the study form is provided below:
Carnegie Mellon University
Information Networking Institute
Masters of Information Technology Strategy (MITS) – 1 Practicum
Cyber Operations & the Law of Armed Conflict
Participant’s Name:
Participant’s Title:
Date reviewed:
Participant,
The following paragraphs provide an evolving scenario that could potentially face a deploying
U.S. Navy Carrier Strike Group (CSG). The scenario begins with general background
information. Each subsequent section provides further amplifying information and a series of
questions. As an integral element of the Navy’s capability to conduct operations in cyberspace,
your perspective on the questions posed below will help shape the findings of the MITS-1
Practicum. These findings will reveal current and relevant thinking on issues related to Navy
operations in cyberspace; as a result, your candid and detailed responses are extremely helpful.
Please do not feel constrained to limit your response to the space provided under the format
below. Thank you in advance for your participation and assistance in supporting the research
objectives of our practicum study.
-
MITS-1 Cohort
Scenario Background Information:
USS Forestall departs Virginia en route to the Central Command Area of Responsibility
(CENTCOM AOR) mid-March 2012. The local media has extensively covered the deployment,
as well as departure of the other units in the CSG. Approximately one week after leaving port, a
significant number of the crew of the Forestall (Commanding Officers/COs, Executive
Officers/XOs, Command Master Chiefs/CMCs included) and her CSG begin receiving emails
from WeSupportU.com containing legitimate appearing discount advertisements for hotels,
restaurants, service industries and shopping locations; as well as recommended liberty activities.
Among these discount advertisements is a 50% off coupon for Hard Rock Cafés in Athens,
Bahrain, and Dubai. The Forestall Strike Group (FORSTRKGRU) makes no port calls en-route
to the Commander Fifth Fleet (C5F) area of responsibility (AOR) until day 76 when the CSG
pulls into Jebel Ali. After three days in port, the FORSTRKGRU CMC reports a number of
complaints from the crew claiming that the Hard Rock Café in Dubai will not honor the coupons
because the employees claim the coupons are counterfeit.
B-2
Scenario Question Set 1:
A subsequent investigation by the USS Forestall Naval Criminal Investigative Service
(NCIS) agent afloat determines that WeSupportU.com is an internet domain owned by a
Canadian national believed to have pro-Iranian beliefs and whose whereabouts are currently
unknown. Virus scans on all servers throughout the CSG using the most current virus signatures
provided by Space and Naval Warfare Command (SPAWAR) show no known viruses or
malware. The investigation did reveal a 60% increase in network traffic, a significant increase
in email server CPU utilization beginning one week into deployment, and widespread complaints
that applications appear to be running significantly slower. Network analysis indicates
bandwidth utilization remains within allotted limits and there is no detectable increase in disk
space use. The FORSTRKGRU Director of Communications and Networks (N6) concludes that
network volume increases are attributable to normal and expected changes in day-to-day
operations as service members adapt to a deployed battle rhythm. The degradation in application
performance is also attributed to these adjustments. The increase in email server demand is
judged to coincide with understandable increases commensurate with the completion of weapons
loading and reduced air operations for the transatlantic crossing, allowing service members more
time to correspond with friends and family ashore.
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Response 1-1:
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Response 1-2:
B-3
Scenario Question Set 2:
On the hundredth day of deployment, FORSTRKGRU Director of Intelligence (N2) is
notified that a significant number of service member and associated family member names have
appeared on an Iranian website. According to all source intelligence analysis, the site is operated
by an Iranian cleric with strong anti-U.S. views. In addition to names, unit assignments and links
to social media pages are included. These links provide easy access to recent and up to date
photographs of crew members and liberty activities in the United Arab Emirates (UAE).
Information on European and Middle-Eastern merchants known to do business with the US Navy
is also included, in particular a number of merchants who were on board USS Forestall when the
ship was transiting the Mediterranean Sea en-route to C5F. The site also prominently displays a
fatwa issued by the site’s operator declaring any individual listed an infidel and calling for
“Jihad” against the individuals, their families and all merchants who support the United States.
Many service members continue to correspond and exchange personal information with
merchants included on the website to facilitate delivery of purchased goods to their homes and
families in the U.S.
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please
discuss your reasoning.
Response 2-1:
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
“cyber-attack” on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Response 2-2:
Q 2-3: The Admiral requests of US Central Command (USCENTCOM), in conjunction with
USCYBERCOM, a determination on whether the events constitute a cyber-attack. She plans to
brief Commander 5th Fleet on the issue and wants to provide a COAs if the events are
determined to constitute a “cyber-attack”. How would you advise the Admiral? Please also
explain why preparing COAs for the cyber-attack contingency are appropriate for the situation.
Response 2-3:
B-4
Scenario Question Set 3:
Following the previous events, an enterprising contract employee at the Naval Computer
and Telecommunications Area Master Station (NCTAMS) tasked with supporting units in the
C5F AOR learns about the coupon disputes and subsequent investigation from a former
shipmate. Suspicious of emails and changes in network traffic patterns, the contractor employs a
network analysis tool for monitoring and logging traffic emanating from or destined for all units
in FORSTRKGRU. Monitoring and logging is conducted for 21 days, after which traffic
analysis identifies a large number of 50 Kilobyte emails from multiple users within the CSG to a
single shore based email address. All data contained within the emails is encrypted and the
frequency of emails appears to correspond to network utilization. A Naval message outlining the
results of this analysis is distributed to FORSTRKGRU, C5F, U.S. Fleet Forces (USFF), Navy
Network Warfare Command (NNWC), Commander 10th Fleet (C10F), Naval Information
Operations Command (NIOC) Maryland, and US Cyber Command (USCC). Virus and malware
scans on servers and hosts throughout the FORSTRKGRU continue to produce no abnormal
findings.
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Response 3-1:
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Response 3-2:
B-5
Scenario Question Set 4:
Analysis by national level agencies reveals that the FORSTRKGRU appears to be the
victim of a previously undetected virus (zero-day attack) deployed utilizing the fictitious
coupons for the Hard Rock Café. Extensive efforts have also resulted in the ability to decrypt
and read the emails recorded during the 21-day monitoring of FORSTRKGRU network traffic.
The emails contain portions of both personal and official emails from FORSTRKGRU, including
portions of briefing slides and spreadsheet attachments. The single destination address for the 50
Kilobyte emails was identified as a web mail account with an auto forward feature. The auto
forward feature was configured to delete all incoming email after sending it to an anonymous
email server. An email containing a network beacon sent to the anonymous email server
identified the end recipient as a web mail server in Estonia. Further investigation revealed the
account has only been accessed from Iran by an IP address correlating to a local Internet Service
Provider (ISP) in Tehran. The same ISP hosts the Iranian cleric’s website that calls for “Jihad”
against the U.S. and foreign individuals listed on the site. The ISP is the primary commercial
server for the civilian population in Tehran and is known to provide services to three large
civilian hospitals. All source intelligence also indicates that the cleric has numerous connections
with the government of Iran, and many members of his congregation are confirmed members of
Iran’s Revolutionary Guard.
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 4-1:
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Response 4-2:
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Response 4-3:
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
available to the FORSTRKGRU? What response should the CSG Commander recommend to
CENTCOM and national leaders? What would constitute a proportional response in this
situation?
Response 4-4:
B-6
Scenario Question Set 5:
While moored in Piraeus, the USS Forestall supply officer (SUPPO) is notified that 72
pallets of bottled water which had been requested to augment ship’s stores would not be
delivered with the next scheduled supply shipment. The SUPPO notifies the CO and
FORSTRKGRU that no additional bottled water had been ordered. Supply records onboard
indicate that no order for bottled water was ever submitted. The records of shore-based supply
facilities supporting FORSTRKGRU indicate an order was submitted via the normal electronic
ordering process and that all supporting documentation appears to have come from authorized
ship’s personnel. A subsequent cyber security analysis conducted by USCC personnel reveals
that no security patches have been installed since prior to deployment. Additionally, the
manufacturers default SYSADMIN password for the supply software was not changed following
the most recent upgrade. An examination of other FORSTRKGRU units reveals an identical
condition on two additional CSG units and a USNS vessel. After auditing supply order records
for accuracy, USS Relentless and USS Audacious and USNS Tenacious assigned to the
FORSTRKGRU, report an unexplained cancellation of orders for small-arms ammunition
needed after numerous weapons qualification sessions.
The USCC analysis also identifies a virus on the supply servers that appears to interface
with the virus affecting CSG email. This interface appears to support data exfiltration and
transmission of accurate information relating to CSG movements and schedules. Further
analysis reveals that resulting email contain a different source/destination address than the
address previously identified for the CSG virus. The supply virus appears to utilize the same
initial address with the auto forward feature, as well as utilizing the same subsequent anonymous
email server. At the anonymous email server the supply signals appear to be routed differently
than other traffic. These supply signals traverse a number of additional servers, all in differing
nations, and appear to either emanate or terminate with an IP address identified as belonging to
the Iranian embassy in London, U.K.
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 5-1:
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Response 5-2:
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
Response 5-3:
Q 5-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options or both are
available to the FORSTRKGRU? What response should the Admiral recommend to CENTCOM
and national leaders? What would constitute a proportional response in this situation?
Response 5-4:
B-7
B-8
C. Case Study Responses as Received
Participant 1
Scenario Question Set 1
A subsequent investigation by the USS FORRESTALL Naval Criminal Investigative
Service (NCIS) agent afloat determines that WeSupportU.com is an internet domain owned by a
Canadian national believed to have pro-Iranian beliefs and whose whereabouts are currently
unknown. Virus scans on all servers throughout the CSG using the most current virus signatures
provided by Space and Naval Warfare Command (SPAWAR) show no known viruses or
malware. The investigation did reveal a 60% increase in network traffic, a significant increase in
email server CPU utilization beginning one week into deployment, and widespread complaints
that applications appear to be running significantly slower. Network analysis indicates bandwidth
utilization remains within allotted limits and there is no detectable increase in disk space use.
The FORSTRKGRU Director of Communications and Networks (N6) concludes that network
volume increases are attributable to normal and expected changes in day-to-day operations as
service members adapt to a deployed battle rhythm. The degradation in application performance
is also attributed to these adjustments. The increase in email server demand is judged to coincide
with understandable increases commensurate with the completion of weapons loading and
reduced air operations for the transatlantic crossing, allowing service members more time to
correspond with friends and family ashore.
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Response 1-1: Yes; N6’s conclusion sounds reasonable. However, temporal analysis of the
possible spearphishing with the negative effects on network traffic, CPU utilization and degraded
speed warrant investigation by local IAM personnel. Some additional concerns:


Were only the Hard Rock Café coupons not honored? We would expect all
coupons from a malicious domain to be false.
Would NCIS investigate coupons that were not honored? How would NCIS
know?
Also, many internet domains are registered falsely…

Why did they virus scan? Was this a routine scan?
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Response 1-2: In addition to above, would report to NCDOC via Initial Incident Report (IIR)
located on their SIPRNET portal.
B-9
Participant 1
Scenario Question Set 2:
On the hundredth day of deployment, FORSTRKGRU Director of Intelligence (N2) is
notified that a significant number of service member and associated family member names have
appeared on an Iranian website. According to all source intelligence analysis, the site is operated
by an Iranian cleric with strong anti-U.S. views. In addition to names, unit assignments and links
to social media pages are included. These links provide easy access to recent and up to date
photographs of crew members and liberty activities in the United Arab Emirates (UAE).
Information on European and Middle-Eastern merchants known to do business with the US Navy
is also included, in particular a number of merchants who were on board USS FORRESTALL
when the ship was transiting the Mediterranean Sea en-route to C5F. The site also prominently
displays a fatwa issued by the site’s operator declaring any individual listed an infidel and calling
for “Jihad” against the individuals, their families and all merchants who support the United
States. Many service members continue to correspond and exchange personal information with
merchants included on the website to facilitate delivery of purchased goods to their homes and
families in the U.S.
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please discuss
your reasoning.
Response 2-1: Concern is personnel safety; NCIS should be notified. Recommend Command
Triad advise crewmembers of risks of social media, and instruct them to exercise caution when
dealing with these merchants (avoid use of credit cards, prefer alternate merchants, beware of
overly friendly or inquisitive customers or proprietors at those locations, avoid explicit US Navy
apparel, etc).
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
“cyber-attack” on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Response 2-2: Not a Cyber Attack; no indication given that the Cleric has sent malicious traffic
into the DoD GIG. Does not meet the CNA definition. However, the adversary is clearly using
information to its advantage (and to our harassment/discomfort!).
Q 2-3: The Admiral requests of US Central Command (USCENTCOM), in conjunction with
USCYBERCOM, a determination on whether the events constitute a cyber-attack. She plans to
brief Commander 5th Fleet on the issue and wants to provide a COAs if the events are
determined to constitute a “cyber-attack”. How would you advise the Admiral? Please also
explain why preparing COAs for the cyber-attack contingency are appropriate for the situation.
Response 2-3: Not a Cyber Attack; see previous response.
B - 10
Participant 1
Scenario Question Set 3:
Following the previous events, an enterprising contract employee at the Naval Computer
and Telecommunications Area Master Station (NCTAMS) tasked with supporting units in the
C5F AOR learns about the coupon disputes and subsequent investigation from a former
shipmate. Suspicious of emails and changes in network traffic patterns, the contractor employs a
network analysis tool for monitoring and logging traffic emanating from or destined for all units
in FORSTRKGRU. Monitoring and logging is conducted for 21 days, after which traffic analysis
identifies a large number of 50 Kilobyte emails from multiple users within the CSG to a single
shore based email address. All data contained within the emails is encrypted and the frequency of
emails appears to correspond to network utilization. A Naval message outlining the results of this
analysis is distributed to FORSTRKGRU, C5F, U.S. Fleet Forces (USFF), Navy Network
Warfare Command (NNWC), Commander 10th Fleet (C10F), Naval Information Operations
Command (NIOC) Georgia, and US Cyber Command (USCC). Virus and malware scans on
servers and hosts throughout the FORSTRKGRU continue to produce no abnormal findings.
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Response 3-1: Forensically image the email server and several hosts involved with the incident;
send hard drives to NCDOC for analysis. Submit IIR with date/time of outbound traffic and
advise NCDOC of same.
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Response 3-2: Equipment: NO (missing software, sensors). Expertise: NO (training).
Authorities: YES. Policy: YES.
B - 11
Participant 1
Scenario Question Set 4:
Analysis by national level agencies reveals that the FORSTRKGRU appears to be the
victim of a previously undetected virus (zero-day attack) deployed utilizing the fictitious
coupons for the Hard Rock Café. Extensive efforts have also resulted in the ability to decrypt and
read the emails recorded during the 21-day monitoring of FORSTRKGRU network traffic. The
emails contain portions of both personal and official emails from FORSTRKGRU, including
portions of briefing slides and spreadsheet attachments. The single destination address for the 50
Kilobyte emails was identified as a web mail account with an auto forward feature. The auto
forward feature was configured to delete all incoming email after sending it to an anonymous
email server. An email containing a network beacon sent to the anonymous email server
identified the end recipient as a web mail server in Estonia. Further investigation revealed the
account has only been accessed from Iran by an IP address correlating to a local Internet Service
Provider (ISP) in Tehran. The same ISP hosts the Iranian cleric’s website that calls for “Jihad”
against the U.S. and foreign individuals listed on the site. The ISP is the primary commercial
server for the civilian population in Tehran and is known to provide services to three large
civilian hospitals. All source intelligence also indicates that the cleric has numerous connections
with the government of Iran, and many members of his congregation are confirmed members of
Iran’s Revolutionary Guard.
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 4-1: No; these actions are not “using networks to disrupt, deny, destroy, or degrade”
blue force information resident on computer networks.” They constitute cyber espionage or
computer network exploitation (CNE).
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Response 4-2: No; these actions are not an armed attack. The virus is being used to exfiltrate
data, not deny/degrade/destroy etc. It is not a cyber weapon. The difference is one of intent.
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Response 4-3: No policy is required; the right to self-defense is inherent.
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
available to the FORSTRKGRU? What response should the CSG Commander recommend to
CENTCOM and national leaders? What would constitute a proportional response in this
situation?
Response 4-4: No counter-attack options are available to a CSG Commander. There are lots of
defensive options, depending on what the Navy CNDSP or national leaders decided: block,
monitor, or disrupt outbound communications are a few.
B - 12
Participant 1
Scenario Question Set 5:
While moored in Piraeus, the USS FORRESTALL supply officer (SUPPO) is notified
that 72 pallets of bottled water which had been requested to augment ship’s stores would not be
delivered with the next scheduled supply shipment. The SUPPO notifies the CO and
FORSTRKGRU that no additional bottled water had been ordered. Supply records onboard
indicate that no order for bottled water was ever submitted. The records of shore-based supply
facilities supporting FORSTRKGRU indicate an order was submitted via the normal electronic
ordering process and that all supporting documentation appears to have come from authorized
ship’s personnel. A subsequent cyber security analysis conducted by USCC personnel reveals
that no security patches have been installed since prior to deployment. Additionally, the
manufacturers default SYSADMIN password for the supply software was not changed following
the most recent upgrade. An examination of other FORSTRKGRU units reveals an identical
condition on two additional CSG units and a USNS vessel. After auditing supply order records
for accuracy, USS Relentless and USS Audacious and USNS Tenacious assigned to the
FORSTRKGRU, report an unexplained cancellation of orders for small-arms ammunition
needed after numerous weapons qualification sessions.
The USCC analysis also identifies a virus on the supply servers that appears to interface
with the virus affecting CSG email. This interface appears to support data exfiltration and
transmission of accurate information relating to CSG movements and schedules. Further analysis
reveals that resulting email contain a different source/destination address than the address
previously identified for the CSG virus. The supply virus appears to utilize the same initial
address with the auto forward feature, as well as utilizing the same subsequent anonymous email
server. At the anonymous email server the supply signals appear to be routed differently than
other traffic. These supply signals traverse a number of additional servers, all in differing
nations, and appear to either emanate or terminate with an IP address identified as belonging to
the Iranian embassy in London, U.K.
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 5-1: No; does not meet definition.
Additional Concerns:



For a CNA, this requisition cancellation would have to be attributable to some kind of
malicious electronic event that is clearly linked to the specific virus associated with the
Iranian actor, rather than run-of-the-mill malware that sneaked in due to poor security
practices and subsequently deleted other network data besides supply requisitions or
affected other portions of the network in some way.
Supply servers traverse a number of additional servers…..This question refers to
Attribution for the CNE/data exfil.
My DCO team thinks this is not a cyber attack. This is because they think the chain of
causality and attribution for information disruption/destruction (cancelled ammunition
requisitions) is insufficiently clear in your scenario
B - 13
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Response 5-2: No.
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
Response 5-3: Always has right to self-defense; see above.
Q 5-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options or both are
available to the FORSTRKGRU? What response should the Admiral recommend to CENTCOM
and national leaders? What would constitute a proportional response in this situation?
Response 5-4: As before, lots of defensive options are available to CSG. No counter-attack
options are available to CSG. IF the scenario were written to make this a cyber attack, a
proportional response would cause the adversary to doubt the integrity of his networks in some
way. There is a difficult calculus here in a low-level counter-attack. The gain from showing
resolve/stiff spine in the face of a small-scale attack would have to outweigh the risk of
escalation and/or the “burning” of a cyber tool that would be clearly attributable to the US. If not
a tool easily correlated with the US, no message would be sent to the adversary- unless:
(a)
The response was pre-approved/rule-based and allowed for near-real-time
response action, which could employ publicly available tools but could be recognized as
a US response simply due to coincidence of timeliness. OR
(b)
The response was done in coincidence with a public statement by the US that it
had detected ineffective attempts to degrade its networks on a deployed CSG. OR
(c)
The deployment of the publicly available exploit was done in a sophisticated
manner that demonstrated knowledge of the adversary’s network, in which case the
adversary might reasonably conclude a sophisticated nation-state actor, possibly the US,
had attacked it.
B - 14
Participant 2
Question Set 1
A subsequent investigation by the USS FORESTALL Naval Criminal Investigative
Service (NCIS) agent afloat determines that WeSupportU.com is an internet domain owned by a
Canadian national believed to have pro-Iranian beliefs and whose whereabouts are currently
unknown. Virus scans on all servers throughout the CSG using the most current virus signatures
provided by Space and Naval Warfare Command (SPAWAR) show no known viruses or
malware. The investigation did reveal a 60% increase in network traffic, a significant increase in
email server CPU utilization beginning one week into deployment, and widespread complaints
that applications appear to be running significantly slower. Network analysis indicates bandwidth
utilization remains within allotted limits and there is no detectable increase in disk space use.
The FORSTRKGRU Director of Communications and Networks (N6) concludes that network
volume increases are attributable to normal and expected changes in day-to-day operations as
service members adapt to a deployed battle rhythm. The degradation in application performance
is also attributed to these adjustments. The increase in email server demand is judged to coincide
with understandable increases commensurate with the completion of weapons loading and
reduced air operations for the transatlantic crossing, allowing service members more time to
correspond with friends and family ashore.
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Response 1-1:
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Response 1-2:
B - 15
Participant 2
Scenario Question Set 2:
On the hundredth day of deployment, FORSTRKGRU Director of Intelligence (N2) is
notified that a significant number of service member and associated family member names have
appeared on an Iranian website. According to all source intelligence analysis, the site is operated
by an Iranian cleric with strong anti-U.S. views. In addition to names, unit assignments and links
to social media pages are included. These links provide easy access to recent and up to date
photographs of crew members and liberty activities in the United Arab Emirates (UAE).
Information on European and Middle-Eastern merchants known to do business with the US Navy
is also included, in particular a number of merchants who were on board USS FORESTALL
when the ship was transiting the Mediterranean Sea en-route to C5F. The site also prominently
displays a fatwa issued by the site’s operator declaring any individual listed an infidel and calling
for “Jihad” against the individuals, their families and all merchants who support the United
States. Many service members continue to correspond and exchange personal information with
merchants included on the website to facilitate delivery of purchased goods to their homes and
families in the U.S.
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please discuss
your reasoning.
Response 2-1:
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
“cyber-attack” on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Response 2-2:
Q 2-3: The Admiral requests of US Central Command (USCENTCOM), in conjunction with
USCYBERCOM, a determination on whether the events constitute a cyber-attack. She plans to
brief Commander 5th Fleet on the issue and wants to provide a COAs if the events are
determined to constitute a “cyber-attack”. How would you advise the Admiral? Please also
explain why preparing COAs for the cyber-attack contingency are appropriate for the situation.
Response 2-3:
B - 16
Participant 2
Scenario Question Set 3:
Following the previous events, an enterprising contract employee at the Naval Computer
and Telecommunications Area Master Station (NCTAMS) tasked with supporting units in the
C5F AOR learns about the coupon disputes and subsequent investigation from a former
shipmate. Suspicious of emails and changes in network traffic patterns, the contractor employs a
network analysis tool for monitoring and logging traffic emanating from or destined for all units
in FORSTRKGRU. Monitoring and logging is conducted for 21 days, after which traffic analysis
identifies a large number of 50 Kilobyte emails from multiple users within the CSG to a single
shore based email address. All data contained within the emails is encrypted and the frequency of
emails appears to correspond to network utilization. A Naval message outlining the results of this
analysis is distributed to FORSTRKGRU, C5F, U.S. Fleet Forces (USFF), Navy Network
Warfare Command (NNWC), Commander 10th Fleet (C10F), Naval Information Operations
Command (NIOC) Georgia, and US Cyber Command (USCC). Virus and malware scans on
servers and hosts throughout the FORSTRKGRU continue to produce no abnormal findings.
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Response 3-1:
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Response 3-2:
B - 17
Participant 2
Scenario Question Set 4:
Analysis by national level agencies reveals that the FORSTRKGRU appears to be the
victim of a previously undetected virus (zero-day attack) deployed utilizing the fictitious
coupons for the Hard Rock Café. Extensive efforts have also resulted in the ability to decrypt and
read the emails recorded during the 21-day monitoring of FORSTRKGRU network traffic. The
emails contain portions of both personal and official emails from FORSTRKGRU, including
portions of briefing slides and spreadsheet attachments. The single destination address for the 50
Kilobyte emails was identified as a web mail account with an auto forward feature. The auto
forward feature was configured to delete all incoming email after sending it to an anonymous
email server. An email containing a network beacon sent to the anonymous email server
identified the end recipient as a web mail server in Estonia. Further investigation revealed the
account has only been accessed from Iran by an IP address correlating to a local Internet Service
Provider (ISP) in Tehran. The same ISP hosts the Iranian cleric’s website that calls for “Jihad”
against the U.S. and foreign individuals listed on the site. The ISP is the primary commercial
server for the civilian population in Tehran and is known to provide services to three large
civilian hospitals. All source intelligence also indicates that the cleric has numerous connections
with the government of Iran, and many members of his congregation are confirmed members of
Iran’s Revolutionary Guard.
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 4-1:
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Response 4-2:
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Response 4-3:
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
available to the FORSTRKGRU? What response should the CSG Commander recommend to
CENTCOM and national leaders? What would constitute a proportional response in this
situation?
Response 4-4:
B - 18
Participant 2
Scenario Question Set 5:
While moored in Piraeus, the USS FORESTALL supply officer (SUPPO) is notified that
72 pallets of bottled water which had been requested to augment ship’s stores would not be
delivered with the next scheduled supply shipment. The SUPPO notifies the CO and
FORSTRKGRU that no additional bottled water had been ordered. Supply records onboard
indicate that no order for bottled water was ever submitted. The records of shore-based supply
facilities supporting FORSTRKGRU indicate an order was submitted via the normal electronic
ordering process and that all supporting documentation appears to have come from authorized
ship’s personnel. A subsequent cyber security analysis conducted by USCC personnel reveals
that no security patches have been installed since prior to deployment. Additionally, the
manufacturers default SYSADMIN password for the supply software was not changed following
the most recent upgrade. An examination of other FORSTRKGRU units reveals an identical
condition on two additional CSG units and a USNS vessel. After auditing supply order records
for accuracy, USS Relentless and USS Audacious and USNS Tenacious assigned to the
FORSTRKGRU, report an unexplained cancellation of orders for small-arms ammunition
needed after numerous weapons qualification sessions.
The USCC analysis also identifies a virus on the supply servers that appears to interface
with the virus affecting CSG email. This interface appears to support data exfiltration and
transmission of accurate information relating to CSG movements and schedules. Further analysis
reveals that resulting email contain a different source/destination address than the address
previously identified for the CSG virus. The supply virus appears to utilize the same initial
address with the auto forward feature, as well as utilizing the same subsequent anonymous email
server. At the anonymous email server the supply signals appear to be routed differently than
other traffic. These supply signals traverse a number of additional servers, all in differing
nations, and appear to either emanate or terminate with an IP address identified as belonging to
the Iranian embassy in London, U.K.
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 5-1:
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Response 5-2:
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
Response 5-3:
Q 5-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options or both are
B - 19
available to the FORSTRKGRU? What response should the Admiral recommend to CENTCOM
and national leaders? What would constitute a proportional response in this situation?
Response 5-4:
Consolidated Response
1.
There is no clear definition for a cyber attack. Generically we call any unauthorized
actions on our computers a cyber attack because that is the term that has been in use for years. It
should not be confused, however, with an attack under the law of armed conflict and
international law. I'm unsure what definition this class will use, or how they will seek to apply it.
If they think that by calling something a cyber attack it gives rise to the right to self-defense
under the law of armed conflict, they are mistaken. Stealing data is not generally going to be an
armed attack. So I'm concerned what definitions are being used and how they are being applied.
2.
To correctly answer some of these questions, the students will need an understanding of
the SROE and authorities. Will this class include that? That would mean going classified. The
students can't really say what the Admiral should do in terms of self-defense without knowing
what the SROE and authorities that apply are. To answer outside that framework may lead to
incorrect assumptions about authority. I think the questions may save this by asking about
recommended actions, but really the best way to approach the law of armed conflict (LOAC)
issues here may be to take it out of what authority this admiral may or may not have, and focus
generally on what responses would be lawful under LOAC. That gets away from how we
delegate authority to take actions under LOAC.
3.
By example - Q5-1 asks if something is a cyber attack. Q5-2 asks if it is an armed attack.
Q5-3 asks if there is a right to self-defense. And Q5-4 asks us to assume an armed attack, and
then gets into what actions the Admiral can take or should recommend. To answer the first and
second, they'll need to define terms ahead of time. Generically, yes, all the questions seem to
qualify as a cyber-attack if that is defined by an unauthorized actor doing things against you or
without your permission via cyber means. The better question is whether they are a use of force.
They are not an armed attack - I'll say that outright. I don't even think they are a use of force. As
to right to self-defense, does this mean on the unit level or national level? Unit level gets into
ROE, as does Q5-4. National level, along with the recommendations part of Q5-4, may be more
generically tied to LOAC and international law and policy.
For an unclassified class, I'd keep more in line with LOAC, international law and national
security law and steer clear of issues that really are ROE matters such as what the Admiral can
do on her own authority. I'd also be careful in what definitions are used for terms such as cyber
attack and armed attack and self-defense.
B - 20
Participant 3
Question Set 1
A subsequent investigation by the USS FORRESTALL Naval Criminal Investigative
Service (NCIS) agent afloat determines that WeSupportU.com is an internet domain owned by a
Canadian national believed to have pro-Iranian beliefs and whose whereabouts are currently
unknown. Virus scans on all servers throughout the CSG using the most current virus signatures
provided by Space and Naval Warfare Command (SPAWAR) show no known viruses or
malware. The investigation did reveal a 60% increase in network traffic, a significant increase in
email server CPU utilization beginning one week into deployment, and widespread complaints
that applications appear to be running significantly slower. Network analysis indicates bandwidth
utilization remains within allotted limits and there is no detectable increase in disk space use.
The FORSTRKGRU Director of Communications and Networks (N6) concludes that network
volume increases are attributable to normal and expected changes in day-to-day operations as
service members adapt to a deployed battle rhythm. The degradation in application performance
is also attributed to these adjustments. The increase in email server demand is judged to coincide
with understandable increases commensurate with the completion of weapons loading and
reduced air operations for the transatlantic crossing, allowing service members more time to
correspond with friends and family ashore.
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Response 1-1: Yes, I would concur with the N6’s analysis, because 1) logic is sound, 2) systems
are still working, and 3) consistent with my own observations at this point in the deployment.
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Response 1-2: Certainly I would recommend reporting the “Wesupportu.com” incident to
operational and cyber chains of command, such as Fleet Commanders and NCDOC,
FltCybercom, etc., not just to NCIS (reporting held inside criminal investigations is “law
enforcement sensitive” and does not always inform the bigger picture.”) I’m sure that the
servicing NCTAMS could also provide some sort of network analysis on this CSG’s comms.
B - 21
Participant 3
Scenario Question Set 2:
On the hundredth day of deployment, FORSTRKGRU Director of Intelligence (N2) is
notified that a significant number of service member and associated family member names have
appeared on an Iranian website. According to all source intelligence analysis, the site is operated
by an Iranian cleric with strong anti-U.S. views. In addition to names, unit assignments and links
to social media pages are included. These links provide easy access to recent and up to date
photographs of crew members and liberty activities in the United Arab Emirates (UAE).
Information on European and Middle-Eastern merchants known to do business with the US Navy
is also included, in particular a number of merchants who were on board USS FORRESTALL
when the ship was transiting the Mediterranean Sea en-route to C5F. The site also prominently
displays a fatwa issued by the site’s operator declaring any individual listed an infidel and calling
for “Jihad” against the individuals, their families and all merchants who support the United
States. Many service members continue to correspond and exchange personal information with
merchants included on the website to facilitate delivery of purchased goods to their homes and
families in the U.S.
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please discuss
your reasoning.
Response 2-1: The primary areas of concern are poor OPSEC, and poor safeguarding of personal
information. It’s too late to rectify this situation – Personally Identifying Information (PII) can
only be safeguarded from the beginning. Once it’s out in cyberspace – it’s gone forever. I
personally do not believe that social media and OPSEC are compatible – I would seek to limit
social media throughout the Navy, and on this deployment, in particular (I do not participate in
social media). The CSG commander should not have allowed these merchants on the ship during
the passage. Strike Groups need to exercise better OPSEC from the beginning – this was not a
pleasure cruise to the MED on Carnival Cruise Lines – it’s the US’ battle fleet. Either act like a
battle fleet, or better to just not have a Navy, and save the American tax payers’ money.
Serious COA: 1) Counsel Sailors to not release PII, 2) Set RIVER CITY, 3) Conduct Blue Force
Monitoring.
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
“cyber-attack” on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Response 2-2: No, I do not concur that this is a cyber-attack, because 1) not credible, 2) not an
imminent threat (although Navy should report to NCTC and DHS). If this occurred in the U.S., it
would have border-line protection under 1st amendment (although, I’m sure one would be liable
for recent anti-terrorism laws). For example, no commander could exercise the right of
“cyber self-defense” based on this website. But, I’m sure the cleric will find himself on the U.S.
No-fly list. Again, the issue of PII being released where this cleric can access is the bigger matter
of concern – the Navy needs to do 1000% better job at protecting PII.
B - 22
Q 2-3: The Admiral requests of US Central Command (USCENTCOM), in conjunction with
USCYBERCOM, a determination on whether the events constitute a cyber-attack. She plans to
brief Commander 5th Fleet on the issue and wants to provide a COAs if the events are
determined to constitute a “cyber-attack”. How would you advise the Admiral? Please also
explain why preparing COAs for the cyber-attack contingency are appropriate for the situation.
Response 2-3: While this is a troubling issue, I do not consider this a cyber-attack. Again, no one
actually denied, degraded, or disrupted my cyber systems, and there is no credible or imminent
threat against my strike group. While one COA might be to launch a DDOS against this website,
I would not recommend this COA. I don’t believe any lawyer would find with right of selfdefense under this particular scenario. Therefore, any “counter” operations against this cleric
would have to be approved at levels far above the strike group commander; likely by NCA. An
easier COA would be to just enforce CSG OPSEC, and to set a restrictive RIVER CITY
condition if necessary.
B - 23
Participant 3
Scenario Question Set 3:
Following the previous events, an enterprising contract employee at the Naval Computer
and Telecommunications Area Master Station (NCTAMS) tasked with supporting units in the
C5F AOR learns about the coupon disputes and subsequent investigation from a former
shipmate. Suspicious of emails and changes in network traffic patterns, the contractor employs a
network analysis tool for monitoring and logging traffic emanating from or destined for all units
in FORSTRKGRU. Monitoring and logging is conducted for 21 days, after which traffic analysis
identifies a large number of 50 Kilobyte emails from multiple users within the CSG to a single
shore based email address. All data contained within the emails is encrypted and the frequency of
emails appears to correspond to network utilization. A Naval message outlining the results of this
analysis is distributed to FORSTRKGRU, C5F, U.S. Fleet Forces (USFF), Navy Network
Warfare Command (NNWC), Commander 10th Fleet (C10F), Naval Information Operations
Command (NIOC) Georgia, and US Cyber Command (USCC). Virus and malware scans on
servers and hosts throughout the FORSTRKGRU continue to produce no abnormal findings.
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Response 3-1: 1) Take Unit, Group, and Fleet level actions to prohibit contact with the offending
entity. 2) Initiate clean up procedures for affected users.
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Response 3-2: I do not believe that deploying forces have the equipment, expertise, and
associated authorities and policy to have figured out this problem on their own. (I am not smart
enough to know all the equipment that they would need). However, I don’t believe that Strike
Groups need all of this equipment. The Strike Groups are part of a network – they do not own the
network (it’s not organic to the strike group). There is no way they could gain the situational
awareness at their level to figure out the sophistication of this attack. Shore-based and national
entities are in a much-better position to figure these things out. Again, the CSG was in a position
to prevent release of so much of their PII, and they failed miserably.
B - 24
Participant 3
Scenario Question Set 4:
Analysis by national level agencies reveals that the FORSTRKGRU appears to be the
victim of a previously undetected virus (zero-day attack) deployed utilizing the fictitious
coupons for the Hard Rock Café. Extensive efforts have also resulted in the ability to decrypt and
read the emails recorded during the 21-day monitoring of FORSTRKGRU network traffic. The
emails contain portions of both personal and official emails from FORSTRKGRU, including
portions of briefing slides and spreadsheet attachments. The single destination address for the 50
Kilobyte emails was identified as a web mail account with an auto forward feature. The auto
forward feature was configured to delete all incoming email after sending it to an anonymous
email server. An email containing a network beacon sent to the anonymous email server
identified the end recipient as a web mail server in Estonia. Further investigation revealed the
account has only been accessed from Iran by an IP address correlating to a local Internet Service
Provider (ISP) in Tehran. The same ISP hosts the Iranian cleric’s website that calls for “Jihad”
against the U.S. and foreign individuals listed on the site. The ISP is the primary commercial
server for the civilian population in Tehran and is known to provide services to three large
civilian hospitals. All source intelligence also indicates that the cleric has numerous connections
with the government of Iran, and many members of his congregation are confirmed members of
Iran’s Revolutionary Guard.
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 4-1: Yes, the above actions constitute a cyber-attack, since they invaded other cyber
systems that they should not have had access to, and altered their operations.
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Response 4-2: Yes, the virus is a cyber-weapon. No, this is not an “armed” attack, because
nothing done during this attack had the potential for producing “blood and guts.”
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Response 4-3: If the CSG commander had detected the attack in progress, then she logically
should have certain rights of self-defense, provided that the responses are “necessary and
proportional.” I am not certain that ROE or even national policy permits this exercise of selfdefense; these issues are currently being debated at highest levels of government.
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
available to the FORSTRKGRU? What response should the CSG Commander recommend to
CENTCOM and national leaders? What would constitute a proportional response in this
situation?
B - 25
Response 4-4: I consider this an “attack,” but not an “armed attack.” I am not certain that there
should be a difference, but clearly there is a difference between “armed” and “cyber,” both in
terms of public opinion, and in LOAC. I think any defensive action which reaches out and
touches systems in a foreign country must be a national decision, since the effects of the action
would reach far beyond affecting only the cleric, and would have national/world-wide
implications.
B - 26
Participant 3
Scenario Question Set 5:
While moored in Piraeus, the USS FORRESTALL supply officer (SUPPO) is notified
that 72 pallets of bottled water which had been requested to augment ship’s stores would not be
delivered with the next scheduled supply shipment. The SUPPO notifies the CO and
FORSTRKGRU that no additional bottled water had been ordered. Supply records onboard
indicate that no order for bottled water was ever submitted. The records of shore-based supply
facilities supporting FORSTRKGRU indicate an order was submitted via the normal electronic
ordering process and that all supporting documentation appears to have come from authorized
ship’s personnel. A subsequent cyber security analysis conducted by USCC personnel reveals
that no security patches have been installed since prior to deployment. Additionally, the
manufacturers default SYSADMIN password for the supply software was not changed following
the most recent upgrade. An examination of other FORSTRKGRU units reveals an identical
condition on two additional CSG units and a USNS vessel. After auditing supply order records
for accuracy, USS Relentless and USS Audacious and USNS Tenacious assigned to the
FORSTRKGRU, report an unexplained cancellation of orders for small-arms ammunition
needed after numerous weapons qualification sessions.
The USCC analysis also identifies a virus on the supply servers that appears to interface
with the virus affecting CSG email. This interface appears to support data exfiltration and
transmission of accurate information relating to CSG movements and schedules. Further analysis
reveals that resulting email contain a different source/destination address than the address
previously identified for the CSG virus. The supply virus appears to utilize the same initial
address with the auto forward feature, as well as utilizing the same subsequent anonymous email
server. At the anonymous email server the supply signals appear to be routed differently than
other traffic. These supply signals traverse a number of additional servers, all in differing
nations, and appear to either emanate or terminate with an IP address identified as belonging to
the Iranian embassy in London, U.K.
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 5-1: Yes, this is another cyber attack, well-crafted and launched by a malicious actor.
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Response 5-2: No, this was not an armed attack because there was no potential for “blood and
guts.” It is an attack, however. Such attacks have potential to cause the U.S. to lose the war.
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
Response 5-3: Intuitively, CSG should have the right to “necessary and proportional self
defense” if she is able to detect an attack in progress (retaliatory strikes are not “necessary and
proportional.”) But, as with the Iran example, national decision would likely be required,
because of the scope of possible effects.
B - 27
Q 5-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options or both are
available to the FORSTRKGRU? What response should the Admiral recommend to CENTCOM
and national leaders? What would constitute a proportional response in this situation?
Response 5-4: I would not recommend any counter-attack from the CSG level; just better
network security and defensive measures. A proportional response would be to inflict a similar
level of damage on the adversary network, however, national leaders and the U.S. populace as a
whole are likely not interested in causing similar damage against the attacker.
B - 28
Participant 4
Question Set 1
A subsequent investigation by the USS Forestall Naval Criminal Investigative Service
(NCIS) agent afloat determines that WeSupportU.com is an internet domain owned by a
Canadian national believed to have pro-Iranian beliefs and whose whereabouts are currently
unknown. Virus scans on all servers throughout the CSG using the most current virus signatures
provided by Space and Naval Warfare Command (SPAWAR) show no known viruses or
malware. The investigation did reveal a 60% increase in network traffic, a significant increase
in email server CPU utilization beginning one week into deployment, and widespread complaints
that applications appear to be running significantly slower. Network analysis indicates
bandwidth utilization remains within allotted limits and there is no detectable increase in disk
space use. The FORSTRKGRU Director of Communications and Networks (N6) concludes that
network volume increases are attributable to normal and expected changes in day-to-day
operations as service members adapt to a deployed battle rhythm. The degradation in application
performance is also attributed to these adjustments. The increase in email server demand is
judged to coincide with understandable increases commensurate with the completion of weapons
loading and reduced air operations for the transatlantic crossing, allowing service members more
time to correspond with friends and family ashore.
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Response 1-1: I would not accept the N6’s assessment because I am aware that there are viruses
and or Trojans that although not currently known could be infecting the network. The fact that
the e-mail containing fake coupons was sent and opened on network machines coupled with the
information about the internet domain owner concerns me. I am not convinced that the network
has not been compromised. The fact that bandwidth use is within normal ranges does not prove
that the network has not been compromised. It is possible that the network has been
compromised and that the individuals who planted the virus or Trojan will not fully employ it
until the ship is engaged in high interest operations. They do not want to give away their
presenance until it provides the best tactical advantage.
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Response 1-2: I would recommend that the N6 notify COMTENTH Fleet and request a blue
team or NCDOC team come aboard to thoroughly inspect the network.
Participant 4
Scenario Question Set 2:
On the hundredth day of deployment, FORSTRKGRU Director of Intelligence (N2) is
notified that a significant number of service member and associated family member names have
appeared on an Iranian website. According to all source intelligence analysis, the site is operated
by an Iranian cleric with strong anti-U.S. views. In addition to names, unit assignments and links
to social media pages are included. These links provide easy access to recent and up to date
B - 29
photographs of crew members and liberty activities in the United Arab Emirates (UAE).
Information on European and Middle-Eastern merchants known to do business with the US Navy
is also included, in particular a number of merchants who were on board USS Forestall when the
ship was transiting the Mediterranean Sea en-route to C5F. The site also prominently displays a
fatwa issued by the site’s operator declaring any individual listed an infidel and calling for
“Jihad” against the individuals, their families and all merchants who support the United States.
Many service members continue to correspond and exchange personal information with
merchants included on the website to facilitate delivery of purchased goods to their homes and
families in the U.S.
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please
discuss your reasoning.
Response 2-1: I would recommend that the Commander ensure that their Essential Elements of
Friendly Information (EEFI) are updated and promulgated to the entire CSG. I would also
recommend that River City conditions be put in place restricting off ship access to the internet to
on select key personnel. I would announce to the crew that the restrictions are in place until
further notice because of a significant breach of Operational security (OPSEC). I would also
request an assist visit from COMTENTHFLT to ensure that the network was not compromised.
My reasoning is that the continued flow of the type of information described potentially could
compromise the safety and security of the entire CSG as well as the civilians the sailors are
corresponding with. These tactical actions could have strategic consequences.
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
“cyber-attack” on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Response 2-2: I am not a JAG but I do not concur that the cleric’s actions constitute a “cyberattack”. It is not possible to tell how the information was attained. My philosophy on an e-mail
or post of any kind on an unclassified network is that it is potentially available to anyone
anywhere on the internet.
Q 2-3: The Admiral requests of US Central Command (USCENTCOM), in conjunction with
USCYBERCOM, a determination on whether the events constitute a cyber-attack. She plans to
brief Commander 5th Fleet on the issue and wants to provide a COAs if the events are
determined to constitute a “cyber-attack”. How would you advise the Admiral? Please also
explain why preparing COAs for the cyber-attack contingency are appropriate for the situation.
Response 2-3: I do agree that the situation should be briefed to the CoC to determine if it
constitutes a “cyber-attack. I would implement the COAs I laid out previously. Enforce OPSEC
through EEFIs , institute River City conditions and request assistance from Cyber experts to
determine if the network has been compromised.
B - 30
Participant 4
Scenario Question Set 3:
Following the previous events, an enterprising contract employee at the Naval Computer
and Telecommunications Area Master Station (NCTAMS) tasked with supporting units in the
C5F AOR learns about the coupon disputes and subsequent investigation from a former
shipmate. Suspicious of emails and changes in network traffic patterns, the contractor employs a
network analysis tool for monitoring and logging traffic emanating from or destined for all units
in FORSTRKGRU. Monitoring and logging is conducted for 21 days, after which traffic
analysis identifies a large number of 50 Kilobyte emails from multiple users within the CSG to a
single shore based email address. All data contained within the emails is encrypted and the
frequency of emails appears to correspond to network utilization. A Naval message outlining the
results of this analysis is distributed to FORSTRKGRU, C5F, U.S. Fleet Forces (USFF), Navy
Network Warfare Command (NNWC), Commander 10th Fleet (C10F), Naval Information
Operations Command (NIOC) Maryland, and US Cyber Command (USCC). Virus and malware
scans on servers and hosts throughout the FORSTRKGRU continue to produce no abnormal
findings.
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Response 3-1: I would recommend that the Admiral request assistance from COMTENTHFLT
to get the individuals with the necessary technical knowledge to support the N6 staff in
determining the threat.
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Response 3-2: No. Most ships have HBSS installed only on SIPRNET. In many cases, HBSS is
disabled because the ship’s force find that in their opinion HBSS degrades the network
performance to an unacceptable level. Many of the issues stem from lack of expertise on the part
of the ship’s force. The number one issue is a junior/ inexperience workforce ships that lacks the
expertise to emply the tools they are provided with for network security. In many cases smaller
ships are not provide with advanced network tools.
B - 31
Participant 4
Scenario Question Set 4:
Analysis by national level agencies reveals that the FORSTRKGRU appears to be the
victim of a previously undetected virus (zero-day attack) deployed utilizing the fictitious
coupons for the Hard Rock Café. Extensive efforts have also resulted in the ability to decrypt
and read the emails recorded during the 21-day monitoring of FORSTRKGRU network traffic.
The emails contain portions of both personal and official emails from FORSTRKGRU, including
portions of briefing slides and spreadsheet attachments. The single destination address for the 50
Kilobyte emails was identified as a web mail account with an auto forward feature. The auto
forward feature was configured to delete all incoming email after sending it to an anonymous
email server. An email containing a network beacon sent to the anonymous email server
identified the end recipient as a web mail server in Estonia. Further investigation revealed the
account has only been accessed from Iran by an IP address correlating to a local Internet Service
Provider (ISP) in Tehran. The same ISP hosts the Iranian cleric’s website that calls for “Jihad”
against the U.S. and foreign individuals listed on the site. The ISP is the primary commercial
server for the civilian population in Tehran and is known to provide services to three large
civilian hospitals. All source intelligence also indicates that the cleric has numerous connections
with the government of Iran, and many members of his congregation are confirmed members of
Iran’s Revolutionary Guard.
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 4-1: Again, I am not a JAG but since the information was obtained by planting a
virus, I would classify it as a cyber-attack.
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Response 4-2: Again, a question for the lawyers. I do consider the actions a cyber-attack but I
do not consider it armed. One of the key principles of Rules of Engagement (ROE) is
proportionality. I do not think that you woud respond to a cyber-attack with a kinetic response.
That is just my opinion.
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Response 4-3: Again, JAG question. In my opinion, yes the FORSTRKGRU can defend their
network. It is a cyber-attack and they have the inherent right of self-defense.
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
available to the FORSTRKGRU? What response should the CSG Commander recommend to
CENTCOM and national leaders? What would constitute a proportional response in this
situation?
B - 32
Response 4-4: In my opinion I would limit the response to defending the network by eliminating
the virus. I might use the virus to feed misinformation or harmless information we want the
adversary to react to to gather proof of the attack for the international community.
B - 33
Participant 4
Scenario Question Set 5:
While moored in Piraeus, the USS Forestall supply officer (SUPPO) is notified that 72
pallets of bottled water which had been requested to augment ship’s stores would not be
delivered with the next scheduled supply shipment. The SUPPO notifies the CO and
FORSTRKGRU that no additional bottled water had been ordered. Supply records onboard
indicate that no order for bottled water was ever submitted. The records of shore-based supply
facilities supporting FORSTRKGRU indicate an order was submitted via the normal electronic
ordering process and that all supporting documentation appears to have come from authorized
ship’s personnel. A subsequent cyber security analysis conducted by USCC personnel reveals
that no security patches have been installed since prior to deployment. Additionally, the
manufacturers default SYSADMIN password for the supply software was not changed following
the most recent upgrade. An examination of other FORSTRKGRU units reveals an identical
condition on two additional CSG units and a USNS vessel. After auditing supply order records
for accuracy, USS Relentless and USS Audacious and USNS Tenacious assigned to the
FORSTRKGRU, report an unexplained cancellation of orders for small-arms ammunition
needed after numerous weapons qualification sessions.
The USCC analysis also identifies a virus on the supply servers that appears to interface
with the virus affecting CSG email. This interface appears to support data exfiltration and
transmission of accurate information relating to CSG movements and schedules. Further
analysis reveals that resulting email contain a different source/destination address than the
address previously identified for the CSG virus. The supply virus appears to utilize the same
initial address with the auto forward feature, as well as utilizing the same subsequent anonymous
email server. At the anonymous email server the supply signals appear to be routed differently
than other traffic. These supply signals traverse a number of additional servers, all in differing
nations, and appear to either emanate or terminate with an IP address identified as belonging to
the Iranian embassy in London, U.K.
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 5-1: Yes. The network was maliciously manipulated.
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Response 5-2: No for the same reasons that I stated previously. No shots were fired. No kenetic
actions took place.
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
Response 5-3: Yes. They have the inherent right to defend their networks with a proportional
response.
B - 34
Q 5-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options or both are
available to the FORSTRKGRU? What response should the Admiral recommend to CENTCOM
and national leaders? What would constitute a proportional response in this situation?
Response 5-4: In my opinion an armed response is not proportional. The response should be
limited to defending the network.
B - 35
Participant 5
Question Set 1
A subsequent investigation by the USS Forestall Naval Criminal Investigative Service
(NCIS) agent afloat determines that WeSupportU.com is an internet domain owned by a
Canadian national believed to have pro-Iranian beliefs and whose whereabouts are currently
unknown. Virus scans on all servers throughout the CSG using the most current virus signatures
provided by Space and Naval Warfare Command (SPAWAR) show no known viruses or
malware. The investigation did reveal a 60% increase in network traffic, a significant increase
in email server CPU utilization beginning one week into deployment, and widespread complaints
that applications appear to be running significantly slower. Network analysis indicates
bandwidth utilization remains within allotted limits and there is no detectable increase in disk
space use. The FORSTRKGRU Director of Communications and Networks (N6) concludes that
network volume increases are attributable to normal and expected changes in day-to-day
operations as service members adapt to a deployed battle rhythm. The degradation in application
performance is also attributed to these adjustments. The increase in email server demand is
judged to coincide with understandable increases commensurate with the completion of weapons
loading and reduced air operations for the transatlantic crossing, allowing service members more
time to correspond with friends and family ashore.
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Response 1-1: My gut feel is that simply deploying would not account for that drastic of an
increase in traffic or slow-down on the network. That said, I would still mostly concur IF it was
shown that a 60% increase was the normal pattern of traffic and system slow-down as
experienced by other deploying carriers. If not, then obviously further investigation is
warranted.
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Response 1-2: Even if that was determined to be the normal pattern, given that there is a
potential bad actor involved who has engaged in questionable activities that have already
affected us in other ways, I would investigate further into the situation by checking with NCTC
and CYBERCOM at a minimum. I would also report the activity up-chain.
B - 36
Participant 5
Scenario Question Set 2:
On the hundredth day of deployment, FORSTRKGRU Director of Intelligence (N2) is
notified that a significant number of service member and associated family member names have
appeared on an Iranian website. According to all source intelligence analysis, the site is operated
by an Iranian cleric with strong anti-U.S. views. In addition to names, unit assignments and links
to social media pages are included. These links provide easy access to recent and up to date
photographs of crew members and liberty activities in the United Arab Emirates (UAE).
Information on European and Middle-Eastern merchants known to do business with the US Navy
is also included, in particular a number of merchants who were on board USS Forestall when the
ship was transiting the Mediterranean Sea en-route to C5F. The site also prominently displays a
fatwa issued by the site’s operator declaring any individual listed an infidel and calling for
“Jihad” against the individuals, their families and all merchants who support the United States.
Many service members continue to correspond and exchange personal information with
merchants included on the website to facilitate delivery of purchased goods to their homes and
families in the U.S.
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please
discuss your reasoning.
Response 2-1: There is no direct evidence that this and the fake coupon events are related yet,
although that is an obvious inference. It warrants close investigation. In terms of COAs, we are
actually pretty limited. You cannot take any direct action against the website itself of course; no
authority or tools to do so and unlikely to be very effective even if you could. Once the info is
out there, it is VERY difficult to fully remove it from cyberspace. The best COAs will involve
getting the word out to the crew about INFOSEC and control of personal information.
Encourage them to disable their social media accounts, even if it is only for the short term.
Review all ship’s INFOSEC procedures to identify any potential problems. Continue to analyze
the network for other problems, and correct them if found (to ensure the ship is not unwittingly
compromising ship’s crew, vendor or port-of-call information.) Encourage crew members to
cease doing business with those merchants or at least to take all transactions offline. Promote the
idea of increased vigilance of one’s surroundings for themselves and their family members, and
report any suspicious activity to the police.
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
“cyber-attack” on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Response 2-2: It may or may be accurate, depending on how she means it. It is certainly possible
that they obtained the information they have FROM a cyber-attack on the ship via the email
system, or from the serviceman’s home computers. It is also possible that they simply obtained
the information by reading unsecured, social media profiles, and did not have to resort to any
cyber attack methods. They also do not appear to be recommending follow-on cyber attacks
specifically, but rather attacks of any type are encouraged.
B - 37
Q 2-3: The Admiral requests of US Central Command (USCENTCOM), in conjunction with
USCYBERCOM, a determination on whether the events constitute a cyber-attack. She plans to
brief Commander 5th Fleet on the issue and wants to provide a COAs if the events are
determined to constitute a “cyber-attack”. How would you advise the Admiral? Please also
explain why preparing COAs for the cyber-attack contingency are appropriate for the situation.
Response 2-3: Preparing and executing COAs, similar to the ones I describe above, are always
prudent whether or not a “cyber-attack” has occurred, and should be carried out regardless of the
results of that determination by CENTCOM and CYBERCOM. Beyond that however, even if
they say a “cyber-attack” has occurred, the CSG will have ZERO cyber role in any follow-on
action. That is all done at the National level under National guidance and authorities. The only
way it could involve the CSG is if a kinetic option is approved as a response (highly unlikely in
this case I would think).
B - 38
Participant 5
Scenario Question Set 3:
Following the previous events, an enterprising contract employee at the Naval Computer
and Telecommunications Area Master Station (NCTAMS) tasked with supporting units in the
C5F AOR learns about the coupon disputes and subsequent investigation from a former
shipmate. Suspicious of emails and changes in network traffic patterns, the contractor employs a
network analysis tool for monitoring and logging traffic emanating from or destined for all units
in FORSTRKGRU. Monitoring and logging is conducted for 21 days, after which traffic
analysis identifies a large number of 50 Kilobyte emails from multiple users within the CSG to a
single shore based email address. All data contained within the emails is encrypted and the
frequency of emails appears to correspond to network utilization. A Naval message outlining the
results of this analysis is distributed to FORSTRKGRU, C5F, U.S. Fleet Forces (USFF), Navy
Network Warfare Command (NNWC), Commander 10th Fleet (C10F), Naval Information
Operations Command (NIOC) Maryland, and US Cyber Command (USCC). Virus and malware
scans on servers and hosts throughout the FORSTRKGRU continue to produce no abnormal
findings.
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Response 3-1: This is strong evidence that a cyber attack has in fact occurred on the ship’s
network, and is of a design that is not yet detectable by anti-virus programs. From an N2
perspective, I would continue to recommend actions that I outlined above, as those are the only
COAs we can execute at the CSG level. How to clean / fix the network servers is an N6 issue,
and I would wait for his recommendation. I anticipate it would likely involve slicking and
reloading the entire email server from known-good master software copies, at a minimum.
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Response 3-2: Not even close. To my knowledge (pending N6 input), those tools are not made
available, not approved for use on the LAN, and unless you get lucky, no individual on board is
specifically trained in their use.
B - 39
Participant 5
Scenario Question Set 4:
Analysis by national level agencies reveals that the FORSTRKGRU appears to be the
victim of a previously undetected virus (zero-day attack) deployed utilizing the fictitious
coupons for the Hard Rock Café. Extensive efforts have also resulted in the ability to decrypt
and read the emails recorded during the 21-day monitoring of FORSTRKGRU network traffic.
The emails contain portions of both personal and official emails from FORSTRKGRU, including
portions of briefing slides and spreadsheet attachments. The single destination address for the 50
Kilobyte emails was identified as a web mail account with an auto forward feature. The auto
forward feature was configured to delete all incoming email after sending it to an anonymous
email server. An email containing a network beacon sent to the anonymous email server
identified the end recipient as a web mail server in Estonia. Further investigation revealed the
account has only been accessed from Iran by an IP address correlating to a local Internet Service
Provider (ISP) in Tehran. The same ISP hosts the Iranian cleric’s website that calls for “Jihad”
against the U.S. and foreign individuals listed on the site. The ISP is the primary commercial
server for the civilian population in Tehran and is known to provide services to three large
civilian hospitals. All source intelligence also indicates that the cleric has numerous connections
with the government of Iran, and many members of his congregation are confirmed members of
Iran’s Revolutionary Guard.
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 4-1: In my assessment, yes. They have used illegal and malicious methods to
compromise US information systems to the benefit of a known bad actor.
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Response 4-2: It is certainly a “cyber weapon” as there was a specific implement used to
compromise / damage US info systems, and it also is an attack since there was clearly an intent
to cause harm. “Armed” is a term that is difficult to apply here. However, in the most literal
interpretation, I would have to say yes. If a virus is indeed a cyber “weapon,” then use of it
constitutes an “armed” attack. It would be very to describe what an “unarmed” cyber-attack
might be, however.
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Response 4-3: Certainly you can, although not in the way I think this question implies. Taking
self-defense measures, in this case, would incorporate all the actions I have described previously
to include N6 actions to clear the servers of malicious code. A proportionate, retaliatory cyberstrike MAY also be allowable, depending on the results of your defensive actions and if the
threat still exists, but again the CSG has no authority or capability currently to conduct one. That
would all be driven and conducted at the National level.
B - 40
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
available to the FORSTRKGRU? What response should the CSG Commander recommend to
CENTCOM and national leaders? What would constitute a proportional response in this
situation?
Response 4-4: Regardless of what you call it, your actions do not change from what I outlined
above under current policy. Take defensive INFOSEC measures, clean your servers, alert your
crew to take further precautions. Over to National for any “counter attack.” The CSG has no
role in conducting a cyber attack, unless some portion of the response becomes kinetic. Nor do I
think they should. At a base level, the reason for having a Carrier Strike Group, is so that you
can project power at distances far away from your own country should you choose to do so.
Short of land forces stationed abroad or an ICBM, it is your only option. That same calculus
does not apply to cyber however, as relative distances have no meaning in cyberspace. All attack
options are available from ANY location, regardless of their physical remove, and therefore there
is really no pressing need to replicate that capability afloat.
B - 41
Participant 5
Scenario Question Set 5:
While moored in Piraeus, the USS Forestall supply officer (SUPPO) is notified that 72
pallets of bottled water which had been requested to augment ship’s stores would not be
delivered with the next scheduled supply shipment. The SUPPO notifies the CO and
FORSTRKGRU that no additional bottled water had been ordered. Supply records onboard
indicate that no order for bottled water was ever submitted. The records of shore-based supply
facilities supporting FORSTRKGRU indicate an order was submitted via the normal electronic
ordering process and that all supporting documentation appears to have come from authorized
ship’s personnel. A subsequent cyber security analysis conducted by USCC personnel reveals
that no security patches have been installed since prior to deployment. Additionally, the
manufacturers default SYSADMIN password for the supply software was not changed following
the most recent upgrade. An examination of other FORSTRKGRU units reveals an identical
condition on two additional CSG units and a USNS vessel. After auditing supply order records
for accuracy, USS Relentless and USS Audacious and USNS Tenacious assigned to the
FORSTRKGRU, report an unexplained cancellation of orders for small-arms ammunition
needed after numerous weapons qualification sessions.
The USCC analysis also identifies a virus on the supply servers that appears to interface
with the virus affecting CSG email. This interface appears to support data exfiltration and
transmission of accurate information relating to CSG movements and schedules. Further
analysis reveals that resulting email contain a different source/destination address than the
address previously identified for the CSG virus. The supply virus appears to utilize the same
initial address with the auto forward feature, as well as utilizing the same subsequent anonymous
email server. At the anonymous email server the supply signals appear to be routed differently
than other traffic. These supply signals traverse a number of additional servers, all in differing
nations, and appear to either emanate or terminate with an IP address identified as belonging to
the Iranian embassy in London, U.K.
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 5-1: Yes, for the same reasons as listed in the previous case.
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Response 5-2: Yes, for the same reasons as listed above.
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
Response 5-3: Yes, as described previously.
Q 5-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options or both are
available to the FORSTRKGRU? What response should the Admiral recommend to CENTCOM
and national leaders? What would constitute a proportional response in this situation?
B - 42
Response 5-4: Same as before. Not in the CSG’s lane to recommend a counter-attack response
in this case; only to take self-defense measures. They likely would not have the resident
expertise to recommend a proportionate response in any event. Although I think that would be a
logical next step. There is no reason why the Information Warfare Commander should NOT
have had the expertise and ability to recommend if he only had the requisite experts and training
available. This is fundamentally different from having the resident capabilities to LAUCNH
such an attack, however.
B - 43
Participant 6
Scenario Question Set 1
A subsequent investigation by the USS Forestall Naval Criminal Investigative Service
(NCIS) agent afloat determines that WeSupportU.com is an internet domain owned by a
Canadian national believed to have pro-Iranian beliefs and whose whereabouts are currently
unknown. Virus scans on all servers throughout the CSG using the most current virus signatures
provided by Space and Naval Warfare Command (SPAWAR) show no known viruses or
malware. The investigation did reveal a 60% increase in network traffic, a significant increase
in email server CPU utilization beginning one week into deployment, and widespread complaints
that applications appear to be running significantly slower. Network analysis indicates
bandwidth utilization remains within allotted limits and there is no detectable increase in disk
space use. The FORSTRKGRU Director of Communications and Networks (N6) concludes that
network volume increases are attributable to normal and expected changes in day-to-day
operations as service members adapt to a deployed battle rhythm. The degradation in application
performance is also attributed to these adjustments. The increase in email server demand is
judged to coincide with understandable increases commensurate with the completion of weapons
loading and reduced air operations for the transatlantic crossing, allowing service members more
time to correspond with friends and family ashore.
- With regard to Question Set (1), while the N6's assessment is plausible, we could and should
conduct further analysis before accepting that assessment. Even a cursory review of such
metrics as ones portraying the "most frequently visited web sites" by time of day and day of
week could contribute to such an analysis. If nothing else, the review could, particularly if it
reveals heightened activity having no readily apparent connections to work or family like
concerns, lead us to reject the N6's hypothesis and begin looking for alternative explanations.
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Response 1-1:
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Response 1-2:
B - 44
Participant 6
Scenario Question Set 2:
On the hundredth day of deployment, FORSTRKGRU Director of Intelligence (N2) is
notified that a significant number of service member and associated family member names have
appeared on an Iranian website. According to all source intelligence analysis, the site is operated
by an Iranian cleric with strong anti-U.S. views. In addition to names, unit assignments and links
to social media pages are included. These links provide easy access to recent and up to date
photographs of crew members and liberty activities in the United Arab Emirates (UAE).
Information on European and Middle-Eastern merchants known to do business with the US Navy
is also included, in particular a number of merchants who were on board USS Forestall when the
ship was transiting the Mediterranean Sea en-route to C5F. The site also prominently displays a
fatwa issued by the site’s operator declaring any individual listed an infidel and calling for
“Jihad” against the individuals, their families and all merchants who support the United States.
Many service members continue to correspond and exchange personal information with
merchants included on the website to facilitate delivery of purchased goods to their homes and
families in the U.S.
- With regard to Question Set (2), there will be several factors for the CSG/ARG's staff to
consider while proceeding through the Military Decision Making Process (MDMP) and
formulating Courses of Action (COA). Some will be very operational in nature. Others may be
less so. Examples of factors in the latter category include the potential alteration of Morale,
Welfare, and Recreation (MWR) policies and practices, the blocking or unblocking of selected
web sites, and the reinforcement and enforcement of personnel security rules relating to foreign
contact.
- I believe that the cleric's actions constituted an attack, primarily because it is clear that those
actions had the intended effect of delaying, disrupting, or otherwise interfering with the
operations of FORSTRKGRU. That said, the real questions focus, at this point in the scenario,
on such matters as sponsorship, plausible deniability, and proportionality. If the same cleric had
been pointing a laser dazzler at the Carrier Onboard Delivery (COD) aircraft while on approach
to Oman, we'd have grounds for declaring the action an attack, but we'd have difficulty pinning
the blame on a state and even more difficulty delivering an appropriate, proportional response.
- Preparing COAs is, indeed, an important step. I'll argue that an even more important step
involves using the COAs to develop, codify, implement, and exercise Pre-Planned Responses
(PPRs). The CSG/ARG and its constituent elements, particularly its decision-makers and
operators, need to understand the Commander's Intent and the actions required in order to act
promptly and effectively relative to that intent. PPRs constitute a battle-proven method for
helping commanders ensure subordinate forces act in accordance with their intent during
emergencies and other time-sensitive and/or complex situations, such as the one at the center of
this scenario.
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please
discuss your reasoning.
B - 45
Response 2-1:
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
“cyber-attack” on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Response 2-2:
Q 2-3: The Admiral requests of US Central Command (USCENTCOM), in conjunction with
USCYBERCOM, a determination on whether the events constitute a cyber-attack. She plans to
brief Commander 5th Fleet on the issue and wants to provide a COAs if the events are
determined to constitute a “cyber-attack”. How would you advise the Admiral? Please also
explain why preparing COAs for the cyber-attack contingency are appropriate for the situation.
Response 2-3:
B - 46
Participant 6
Scenario Question Set 3:
Following the previous events, an enterprising contract employee at the Naval Computer
and Telecommunications Area Master Station (NCTAMS) tasked with supporting units in the
C5F AOR learns about the coupon disputes and subsequent investigation from a former
shipmate. Suspicious of emails and changes in network traffic patterns, the contractor employs a
network analysis tool for monitoring and logging traffic emanating from or destined for all units
in FORSTRKGRU. Monitoring and logging is conducted for 21 days, after which traffic
analysis identifies a large number of 50 Kilobyte emails from multiple users within the CSG to a
single shore based email address. All data contained within the emails is encrypted and the
frequency of emails appears to correspond to network utilization. A Naval message outlining the
results of this analysis is distributed to FORSTRKGRU, C5F, U.S. Fleet Forces (USFF), Navy
Network Warfare Command (NNWC), Commander 10th Fleet (C10F), Naval Information
Operations Command (NIOC) Maryland, and US Cyber Command (USCC). Virus and malware
scans on servers and hosts throughout the FORSTRKGRU continue to produce no abnormal
findings.
- With regard to Question (3), my view, biased in favor of the use of Computer Network Defense
(CND) to enable the continuation of Distributed Global Information Grid (GIG) Operations
(DGO), suggests that the most logical action is to block the outflow of traffic to the single, shorebased e-mail address identified in the message. Others will undoubtedly disagree. Some will
argue for maintaining and monitoring the outflow. Others will argue for taking FORSTRKGRU
off the grid. I'll leave it to them to make their arguments. For me, I'll sum-up my thoughts with
lines like "the show must go on" or "if we drop off the grid, the adversary wins."
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Response 3-1:
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Response 3-2:
B - 47
Participant 6
Scenario Question Set 4:
Analysis by national level agencies reveals that the FORSTRKGRU appears to be the
victim of a previously undetected virus (zero-day attack) deployed utilizing the fictitious
coupons for the Hard Rock Café. Extensive efforts have also resulted in the ability to decrypt
and read the emails recorded during the 21-day monitoring of FORSTRKGRU network traffic.
The emails contain portions of both personal and official emails from FORSTRKGRU, including
portions of briefing slides and spreadsheet attachments. The single destination address for the 50
Kilobyte emails was identified as a web mail account with an auto forward feature. The auto
forward feature was configured to delete all incoming email after sending it to an anonymous
email server. An email containing a network beacon sent to the anonymous email server
identified the end recipient as a web mail server in Estonia. Further investigation revealed the
account has only been accessed from Iran by an IP address correlating to a local Internet Service
Provider (ISP) in Tehran. The same ISP hosts the Iranian cleric’s website that calls for “Jihad”
against the U.S. and foreign individuals listed on the site. The ISP is the primary commercial
server for the civilian population in Tehran and is known to provide services to three large
civilian hospitals. All source intelligence also indicates that the cleric has numerous connections
with the government of Iran, and many members of his congregation are confirmed members of
Iran’s Revolutionary Guard.
- With regard to Question (4), I'll, again, state that the actions constitute an attack. At this point,
I'd be concerned that the other cleric was looking not only to delay or disrupt operations but,
possibly, to draw a large group of Sailors to the off-base facility for much more nefarious
purposes. We'd, of course, need to dig-in, learn more, and execute processes that extend well
beyond the scenario, but let's keep it simple and straightforward: he's not luring FORSRKGRU
members to the Hard Rock Café for any good reasons. Prudence dictates the need to investigate
the possibility that his actions were meant to set conditions for an ambush or other form of armed
attack.
- We have to have a credible presence in the Middle East. We don't have to have a footprint on
the beach in the entertainment districts of Dubai. One response might be to cancel liberty,
remain at sea, conduct as much of our logistics work as possible underway, and defer all MWR
activities, to include onboard and on-line MWR activities, until we sail-on to the Mediterranean
or the Pacific. No one, to include the local merchants and tribal/political leaders, would like
such an outcome. Then again, that pressure from the locals may be just what the doctor ordered.
If they want us to spend our money in UAE instead of Italy or Thailand, maybe they'll find a way
to solve the problem.
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 4-1:
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Response 4-2:
B - 48
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Response 4-3:
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
available to the FORSTRKGRU? What response should the CSG Commander recommend to
CENTCOM and national leaders? What would constitute a proportional response in this
situation?
Response 4-4:
B - 49
Participant 6
Scenario Question Set 5:
While moored in Piraeus, the USS Forestall supply officer (SUPPO) is notified that 72
pallets of bottled water which had been requested to augment ship’s stores would not be
delivered with the next scheduled supply shipment. The SUPPO notifies the CO and
FORSTRKGRU that no additional bottled water had been ordered. Supply records onboard
indicate that no order for bottled water was ever submitted. The records of shore-based supply
facilities supporting FORSTRKGRU indicate an order was submitted via the normal electronic
ordering process and that all supporting documentation appears to have come from authorized
ship’s personnel. A subsequent cyber security analysis conducted by USCC personnel reveals
that no security patches have been installed since prior to deployment. Additionally, the
manufacturers default SYSADMIN password for the supply software was not changed following
the most recent upgrade. An examination of other FORSTRKGRU units reveals an identical
condition on two additional CSG units and a USNS vessel. After auditing supply order records
for accuracy, USS Relentless and USS Audacious and USNS Tenacious assigned to the
FORSTRKGRU, report an unexplained cancellation of orders for small-arms ammunition
needed after numerous weapons qualification sessions.
The USCC analysis also identifies a virus on the supply servers that appears to interface
with the virus affecting CSG email. This interface appears to support data exfiltration and
transmission of accurate information relating to CSG movements and schedules. Further
analysis reveals that resulting email contain a different source/destination address than the
address previously identified for the CSG virus. The supply virus appears to utilize the same
initial address with the auto forward feature, as well as utilizing the same subsequent anonymous
email server. At the anonymous email server the supply signals appear to be routed differently
than other traffic. These supply signals traverse a number of additional servers, all in differing
nations, and appear to either emanate or terminate with an IP address identified as belonging to
the Iranian embassy in London, U.K.
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 5-1:
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Response 5-2:
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
Response 5-3:
Q 5-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options or both are
available to the FORSTRKGRU? What response should the Admiral recommend to CENTCOM
and national leaders? What would constitute a proportional response in this situation?
B - 50
Response 5-4:
B - 51
Participant 7
I failed the test!
I read through it all – I believe it is very thorough and realistic – but I am simply not up to date
on current Cyber ROE and DOD policy to comment with meaning.
B - 52
Participant 8
Scenario Question Set 1
A subsequent investigation by the USS Forestall Naval Criminal Investigative Service
(NCIS) agent afloat determines that WeSupportU.com is an Iinternet domain owned by a
Canadian national believed to have pro-Iranian beliefs and whose whereabouts are currently
unknown. Virus scans on all servers throughout the CSG using the most current virus signatures
provided by Space and Naval Warfare Command (SPAWAR) show no known viruses or
malware. The investigation did reveal a 60% increase in network traffic, a significant increase
in email server CPU utilization beginning one week into deployment, and widespread complaints
that applications appear to be running significantly slower. Network analysis indicates
bandwidth utilization remains within allotted limits and there is no detectable increase in disk
space use. The FORSTRKGRU Director of Communications and Networks (N6) concludes that
network volume increases are attributable to normal and expected changes in day-to-day
operations as service members adapt to a deployed battle rhythm. The degradation in application
performance is also attributed to these adjustments. The increase in email server demand is
judged to coincide with understandable increases commensurate with the completion of weapons
loading and reduced air operations for the transatlantic crossing, allowing service members more
time to correspond with friends and family ashore. Reviews of the email logs by shipboard
systems administrators reveal no abnormal indications are suspicious emails. In coordination
with supporting communications stations, their reviews of FORSTRKGRU ship’s network
performance reveals no abnormal indications either.
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Response 1-1: Based on the state of tools available to systems administrators and the NetSA
capabilities, their responses are likely. If the operational degradation is noticeable over a
moderate or long period of time or seen across several ships, there would be additional analysis
that the N6 would direct to suspect potential rootkits or some other malware or operational issue
at a common network support location that supports the ships, such as a Fleet Network
Operations Center. If other information is correlated, a likely measure would be to remove those
workstations to see if the conditions change and if needed coordinate for analysis with the Navy
Cyber Defense Operations Command.
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Response 1-2: Yes. See above.
Other potential questions:
What other means and methods (tools or procedures) should the network administrators and
computer defense personnel have to assess their network performance (how do they know what
is normal and what is abnormal; “state change”)?
B - 53
Is a manual review process sufficient in the cyber age? Even if they detect a problem how do
they know its not a decoy or just one of many cyber weapons that were emplaced? If there are
multiple vectors, how can they account and react without automated detection and protection
means and methods?
B - 54
Participant 8
Scenario Question Set 2:
On the hundredth day of deployment, FORSTRKGRU Director of Intelligence (N2) is
notified that a significant number of service member and associated family member names have
appeared on an Iranian website. According to all source intelligence analysis, the site is operated
by an Iranian cleric with strong anti-U.S. views. In addition to names, unit assignments and links
to social media pages are included. These links provide easy access to recent and up to date
photographs of crew members and liberty activities in the United Arab Emirates (UAE).
Information on European and Middle-Eastern merchants known to do business with the US Navy
is also included, in particular a number of merchants who were on board USS Forestall when the
ship was transiting the Mediterranean Sea en-route to C5F. The site also prominently displays a
fatwa issued by the site’s operator declaring any individual listed an infidel and calling for
“Jihad” against the individuals, their families and all merchants who support the United States.
Many service members continue to correspond and exchange personal information with
merchants included on the website to facilitate delivery of purchased goods to their homes and
families in the U.S.
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please
discuss your reasoning.
Response 2-1:
The intelligence indicates an OPSEC breach. The Commanders would assess internal OPSEC
programs, reinforce OPSEC with the crews, and potentially adjust force protection posture.
Unless there were indicators from the prior network reviews, they may not suspect network
exploitation.
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
“cyber-attack” on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Response 2-2: Attack correlates to action which would likely require a diplomatic or military
response. Exploitation is more appropriate to the scenario. Attribution must also be considered.
Q 2-3: The Admiral requests of reporting with US Naval Forces Central Command
(USCENTCOM), in conjunction with FLTUSCYBERCOM and Navy Cyber Defense Operations
Command, a determination on whether the events constitute a cyber-attack. She plans to brief
Commander 5th Fleet on the issue and wants to provide a COAs if the events are determined to
constitute a “cyber-attack”. How would you advise the Admiral? Please also explain why
preparing COAs for the cyber-attack contingency are appropriate for the situation.
Response 2-3:
B - 55
Advising the Commander would include current status of what is known relative to network
defense status, would include recommendations to adjust the CSG’s cyber defense posture
(INFOCON), and would detail what would be reported to the Fleet Commander and NCDOC.
Also reinforcing OPSEC measures would be discussed. COAs would consider the most likely to
the most dangerous aspects of a potential adversaries behavior. COA analysis would be useful as
there may be related indicators or actions to derive an adversaries intent on future actions.
B - 56
Participant 8
Scenario Question Set 3:
Following the previous events, an enterprising contract employee at the Naval Computer
and Telecommunications Area Master Station (NCTAMS) tasked with supporting units in the
C5F AOR learns about the coupon disputes and subsequent investigation from a former
shipmate. Suspicious of emails and changes in network traffic patterns, the contractor employs a
network analysis tool for monitoring and logging traffic emanating from or destined for all units
in FORSTRKGRU. Monitoring and logging is conducted for 21 days, after which traffic
analysis identifies a large number of 50 Kilobyte emails from multiple users within the CSG to a
single shore based email address. All data contained within the emails is encrypted and the
frequency of emails appears to correspond to network utilization. A Naval message outlining the
results of this analysis is distributed to FORSTRKGRU, NAVCENT/C5F, U.S. Fleet Forces
(USFF), Navy Network Warfare Command (NNWC), Commander 10th Fleet (C10F), NCDOC,
and Naval Information Operations Command (NIOC) Maryland, and US Cyber Command
(USCC). Virus and malware scans on servers and hosts throughout the FORSTRKGRU
continue to produce no abnormal findings.
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Response 3-1: At this point, local measures would be put in place to isolate the clients (if
known) and disconnect. If unknown, email services would be taken offline. However, the
Commander would also have to consider related factors and ensure these actions are coordinated
with supporting cyber commands as the best COA. Additionally, sensitive communications
would be shifted to other methods.
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Response 3-2: Network situational awareness and automated detection remain as challenges.
Scalability to counter cyber activity is also a challenge. Training personnel to attain sufficient
expertise is also a concern.
B - 57
Participant 8
Scenario Question Set 4:
Analysis by national level agencies reveals that the FORSTRKGRU appears to be the
victim of a previously undetected virus (zero-day attack) deployed utilizing the fictitious
coupons for the Hard Rock Café. Extensive efforts have also resulted in the ability to decrypt
and read the emails recorded during the 21-day monitoring of FORSTRKGRU network traffic.
The emails contain portions of both personal and official emails from FORSTRKGRU, including
portions of briefing slides and spreadsheet attachments. The single destination address for the 50
Kilobyte emails was identified as a web mail account with an auto forward feature. The auto
forward feature was configured to delete all incoming email after sending it to an anonymous
email server. An email containing a network beacon sent to the anonymous email server
identified the end recipient as a web mail server in Estonia. Further investigation revealed the
account has only been accessed from Iran by an IP address correlating to a local Internet Service
Provider (ISP) in Tehran. The same ISP hosts the Iranian cleric’s website that calls for “Jihad”
against the U.S. and foreign individuals listed on the site. The ISP is the primary commercial
server for the civilian population in Tehran and is known to provide services to three large
civilian hospitals. All source intelligence also indicates that the cleric has numerous connections
with the government of Iran, and many members of his congregation are confirmed members of
Iran’s Revolutionary Guard.
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 4-1: Were forces or critical infrastructure disabled, disrupted, or destroyed? No. This
would constitute an exploitation or intelligence collection via breach of the US network.
National leadership would have to determine if such activity could be (or should be) tolerated.
Defensive measures still remain to shun or minimize the impact of this action. What this
scenario gets to are issues that determination of attribution and intent are important. What are
the consequences of this activity, whether an attack or exploitation? Where is the deterrence and
what constitutes the cyber deterrence? What are the appropriate response actions to take? The
practicum states you are looking at LOAC in the context of cyber operations. Given cyberspace
is a global capability based on interconnecting national and multi-national organizations
infrastructure, attribution and the maturity of cyber law are important. In many conflicts or
political stress points, hactivism and cyber activity has risen. There currently are no cyber
treaties of note nor a solid statement or enaction of cyber detterrance. Unless the “attack”
impacts the self defense of the Strike Group, the Commander is left with only defensive
behavioral and network defense actions.
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Response 4-2: This is akin to spying or eavesdropping, think Cold War. This is a cyber-sensor.
If there were destruction or denial of capability, then it could be considered a cyber-weapon. It
does have a payload but that is a sensor.
B - 58
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Response 4-3: The aspect of proportionality must be considered. Immediate loss of life or the
ship is not in jeopardy. This event does raise operational risk. There are options to disconnect,
shun or isolate the identified exploitation.
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
available to the FORSTRKGRU? What response should the CSG Commander recommend to
the Fleet Commander (and by extension CENTCOM and national leaders)? What would
constitute a proportional response in this situation?
Response 4-4: First question is discussed above. The Commander should identify the
operational impact, known facts, and recommended COA. Proportionality could be a demarche,
a comparable exploitation, or some other demonstration to send a strategic message for the
offender to stop their activity or suffer escalation. The scenario raises the conundrum that the
tactical commander is limited in response options and many cyber activities are a strategic issue
given the consequences of attribution, collateral damage, and an tactical response which may
derail operational or strategic actions.
B - 59
Participant 8
Scenario Question Set 5:
While moored in Piraeus, the USS Forestall supply officer (SUPPO) is notified that 72
pallets of bottled water which had been requested to augment ship’s stores would not be
delivered with the next scheduled supply shipment. The SUPPO notifies the CO and
FORSTRKGRU that no additional bottled water had been ordered. Supply records onboard
indicate that no order for bottled water was ever submitted. The records of shore-based supply
facilities supporting FORSTRKGRU indicate an order was submitted via the normal electronic
ordering process and that all supporting documentation appears to have come from authorized
ship’s personnel. A subsequent cyber security analysis conducted by USCC NCDOC personnel
reveals that no security patches have been installed since prior to deployment. Additionally, the
manufacturers default SYSADMIN password for the supply software was not changed following
the most recent upgrade. An examination of other FORSTRKGRU units reveals an identical
condition on two additional CSG units and a USNS vessel. After auditing supply order records
for accuracy, USS Relentless and USS Audacious and USNS Tenacious assigned to the
FORSTRKGRU, report an unexplained cancellation of orders for small-arms ammunition
needed after numerous weapons qualification sessions.
The USCC NCDOC analysis also identifies a virus on the supply servers that appears to
interface with the virus affecting CSG email. This interface appears to support data exfiltration
and transmission of accurate information relating to CSG movements and schedules. Further
analysis reveals that resulting email contain a different source/destination address than the
address previously identified for the CSG virus. The supply virus appears to utilize the same
initial address with the auto forward feature, as well as utilizing the same subsequent anonymous
email server. At the anonymous email server the supply signals appear to be routed differently
than other traffic. These supply signals traverse a number of additional servers, all in differing
nations, and appear to either emanate or terminate with an IP address identified as belonging to
the Iranian embassy in London, U.K.
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 5-1: If manipulation and disruption are confirmed to be attributed, then this would be
considered an attack. Again the factors of proportionality and self defense apply.
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Response 5-2: Duplicate question.
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
Response 5-3: Yes; protection of logistics which is an essential military function. Measures
would be put in place to shun, isolate or deny the attacker access. Alternate methods would be
used to coordinate logistics.
B - 60
Q 5-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options or both are
available to the FORSTRKGRU? What response should the Admiral recommend to CENTCOM
and national leaders? What would constitute a proportional response in this situation?
Response 5-4: Same as 4-4. The consequences of the attack would have to be more significant
to illicit an escalation in response. Clarity of the situation and misinterpretation begin to come
in play here…meaning misunderstanding of intent could stimulate unintended actions in other
interactions with the adversary (non-cyber interaction).
More useful to Navy and the Fleet would be for the practicum to comment on and support:
What is the definition of a cyber attack?
What cyber action would constitute a non-cyber response by a Commander?
What should the cyber Rules of Engagement be?
How do you implement cyber deterrence?
What capabilities are there to better support detection of exploitation and attacks?
What are the critical thinking skills that must be in place with our NetOps personnel and
CND personnel to detect and deter cyber threats (attacks / exploits)?
B - 61
Participant 9
Scenario Question Set 1
A subsequent investigation by the USS Forestall Naval Criminal Investigative Service
(NCIS) agent afloat determines that WeSupportU.com is an internet domain owned by a
Canadian national believed to have pro-Iranian beliefs and whose whereabouts are currently
unknown. Virus scans on all servers throughout the CSG using the most current virus signatures
provided by Space and Naval Warfare Command (SPAWAR) show no known viruses or
malware. The investigation did reveal a 60% increase in network traffic, a significant increase
in email server CPU utilization beginning one week into deployment, and widespread complaints
that applications appear to be running significantly slower. Network analysis indicates
bandwidth utilization remains within allotted limits and there is no detectable increase in disk
space use. The FORSTRKGRU Director of Communications and Networks (N6) concludes that
network volume increases are attributable to normal and expected changes in day-to-day
operations as service members adapt to a deployed battle rhythm. The degradation in application
performance is also attributed to these adjustments. The increase in email server demand is
judged to coincide with understandable increases commensurate with the completion of weapons
loading and reduced air operations for the transatlantic crossing, allowing service members more
time to correspond with friends and family ashore.
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Response 1-1:
No. To make such a decision, one must know what normal looks like. How was 60%
determined? The N6 has not shown that data.
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Response 1-2:
Yes.
1. Analysis: A review of event logs and HBSS ePO server data is required. Was the network
degradation coincident with the email about Hard Rock? How did the CO/XO/CMC get targeted
for the email.
2. RFI: have incident reports been made to NCDOC (CTF-1020) or RFI to from numbered fleet
to C10F intel.
B - 62
Participant 9
Scenario Question Set 2:
On the hundredth day of deployment, FORSTRKGRU Director of Intelligence (N2) is
notified that a significant number of service member and associated family member names have
appeared on an Iranian website. According to all source intelligence analysis, the site is operated
by an Iranian cleric with strong anti-U.S. views. In addition to names, unit assignments and links
to social media pages are included. These links provide easy access to recent and up to date
photographs of crew members and liberty activities in the United Arab Emirates (UAE).
Information on European and Middle-Eastern merchants known to do business with the US Navy
is also included, in particular a number of merchants who were on board USS Forestall when the
ship was transiting the Mediterranean Sea en-route to C5F. The site also prominently displays a
fatwa issued by the site’s operator declaring any individual listed an infidel and calling for
“Jihad” against the individuals, their families and all merchants who support the United States.
Many service members continue to correspond and exchange personal information with
merchants included on the website to facilitate delivery of purchased goods to their homes and
families in the U.S.
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please
discuss your reasoning.
Response 2-1:
1. The Commander has OPSEC authority to block Face Book access. Has this been done? Why
not?
2. Direct STRKGRU Staff Judge Advocate to review peacetime ROE and make
recommendations to OPS on available maneuver opportunities. This has been critical in my
experience in operations from Korea to pre-GWOT and can not be overstated. The “Battle JAG”
is an operational requirement.
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
“cyber-attack” on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Response 2-2: See answer to 2-1 Part 2. Operational SJA’s are a requirement in this discussion
Q 2-3: The Admiral requests of US Central Command (USCENTCOM), in conjunction with
USCYBERCOM, a determination on whether the events constitute a cyber-attack. She plans to
brief Commander 5th Fleet on the issue and wants to provide a COAs if the events are
determined to constitute a “cyber-attack”. How would you advise the Admiral? Please also
explain why preparing COAs for the cyber-attack contingency are appropriate for the situation.
Response 2-3: As cyber authorities are held well above the SKGRU Commander or 5th Fleet,
this translates ino a force protection condition (FPCON) for the STKGRU.
1. Set FPCON to highest level for port visits.
2. Increase network screening/filtering to reduce attack suface available to adversary
B - 63
3. Request NAVCENT/C5F nominate appropriate targets to CENTCOM and USCC to protect
the STRKGRU.
B - 64
Participant 9
Scenario Question Set 3:
Following the previous events, an enterprising contract employee at the Naval Computer
and Telecommunications Area Master Station (NCTAMS) tasked with supporting units in the
C5F AOR learns about the coupon disputes and subsequent investigation from a former
shipmate. Suspicious of emails and changes in network traffic patterns, the contractor employs a
network analysis tool for monitoring and logging traffic emanating from or destined for all units
in FORSTRKGRU. Monitoring and logging is conducted for 21 days, after which traffic
analysis identifies a large number of 50 Kilobyte emails from multiple users within the CSG to a
single shore based email address. All data contained within the emails is encrypted and the
frequency of emails appears to correspond to network utilization. A Naval message outlining the
results of this analysis is distributed to FORSTRKGRU, C5F, U.S. Fleet Forces (USFF), Navy
Network Warfare Command (NNWC), Commander 10th Fleet (C10F), Naval Information
Operations Command (NIOC) Maryland, and US Cyber Command (USCC). Virus and malware
scans on servers and hosts throughout the FORSTRKGRU continue to produce no abnormal
findings.
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Response 3-1:
1. Continue to reduce attack surface.
2. Coord with NCDOC for block list update.
3. Adjust appropriate ACL for STRKGRU
5. Use NIOC-N assigned CTN to work HBSS to counter threat
6. RFI C10F for info and support
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Response 3-2: This question is related to the Distributed Information Operations construct
which does not extend it’s capabilities afloat, except is very selective and controlled ways (not
STRKGRU). Should Fleet Commander desire, STRKGRU staffs could be trained to become
“HBSS Jedi” to be able to mitigate and dynamically counter this type of threat.
B - 65
Participant 9
Scenario Question Set 4:
Analysis by national level agencies reveals that the FORSTRKGRU appears to be the
victim of a previously undetected virus (zero-day attack) deployed utilizing the fictitious
coupons for the Hard Rock Café. Extensive efforts have also resulted in the ability to decrypt
and read the emails recorded during the 21-day monitoring of FORSTRKGRU network traffic.
The emails contain portions of both personal and official emails from FORSTRKGRU, including
portions of briefing slides and spreadsheet attachments. The single destination address for the 50
Kilobyte emails was identified as a web mail account with an auto forward feature. The auto
forward feature was configured to delete all incoming email after sending it to an anonymous
email server. An email containing a network beacon sent to the anonymous email server
identified the end recipient as a web mail server in Estonia. Further investigation revealed the
account has only been accessed from Iran by an IP address correlating to a local Internet Service
Provider (ISP) in Tehran. The same ISP hosts the Iranian cleric’s website that calls for “Jihad”
against the U.S. and foreign individuals listed on the site. The ISP is the primary commercial
server for the civilian population in Tehran and is known to provide services to three large
civilian hospitals. All source intelligence also indicates that the cleric has numerous connections
with the government of Iran, and many members of his congregation are confirmed members of
Iran’s Revolutionary Guard.
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 4-1: Defer to staff SJA, however, this could be seen as intelligence collection activity
and not count as an attack.
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Response 4-2: Defer to staff SJA, however, this could be seen as intelligence collection activity
and not count as an attack.
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Response 4-3: Defer to staff SJA, however, this could be seen as intelligence collection activity
and not count as an attack.
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
available to the FORSTRKGRU? What response should the CSG Commander recommend to
CENTCOM and national leaders? What would constitute a proportional response in this
situation?
Response 4-4:
B - 66
Participant 9
Scenario Question Set 5:
While moored in Piraeus, the USS Forestall supply officer (SUPPO) is notified that 72
pallets of bottled water which had been requested to augment ship’s stores would not be
delivered with the next scheduled supply shipment. The SUPPO notifies the CO and
FORSTRKGRU that no additional bottled water had been ordered. Supply records onboard
indicate that no order for bottled water was ever submitted. The records of shore-based supply
facilities supporting FORSTRKGRU indicate an order was submitted via the normal electronic
ordering process and that all supporting documentation appears to have come from authorized
ship’s personnel. A subsequent cyber security analysis conducted by USCC personnel reveals
that no security patches have been installed since prior to deployment. Additionally, the
manufacturers default SYSADMIN password for the supply software was not changed following
the most recent upgrade. An examination of other FORSTRKGRU units reveals an identical
condition on two additional CSG units and a USNS vessel. After auditing supply order records
for accuracy, USS Relentless and USS Audacious and USNS Tenacious assigned to the
FORSTRKGRU, report an unexplained cancellation of orders for small-arms ammunition
needed after numerous weapons qualification sessions.
The USCC analysis also identifies a virus on the supply servers that appears to interface
with the virus affecting CSG email. This interface appears to support data exfiltration and
transmission of accurate information relating to CSG movements and schedules. Further
analysis reveals that resulting email contain a different source/destination address than the
address previously identified for the CSG virus. The supply virus appears to utilize the same
initial address with the auto forward feature, as well as utilizing the same subsequent anonymous
email server. At the anonymous email server the supply signals appear to be routed differently
than other traffic. These supply signals traverse a number of additional servers, all in differing
nations, and appear to either emanate or terminate with an IP address identified as belonging to
the Iranian embassy in London, U.K.
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 5-1: Defer to staff SJA, however, this is an attack in my opinion. Changing records is
different than collecting intelligence.
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Response 5-2: No. While targets may be ripe for tailored response options outside of the GIG,
that remains beyond STRKGRU resources.
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
Response 5-3: Certainly can protect itself (firewalls and filtering), but who are they return fire
at?
B - 67
Q 5-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options or both are
available to the FORSTRKGRU? What response should the Admiral recommend to CENTCOM
and national leaders? What would constitute a proportional response in this situation?
Response 5-4: Work to nominate TRO via targeting input to C5F. The rest is beyond the
STRKGRU
B - 68
Participant 10
Scenario Question Set 1:
A subsequent investigation by the USS Forestall Naval Criminal Investigative Service
(NCIS) agent afloat determines that WeSupportU.com is an internet domain owned by a
Canadian national believed to have pro-Iranian beliefs and whose whereabouts are currently
unknown. Virus scans on all servers throughout the CSG using the most current virus signatures
provided by Space and Naval Warfare Command (SPAWAR) show no known viruses or
malware. The investigation did reveal a 60% increase in network traffic, a significant increase
in email server CPU utilization beginning one week into deployment, and widespread complaints
that applications appear to be running significantly slower. Network analysis indicates
bandwidth utilization remains within allotted limits and there is no detectable increase in disk
space use. The FORSTRKGRU Director of Communications and Networks (N6) concludes that
network volume increases are attributable to normal and expected changes in day-to-day
operations as service members adapt to a deployed battle rhythm. The degradation in application
performance is also attributed to these adjustments. The increase in email server demand is
judged to coincide with understandable increases commensurate with the completion of weapons
loading and reduced air operations for the transatlantic crossing, allowing service members more
time to correspond with friends and family ashore.
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Response 1-1: The assessment is unsatisfactory based solely on the observations of activity being
within the acceptable ranges – even if these were historically predictable upticks in activity. A
purely quantitative approach is not appropriate for threat discovery in this instance. N6 would
need to better understand the types, purposes, and destinations of the traffic and the specific
processes that are leveraging additional demand on the system.
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Response 1-2: Yes; given the nature of the research on the threat, N6 should notify
FLEETCYBER of the incident to augment the information assurance measures already taken.
FLEETCYBER could provide additional capacity and capability from national repositories.
B - 69
Participant 10
Scenario Question Set 2:
On the hundredth day of deployment, FORSTRKGRU Director of Intelligence (N2) is
notified that a significant number of service member and associated family member names have
appeared on an Iranian website. According to all source intelligence analysis, the site is operated
by an Iranian cleric with strong anti-U.S. views. In addition to names, unit assignments and links
to social media pages are included. These links provide easy access to recent and up to date
photographs of crew members and liberty activities in the United Arab Emirates (UAE).
Information on European and Middle-Eastern merchants known to do business with the US Navy
is also included, in particular a number of merchants who were on board USS Forestall when the
ship was transiting the Mediterranean Sea en-route to C5F. The site also prominently displays a
fatwa issued by the site’s operator declaring any individual listed an infidel and calling for
“Jihad” against the individuals, their families and all merchants who support the United States.
Many service members continue to correspond and exchange personal information with
merchants included on the website to facilitate delivery of purchased goods to their homes and
families in the U.S.
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please
discuss your reasoning.
Response 2-1: The CSG commander should immediately work with FLEETCYBER to
coordinate protective actions for his sailors and their families with NCIJTF. FLEETCYBER
could also provide national level capabilities to investigate and mitigate this threat. NCIJTF can
leverage INTERPOL and bi-lateral law-enforcement relationships to address the website. If the
CSG Commander feels this activity represents and imminent danger to his sailors and their
families, he is obligated to notify the 5th fleet commander so that they and CDRUSCENTCOM
can advocate for potential military options.
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
“cyber-attack” on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Response 2-2: First, the Admiral bears the ultimately responsibility for the health and welfare of
sailors under his command. If, when presented with the evidence, the Admiral feels this website
represents an imminent threat to his forces and their families sponsored by a foreign power, he is
obligated to notify the 5th fleet commander so that they and CDRUSCENTCOM can advocate
for potential military options. However, absent those conditions, this activity is criminal and
FLEETCYBER can adjudicate the appropriate whole of government response with NCIJTF.
Q 2-3: The Admiral requests of US Central Command (USCENTCOM), in conjunction with
USCYBERCOM, a determination on whether the events constitute a cyber-attack. She plans to
brief Commander 5th Fleet on the issue and wants to provide a COAs if the events are
determined to constitute a “cyber-attack”. How would you advise the Admiral? Please also
explain why preparing COAs for the cyber-attack contingency are appropriate for the situation.
B - 70
Response 2-3: I would advise the Admiral to develop COAs leveraging naval resources to
protect the families of sailors who have been victims of the activity. Current policy does not
permit the Admiral to take action against adversaries attacking via cyberspace.
B - 71
Participant 10
Scenario Question Set 3:
Following the previous events, an enterprising contract employee at the Naval Computer
and Telecommunications Area Master Station (NCTAMS) tasked with supporting units in the
C5F AOR learns about the coupon disputes and subsequent investigation from a former
shipmate. Suspicious of emails and changes in network traffic patterns, the contractor employs a
network analysis tool for monitoring and logging traffic emanating from or destined for all units
in FORSTRKGRU. Monitoring and logging is conducted for 21 days, after which traffic
analysis identifies a large number of 50 Kilobyte emails from multiple users within the CSG to a
single shore based email address. All data contained within the emails is encrypted and the
frequency of emails appears to correspond to network utilization. A Naval message outlining the
results of this analysis is distributed to FORSTRKGRU, C5F, U.S. Fleet Forces (USFF), Navy
Network Warfare Command (NNWC), Commander 10th Fleet (C10F), Naval Information
Operations Command (NIOC) Maryland, and US Cyber Command (USCC). Virus and malware
scans on servers and hosts throughout the FORSTRKGRU continue to produce no abnormal
findings.
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Response 3-1: Immediate engagement with FLEETCYBER and 5th fleet to bring national level
capabilities forward to inspect network. The Admiral should transition to a state of mission
essential communications only within the group until such a time this support can be brought
forward.
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Response 3-2: Out of scope of my knowledge for the Navy.
B - 72
Participant 10
Scenario Question Set 4:
Analysis by national level agencies reveals that the FORSTRKGRU appears to be the
victim of a previously undetected virus (zero-day attack) deployed utilizing the fictitious
coupons for the Hard Rock Café. Extensive efforts have also resulted in the ability to decrypt
and read the emails recorded during the 21-day monitoring of FORSTRKGRU network traffic.
The emails contain portions of both personal and official emails from FORSTRKGRU, including
portions of briefing slides and spreadsheet attachments. The single destination address for the 50
Kilobyte emails was identified as a web mail account with an auto forward feature. The auto
forward feature was configured to delete all incoming email after sending it to an anonymous
email server. An email containing a network beacon sent to the anonymous email server
identified the end recipient as a web mail server in Estonia. Further investigation revealed the
account has only been accessed from Iran by an IP address correlating to a local Internet Service
Provider (ISP) in Tehran. The same ISP hosts the Iranian cleric’s website that calls for “Jihad”
against the U.S. and foreign individuals listed on the site. The ISP is the primary commercial
server for the civilian population in Tehran and is known to provide services to three large
civilian hospitals. All source intelligence also indicates that the cleric has numerous connections
with the government of Iran, and many members of his congregation are confirmed members of
Iran’s Revolutionary Guard.
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 4-1: Attribution would have to positively identify the cleric acting as an agent of a
foreign government. Otherwise this is a crime or espionage. However, earlier comments about
the Admiral perceiving a threat to the life of his sailors or their families still apply. Even absent
governmental attribution, a case could be made that an exigent circumstance exists.
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Response 4-2: As the virus does not produce lethal or damaging effects itself, it is not a cyberweapon. Unless national decision makers determine the way in which the information stolen by
the virus was handled caused conditions where lethality or destruction of property was probable,
it is not an armed attack. This would be consistent with current American policy (i.e.
wikilieaks.)
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Response 4-3: No; current policy does not permit Commanders at that level to take actions
outside of US networks in response to cyber threats. The commander does not posses the means
to respond to this threat in a necessary and proportionate way.
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
B - 73
available to the FORSTRKGRU? What response should the CSG Commander recommend to
CENTCOM and national leaders? What would constitute a proportional response in this
situation?
Response 4-4: Assuming national policy makers determined this was an armed attack, national
military or whole-of-government capabilities could be employed to affect the availability of the
information on the internet. Unless lethality or destruction of property is an imminent outcome
of the information’s presence on the internet, the Geographic COCOM commander currently
does not possess the necessary tools to respond in a proportional way.
B - 74
Participant 10
Scenario Question Set 5:
While moored in Piraeus, the USS Forestall supply officer (SUPPO) is notified that 72
pallets of bottled water which had been requested to augment ship’s stores would not be
delivered with the next scheduled supply shipment. The SUPPO notifies the CO and
FORSTRKGRU that no additional bottled water had been ordered. Supply records onboard
indicate that no order for bottled water was ever submitted. The records of shore-based supply
facilities supporting FORSTRKGRU indicate an order was submitted via the normal electronic
ordering process and that all supporting documentation appears to have come from authorized
ship’s personnel. A subsequent cyber security analysis conducted by USCC personnel reveals
that no security patches have been installed since prior to deployment. Additionally, the
manufacturers default SYSADMIN password for the supply software was not changed following
the most recent upgrade. An examination of other FORSTRKGRU units reveals an identical
condition on two additional CSG units and a USNS vessel. After auditing supply order records
for accuracy, USS Relentless and USS Audacious and USNS Tenacious assigned to the
FORSTRKGRU, report an unexplained cancellation of orders for small-arms ammunition
needed after numerous weapons qualification sessions.
The USCC analysis also identifies a virus on the supply servers that appears to interface
with the virus affecting CSG email. This interface appears to support data exfiltration and
transmission of accurate information relating to CSG movements and schedules. Further
analysis reveals that resulting email contain a different source/destination address than the
address previously identified for the CSG virus. The supply virus appears to utilize the same
initial address with the auto forward feature, as well as utilizing the same subsequent anonymous
email server. At the anonymous email server the supply signals appear to be routed differently
than other traffic. These supply signals traverse a number of additional servers, all in differing
nations, and appear to either emanate or terminate with an IP address identified as belonging to
the Iranian embassy in London, U.K.
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 5-1: Yes, the adversary has produced a denial\disruption effect which could be
construed to be an attack. This is above and beyond the theft of information.
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Response 5-2: While it may be a cyber-attack, it may not be an armed attack. If the commander
reasonably believes this was the pre-cursor to conflict and not simply an annoyance, it could be
considered an armed attack. However, while digital information was modified, physical property
was not destroyed and the lives of the sailors afloat were not placed in significant risk. Other
forms of non-military action could be used to address this activity with the government of Iran.
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
B - 75
Response 5-3: No. There is no imminent threat to life or property.
Q 5-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options or both are
available to the FORSTRKGRU? What response should the Admiral recommend to CENTCOM
and national leaders? What would constitute a proportional response in this situation?
Response 5-4: CENTCOM, as a whole, does not have the appropriate military capability to
respond to this type of attack in a reasonable and proportionate way. I reasonable and
proportionate response would be to employ national military capability or other forms of US
power against those suspected to be involved. CENTCOM can take defensive action by paying
closer attention to their own cyber “security zone.”
B - 76
Participant 11
Scenario Question Set 1:
A subsequent investigation by the USS Forestall Naval Criminal Investigative Service
(NCIS) agent afloat determines that WeSupportU.com is an internet domain owned by a
Canadian national believed to have pro-Iranian beliefs and whose whereabouts are currently
unknown. Virus scans on all servers throughout the CSG using the most current virus signatures
provided by Space and Naval Warfare Command (SPAWAR) show no known viruses or
malware. The investigation did reveal a 60% increase in network traffic, a significant increase
in email server CPU utilization beginning one week into deployment, and widespread complaints
that applications appear to be running significantly slower. Network analysis indicates
bandwidth utilization remains within allotted limits and there is no detectable increase in disk
space use. The FORSTRKGRU Director of Communications and Networks (N6) concludes that
network volume increases are attributable to normal and expected changes in day-to-day
operations as service members adapt to a deployed battle rhythm. The degradation in application
performance is also attributed to these adjustments. The increase in email server demand is
judged to coincide with understandable increases commensurate with the completion of weapons
loading and reduced air operations for the transatlantic crossing, allowing service members more
time to correspond with friends and family ashore.
Q 1-1: Given the background and amplifying information above, would you concur with the N6
assessment and why?
Response 1-1: No. Concurrence would be contingent upon understanding on what information
the N6 based his assessment. If he had the ability to conduct extensive packet analysis on
network traffic and to demonstrate how the traffic adhered to historical baselines, then he might
be justified in his conclusion. However, there is enough evidence to warrant further analysis
from external sources. It is unlikely that any Command N6 would “conclude” that the issues
outlined in the scenario are merely due to anticipated deployment rhythms without further
investigation.
Q 1-2: Would you recommend any analysis, notification, or action in addition to or in place of
that discussed above and why?
Response 1-2: The N6 should comply with Navy standard operating procedure and contact their
Computer Network Defense Service Provider (CNDSP), via an alternate network, for support
and request that they notify FLEETCYBER, USCYBERCOM and NSA of their concerns; they
should discuss their theory that the network anomalies are a result of a potential unknown
exploit. Notification should also be made to regional commanders: 5th Fleet Commander,
NAVCENT, and CENTCOM. I would recommend that outbound connections be closely
reviewed for suspicious packets based on destination, type, and duration of the connections.
Participant 11
Scenario Question Set 2:
On the hundredth day of deployment, FORSTRKGRU Director of Intelligence (N2) is
notified that a significant number of service member and associated family member names have
B - 77
appeared on an Iranian website. According to all source intelligence analysis, the site is operated
by an Iranian cleric with strong anti-U.S. views. In addition to names, unit assignments and links
to social media pages are included. These links provide easy access to recent and up to date
photographs of crewmembers and liberty activities in the United Arab Emirates (UAE).
Information on European and Middle-Eastern merchants known to do business with the US Navy
is also included, in particular a number of merchants who were on board USS Forestall when the
ship was transiting the Mediterranean Sea en-route to C5F. The site also prominently displays a
fatwa issued by the site’s operator declaring any individual listed an infidel and calling for
“Jihad” against the individuals, their families and all merchants who support the United States.
Many service members continue to correspond and exchange personal information with
merchants included on the website to facilitate delivery of purchased goods to their homes and
families in the U.S.
Q 2-1: In light of this information, you are asked what subject areas should be of concern to the
CSG Commander and to recommend Courses of Action (COA) for consideration? Please
discuss your reasoning.
Response 2-1: The CSG is clearly being targeted. Mitigation measures should be directed by the
commander – personnel should consider their ship’s unclassified network to be compromised,
discontinue use of social media, use phone instead of data networks when possible, and
strengthen their OPSEC posture. Meetings with merchants should be rescheduled and relocated.
Q 2-2: While briefing the Admiral on your COAs she states that the cleric’s actions constitute a
“cyber-attack” on service members and their families, as well as a number of foreign nationals.
Do you concur with this assessment? Why or why not?
Response 2-2: I would concur that the CSG is being targeted. The definition of cyber-attack is
open for debate – death or serious property damage requirements may not have yet been
satisfied. Is property damage only achieved via denial (i.e. loss of availability)? Does damaging
the integrity of an information system's authentication system cause serious property damage?
Such activity could also easily leads to loss of confidentiality and integrity of information. If one
agrees that obtaining unauthorized access to a system does cause property damage, then one
must agree that such an event is an attack. Based on this logic, the scenario events would
constitute a “cyber-attack.”
Q 2-3: The Admiral requests of US Central Command (USCENTCOM), in conjunction with
USCYBERCOM, a determination on whether the events constitute a cyber-attack. She plans to
brief Commander 5th Fleet on the issue and wants to provide a COAs if the events are
determined to constitute a “cyber-attack”. How would you advise the Admiral? Please also
explain why preparing COAs for the cyber-attack contingency are appropriate for the situation.
Response 2-3: COAs should be designed to confuse the adversary. Rather than simply cutting
off network connections, we should seek external support to analyze the situation with all source
intelligence and possibly throttle outbound traffic, inject intermittent errors, and plant false
information. All COAs should involve OPSEC and Information Assurance (IA) training in order
to minimize any further leakage. Any counter-attack options, however, would require external
support and authority.
B - 78
Preparing COAs for the cyber-attack contingency is appropriate for the situation, since
there are clear indications and warning that FORSTRKGRU systems have been compromised
and the threat is persistent.
B - 79
Participant 11
Scenario Question Set 3:
Following the previous events, an enterprising contract employee at the Naval Computer
and Telecommunications Area Master Station (NCTAMS) tasked with supporting units in the
C5F AOR learns about the coupon disputes and subsequent investigation from a former
shipmate. Suspicious of emails and changes in network traffic patterns, the contractor employs a
network analysis tool for monitoring and logging traffic emanating from or destined for all units
in FORSTRKGRU. Monitoring and logging is conducted for 21 days, after which traffic
analysis identifies a large number of 50 Kilobyte emails from multiple users within the CSG to a
single shore based email address. All data contained within the emails is encrypted and the
frequency of emails appears to correspond to network utilization. A Naval message outlining the
results of this analysis is distributed to FORSTRKGRU, C5F, U.S. Fleet Forces (USFF), Navy
Network Warfare Command (NNWC), Commander 10th Fleet (C10F), Naval Information
Operations Command (NIOC) Maryland, and US Cyber Command (USCC). Virus and malware
scans on servers and hosts throughout the FORSTRKGRU continue to produce no abnormal
findings.
Q 3-1: After receiving the Naval message, the Admiral asks for your recommendation regarding
appropriate FORSTRKGRU and unit level actions. What would you recommend and why?
Response 3-1: Seek CNDSP / USCC / DISA / NSA support for further investigation. Do not yet
terminate connections to the subject email address. Seek investigation of source of encryption
and whether plain text of the transmissions can be found. Direct heightened OPSEC measures –
including the use of alternate networks when possible.
Q 3-2: In your assessment, do deploying forces have cyber equipment, expertise and associated
authorities and policy to collect data and perform the network analysis discussed above? If not,
then please identify the elements that currently preclude performance of such analysis by
deployed forces.
Response 3-2: Deploying forces only have a minimal capability to collect data and perform
network analysis. External support is available, however. Proper analysis will require broad
teamwork by various stakeholders in regards to the suspicious connections, including:
-
Deploying forces: to provide the necessary physical access and local
administration
-
CNDSP: to provide domain firewalls/IDS knowledge; in coordination with
USCC, NSA, and DISA
-
USCC: to prioritize attention and exercise its ability to direct actions
-
NSA: to conduct SIGINT – extending to crypto analysis and perimeter defenses
-
DISA: to brings its NIPRNET hardening capabilities
-
Law enforcement: to provide ability to exercise domestic authorities
B - 80
-
CENTCOM: to provide ability to correlate activities with other sources and to
direct regional actions
B - 81
Participant 11
Scenario Question Set 4:
Analysis by national level agencies reveals that the FORSTRKGRU appears to be the
victim of a previously undetected virus (zero-day attack) deployed utilizing the fictitious
coupons for the Hard Rock Café. Extensive efforts have also resulted in the ability to decrypt
and read the emails recorded during the 21-day monitoring of FORSTRKGRU network traffic.
The emails contain portions of both personal and official emails from FORSTRKGRU, including
portions of briefing slides and spreadsheet attachments. The single destination address for the 50
Kilobyte emails was identified as a web mail account with an auto forward feature. The auto
forward feature was configured to delete all incoming email after sending it to an anonymous
email server. An email containing a network beacon sent to the anonymous email server
identified the end recipient as a web mail server in Estonia. Further investigation revealed the
account has only been accessed from Iran by an IP address correlating to a local Internet Service
Provider (ISP) in Tehran. The same ISP hosts the Iranian cleric’s website that calls for “Jihad”
against the U.S. and foreign individuals listed on the site. The ISP is the primary commercial
server for the civilian population in Tehran and is known to provide services to three large
civilian hospitals. All source intelligence also indicates that the cleric has numerous connections
with the government of Iran, and many members of his congregation are confirmed members of
Iran’s Revolutionary Guard.
Q 4-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 4-1: There is no consistent U.S. government or DoD definition of cyber attack? Is
there a need to have clear attribution that the cleric is acting as an agent of the Iranian
government? Can exploitation of someone else’s computer ever be considered defensive? In this
scenario, it seems likely that the employment of a zero-day exploit is designed to exceed
authorized use/access to our network and therefore should be considered a cyber-attack since it
damages FORSTRKGRU property. In cyberspace, there are certain lines that when crossed are a
clear sign of malicious intent. This scenario highlights one of them. If a foreign national
infiltrated illegally into an adversaries’ country, one must consider whether the individual is
there “just to spy” or whether he is there to cause physical damage, conduct an assassination, or
to lay the groundwork for a larger kinetic campaign? Without clear evidence to the contrary, one
must explore the worst possibilities. The same is true in the virtual world and malicious actions
must be taken seriously.
Q 4-2: In your assessment is the virus a cyber-weapon and do the actions conducted against the
FORSTRKGRU constitute an armed attack? Why or why not?
Response 4-2: Since a weapon can be defined as “a means used to defend against or defeat
another,” this virus can be considered a cyber-weapon – a means to defend the Iranian people
against U.S. forces or to defeat U.S forces. In accordance with Article 51 of the Charter of the
United Nations, an armed attack is a crucial trigger to justify a State to launch military operations
against other States. The scenario appears to constitute an armed attack and would justify a
proportional military response in self-defense. As long as it is proportional, then the
ramifications of calling it an “attack” is contained.
B - 82
Q 4-3: Given the above information, can the FORSTRKGRU leverage any policy or guidance to
invoke rights to self-defense? Why or why not?
Response 4-3: While Article 51 of the Charter of the United Nations addresses a nation’s right to
self-defense, current policy does not permit Commanders at this level to take cyber actions
outside DoD network in response to cyber threats. The Commander does not possess the means
to respond to this threat in a proportionate way.
Q 4-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options, or both are
available to the FORSTRKGRU? What response should the CSG Commander recommend to
CENTCOM and national leaders? What would constitute a proportional response in this
situation?
Response 4-4:
The defensive options available to FORSTRKGRU include requesting focused SIGINT on the
Tehran-based ISP and the Iranian cleric as well as requesting development of a military
deception operation.
The CSG Commander should recommend to CENTCOM and national leaders that we
should take advantage of this discovery to confuse our Iranian adversaries regarding our planned
actions, while at the same time infiltrating Iranian networks to in a proportional way.
A proportional response could include targeting of the cleric to discredit him and possibly
others who are supporting him behind the scenes.
B - 83
Participant 11
Scenario Question Set 5:
While moored in Piraeus, the USS Forestall supply officer (SUPPO) is notified that 72
pallets of bottled water which had been requested to augment ship’s stores would not be
delivered with the next scheduled supply shipment. The SUPPO notifies the CO and
FORSTRKGRU that no additional bottled water had been ordered. Supply records onboard
indicate that no order for bottled water was ever submitted. The records of shore-based supply
facilities supporting FORSTRKGRU indicate an order was submitted via the normal electronic
ordering process and that all supporting documentation appears to have come from authorized
ship’s personnel. A subsequent cyber security analysis conducted by USCC personnel reveals
that no security patches have been installed since prior to deployment. Additionally, the
manufacturers default SYSADMIN password for the supply software was not changed following
the most recent upgrade. An examination of other FORSTRKGRU units reveals an identical
condition on two additional CSG units and a USNS vessel. After auditing supply order records
for accuracy, USS Relentless and USS Audacious and USNS Tenacious assigned to the
FORSTRKGRU, report an unexplained cancellation of orders for small-arms ammunition
needed after numerous weapons qualification sessions.
The USCC analysis also identifies a virus on the supply servers that appears to interface
with the virus affecting CSG email. This interface appears to support data exfiltration and
transmission of accurate information relating to CSG movements and schedules. Further
analysis reveals that resulting email contain a different source/destination address than the
address previously identified for the CSG virus. The supply virus appears to utilize the same
initial address with the auto forward feature, as well as utilizing the same subsequent anonymous
email server. At the anonymous email server the supply signals appear to be routed differently
than other traffic. These supply signals traverse a number of additional servers, all in differing
nations, and appear to either emanate or terminate with an IP address identified as belonging to
the Iranian embassy in London, U.K.
Q 5-1: In your assessment do the above actions constitute a cyber-attack? Why or why not?
Response 5-1: Yes; this is a coordinated action that clarifies the adversary’s intentions of
producing denial of information effects against a military target.
Q 5-2: In your assessment do the actions conducted against the FORSTRKGRU constitute an
armed attack? Why or why not?
Response 5-2: This is an armed attack within the cyberspace domain, in accordance with the
answer to Q 4-2 above. Since the commander reasonably believes this was the pre-cursor to
conflict and not simply an annoyance, it could be considered an armed attack. Digital
information was modified, despite that fact that physical property was not destroyed and the lives
of the sailors afloat were not placed in significant risk. Other forms of non-military action could
be used to address this activity with the government of Iran.
Q 5-3: Given the above information, can FORSTRKGRU invoke any rights to self-defense?
Why or why not?
B - 84
Response 5-3: Yes; FORSTRKGRU can invoke its right to self-defense, but any response must
be proportional and necessary to mitigate the risk to life or property.
Q 5-4: Assuming the FORSTRKGRU Commander is convinced that the actions perpetrated
against the CSG constitute an armed attack, what counter attack, defensive options or both are
available to the FORSTRKGRU? What response should the Admiral recommend to CENTCOM
and national leaders? What would constitute a proportional response in this situation?
Response 5-4:
Available defensive options are limited to manipulation of adversary connections and
information being ex filtrated. Counter attack options include coordination for further external
action by offensive cyber capabilities of the United States.
The Admiral should recommend to CENTCOM development of phased responses that
initially confuses, but then convinces Iranian authorities of the fruitlessness of their cyber
adventures.
Actions should be limited to those that create effects within cyberspace and/or the minds
of those perpetrating these actions against the United States. Furthermore, our response actions
should not cause broad denial affects upon the Iranians within cyberspace, but should
demonstrates our ability to gain access and perform similar clandestine operations.
B - 85