Cyber Defesa
Cyber Defesa
Cyber Defesa
on cyber
defence
AS A COLLECTIVE DEFENCE NCIA and NATO Headquarters to keep the (1) situational awareness;
organisation, NATO's stance on cyber relies Alliance's cyber defence posture strong. To (2) plans;
heavily on Member Nations to protect their build a strong cyber defence, there are many (3) exercises; and,
own networks and Computer Information elements that need to come together into a (4) business continuity.
Systems (CIS). NATO's r esponsibility is cohesive whole. Some of these elements are
the protection of NATO owned networks. tangible while others are less tangible and Let's go through each of these parts in more
Within this framework, the NATO Commu- require processes and procedures. detail:
nications and Information Agency (NCIA) One way to view cyber defence is to
provides the bulk of the cyber defence ca- think about a walled fortress. Some of you Situational Awareness: If we go back
pability to NATO to include the Strategic may be thinking that a fortress is an out- to the walled fortress analogy, situational
Commands, Allied Command Operations dated analogy when we are dealing with awareness can be viewed as stones that
(ACO) and Allied Command Transforma- cyberspace. I disagree. Using the fortress make up the wall. Each set of stones around
tion. Knowing this basic information, one analogy is a good way to explain the four a fortress has its own unique shape and
may think that Strategic Commands, par- critical parts required in order to build a characteristics. They are likely different sizes
ticularly ACO does not play a major role strong cyber defence in any organisation, depending on the strength required. In the
in NATO's cyber defence. This would be an especially a complex organisation such as same way that the walled fortress is made
incorrect assumption. ACO, and its subor- NATO. Building a robust structure for cyber up of stones of different sizes, shapes and
dinate commands, work very closely with defence takes four basic parts: characteristics, situational awareness is also
not relevant for this discussion. What is im- Plans: Fortress walls need more than just ing, they could find out what type of rein-
portant to know is that this strategic-level irregular stones to be stable. They need forcement was required.
information allows the leadership to look good, strong mortar. There is a critical link- In this same way, the military uses ex-
beyond the immediate vulnerabilities on the age between the stones and the mortar. ercises based on likely scenarios to see if their
networks to see future cyberspace threats. Stones alone do not provide the needed forces are trained properly and ready. Mili-
The medium sized stones can be strength. Mortar alone does not provide the tary exercises also help test defences to see
viewed as operational-level situational stability. Both stone and mortar are needed which need to be strengthened. Addressing
awareness. For ACO, operational-level situ- to be used together to give the wall strength these can take the form of adding additional
ational awareness is handled mostly by the and stability. elements to get better situational awareness
ACO subordinate commands such as JFC In the military, our plans can be or to make the military plans more thorough.
Brunssum, JFC Naples, the Single Service thought of as that crucial mortar in our
Commands, and the NATO CIS Group. cyber defence fortress. The military relies NATO USES a multi-faceted approach
They focus on ensuring they have a good upon many plans to ensure everything re- to cyber exercises. In the first set of exercises,
picture of the vulnerabilities on the net- lated to military operations is considered ACO and subordinate commands incorpo-
works and systems. The identification of prior to conflict. At ACO, we have a number rate cyber scenarios into the existing exer-
these potential vulnerabilities may include of plans addressing scenarios which would cise scenarios. These exercises are large and
determining if there are any single-points- require military action. Cyber is a necessary have more than just cyber defence personnel
of-failure, back-up power and air condition- and vital part of each of these plans. SHAPE participating. The exercises' cyber injects are
ing to network equipment, and if they have handles the development of strategic plans based on likely cyber threats, to include acts
a robust cyber security training programme while ACO subordinate commands develop of aggression, acts of sabotage or even acts of
Simply put, the
military needs to
be able to operate
in an environment
where CIS
capabilities are
either degraded
or denied."
The NATO Computer Incident Response Capability (NCIRC) is the nerve
centre of the Alliance's fight against cyber crime. Photograph by NATO.
nature. The exercises' cyber evaluation teams attack. In ACO, we call the results of these
determine how well the exercise players are "what-if " scenarios for cyberspace "Business
able to continue performing their mission Continuity Plans". Simply put, the military
despite degraded or disrupted cyber systems. needs to be able to operate in an environ-
The second set of exercises is dedi- ment where CIS capabilities are either de-
cated to training and evaluating only the graded or denied. Depending on the poten-
cyber forces and cyber defences. Since these tial threat, "Business Continuity Plans" can
exercises are limited in scope involving only be as dramatic as determining how to con-
NATO's cyber forces, not the broader force duct operations without any CIS support.
structure, a greater amount of tactical-level Or the plan could be simpler involving re-
focus can be achieved to test and validate prioritising other lower priority resources
NATO's cyber defences. Both these types, such as communications links or power
the large-scale full-formation and dedicated generation facilities to keep higher priority
cyber defence exercises are needed to ensure operations going.
all aspects of NATO's cyber defences are
looked at thoroughly.
Conclusion @nato.int
Business continuity: The last piece of Cyberspace and cyber defence, on the sur- WATCH THE VIDEO
building and operating our walled fortress face, seem like complex, new entities that ABOUT CYBER
is to work through what we call "what-if " need their own set of paradigms. But as COALITION. GO TO
scenarios. In these scenarios leaders look you can see from the walled fortress anal- NATOCHANNEL TV.
to see what can be done to continue mili- ogy, from an operational military perspec-
tary operations in case something poten- tive, cyberspace and cyber defence are FURTHER READING
tially catastrophic happens. In a walled very similar to the way we conduct sound For these related stories, visit www.aco.nato.int
fortress, "what-if " scenarios could take the military operations in the air, land and sea * NATO Cooperative Cyber Defence
Centre of Excellence, http://www.ccdcoe.org/
form of determining how the legion could domains. We need to leverage expertise * Attacks from cyberspace: NATO's newest
be controlled even if its primary signalling developed over the centuries in the three and potentially biggest threat, General Philip
Breedlove, SACEUR, http://www.aco.nato.int/
methods were destroyed. Or how will food physical domains and apply these to the saceur2013/blog/attacks-from-cyberspacenatos-
or water be conserved in case of prolonged cyber domain. newest-and-potentially-biggest-threat.aspx
CYBER DEFENCE
IN OPERATIONS
By Peter Hutson
Analyst CIS, JCID
Joint Warfare Centre
Introduction
The cyber defence (CD) capability at the years and responded with a steady stream of - not the Army you might want or wish to
operational level is based upon the concept initiatives and activities to move the cyber have at a later time." This quote reflected
that a Joint Force Commander needs to defence capability rapidly forward. Since his sentiment that a deployed Commander
identify and manage operational risks in- 2011, through its NRF STEADFAST col- cannot wait for the ideal capabilities to be
herent in environments under cyber threat. lective training exercises, JWC has had the in the right place at the right time when a
This article examines the status of the cur- tasking and opportunity to witness those crisis erupts, but one has to deploy and con-
rent NATO CD capability and the unique cyber operational level challenges first- duct operations with the capabilities and
nature and challenges of CD in operations hand, and to watch the development of this resources available. This statement rings
as evidenced in the context of the NATO important capability. true for cyber defence in NATO operations
Response Force (NRF) exercise programme. as well. Despite NATO's remarkable prog-
Most recently in November 2013, Deploying with the cyber ress over the last three years that includes
during exercise STEADFAST JAZZ, JFC capabilities you have development of the cyber defence concept
Brunssum (JFC BS) and its components Static commands and organisations - that and policy, organisational constructs, ca-
completed their operatio nal level collec- is, those NATO entities that have a perma- pability packages, education and training
tive training and received their NRF cer- nent physical infrastructure and enduring requirements, and a comprehensive Bi-SC
tifications in a scenario that included a organisational mission - have enough chal- "Cyber Defence Action Plan" - much work
cyber-contested environment. The scenario lenges on how best to respond to the more remains. Nonetheless, the deploying Com-
reflected some of the asymmetric threats routine cyber threat when conducting their mander must be prepared to deploy and
in the real world, in which cyber attacks peacetime missions. A "deployed" multina- cope within existing means and capabilities.
against NATO are becoming more frequent, tional Joint Task Force (JTF) on its way to
organised, and disruptive. Alongside the war, however, has these same challenges and DOTMLPFI perspective. NATO of-
more traditionally recognised air, land, many more. ten measures the status of its capabilities
maritime, and space domains, cyberspace through the lens of a DOTMLPFI construct;
is rapidly emerging as a "fifth dimension" DURING OPERATION Iraqi Free- that is, through an examination of the matu-
of warfare, even if not officially recognised dom, the U.S. Secretary of Defense Don- rity levels of Doctrine, Organization, Train-
as one by NATO. Acknowledging this per- ald Rumsfeld, responded to a query about ing, Materiel, Logistics, Personnel, Facilities,
vasive and dynamic threat, NATO has ac- a lack of armoured vehicles with the quip and Interoperability. The next several para-
celerated its cyber effort over the last three that "you go to war with the Army you have graphs will examine three of those strands:
Cyber Defence Doctrine, Organisation, offer the opportunity to "tease out" the is- (CND)? Where do Information Assurance,
and Training. There is no doubt that NATO sues and bring shortfalls and gaps to the INFOSEC, or CIS Security fit in the context
cyber professionals who are in the "know", forefront. The STEADFAST series has of- of Cyber Defence? What is a cyber-attack as
can point to the flurry of point papers, fered a venue not just for training and en- opposed to a CIS Security Incident?
meetings, draft handbooks, workshops, forcement of tradition skillsets, but also During JWC training events, the de-
conferences, and exercises that suggest and as a "doctrinal laboratory" for focused ex- ployed Commander and his staff have had
indeed, reflect significant progress of CD amination and analysis of capabilities and to delve into often conflicting taxonomy,
as a NATO capability and positive momen- functional areas in the context of a relevant policy nuances, definitions and voids to
tum. Synchronising and streamlining such scenario, and a real staff - which is con- create a baseline from which to go forward.
diverse and short-fused activities amongst fronted with the challenge of planning and In SFJZ 13, JFC BS utilized the following
28 Allies, nonetheless, remains a challenge. executing an NRF mission.(2) diagram in its staff Cyber Defence Working
And, as the most recently certified NRF staff Group Terms of Reference (TOR) to pro-
has witnessed - and as measured against Taxonomy: Linked to the creation of mulgate its understanding of the taxonomy
the DOTMLPFI capability yardstick - op- CD doctrine is the need to have a common and organisational inter-relationships. Such
erational CD is in its relative infancy with cyber taxonomy, which would facilitate the models have varied significantly from exer-
NATO. implementation of NATO Cyber Defence cise to exercise and reflect the need for es-
Policy through a shared understanding of tablishing clarity.
Doctrine: There is little to no NATO CD- terms.(3) Language and words do count in
specific doctrine, much less agreed cyber- the cyber business, as they underpin the Organisation: No standard organisa-
related definitions or taxonomy for cyber logic behind development of staff functions, tional structure or model exists yet for CD
for the deployed Commander. This lack of processes, organisation, and legal tools such in NATO for deployed operations and the
doctrine, however, is made more problem- as Rules of Engagement (RoE). last three operational exercises have reflect-
atic by the fact that there is approved NATO What does the word cyber actually ed different approaches with common
Doctrine for Computer Network Opera- mean? Where does cyberspace begin and themes. As with NATO's C-IED capability,
tions (CNO) and Computer Network De- end for the operational Commander? For one common approach has been to estab-
fence (CND) in the context of Information example, how does a staff differentiate be- lish cross-functional staff entities to harness
Operations Doctrine (AJP 3.10)(1), and for tween virtual cyber Joint Operational Area expertise for application and focus to cyber
Information Assurance within the context (JOA) and the more traditional land, air, problems. These entities require inter-staff
of the AJP-6 series - both of which are not and sea domains defined by terrain and and external coordination mechanisms.
always consistent with approved NATO CD geographical boundaries? How is CD dif- And, most importantly, another common
policy and developing NATO cyber taxon- ferent than Computer Network Defence theme has been the growing recognition
omy. Unfortunately, operational missions
can neither afford to wait for resolution
of doctrinal voids nor for absolute clarity; Cyber Defence Cell AOR
the deployed Commander must interpret
and rationalise which documents are valid
or invalid and which ones should be used
to develop staff functions. The NRF staff
must study top-level documents such as the
Cyber Defence Concept and Policy, distill
nuggets that are relevant to the NRF and
operations, and ultimately translate NATO's
general CD aims and objectives into action-
able plans and SOPs. In the absence of an
approved construct, assumptions must be
made in order for the mission to be planned
and executed.
During the STEADFAST series of
exercises over the past three years, this has
been the default situation that the JFCs
have had to face. Yet, this situation should
neither be surprising nor represented
negatively. As with other new or evolving
capabilities (such as C-IED, Knowledge
Development, or STRATCOM), exercises
S TEPPING
TONES
FOR TRIDENT
EXERCISES
CYBER DEFENCE
TRANSFORMATION
By Lieutenant Colonel H. Todd Waller, United States Air Force; Lieutenant Colonel Joel Gourio, French Air Force
Joint Effects Section
Joint Warfare Centre
THE JOINT WARFARE Centre ent approach after experiencing cyber injects
is preparing to conduct a new series of during STEADFAST exercises and subse-
operational level exercises, beginning with quently treated CD as an information assur-
TRIDENT JAGUAR this spring and reach- ance and mission assurance issue with spe-
ing a climax with the high-visibility exercise cial emphasis on the management of risks to
TRIDENT JUNCTURE 15 in support of the operation and the overall mission. More
NATO's Connected Forces Initiative. specifically, both JFCs initially struggled
Given the importance of cyber de- to manage CD injects within J6 and they
fence (CD) to the Alliance, an appreciation eventually adopted a J3-led approach. J3
of the cyber lessons of STEADFAST (the aspects of CD and the inherent role of the leadership was more successful in char-
predecessor to TRIDENT) is essential for J6 and NATO Communications and Infor- acterising the threat operationally; mar-
achieving a higher level of CD across Alli- mation Agency (NCIA) to manage NATO shalling full Battle Staff support to include
ance operations. This article captures the deployed and static networks. Not so intui- in-demand specialities such as LEGAD,
seven most significant findings (which we tive was the fact that NATO Response Force STRATCOM, POLAD; and in supporting
will call "stepping stones") of the last four (NRF) operational vulnerabilities to cyber the Commander's decision-making via ac-
STEADFAST exercises in which CD was in- threats could extend beyond NATO net- tionable products.
troduced and played prominently. works. The cyber-contested environments
created for STEADFAST exercises enabled Recommendation: Continue J3-led CD
(1) CD is much more than a technical the Joint Force Commands (JFCs) to see with a mission assurance emphasis and with
issue: Operational Battle Staff Training CD more operationally. In fact, both JFC full support from the Battle Staff. J6 should
Audiences readily appreciated the technical Brunssum and JFC Naples adopted a differ- continue its focus on information assur-
of limiting factors were identified during As a result, the "train as you fight" approach
CRP events to include: (1) a limited un- is not fully implemented, however, employ-
derstanding of CD operational relevance; ing real exercise cyber attacks could degrade
(2) a lack of confidence in producing cyber the exercise network to the detriment of
threat analysis; (3) a lack of understanding meeting all exercise Training Objectives.
of available CD resources (i.e. Rapid Re-
action Teams, contract support, national Recommendation: Limit CD in TRI-
support); and (4) a limited understanding DENT to simulated incidents until ACO's
of strategic/political-level cyber sensitivi- implementation of CD is more mature. Use
ties and how these could influence mission other exercises, such as CYBER COALI-
accomplishment. TION, CWIX and STEADFAST COBALT,
Recommendation: Establish Bi-SC CD to conduct testing of computer networks.
Working Group to synergise CD activities, Explore the costs and benefits of linking
facilitate information sharing, and develop such exercises (perhaps as part of the Con-
common objectives. Standardise CD play nected Forces Initiative) in order to better
in NATO exercises to the extent that sup- replicate the "train as you fight" concept
ports those common objectives. Develop a without incurring excessive risk to the TRI-
repository of CD Lessons Learned for use DENT exercise network.
across the Alliance. A repository of MEL/
MIL products would be useful for exercise
planning staffs.
Recommendation: Update the Com-
prehensive Operations Planning Directive (7) Achieve more realistic CD training
to include CD. Fill the CD training void. without excessive risk: CIS is provided
Conduct CD planning during day-to-day to support exercises without being part of
JFC activities. Continue to mature planning the "tested" Training Audience. CD injects
products and processes (e.g. Cyber Priori- are scripted/simulated and do not involve
tised Asset List and Cyber Risk Assessment the introduction of malicious software that
Matrix generation). Establish coordination could be used to test real exercise networks.
between JFCs, component commands, and
NFS elements. The NATO Intelligence Fu-
sion Centre should provide cyber threat
analysis support to NCS and NFS and train
intelligence personnel how to conduct such
analyses. Encourage Ope rational Liaison
Reconnaissance Teams (OLRT) to make CD
a priority during TRIDENT. Assign CD staff
during CRP that have the capacity to think
creatively and to teach/coach the planning
staff to do likewise.
Due to the lack of a common definition or now. In the past, people were able to move this distance coincides with the maximum
taxonomy, the terms internet, world-wide freely from one land or maritime area to range a cannon shot could be fired and the
web, cyber and cyberspace will be used in- another similar to how we can move from area that a nation can protect from shore(1).
terchangeably throughout this article. one website to another. Over the years, we As technology and commercial interests
I
sub-divided continents under different advanced, the concept of territorial waters
names such as the Americas, Eurasia, and were legally defined and led to 12 nautical
T HAS ALWAYS BEEN as- Africa but these are all the same landmass miles (22 km) as the suitable internation-
sumed that the internet or cyberspace i.e. they are all one land that is part of the ally accepted limit(2).
domain is considered without borders, Earth's crust. The same can be said for the The same can be said for air with the
and for a relatively brief period in the oceans since they are all the same body of development of air routes, air corridors and
early 1990s, it was. But by 1996, the water. In military terms, we operationalized air defence identification zones (ADIZ).
raw, unfiltered internet that most people and sub-divided the different domains since In the early days of the air domain, a pilot
think of now has started disappearing. The it allows us to manage these vast areas more could fly anywhere. The development of ra-
same technology that allows for global in- easily. The two newest domains started this dar, fighter interceptors and surface to air
terconnection has created the cyberspace process about one hundred years ago for air, missile (SAM) combined to produce an in-
borders and boundaries that most people and fifty years ago for space. The operational tegrated air defence that quickly restricted
do not know already exist. These are the development of the air and space domains unauthorised flights at less than 70,000 feet
same borders and boundaries that national was patterned after the land and maritime. (21.3 km). It took the 1960s shoot-down of a
governments, and by extension the milit- In order to further develop the cyberspace U-2 to acknowledge that the idea of an Open
ary, need to further develop in order to ac- domain we will have to draw suitable analo- Sky now has limitations and nations can and
complish their defensive missions. To truly gies from the other domains. will protect their sovereign airspace(3).
accomplish cyber defence, NATO will need For the land domain, the develop-
to operationalize the newest domain of cy- ment of cities and roads led to national WHILE IT CAN BE argued that space
berspace as was done with the other four borders and in military context, armed is vaster than cyberspace, space is not with-
domains of land, maritime, air, and space. checkpoints to defend those borders. In out its own limits and boundaries. We have
the maritime domain, the concept of ter- subdivided space around the Earth into three
THERE WAS A time in human history, ritorial waters was institutionalised. From orbital regimes of Low Earth Orbit (LEO),
about twenty thousand years ago, that the the 17th to 18th centuries, territorial wa- Medium Earth Orbit (MEO) and Geosta-
land and maritime domains were seen as ters were roughly three nautical miles (5.6 tionary Earth Orbit (GEO)(4). Each orbital
vast and borderless as cyberspace is seen km) wide. For some European countries regime has their particular military advan-