Book Excerpt: ‘The Hacked World Order’ by Adam Segal
The first chapter of a new book by Adam Segal, who joined Kaiser Kuo and Jeremy Goldkorn on the June 23 episode of the Sinica Podcast to discuss China's activities in cyberspace.
Editor’s note: Listen to Adam Segal on this episode of the Sinica Podcast.
Just as historians consider 1947 as the year that two clear sides in the Cold War emerged, we will look back at the year that stretches roughly from June 2012 to June 2013 as Year Zero in the battle over cyberspace. It was by no means the first year to witness an important cyberattack or massive data breach; those had arguably happened several times before. In the 1990s the United States used cyber weapons against Serbia, and in 2007 hackers stole credit and debit card information from at least 45 million shoppers at T.J.Maxx and Marshalls. In 2008 hackers, suspected to be working with the Russian intelligence services, breached the Pentagonโs classified networks. But it was in 2012 that nation-states around the world visibly reasserted their control over the flow of data and information in search of power, wealth, and influence, finally laying to rest the already battered myth of cyberspace as a digital utopia, free of conventional geopolitics. The assault on this vision was comprehensive, global, and persistent.
The conflict in cyberspace will only become more belligerent, the stakes more consequential. An estimated 75 percent of the worldโs population now has access to a mobile phone, and the internet connects 40 percent of the planetโs population, roughly 2.7 billion people. Information and communications networks are embedded in our political, economic, and social lives. Individuals and civil society now participate in global politics in new ways, but sovereign states can do astonishing and terrifying things that no collection of citizens or subjects can carryย out. We will all be caught in the fallout as the great powers, and many of the lesser ones, attack, surveil, influence, steal from, and trade with each other.
Year Zero: A timeline
Year Zero began with a newspaper article. In June 2012, U.S. officials leaked details of a computer attack on Iranโs nuclear program, codenamed โOlympic Games,โ that had begun under President George W. Bush. For years, the United States had been trying to stop Iran from building a bomb through diplomatic pressure and financial sanctions. Someone, probably the Mossad, Israelโs intelligence agency, had also been assassinating Iranian scientists: a remote-controlled bomb attached to a motorcycle killed Masoud Alimohammadi, a physics professor, just as he stepped outside his home in the north of Tehran. Cyberattacks formed a quieter, much less deadly component of this campaign.
The malware (malicious software) known as Stuxnet, allegedly developed by the United States in cooperation with Israel and first detected in 2010, surreptitiously slowed down and sped up the motors in Iranian centrifuges being used to enrich uranium and opened and closed valves that connected six cascades of centrifuges. Eventually the motors tore themselves apart, and Iran had to replace 1,000 damaged machines. As it was doing its damage, Stuxnet provided false feedback to operators so that they had no idea what was going on. The goal was to make the changes so imperceptible that the Iranians would think the destruction stemmed from bad parts, faulty engineering, incompetence, or all three. Ralph Langner, a German cybersecurity expert who was among the first to decode bits of Stuxnet, estimated that 50 percent of the malwareโs development costs went into efforts to hide the attack. One U.S. government official told The New York Times that Stuxnet aimed โto mess with Iranโs best scientific mindsโ and โmake them feel they were stupid.โ
Although the Iranians admitted some infections of their computer systems, the ultimate strategic effect of the malware on their nuclear program remains unclear. Reza Taghipour, an official in Iranโs Ministry of Communications and Information Technology, downplayed the new weapon: โThe effect and damage of this spy worm in government systems is not serious.โ Some U.S. government officials claimed that it set Iranโs nuclear program back eighteen months to two years; other technical experts said the attack did little to slow down Iranian efforts and in fact may have sped them up. As the Iranian scientists worked to get the centrifuges running properly, they made improvements in their performance and design that resulted in greater output.
The time gained from the attacks may have been an important factor in bringing Iran back to the negotiating table and reaching a deal on its nuclear program in July 2015. The delay, even if only amounting to two years, gave the economic sanctions on the country more time to bite. The poisonous code was also useful in persuading Israel not to conduct airstrikes against Iranian facilities. In 2008, Israel reportedly asked the Bush administration for bunker-busting bombs it hoped to use against production and research sites hidden in mountainsides and buried underground. In rejecting the request, President Bush assuaged the Israelis by telling them that he had authorized the Olympic Games mission to sabotage Iranโs nuclear infrastructure.
Whatever the impact on Iranโs nuclear program, Stuxnet was notable on two fronts. First, it was extremely sophisticated, โunprecedentedly masterful and maliciousโ in the words of one technical journal. The malware used five โzero daysโโthat is, unknown software vulnerabilities that allow an attacker to access a computer, router, or server; never having detected these flaws before, developers have zero days to fix or patch them. Zero days are valuable to both attackers and defenders. They can fetch six-figure prices on the black market, and so even an advanced attack deployed by a nation-state will usually use one, maybe two.
In addition, the computers that controlled the centrifuges were not connected to the internet. Stuxnet had to jump this โair gapโ and be delivered into the system, perhaps via a thumb drive or other portable device. In addition, Stuxnet was configured to work only on a specific system. Although the malware spread widelyโthe total number of infections surpassed 300,000 in more than one hundred countries, including Australia, Brazil, Brunei, China, India, Indonesia, the Netherlands, and even the United Statesโit would activate only when it saw a configuration of a specific line of Siemens programmable logic controllers, and it would destroy centrifuges only when it saw it was on a computer at Natanz, Iranโs primary enrichment facility.
Stuxnet was only one of the sophisticated tools at the United Statesโ and Israelโs disposal. Two other programs, Flame and Duqu, appear to have been part of Operation Olympic Games, designed to gather intelligence on computer networks in Iran and other Middle Eastern countries. Flame, for example, searched a computer for keywords on top-secret PDF files, then made and transmitted a summary of the document, all without being detected.
Stuxnetโs complexity put it out of the reach of individual hackers and pointed to the involvement of a nation-state intending to do physical damage to a target. This parentage is Stuxnetโs second noteworthy characteristic, and it represented a strategic sea change. As Michael V. Hayden, former chief of the Central Intelligence Agency (CIA) put it, โSomebody crossed the Rubicon.โ Before Stuxnet, computer code had served primarily to steal or destroy data on other computers; now it was causing equipment to malfunction. It was creating physical outcomes. Yet, unlike with conventional or even nuclear weapons, the effects and rules of cyber weapons were largely unknown. There was no understanding of the consequences Stuxnet might unleash, though there was fear that the same type of weapons might eventually target the United States. โIf you are in the glass house, you should not be the one initiating throwing rocks at each other,โ Gregory Rattray, now an information security specialist at JPMorgan Chase, said at a 2012 conference. โWe will have rocks come back at us.โ
Stuxnet made it clear that the United States was committed to developing offensive capabilities. At a time when the rest of the defense budget faced severe cuts, Pentagon officials announced increased funding for the development of cyber capabilities, along with drones and special operations. Ashton Carter, then deputy secretary of defense, told a gathering of cybersecurity experts in San Francisco in February 2012, โNo moment in all those [budget] deliberations was it even considered to make cuts in our cyber expenditures . . . ships, planes, ground forces, lots of other things on the cutting room floor; not cyber.โ The number of cyber warriors assigned to U.S. Cyber Command, the command center for the Pentagonโs cyber operations, was quintupled from 900 to 4,900 troops. And in late 2012, the Pentagon unveiled Plan X, an effort to build on programs like Stuxnet and develop the offensive capabilities needed to โdominate the cyber battlespace.โ Regina Dugan, head of the Defense Advanced Research Projects Agency, laid out a roadmap: โIn the coming years we will focus an increasing portion of our cyber research on the investigation of offensive capabilities to address military-specific needs.โ
Iran did not simply sit backโit hit back with its own cyberattacks. Between September 2012 and June 2013, an activist group called Izz ad-Din al-Qassam Cyber Fighters took credit for roughly two hundred distributed denial-of-service (DDoS) attacks on almost fifty financial institutions, including SunTrust, JPMorgan Chase, CitiGroup, Wells Fargo, U.S. Bancorp, Capital One, PNC, and HSBC. Compared to Stuxnet, DDoS attacks are unsophisticated: they are like protestors blocking access to a government office. Stuxnet was analogous to a Tomahawk cruise missile launched from 1,000 miles away blowing that office up. In a DDoS attack, hackers use thousands of computers or servers to flood a website with so much data that it can no longer respond. Security researcher Graham Cluley put it more colorfully: โItโs a bit like 15 fat men trying to get through a revolving door at the same timeโnothing can move.โ
Over time the attacks grew more complex. The amount of data flooding websites grew massively. It cost one bank close to $10 million to get back online. Izz ad-Din al-Qassam claimed it was acting independently and in retaliation for โInnocence of Muslims,โ an anti-Islam video made by a California resident and uploaded on YouTube, but behind the scenes U.S. government officials and outside experts blamed Iran.
In August 2012, the Shamoon malware struck Saudi Aramco, Riyadhโs state oil giant. This was a qualitatively different type of attack, involving the destruction of data. Shamoon corrupted tens of thousands of hard drives and shut down employee email; the company had to replace 30,000 computers in order to rid its networks of the malware. Saudi Aramco supplies about a tenth of the worldโs oil, but the malware only damaged office computers and did not affect systems involved with technical operations. โAll our core operations continued smoothly,โ CEO Khalid Al-Falih told Saudi government and business officials. The company managed to put its networks back online almostย two weeks after the attack. A subsequent attack damaged Rasgas, a joint venture between Qatar Petroleum and ExxonMobil and the second-biggest producer of liquefied natural gas in the world. Again, data was destroyed, but production continued.
As with the attacks on the banks, a proxy was involved. A group calling itself the Cutting Sword of Justice claimed responsibility, but U.S. officials believed Iran was behind the attacks. Not only was there motive, but Iran had a few years earlier announced its intent to develop cyber forces. Hossein Mousavian, a former Iranian diplomat, told an audience at Fordham Law School, โThe U.S., or Israel, or the Europeans, or all of them together, started war against Iran. . . . Iran decided to have . . . to establish a cyberarmy, and today, after four or five years, Iran has one of the most powerful cyberarmies in the world.โ
The Shamoon attack on Saudi Arabia seriously spooked the U.S. government. Secretary of Defense Leon Panetta called it โa significant escalation of the cyber threat.โ In a speech in October 2012 at the Intrepid Sea, Air, and Space Museum, Panetta warned a group of business executives of a potential โcyber Pearl Harbor.โ Computer hackers could gain control of โcritical switches,โ he cautioned, and โderail passenger trains, or even more dangerous, derail trains loaded with lethal chemicals. They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country.โ President Barack Obama echoed this threat in his State of the Union address, stating, โOur enemies are . . . seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems.โ
Ironically, the Shamoon attack showed that Iran was learning from Israel and the United States. In April 2012, an aggressive piece of code, known as Wiper, had attacked the Iranian Oil Ministry and the National Iranian Oil Company and erased hard drives, removing any trace of itself. A year later, General Keith Alexander, director of the National Security Agency (NSA) and commander of U.S. Cyber Command, left Fort Meade for a meeting with his counterpart in the United Kingdomโs Government Communications Headquarters (GCHQ). Talking points, prepared for the meeting with Sir Iain Robert Lobban and leaked by former NSA employee Edward Snowden, claimed Iran had โdemonstrated a clear ability to learn from the capabilities and actions of others.โ In other words, Shamoon had been possible in part because of Wiper.
Even as Iran and the United States were trading blows in cyberspace, China-based hackers were continuing a massive cyber theft campaign against technology firms in the United States, Japan, and Europe. For years, Chinese hackers had raided defense contractors and the Pentagon, stealing secrets from dozens of weapons programs, including the Patriot missile system, the F-35 Joint Strike Fighter, and the U.S. Navyโs new littoral combat ship. They gradually expanded their attention to technology companies, financial institutions, law firms, think tanks, and the media. In July 2012 General Alexander called these and other economic espionage cyberattacks on American companies the โgreatest transfer of wealth in historyโ and estimated that American companies had lost $250 billion in stolen information and another $114 billion in related expenses.
During Year Zero, I probably received emails about twice a month that appeared to come from my boss, Richard Haass, president of the Council on Foreign Relations (CFR). The messages usually contained an attachment and a short message like, โI thought you might be interested in President Obamaโs schedule for his upcoming trip to Asia.โ I deleted them straightaway. Immediately erasing emails from your boss may not sound like the best way to get ahead professionally, but it was the safest thing to do. Glancing at the senderโs email address, I saw that it was something like Hass.Richard@yahoo.com or President CFR@gmail.com. Neither of these is Richardโs email address.
These emails, probably from China-based hackers, are known as spear-phishing attacks. Emails are made to look like they come from someone you know (hackers may study job titles on your companyโs website or your social networks on Facebook, LinkedIn, or Twitter) and craft a subject line designed to be of interest to you. The emails often arrive in the morning, before you have had your first cup of coffee. Attackers may send one just before a long weekend, knowing the recipient will want to get any work out of the way before leaving the office. Opening an attachment or clicking on a link downloads software that allows attackers to gain control of your computer. They then gradually expand their access and move into different computers and networks, sending files back to computers in China or elsewhere. In some instances, the hackers use the computerโs microphone and camera to record entire meetings.
Chinese hackers used this type of attack against The New York Times sometime at the end of 2012 as the paperโs journalists were preparing a story on the massive wealth allegedly accumulated by the family of former prime minister Wen Jiabao. The hackers targeted reportersโ passwords and accounts. Soon after, Bloomberg, which published a similar story on the wealth of the family of Xi Jinping, Chinaโs top leader, admitted that it also had been hacked. In February 2013, Mandiant, a private security company formed by former U.S. Air Force officer Kevin Mandia, published a report naming Unit 61398 of the 3rd Department of the Peopleโs Liberation Army as responsible for the attacks on The New York Times and others. In attributing the digital assault, a private company had acted like a national intelligence agency.
The hacking became a major irritant for Washington and Beijing. Not wearing ties and taking a more relaxed attitude toward protocol, Presidents Obama and Xi met for a two-day โshirt sleeveโ summit in California in June 2013 in the hope of building a personal relationship and stemming the growing distrust that seemed inevitable between the worldโs superpower and a rising China. Despite all of the efforts at diplomatic bonhomie, President Obama told Charlie Rose that they had had โa very blunt conversation about cybersecurityโ and that he had warned President Xi that hacking could โadversely affect the fundamentals of the U.S.-China relationship.โ And so, in the twelve months between June 2012 and June 2013โthe period between the first publicly admitted cyberattack by a nation-state and the summit between Obama and Xiโcyberattacks had gone from a discreet and veiled activity to a public strategy with the capacity to upend what many consider the most important bilateral relationship of the twenty-first century. The hacked world order was in full public view.
Year Zero culminated with the revelations of former NSA contractor Edward Snowden. Two days before Presidents Obama and Xi met in Sunnylands, California, the British newspaper the Guardian published the first report on what would be a massive, years-long leak about the National Security Agency and allied surveillance programs. Despite numerous public assurances from officials that the government did not gather information on U.S. citizens, the leaks would expose the collection of American usersโ cell phone metadataโwhat number is called, what time the call is made, and the duration of the call, but not the content. Through a program called PRISM, the NSA was able to demand access, under Section 702 of the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008, to data of non-U.S. citizens stored at most of the American technology giants, including Google, Apple, Facebook, and Microsoft. This gave the NSA the ability to collect and analyze the emails, texts, chats, phone calls, Facebook posts, tweets, and documents of people worldwide. Through a process the NSA calls upstream collection, it taps directly into the cables and networks passing through the United States. Huge amounts of data traveling across AT&T, Verizon, and other networks are copied, and then the data of non-U.S. citizens are selected for analysis based on certain government criteria. But the process of targeting foreign communications results in the incidental collection of the data of ordinary users, which the NSA can store and analyze later.
NSA reportedly spied on adversaries and friends alike, tracking Somali terrorists and breaking into Chinese networks, but also hacking the European Unionโs offices in New York, Washington, DC, and Brussels, bugging the computer hard drives of the Indian embassies in Washington and New York, and listening to the calls of Brazilian president Dilma Rousseff, German chancellor Angela Merkel, and at least thirty other world leaders.
These leaks unsettled foreign relations and impacted the geopolitics of cyberspace. Tensions between Washington and Moscow grew when Russia granted limited asylum to Snowden after he fled to Sheremetyevo International Airport. The revelations of a widespread American surveillance program vitiated Obamaโs criticism of Chinese economic espionage. As the state-owned Xinhua news agency put it, the leaks โdemonstrate that the United States, which has long been trying to play innocent as a victim of cyber-attacks, has turned out to be the biggest villain in our age.โ Relations with Germany and Brazil, important partners, soured. President Dilma Rousseff canceled her planned summit with Obama and used her speech to the United Nations General Assembly in September 2013 to rebuke the United States, calling the activities a โgrave violation of human rights and of civil liberties.โ
China, Russia, and a host of developing countries have used the U.S. surveillance programs to buttress their argument that the internet should be brought under the supervision of the United Nations.
Typically, the United States has promoted itself as the champion and protector of a borderless, global internet, one that guarantees the right of all people to express themselves freely wherever they are. Not only do the surveillance programs undercut Washingtonโs criticism of authoritarian states, but for Pratap Bhanu Mehta, one of Indiaโs most respected commentators, they imply that Washington feels free to โviolate the privacy rights of citizens of other countries without just cause.โ
In the long run, Snowdenโs revelations may also make the internet notably less American. There is no escaping demographics. More than 650 million Chinese and 350 million Indians use the internet, and hundreds of millions will come online in both countries over the next two decades. But the spying revelations have accelerated the desire of others, including U.S. allies, to reduce their dependence on American technology and internet companies.
This is the first chapter of The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age, a new book by Adam Segal, who is the featured guest on the June 23 episode of the Sinica Podcast.