Cyber Guerilla
()
About this ebook
Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape.
Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.
- Discusses the conceptual and ideological foundation of hackers and hacker groups
- Provides concrete footholds regarding hacker group strategy
- Discusses how cyber guerillas are changing the face of cyber warfare and cyber security through asymmetrical, flexible and stealthy means and methods
- Explains the tactics, techniques, and procedures these hacker groups use in their operations
- Describes how cyber guerrillas and hackers use the media and influence the public
- Serves as a must-have guide for anyone who wants to understand—or is responsible for defending against—cyber warfare attacks
Jelle Van Haaster
Jelle Van Haaster, LL.M. University Utrecht, BA War Studies, Faculty of Military Sciences, is an award-winning writer, software programmer/developer, and speaker. He is an officer in the Royal Netherlands Army and has a diverse background in legal, military, and technical defense matters. Jelle recently developed an award-winning software app for effectively utilizing social media during military operations, and he is the author of multiple scholarly IT-Law, IT, and military-operational publications. He is currently completing his multidisciplinary Ph.D. thesis on the future utility of military Cyber Operations during conflicts at the Netherlands Defense Academy and University of Amsterdam.
Related to Cyber Guerilla
Related ebooks
Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare Rating: 0 out of 5 stars0 ratingsCybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats Rating: 3 out of 5 stars3/5The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice Rating: 4 out of 5 stars4/5The Decision to Attack: Military and Intelligence Cyber Decision-Making Rating: 3 out of 5 stars3/5Information Warfare: The Lost Tradecraft Rating: 0 out of 5 stars0 ratingsThe role of terrorism in twenty-first-century warfare Rating: 0 out of 5 stars0 ratingsIntelligent Systems for Security Informatics Rating: 0 out of 5 stars0 ratingsIntroduction to Cyber-Warfare: A Multidisciplinary Approach Rating: 5 out of 5 stars5/5Dark Logic: Transnational Criminal Tactics and Global Security Rating: 4 out of 5 stars4/5Deception in the Digital Age: Exploiting and Defending Human Targets through Computer-Mediated Communications Rating: 0 out of 5 stars0 ratingsCyber Warfare: Its Implications on National Security Rating: 0 out of 5 stars0 ratingsNew Advances in Intelligence and Security Informatics Rating: 0 out of 5 stars0 ratingsThreat Intelligence A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsStrategic Intelligence for American National Security: Updated Edition Rating: 0 out of 5 stars0 ratingsCyber Threat Intelligence A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsAnatomy of a cyberattack Rating: 0 out of 5 stars0 ratingsThe Hacker's Zibaldone Rating: 0 out of 5 stars0 ratingsDefensive Cyber Operations Technical Advisor A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsKali Linux, Ethical Hacking And Pen Testing For Beginners Rating: 0 out of 5 stars0 ratingsCombining Concepts: Operational Shock In Insurgencies Rating: 0 out of 5 stars0 ratingsIntroduction to Machine Learning with Python Rating: 0 out of 5 stars0 ratingsAn Introduction to Cyber Modeling and Simulation Rating: 0 out of 5 stars0 ratingsWhy Terrorist Groups Form International Alliances Rating: 0 out of 5 stars0 ratingsThe History of the Central Intelligence Agency (C.I.A.) Rating: 0 out of 5 stars0 ratingsTales of Cybercrime and Other Cyber Tales Rating: 0 out of 5 stars0 ratingsAmerica's Strategic Blunders: Intelligence Analysis and National Security Policy, 1936–1991 Rating: 0 out of 5 stars0 ratingsCyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers Rating: 0 out of 5 stars0 ratingsDeploying Secure Containers for Training and Development Rating: 0 out of 5 stars0 ratingshacktivist: Hacker School Attacked Rating: 0 out of 5 stars0 ratingsCyber Threats and Nuclear Weapons Rating: 0 out of 5 stars0 ratings
Security For You
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5
Reviews for Cyber Guerilla
0 ratings0 reviews
Book preview
Cyber Guerilla - Jelle Van Haaster
Cyber Guerilla
Jelle van Haaster
Rickey Gevers
Martijn Sprengers
Table of Contents
Cover
Title page
Copyright
About the Authors
Foreword
Preface
Introduction
Chapter 1: General principles of cyber guerilla
Abstract
Introduction
The essence of cyber guerilla
Cyber guerilla strategy
Cyber guerilla tactics
Cyber warfare on favorable terrain (When to wage guerilla)
Cyber warfare on unfavorable terrain
Conclusions
Chapter 2: The hacker group
Abstract
Introduction
The hacker as social reformer
The hacker as combatant
The hacker group
Conclusions
Chapter 3: Organization of #operations
Abstract
Introduction
Intelligence
Operations
Considerations during operations
Tools and techniques
Effects
Media strategy
Postoperation posturing
Chapter 4: Appendices
Abstract
Introduction
Illustrative hacker groups (Rickey Gevers)
Future of hacker groups
Index
Copyright
Syngress is an imprint of Elsevier
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
Copyright © 2016 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress
ISBN: 978-0-12-805197-9
For information on all Syngress publications visit our website at https://www.elsevier.com/
Publisher: Todd Green
Acquisition Editor: Chris Katsaropoulos
Editorial Project Manager: Anna Valutkevich
Project Manager: Priya Kumaraguruparan
Designer: Mark Rogers
Typeset by Thomson Digital
About the Authors
Jelle van Haaster, LL.M. University Utrecht, BA War Studies, Faculty of Military Sciences, is an award-winning writer, software programmer/developer, and speaker. He is an officer in the Royal Netherlands Army and has a diverse background in legal, military, and technical defense matters. Jelle recently developed an award-winning software app for effectively utilizing social media during military operations, and he is the author of multiple scholarly IT-Law, IT, and military-operational publications. He is currently completing his multidisciplinary PhD thesis on the future utility of military Cyber Operations during conflicts at the Netherlands Defense Academy and University of Amsterdam.
Rickey Gevers is currently Chief Intelligence Officer at the security firm Redsocks. He has been responsible for numerous revelations regarding high-profile security incidents both national and international. He was, amongst others, the first person to discover key logger used by Dutch law enforcement agencies and uncovered several criminal gangs and their operations. As an expert in technical matters he has been frequently consulted or hired as lead investigator, including in some of the largest security incidents the world has ever seen. Rickey appears frequently in Dutch media and has hosted his own TV show called Hackers.
Martijn Sprengers is an IT security advisor and professional penetration tester who is specialised in conducting covert cyber operations, also called red teaming
. He performs digital threat actor simulation by using real world tactics and techniques to infiltrate complex IT environments for his clients. With his vast knowledge of offensive security he helps international organisations to strengthen their preventive security measures, increase their detection capabilities and prepare themselves for real attacks. He holds an MSc in computer security, performed research on password encryption techniques and has written multiple articles in the field of IT security, cybercrime, and cryptography.
Foreword
In the days of yore, an occupying force only had to worry about other occupying forces, thus focusing their efforts on defensive posture. As internal conflicts loomed, and guerilla forces began to strike in unilateral and seemingly decentralized movement, occupiers realized their greatest weakness––that their enemy was within.
During Guerre d’Algérie (1954–62), French forces found themselves stumped by the effectiveness of the initial wave of guerilla style warfare across Algeria. Although outnumbering their counterparts, Front de Libération Nationale (FLN), The French found themselves in a conundrum: give up its occupied territory or eliminate the threat. They chose the latter and won the battle, but lost the war by means of popular opinion. Whether by design or coincidence, French forces were seen as aggressive and abusive in their response, and FLN reached the goal they had set from the beginning: Libération.
With the conceptualization and implementation of the Internet came a new era of warfare. Being able to communicate with people around the world at will changes the defense scope and methodology. While the French forces had to deal with and understand an enemy which was confined within a border, security forces now have to deal with and understand an enemy that claims none. The Arab Spring started on the streets of Sidi Bouzid, Tunisia, but spread like wildfire across social media. The power of the people, and its information propagation, toppled governments and hierarchies.
Attribution becomes nearly impossible as attackers adapt with every failed mission, evolving their tactics and combining their experiences as groups meet and merge. It only takes a team of 4–10 to cripple an infrastructure if members are designated roles, where each member can independently focus on their strong points and research is combined. From information gathering and reconnaissance, to exploit development and social engineering, they continue to expand on attack methodologies while defensive forces struggle to keep up.
Alas, the era of the cyber guerillas.
Hold out baits to entice the enemy. Feign disorder, and crush him.
—Sun Tzu
Hector Monsegur (Sabu
)
Preface
Conflict used to be about borders. A long time ago, we would defend ourselves by living in cities surrounded by walls. Those walls kept enemies away. Over time, the walls around cities become higher, longer, and wider. The longer and wider these walls, the more invisible they became, marking areas of wealth, prosperity, power, and belief systems. Eventually, those walls became borders. And, for hundreds of years, conflict was about borders. Conflicts were about conquering land or converting people from their belief system to another belief system.
Conflict and war have always been fueled by technology. Technology like gunpowder, steel blades, and fighter jets. The staggering possibilities of technology always seem to shine at their strongest during periods of war. War has been a real driver of technology. And technology has driven war.
One of the side effects of the Cold War was that the Internet was created. The US military created it as a way to uphold a chain of command during nuclear war. The Internet was created as a military infrastructure. By developing the Internet, mankind opened up a whole new way of waging war on one another. And, the Internet has no geography. It has no borders. By creating the Internet, mankind opened up a Pandora’s box where tangible borders and recognizable enemies ceased to exist.
In addition, war used to be symmetric: armies would fight other armies. Technology of war has moved on. We no longer know, nor can clearly describe, who the enemy is, what they want to achieve, or what their motives are. We go into battle using technologies we do not fully understand, against enemies that remain in the shadows, and into wars that we will never know whether or not they are over. Who is the enemy? Hackers? Anonymous? The Russian Mafia? North Korea? Islamic State?
Cyber guerilla distills the conviction that smaller forces can rival larger forces in influence in our networked society. And, cyber guerilla is a perfect example of what asymmetric conflict looks like today.
Mikko Hypponen
Chief Research Officer, F-Secure Helsinki, Finland
Jan. 8, 2016
Introduction
Jelle van Haaster
Have you ever realized that the rise of information technology has enabled the individual more than any other entity? Most would probably answer no
or I do not know,
which is only logical considering the current impetus emphasizing the dangers of networking and information technologies. States have seized the information technology domain as a new way of monitoring and controlling citizens––all for the sake of peace and security.
A domain aimed at the free, unhindered flow of data is quickly becoming the proving ground for States. The Internet has been dubbed a new warfighting domain, a battlespace that is proving to be the host of most 21st century conflict. Conflicts that will revolve around influencing others through information, about creating, collecting, controlling, denying, disrupting, or destroying that information.
A cyber prefix flood has securitized every aspect of information technology, white papers have earmarked cyber systems, cyber citizens, cyber threats, and many more as part of the cyber environment. William Gibson’s pristine cyberspace––coined in his 1984 book Neuromancer––has become militarized, spawning a new breed of military action dichotomized as cyber war, cyber attacks, and cyber operations. As the whole domain is claimed by States, one would indeed almost forget that it is the individual who is most powerful.
But, what role can a mere individual play on the stage set by States? Most publications focus on means and methods available to States, how States should organize their cyber forces, govern their cyber infrastructure, conduct cyber operations, etc. As States are the focal point of those publications, one could step into the pitfall of overlooking the vast amount of options open to an individual. An individual on its own or in unison with like-minded individuals can influence equally or even more effectively than a State.
Feeding the construct that the individual is the least powerful actor in cyberspace is the practice of information security professionals.
They characterize actors using arbitrary parameters as advanced persistent threat, organized crime, insider threat, hacktivist, and script kiddies/noobs. These types of actors have varying skill sets, training, and experience, and potential impact. By doing so, information security professionals disqualify the place of a noninformation security individual or less knowledgeable practitioners on a stage set by States. They tend to equate potential influence to information security training and knowledge. This is, however, nonsensical––the capacities at an individual’s disposal are unparalleled compared to the means at the disposal of information security professionals a decade ago. The noninformation security individuals have a vast array of capacities at their disposal; these are just a click away. Individuals only have to tap into these vast resources to claim their rightful place on the stage.
There are many technical manuals and how-tos showing individuals how to use specific cyber and information technology capabilities. This is in sharp contrast with the few publications aimed at illustrating how to generally and effectively utilize cyberspace with these capabilities; in other words: Focus on the bigger picture. Tools and capacities alone are not enough to become influential in cyberspace––first, organization, strategy, tactics, and shared convictions are required. This book is one of the rare publications also aimed at these elements. It will, among others, touch upon tools, tactics, and procedures but it will also look at the bigger picture. This book is about showing that the individual can match the power of States, (large) corporations, and any other actors. Its purpose is to provide a counterweight to the current push toward emphasizing the power of States and large actors over individuals. At the same time, this book, Cyber Guerilla, will function as a warning to these actors believing that they reign supreme in cyberspace and on the Internet.
This book will provide a comprehensive description of cyber guerilla; it will cover this subject doctrinally, organizationally, and technically. Chapter 1 will describe the theoretical and ideological foundations of cyber guerilla. As such, it will serve as a doctrinal prelude to Chapters 2 and 3. Chapter 2 will focus on the cornerstone of cyber guerilla: the hacker group and its members. As cyber guerilla requires a versatile, intelligent, and very specific type of individual to fight on the digital forefront, this chapter will discuss the organizational aspects of the hacker group but also other aspects such as mind- and skill-set. After having described the conceptual and organizational foundations, Chapter 3 will focus on the tactics, tools, and procedures with which cyber guerilla is fought. Lastly, this book will look at illustrative State and non-State hacker groups and draw lessons from their activities in Chapter 4. The last part of Chapter 4 will consider the consequences of future developments on cyber guerilla, hacker groups and their tactics, tools, and procedures.
Chapter 1
General principles of cyber guerilla
J. van Haaster
Abstract
This chapter covers the conceptual foundations of cyber guerilla. The essence of cyber guerilla is defined as an amorphous concept epitomizing the violent or nonviolent struggle against a larger State or non-State actor. Hacker groups play a prominent role in combating these types of actors. To be able to take on a larger actor, the hacker group requires (end-)goals and a strategy for achieving these goals. For an adequate strategy, it is essential for the hacker group to be aware of the societal context, the state of the hacker group and the opponent. Having created and stated (end-)goals and a strategy, the hacker group can engage in conducting activities or operations. Cyber guerilla tactics are characterized by the following principles: asymmetry, mobility, and stealth.
Keywords
cyber guerilla
essence of cyber guerilla
tactics
strategy
favorable terrain
unfavorable terrain
Chapter outline
Introduction
The essence of cyber guerilla
Cyber guerilla strategy
Cyber guerilla tactics
Cyber warfare on favorable terrain (When to wage guerilla)
Cyber warfare on unfavorable terrain
Conclusions
Introduction
This chapter will describe the theoretical and ideological foundations of cyber guerilla. As such, it will serve as a doctrinal prelude to the organizational Chapter 2 and the technical Chapter 3. Part 1 of this chapter will describe the essence of cyber guerilla and how it differs from conventional guerilla. After describing the essence of cyber guerilla, Part 2 will show concrete footholds for formulating a clear (end-)goal and strategy for the hacker group. When the hacker group has clear goals and a coherent strategy, it can start conducting activities to achieve the goals. Although cyber guerilla shares similarities with conventional guerilla on a conceptual level, the tactics differ considerably. Part 3 will highlight the fundamental characteristics of cyber guerilla tactics: asymmetry, mobility, and stealth. As with any strategy, operation, or tactic, it should be tailored to the situation at hand. As Che Guevara made clear, a situation can favor the guerilla or the opponent. This is the same during cyber guerilla; there are favorable and unfavorable circumstances. Part 4 will describe circumstances favoring cyber guerillas and Part 5 will expand on unfavorable circumstances.
The essence of cyber guerilla
What is cyber guerilla but another phrase feeding the cyber prefix flood? The simple answer: cyber guerilla is but an idea. Cyber guerilla is a conviction that smaller forces can rival larger forces in our networked society. Whereas Guerilla Warfare is a specific way