Threat Assessments Driven by Business Interests - Nick
Lin - Covert state intelligence agencies tied to
the U.S. imperialist war machine as part of the "Five Eyes" global
espionage network recently issued their annual reports and "threat
assessments." The countries which belong to the "Five Eyes" are the
U.S., Canada, the UK, Australia and New Zealand. Private cyber security
firm the Kaspersky Lab, said to be "Russia-based," also recently issued
an assessment. What are called threats by the U.S.
imperialists and their allies are an indication of which countries will
be targeted for interference and aggression, including cyber warfare.
Such calculations are of interest to the anti-war movement and the
movement to defend the rights of all, so they can draw warranted
conclusions and not lose their bearings. It is important not to become
embroiled in the U.S.-led warmongering by getting sucked into the
scenarios created by the intelligence agencies to justify their latest
assessments of what constitutes a foreign or domestic threat.
Strikingly absent
from all of these threat assessments are the threats to
privacy and political rights of the people of
those countries by their own governments.
Since the exposure of wide-ranging illegal surveillance by the National
Security Agency of U.S. citizens by whistleblower Edward Snowden in
2013, attacks on the privacy and political rights of the
people of the U.S. and of the other Five Eyes
countries have not been curtailed. They have
become institutionalized and even broader. One
of the major changes in U.S. legislation since 2013 has been to have
Internet Service Providers (ISPs) divulge metadata concerning their
clients, instituting what is called an obligation to provide a
"back-door" access to metadata. Such metadata can include
personal information, histories, etc. and highly sensitive material.
For their part, ISPs had been campaigning
against illegal intrusions by the state agencies and asking for
protection from state agency intimidation. Part
of the raison
d'être of the Five Eyes is to spy on
each other's people to get
around the laws of their own countries. Since Canada, for
example, cannot legally spy on its own people, the spying is done by
the U.S. and the result is then "shared." Meanwhile, measures are being
taken to change the laws in each country to permit spying and
recriminations in the name of high ideals. The
threat assessments also have in common that they do not address the
well-documented practice of interfering in the political affairs of
other countries by U.S., Israeli, French, British and other
agencies through cyberattacks and other technical
manipulations. There are double standards
too when it comes to "foreign interference." For example, when the U.S.
openly interfered in the 2019 federal election in Canada through major
media gossip stories, an investigation of this as foreign interference
was not considered. For Your
Information Canadian Centre for Cyber
Security's "Key Judgments" The Centre for Cyber
Security's "Key Judgments" are: "- The number of
cyber threat actors is rising, and they are becoming more
sophisticated. The commercial sale of cyber tools coupled with a global
pool of talent has resulted in more threat actors and more
sophisticated threat activity. Illegal online markets for cyber tools
and services have also allowed cybercriminals to conduct more complex
and sophisticated campaigns. "- Cybercrime
continues to be the cyber threat that is most likely to affect
Canadians and Canadian organizations. We assess that, almost certainly,
over the next two years, Canadians and Canadian organizations will
continue to face online fraud and attempts to steal personal,
financial, and corporate information. "- We judge
that ransomware directed against Canada will almost certainly continue
to target large enterprises and critical infrastructure providers.
These entities cannot tolerate sustained disruptions and are willing to
pay up to millions of dollars to quickly restore their operations. Many
Canadian victims will likely continue to give in to ransom demands due
to the severe costs of losing business and rebuilding their networks
and the potentially destructive consequences of refusing payment.
"- While cybercrime is the most likely threat, the
state-sponsored programs of China, Russia, Iran, and North Korea pose
the greatest strategic threats to Canada. State-sponsored cyber
activity is generally the most sophisticated threat to Canadians and
Canadian organizations. "- State-sponsored actors
are very likely attempting to develop cyber capabilities to disrupt
Canadian critical infrastructure, such as the supply of electricity, to
further their goals. We judge that it is very unlikely, however, that
cyber threat actors will intentionally seek to disrupt Canadian
critical infrastructure and cause major damage or loss of life in the
absence of international hostilities. Nevertheless, cyber threat actors
may target critical Canadian organizations to collect information,
pre-position for future activities, or as a form of intimidation.
"- State-sponsored actors will almost certainly continue to
conduct commercial espionage against Canadian businesses, academia, and
governments to steal Canadian intellectual property and proprietary
information. We assess that these threat actors will almost certainly
continue attempting to steal intellectual property related to
combatting COVID-19 to support their own domestic public health
responses or to profit from its illegal reproduction by their own
firms. The threat of cyber espionage is almost certainly higher for
Canadian organizations that operate abroad or work directly with
foreign state-owned enterprises. "- Online foreign
influence campaigns are almost certainly ongoing and not limited to key
political events like elections. Online foreign influence activities
are a new normal, and adversaries seek to influence domestic events as
well as impact international discourse related to current events. We
assess that, relative to some other countries, Canadians are
lower-priority targets for online foreign influence activity. However,
Canada's media ecosystem is closely intertwined with that of the United
States and other allies, which means that when their populations are
targeted, Canadians become exposed to online influence as a type of
collateral damage." U.S. Homeland Threat Assessment
The U.S. Department of Homeland Security (DHS) issued its
26-page Homeland Threat Assessment in October. It identifies seven
general categories of threats in the assessment's table of
contents. The following quotes from the report give an idea of what
the categories refer to.
- Cyber: "We are concerned
with the intents, capabilities, and actions of nation-states such as
China, Russia, Iran, and North Korea. Nation-state targeting of our
assets seeks to disrupt the infrastructure that keeps the American
economy moving forward and poses a threat to national security. On top
of the threats to critical infrastructure, cybercriminals also target
our networks to steal information, hold organizations hostage, and harm
American companies for their own gain." - Foreign
Influence Activity: "Threats to our election have been
another rapidly evolving issue. Nation-states like China, Russia, and
Iran will try to use cyber capabilities or foreign influence to
compromise or disrupt infrastructure related to the 2020 U.S.
Presidential election, aggravate social and racial tensions, undermine
trust in U.S. authorities, and criticize our elected officials. Perhaps
most alarming is that our adversaries are seeking to sway the
preferences and perceptions of U.S. voters using influence operations."
- Economic Security: "DHS is specifically
concerned with the direct and indirect threat posed to the Homeland by
the People's Republic of China (PRC). The Chinese Communist Party
(CCP)-led PRC is challenging America's place as the world's global and
economic leader. Threats emanating from China include damaging the U.S.
economy through intellectual property theft, production and
distribution of counterfeit goods, and unfair trade practices. DHS has
a mandate to mitigate these threats [...] with a clear-eyed view that
China is a long-term strategic competitor to the U.S." -
Terrorism: The
DHS presents its concerns about terrorism as two-fold, one aspect being
domestic violent extremism. It says its programs are
"threat agnostic," meaning DHS will decide across a broad
spectrum of "left," "right" and religious views, who and what is a
threat. They claim to be "particularly
concerned about white supremacist violent extremists who have been
exceptionally lethal in their abhorrent, targeted attacks in recent
years." The other aspect
is to target the people's resistance movement, referring to it as the
"exploitation of lawful and protected speech and protests" and
"anti-government, anti-authority and anarchist violent extremism."
- Transnational Criminal Organization (TCOs):
The DHS says that these groups "continue to profit at the expense of
Americans. Mexican cartels and other TCOs will continue to smuggle hard
narcotics like fentanyl, heroin, and methamphetamine into our
communities, contributing to an alarming level of overdoses in the
United States. " - Illegal Immigration:
The DHS claims that "illegal and mass migration to the United States
[...] during a pandemic [...] poses a more specific threat to the
migrants, the communities they transit, to U.S. border communities, and
to our officers and agents who encounter migrants when they enter the
United States." - Natural Disasters:
The DHS cites here the threat posed by events like storms, wildfires as
well as the COVID-19 pandemic. Kaspersky Lab's
Advanced Threat Predictions for 2021 Kaspersky
Lab is a global cyber security company founded in 1997 with
headquarters in Russia. It issued its Advanced Threat Predictions for
2021 on November 16. A Kaspersky press release highlights the following
areas of concern from those it deems "advanced persistent threats"
(APTs): "- APT threat actors will buy initial
network access from cybercriminals. One of the key, and potentially
most dangerous, trends that Kaspersky researchers anticipate is the
change in threat actors' approach to the execution of attacks. Last
year, targeted ransomware attacks reached a new level through the use
of generic malware as a means to get an initial foothold in targeted
networks. Connections between these attacks and well-established
underground networks such as Genesis, which typically trade in stolen
credentials, were observed. Kaspersky researchers believe that APT
actors will start using the same method to compromise their targets.
[...] "- More countries using legal indictments as
part of their cyber strategy. Kaspersky's previous predictions of
'naming and shaming' of APT attacks carried out by hostile parties has
come true, and more organizations will follow suit. Exposing toolsets
of APT groups carried out at the governmental level will drive more
states to do the same, thereby hurting actors' activities and
developments by burning the existing toolsets of their opponents in an
effort to retaliate. "- More Silicon Valley
companies will take action against zero-day brokers. Following
scandalous cases in which zero-day vulnerabilities [i.e., security
flaws unknown to the software vendor on release date] in popular apps
were exploited for espionage on a variety of different targets, more
Silicon Valley corporations are likely to take a stance against
zero-day brokers in an effort to protect their customers and reputation.
"- Increased targeting of network appliances. With remote
work, organizational security has become a priority, and more interest
in exploiting network appliances such as VPN [virtual private network]
gateways will emerge. Harvesting credentials to access corporate VPNs
via 'vishing' remote workers may also appear. "-
Demanding money with menace. Ransomware gangs have become more targeted
in their attacks and have more often threatened to release stolen data.
Following the success of these strategies, the groups will use the
money they have extorted to invest significant funds into new advanced
toolsets with budgets comparable to that of some state-sponsored APT
groups. These changes in strategy may also lead to the consolidation of
the ransomware ecosystem. "- More disruption will
result from direct, orchestrated attacks designed to affect critical
infrastructure or cause collateral damage, as our lives have become
even more dependent on technology with a much wider attack surface than
ever before. "- The emergence of 5G
vulnerabilities. As adoption of this technology increases, and more
devices become dependent on the connectivity it provides, attackers
will have a greater incentive to look for vulnerabilities that they can
exploit. "- Attackers will continue to exploit the
COVID-19 pandemic. While it did not prompt changes in tactics,
techniques and procedures of the threat actors, the virus has become a
persistent topic of interest. As the pandemic will continue into 2021,
threat actors will not stop exploiting this topic to gain a foothold in
target systems."
This article was published in
Volume 50 Number 49 - December 19, 2020
Article Link:
Threat Assessments Driven by Business Interests - Nick
Lin
Website: www.cpcml.ca
Email: editor@cpcml.ca
|