You are on page 1of 11

EMERGING THREATS

TO
NATIONAL SECURITY
JUNE 2018 SPECIAL REPORT
Spies Are Going After US Supply
Chains, Intel Agencies Say
P
As cyber defenses close resident Trump astounded many in as a broader set of U.S. targets including critical
the easier holes, foreign Washington on Sunday by vowing to rescue infrastructure and supply chain, often without
agents are looking to ZTE, the Chinese manufacturer whose attribution.”
penetrate makers of mobile phones are viewed as a security threat Evanina declined to slam Trump’s decision
parts and software. by the U.S. intelligence community. America’s on ZTE, but said, “I will say that the intelligence
BY PATRICK TUCKER own spies have been warning that China and community is on the record about the threat posed
other potential adversaries might seek to weaken by Chinese telecom.” Asked whether he would use
U.S.security through the electronic goods and a ZTE phone, Evanina answered, “I would not.”
services it buys. The government’s efforts to better manage
“The most critical CI threats cut across these security risks to the government and military
threat actors: influence operations, critical supply chain go back a decade. They include a
infrastructure, supply chain, and traditional 2015 best-practices report from the National
as well as economic espionage. Regional actors Institute of Standards and Technology, and a
such as Iran and North Korea, and nonstate requirement in the 2018 defense authorization
actors such as terrorist groups, transnational act that the Pentagon develop a better process for
criminal organizations, and hackers/hacktivists supply-chain security.
are growing in intent and capability,” But the risk is growing and there’s no simple
William Evanina, who leads the National solution, according to Joyce Corell, the assistant
Counterintelligence Security Center, told the director for supply chain at the National
Senate Intelligence Committee on Tuesday. “For Counterintelligence and Security Center, or NCSC.
example, a growing set of threat actors are now “The software supply chain is clearly being
capable of using cyber operations to remotely used as a threat vector,” Corell said.
access traditional intelligence targets, as well She cited reports from cybersecurity company

COVER: spainter_vfx via istock.com

Emerging Threats to National Security | Page 2


buggy pieces of hardware or software to the IT
department. Because supply chain management
touches acquisition and other aspects of
management and business, organizations need a
team of people across disciplines to tackle the risk,
she said.
“We’re seeing an evolution in what I call a
need for integrated risk reduction, where you
bring together all the lines of business that need
NG HAN GUAN via AP Crowdstrike, whose 2018 Threat Report identified to be at the table. You can no longer push your
out two software-based supply chain attacks with risk decision down to your [chief security officer]
Chinese origins: Netsarang and CCleaner. or just leave it in the hands of the [chief technical
“Both of these back-door attacks on legitimate officer]. You need to know what your enterprise
applications point to China-nexus threat actors, risk is. And you need to address all types of risk
and used the technique of compiling malware from an integrated risk reduction perspective,”
directly into the compromised software,” the she said. That might include experts in trade law
company notes. “Similarities between these federal acquisition and government authorities.
attacks, such as command-and-control tactics and “Sometimes you need an expert in every one
code overlaps, suggest they are connected to the of those to help you assemble a risk-strategy
same threat actor.” approach.”
One reason such attacks will grow more Most important, managing the future of supply
common: the government’s renewed emphasis chain risk is not something you do once and then
on more obvious forms of cybersecurity, such as you are you done. Like a good health regimine,
protection against remote penetration attacks it requires lots of consistent attention and
and phishing attacks, which Corell referred to as maintenance.
“perimeter” attacks. Now that the low-hanging
fruit is disappearing, adversaries are focusing
their attacks on the supply chain. “How do you
get around a hardened perimeter? You subvert a
supply chain,” she said.
Corell said reducing supply chain risk is
more difficult and complicated than just sending

Emerging Threats to National Security | Page 3


A Criminal Gang Used a Drone Swarm
To Obstruct an FBI Hostage Raid
D
And that’s just one ENVER, Colorado — Last winter, on the the YouTube site and pull down the video,” he said.
of the ways bad guys outskirts of a large U.S.city, an FBI hostage Mazel said counter surveillance of law
are putting drones to rescue team set up an elevated observation enforcement agents is the fastest-growing way that
use, law enforcement post to assess an unfolding situation. Soon they organized criminals are using drones.
officials say. heard the buzz of small drones — and then the Some criminal organizations have begun to use
BY PATRICK TUCKER tiny aircraft were all around them, swooping past drones as part of witness intimidation schemes:
in a series of “high-speed low passes at the agents they continuously surveil police departments and
in the observation post to flush them,” the head precincts in order to see “who is going in and out
of the agency’s operational technology law unit of the facility and who might be co-operating with
told attendees of the AUVSIXponential conference police,” he said.
here. Result: “We were then blind,” said Joe Mazel, Drones are also playing a greater role
meaning the group lost situational awareness in robberies and the like. Beyond the well-
of the target. “It definitely presented some documented incidence of house break-ins,
challenges.” criminal crews are using them to observe bigger
The incident remains “law enforcement- target facilities, spot security gaps, and determine
sensitive,” Mazel said Wednesday, declining to patterns of life: where the security guards go and
say just where or when it took place. But it shows when.
how criminal groups are using small drones for In Australia, criminal groups have begun
increasingly elaborate crimes. have used drones as part of elaborate smuggling
Mazel said the suspects had backpacked the schemes, Mazel said. The gangs will monitor port
drones to the area in anticipation of the FBI’s authority workers. If the workers get close to a
arrival. Not only did they buzz the hostage shipping container that houses illegal substances
rescue team, they also kept a continuous eye on or contraband, the gang will call in a fire, theft, or
the agents, feeding video to the group’s other some other false alarm to draw off security forces.
members via YouTube. “They had people fly their Andrew Scharnweber, associate chief of U.S.
own drones up and put the footage to YouTube so Customs and Border Protection, described how
that the guys who had cellular access could go to criminal networks were using drones to watch

Emerging Threats to National Security | Page 4


Border Patrol officers, technology directorate.
identify their gaps in The most recent version of the FAA
coverage, and exploit reauthorization bill contains two amendments
them. that could help the situation, according to
“In the Border Angela Stubblefield, the FAA’s deputy associate
Patrol, we have administrator in the office of security and
struggled with hazardous materials safety. One would make it
scouts, human illegal to “weaponize” consumer drones.
scouts that come The other — and arguably more important
across the border. — amendment would require drones that fly
Naypong via iStock
They’re stationed on various mountaintops near beyond their operators’ line of sight to broadcast
the border and they would scout ... to spot law an identity allowing law enforcement to track and
enforcement and radio down to their counterparts connect them to a real person.
to go around us. That activity has effectively been “Remote identification is a huge piece” of
replaced by drones,” said Scharnweber, who cutting down on drone crime, Stubblefield said.
added that cartels are able to move small amounts “Both from a safety perspective ... enabling both
of high-value narcotics across the border via air traffic control and other UAS [unmanned areal
drones with “little or no fear of arrest.” systems] to know where another is and enabling
Nefarious use of drones is likely to get beyond line-of-sight operations. It also has an
worse before it gets better, according to several extensive security benefit to it, which is to enable
government officials who spoke on the panel. threat discrimination. Remote ID connected to
There is no easy or quick technological solution. registration would allow you to have information
While the U.S.military has effectively deployed about each UAS, who owns it, operates it, and
drone-jamming equipment to the front lines in thus have some idea what its intent is,” said
Syria and Iraq, most of these solutions are either Stubblefield.
unsuitable or have not been tested for use in But even if both amendments pass as part of
American cities where they may interfere with cell the re-authorization, it will be some time before
phone signals and possibly the avionics of other they take effect, so it will be the Wild West in
aircraft, said Ahn Duong, the program executive America’s skies a while longer.
officer at DHS’s homeland security, science and

Emerging Threats to National Security | Page 5


The Pentagon Is Making a Ray
Gun to Stop Truck Attacks
T
A device that resembles he van driver who killed 10 Toronto an invisible hand, the microwaves hold the car in
an old phonograph may pedestrians on Monday showed that a place. “Anything that has electronics on it, these
soon be used to jam and terror technique that ISIS pioneered in Iraq high-powered microwaves will affect,” David Law,
shut down vehicles like and Syria in 2015 remains terrifyingly effective who leads JNLWD’s technology division, said in
the one that killed 10 against unsuspecting urban populations. But the March. “As long as the [radio] is on, it holds the
people in Toronto U.S. military is working on a new weapon to stop vehicle stopped.”
BY PATRICK TUCKER vehicle-born terrorist threats, one that could help Law’s crew has dubbed the device the Radio
police departments as well. Frequency Vehicle Stopper. They’re working on
The Defense Department’s Joint Non-Lethal two versions. A small one, vaguely resembling an
Weapons Program, or JNLWD, is pushing ahead old-time phonograph, can fit in the bed of a truck.
with a new direct energy weapon that uses high- With a range of 50 meters, it is intended for hot
powered microwaves to stop cars in their tracks pursuits. To deploy it, the driver would pull out in
without damaging the vehicle, its driver, or front of the attacker and turn it on.
anyone else. For more random truck attacks, like the one in
The jammer works by targeting the car’s Toronto, the directorate is working on a stationary
engine control unit causing it to reboot over and version about three times the size. Augmented
over, by an amplification
stalling device and a larger
the dish, this one would
engine. have a range of a “few
Like hundred” meters,

A model of the short-range radio frequency stopper


under development to stop vehicle attacks, developed by
JNLWD. Photo taken March, 2018. / Patrick Tucker

Emerging Threats to National Security | Page 6


“The concept of the radio-frequency stopper reflects a
breakthrough in shrinking power generators as in ray
gun tech”

Law said. If you could figure out the most likely before. The concept of the radio-frequency
locations for a vehicle-borne terrorist attack, you stopper reflects a breakthrough in shrinking
could pre-position the device. A video of a live power generators as in ray gun tech. Direct-energy
demonstration of the technology is below. weapons use a lot of power. Electricity to run the
stopper comes from a gasoline-powered turbine
The military is developing the weapon for from Indianapolis-based Candent Technologies
“force protection” — as in protecting soldiers and that generates 300 kilowatts of power. Says Law.
bases. But it has applications for police as well. At 400 pounds, it’s about the size of a large
Placed strategically around cities, it could prevent copy machine. But that’s a fraction of the size
attacks like the ones in Europe, Canada, the United of generators that the military would use for
States, and elsewhere. There are, however, some similarly power-hungry tasks, like massive Mobile
tricky legal issues involved in using electronic and Electric Power 809A, which starts at 6,200 pounds
radio jamming devices in the United States. The directorate will take possession of the
The directorate hopes to have a working generator in September.
prototype by FY 2019.
There’s a reason no one has thought of this

Emerging Threats to National Security | Page 7


To Learn How to Protect America
From Digital Threats, Look to Europe
T
European nations he revelation that Cambridge Analytica, a along with the EU and even NATO— are providing
are charting the way, data firm hired by the Trump campaign, a variety of smart policy responses that America
adopting whole-of- exploited Facebook data from 50 million should emulate.
society methods Americans should be a wake-up call. Our Beginning with 2007 attacks on Estonia’s
for dealing with this government is failing to protect us online. Foreign internet, Europe has been a digital-aggression
new challenge. intelligence agencies need only check social petri dish: cyber-attacks, digital propaganda, even
BY MAX BERGMANN media user-agreement boxes to harvest our data election hacks. Employed effectively, these actions
& PATRICK BARRY and run influence campaigns. Meanwhile, as disrupt or discredit news sources, strain national
everything from hospitals to nuclear power plants dialogue, and even crush democratic legitimacy.
to Wall Street are connected online, America is In response, Europe has wisely stopped
increasingly vulnerable. Yet compared with our treating cyberspace like its own special domain
allies, there is little urgency to tackle the problem. reserved for tech geeks and certain policy makers.
This is a surprising role reversal. European Just as Russia has integrated various digital
weakness in the face of national security threats tools – be they for espionage, cyber attacks, or
has been a bipartisan headache since the end of propaganda – into larger, aggressive political
World War II. Yet, when it comes to the newest strategies, more countries must have their own
digital threats to the West, like those emanating integrated approaches. This was reflected in
from Russia, Europe is charting the way, adopting January’s launch of the joine EU-NATO European
whole-of-society methods for dealing with this Center of Excellence for Hybrid Warfare, which
new challenge. seeks to enlist diplomats, law enforcement,
While there is no single “European” approach intelligence services, even technical experts to
toward Russia, various European countries — tackle the threat.

Emerging Threats to National Security | Page 8


“European willingness to write rules reducing vulnerability
or stamping out foreign actors’ malign acts signals a resolve
that so far is lacking in the States.”
Europe is also active in another respect: “We have to prepare the public.”
regulation. Germany has implemented a hate- Little such urgency is seen in the United States,
speech law requiring swift action and large where a 2016 study from Stanford showed that
penalties for spreading already-illegal language. students have a “dismaying” ability to tell fake
France has promised legislation targeting news from real, and where tens of millions of
fake news. And at the EUlevel, the European Americans may have unwittingly used platforms
Commission is preparing its General Data like Twitter or Facebook to view or share Russian
Protection Regulation, which will use the threat propaganda during the 2016 election season.
of stiff fines to engender better cybersecurity. These actions continue today, and there are signs
European willingness to write rules reducing they will be employed in this year’s mid-terms.
vulnerability or stamping out foreign actors’ One major lesson from Europe is that
malign acts signals a resolve that so far is lacking responding to Russia and bolstering defenses is
in the States. not just about foreign policy. Through fixes to
In no area is Europe more engaged than in law, there is much that America can do to shore
mobilizing society to achieve digital resilience. up its defenses. Sensible proposals exist, but
As documented in a 2017 Washington Post report, they withering on the vine. Disclosing foreign
these efforts have been going on for years. They funding of political ads, as recommended by
exist in countries like Sweden, where schools Senator Warner, can help inject much needed
are enlisted to detect Russian propaganda, and transparency. Legislation pressed by Senators
at the EU-level, where a task force documents Lankford, Kloubachar, and others, will not only
and analyzes state-sponsored malign influence fund election infrastructure hardening, but put
campaigns. As German MP Patrick Sensburg said, equipment suppliers on notice that we expect

Emerging Threats to National Security | Page 9


better security. tools, like the Global Engagement Center (though
matejmo vis istock.com
Regulation is not a silver bullet; America’s re-thinking its contract with Cambridge Analytica
first amendment make some European-style would help).
regulations impossible. Yet Americans can and Expanded law enforcement investigations to
should take steps to curb tech abuses. expose illicit foreign cyber and influence efforts
While Congress must act, the Trump is an area where the U.S. is actually surpassing
administration can take steps now to protect Europe, as evidenced by the Mueller probe. We
America. should devote more resources to these efforts, just
For the military, the Pentagon is taking a good as we did to counter terrorism following 9/11.
first step by elevating U.S. Cyber Command. But it DOJ, DHS and others should mobilize society
should also ensure the military can conduct hybrid against the threat, not as isolated task forces,
warfare in an integrated way. For instance, in the but like the Obama administration’s whole of
future, it may be that information warfare should government effort to counter violent extremism.
fall in CYBERCOM’s job jar. At the same time the But the strongest signal would be enforcing
command should also follow a model closer to US laws meant to punish election interference. The
Special Forces, whose actions are most effective President must signal the clear intent of the United
when tied to strategic objectives set by regional States to defend itself against adversaries, like
commanders and diplomats. Russia, employing digital means to attack our
The State Department needs to get in the game. democracy.
We should be investing in our counter-propaganda

Emerging Threats to National Security | Page 10


About the Authors

PATRICK TUCKER MAX BERGMANN PATRICK BARRY

Patrick Tucker is Max Bergmann is a Patrick Barry served


technology editor senior fellow at the in the Defense and
for Defense One. He’s Center for American Homeland Security
also the author of The Progress, where he Departments during the
Naked Future: What focuses on European Obama administration,
Happens in a World That
Anticipates Your Every security and U.S.-Russia where he advised
Move? (Current, 2014). policy. Cabinet officials on
Previously, Tucker was counterterrorism,
deputy editor for The cyberspace and
Futurist for nine years. intelligence.

Emerging Threats to National Security | Page 11

You might also like