The Cybersecurity Canon Committee selected this book, "The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats,” to be inducted into the Hall of Fame during the 2019-2020 season. They also inducted the authors, Richard Clarke and Robert Knake, into the Lifetime achievement category because this is their second book to be added to the Hall of Fame. The committee inducted their first book, "Cyberwar: The Next Threat to National Security & What to Do About It,” in the 2015-2016 season.
"The Fifth Domain” is the perfect Hall of Fame book. It is part history (See timeline below), part big ideas, part fanboy service to the cybersecurity industry’s biggest thought leaders, and finally, it is a look into the future with regard to near term technologies— such as 5G, quantum computing, and artificial intelligence—and how they might impact the security landscape and what the network defender community should be considering in order to influence how they are deployed.
One side note, I got the opportunity to interview the authors during Cybersecurity Canon Week at the Cyberwire’s network of podcasts. I teased both Dick and Rob that the best way to get people talking about their book was to write a paragraph or two about some of our industry’s thought leaders and thier pet projects like
: Bob Ackerman: on his notion that many startups are not a tool; merely a feature.
: Colonel Roger Schell : The original developer of the Rainbow manuals back in 1979.
: Gary Gagnon: Helped lead Mitre’s initial efforts on deception and the creation of the Mitre ATT&Ck framework.
: Jim Routh: The notion that "resiliency isn’t about avoiding a breach, it’s about preventing bad outcomes.”
: John Perry Barlow: The original author of the 1996 “A Declaration of the Independence of Cyberspace.”
: Rohan Amin: One of the co-authors to the original intrusion chain paper by Lockheed Martin.
: Steve Lipner: The developer of the original Microsoft Software Development Life Cycle
: Sounil Yu: On his Cyber Defense Matrix
: Todd Inskeep: The notion that you can actually defend your enterprise with the right strategy and enough resources.
And many more. Of course, they mentioned my pet project, the Cyber Threat Alliance, and they came on my show to talk about my other pet project, the Cybersecurity Canon, so you know I was going to write about their book. It would be bad form if I didn’t.
In terms of history, they focused on a theme that has been covered from different angles in other Cybersecurity Canon books too this past year: David Sanger’s "The Perfect Weapon: How the Cyber Arms Race Set the World Afire” and Andy Greenburg’s "Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers.” That theme is the continuous low level cyber conflict that has been going on between and by key nation states like the United States, Russia, China, Iran, and North Korea for the past decade or more.
For big ideas, they have a sack of them:
* Resilience should be out focus, not blocking technical things like malware and zero days. Build systems so that most attacks cause no harm.
* Make the bad guy spend resources to keep up with the defenders, not the other way around.
* Adopt cybersecurity first principle thinking by getting leadership to think holistically about the nature of the cybersecurity
* Adopt outcome based regulation, regulation that requires entities to fund the costs associated with a breach. Ideas include Bonds to cover PII Loss and fines for companies that pay ransomware.
* Breach Disclosure has not had the intended effect that we thought.
* The industry’s Personnel Shortage Problem is not at the entry level but at the senior level.
* The United States electrical power grid is owned. We are not arguing that any more. To fix it, they recommend to put someone in charge and give them real authority. They should immediately launch a major program using the best private-sector threat hunter firms to find and remove foreign implants, backdoors, and remote access to the industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA) on the grid. Next, they should put in place that combination of state-of-the-art cybersecurity best practices that have achieved success in America’s most secure corporations. And lastly, they should prepare for the worst: how to maintain society once the grid goes down for a long time. A longer range strategy would be to get away from the current out-dated power distribution system and move towards thousands of heterogeneous sources of electricity generation and storage that would not be tied to any of the three big national Interconnects, or even the regional subnetworks.
* Emphasize the CyberCorps scholarship for Service program funded by the National Science Foundation, administered by the infamous Office of Personnel Management, and advised by the NSA and DHS. This is an already created program. We just need to step on the gas.
* Create a Federal Service Program whose only customer is state, city, and country governments that need computer science services, network management, data storage, and, cybersecurity. Make it cheap.
* Focus the military on defending their own networks that includes protecting the corporations in the defense industrial base (DIB) and guarding the private-sector infrastructure that the military needs to do its job. Give them the specific mission to ensure the integrity of U.S. weapons once they are deployed. Finally, give them the green light to be to go on the offensive to degrade potential enemies’ militaries in part through cyber operations.
* The internet will be balkanized. Instead of begging with authoritarian states to play by our utopian fantasy rules, we should set the terms under which they get to have unfettered access tour most valued public assets.
* The responsibility of protecting elections, at least federal elections, should be the federal government. The feds should establish minimum cybersecurity standards for voting devices, databases, and networks and provide funding to make that happen. We should also perhaps give the military authority to defend this operation.
For technology, they lay out the case for why 5G, quantum computing, and artificial intelligence will each be a game changer in its own right. From my perspective, once 5G is available everywhere, everything will be connected to the internet at very high speeds. And I mean everything. It will no longer be a joke that your toaster is connected to the internet. It will be and in the next decade, we will forget why we thought that was funny in that yesteryear of 2020. But, the big one-two punch of near-future technology is quantum and AI. We are probably within a decade of having an affordable quantum computer that that operate on 128 qubits. The NSA math nerds are already so afraid of this because of the implications of breaking all of their cryptographic cyphers that they are hard at work developing the next generation of cyphers that can withstand a quantum computer speed. Form my science fiction side though, once we hit 128 qubits in quantum computing, the artificial intelligence singularity will not be far behind, that moment when a computer algorithm becomes aware of itself. With a quantum computer, this will no longer be just past our reach.
As I said, the Cybersecurity Canon Canon Committee has already selected this book for the Hall of Fame. It is already a must read. But do yourself a favor. Put this on top of your reading queue. This one is important.
Timeline
1956:
Birth of AI at the Dartmouth Summer Research Project on Artificial Intelligence
1998:
Richard Clarke instigated Presidential Decision Directive 63 that led to the first information sharing and analysis centers (ISACs).
2007:
Russia launches cyber attack against Estonia.
2008:
: Russia launches cyber attack in parallel to the physical attack against Georgia.
: Russia gains access to the Pentagon’s secret-level SIPRNet system.
2010:
: the US and Israel launch Stuxnet
: Pfc. Bradley Manning steals classified information and releases it to the public.
2012:
The Iranian Revolutionary Guard Command (IRGC)
: Shutdown the the eight largest U.S. banks
: Penetrated the U.S. Navy Marine Corps Intranet and defied U.S. efforts to evict them for more than two years.
: Attacked the Sands Casino in Las Vegas.
: Criples Saudi Aramco by wiping software off thousands of machines.
January 2013:
President Obama signs PPD 20 restricting offensive cyber to only his approval.
May 2013:
Snowden
2013:
: Speculation: Russia (The GRU) hacked an NSA staging server to get Eternal Blue. Software released by the Shadow Brokers before NotPetya.
: The Iranian Revolutionary Guard Command (IRGC) took control of networks running systems as diverse as a water system dam in New York State and
2015:
: Russia (The GRU) operating under the false flag name of Sandworm, attacked the Ukrainian power grid in 2015 and again in 2016.
: Russia (The GRU) operating under the false flag name of Cyber Caliphate shut down a French television network, TV5Monde.
: Russia (The GRU) attempted to interfere in the investigations of the Russian assassination attempt in Bristol, England, Russian doping of Olympic athletes, and the Russian downing of Malaysia Airlines Flight 17.
4 February 2015:
Anthem Breach (second-largest health insurer in the country), lost all of its subscriber data (some 78 million records)
2016:
: Speculation: Harold Martin’s cache of TAO offensive tools, including Eternal Blue, likely stolen through supply chain backdoor of Kaspersky software on his home computer.
: North Korea compromised a classified network and stole the U.S.–South Korean combined operations plan to attack the North and kill its leadership.
March 2017
Joshua Schulte leaks CIA documents (Vault 7) to WikiLeaks; including zero-day exploits of widely used software.
And CIA Program UMBRAGE (using attack tools that it had stolen from other governments in order to leave a misleading trail and cause investigators to believe attacks done by the CIA were, in fact, done by others.)
May 2016:
Petya uses the National Security Agency’s EternalBlue weapon.
Fall of 2016
Operation Glowing Symphony: TF Ares launched mission to knock ISIS’s media network off the internet
May 2017: WannaCry
North Korea (Lazarus Group) launches WannaCry:
June 2017: NotPetya
Russian GRU (Main Directorate of the General Staff) or Fancy Bear launch notPetya
2017:
Iran penetration of the Triconex safety-instrumented system of a petrochemical plant in Saudi Arabia, an attack apparently intended to prevent alarms going off during a planned lethal chemical leak in the future.
2018
: A Navy Contractor who worked for the Naval Undersea Warfare Center in Rhode Island stole Classified data about highly sensitive programs .
: Separately, the government discovered another Navy technician be a criminal hacker.
: Department of Defense Cyber Strategy, Secretary of Defense James Mattis had ordered Cyber Command to “defend forward” by joining with the intelligence community in attempting to identify potential enemy cyber systems, penetrate them, and in some cases, stop incoming attacks.
: The National Security Agency and U.S. Cyber Command created the “Russia Small Group” to conduct operations to counter Russian cyber-related interference in that year’s Congressional elections.
Summer 2018:
: the head of the U.S. intelligence community publicly warned that the power grid had in fact already been successfully penetrated by Russia.
September 2018:
President Trump rescinds President Obama’s PPD 20 (2013)
2018:
Intrusion Truth began to regularly disclose the hacks, tools, and people involved in Chinese hacking groups known as APT 3 and APT 10. It is not yet generally agreed upon among the cyber-expert community who Intrusion Truth is, but it is clear that they are revealing the secret activity of the Chinese government.
End of 2018
The Cybersecurity and Infrastructure Security Agency (CISA) created within the Department of Homeland Security, on a par with other agencies in the department such as the Secret Service, Coast Guard, and Federal Emergency Management Agency (FEMA).
2019
The heads of all seventeen U.S. intelligence agencies deliver annual threat assessment to Congress that Russia had the ability to disrupt the U.S. power grid and that China had the capability to disrupt the U.S. natural gas pipeline system
Sources
"Book Review: “The Perfect Weapon”” by John Davis, Cybersecurity Canon Project, 3 March 2020.
"Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” by Eric Hutchins, Michael Cloppert, Rohan Amin, Lockheed Martin Corporation, 2010, Last Visited 30 April 2020.
"Patch Exchange already, will ya? GoldenSpy lurks in tax software Chinese banks prefer their foreign clients to use. Magecart gets cleverer. Another unsecured AWS S3 bucket, and this one’s not funny,” The Daily Podcast, The Cyberwire, interview with Richard Clarke and Robert Knake, Minute 9:40, 6 June 2020.
"Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers,” by Andy Greenberg, Doubleday, 7 May 2019.
"The 2018 DOD Cyber Strategy: Understanding 'Defense Forward' in Light of the NDAA and PPD-20 Changes,” Bobby Chesney, Lawfare Blog, 25 September 2018.
"The Perfect Weapon: How the Cyber Arms Race Set the World Afire,” by David E. Sanger, Crown, 19 June 19th 2018.
"The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats,” by Richard Clarke and Robert Knake, Published July 16th 2019 by Penguin Press