study
Active Cyber Defense Operations
Case Studies Cheat Sheets
Author
Programmes
Published by
Interface
July 10, 2024
Introduction
The on-going debates around active cyber defense remain unresolved on both the international and national stages. Given its inherent risks, active cyber defense, defined as
“one or more technical measures implemented by an individual state or collectively, carried out or mandated by a government entity with the goal to neutralize and/or mitigate the impact of and/or attribute technically a specific ongoing malicious cyber operation or campaign” (Reference),
merits in-depth scrutiny. While determining if a measure aligns with an existing legal framework serves as a valuable initial consideration, the application of established legal frameworks to emerging domains like active cyber defense poses challenges, especially when specific legal structures are absent. In such cases, it becomes imperative to discern whether pursuing activities that may not necessarily be illegal is warranted. Hence, the question arises: How should we evaluate the implementation of active cyber defense measures? Notably, definitions of active cyber defense exhibit extensive variations, as do the technical strategies encompassed within these definitions. Towards this end, this is a comprehensive framework for the assessment of whether these measures should be put into practice.
The assessment is divided into two categories – Criteria and Safeguards. When calculating the risks for (unintended or cyber-physical, especially in critical infrastructure) damage, fundamental rights violations, violations of sovereignty, conflict escalation and success, there is not a common measurement for active cyber defense. Therefore, criteria include, but are not limited to, the who, against whom, where, to what effect and when of an active cyber defense operation. The criteria and their indicators offer an analytical framework for examining the operation’s crucial elements to better assess the operation’s risks, usefulness and potential costs. Although these steps are aimed at a case-by-case analysis, governments deciding to implement measures from the broad range that the definition offers also need to implement structural and procedural safeguards and apply them to all active cyber defense operations. These structural safeguards will inter alia guarantee privacy protections, ensure alignment with human rights and national and international law, maintain geopolitical stability and create a net-gain for national security.
-
Hafnium-Web-Shell-Removal
-
Operation LADYBIRD
-
Operation MEDUSA
-
Hive Takedown
Criteria Legend
Category |
Criteria |
---|---|
Purpose |
Goal: An operation can aim to mitigate the impact, neutralize a malicious cyber operation or campaign and/or attribute it technically. |
Success: To better estimate the success of the effect, it is crucial to look at the expected goal. A possible categorization, connected to the frequency of operations, is whether the operation is likely to result in a tactical or strategic success.
In both cases, active cyber defense operations could be labeled during the ex-ante impact assessment. |
|
Effect |
Type:
If an active cyber defense operation leads to unintended consequences, reversibility ensures damage control. Whereas the intrusiveness of measures is not necessarily binary but, on a spectrum, it may be useful to divide them into intrusive and non-intrusive methods for operationalizing the framework. |
Space: Blue space is defined as the area within the jurisdiction of the government, including the private sector among others; Green space is defined as IT systems and infrastructure affected in a malicious cyber operation or campaign that are within the jurisdiction of an allied government; Red space is defined in this paper as IT systems and infrastructure used in a malicious cyber activity that is within the jurisdiction of the country in which the operation or campaign originates; Gray space is defined in this paper as IT systems and infrastructure used in a malicious cyber operation or campaign that are not located in blue, green, or red space. |
|
Target: Concrete target systems and infrastructure must be considered and possibly treated differently, especially if the type of effect is intrusive and non-reversible.
It is crucial to make a clear distinction between critical infrastructure and non-critical infrastructure, treating targets of active cyber defense operations as critical infrastructure if they would be considered critical infrastructure in the nation conducting active defense.
Targeting critical infrastructure with active cyber defense operations should be assessed with utmost care, as it can lead to unintended and even cyber-physical effects and the subsequent risk of escalation. |
|
Actors |
Government-led agency: Several types of government actors are considered for the lead agency in active cyber defense operations, including national cybersecurity agencies, federal and state law enforcement agencies, intelligence agencies, and the military.
Considering the effect space, cybersecurity and law enforcement agencies may be appropriate for measures in blue and green spaces, while intelligence agencies may be suitable for measures in gray and/or red spaces. |
Cooperativeness: Cooperation is important, as the risks and resources involved in exchanging information with an affected third party may be lower than attempting to compromise that third party through an active cyber defense operation against their will. |
|
Timing |
Attribution: Attribution through technical intelligence and other means plays a major role in implementing active cyber defense measures.
Confidence levels in technical attribution are crucial for several active cyber defense measures, and they may vary from uncertain to proven based on technical, intelligence, and geopolitical evidence.nce. |
Time: The effectiveness of an active cyber defense operation may decrease as more time passes between the incident(s) and the operation.
The timing of active cyber defense operations is crucial to meet necessary self-defense criteria and avoid being seen as pure retribution. |
|
Operations |
De and escalation: Several active cyber defense measures carry the potential risk for escalation. The potential for de-escalation and escalation involves multiple parties and factors, including third parties and the controllability of the active cyber defense measures deployed. Adhering to proportionality is important to maintain legality and avoid escalation. Confidence-building measures, such as open communication channels, can help in avoiding escalation and promoting de-escalation. |
Automation: Increased automation when targeting heterogeneous systems may lead to unintended consequences and loss of control. How risky an automated process is depends on other criteria, such as the type of effect and the overall picture. |
|
Frequency: A one-off operation may be preferable in terms of efficiency and effectiveness. If repetitions of active cyber defense operations are necessary, other measures such as passive cyber defense or a combination may become more effective and efficient. |
|
Cost: The costs for an active cyber defense operation in terms of resources are closely linked to the frequency criterion. The cost of specialized staff time, procurement of tools and exploits, and third-party support from the private sector may make an operation prohibitively expensive or inefficient. The overall operation may be rendered inefficient and ineffective in achieving the goal based on the costs criterion. |
|
Collateral Consequences: Collateral consequences go beyond simply referring to accidental consequences, as actions may be taken while it is clear that collateral consequences could occur. Planners of active cyber defense operations may either expect (and accept or not accept) or not expect collateral consequences. |
Safeguard Legend
Safeguard |
Assessment |
---|---|
Define and limit the scope |
|
Establish a national legal framework |
|
Require impact assessments |
|
Implement oversight |
|
Create transparency and auditability |
|
Set up guidelines for tools and services |
|
Apply international law |
|
Consider public interest |
|
Adapt confidence-building measures |
|
Hafnium-Web-Shell-Removal
Criteria
Criteria |
Indicators |
---|---|
Goal |
Mitigation |
Success |
Tactical |
Type |
Reversible |
Intrusive |
|
Space |
Blue Space |
Target |
Non-critical Infrastructure (Critical Infrastructure) |
Government lead agency |
Law Enforcement |
Cooperativeness |
Unknown |
Attribution |
Not necessary |
Time |
During operations of the same campaign In-between sequential campaigns |
De and escalation |
(Potential de-escalation) No change in the escalation cycle |
Automation |
Semi-Automated |
Frequency |
One-off (Periodic) |
Cost |
Low |
Collateral Consequences |
Not expected |
Safeguards
Safeguard |
Assessment |
---|---|
Define and limit the scope |
Clearly defined |
National legal framework |
Non-active-cyber-defense-specific legal framework exists |
Impact assessment |
Unclear; at least an independent technical expert was consulted |
Oversight |
Ex ante warrant and ex post notification of targets were required |
Transparency and auditability |
Public was informed with a sufficient amount of information; auditability is unknown |
Guidelines for tools and services |
Unknown process of development/ procurement and testing. Country has a Vulnerability Equities Process. |
Apply international law |
Not applicable (in the sense of between nations) |
Consider public interest |
Appears to have been in the public interest |
Confidence-building measures |
Not required (in the sense of international measures) |
References
Operation LADYBIRD
Criteria
Criteria |
Indicators |
---|---|
Goal |
Mitigation |
Success |
Tactical |
Type |
(Reversible) |
Intrusive |
|
Space |
Blue Space |
Green Space |
|
(Gray Space) |
|
Target |
Non-critical Infrastructure (Critical Infrastructure) |
Government lead agency |
Law Enforcement |
Cooperativeness |
Unknown |
Noncooperative |
|
Attribution |
Not necessary |
Time |
During operations of the same campaign In-between sequential campaigns |
De and escalation |
No change in the escalation cycle |
Automation |
Semi-Automated |
Frequency |
One-off |
Cost |
Low |
Collateral Consequences |
Not expected |
Safeguards
Safeguard |
Assessment |
---|---|
Define and limit the scope |
Unclear |
Establish a national legal framework |
Applicability of existing non-specific legal framework questionable |
Require impact assessments |
Unclear |
Implement oversight |
Ex ante warrant and ex post notification of targets were required |
Create transparency and auditability |
Public was provided with a minimum of information; auditability unknown |
Set up guidelines for tools and services |
Likely implemented |
Apply international law |
Unknown |
Consider public interest |
Appears to have been in the public interest |
Adapt confidence-building measures |
Unknown |
References
Operation MEDUSA
Criteria
Criteria |
Indicators |
---|---|
Goal |
Mitigation |
Success |
Tactical |
Type |
Reversible |
Intrusive |
|
Space |
Blue Space |
Target |
Unclear whether critical infrastructure was included |
Government lead agency |
Law Enforcement |
Cooperativeness |
Cooperative |
Attribution |
Proven |
Time |
In-between sequential campaigns |
De and escalation |
Potential de-escalation No change in the escalation Proportional |
Automation |
Semi-Automated |
Frequency |
One-off |
Cost |
High |
Collateral Consequences |
Not expected Known Unknown |
Safeguards
Safeguard |
Assessment |
---|---|
Define and limit the scope |
Clearly defined |
National legal framework |
Non-active-cyber-defense-specific legal framework exists |
Impact assessment |
Unclear |
Oversight |
Ex ante warrant and ex post notification of targets were required |
Transparency and auditability |
Public was informed with a sufficient amount of information; auditability is unknown |
Guidelines for tools and services |
Unknown process of development/ procurement and testing. Country has a Vulnerability Equities Process. |
Apply international law |
Not applicable (in the sense of between nations) |
Consider public interest |
Appears to have been in the public interest |
Confidence-building measures |
Not required (in the sense of international measures). However, The FBI also alerted local authorities in other countries to take down Snake infections on compromised machines outside the United States.) and published an in-depth technical report …. To explain why they did it and that it was a response to longlasting, damaging operation. |
References
Hive Takedown
Criteria
Criteria |
Indicators |
---|---|
Goal |
Mitigation Neutralization |
Success |
Strategic Tactical |
Type |
Reversible |
Intrusive |
|
Space |
Blue Space (unknown) |
Target |
Non-critical Infrastructure |
Government lead agency |
Law Enforcement |
Cooperativeness |
Cooperative |
Attribution |
Proven |
Time |
During operations of the same campaign |
De and escalation |
No change in the escalation |
Automation |
Manual |
Frequency |
One-off |
Cost |
High |
Collateral Consequences |
Not expected |
Safeguards
Safeguard |
Assessment |
---|---|
Define and limit the scope |
Clearly Defined |
Establish a national legal framework |
Non-active-cyber defense-specific frameworks exits |
Require impact assessments |
Unclear |
Implement oversight |
Ex ante warrant |
Create transparency and auditability |
Public was informed with a sufficient amount of information; auditability is unknown |
Set up guidelines for tools and services |
Unknown process of development |
Apply international law |
Not applicable
Law Enforcement Agencies in the United States, Germany and the Netherlands took action against infrastructure based in their countries. |
Consider public interest |
Appears to have been in the public interest |
Adapt confidence-building measures |
Coordination with EU Member States and Five Eye Countries |
References
Author
Dr. Sven Herpig
Lead Cybersecurity Policy and Resilience