Seizing the Signals. CSCE 727 - Farkas2 Reading List This class – Carr, Chs. 3, 4 – Introduction to TEMPEST, The Complete and unofficial TEMPEST Information.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Incident Response Need for Attack Analysis. CSCE Farkas2 Reading List This class – Michael N. Schmitt, Computer Network Attack and the Use of Force.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
Security Controls – What Works
CSA 223 network and web security Chapter one
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
1 An Overview of Computer Security computer security.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
Lecture 11 Reliability and Security in IT infrastructure.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Session 3 – Information Security Policies
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Department Of Computer Engineering
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
CSCE 727 Cyber Attacks and Risk Management. CSCE Farkas2 Attack Sophistication vs. Intruder’s Technical Knowledge From:
COEN 252 Computer Forensics
Information Systems Security Computer System Life Cycle Security.
Seizing the Signals. CSCE Farkas2 Reading List This class – Denning Chapters 7 – Federation of American Scientists, Intelligence Resource Program,
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
What does “secure” mean? Protecting Valuables
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Incident Response. CSCE Farkas2 Reading list Required: Michael N. Schmitt, Computer Network Attack and the Use of Force in International Law. Thoughts.
Intrusion Control. CSCE Farkas2 Readings Lecture Notes Pfleeger: Chapter 7.5.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Security What is Information Security?
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
CSCE Farkas1 CSCE 522 Network Security. Reading Pfleeger and Pfleeger: Chapter 6 CSCE Farkas2.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
IS3220 Information Technology Infrastructure Security
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Network Security Overview
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
CS457 Introduction to Information Security Systems
Information System and Network Security
Intrusion Control.
INFORMATION SYSTEMS SECURITY and CONTROL
Intrusion Detection Systems
How to Mitigate the Consequences What are the Countermeasures?
Cryptography and Network Security
Presentation transcript:

Seizing the Signals

CSCE Farkas2 Reading List This class – Carr, Chs. 3, 4 – Introduction to TEMPEST, The Complete and unofficial TEMPEST Information Place – NSA, TEMPEST endorsement program, – Federal Computer Intrusion Laws,

Signal Intelligence Deriving intelligence from intercepted electromagnetic waves Types of intelligence: – Communication intelligence (COMINT) – Electronic intelligence (ELINT) – Imagery intelligence (IMINT) CSCE Farkas3

ELECTRONIC VISUAL SURVEILLANCE AND THE REASONABLE EXPECTATION OF PRIVACY By Max Guirguis, Journal of Technology Law & Policy, 2004, Positive results: reduced crime, efficient work place, etc. Negative results: potential misuse of recording, incorrect results, constitutional rights Surveillance of public vs. private (or reasonably expected to be private) places CSCE Farkas4

5 Echelon Goal: – intercept large quantities of communication – Analyze (semi-automated) gathered data – Identify and extract messages of interest What messages are retained? – Key words – categories – Human verification Who has access to them?

CSCE Farkas6 The Positive Aspects Increased national security Preventive measures Global effects – Global commerce – Communication infrastructure

CSCE Farkas7 Negative Aspects Global (in)balance Privacy issues Misuse Law Error of analysis – Large amount of data – Sophistication of analysis – Use of results

Other Surveillance Issues

CSCE Farkas9 Eavesdropping Sender Recipient Tools: microphone receivers, Tape recorder, phone “bugs”, scanners, Radio receivers, satellite receivers, spy satellites, Network sniffing, etc.

CSCE Farkas10 Computer Communications TCP/IP Protocol Stack Application Layer Transport Layer Internetwork Layer Network Access Layer Each layer interacts with neighboring layers above and below Each layer can be defined independently Complexity of the networking is hidden from the application At what layer should we support security?

CSCE Farkas11 Security Needs Basic services that need to be implemented: Key management Confidentiality Nonrepudiation Integrity/authentication Authorization

CSCE Farkas12 Network Access Layer Security Dedicated link between hosts/routers  hardware devices for encryption Advantages: – Speed Disadvantages: – Not scalable – Works well only on dedicates links – Two hardware devices need to be physically connected

CSCE Farkas13 Internetwork Layer Security IP Security (IPSec) Advantages: – Overhead involved with key negotiation decreases <-- multiple protocols can share the same key management infrastructure – Ability to build VPN and intranet Disadvantages: – Difficult to handle low granularity security, e.g., nonrepudation, user-based security,

CSCE Farkas14 Transport Layer Security Advantages: – Does not require enhancement to each application Disadvantages: – Difficult to obtain user context – Implemented on an end system – Protocol specific  implemented for each protocol

CSCE Farkas15 Application Layer Security Advantages: – Executing in the context of the user --> easy access to user’s credentials – Complete access to data --> easier to ensure nonrepudation – Application can be extended to provide security (do not depend on the operating system) – Application understand data --> fine tune security Disadvantages: – Implemented in end hosts – Security mechanisms have to be implemented for each application --> –expensive –greated probability of making mistake

CSCE Farkas16 Surveillance Difficulties New Technologies – 1994: U.S. Congress: Communication Assistance or Law Enforcement Act (digital telephony bill” Encryption Data authenticity and integrity

CSCE Farkas17 TEMPEST U.S. government code : classified set of standards for limiting electric and magnetic radiation emanations from electronic equipments. Investigations and studies of compromising emanations.

CSCE Farkas18 Compromising Emanations Unintentional intelligence-bearing signals that if intercepted and analyzed can disclose classified information. Intercepted when transmitted, handled, or processed Tempest equipment: remotely mirror what is being done on a remote device, e.g., video monitor, cable wire, processing unit, etc.

CSCE Farkas19 Unintentional Emanations Normal operation of system Deliberate or accidental exposure to unusual environment Software induced Security Considerations: Traditional – Unauthorized access to the system – requires knowledge about the system, applications, configuration, can be detected, limited time frame, etc. Upcoming – Exploitation of compromising signals

CSCE Farkas20 TEMPEST History U.S. government concern about capture and reconstruction of emanations from high-security devices used to process, transmit, store sensitive data – 1950s: Introduce standards to limit “leakage” – NAG1A – 1960s: revise NAG1A to FS222 and FS222A – 1970s: revise standards – National Communications Security Information memorandum 5100 (NACSIM) – 1974: revise NACSIM 5100 – 1981: National Communications Security Committee Directive 4. – MACSIM 5100A (classified) – 1984: National Communications Security Instructions – NACSI 5400 (secret) – 1984: National Security Directive 145. by NSA NSA: Tempest: a signal problem, ( NSA: History of US Communications security, df df

CSCE Farkas21 Military application WWII Enemy communications – German army eavesdropped on enemy communication while already implementing protection measures against the same attacks against German communications 1960: MI5 tempest attack on cipher machines Limited publications

CSCE Farkas22 Non-military Application 1966: open publication on the risk of tempest attacks : Swedish government publication on the business risk of tempest attacks 1985: van ECK – screen content disclosure 1985: Bank ATM – card info and PIN 1990: tamper resistant hardware – smart card

CSCE Farkas23 Electromagnetic Emissions Simplest form of electromagnetic fields: transmission and distribution lines, wall socket power: steady 60 hertz (U.S.), sinusoidal wave Electric devices: alter characteristics of electromagnetic waves (frequency, power level, wave form) – E.g., wave forms: sinusoidal, sawtooth, spike, square Capture and interpret: complex waves can be captured, interpreted, and replayed on similar device to create exact replica of the original device Field strength – Reduced with the distance from the electric device – Depends on the emanating device, e.g., type of screen, CPU,

CSCE Farkas24 COMSEC Four main parts: – Physical security  – Emission security – Transmission security  – Cryptographic security  Red equipment: handles plain text information with national security value Black equipment: protected (encrypted) information Unintentional emission: from Red systems

CSCE Farkas25 TEMPEST Attack Requires: – High level of expertise and equipment to decode captured waves – Proximity to the target – Long collection time Processing device: $5,000-$250,000

CSCE Farkas26 Tempest Protection Physical separation – Exclude unauthorized individuals from areas near the source of emanation Electromagnetic separation – Shielding, filtering, etc. to remove the leak Signal level minimization – Lowest feasible power-level use

CSCE Farkas27 TEMPEST Shielding NSA specifications – Ferrites, other frequency interference products – Shield equipment, cables, room, building, etc. – NSA standards, endorsed devices and contractors – Expensive – TEMPEST protected PC about double the price – Shielding and distance together

CSCE Farkas28 Threat-Based System Reduce the cost of TEMPEST efforts – Evaluation: sensitivity of information, risk of TEMPEST attack, etc. – Personnel control: physical control, unauthorized access – Compartmentalization: each sensitivity level is isolated from the others – Physical control of emanation: shield, power, noise, etc.

CSCE Farkas29 Tempest Procedures Government and organizational restrictions Products, installation, maintenance Reporting needs Certified TEMPEST technical authority (CTTA)

CSCE Farkas30 Need for TEMPEST Little public data on TEMPEST cases Government focus and funding – National security intelligence – Economic espionage Decoding device: hard to obtain Bandwidth of human intelligence vs. TEMPEST TEMPEST threat within U.S. – minimal??

CSCE 727 Cyber Attacks (Brief Overview)

CSCE Farkas32 Attack RFC 2828: “ An assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of the system.”

CSCE Farkas33 Normal Flow Information source Information destination

CSCE Farkas34 Interruption Information source Information destination Asset is destroyed of becomes unavailable - Availability Example: destruction of hardware, cutting communication line, disabling file management system, etc.

CSCE Farkas35 Interception Information source Information destination Unauthorized party gains access to the asset – Confidentiality Example: wiretapping, unauthorized copying of files

CSCE Farkas36 Modification Information source Information destination Unauthorized party tampers with the asset – Integrity Example: changing values of data, altering programs, modify content of a message, etc.

CSCE Farkas37 Fabrication Information source Information destination Unauthorized party insets counterfeit object into the system – Authenticity Example: insertion of offending messages, addition of records to a file, etc.

CSCE Farkas38 Phases of Attack Improve detection by examining which “phase” an intruder’s behavior is identified Attack phases: – Intelligence gathering: attacker observes the system to determine vulnerabilities – Planning: attacker decide what resource to attack (usually least defended component) – Attack: attacker carries out the plan – Inside the system: Hiding: attacker covers tracks of attack Future attacks: attacker installs backdoors for future entry points

CSCE Farkas39 Passive Attack “Attempts to learn or make use of information from the system but does not affect system resources” (RFC 2828) Sniffer

CSCE Farkas40 Sniffers How easy it is to sniff on – Local wired network – Wide-area wired network – Wireless devices What are the risks of sniffers? – Message content – Traffic flow

CSCE Farkas41 Passive attacks Interception (confidentiality) Disclosure of message contentsTraffic analysis

How can we protect against sniffers? CSCE Farkas42

CSCE Farkas43 Protection against passive attacks Shield confidential data from sniffers: cryptography Disturb traffic pattern: – Traffic padding – Onion routing Modern switch technology: network traffic is directed to the destination interfaces Detect and eliminate sniffers

CSCE Farkas44 Active attacks “Attempts to alter system resources of affect their operation” (RFC 2828)

CSCE Farkas45 Active attacks InterruptionModificationFabrication (availability) (integrity) (integrity) Give examples of attacks!

CSCE Farkas46 Active Attacks Masquerade Replay Modification of messages Denial of service Degradation of service Spoofing attacks Session hijacking

CSCE Farkas47 Degradation of Service Do not completely block service just reduce the quality of service

CSCE Farkas48 Intrusion Control It is better to prevent something than to plan for loss. Problem: Misuse happens!

CSCE Farkas49 Need: Intrusion Prevention: protect system resources Intrusion Detection: (second line of defense) identify misuse Intrusion Recovery and response: cost effective recovery models

CSCE Farkas50 Intrusion Prevention First line of defense Techniques: cryptography, identification, authentication, authorization, access control, security filters, etc. Not good enough (prevention, reconstructions)

CSCE Farkas51 Intrusion Detection System (IDS) Looks for specific patterns (attack signatures or abnormal usage) that indicate malicious or suspicious intent Second line of defense against both internal and external threats

CSCE Farkas52 Intrusion Detection Systems Deter intruders Catch intruders Prevent threats to fully occur (real-time IDS) Improve prevention techniques IDS deployment, customisation and management is generally not trivial

CSCE Farkas53 Audit-Based Intrusion Detection Intrusion Detection System Audit Data Profiles, Rules, etc. Decision Need: Audit data Ability to characterize behavior

CSCE Farkas54 Audit Data Format, granularity and completeness depend on the collecting tool Examples – System tools collect data (login, mail) – Additional collection of low system level – “Sniffers” as network probes – Application auditing Honey Net Needed for – Establishing guilt of attackers – Detecting suspicious user activities

CSCE Farkas55 Audit Data Accuracy Collection method – System architecture and collection point – Software and hardware used for collection Storage method – Protection of audit data Sharing and Integration – Transmission protection and correctness – Availability

CSCE Farkas56 IDS Categories 1.Time of data analysis Real-time vs. off-the-line IDS 2.Location where audit data was gathered Host-based vs. network-based vs. hybrid 3.Technique used for analysis Rule-based vs. statistic-based 4.Location of analysis Centralized, distributed, network-based 5.Pattern IDS looking for Misuse vs. anomaly-based vs. hybrid

Incident Response

CSCE Farkas58 Incident Response Federal Communications Commission: Computer Security Incident Response Guide, 2001, nse/Incident-Response-Guide.pdf nse/Incident-Response-Guide.pdf Incident Response Team, R. Nellis, 0Response%20Teams.ppt 0Response%20Teams.ppt NIST special publications,

CSCE Farkas59 Due Care and Liability Organizational liability for misuse – US Federal Sentencing Guidelines: chief executive officer and top management are responsible for fraud, theft, and antivirus violations committed by insiders or outsiders using the company’s resources. – Fines and penalties Base fine Culpability score (95%-400%) – Good faith efforts: written policies, procedures, security awareness program, disciplinary standards, monitoring and auditing, reporting, and cooperation with investigations

When to plan for incidents? CSCE Farkas60

CSCE Farkas61 Roles and Responsibilities User: – Vigilant for unusual behavior – Report incidents Manager: – Awareness training – Policies and procedures System administration: – Install safeguards – Monitor system – Respond to incidents, including preservation of evidences

CSCE Farkas62 Computer Incident Response Team Assist in handling security incidents – Formal – Informal Incident reporting and dissemination of incident information Computer Security Officer – Coordinate computer security efforts Others: law enforcement coordinator, investigative support, media relations, etc.

CSCE Farkas63 Incident Response Process 1. Preparation – Baseline Protection – Planning and guidance – Roles and Responsibilities – Training – Incident response team

CSCE Farkas64 How to Respond?

CSCE Farkas65 How to Respond?

CSCE Farkas66 How to Respond?

CSCE Farkas67 How to Response? Actions to avoid further loss from intrusion Terminate intrusion and protect against reoccurrence Law enforcement – prosecute Enhance defensive security Reconstructive methods based on: – Time period of intrusion – Changes made by legitimate users during the effected period – Regular backups, audit trail based detection of effected components, semantic based recovery, minimal roll- back for recovery

CSCE Farkas68 Incident Response Process 2. Identification and assessment – Symptoms – Nature of incident Identify perpetrator, origin and extent of attack Can be done during attack or after the attack – Gather evidences Key stroke monitoring, honey nets, system logs, network traffic, etc. Legislations on Monitoring! – Report on preliminary findings

CSCE Farkas69 Incident Response Process 3. Containment – Reduce the chance of spread of incident – Determine sensitive data – Terminate suspicious connections, personnel, applications, etc. – Move critical computing services – Handle human aspects, e.g., perception management, panic, etc.

Why is the Human Aspect Important? What can we do to limit damage? Are cover stories acceptable? CSCE Farkas70

CSCE Farkas71 Incident Response Process 4. Eradication – Determine and remove cause of incident if economically feasible – Improve defenses, software, hardware, middleware, physical security, etc. – Increase awareness and training – Perform vulnerability analysis

CSCE Farkas72 Incident Response Process 5. Recovery – Determine course of action – Reestablish system functionality – Reporting and notifications – Documentation of incident handling and evidence preservation

CSCE Farkas73 Follow Up Procedures Incident evaluation: – Quality of incident (preparation, time to response, tools used, evaluation of response, etc.) – Cost of incident (monetary cost, disruption, lost data, hardware damage, etc.) Preparing report Revise policies and procedures

Recent Concerns CSCE Farkas74

CSCE Farkas75 Recovery or Survivability? What is “Survivability”? To decide whether a computer system is “survivable”, you must first decide what “survivable” means.

CSCE Farkas76 Vulnerable Components 1. Hardware 2. Software 3. Data 4. Communications 5. People

CSCE Farkas77 Effect Modeling and Vulnerability Detection Cascading effects Seriously effected components Weakly effected component Not effected components

Incorporating Human Aspects? Traditional issues: password sharing, errors, fraud, insiders, malicious users, social engineering, etc. New issues: perception management, psychological operations, communication media – Egypt: role of the Internet, A. Alexander, Internet role in Egypt's protests, CSCE Farkas78

CSCE Farkas79 Legal Aspects National law International law Legal regime to apply Gray areas of law Legal response Evidence preservation

THEMIS: Threat Evaluation Metamodel for Information Systems Presented at the 2nd Symposium on Intelligence and Security Informatics, 2004 Csilla Farkas, Thomas Wingfield, James B. Michael Duminda Wijesekera Themis, Goddess of Justice

CSCE Farkas81 Cyber vs. Kinetic Attack Academic State-of-the-Art: Effects-Based Analysis Problem: Charter Paradigm Means-Based The Schmitt Reconciliation – Distinguishing Military from Diplomatic and Economic Coercion – Seven Factors Use of Force in Cyberspace

CSCE Farkas82 Severity Immediacy Directness Invasiveness Measurability Presumptive Legitimacy Responsibility Schmitt Factors

CSCE Farkas83 Severity People Killed; Severe Property Damage Armed attacks threaten physical injury or destruction of property to a much greater extent than other forms of coercion. Physical well-being usually occupies the [lowest, most basic level] of the human hierarchy of need. How many people were killed? How large an area was attacked? (Scope) How much damage was done within this area? (Intensity) People Killed; Severe Property Damage People Injured; Moderate Property Damage People Unaffected; No Discernable Property Damage

CSCE Farkas84 Immediacy People Killed; Severe Property Damage Over how long a period did the action take place? (Duration) How soon were its effects felt? How soon until its effects abate? Seconds to Minutes Hours to Days Weeks to Months The negative consequences of armed coercion, or threat thereof, usually occur with great immediacy, while those of other forms of coercion develop more slowly.

CSCE Farkas85 Directness People Killed; Severe Property Damage Was the action distinctly identifiable from parallel or competing actions? Was the action the proximate cause of the effects? Action Sole Cause of Result Action Identifiable as One Cause of Result, and to an Indefinite Degree Action Played No Identifiable Role in Result The consequences of armed coercion are more directly tied to the actus reus than in other forms of coercion, which often depend on numerous contributory factors to operate. The voluntary and wrongful act or omission that constitutes the physical components of a crime. Because a person cannot be punished for bad thoughts alone, there can be no criminal liability without actus reus.

CSCE Farkas86 Invasiveness People Killed; Severe Property Damage Did the action involve physically crossing the target country’s borders? Was the locus of the action within the target country? Border Physically Crossed; Action Has Point Locus Border Electronically Crossed; Action Occurs Over Diffuse Area Border Not Crossed; Action Has No Identifiable Locus in Target Country In armed coercion, the act causing the harm usually crosses into the target state, whereas in economic warfare the acts generally occur beyond the target’s borders. As a result, even though armed and economic acts may have roughly similar consequences, the former represents a greater intrusion on the rights of the target state and, therefore, is more likely to disrupt international stability.

CSCE Farkas87 Measurability People Killed; Severe Property Damage Can the effects of the action be quantified? Are the effects of the action distinct from the results of parallel or competing actions? What was the level of certainty? Effects Can Be Quantified Immediately by Traditional Means (BDA, etc.) with High Degree of Certainty Effects Can Be Estimated by Rough Order of Magnitude with Moderate Certainty Effects Cannot be Separated from Those of Other Actions; Overall Certainty is Low While the consequences of armed coercion are usually easy to ascertain (e.g., a certain level of destruction), the actual negative consequences of other forms of coercion are harder to measure. This fact renders the appropriateness of community condemnation, and the degree of vehemence contained therein, less suspect in the case of armed force.

CSCE Farkas88 Presumptive Legitimacy People Killed; Severe Property Damage Has this type of action achieved a customary acceptance within the international community? Is the means qualitatively similar to others presumed legitimate under international law? Action Accomplished by Means of Kinetic Attack Action Accomplished in Cyberspace but Manifested by a “Smoking Hole” in Physical Space Action Accomplished in Cyberspace and Effects Not Apparent in Physical World In most cases, whether under domestic or international law, the application of violence is deemed illegitimate absent some specific exception such as self-defense. The cognitive approach is prohibitory. By contrast, most other forms of coercion—again in the domestic and international sphere—are presumptively lawful, absent a prohibition to the contrary. The cognitive approach is permissive.

CSCE Farkas89 Responsibility People Killed; Severe Property Damage Is the action directly or indirectly attributable to the acting state? But for the acting state’s sake, would the action have occurred? Responsibility for Action Acknowledged by Acting State; Degree of Involvement Large Target State Government Aware of Acting State’s Responsibility; Public Role Unacknowledged; Degree of Involvement Moderate Action Unattributable to Acting State; Degree of Involvement Low Armed coercion is the exclusive province of states; only they may generally engage in uses of force across borders, and in most cases only they have the ability to do so with any meaningful impact. By contrast, non- governmental entities are often capable of engaging in other forms of coercion (propaganda, boycotts, etc.).

CSCE Farkas90 Overall Analysis People Killed; Severe Property Damage Have enough of the qualities of a use of force been identified to characterize the information operation as a use of force? Use of Force Under Article 2(4) Arguably Use of Force or Not Not a Use of Force Under Article 2(4)