PKKH: CYBER WARFARE IS 'NEW THREAT TO PAKISTAN'S NATIONAL SECURITY'

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
06586906
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
5
Document Creation Date: 
December 28, 2022
Document Release Date: 
March 2, 2017
Sequence Number: 
Case Number: 
F-2016-02039
Publication Date: 
August 29, 2012
File: 
AttachmentSize
PDF icon pkkh cyber warfare is ne[15164252].pdf156.92 KB
Body: 
Approved for Release: 2017/02/15 C06586906 UNCLASSIFIED/ ENVELOPE RATUZYUW RUEIFBS1607 2421828�UUUU--RUEDAEI. ZNR UUUUU ZUI RUEOMCG0565 2421832 HEADER 291828Z AUG 12 FM OSC RESTON VA TO RUZFNEL/547IS NELLIS AFB NV RAYWAP/ATTORNEY GENERAL D BRANCH RUZDADA/BUREAU OF ALCOHOL TOBACCO FIREARMS WASHI RUOIAAA/CDR USPACOM HONOLULU HI RUZFMXI/CDR USTRANSCOM INTEL CELL SCOTT AFB IL RUEPNGA/CDRNGIC CHARLOTTESVILLE VA RHMFISS/CDRUSASOIC WASHINGTON DC RUEPWDC/DA AMHS WASHINGTON DC RHEBAAA/DEPT OF ENERGY WASHINGTON DC//IN-1// RUEPTRS/DEPT OF TREASURY WASHINGTON DC RHEFDIA/DIA'WASHINGTON DC (b)(3) RUOIAAA/DIRNAVCRIMINVSERV QUANTICO VA RHMFISS/DIRNAVCRIMINVSERV QUANTICO VA RUEPMAX/GISA FT BRAGG NC RAYAIK/HQJOC WASP RUZDJWC/JWAC DAHLGREN VA RUZDQAN/MARCORINTACT QUANTICO VA RUZDNAI/NASIC WRIGHT PATTERSON AFB OH RUGIZZZ/NGA DISSEM WASHINGTON DC RUETIAA/NSACSS FT GEORGE G MEADE MD RUCXONI/ONI WASHINGTON DC//2140// RHMFIUU/PACAF IDHS HICKAM AFB HI RHHJJPI/PACOM IDHS HONOLULU HI RUEKJCS/SECDEF WASHINGTON DC RUEHC/SECSTATE WASHINGTON DC//INR// RUZEADH/UDITDUSAREUR HEIDELBERG GE RUMICED/USAFCENT INTEL SHAW AFB SC//A2// RHHJRAP/USARPAC INTEL FT SHAFTER HI//APIN// RUMICEA/USCENTCOM INTEL CEN MACDILL AFB FL RUCQSAB/USSOCOM INTEL MACDILL AFB FL BT UNCLASSIFIED/IF 28 of 32 3/19/2016 8:33 AM Approved for Release: 2017/02/15 C06586906 Approved for Release: 2017/02/15 C06586906 UNCLASSIFIED//F 0 CONTROLS UNCLAS FOR OFFICIAL USE ONLY SECTION 1 OF 2 4Q44 CITE OSC RESTON VA 221678 WARNING: TOPIC: FOUO, INTERNATIONAL POLITICAL SERIAL:SAP20120829134001 BODY COUNTRY: IRAN, ISRAEL, PAKISTAN, UNITED STATES SUBJ: (U//FOU0) PKKH: CYBER WARFARE IS 'NEW THREAT TO PAKISTAN'S NATIONAL SECURITY' SOURCE: KARACHI PKKH IN ENGLISH 29 AUG 12 (U//FOU0) TEXT: (U//FOU0) AN EXCLUSIVE REPORT BY PKKH CORRESPONDENT HASAN QURESHI: "CYBER WARS" TEXT DISSEMINATED AS RECEIVED WITHOUT OSC EDITORIAL INTERVENTION. INTERNET OSC TRANSCRIBED TEXT (U) THIS PRODUCT MAY CONTAIN COPYRIGHTED MATERIAL; AUTHORIZED USE IS FOR NATIONAL SECURITY PURPOSES OF THE UNITED STATES GOVERNMENT ONLY. ANY REPRODUCTION, DISSEMINATION, OR USE IS SUBJECT TO THE OSC USAGE POLICY AND THE ORIGINAL COPYRIGHT. CYBER WARS SUBMITTED BY AURANGZEB ON AUGUST 28, 2012 � 7:24 PM (ATTACHMENT NOT INCLUDED: 5AP20120829134001001.JPG) UNCLASSIFIED//F 0 29 of 32 3/19/2016 8:33 AM Approved for Release: 2017/02/15 C06586906 Approved for Release: 2017/02/15 C06586906 UNCLASSIFIEDOW, PKKH EXCLUSIVE (�VERTICAL�BAR�) HASAN QURESHI THERE IS A NEW THREAT TO PAKISTAN'S NATIONAL SECURITY AND IT COMES IN THE FORM OF A COMPUTER CODE. LEAVE ASIDE MANNED CIA, MOSSAD AND RAW INTELLIGENCE, INFILTRATION AND SABOTAGE OPERATIONS WHICH HAVE BEEN COUNTERED BY THE ISI; THIS NEW THREAT IS SILENT AND FAR DEADLIER. THE RISE OF CYBER WARFARE IS NOTHING NEW. IT HAS BEEN USED IN VARIOUS FORMS SINCE THE LATE 1980'S, PRIMITIVE THOUGH IT MAY HAVE BEEN. HOWEVER THE INCREASING SOPHISTICATION OF COMPUTER SYSTEMS HAS MEANT THAT IT IS NOW BEING EMPLOYED AS A FRONT LINE TOOL OF WAR. ONE CODE IN PARTICULAR �FIRST DISCOVERED IN 2010 LURKING IN IRANIAN NUCLEAR ENRICHMENT FACILITIES� IS STUXNET. STUXNET IS A JOINT COOPERATION INITIATIVE BETWEEN AMERICA'S NATIONAL SECURITY AGENCY AND ISRAEL'S UNIT 8200, PART OF A LARGER PROGRAMME INITIATED BY GEORGE W. BUSH IN 2008 CALLED OPERATION OLYMPIC GAMES TO TARGET IRAN, PAKISTAN, AND MIDDLE EASTERN COUNTRIES ELECTRONICALLY. IT IS THE MOST COMPLICATED VIRUS CODE TO DATE; EXPLOITING GAPS IN SYSTEMS CALLED ZERO DAYS WHICH EVEN THE SYSTEM DESIGNERS ARE NOT AWARE OF. IT IS ALSO THE FIRST VIRUS CREATED FOR THE SPECIFIC PURPOSE OF CYBER WARFARE � A WEAPON MADE ENTIRELY OUT OF CODE. THE VIRUS AND ITS VARIANTS CAN LIE DORMANT IN A SYSTEM FOR YEARS � BE THAT A POWER/COMMUNICATIONS GRID OR A NUCLEAR FACILITY� AND ONLY COME INTO ACTION WHEN A SPECIFIC 'TARGET' COMES INTO PLAY. FOR EXAMPLE IT CAN BE INSERTED INTO A COUNTRY'S MISSILE DEFENCE SHIELD OR MISSILE LAUNCH PROGRAM AND ONLY SPRING INTO ACTION WHEN THE CODES FOR THE MISSILES ARE INPUTTED AND THE LAUNCH BUTTON IS PRESSED, RENDERING A COUNTRY DEFENCELESS AT ITS HOUR OF NEED. THE SYSTEM NEED NOT BE CONNECTED TO THE INTERNET AS A DOUBLE AGENT WITH A USB DEVICE IS ALL THAT IS NEEDED. IT WREAKED HAVOC AT IRAN'S NATANZ NUCLEAR ENRICHMENT PLANT, SETTING THEM BACK AT LEAST TWO YEARS. IT IS ALSO SUSPECTED OF BURROWING INTO THE SYSTEM AT THE BUSHEHR FACILITY, MEANING THAT WHEN THE PLANT FINALLY DOES COME ONLINE, IT COULD LEAD TO A NATIONAL ELECTRICITY BLACKOUT. THE US AND ISRAELIS PROGRAMMERS USED P-1 CENTRIFUGES ACQUIRED FROM LIBYA TO TEST THE RESULTS ON IRAN'S CENTRIFUGES AS THEY ALSO USE THE SAME. THE P-1 CENTRIFUGE DESIGN WAS GIVEN TO LIBYA AND IRAN BY PAKISTAN THROUGH DR. ABDUL QADEER KHAN, MEANING THAT PAKISTAN ALSO USES THOSE VERY SAME P-1'S IN SOME OF ITS OWN NUCLEAR FACILITIES. UNCLASSIFIED/?1Q.. 30 of 32 3/19/2016 8:33 AM Approved for Release: 2017/02/15 C06586906 Approved for Release: 2017/02/15 C06586906 � UNCLASSIFIED/5' STUXNET, THOUGH, IS OLD NEWS BY NOW. EVEN THE NEWLY DISCOVERED "FLAME" MALWARE FOUND RECENTLY IN SYSTEMS IN THE MIDDLE EAST WAS DEVELOPED SOME TIME AGO. WHILE DETAILS ABOUT THESE TWO TARGETED ATTACK PACKAGES ARE FINALLY EMERGING, THE NEXT GENERATION OF ATTACK TOOLS HAS NO DOUBT BEEN DEVELOPED AND LIKELY DEPLOYED. A FURTHER ISSUE IS THAT STUXNET IS NOW AVAILABLE AS OPEN SOURCE SOFTWARE AND CAN BE REVERSE ENGINEERED BY ANYONE. A NON�STATE ACTOR, SUCH AS THE FOREIGN FUNDED OUTFITS TTP OR BLA ARE NOW FULLY CAPABLE OF ACQUIRING, REDESIGNING AND DEPLOYING THIS SOFTWARE AGAINST SENSITIVE TARGETS. THE THREAT IS NOT LIMITED TO ATTACKS ON NATIONAL SECURITY INSTALLATIONS BECAUSE RECENTLY AN OFFSHOOT OF STUXNET DUBBED THE GAUSS VIRUS HAS BEEN FOUND LURKING ON SYSTEMS IN THE MIDDLE EAST. THIS CODE IS DIFFERENT TO THE ORIGINAL FROM WHICH IT WAS DEVELOPED AS ITS OBJECTIVE IS THE SURVEILLANCE OF THE FINANCIAL DATA OF SYSTEM USERS. THE MALWARE 'DUQU' USED FOR CYBER ESPIONAGE IS ALSO RELATED TO STUXNET. RUSSIA'S KASPERSKY LAB FIRST FLAGGED THE EXISTENCE OF THESE VIRUSES AND COMMENTED ON ITS WEBSITE, "AFTER LOOKING AT STUXNET, DUQU AND FLAME, WE CAN SAY WITH A HIGH DEGREE OF CERTAINTY THAT GAUSS COMES FROM THE SAME 'FACTORY' OR 'FACTORIES.' ALL THESE ATTACK TOOLKITS REPRESENT THE HIGH END OF NATION�STATE SPONSORED CYBER�ESPIONAGE AND CYBERWAR OPERATIONS." ACCORDING TO KASPERSKY LAB, GAUSS CAN ALSO STEAL PASSWORDS AND ADMIN BT #1607 Dl 6A *** MISSING SECTION 2 OF SECTIONED MESSAGE *** UNCLASSIFIED/IFS 0 UNCLAS 31 of 32 3/19/2016 8:33 AM Approved for Release: 2017/02/15 C06586906 Approved for Release: 2017/02/15 C06586906 � UNCLASSIFIED/ NNNN UNCLASSIFIED 32 of 32 3/19/2016 8:33 AM Approved for Release: 2017/02/15 C06586906