Skip to main content

Human Nature and Cyber Weaponry: Use of Denial and Deception in Cyber Counterintelligence

  • Chapter
  • First Online:
Cyber Weaponry

Abstract

With the increase use of cyber weapons for Internet-based cyber espionage, the need for cyber counterintelligence has become apparent, but counterintelligence remains more art than science because of its focus on tricking human nature—the way people think, feel, and behave. Nevertheless, counterintelligence theory and practice have been extended to domains such as industry and finance, and can be applied to cyber security and active cyber defense. Nonetheless, there are relatively few explicit counterintelligence applications to cyber security reported in the open literature. This chapter describes the mechanisms of cyber denial and deception operations, using a cyber deception methods matrix and a cyber deception chain to build a tailored active cyber defense system for cyber counterintelligence. Cyber counterintelligence with cyber deception can mitigate cyber spy actions within the cyber espionage “kill chain.” The chapter describes how defenders can apply cyber denial and deception in their cyber counterintelligence operations to mitigate a cyber espionage threat and thwart cyber spies. The chapter provides a hypothetical case, based on real cyber espionage operations by a state actor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In 2009, the United States published the Comprehensive National Cybersecurity Initiative (CNCI). The initiative outlined US cybersecurity goals that spanned multiple agencies, including the Department of Homeland Security, the Office of Management and Budget, and the National Security Agency. The 2009 CNCI included the goal (among others) of “…enhancing US counterintelligence capabilities and increasing the security of the supply chain for key information technologies.” Specifically, the CNCI announced “Initiative #6. Develop and implement a government-wide cyber counterintelligence plan.” The Initiative stated: “Initiative #6. Develop and implement a government-wide cyber counterintelligence plan. A government-wide cyber counterintelligence plan is necessary to coordinate activities across all Federal Agencies to detect, deter, and mitigate the foreign-sponsored cyber intelligence threat to US and private sector information systems. To accomplish these goals, the plan established and expanded cyber counterintelligence education and awareness programs and workforce development to integrate counterintelligence into all cyber operations and analysis, increase employee awareness of the cyber counterintelligence threat, and increase counterintelligence collaboration across the government. The Cyber CI Plan is aligned with the National Counterintelligence Strategy of the United States of America (2007) and supports the other programmatic elements of the CNCI.”

  2. 2.

    These two threat agents have been code named by different cyber threat intelligence organizations. APT28 and APT29 are the code names used by FireEye and other organizations, and are used in this report for convenience.

  3. 3.

    For example, Duvenage et al. (2016) describe the organizational requirements for strategic, operational, and tactical/technical cyber counterintelligence operations; Victor Jaquire and Sebastiaan von Solms (2017) outline a capability maturity model for cyber counterintelligence organizations; Duvenage, Sebastian von Solms, and Manuel Corregedor (2015) describe a cyber counterintelligence process model; and Johan Sigholm and Martin Bang (2013) propose a interorganizational information exchange model for cyber counterintelligence.

  4. 4.

    It is interesting that Lowenthal’s 1992 overview of U.S. intelligence mentions counterintelligence only briefly, as a defensive FBI function, c.f., Mark M. Lowenthal (1992) U.S. Intelligence: Evolution and Anatomy, Second Edition. London: Praeger.

  5. 5.

    The term mole was applied to spies in the book Historie of the Reign of King Henry VII written in 1626 by Sir Francis Bacon; W. Thomas Smith (2003). Encyclopedia of the Central Intelligence Agency. New York: Infobase Publishing, p. 171.

  6. 6.

    This section relies on material from Frank J. Stech, Kristin E. Heckman, and Blake E. Strom (2016), “Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense,” in Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, & Cliff Wang eds. (2016), Cyber Deception: Building the Scientific Foundation. Switzerland: Springer.

  7. 7.

    See also, Neil C. Rowe & Julian Rrushi (2016) Introduction to Cyberdeception. Switzerland: Springer; and Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, eds. (2016) Cyber Deception: Building the Scientific Foundation. Switzerland: Springer.

  8. 8.

    Further description of the cyber deception chain and its applications in active cyber defenses are in Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow (2015) Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense. Switzerland: Springer.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kristin E. Heckman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Stech, F.J., Heckman, K.E. (2018). Human Nature and Cyber Weaponry: Use of Denial and Deception in Cyber Counterintelligence. In: Prunckun, H. (eds) Cyber Weaponry. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-74107-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74107-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74106-2

  • Online ISBN: 978-3-319-74107-9

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics