Ai Report
Ai Report
Analysis Report
Plagiarism Detection and AI Detection Report
CyberSecurity Final Report 1.docx
0% 0%
Identical 0% 0 AI Text 0% 0
Paraphrased 0% 0
Excluded
Omitted Words 0
help.copyleaks.com
Plagiarism
0%
Results (0)
*Results may not appear because the feature has been disabled. Plagiarism Types Text Coverage W ords
Identical 0% 0
Paraphrased 0% 0
Excluded
Internet Sources AI Source Match Current Batch
0 0 0 Omitted Words 0
Our AI-powered plagiarism scans offer three layers of text similarity detection: Identical, Minor Changes, and Paraphrased. Based on your scan settings we also provide insight
on how much of the text you are not scanning for plagiarism (Omitted words).
"large" becomes "big") Learn more (e.g. the 'Ignore quotations' setting is enabled and the document is 20% quotations
Our Shared Data Hub is a collection of millions of user-submitted documents that you can utilize as a scan resource and choose whether or not you would like to submit the file
you are scanning into the Shared Data Hub. Learn more
The report will generate a complete list of results. There is always the option to exclude specific results that are not relevant. Note, by unchecking certain results, the similarity
These are the results displayed from the collection, or batch, of files uploaded for a scan at the same time. Learn more
Interim Deliverable Report
Group 4
Cybersecurity
Project Title:
Cyber Warfare and National Security: Analysing State-Sponsored Cyber Attacks
Definition
The Cyber Warfare is the malicious activity which is undertaken by the nation state or its allies
in which cyber media is used to attack, interrupt or corrupt the information systems,
infrastructure or the national interests of the opposition. Cyber war is strategic, political and
military in comparison to cyber-crime, which is mostly profit-making.
Cyber warfare refers to the use of a nation or international entity to assault and possibly destroy
the computers or information-based structure of a different nation.
Factor Explanation
Weaponry Affordability Cyber fantasies (malware, ransomware, zero-day exploits) are
much more cost-effective as compared to conventional war
weapons.
International Digital Internet dependence of governments, military systems, and
Interdependence infrastructure has made the systems susceptible to attacks.
Stealth and Anonymity Cyber-attacks are hard to trace; the aggressor can leave the
identification behind through proxy servers or botnets.
Asymmetric Power Less powerful states as well as rogue states (e.g., North Korea,
Projection Iran) can attack other world powers such as the U.S. through
cyber instruments.
Making a protected election fail or getting the top secret papers of a diplomacy or
democratic looting military secrets are effective tools.
In our age of computers, the idea of national safety has gone beyond military and border control.
It has, now, the following in it:
• Cybersecurity of the critical infrastructure
• Integrity of data & sovereignty of data
• Protection with regard to cyber-surveillance and sabotage
• Addressing influence activities by the foreign powers
According to U.S. National Cybersecurity Strategy 2023, U.S strategy is based on five
strategic priorities:
The United States now considers cybersecurity as a national defence tonic of the nation.
• Military: The modern defence systems (e.g., drones, missiles) are software-moderated
and may be attacked by hackers.
• Energy Sector: Both the power grids and nuclear plants are supported with Industrial
Control Systems (ICS), which can be accessed through the cyber tools.
• Healthcare: The ransomware attacks targeted hospitals in the United States, Germany,
and India during the COVID-19!
Initiative Details
Cyber Command U.S. Founded to undertake offensive-defensive cyber-
attacks.
National Cyber Security Policy of This was adopted in 2013 to secure Indian cyberspace;
India pending, review.
The NIS2 Directive of the EU Enhances cybersecurity laws in the member states in
Europe.
UN Open-Ended Working Group The current discussions to outline international norms
(OEWG) within cyberspace.
Challenge Explanation
Attribution Complexity Spoofing, botnets, and false flags are some
of the techniques employed by cyber
attackers in order to get investigators
confused.
Escalation Management A cyberattack may result into war causing
real-life military response to be launched.
Talent Shortage In 2024 there are more than 3.5 million
unfilled cybersecurity jobs in the world.
Artificial intelligence and Quantum Threats Powers around the world are in a mad dash
to weaponize AI and decrypt
communications using quantum computing.
Worldwide Computer Crime: It will rise to 10.5 trillion dollar annually by 2025
• Mean financial costs due to Data Breach: 4.45 million India The Indian Cyber Incidents:
• According to the reports of the year only 2022, 13.9 lakh cyberattacks or 1.39 million
cyberattacks took place (CERT-In).
• The ransomware controlled by the CERT-In system more than 2000 attacks during the
year.
Government Budgets:
• The budgetary allocation on cybersecurity in the USA FY2024 is 13.5 billions of dollars.
• India: The Government of India is estimated to spend INR 515 Cr (202324) in its
Government outlay namely the Cybersecurity, which is proposed by MeitY.
3.Defining Cyber Warfare: Objectives and Classifications
The cyber warfare refers to the use of digital attacks by a government or a not state actor towards
spoiling, interfering with, or gaining an upper hand over an opponent in cyberspace. Computer
network operations are an aspect of these actions that target the military, governmental, or
critical infrastructure with an express aim of achieving strategic goals without the use of
conventional kinetic engagement..
• Denial of Service and Degradation: Denial of Service or the degradation of service that is
achieved by overloading the networks or systems in such a way that renders service inaccessible
or service capacity limited.
Electronic Warfare The use of cyber related activities like electronic systems, e.g. radar
(EW) and communication to damage kinetic operations
Characteristics
Cyber warfare does not involve a physical impact yet it can result in a physical effect (e,g
Stuxnet attack on Iranian nuclear facilities).
It takes advantage of weaknesses of legacy and modern systems and tends to use
unpatched software or trusting computing relations.
Alliances complicate the issue as the members states are able to go weak together or
even synchronize their offensive/defensive cyber plans.
It dwells in a globalized but territorialized cyberspace that makes legal and jurisdictional
schemes problematic.
4.State-Sponsored Attacks: Tools, Tactics, and Techniques (APT, malware, phishing, etc.)
State-sponsored attacks present a more advanced type of cyber operation which is highly
focused on the element of silence, durability, and precision that tend to target important
infrastructures, strategic embeddedness, and governmental facilities.
APTs are long-standing persistent and focused cyber campaigns with an aspect of stealth.
Sandworm, Fancy Bear (APT28), and Gamaredon are examples of groups that use polymorphic
and metamorphic malware that allow them to detect conventional security systems by constantly
recoding the signatures of their code . APTs often perform a supply chain attack and use a zero-
day vulnerability to access an intended network.
Malware:
The variants of state-sponsored malware have high-quality ransomware with strong encryption
and double extortion strategies (they can not only encrypt data, but also blackmail to release it
publicly) . Too frequently such malware families employ polymorphism or metamorphism
effectively rewriting themselves, making their defensive countermeasure more complex.
Examples include backdoors, trojan, spyware.
Defensive Strategies
Some fundamental methods of which they are all involved in the protection of computer
structures against dynamic forms of challenges against them.
Post-exploitationtradecraft
SUNBURST was a delayed dropper that held up to two weeks and ran domain-generation
algorithms and DNS-based C2 and also loaded in-memory via TEARDROP and RAINDROP.
They used targeted stolen Active Directory signing keys with none on chosen targets, and minted
fraudulent SAML tokens so that their pivot in on-premises identity infrastructure to Azure AD
and Microsoft 365 mailboxes was without impediment, providing long-term access, passive
stealth, with few disk-based artefacts to detect.
The Background
NotPetya, a malware that pretended to be ransomware at first but was later found to be a wiper
designed to cause damage, hit Ukraine in June 2017. It was one of the worst cyberattacks in
history. MeDoc is a popular accounting program in Ukraine, and the attack started through its
update system. Once the malware got into a network, it spread quickly through both business and
government networks.
Propagation Method: NotPetya used several ways to spread, such as: The EternalBlue SMB
exploit, which WannaCry also used Mimikatz for stealing credentials Using PsExec and WMIC
to move laterally
Payload: The malware showed a ransom screen, but it permanently damaged systems by
overwriting the Master Boot Record (MBR), making devices unusable.
Scope: The initial targets were Ukrainian infrastructure -- banks, energy, and transportation. The
infection spread around the globe causing harm to companies like Maersk, FedEx, and Merck --
costing over 10 billion dollars.
Attribution The United States, United Kingdom and Australia, among other countries in the
West, attributed blame to the GRU, the Russian military intelligence agency for the NotPetya
cyberattack. Specifically, it blamed Unit 74455, otherwise known as the Sandworm Team. It was
believed that the attack was part of an ongoing hybrid warfare strategy by Russia against
Ukraine.
Strategic Intent
• Make Ukraine's economy and government less stable.
• Demonstrate to adversaries what can be accomplished in cyberspace.
• Convey deterrent or retaliatory capability without belligerent engagement.
Implications
• Made it apparent that cyber-enabled attacks by nation-states can cross into the systems of other
states, making it difficult to differentiate between regional conflict and global cyber crisis.
• Made it unequivocally clear that the governance and security of digital critical infrastructure
must be resilient to cyber-attacks and have backup capabilities.
Challenges:
States often utilize independent hackers or cybercriminal groups (e.g. APT groups) to
retain plausible deniability.
There may be overlap of tools or infrastructure, which would muddy accountability.
Attackers can assume another person/entity's identity by inserting false artifacts, e.g.
Russian-language code in a North Korean operation. As an example, consider the alleged
false flags in the Sony Pictures hack.
Many actors use malware that is publicly available, e.g. Cobalt Strike, Mimikatz, or
Metasploit. When TTPs overlap, it can be hard to assign attribution definitively.
Attackers use TOR, VPNs, or botnets to mask the traffic's source.
Bulletproof hosting in neutral jurisdictions are often used.
Governments may delay or avoid attribution for a political reason, if they have been
diminished of intel or when a chain of proof is lacking.
Political Attribution vs. Technical Attribution
Technical Attribution:
This is undertaken by cybersecurity companies and researchers, using forensic evidence (IP
addresses, malware signatures and behavioral patterns)
Political Attribution:
This can take into account, a government-issued intelligence report, the geopolitical context
and/or motivations.
Recent Advances
9. Comparative Analysis: Cyber Warfare Tactics – U.S., Russia, China, North Korea
United States
• Management of Cyber Warfare: Defence mode with capability for offensive measures;
alignment of cyber operations with other armed services' doctrine and defensive security
initiatives.
• Identified Agencies: Cyber Command (USCYBERCOM), NSA, DHS.
• Approach: Use of advanced persistent threats (APTs) to collect intelligence, deterrence,
and strategic strike capabilities. Attention on zero day exploit research and securing
critical infrastructure.
• Example: Turkey seed of the Stuxnet operation against Iran's nuclear centrifuges (future
Stuxnet operation, identified by the U.S. ET).
• Quantifiable Metrics: The US government has budgeted approximately 10.4billion
dollars in their proposed FY2024 federal budget for cybersecurity in their proposed study,
which most critically has areas of focus that include critical infrastructure and supply
chain security (Sources- Congressional Budget Justification FY
Russia
• Direction: Hybrid Warfare, where cyber means are one component of information warfare
and part of a collection of mixed methods or doctrine called psychological operations.
• Major agencies: GRU, FSB
• Tactics - Coercive diplomacy applied in the direct use of disinformation campaigns or
disinformation campaigns as interference or attack during an electoral process, somewhat
DDoS attacks on websites, and infiltration of critical infrastructure.
• Examples of Russia as an actor: Ukrainian power grid attacks in 2015 and 2016,
interference in the 2016 Us elections.
• Data Point: Russia has utilized both patriotic hackers and criminal proxies that are
difficult to attribute
China
North Korea
• Strategy: The country was engaged in economic gain and using cyber for asymmetric
warfare.
• Agencies: Bureau 121, Reconnaissance General Bureau.
• Tactics: Cryptocurrency hacking, ransomware, hacking financial systems.
• Examples: WannaCry ransomware attack back in 2017; hacking cryptocurrency
exchanges multiple times.
• Fact: North Korea has been stealing cryptocurrency for at least 4 years, for a value of
over 3 billion as a means to fund their weapon programs.
9.Global Cyber Defence Strategies: Policies, Laws & National Security Frameworks
United States
China
Russia
• Policy Framework: Information Security Doctrine .
• Laws: Sovereign Internet Law which mandates domestic traffic.
• National Security: a centralized approach to the Internet and close supervision of digital
life.
• Data Point: The testing of the Russia portion of the world Internet, the so-called Runet,
has given it readiness for disconnection during crises
International Collaboration
• Budapest Convention on Cybercrime: 68 states that ratified this treaty for the
harmonization of cybercrime laws.
• UN GGE and OEWG Dialogues: for the purpose of establishing the norms of responsible
state behaviour.
• Cybersecurity Tech Accord: more than 150 companies across the world focus on user
protections against cyber attacks.
• Data Point: World Economic Forum Global Cybersecurity Outlook 2024 states that 74
percent of organizations around the world believe in public-private partnership as
essential for developing cyber resilience
NATO is now leading the organization of allied cybersecurity. At the Warsaw Summit in 2016,
it declared cyberspace to be one of its domains of operation, as it recognized attacking an ally in
the cyberspace domain could trigger Article 5 of the NATO Charter - collective defence (NATO,
n.d.). The Cyber Defence Pledge of 2016 was reiterated at the Vilnius Summit in 2023, pledging
the members to strengthen national cyber defence and invest in infrastructures . In 2025 all
members agreed to enhance defence spending to a minimum of 5% of the GDP and 1.5% to
cyber security in particular with protecting critical infrastructure an priority.
NATO DIANA: invests in dual-use start-ups that are innovating in cyber resilience,
including secure communication.
Cooperative Cyber Defence Centre of Excellence (CCDCOE), Tallinn: it is a knowledge
center that organizes studies, training and the annual Locked Shields Cyber-defense
exercise, the largest live-fire cyber exercise in the world (NATO CCDCOE, n.d.).
Cyber Coalition Exercises: They simulate the largest possible cyberattacks with as many
as 1,300 experts that contribute to the development of a common operational response.
These coordinating efforts escalate adverse effects on Advanced Persistent Threats
(APTs) and ransomware, and state-sponsored hacking, i.e., Russia, China, and North
Korea.
The UN has an important normative and diplomatic role to play in global cyber governance but
has no ability to enforce. Essentially, it operates on two large tracks:
The GGE is a team of experts that have met under the auspices of the UN since 2004, and came
to the conclusion in 2015 that international law applies to cyberspace - as either a function of the
UN Charter, International Humanitarian Law (IHL), or the principles of sovereignty.
ii. Open-Ended Working Group (OEWG):
The OEWG commenced in 2019, and all 193 UN Member states are involved. It promoted
CBMs, including incident reporting; voluntary norms; and inter-state cooperation.
Free-will:
There are no promises (binding), only aspirational norms.
Enforcement Gap:
ONU has no attribution systems nor a body of sanction in space geopolitics
fragmentation: Russia and China will be more likely to push for state-centric, sovereign
Internet governance, whereas the preference of liberal democracies is for a free; open
and secure on-line environment.
Cyber-attacks perpetrated by states continue to become more rampant and sophisticated. Given
that, cyber diplomacy has become an increasingly important diplomatic tool in concordance with
deterrence.
Key Developments:
The cyber diplomacy toolbox of the European Union facilitates pro-active and
coordinated actions such as sanctioning the attacker, denunciation, or withdrawal of
diplomatic privileges where state actors engage in cyber violence (Council of the EU,
2017). There are also a growing number of joint cyber threat dialogues and workshops in
which India has participated with countries such as the USA, Japan, Singapore, and Israel
with protection of critical infrastructure, coordination of CERT, and data sovereignty as a
priority.
Cyber ambassadors and envoys: 40 or more countries are also formalizing cyber
diplomatic instruments to advocate national cyber interests. The Global Forum on Cyber
Expertise (GFCE) is pulling together efforts to track state sponsored attacks and assist
developing nations with enhancing their cyber capacity, law reforms targeting appropriate
levels of regulation. Cyber diplomacy can be inclusive of recruiting private sector actors
such as Google, Microsoft, Cisco etc. as private sector actors tend to be the first entities
to have an indication of state actor sponsored attacks (before governmental agencies).
The multi stakeholder approach also enhances both effective and responsive behaviours.
11.Ethical, Legal, and Human Rights Consequences of Cyber Warfare
i. The Attack on Civilian Structures: One of the worst ethical problems is that most
of these attacks are aimed at civilians and even when civilians do not constitute the
aim of the attack. For example, the 2017 WannaCry ransomware attack affected over
200,000 computers in 150 countries, interrupted hospital operations in Britain,
delayed surgery, and devastated a health system. On one hand, it was suggested that
this attack can be politically rationalized but the victims were unsuspecting sick
patients and their care providers.
ii. False-Flag Operations: Some cyber attacks are actually done with what appears to
be the origins of a foreign country or an organization. This kind of attack is known as
a false-flag operation. It creates confusion, false claims, but in a worst-case scenario
could result in innocent countries going to war. For example, stateside in 2014, the
hack of Sony Pictures occurred, where the US was falsely blamed for deriding North
Korea - at an early glance the evidence led to China.
iii. Autonomous Cyber Weapons: There is another grave threat; the autos growing use
of AI enabled autonomous cyber technology which can act independently of human
input or management in the cyber operating environment once it is programmed.
These tools can locate a target or targets, choose who it wants to attack, determine the
best means to attack, establish the timing of the attack and one of the most alarming
parts, it can plan and execute all of this without even human oversight.
As a 2022 CSIS report noted, over 60 percent of the significant state-sponsored cyber intrusions
in the last few years had not been positively attributed to a state actor.
Cyber warfare affects the fundamental human rights, but it does not mean the attacks are such a
physical threat.
They are:
Right to Privacy:
There are now cybersecurity tools being implemented to follow the citizens. One
example is Pegasus spyware, and some governments use it to illegally infiltrate the
phones of activists and opposition figures and journalists. That breaches the
fundamentally important concepts of privacy and the individual's freedom of thought.
Freedom of Expression:
Cyber warfare is one of the tools of state power to limit freedom of expression, either
by suppressing itself the information or depriving access to the channels of crucial
importance. Indicatively, independent news media in Russia and Iran have been shut
down permanently by hackers, who coordinate the process of DDoS attacks. Similarly,
in situations where the regime aims at suppressing the organisation of mass actions,
when the central methods of interference with freedom of speech consist in blocking
social-media sites, grave infringements of speech and expression are notable.
The possible outcomes of cyber attacks go beyond censorship of the discourse; they can
trigger further service denial attacks. It is being reported that in such cases when the
malicious intruders break into core systems, power grids, hospitals, banks, water-treatment
plants and many more, affected civilians in millions can be subject to excruciating suffering.
This is also depicted in the empirical record. In Ukraine, there was nationwide attack on the
countrywide power supplies in 2015 and 2016 using computers-based attacks resulting in
making some parts of the system inactive and leaving thousands of citizens exposed to cold
weather without electricity. At the same time, Myanmar government blocked internet
connections in the short-term after the events of the 2021 coup, which hindered
communications, access to education and healthcare, and emergency-response resources. In a
broader sense, the cases under discussion point to the potentials with regards to the cyber
interference as a means of suppression, ostracism, and social policing.
The spread of artificial intelligence (AI) is a major accelerator to speed and magnitudes of
the cyberattacks. Malicious agents based on AI can scan networks constantly to identify
vulnerabilities, analyse their defensive positions and alter their methods of attack in real-time
to avoid being caught by conventional security systems.
Enhancements in the social engineering techniques are another significant aspect of AI-
powered threats evolution. The generative AI has now the capacity to create fraudulent
phishing emails, deep fakes, or other advanced forms of social engineering which are
sometimes personalised, grammatical and hence very convincing. These mechanisms greatly
increase the chances of successful attacks, which increases click-through rates and facilitates
credential theft.
More directly, it is likely that in the future AI models will be the target of autonomous AI
agents rather than acting specifically on a solution that uses AI, through vulnerabilities in
algorithm or data, or by ‘poisoning’ models after deployment to degrade the accuracy or
trustworthiness of the relevant AI-based solution.
On top of that, AI tools also create a reduced skill-barrier to more advanced operations that
can be executed by less sophisticated threat actors such as reconnaissance, phishing attacks,
and malware creation.
Adaptable Defenses:
AI-enhanced defensive systems enables learning and adaption against new threats and attack
techniques, in order for defenses to remain robust against adaptive cybercriminal activity.
Combating Ransomware:
AI tools are being developed to find, combat, or mitigate Ransomware more effectively.
The Zero Trust Architecture (ZTA) provides a strategic model for approaching cybersecurity
that assumes no user, device, or application can be implicitly trusted, whether they are inside
or outside the organization’s network perimeter. In instead, every access attempt is
considered a threat that needs to be verified.
Never Trust, Always Verify: The central hypothesis. All users, devices, and connections are
assumed to be untrusted.
Verify Explicitly:
Each access request is authenticated and authorized based on all known data sources such as
user identities, locations, devices, sensitivity of data. Multi-factor authentication (MFA) and
identity management are important pieces.
Least Privilege Access:
Users, applications, and devices get only the minimum level of access required to perform
their assigned functions. This limits potential damages if a breach occurs, and limits lateral
movement in the network,
Micro-segmentation:
Networks are divided into groups; the segments are contained and isolated. An attacker may
achieve access to one segment, but with micro-segmentation in place, their ability to move to
other parts of the network is limited.
Cybersecurity automation:
The ZTA protocols use automated systems for cybersecurity monitoring, linking enterprise-
wide information systems, and assessing user activity for the purpose of proactively updating
network-based defenses.
3. Quantum Threats
Quantum computing, although nascent, can present a long-term existential threat to many
core cryptographic mechanisms of modern cybersecurity, including systems employed to
protect national security information
.
3.1. Quantum Computers and their Threat to Current Cryptography
Shor's Algorithm:
Shor algorithm is a quantum algorithm that can be used to efficiently factorize large integers
and compute discrete logarithms, to which well-used public-key encryption algorithms are
based (such as RivestShamirAdleman (RSA) and Elliptic Curve Cryptography (ECC)). This
is something critical in terms of modern safe communication systems like HTTPs, VPNs and
blockchain services.
Grover's Algorithm:
Although Grover's is not as grave a threat as Shor's, Grover's algorithm does provide
quadratic speedup to search an unsorted database, which reduces the effective security of
symmetric-key cryptography (for example, Advanced Encryption Standard (AES)) by
halving the security of the key length.
Within the context of national security, quantum technology can have three major issues:
(i) undoing classified intelligence, military communications and government secrets
endangering defense and intelligence activities;
(ii) breaking key infrastructure such as power, transportation, financial systems and many
others potentially catapulting societies into chaos; and (iii) the breaking down of digital
signatures and authentication thereby reducing social trust in transactions and identities and
allowing parties to take advantage of small dishonesties.
AI Text 0% 0
Excluded
Omitted Words 0
About AI Detection
Our AI Detector is the only enterprise-level solution that can verify if the content was written by a human or generated by AI, including source code and text that has been
Credible data at scale, coupled with machine learning and widespread adoption, allows us to continually refine and improve our ability to understand complex text patterns,
resulting in over 99% accuracy—far higher than any other AI detector—and improving daily. Learn more
The higher the character count, the easier for our technology to determine irregular patterns, which results in a higher confidence rating for AI detection. Learn more
The AI Detector can detect a variety of AI-generated text, including tools that use AI technology to paraphrase content, auto-complete sentences, and more. Learn more
Historical data of how many times a user has been flagged for potentially having AI text within their content. Learn more
AI Logic
The number of times a phrase was found more frequently in AI vs human text is shown according to low, medium, and high frequency. Learn more