Rethinking Secrecy in Cyberspace

Total Page:16

File Type:pdf, Size:1020Kb

Rethinking Secrecy in Cyberspace Journal of Global Security Studies, 3(4), 2018, 402–416 doi: 10.1093/jogss/ogy022 Research Article Rethinking Secrecy in Cyberspace: The Politics of Voluntary Attribution Downloaded from https://academic.oup.com/jogss/article-abstract/3/4/402/5092710 by guest on 15 January 2020 Michael Poznansky1 and Evan Perkoski2 1University of Pittsburgh and 2University of Connecticut Abstract Cyberspace affords actors unprecedented opportunities to carry out operations under a cloak of anonymity. Why do perpetrators sometimes forgo these opportunities and willingly claim credit for attacks? To date, the literature has done little to explain this variation. This article explores the moti- vations behind voluntary credit-claiming for the two main actors in cyberspace: states and politically motivated nonstate actors. We argue that states are most likely to claim credit for their operations and to do so privately when the goal is to coerce an opponent. Nonstate actors tend to publicly claim credit for their attacks in order to showcase their capabilities, influence public opinion, and grow their ranks. We use case narratives to assess the plausibility of our argument and find strong support. This article places cyberspace operations in conversation with the larger literature on secrecy in interna- tional relations and advances a common framework for understanding how both states and nonstate actors operate in this evolving domain. Keywords: cyber warfare, secrecy, coercion, nonstate actors Introduction Connor 2015), and the Syrian Electronic Army left be- hind a brazen message when they compromised the US Secrecy is a defining feature of cyberspace. Cyber in- Army’s public website in June 2015 (Vinton 2015). truders can frequently disrupt networks, steal financial Why do some actors claim responsibility for cyber op- assets, and conduct espionage without ever revealing erations while others opt for anonymity? To answer this their identities. Recent scholarship goes a long way to- question, we explore the logic of credit-claiming for two ward explaining the consequences of rampant secrecy key sets of actors in cyberspace: states and politically mo- and deception in cyberspace, from the way it affects tivated nonstate actors (hereafter, nonstate actors).1 compellence and deterrence (Gartzke and Lindsay 2015; We argue that credit-claiming, including the man- Lindsay 2015; Borghard and Lonergan 2017; Nye 2017) ner in which culpability is communicated, depends on to its influence on the dynamics of conflict and escala- what the intruder wants to accomplish. For states, credit- tion (Gartzke 2013; Buchanan 2017). Yet, while cyber claiming is most appealing during operations that require intruders have ample opportunities to keep their spon- target compliance, otherwise known as cyber coercion. sorship a secret, not all choose to take advantage. To When states choose to make their identities known to the contrary, some willingly claim credit for their hand- coerce targets, they are more likely to do so privately iwork. For example, the group Anonymous frequently since public credit-claiming raises the odds of escalation. rebrands websites with personal logos after intrusions Anonymity is most attractive during operations where (Smith 2016). They are not alone; SOBH Cyber Jihad, based in Iran, claimed credit for hacking into the con- 1 We bracket nonstate actors without political trol system of a dam in New York (Gosk, Winter, and motivations. Poznansky, Michael, and Evan Perkoski. (2018) Rethinking Secrecy in Cyberspace: The Politics of Voluntary Attribution. Journal of Global Security Studies, doi: 10.1093/jogss/ogy022 © The Author(s) (2018). Published by Oxford University Press on behalf of the International Studies Association. All rights reserved. For permissions, please e-mail: [email protected] MICHAEL POZNANSKY AND EVAN PERKOSKI 403 success can be achieved without target compliance— sis bargaining (Baum 2004; Yarhi-Milo 2013; Brown cyber espionage and sabotage offer two such examples. 2014; Carson and Yarhi-Milo 2017), the role that covert Nonstate actors operate according to a different logic. action plays in managing escalation (Carson 2016), Drawing on insights from studies of armed and unarmed and the relationship between democratic peace theory resistance, we argue that nonstate actors in cyberspace and covert regime change (Downes and Lilley 2010; regularly claim credit for their intrusions in visible ways Poznansky 2015). These studies are tied together by an to signal credibility, influence public opinion, and grow overarching focus on how actors use secrecy to pursue their ranks. Owing to their relative weakness and obscu- their political goals. Students of cyber warfare have done rity, nonstate actors must first prove their capability be- a commendable job analyzing the many challenges se- Downloaded from https://academic.oup.com/jogss/article-abstract/3/4/402/5092710 by guest on 15 January 2020 fore doing anything else. crecy poses for perpetrator and victim alike (Gartzke This argument requires a conceptual shift in how we 2013; Gartzke and Lindsay 2015; Lindsay 2015; Rid and think about secrecy in cyberspace. Existing research typ- Buchanan 2015; Buchanan 2017; Nye 2017) but have ically treats secrecy as monolithic, but there are impor- largely neglected the determinants of secrecy at the stage tant distinctions worth bearing in mind. Perhaps most where sponsors can (dis)claim ownership of an opera- relevant is the difference between clandestine and covert tion.2 We address this issue directly. operations (Kibbe 2007). The former refers to missions Second, this study is among the first of which we are where secrecy and deception are employed to preserve aware that considers the goals and constraints of the two the strategic advantages afforded by surprise (Axelrod most important actors operating in cyberspace—states 1979; Slantchev 2010). The latter involves the use of se- and nonstate actors. Existing research tends to focus on crecy to conceal the sponsor of an operation (Forsythe the former (Gartzke 2013; Buchanan 2017; Borghard 1992; Gibbs 1995; Downes and Lilley 2010; Poznansky and Lonergan 2017; Nye 2017). But nonstate actors con- 2015; Carson 2016). Importing this distinction to the cy- duct cyberattacks at high rates and often in very visi- ber domain helps clarify when secrecy is an operational ble ways. Moreover, their attack capabilities are grow- imperative and when it is a choice that actors make. In ing and in some cases they “tak[e] tools and tricks from brief, the advantages afforded to targets who learn of nation-states and unleash them on companies and orga- imminent or ongoing operations means that cyber in- nizations” (Stoller 2017). Ignoring nonstate actors or as- trusions will almost always be conducted clandestinely. suming that their strategic logic mirrors that of states is Once an operation is complete, however, intruders are insufficient. Our approach is thus to ask the same ques- free to choose whether to claim responsibility. Put differ- tions for both sets of actors, reducing barriers that inhibit ently, cyber operations are almost always clandestine but a more complete understanding of cyberattacks. not necessarily covert. The failure to recognize this dis- tinction partly contributes to the widespread assumption that anonymity is an immutable feature of cyberspace The Problem of Secrecy rather than something actors select into. The conventional view of a cyber operation is an in- Rigorously testing these claims would require access truder quietly penetrating a target’s network to collect in- to the internal deliberations of state and nonstate ac- formation or cause damage, whether virtual or physical, tors to understand how decisions about credit-claiming without betraying their identity.3 This narrative—which are made. At present, this is a nearly impossible task assumes secrecy from start to finish—colors how the liter- (Buchanan 2017, 12). We are perhaps decades away from ature describes the challenges cyber operations pose. The gaining access to the types of declassified documents nec- relative ease with which perpetrators can surreptitiously essary to evaluate the deliberations of states; the problem penetrate networks and the difficulty of anticipating is even more acute for nonstate actors. As a second-best and defending against attacks underlies the notion that option, we leverage a range of sources—secondary mate- cyberspace is offense-dominant (Slayton 2017). More- rials, news reports, official government statements, and over, intruders’ ability to mask their identities makes interviews—to assess the plausibility of our argument. it hard for victims to confidently attribute responsi- Our study is closer to an exercise in theory construction bility for cyberattacks (Rid and Buchanan 2015; Nye than theory testing (Mahoney 2015, 201). 2017, 49–52). According to Lindsay (2013), “[f]orensics This article makes several contributions. First, it joins takes months, whereas the anonymous attack can present together a burgeoning literature centered on the dynam- ics of secrecy in world politics and another focused on 2 For important exceptions, see Betz and Stevens (2011), cyber warfare. In the past, scholars have examined the Borghard and Lonergan (2017), and Libicki (2009). importance of secrecy and private diplomacy during cri- 3 See Buchanan (2017) for a summary. 404 Rethinking Secrecy in Cyberspace itself and perhaps complete in milliseconds” (377). Al- though attribution
Recommended publications
  • List of Targets of Arrested Computer Hackers 6 March 2012
    List of targets of arrested computer hackers 6 March 2012 The five computer hackers charged in New York Tribune and Los Angeles Times, using on Tuesday and a sixth who pleaded guilty are misappropriated login credentials. accused of involvement in some of the most notorious hacking incidents of the past 18 months. -- February 2011: A cyberattack on private computer security firm HBGary that involved the The following are some of the cyberattacks in theft of 60,000 emails from HBGary employees and which the two Britons, two Irishmen and two the HBGary chief executive, as well as defacing his Americans allegedly played a role as members of Twitter account. Anonymous, Lulz Security or associated groups: -- April-May 2011: A cyberattack on a Fox -- December 2010: Operation Payback. Distributed Broadcasting Company website that involved the denial of service (DDoS) attacks by members of theft of names, dates of birth, telephone numbers, Anonymous on the websites of MasterCard, email and residential addresses for more than PayPal and Visa in retaliation for their refusal to 70,000 potential contestants on the Fox television accept donations for WikiLeaks. In a DDoS attack, show the "X-Factor." a website is bombarded with traffic, slowing it down or knocking it offline completely. -- May 2011: A cyberattack on Sony Pictures Entertainment that revealed the passwords, email -- January 2011: Defacing a website of the Irish addresses, home addresses and dates of birth of political party Fine Gael after accessing computer 100,000 users of the www.sonypictures.com servers in Arizona used to maintain the website, website and a subsequent online attack against www.finegael2011.com.
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • The Masked Avengers: How Anonymous Incited Online
    A REPORTER AT LARGE | SEPTEMBER 8, 2014 ISSUE The Masked Avengers How Anonymous incited online vigilantism from Tunisia to Ferguson. BY DAVID KUSHNER Anyone can join Anonymous simply by claiming affiliation. An anthropologist says that participants “remain subordinate to a focus on the epic win—and, especially, the lulz.” n the mid-nineteen-seventies, when Christopher Doyon was a child in rural Maine, he spent Ihours chatting with strangers on CB radio. His handle was Big Red, for his hair. Transmitters lined the walls of his bedroom, and he persuaded his father to attach two directional antennas to the roof of their house. CB radio was associated primarily with truck drivers, but Doyon and others used it to form the sort of virtual community that later appeared on the Internet, with self- selected nicknames, inside jokes, and an earnest desire to effect change. Doyon’s mother died when he was a child, and he and his younger sister were reared by their father, who they both say was physically abusive. Doyon found solace, and a sense of purpose, in the CB-radio community. He and his friends took turns monitoring the local emergency channel. One friend’s father bought a bubble light and affixed it to the roof of his car; when the boys heard a distress call from a stranded motorist, he’d drive them to the side of the highway. There wasn’t much they could do beyond offering to call 911, but the adventure made them feel heroic. Small and wiry, with a thick New England accent, Doyon was fascinated by “Star Trek” and Isaac Asimov novels.
    [Show full text]
  • ABSTRACT the Rhetorical Construction of Hacktivism
    ABSTRACT The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package Heather Suzanne Woods, M.A. Thesis Chairperson: Leslie A. Hahner, Ph.D. This thesis uncovers the ways in which Anonymous, a non-hierarchical, decentralized online collective, maintains and alters the notion of hacktivism to recruit new participants and alter public perception. I employ a critical rhetorical lens to an Anonymous-produced and –disseminated artifact, the Anonymous Care Package, a collection of digital how-to files. After situating Anonymous within the broader narrative of hacking and activism, this thesis demonstrates how the Care Package can be used to constitute a hacktivist identity. Further, by extending hacktivism from its purely technological roots to a larger audience, the Anonymous Care Package lowers the barrier for participation and invites action on behalf of would-be members. Together, the contents of the Care Package help constitute an identity for Anonymous hacktivists who are then encouraged to take action as cyberactivists. The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package by Heather Suzanne Woods, B.A. A Thesis Approved by the Department of Communication David W. Schlueter, Ph.D., Chairperson Submitted to the Graduate Faculty of Baylor University in Partial Fulfillment of the Requirements for the Degree of Master of Arts Approved by the Thesis Committee Leslie A. Hahner, Ph.D., Chairperson Martin J. Medhurst, Ph.D. James M. SoRelle, Ph.D. Accepted by the Graduate School May 2013 J. Larry Lyon, Ph.D., Dean Page bearing signatures is kept on file in the Graduate School Copyright © 2013 by Heather Suzanne Woods All rights reserved TABLE OF CONTENTS LIST OF FIGURES ........................................................................................................................
    [Show full text]
  • State Power 2.0.Pdf
    STATE POWER 2.0 Proof Copy 000 Hussain book.indb 1 9/9/2013 2:02:58 PM This collection is dedicated to the international networks of activists, hactivists, and enthusiasts leading the global movement for Internet freedom. Proof Copy 000 Hussain book.indb 2 9/9/2013 2:02:58 PM State Power 2.0 Authoritarian Entrenchment and Political Engagement Worldwide Edited by MUZAMMIL M. HUSSAIN University of Michigan, USA PHILIP N. HOWARD University of Washington, USA Proof Copy 000 Hussain book.indb 3 9/9/2013 2:02:59 PM © Muzammil M. Hussain and Philip N. Howard 2013 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publisher. Muzammil M. Hussain and Philip N. Howard have asserted their right under the Copyright, Designs and Patents Act, 1988, to be identified as the editors of this work. Published by Ashgate Publishing Limited Ashgate Publishing Company Wey Court East 110 Cherry Street Union Road Suite 3-1 Farnham Burlington, VT 05401-3818 Surrey, GU9 7PT USA England www.ashgate.com British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library The Library of Congress has cataloged the printed edition as follows: Howard, Philip N. State Power 2.0 : Authoritarian Entrenchment and Political Engagement Worldwide / by Philip N. Howard and Muzammil M. Hussain. pages cm Includes bibliographical references and index. ISBN 978-1-4094-5469-4 (hardback) -- ISBN 978-1-4094-5470-0 (ebook) -- ISBN 978- 1-4724-0328-5 (epub) 1.
    [Show full text]
  • Facebook and Public Empowerment in Tunisia
    11 December 2013 Facebook and Public Empowerment in Tunisia Was Tunisia’s 2011 uprising a ‘Facebook Revolution’? Absolutely, argues Yousri Marzouki. The cyber-battle won by the activists and Facebook Corporation was critical to the success of the uprising. In fact, Facebook remains embedded in the ‘political unconscious’ of the Tunisian people. By Yousri Marzouki for ISN Tunisia was once classified an ‘enemy of the Internet’ by Reporters Without Borders . Early in 2011, however, Tunisia was moved to the list of 'countries under surveillance' following a series of little-noticed events in cyberspace. While the change seemed insignificant at first, it would turn out to be momentous. The Tunisian government’s extensive use of the filtering software SmartFilter to shut down Dailymotion, Facebook, and YouTube would ring alarm bells around the world about the health of liberty and democracy in the country. In 2008, Facebook has been reinstated by former President Ben Ali in order to satisfy his family members who served as majority shareholders of the most important mobile phone service provider in the country. It was a decision that would come back to haunt him. Now, instead of the proposed ban, Facebook would play a starring role in the biggest “boomerang effect” the country has ever known. A Facebook revolution As of 2012, Internet use and social media penetration were extensive in Tunisia. In a population of 10,732,900, 39% are Internet users and 31% are Facebook subscribers. This allowed social media platforms like Facebook to make a telling contribution to the 2011 revolution, signaling the emergence of a new means of public empowerment through the Web.
    [Show full text]
  • A Generalized Threat Model for Visual Sensor Networks
    sensors Article A Generalized Threat Model for Visual Sensor Networks Jennifer Simonjan 1,† , Sebastian Taurer 2,† and Bernhard Dieber 2,*,† 1 Georgia Institute of Technology, Atlanta, GA 30318, USA; [email protected] 2 Joanneum Research, 9020 Klagenfurt, Austria; [email protected] * Correspondence: [email protected] † All authors contributed equally to threat modeling. Jennifer Simonjan and Bernhard Dieber additionally contributed equally to writing the paper. Received: 15 May 2020; Accepted: 23 June 2020; Published: 28 June 2020 Abstract: Today, visual sensor networks (VSNs) are pervasively used in smart environments such as intelligent homes, industrial automation or surveillance. A major concern in the use of sensor networks in general is their reliability in the presence of security threats and cyberattacks. Compared to traditional networks, sensor networks typically face numerous additional vulnerabilities due to the dynamic and distributed network topology, the resource constrained nodes, the potentially large network scale and the lack of global network knowledge. These vulnerabilities allow attackers to launch more severe and complicated attacks. Since the state-of-the-art is lacking studies on vulnerabilities in VSNs, a thorough investigation of attacks that can be launched against VSNs is required. This paper presents a general threat model for the attack surfaces of visual sensor network applications and their components. The outlined threats are classified by the STRIDE taxonomy and their weaknesses are classified using CWE, a common taxonomy for security weaknesses. Keywords: visual sensor networks; security; threat model; distributed systems 1. Introduction As sensor networks become more and more ubiquitous these days, surrounding us in our everyday environment, the concern for security and privacy increases steadily.
    [Show full text]
  • 2015 7Th International Conference on Cyber Conflict: Architectures in Cyberspace
    2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace M.Maybaum, A.-M.Osula, L.Lindström (Eds.) 26-29 MAY 2015, TALLINN, ESTONIA 2015 7TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: ARCHITECTURES IN CYBERSPACE Copyright © 2015 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1526N-PRT ISBN (print): 978-9949-9544-2-1 ISBN (pdf): 978-9949-9544-3-8 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace M. Maybaum, A.M. Osula, L. Lindström (Eds.) 2015 © NATO CCD COE Publications PrinteD copies of THIS publication are AVAILABLE from: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Hacker, Hoaxer, Whistleblower, Spy: the Story of Anonymous
    hacker, hoaxer, whistleblower, spy hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York First published by Verso 2014 © Gabriella Coleman 2014 The partial or total reproduction of this publication, in electronic form or otherwise, is consented to for noncommercial purposes, provided that the original copyright notice and this notice are included and the publisher and the source are clearly acknowledged. Any reproduction or use of all or a portion of this publication in exchange for financial consideration of any kind is prohibited without permission in writing from the publisher. The moral rights of the author have been asserted 1 3 5 7 9 10 8 6 4 2 Verso UK: 6 Meard Street, London W1F 0EG US: 20 Jay Street, Suite 1010, Brooklyn, NY 11201 www.versobooks.com Verso is the imprint of New Left Books ISBN-13: 978-1-78168-583-9 eISBN-13: 978-1-78168-584-6 (US) eISBN-13: 978-1-78168-689-8 (UK) British Library Cataloguing in Publication Data A catalogue record for this book is available from the British library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the library of congress Typeset in Sabon by MJ & N Gavan, Truro, Cornwall Printed in the US by Maple Press Printed and bound in the UK by CPI Group Ltd, Croydon, CR0 4YY I dedicate this book to the legions behind Anonymous— those who have donned the mask in the past, those who still dare to take a stand today, and those who will surely rise again in the future.
    [Show full text]