Cyber Conflict As an Emergent Social Phenomenon

Cyber Conflict As an Emergent Social Phenomenon

View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 2011 Cyber Conflict as an Emergent Social Phenomenon Denning, Dorothy E. þÿDenning, D. E., Cyber Conflict as an Emergent Social Phenomenon, Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (T. Hold and B. Schell eds.), IGI Global, 2011. (.pdf) http://hdl.handle.net/10945/37158 Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications Thomas J. Holt Michigan State University, USA Bernadette H. Schell Laurentian University, Canada InformatIon scIence reference Hershey • New York Director of Editorial Content: Kristin Klinger Director of Book Publications: Julia Mosemann Acquisitions Editor: Lindsay Johnston Development Editor: Joel Gamon Production Editor: Jamie Snavely Cover Design: Lisa Tosheff Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2011 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or com- panies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Corporate hacking and technology-driven crime : social dynamics and implications / Thomas J. Holt and Bernadette H. Schell, editors. p. cm. Includes bibliographical references and index. Summary: "This book addresses various aspects of hacking and technology- driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions"--Provided by publisher. ISBN 978-1-61692-805-6 (hbk.) -- ISBN 978-1-61692-807-0 (ebook) 1. Computer crimes. 2. Computer hackers. I. Holt, Thomas J., 1978- II. Schell, Bernadette H. (Bernadette Hlubik), 1952- HV6773.C674 2011 364.16'8--dc22 2010016447 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. Section 4 Marco-System Issues Regarding Corporate and Government Hacking and Network Intrusions 170 Chapter 9 Cyber Conflict as an Emergent Social Phenomenon Dorothy E. Denning Naval Postgraduate School, USA ABSTRACT This chapter examines the emergence of social networks of non-state warriors launching cyber attacks for social and political reasons. It examines the origin and nature of these networks; their objectives, targets, tactics, and use of online forums; and their relationship, if any, to their governments. General concepts are illustrated with case studies drawn from operations by Strano Net, the Electronic Disturbance Theater, the Electrohippies, and other networks of cyber activists; electronic jihad as practiced by those affiliated with al-Qa’ida and the global jihadist movement associated with it; and operations bypatriotic hackers from China, Russia, and elsewhere. INTRODUCTION needed to launch attacks. Their targets are elec- tronic networks, computers, and data. Warfare is inherently social. Soldiers train and operate in units, fighting and dying for each other The Emergence of Cyber as much as for their countries. Cyber conflict is Conflict, or Hacking for Political also social, but whereas traditional warriors work and Social Objectives and socialize in physical settings, cyber warriors operate and relate primarily in virtual space. Although conflict appears throughout human his- They communicate electronically and meet in tory, its manifestation in cyberspace is a relatively online forums, where they coordinate operations recent phenomenon. After all, digital computers and distribute the software tools and knowledge did not appear until the 1940s, and computer net- works until the 1960s. Attacks against computers and the data they held emerged in the late 1950s DOI: 10.4018/978-1-61692-805-6.ch009 and early 1960s, but they were perpetrated more Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Cyber Conflict as an Emergent Social Phenomenon for money and revenge than as an instrument of The Purpose of This Chapter national and international conflict. Typical crimes included bank fraud, embezzlement, information This chapter examines the emergence of social theft, unauthorized use, and vandalism (Parker, networks of non-state warriors launching cyber 1976). Teenage hacking arrived on the scene in attacks for social and political reasons. These the 1970s, and then grew in the 1980s, as young networks support a variety of causes in such areas computer users pursued their desire to explore as human and animal rights, globalization, state networks, have fun, and earn bragging rights. By politics, and international affairs. This chapter the end of the decade, the single biggest attack examines the origin and nature of these networks; on the Internet was a computer worm launched their objectives, targets, tactics, and use of online by a college student simply as an experiment. forums. It also describes the relationship, if any, Within this mix of playful hacking and serious to their governments. computer crime, cyber conflict, or hacking for political and social objectives, emerged, taking root in the 1990s and then blossoming in the THE NATURE OF NON- 2000s. Now, it accounts for a substantial share of STATE NETWORKS all cyber attacks, as well as some of the highest profile attacks on the Internet, such as the ones Unlike states, non-state networks of cyber soldiers perpetrated by patriotic Russian hackers against typically operate without the constraints imposed Estonia in 2007 and Georgia in 2008. by rigid hierarchies of command and control, for- mal doctrine, or official rules and procedures. In- The Hacker Group Phenomenon stead, they operate in loosely-connected networks encouraging and facilitating independent action in From the outset, hackers and cyber criminals support of common objectives--what is sometimes have operated in groups. In his examination of characterized as “leaderless resistance.” early computer-related crime, Donn Parker found However, while the networks are decentralized, that about half of the cases involved collusion, they are not actually leaderless. A few individu- sometimes in groups of six or more (Parker, 1976, als, often already connected outside cyberspace p. 51). Youthful hackers met on hacker bulletin or from previous operations, effectively take boards and formed clubs, one of the earliest and charge, or at least get things started. They articu- most prestigious being the Legion of Doom (Den- late goals and strategy, plan and announce cyber ning, 1999, p. 49), while serious criminals formed attacks, encourage people to participate, and networks to traffic in cyber crime tools and booty, provide instructions and tools for participating. such as stolen credit cards. Today, there are perhaps They manage the online forums--websites, web tens or hundreds of thousands of social networks forums and groups, discussion boards, chat rooms/ engaging in cyber attacks. While many of these channels, email lists, and so forth--supporting networks were formed for fun or financial gain, network activities. They also develop or acquire others arose for the purpose of engaging in cyber the automated software tools used by the group. conflict. Individuals, often already connected Often, the tools themselves give the leaders some through hacker groups or other social networks, control over the conduct of cyber attacks (e.g., se- came together to hack for a cause. lection of targets and rate of attack), compensating for the lack of a hierarchical command structure over the network players. 171 Cyber Conflict as an Emergent Social Phenomenon The net effect is that non-state cyber war- and political activism, is the broadest area; it can riors are able to mobilize and conduct attacks involve small groups of local activists or large on relatively short notice, unconstrained by the groups crossing international boundaries and com- need to follow time-consuming protocols or wait ing together over the Internet. Targets are typically for an approval process to move through a chain government institutions, including both national of command. Further, the networks can grow to and international bodies, but they also include include thousands of participants, as resources businesses and other non-state groups. Electronic are not needed to pay, train, or relocate individual jihad refers to cyber attacks conducted in support of warriors. Assuming adequate bandwidth, an online the terrorist group al-Qa’ida and the global jihadist forum that supports a small cyber army can just movement associated with it. Targets include both as easily support a large one. government and non-government entities across Online forums play a vital social

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    21 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us