27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Theoretical Offensive Cyber Militia Models<br />

Rain Ottis<br />

Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia<br />

rain.ottis@ccdcoe.org<br />

Abstract. Volunteer based non-state actors have played an important part in many international cyber conflicts of<br />

the past two decades. In order to better understand this threat I describe three theoretical models for volunteer<br />

based offensive cyber militias: the Forum, the Cell and the Hierarchy. The Forum is an ad-hoc cyber militia form<br />

that is organized around a central communications platform, where the members share information and tools<br />

necessary to carry out cyber attacks against their chosen adversary. The Cell model refers to hacker cells, which<br />

engage in politically motivated hacking over extended periods of time. The Hierarchy refers to the traditional<br />

hierarchical model, which may be encountered in government sponsored volunteer organizations, as well as in<br />

cohesive self-organized non-state actors. For each model, I give an example and describe the model’s attributes,<br />

strengths and weaknesses using qualitative analysis. The models are based on expert opinion on different types<br />

of cyber militias that have been seen in cyber conflicts. These theoretical models provide a framework for<br />

categorizing volunteer based offensive cyber militias of non-trivial size.<br />

Keywords: cyber conflict, cyber militia, cyber attack, patriotic hacking, on-line communities<br />

1. Introduction<br />

The widespread application of Internet services has given rise to a new contested space, where<br />

people with conflicting ideals or values strive to succeed, sometimes by attacking the systems and<br />

services of the other side. It is interesting to note that in most public cases of cyber conflict the<br />

offensive side is not identified as a state actor, at least not officially. Instead, it often looks like citizens<br />

take part in hactivist campaigns or patriotic hacking on their own, volunteering for the cyber front.<br />

Cases like the 2007 cyber attacks against Estonia are a good example where an informal non-state<br />

cyber militia has become a threat to national security. In order to understand the threat posed by<br />

these volunteer cyber militias I provide three models of how such groups can be organized and<br />

analyze the strengths and weaknesses of each.<br />

The three models considered are the Forum, the Cell and the Hierarchy. The models are applicable to<br />

groups of non-trivial size, which require internal assignment of responsibilities and authority.<br />

1.1 Method and limitations<br />

In this paper I use theoretical qualitative analysis in order to describe the attributes, strengths and<br />

weaknesses of three offensively oriented cyber militia models. I have chosen the three plausible<br />

models based on what can be observed in recent cyber conflicts. The term model refers to an abstract<br />

description of relationships between members of the cyber militia, including command, control and<br />

mentoring relationships, as well as the operating principles of the militia.<br />

Note, however, that the description of the models is based on theoretical reasoning and expert<br />

opinion. It offers abstract theoretical models in an ideal setting. There may not be a full match to any<br />

of them in reality or in the examples provided. It is more likely to see either combinations of different<br />

models or models that do not match the description in full. On the other hand, the models should<br />

serve as useful frameworks for analyzing volunteer groups in the current and coming cyber conflicts.<br />

In preparing this work, I communicated with and received feedback from a number of recognized<br />

experts in the field of cyber conflict research. I wish to thank them all for providing comments on my<br />

proposed models: Prof Dorothy Denning (Naval Postgraduate School), Dr Jose Nazario (Arbor<br />

Networks), Prof Samuel Liles (Purdue University Calumet), Mr Jeffrey Carr (Greylogic) and Mr<br />

Kenneth Geers (Cooperative Cyber Defence Centre of Excellence).<br />

2. The forum<br />

The global spread of the Internet allows people to connect easily and form „cyber tribes“, which can<br />

range from benign hobby groups to antagonistic ad-hoc cyber militias. (Williams 2007, Ottis 2008,<br />

Carr 2009, Nazario 2009, Denning 2010) In the case of an ad-hoc cyber militia, the Forum unites likeminded<br />

people who are “willing and able to use cyber attacks in order to achieve a political goal.“<br />

307

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!