6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Theoretical Offensive Cyber Militia Models<br />
Rain Ottis<br />
Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia<br />
rain.ottis@ccdcoe.org<br />
Abstract. Volunteer based non-state actors have played an important part in many international cyber conflicts of<br />
the past two decades. In order to better understand this threat I describe three theoretical models for volunteer<br />
based offensive cyber militias: the Forum, the Cell and the Hierarchy. The Forum is an ad-hoc cyber militia form<br />
that is organized around a central communications platform, where the members share information and tools<br />
necessary to carry out cyber attacks against their chosen adversary. The Cell model refers to hacker cells, which<br />
engage in politically motivated hacking over extended periods of time. The Hierarchy refers to the traditional<br />
hierarchical model, which may be encountered in government sponsored volunteer organizations, as well as in<br />
cohesive self-organized non-state actors. For each model, I give an example and describe the model’s attributes,<br />
strengths and weaknesses using qualitative analysis. The models are based on expert opinion on different types<br />
of cyber militias that have been seen in cyber conflicts. These theoretical models provide a framework for<br />
categorizing volunteer based offensive cyber militias of non-trivial size.<br />
Keywords: cyber conflict, cyber militia, cyber attack, patriotic hacking, on-line communities<br />
1. Introduction<br />
The widespread application of Internet services has given rise to a new contested space, where<br />
people with conflicting ideals or values strive to succeed, sometimes by attacking the systems and<br />
services of the other side. It is interesting to note that in most public cases of cyber conflict the<br />
offensive side is not identified as a state actor, at least not officially. Instead, it often looks like citizens<br />
take part in hactivist campaigns or patriotic hacking on their own, volunteering for the cyber front.<br />
Cases like the 2007 cyber attacks against Estonia are a good example where an informal non-state<br />
cyber militia has become a threat to national security. In order to understand the threat posed by<br />
these volunteer cyber militias I provide three models of how such groups can be organized and<br />
analyze the strengths and weaknesses of each.<br />
The three models considered are the Forum, the Cell and the Hierarchy. The models are applicable to<br />
groups of non-trivial size, which require internal assignment of responsibilities and authority.<br />
1.1 Method and limitations<br />
In this paper I use theoretical qualitative analysis in order to describe the attributes, strengths and<br />
weaknesses of three offensively oriented cyber militia models. I have chosen the three plausible<br />
models based on what can be observed in recent cyber conflicts. The term model refers to an abstract<br />
description of relationships between members of the cyber militia, including command, control and<br />
mentoring relationships, as well as the operating principles of the militia.<br />
Note, however, that the description of the models is based on theoretical reasoning and expert<br />
opinion. It offers abstract theoretical models in an ideal setting. There may not be a full match to any<br />
of them in reality or in the examples provided. It is more likely to see either combinations of different<br />
models or models that do not match the description in full. On the other hand, the models should<br />
serve as useful frameworks for analyzing volunteer groups in the current and coming cyber conflicts.<br />
In preparing this work, I communicated with and received feedback from a number of recognized<br />
experts in the field of cyber conflict research. I wish to thank them all for providing comments on my<br />
proposed models: Prof Dorothy Denning (Naval Postgraduate School), Dr Jose Nazario (Arbor<br />
Networks), Prof Samuel Liles (Purdue University Calumet), Mr Jeffrey Carr (Greylogic) and Mr<br />
Kenneth Geers (Cooperative Cyber Defence Centre of Excellence).<br />
2. The forum<br />
The global spread of the Internet allows people to connect easily and form „cyber tribes“, which can<br />
range from benign hobby groups to antagonistic ad-hoc cyber militias. (Williams 2007, Ottis 2008,<br />
Carr 2009, Nazario 2009, Denning 2010) In the case of an ad-hoc cyber militia, the Forum unites likeminded<br />
people who are “willing and able to use cyber attacks in order to achieve a political goal.“<br />
307