6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Rain Ottis<br />
an infantry battalion, which may include a number of infantry companies, anti-tank and mortar<br />
platoons, a reconnaissance platoon, as well as various support units (communications, logistics), etc.<br />
This specialization and role assignment allows the militia unit to conduct a complete offensive cyber<br />
operation from start to finish.<br />
A Hierarchy model is the most likely option for a state sponsored entity, since it offers a more<br />
formalized and understandable structure, as well as relatively strong command and control ability. The<br />
control ability is important, as the actions of a state sponsored militia are by definition attributable to<br />
the state.<br />
However, a Hierarchy model is not an automatic indication of state sponsorship. Any group that is<br />
cohesive enough to determine a command structure amongst them can adopt a hierarchical structure.<br />
This is very evident in Massively Multiplayer Online Games (MMOG), such as World of Warcraft or<br />
EVE Online, where players often form hierarchical groups (guilds, corporations, etc.) in order to<br />
achieve a common goal. The same approach is possible for a cyber militia as well. In fact, Williams<br />
(2007) suggests that gaming communities can be a good recruiting ground for a cyber militia.<br />
While the state sponsored militia can be expected to have identified membership (still, it may be<br />
anonymous to the outside observer) due to control reasons, a non-state militia can consist of<br />
anonymous members that are only identified by their screen names.<br />
4.2 Strengths<br />
The obvious strength of a hierarchical militia is the potential for efficient command and control. The<br />
command team can divide the operational responsibilities to specialized sub-units and make sure that<br />
their actions are coordinated. However, this strength may be wasted by incompetent leadership or<br />
other factors, such as overly restrictive operating procedures.<br />
A hierarchical militia may exist for a long time even without ongoing conflict. During “peacetime“, the<br />
militia’s capabilities can be improved with recruitment and training. This degree of formalized<br />
preparation with no immediate action in sight is something that can set the hierarchy apart from the<br />
Forum and the Cell.<br />
If the militia is state sponsored, then it can enjoy state funding, infrastructure, as well as cooperation<br />
from other state entities, such as law enforcement or intelligence community. This would allow the<br />
militia to concentrate on training and operations.<br />
4.3 Weaknesses<br />
A potential issue with the Hierarchy model is scalability. Since this approach requires some sort of<br />
vetting or background checks before admitting a new member, it may be time consuming and<br />
therefore slow down the growth of the organization.<br />
Another potential issue with the Hierarchy model is that by design there are key persons in the<br />
hierarchy. Those persons can be targeted by various means to ensure that they will not be effective or<br />
available during a designated period, thus diminishing the overall effectiveness of the militia. A<br />
hierarchical militia may also have issues with leadership if several people contend for prestigious<br />
positions. This potential rift in the cohesion of the unit can potentially be exploited by infiltrator agents.<br />
Any activities attributed to the state sponsored militia can further be attributed to the state. This puts<br />
heavy restrictions on the use of cyber militia “during peacetime“, as the legal framework surrounding<br />
state use of cyber attacks is currently unclear. However, in a conflict scenario, the state attribution is<br />
likely not a problem, because the state is party to the conflict anyway. This means that a state<br />
sponsored offensive cyber militia is primarily useful as a defensive capability between conflicts. Only<br />
during conflict can it be used in its offensive role.<br />
While a state sponsored cyber militia may be more difficult (but not impossible) to infiltrate, they are<br />
vulnerable to public information campaigns, which may lead to low public and political support,<br />
decreased funding and even official disbanding of the militia. On the other hand, if the militia is not<br />
state sponsored, then it is prone to infiltration and internal information operations similar to the one<br />
considered at the Forum model.<br />
311