27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Rain Ottis<br />

an infantry battalion, which may include a number of infantry companies, anti-tank and mortar<br />

platoons, a reconnaissance platoon, as well as various support units (communications, logistics), etc.<br />

This specialization and role assignment allows the militia unit to conduct a complete offensive cyber<br />

operation from start to finish.<br />

A Hierarchy model is the most likely option for a state sponsored entity, since it offers a more<br />

formalized and understandable structure, as well as relatively strong command and control ability. The<br />

control ability is important, as the actions of a state sponsored militia are by definition attributable to<br />

the state.<br />

However, a Hierarchy model is not an automatic indication of state sponsorship. Any group that is<br />

cohesive enough to determine a command structure amongst them can adopt a hierarchical structure.<br />

This is very evident in Massively Multiplayer Online Games (MMOG), such as World of Warcraft or<br />

EVE Online, where players often form hierarchical groups (guilds, corporations, etc.) in order to<br />

achieve a common goal. The same approach is possible for a cyber militia as well. In fact, Williams<br />

(2007) suggests that gaming communities can be a good recruiting ground for a cyber militia.<br />

While the state sponsored militia can be expected to have identified membership (still, it may be<br />

anonymous to the outside observer) due to control reasons, a non-state militia can consist of<br />

anonymous members that are only identified by their screen names.<br />

4.2 Strengths<br />

The obvious strength of a hierarchical militia is the potential for efficient command and control. The<br />

command team can divide the operational responsibilities to specialized sub-units and make sure that<br />

their actions are coordinated. However, this strength may be wasted by incompetent leadership or<br />

other factors, such as overly restrictive operating procedures.<br />

A hierarchical militia may exist for a long time even without ongoing conflict. During “peacetime“, the<br />

militia’s capabilities can be improved with recruitment and training. This degree of formalized<br />

preparation with no immediate action in sight is something that can set the hierarchy apart from the<br />

Forum and the Cell.<br />

If the militia is state sponsored, then it can enjoy state funding, infrastructure, as well as cooperation<br />

from other state entities, such as law enforcement or intelligence community. This would allow the<br />

militia to concentrate on training and operations.<br />

4.3 Weaknesses<br />

A potential issue with the Hierarchy model is scalability. Since this approach requires some sort of<br />

vetting or background checks before admitting a new member, it may be time consuming and<br />

therefore slow down the growth of the organization.<br />

Another potential issue with the Hierarchy model is that by design there are key persons in the<br />

hierarchy. Those persons can be targeted by various means to ensure that they will not be effective or<br />

available during a designated period, thus diminishing the overall effectiveness of the militia. A<br />

hierarchical militia may also have issues with leadership if several people contend for prestigious<br />

positions. This potential rift in the cohesion of the unit can potentially be exploited by infiltrator agents.<br />

Any activities attributed to the state sponsored militia can further be attributed to the state. This puts<br />

heavy restrictions on the use of cyber militia “during peacetime“, as the legal framework surrounding<br />

state use of cyber attacks is currently unclear. However, in a conflict scenario, the state attribution is<br />

likely not a problem, because the state is party to the conflict anyway. This means that a state<br />

sponsored offensive cyber militia is primarily useful as a defensive capability between conflicts. Only<br />

during conflict can it be used in its offensive role.<br />

While a state sponsored cyber militia may be more difficult (but not impossible) to infiltrate, they are<br />

vulnerable to public information campaigns, which may lead to low public and political support,<br />

decreased funding and even official disbanding of the militia. On the other hand, if the militia is not<br />

state sponsored, then it is prone to infiltration and internal information operations similar to the one<br />

considered at the Forum model.<br />

311

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!