08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

APPENDIX THREE: THE COMPUTER: CYBERCRIMINAL OR<br />

CYBERCOP? 539<br />

Criminal Activities in the Cyber Age<br />

Today nation-state militaries are reliant on advanced information<br />

technology for threat detection, weapon launch, guidance, and detonation.<br />

Within societies, cyber technologies offer law enforcement personnel new<br />

methods for catching criminals and terrorists. Simultaneously, these<br />

technologies offer criminals and terrorists the chance to attack nation-states and<br />

influence societies in ways never before anticipated. A criminal, terrorist, or<br />

state-sponsored computer information or network attack is difficult to predict or<br />

expose since these activities occur in the interdependent public, military, and<br />

private domains, and are often anonymous. Thus the military cannot stand<br />

between the threat and the public as it once did. Instead, the role of law<br />

enforcement agencies has increased dramatically to counter this<br />

criminal/terrorist threat. This fact is underscored by the creation of a Homeland<br />

Security Department in the US that has as one of its functions the protection of<br />

the US technological infrastructure.<br />

People don’t completely understand the consequences of the use of<br />

computers, can’t watch certain aspects of a state or criminal’s<br />

cybermobilization, and don’t understand the fog and friction of the computer<br />

environment in which they operate. Plus they must deal with both military and<br />

societal threats simultaneously. Criminals and terrorists capitalize on this<br />

uncertainty. In many cases, states aren’t even sure who the players are since<br />

criminals and terrorists hide behind the façade of a nation-state or Internet<br />

infrastructure to perform their activities–at times giving their activities the<br />

appearance of state sponsorship.<br />

Controlling the consequences of the use of computers demands target<br />

intelligence far beyond that required by most weapons, a fact most criminals<br />

and terrorists recognize as an advantage. Law enforcement agencies can’t<br />

respond indiscriminately. They must spend much time and effort on each issue.<br />

Criminals/terrorists usually don’t care if their attacks have secondary<br />

consequences since the generation of chaos detracts attention from the source of<br />

539 Ms. Karen Matthews contributed over half of the material in this article. At the time,<br />

Ms. Matthews was an <strong>Army</strong> Reserve Major working for the <strong>Foreign</strong> <strong>Military</strong> <strong>Studies</strong><br />

<strong>Office</strong>. She drew upon her vast experience and training in computers, law enforcement,<br />

and digital forensics in support of this article. Given the evolving nature of the topic,<br />

she has provided websites throughout the article for easy reference to current<br />

information. She has also provided a bibliography at the end of this article.<br />

302

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!