08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the attack. Law enforcement agencies handling these attacks must carefully<br />

consider any response since the response is capable of damaging not only the<br />

criminal/terrorist target, but also several unintended targets due to the integrated<br />

nature of society in the Cyber Age.<br />

Additionally, it is difficult for citizens and law enforcement agencies to<br />

measure the “intent” of electrons. They may appear harmless when they enter<br />

your computer as a file, only to appear as a virus carrier or some type of logic<br />

bomb upon closer examination. Further, the use of electrons is scalable to an<br />

extent not feasible with most weapons in matters of both effect and size.<br />

Electronic attacks can be administered in small or large doses by individual<br />

hackers or entire detachments, and they can be increased or decreased on<br />

demand. Since the characteristics of an electron stream (invisible, anonymous,<br />

unknown intent, quantity, etc.) are vague, this makes any law enforcement<br />

response against a criminal electronic attack tricky at best.<br />

These characteristics of the Information Age generate a host of<br />

questions for analysts and investigators to consider and act upon. For example,<br />

consider just the issue of anonymity. Is the reliability of a response negated due<br />

to anonymity, and if that is the case, 540 then how and against whom is the<br />

response to be directed? Should the attack be against the most likely aggressor<br />

even if one is not 100% certain? Is some type of proportionality response more<br />

desirable? Will one nation destroy another nation= s information infrastructure<br />

only to later ascertain that the attacker is an individual, a Aunivirusbomber@?<br />

In light of such issues, what mechanisms are there for law enforcement<br />

agencies to control the use of these weapons? Further, is there a profile that fits<br />

the cyberterrorist or criminal? Who commits these cybercrimes? Since anyone<br />

with illegal intent and even a minimum of computer skills could find a way to<br />

involve a computer in almost any type of crime, there are a huge number of<br />

potential candidates. Think about it—a disgruntled employee who wants to<br />

inflict damage or to steal proprietary data for resale or personal gain is a<br />

candidate.<br />

Three things are required for an incident to be considered a crime:<br />

motivation, access, and capability. The motivation may be as simple as<br />

“because it was there,” or it may be to show power and expertise to other<br />

hackers, or it may be for a more sinister purpose such as corporate or<br />

government espionage. Access will vary depending on the computer system<br />

540 The attacker may eventually be exposed, but time plays a key role as a nation can<br />

only wait so long to respond.<br />

303

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!